Rules | Models | MITRE ATT&CK® TTPs | Activity Types | Parsers |
---|---|---|---|---|
130 | 55 | 16 | 6 | 6 |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
External Remote Services Valid Accounts Exploit Public Fasing Application |
External Remote Services Valid Accounts Server Software Component: Web Shell Account Manipulation Server Software Component Boot or Logon Autostart Execution Account Manipulation: Exchange Email Delegate Permissions |
Valid Accounts Boot or Logon Autostart Execution |
Valid Accounts |
OS Credential Dumping |
File and Directory Discovery |
Data from Information Repositories Email Collection Email Collection: Email Forwarding Rule |
Proxy: Multi-hop Proxy Proxy |
Data Encrypted for Impact |