Skip to content

Latest commit

 

History

History
22 lines (20 loc) · 58.5 KB

ds_microsoft_microsoft_365.md

File metadata and controls

22 lines (20 loc) · 58.5 KB

Vendor: Microsoft

Product: Microsoft 365

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
554 148 128 19 141
Use-Case Activity Types/Parsers MITRE ATT&CK® TTP Content
Abnormal Authentication & Access app-activity
microsoft-o365-cef-app-file-success-displayname
microsoft-o365-cef-app-file-success-refreshdataset
microsoft-o365-cef-app-file-success-memberadded
microsoft-o365-cef-app-file-success-rolechanged
microsoft-o365-sk4-app-file-success-userupdate
microsoft-o365-cef-app-file-success-restoreuser
microsoft-o365-sk4-app-file-success-viewdashboard
microsoft-o365-cef-app-file-success-deleteuser
microsoft-o365-cef-app-file-success-deletegroup
microsoft-o365-cef-app-file-success-removememberfromgroup
microsoft-o365-cef-app-file-success-fileupload
microsoft-o365-sk4-app-file-success-userdelete
microsoft-o365-sk4-app-file-success-groupunassign
microsoft-o365-cef-app-file-success-foldercreated
microsoft-o365-cef-app-file-success-addownertogroup
microsoft-o365-sk4-app-file-success-groupupdate
microsoft-o365-cef-app-file-success-serviceprincipal
microsoft-o365-cef-app-file-success-modifiedproperties
microsoft-o365-cef-app-file-success-harddelete
microsoft-o365-cef-app-file-success-filemodified
microsoft-o365-cef-app-file-success-filemoved
microsoft-o365-cef-app-file-success-tabadded
microsoft-o365-sk4-app-file-success-group
microsoft-o365-cef-app-file-success-addtogroup
microsoft-o365-cef-app-file-success-addmembertorole
microsoft-o365-cef-app-file-success-movetodeleteditems
microsoft-o365-sk4-app-file-success-groupadd
microsoft-o365-cef-app-file-success-viewdashboard
microsoft-o365-cef-app-file-success-viewreport
microsoft-o365-cef-app-file-success-downloadreport
microsoft-o365-cef-app-file-success-crmdefaultactivity
microsoft-o365-cef-app-file-success-filerenamed
microsoft-o365-cef-app-file-success-channeladded
microsoft-o365-cef-app-file-success-addgroup
microsoft-o365-cef-app-file-success-channeldeleted
microsoft-o365-cef-app-file-success-filesyncuploadedfull
microsoft-o365-sk4-app-file-success-useradd
microsoft-o365-cef-app-file-success-filedeleted
microsoft-o365-sk4-app-file-success-userrestore
microsoft-o365-sk4-app-file-success-deviceupdate
microsoft-o365-cef-app-file-success-adduser
microsoft-o365-cef-app-file-success-groupupload
microsoft-o365-cef-app-file-success-updateuser
microsoft-o365-cef-app-file-success-updatedevice
microsoft-o365-cef-app-file-success-memberremoved
microsoft-o365-cef-app-file-success-tabupdated
microsoft-o365-cef-app-file-success-addapplication
microsoft-o365-csv-file-success-sharepoint
microsoft-o365-json-file-success-workload
microsoft-o365-sk4-app-approleassign
microsoft-o365-sk4-app-file-workload
microsoft-o365-sk4-app-file-setunifiedgroup
microsoft-o365-sk4-app-addowner
microsoft-o365-sk4-app-activity-success-create
microsoft-o365-sk4-app-file-operationworkload
microsoft-o365-sk4-app-file-send
microsoft-o365-sk4-app-file-move
microsoft-o365-sk4-file-app-userkey
microsoft-o365-sk4-app-activity-success-newinboxrule
microsoft-o365-sk4-app-activity-success-movetofolder
microsoft-o365-sk4-app-activity-delivertomailboxandforward
microsoft-o365-sk4-app-activity-success-sentmailbox
microsoft-o365-json-app-activity-success-updateinboxrules
microsoft-o365-sk4-app-activity-success-forwardto
microsoft-o365-sk4-app-activity-success-setinboxrule
microsoft-o365-sk4-app-activity-success-forward
microsoft-o365-cef-app-activity-success-inboxrule
microsoft-o365-cef-app-activity-success-addmailboxpermission
microsoft-o365-sk4-app-activity-success-addedtogroup
microsoft-o365-json-app-activity-success-labelupdated
microsoft-o365-sk4-app-activity-success-softdelete
microsoft-o365-cef-app-activity-list-listcolumnupdated-1
microsoft-o365-cef-app-activity-list-listcolumnupdated
microsoft-o365-cef-app-activity-list-companylinkused
microsoft-o365-cef-app-activity-list-listcreated
microsoft-o365-cef-app-activity-list-updatedlist
microsoft-o365-cef-app-activity-list-filesyncdownloadedpartial

