Rules | Models | MITRE ATT&CK® TTPs | Activity Types | Parsers |
---|---|---|---|---|
75 | 24 | 7 | 2 | 0 |
Use-Case | Activity Types/Parsers | MITRE ATT&CK® TTP | Content |
---|---|---|---|
Cryptomining | network-connection-failed ↳vmware-nsxfw-cef-network-traffic-success-nsxfw network-connection-successful ↳vmware-nsxfw-cef-network-traffic-success-nsxfw |
T1496 - Resource Hijacking |
|
Lateral Movement | network-connection-failed ↳vmware-nsxfw-cef-network-traffic-success-nsxfw network-connection-successful ↳vmware-nsxfw-cef-network-traffic-success-nsxfw |
T1048 - Exfiltration Over Alternative Protocol T1071 - Application Layer Protocol T1090.003 - Proxy: Multi-hop Proxy T1190 - Exploit Public Fasing Application TA0010 - TA0010 TA0011 - TA0011 |
|
Malware | network-connection-failed ↳vmware-nsxfw-cef-network-traffic-success-nsxfw network-connection-successful ↳vmware-nsxfw-cef-network-traffic-success-nsxfw |
TA0011 - TA0011 |
|
Ransomware | network-connection-failed ↳vmware-nsxfw-cef-network-traffic-success-nsxfw network-connection-successful ↳vmware-nsxfw-cef-network-traffic-success-nsxfw |
TA0011 - TA0011 |
|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
Exploit Public Fasing Application |
Proxy: Multi-hop Proxy Application Layer Protocol Proxy |
Exfiltration Over Alternative Protocol |
Resource Hijacking |