Skip to content

Latest commit

 

History

History
26 lines (24 loc) · 13.3 KB

ds_fireeye_fireeye_cms.md

File metadata and controls

26 lines (24 loc) · 13.3 KB

Vendor: FireEye

Product: FireEye CMS

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
104 38 19 3 3
Use-Case Activity Types/Parsers MITRE ATT&CK® TTP Content
Abnormal Authentication & Access web-activity-allowed
fireeye-networksecurity-json-http-session-dstdomain

web-activity-denied
fireeye-networksecurity-json-http-session-dstdomain
T1071.001 - Application Layer Protocol: Web Protocols
  • 6 Rules
  • 6 Models
Compromised Credentials security-alert
fireeye-networksecurity-json-alert-trigger-success-srcipv4
fireeye-escm-json-alert-trigger-success-fireeyecm
fireeye-networksecurity-cef-alert-trigger-success-deviceseverity
fireeye-networksecurity-leef-alert-trigger-success-malwareobject
fireeye-networksecurity-cef-alert-trigger-success-fireeye
fireeye-networksecurity-json-alert-trigger-success-product
fireeye-networksecurity-leef-alert-trigger-success-fireeyemps
fireeye-emailsecurity-cef-alert-trigger-success-fireeye
fireeye-networksecurity-xml-alert-trigger-success-fenotify

web-activity-allowed
fireeye-networksecurity-json-http-session-dstdomain

web-activity-denied
fireeye-networksecurity-json-http-session-dstdomain
T1027.005 - Obfuscated Files or Information: Indicator Removal from Tools
T1071.001 - Application Layer Protocol: Web Protocols
T1078 - Valid Accounts
T1102 - Web Service
T1133 - External Remote Services
T1189 - Drive-by Compromise
T1190 - Exploit Public Fasing Application
T1204.001 - T1204.001
T1566.002 - Phishing: Spearphishing Link
T1568.002 - Dynamic Resolution: Domain Generation Algorithms
  • 63 Rules
  • 31 Models
Cryptomining web-activity-allowed
fireeye-networksecurity-json-http-session-dstdomain

web-activity-denied
fireeye-networksecurity-json-http-session-dstdomain
T1071.001 - Application Layer Protocol: Web Protocols
T1496 - Resource Hijacking
  • 1 Rules
Data Exfiltration web-activity-allowed
fireeye-networksecurity-json-http-session-dstdomain

web-activity-denied
fireeye-networksecurity-json-http-session-dstdomain
T1041 - Exfiltration Over C2 Channel
T1071.001 - Application Layer Protocol: Web Protocols
T1567 - Exfiltration Over Web Service
T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage
T1568 - Dynamic Resolution
T1568.002 - Dynamic Resolution: Domain Generation Algorithms
  • 8 Rules
  • 2 Models
Data Leak web-activity-allowed
fireeye-networksecurity-json-http-session-dstdomain

web-activity-denied
fireeye-networksecurity-json-http-session-dstdomain
T1041 - Exfiltration Over C2 Channel
T1071.001 - Application Layer Protocol: Web Protocols
T1567 - Exfiltration Over Web Service
T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage
  • 6 Rules
  • 2 Models
Phishing web-activity-allowed
fireeye-networksecurity-json-http-session-dstdomain

web-activity-denied
fireeye-networksecurity-json-http-session-dstdomain
T1189 - Drive-by Compromise
T1204.001 - T1204.001
T1534 - Internal Spearphishing
T1566.002 - Phishing: Spearphishing Link
T1598.003 - T1598.003
  • 3 Rules
Privilege Abuse web-activity-allowed
fireeye-networksecurity-json-http-session-dstdomain

web-activity-denied
fireeye-networksecurity-json-http-session-dstdomain
T1071.001 - Application Layer Protocol: Web Protocols
T1078 - Valid Accounts
  • 1 Rules
Ransomware web-activity-allowed
fireeye-networksecurity-json-http-session-dstdomain

web-activity-denied
fireeye-networksecurity-json-http-session-dstdomain
T1071.001 - Application Layer Protocol: Web Protocols
  • 1 Rules
Workforce Protection web-activity-allowed
fireeye-networksecurity-json-http-session-dstdomain
T1071.001 - Application Layer Protocol: Web Protocols
  • 4 Rules
  • 2 Models
Next Page -->>

MITRE ATT&CK® Framework for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
Phishing: Spearphishing Link

External Remote Services

Valid Accounts

Drive-by Compromise

Exploit Public Fasing Application

Phishing

User Execution

External Remote Services

Valid Accounts

Valid Accounts

Exploitation for Privilege Escalation

Obfuscated Files or Information: Indicator Removal from Tools

Valid Accounts

Obfuscated Files or Information

Internal Spearphishing

Web Service

Application Layer Protocol: Web Protocols

Dynamic Resolution

Dynamic Resolution: Domain Generation Algorithms

Proxy: Multi-hop Proxy

Application Layer Protocol

Proxy

Exfiltration Over C2 Channel

Exfiltration Over Web Service: Exfiltration to Cloud Storage

Exfiltration Over Web Service

Resource Hijacking