app-login
microsoft-o365-sk4-app-login-success-snowflake
microsoft-o365-json-app-login-success-userloggedin
microsoft-o365-sk4-app-approleassign
microsoft-o365-sk4-app-activity-success-softdelete
microsoft-o365-sk4-app-file-workload
microsoft-o365-sk4-app-file-setunifiedgroup
microsoft-o365-sk4-app-addowner
microsoft-o365-sk4-app-activity-success-create
microsoft-o365-sk4-app-file-operationworkload
microsoft-o365-sk4-app-file-send
microsoft-o365-sk4-app-file-move
microsoft-o365-sk4-app-activity-appactivity
microsoft-o365-sk4-app-activity-auditevent
microsoft-o365-mix-app-login-success-teamssessionstarted
microsoft-o365-kv-app-login-success-userloggedin
microsoft-o365-sk4-app-login-success-loggedin

authentication-failed
microsoft-o365-sk4-alert-trigger-threatmanagement
microsoft-o365-json-alert-trigger-success-threatmgmt

failed-app-login
microsoft-o365-cef-app-login-fail-userloginfailed
microsoft-o365-sk4-app-login-fail-snowflake
microsoft-o365-sk4-app-approleassign
microsoft-o365-sk4-app-file-setunifiedgroup
microsoft-o365-sk4-app-addowner
microsoft-o365-sk4-app-activity-success-softdelete
microsoft-o365-sk4-app-file-send
microsoft-o365-sk4-app-activity-success-create
microsoft-o365-sk4-app-file-workload
microsoft-o365-sk4-app-file-move
microsoft-o365-sk4-app-file-operationworkload
microsoft-o365-sk4-app-login-fail-appdisplayname
microsoft-o365-kv-app-login-fail-workload
T1078 - Valid Accounts
T1133 - External Remote Services
  • 15 Rules
  • 4 Models
Account Manipulation app-activity
microsoft-o365-cef-app-file-success-displayname
microsoft-o365-cef-app-file-success-refreshdataset
microsoft-o365-cef-app-file-success-memberadded
microsoft-o365-cef-app-file-success-rolechanged
microsoft-o365-sk4-app-file-success-userupdate
microsoft-o365-cef-app-file-success-restoreuser
microsoft-o365-sk4-app-file-success-viewdashboard
microsoft-o365-cef-app-file-success-deleteuser
microsoft-o365-cef-app-file-success-deletegroup
microsoft-o365-cef-app-file-success-removememberfromgroup
microsoft-o365-cef-app-file-success-fileupload
microsoft-o365-sk4-app-file-success-userdelete
microsoft-o365-sk4-app-file-success-groupunassign
microsoft-o365-cef-app-file-success-foldercreated
microsoft-o365-cef-app-file-success-addownertogroup
microsoft-o365-sk4-app-file-success-groupupdate
microsoft-o365-cef-app-file-success-serviceprincipal
microsoft-o365-cef-app-file-success-modifiedproperties
microsoft-o365-cef-app-file-success-harddelete
microsoft-o365-cef-app-file-success-filemodified
microsoft-o365-cef-app-file-success-filemoved
microsoft-o365-cef-app-file-success-tabadded
microsoft-o365-sk4-app-file-success-group
microsoft-o365-cef-app-file-success-addtogroup
microsoft-o365-cef-app-file-success-addmembertorole
microsoft-o365-cef-app-file-success-movetodeleteditems
microsoft-o365-sk4-app-file-success-groupadd
microsoft-o365-cef-app-file-success-viewdashboard
microsoft-o365-cef-app-file-success-viewreport
microsoft-o365-cef-app-file-success-downloadreport
microsoft-o365-cef-app-file-success-crmdefaultactivity
microsoft-o365-cef-app-file-success-filerenamed
microsoft-o365-cef-app-file-success-channeladded
microsoft-o365-cef-app-file-success-addgroup
microsoft-o365-cef-app-file-success-channeldeleted
microsoft-o365-cef-app-file-success-filesyncuploadedfull
microsoft-o365-sk4-app-file-success-useradd
microsoft-o365-cef-app-file-success-filedeleted
microsoft-o365-sk4-app-file-success-userrestore
microsoft-o365-sk4-app-file-success-deviceupdate
microsoft-o365-cef-app-file-success-adduser
microsoft-o365-cef-app-file-success-groupupload
microsoft-o365-cef-app-file-success-updateuser
microsoft-o365-cef-app-file-success-updatedevice
microsoft-o365-cef-app-file-success-memberremoved
microsoft-o365-cef-app-file-success-tabupdated
microsoft-o365-cef-app-file-success-addapplication
microsoft-o365-csv-file-success-sharepoint
microsoft-o365-json-file-success-workload
microsoft-o365-sk4-app-approleassign
microsoft-o365-sk4-app-file-workload
microsoft-o365-sk4-app-file-setunifiedgroup
microsoft-o365-sk4-app-addowner
microsoft-o365-sk4-app-activity-success-create
microsoft-o365-sk4-app-file-operationworkload
microsoft-o365-sk4-app-file-send
microsoft-o365-sk4-app-file-move
microsoft-o365-sk4-file-app-userkey
microsoft-o365-sk4-app-activity-success-newinboxrule
microsoft-o365-sk4-app-activity-success-movetofolder
microsoft-o365-sk4-app-activity-delivertomailboxandforward
microsoft-o365-sk4-app-activity-success-sentmailbox
microsoft-o365-json-app-activity-success-updateinboxrules
microsoft-o365-sk4-app-activity-success-forwardto
microsoft-o365-sk4-app-activity-success-setinboxrule
microsoft-o365-sk4-app-activity-success-forward
microsoft-o365-cef-app-activity-success-inboxrule
microsoft-o365-cef-app-activity-success-addmailboxpermission
microsoft-o365-sk4-app-activity-success-addedtogroup
microsoft-o365-json-app-activity-success-labelupdated
microsoft-o365-sk4-app-activity-success-softdelete
microsoft-o365-cef-app-activity-list-listcolumnupdated-1
microsoft-o365-cef-app-activity-list-listcolumnupdated
microsoft-o365-cef-app-activity-list-companylinkused
microsoft-o365-cef-app-activity-list-listcreated
microsoft-o365-cef-app-activity-list-updatedlist
microsoft-o365-cef-app-activity-list-filesyncdownloadedpartial

