Skip to content

Latest commit

 

History

History
20 lines (18 loc) · 5.83 KB

ds_imss_imss.md

File metadata and controls

20 lines (18 loc) · 5.83 KB

Vendor: IMSS

Product: IMSS

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
62 28 10 2 4
Use-Case Activity Types/Parsers MITRE ATT&CK® TTP Content
Compromised Credentials security-alert
imss-i-str-alert-trigger-success-dlpalert
imss-i-str-alert-trigger-success-securityalert
imss-i-json-alert-trigger-success-spf
imss-i-str-alert-trigger-success-antispamrules
imss-i-str-alert-trigger-success-spoofedemailfilter
T1027.005 - Obfuscated Files or Information: Indicator Removal from Tools
T1059.001 - Command and Scripting Interperter: PowerShell
T1078 - Valid Accounts
T1133 - External Remote Services
T1190 - Exploit Public Fasing Application
  • 25 Rules
  • 9 Models
Data Exfiltration dlp-alert
imss-i-str-alert-trigger-success-capacityregulation
T1020 - Automated Exfiltration
T1071 - Application Layer Protocol
TA0010 - TA0010
  • 31 Rules
  • 17 Models
Data Leak dlp-alert
imss-i-str-alert-trigger-success-capacityregulation
T1020 - Automated Exfiltration
T1071 - Application Layer Protocol
TA0010 - TA0010
  • 31 Rules
  • 17 Models
Next Page -->>

MITRE ATT&CK® Framework for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
External Remote Services

Valid Accounts

Exploit Public Fasing Application

Command and Scripting Interperter

Command and Scripting Interperter: PowerShell

External Remote Services

Valid Accounts

Valid Accounts

Exploitation for Privilege Escalation

Obfuscated Files or Information: Indicator Removal from Tools

Valid Accounts

Obfuscated Files or Information

Application Layer Protocol

Automated Exfiltration