Rules | Models | MITRE ATT&CK® TTPs | Activity Types | Parsers |
---|---|---|---|---|
138 | 78 | 29 | 78 | 24 |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
External Remote Services Valid Accounts Valid Accounts: Cloud Accounts Exploit Public Fasing Application |
User Execution |
Boot or Logon Initialization Scripts External Remote Services Valid Accounts Account Manipulation Account Manipulation: Exchange Email Delegate Permissions |
Boot or Logon Initialization Scripts Valid Accounts |
Valid Accounts Unused/Unsupported Cloud Regions |
Account Discovery |
Screen Capture Data from Information Repositories Email Collection Data from Cloud Storage Object Data Staged Email Collection: Email Forwarding Rule |
Proxy: Multi-hop Proxy Proxy |
Resource Hijacking |