process-created
microsoft-o365-sk4-process-create-success-processcreated
T1003 - OS Credential Dumping
T1003.003 - T1003.003
T1021.003 - T1021.003
T1059.001 - Command and Scripting Interperter: PowerShell
T1059.003 - T1059.003
T1078 - Valid Accounts
T1098 - Account Manipulation
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions
T1136 - Create Account
T1136.001 - Create Account: Create: Local Account
T1218.010 - Signed Binary Proxy Execution: Regsvr32
T1531 - Account Access Removal
T1559.002 - T1559.002
  • 17 Rules
  • 8 Models
Audit Tampering process-created
microsoft-o365-sk4-process-create-success-processcreated
T1059 - Command and Scripting Interperter
T1070 - Indicator Removal on Host
T1070.001 - Indicator Removal on Host: Clear Windows Event Logs
T1546.003 - T1546.003
T1562 - Impair Defenses
T1562.006 - T1562.006
  • 4 Rules
Cryptomining process-created
microsoft-o365-sk4-process-create-success-processcreated
T1496 - Resource Hijacking
  • 1 Rules
Evasion process-created
microsoft-o365-sk4-process-create-success-processcreated
T1027 - Obfuscated Files or Information
T1027.004 - Obfuscated Files or Information: Compile After Delivery
T1036 - Masquerading
T1036.003 - Masquerading: Rename System Utilities
T1036.005 - Masquerading: Match Legitimate Name or Location
T1059 - Command and Scripting Interperter
T1059.001 - Command and Scripting Interperter: PowerShell
T1059.005 - T1059.005
T1070 - Indicator Removal on Host
T1070.001 - Indicator Removal on Host: Clear Windows Event Logs
T1105 - Ingress Tool Transfer
T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild
T1140 - Deobfuscate/Decode Files or Information
T1197 - BITS Jobs
T1202 - Indirect Command Execution
T1203 - Exploitation for Client Execution
T1218 - Signed Binary Proxy Execution
T1218.002 - Signed Binary Proxy Execution: Control Panel
T1218.004 - Signed Binary Proxy Execution: InstallUtil
T1218.008 - T1218.008
T1218.009 - Signed Binary Proxy Execution: Regsvcs/Regasm
T1218.010 - Signed Binary Proxy Execution: Regsvr32
T1218.011 - Signed Binary Proxy Execution: Rundll32
T1484.001 - T1484.001
T1542.003 - T1542.003
T1543.003 - Create or Modify System Process: Windows Service
T1552.006 - T1552.006
T1562 - Impair Defenses
T1562.001 - T1562.001
T1562.004 - Impair Defenses: Disable or Modify System Firewall
T1562.006 - T1562.006
T1564.004 - Hide Artifacts: NTFS File Attributes
T1574 - Hijack Execution Flow
  • 41 Rules
  • 3 Models
Next Page -->>

