Rules | Models | MITRE ATT&CK® TTPs | Activity Types | Parsers |
---|---|---|---|---|
77 | 24 | 8 | 3 | 0 |
Use-Case | Activity Types/Parsers | MITRE ATT&CK® TTP | Content |
---|---|---|---|
Cryptomining | network-connection-failed ↳threatblockr-t-kv-network-traffic-packatlog network-connection-successful ↳threatblockr-t-kv-network-traffic-packatlog |
T1496 - Resource Hijacking |
|
Lateral Movement | network-connection-failed ↳threatblockr-t-kv-network-traffic-packatlog network-connection-successful ↳threatblockr-t-kv-network-traffic-packatlog |
T1048 - Exfiltration Over Alternative Protocol T1071 - Application Layer Protocol T1090.003 - Proxy: Multi-hop Proxy T1190 - Exploit Public Fasing Application TA0010 - TA0010 TA0011 - TA0011 |
|
Malware | dns-response ↳threatblockr-t-kv-dns-response-success-dnsresplog network-connection-failed ↳threatblockr-t-kv-network-traffic-packatlog network-connection-successful ↳threatblockr-t-kv-network-traffic-packatlog |
T1071 - Application Layer Protocol T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
Ransomware | network-connection-failed ↳threatblockr-t-kv-network-traffic-packatlog network-connection-successful ↳threatblockr-t-kv-network-traffic-packatlog |
TA0011 - TA0011 |
|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
Exploit Public Fasing Application |
Dynamic Resolution Dynamic Resolution: Domain Generation Algorithms Proxy: Multi-hop Proxy Application Layer Protocol Proxy |
Exfiltration Over Alternative Protocol |
Resource Hijacking |