Rules | Models | MITRE ATT&CK® TTPs | Activity Types | Parsers |
---|---|---|---|---|
469 | 107 | 125 | 11 | 11 |
Use-Case | Activity Types/Parsers | MITRE ATT&CK® TTP | Content |
---|---|---|---|
Abnormal Authentication & Access | account-disabled ↳microsoft-azuread-json-user-disable-success-accountdisable account-password-change ↳microsoft-azuread-sk4-user-password-modify-success-changepassword ↳microsoft-azuread-sk4-user-password-modify-success-userpasswordchange account-unlocked ↳microsoft-azuread-json-user-unlock-success-useraccountunlock app-activity ↳microsoft-evsecurity-json-endpoint-endpoint-logout-success-userinitiatedlogoff ↳microsoft-o365-json-app-activity-success-graphdirectoryauditlogs app-login ↳microsoft-defenderep-cef-endpoint-scan-antivirusscan ↳microsoft-defenderep-cef-service-create-serviceinstalled audit-log-clear ↳microsoft-defenderep-cef-process-memory-allocate-advancedhunting member-removed ↳microsoft-azuread-json-group-member-remove-success-groupmemberremoved |
T1078 - Valid Accounts T1133 - External Remote Services |
|
Account Manipulation | account-password-change ↳microsoft-azuread-sk4-user-password-modify-success-changepassword ↳microsoft-azuread-sk4-user-password-modify-success-userpasswordchange app-activity ↳microsoft-evsecurity-json-endpoint-endpoint-logout-success-userinitiatedlogoff ↳microsoft-o365-json-app-activity-success-graphdirectoryauditlogs member-removed ↳microsoft-azuread-json-group-member-remove-success-groupmemberremoved process-created ↳microsoft-defenderep-json-process-create-success-processevents |
T1003 - OS Credential Dumping T1003.003 - T1003.003 T1021.003 - T1021.003 T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1078 - Valid Accounts T1098 - Account Manipulation T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1136 - Create Account T1136.001 - Create Account: Create: Local Account T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1531 - Account Access Removal T1559.002 - T1559.002 |
|
Audit Tampering | audit-log-clear ↳microsoft-defenderep-cef-process-memory-allocate-advancedhunting process-created ↳microsoft-defenderep-json-process-create-success-processevents |
T1059 - Command and Scripting Interperter T1070 - Indicator Removal on Host T1070.001 - Indicator Removal on Host: Clear Windows Event Logs T1546.003 - T1546.003 T1562 - Impair Defenses T1562.002 - T1562.002 T1562.006 - T1562.006 |
|
Cryptomining | process-created ↳microsoft-defenderep-json-process-create-success-processevents |
T1496 - Resource Hijacking |
|
Data Exfiltration | file-write ↳microsoft-defenderep-cef-file-devicefileevents process-created ↳microsoft-defenderep-json-process-create-success-processevents |
T1003 - OS Credential Dumping T1040 - Network Sniffing T1041 - Exfiltration Over C2 Channel T1048 - Exfiltration Over Alternative Protocol T1059 - Command and Scripting Interperter T1071.001 - Application Layer Protocol: Web Protocols T1071.002 - Application Layer Protocol: File Transfer Protocols T1071.004 - Application Layer Protocol: DNS T1552.001 - T1552.001 T1560 - Archive Collected Data T1572 - Protocol Tunneling TA0002 - TA0002 |
|
Data Leak | app-activity ↳microsoft-evsecurity-json-endpoint-endpoint-logout-success-userinitiatedlogoff ↳microsoft-o365-json-app-activity-success-graphdirectoryauditlogs file-write ↳microsoft-defenderep-cef-file-devicefileevents |
T1114.001 - T1114.001 T1114.003 - Email Collection: Email Forwarding Rule |
|
Destruction of Data | file-delete ↳microsoft-defenderep-cef-file-devicefileevents |
T1070.004 - Indicator Removal on Host: File Deletion T1485 - Data Destruction |
|
Evasion | audit-log-clear ↳microsoft-defenderep-cef-process-memory-allocate-advancedhunting process-created ↳microsoft-defenderep-json-process-create-success-processevents |
T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.003 - Masquerading: Rename System Utilities T1036.005 - Masquerading: Match Legitimate Name or Location T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.005 - T1059.005 T1070 - Indicator Removal on Host T1070.001 - Indicator Removal on Host: Clear Windows Event Logs T1105 - Ingress Tool Transfer T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1140 - Deobfuscate/Decode Files or Information T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1218 - Signed Binary Proxy Execution T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.008 - T1218.008 T1218.009 - Signed Binary Proxy Execution: Regsvcs/Regasm T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1484.001 - T1484.001 T1542.003 - T1542.003 T1543.003 - Create or Modify System Process: Windows Service T1552.006 - T1552.006 T1562 - Impair Defenses T1562.001 - T1562.001 T1562.004 - Impair Defenses: Disable or Modify System Firewall T1562.006 - T1562.006 T1564.001 - T1564.001 T1564.004 - Hide Artifacts: NTFS File Attributes T1574 - Hijack Execution Flow |
|
Phishing | process-created ↳microsoft-defenderep-json-process-create-success-processevents |
T1566.001 - T1566.001 |
|
Privilege Escalation | app-activity ↳microsoft-evsecurity-json-endpoint-endpoint-logout-success-userinitiatedlogoff ↳microsoft-o365-json-app-activity-success-graphdirectoryauditlogs process-created ↳microsoft-defenderep-json-process-create-success-processevents |
T1003 - OS Credential Dumping T1007 - System Service Discovery T1012 - Query Registry T1016 - System Network Configuration Discovery T1018 - Remote System Discovery T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1033 - System Owner/User Discovery T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1049 - System Network Connections Discovery T1053.002 - Scheduled Task/Job: At (Windows) T1053.005 - Scheduled Task/Job: Scheduled Task T1057 - Process Discovery T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1068 - Exploitation for Privilege Escalation T1082 - System Information Discovery T1087 - Account Discovery T1087.001 - Account Discovery: Local Account T1087.002 - Account Discovery: Domain Account T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.003 - Signed Binary Proxy Execution: CMSTP T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1482 - Domain Trust Discovery T1484.001 - T1484.001 T1518.001 - T1518.001 T1543.003 - Create or Modify System Process: Windows Service T1547.002 - T1547.002 T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control T1552.006 - T1552.006 T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.011 - T1574.011 |
|
Next Page -->> |