MITRE ATT&CK® Framework for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
External Remote Services

Valid Accounts

Exploit Public Fasing Application

Replication Through Removable Media

Phishing

Windows Management Instrumentation

Command and Scripting Interperter

Scheduled Task/Job

Inter-Process Communication

System Services

Exploitation for Client Execution

User Execution

Scheduled Task/Job: Scheduled Task

Command and Scripting Interperter: PowerShell

Scheduled Task/Job: At (Windows)

Pre-OS Boot

Create Account

Create or Modify System Process

External Remote Services

Valid Accounts

Hijack Execution Flow

Server Software Component: Web Shell

Account Manipulation

BITS Jobs

Create or Modify System Process: Windows Service

Scheduled Task/Job

Server Software Component

Event Triggered Execution

Boot or Logon Autostart Execution

Create Account: Create: Local Account

Account Manipulation: Exchange Email Delegate Permissions

Access Token Manipulation: Token Impersonation/Theft

Create or Modify System Process

Valid Accounts

Access Token Manipulation

Exploitation for Privilege Escalation

Hijack Execution Flow

Group Policy Modification

Process Injection

Scheduled Task/Job

Abuse Elevation Control Mechanism

Event Triggered Execution

Boot or Logon Autostart Execution

Process Injection: Dynamic-link Library Injection

Abuse Elevation Control Mechanism: Bypass User Account Control

Hide Artifacts

Indirect Command Execution

Impair Defenses

Indicator Removal on Host: Clear Windows Event Logs

Group Policy Modification

Trusted Developer Utilities Proxy Execution

Masquerading: Match Legitimate Name or Location

Masquerading: Rename System Utilities

File and Directory Permissions Modification: Windows File and Directory Permissions Modification

Obfuscated Files or Information: Compile After Delivery

Obfuscated Files or Information: Indicator Removal from Tools

Hijack Execution Flow: DLL Side-Loading

Indicator Removal on Host: File Deletion

Masquerading

Valid Accounts

Modify Registry

BITS Jobs

Use Alternate Authentication Material

Hide Artifacts: NTFS File Attributes

Indicator Removal on Host

Use Alternate Authentication Material: Pass the Ticket

Pre-OS Boot

File and Directory Permissions Modification

Deobfuscate/Decode Files or Information

Abuse Elevation Control Mechanism

Impair Defenses: Disable or Modify System Firewall

Obfuscated Files or Information

Signed Binary Proxy Execution: Compiled HTML File

Access Token Manipulation

Hijack Execution Flow

Process Injection

Signed Binary Proxy Execution: Msiexec

Signed Binary Proxy Execution

Signed Binary Proxy Execution: Regsvcs/Regasm

Signed Binary Proxy Execution: CMSTP

Signed Binary Proxy Execution: Control Panel

Signed Binary Proxy Execution: InstallUtil

Signed Binary Proxy Execution: Regsvr32

Trusted Developer Utilities Proxy Execution: MSBuild

Signed Binary Proxy Execution: Rundll32

OS Credential Dumping

Unsecured Credentials

Steal or Forge Kerberos Tickets

Credentials from Password Stores

Steal or Forge Kerberos Tickets: Kerberoasting

Network Sniffing

Account Discovery

Domain Trust Discovery

System Service Discovery

System Network Connections Discovery

Account Discovery: Local Account

Account Discovery: Domain Account

File and Directory Discovery

Network Sniffing

System Information Discovery

Network Share Discovery

Query Registry

Process Discovery

System Owner/User Discovery

Software Discovery

Remote System Discovery

System Network Configuration Discovery

Exploitation of Remote Services

Remote Service Session Hijacking

Remote Services

Remote Services: SMB/Windows Admin Shares

Use Alternate Authentication Material

Remote Services: Remote Desktop Protocol

Replication Through Removable Media

Screen Capture

Email Collection

Audio Capture

Archive Collected Data

Email Collection: Email Forwarding Rule

Protocol Tunneling

Application Layer Protocol: DNS

Application Layer Protocol: File Transfer Protocols

Application Layer Protocol: Web Protocols

Remote Access Software

Ingress Tool Transfer

Proxy: Multi-hop Proxy

Application Layer Protocol

Proxy

Exfiltration Over Alternative Protocol

Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted/Obfuscated Non-C2 Protocol

Exfiltration Over Physical Medium: Exfiltration over USB

Exfiltration Over C2 Channel

Exfiltration Over Physical Medium

Automated Exfiltration

Account Access Removal

Data Destruction

Resource Hijacking

Data Encrypted for Impact

Inhibit System Recovery