Rules | Models | MITRE ATT&CK® TTPs | Activity Types | Parsers |
---|---|---|---|---|
50 | 21 | 6 | 1 | 0 |
Use-Case | Activity Types/Parsers | MITRE ATT&CK® TTP | Content |
---|---|---|---|
Cryptomining | network-connection-successful ↳attivo-botsink-cef-network-traffic-success-networktrafficsuccess |
T1496 - Resource Hijacking |
|
Lateral Movement | network-connection-successful ↳attivo-botsink-cef-network-traffic-success-networktrafficsuccess |
T1071 - Application Layer Protocol T1090.003 - Proxy: Multi-hop Proxy T1190 - Exploit Public Fasing Application TA0010 - TA0010 TA0011 - TA0011 |
|
Malware | network-connection-successful ↳attivo-botsink-cef-network-traffic-success-networktrafficsuccess |
TA0011 - TA0011 |
|
Ransomware | network-connection-successful ↳attivo-botsink-cef-network-traffic-success-networktrafficsuccess |
TA0011 - TA0011 |
|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
Exploit Public Fasing Application |
Proxy: Multi-hop Proxy Application Layer Protocol Proxy |
Resource Hijacking |