Skip to content

Latest commit

 

History

History
19 lines (17 loc) · 11.2 KB

ds_microsoft_azure_atp.md

File metadata and controls

19 lines (17 loc) · 11.2 KB

Vendor: Microsoft

Product: Azure ATP

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
71 31 8 3 38
Use-Case Activity Types/Parsers MITRE ATT&CK® TTP Content
Compromised Credentials database-query
microsoft-mssql-xml-database-query-success-33205-1
microsoft-mssql-kv-database-query-success-33205
microsoft-mssql-xml-database-query-success-33205
microsoft-mssql-kv-database-query-success-33205-1
microsoft-mssql-kv-database-query-success-33205-2
microsoft-mssql-xml-database-query-success-30205-2

network-alert
microsoft-atp-cef-alert-trigger-success-sensornetwork
microsoft-atp-cef-alert-trigger-success-workspacedirectory
microsoft-atp-cef-alert-trigger-success-sensorlowmemory
microsoft-atp-cef-alert-trigger-success-sensordirectory
microsoft-atp-cef-alert-trigger-success-sensorcapture

security-alert
microsoft-azureatp-json-alert-trigger-success-passtheticket
microsoft-azureatp-json-alert-trigger-success-netlogonbypasssecurityalert-1
microsoft-azureatp-cef-alert-trigger-success-enumerationsecurityalert
microsoft-azureatp-json-alert-trigger-success-enumerationsecurityalert
microsoft-azureatp-cef-alert-trigger-success-securityalert
microsoft-azureatp-json-alert-trigger-success-remoteexecutionsecurityalert-1
microsoft-azureatp-json-alert-trigger-success-remoteexecutionsecurityalert
microsoft-azureatp-json-alert-trigger-success-netlogonbypasssecurityalert
microsoft-azure-sk4-alert-trigger-success-aatp
microsoft-atp-cef-alert-trigger-success-dnshostname
microsoft-atp-cef-alert-trigger-success-ldapsearch
microsoft-azureatp-json-alert-trigger-success-advancedthreatprotection
microsoft-atp-cef-alert-trigger-success-abnormalprotocol
microsoft-atp-cef-alert-trigger-success-maliciousservicecreation
microsoft-atp-cef-alert-trigger-success-dnssuspiciouscommunication
microsoft-atp-cef-alert-trigger-success-dnsremotecodeexecution
microsoft-atp-cef-alert-trigger-success-goldenticketsizeanomaly
microsoft-atp-cef-alert-trigger-success-encryptiondowngrade
microsoft-atp-cef-alert-trigger-success-goldenticket
microsoft-atp-cef-alert-trigger-success-passthehash
microsoft-atp-cef-alert-trigger-success-retrievedataprotectionbackupkey
microsoft-atp-cef-alert-trigger-success-smbdataexfiltration
microsoft-atp-cef-alert-trigger-success-directoryservicesroguereplication
microsoft-atp-cef-alert-trigger-success-sensitivegroupmembershipchange
microsoft-atp-cef-alert-trigger-success-forgedpac
microsoft-atp-cef-alert-trigger-success-passtheticket
microsoft-atp-cef-alert-trigger-success-remoteexecution
microsoft-atp-cef-alert-trigger-success-directoryservicesreplicatio
microsoft-atp-cef-alert-trigger-success-forgedprincipal
microsoft-atp-cef-alert-trigger-success-ldapbruteforce
microsoft-atp-cef-alert-trigger-success-abnormalvpn
microsoft-atp-cef-alert-trigger-success-goldenticketencryptiondowngrade
microsoft-atp-cef-alert-trigger-success-directoryservicesroguepromotion
T1027.005 - Obfuscated Files or Information: Indicator Removal from Tools
T1059.001 - Command and Scripting Interperter: PowerShell
T1078 - Valid Accounts
T1133 - External Remote Services
T1190 - Exploit Public Fasing Application
T1213 - Data from Information Repositories
  • 65 Rules
  • 29 Models
Data Access database-query
microsoft-mssql-xml-database-query-success-33205-1
microsoft-mssql-kv-database-query-success-33205
microsoft-mssql-xml-database-query-success-33205
microsoft-mssql-kv-database-query-success-33205-1
microsoft-mssql-kv-database-query-success-33205-2
microsoft-mssql-xml-database-query-success-30205-2
T1213 - Data from Information Repositories
  • 19 Rules
  • 11 Models
Next Page -->>

MITRE ATT&CK® Framework for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
External Remote Services

Valid Accounts

Exploit Public Fasing Application

Command and Scripting Interperter

Command and Scripting Interperter: PowerShell

External Remote Services

Valid Accounts

Valid Accounts

Exploitation for Privilege Escalation

Obfuscated Files or Information: Indicator Removal from Tools

Valid Accounts

Obfuscated Files or Information

Data from Information Repositories