Rules | Models | MITRE ATT&CK® TTPs | Activity Types | Parsers |
---|---|---|---|---|
61 | 26 | 9 | 2 | 0 |
Use-Case | Activity Types (Legacy Event Type)/Parsers | MITRE ATT&CK® TTP | Content |
---|---|---|---|
Abnormal Authentication & Access | app-activity:success (app-activity) ↳emp-e-str-app-icall app-login:success (app-login) ↳emp-e-str-app-icall |
T1078 - Valid Accounts T1133 - External Remote Services |
|
Account Manipulation | app-activity:success (app-activity) ↳emp-e-str-app-icall |
T1098 - Account Manipulation T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Compromised Credentials | app-activity:success (app-activity) ↳emp-e-str-app-icall app-login:success (app-login) ↳emp-e-str-app-icall |
T1078 - Valid Accounts T1133 - External Remote Services T1190 - Exploit Public Fasing Application |
|
Data Access | app-activity:success (app-activity) ↳emp-e-str-app-icall app-login:success (app-login) ↳emp-e-str-app-icall |
T1078 - Valid Accounts |
|
Data Leak | app-activity:success (app-activity) ↳emp-e-str-app-icall |
T1114 - Email Collection T1114.003 - Email Collection: Email Forwarding Rule |
|
Lateral Movement | app-login:success (app-login) ↳emp-e-str-app-icall |
T1090 - Proxy T1090.003 - Proxy: Multi-hop Proxy |
|
Malware | app-login:success (app-login) ↳emp-e-str-app-icall |
T1078 - Valid Accounts |
|
Privilege Abuse | app-activity:success (app-activity) ↳emp-e-str-app-icall app-login:success (app-login) ↳emp-e-str-app-icall |
T1078 - Valid Accounts T1098 - Account Manipulation T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Privilege Escalation | app-activity:success (app-activity) ↳emp-e-str-app-icall |
T1098 - Account Manipulation T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Privileged Activity | app-activity:success (app-activity) ↳emp-e-str-app-icall app-login:success (app-login) ↳emp-e-str-app-icall |
T1078 - Valid Accounts |
|
Ransomware | app-login:success (app-login) ↳emp-e-str-app-icall |
T1078 - Valid Accounts |
|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
External Remote Services Valid Accounts Exploit Public Fasing Application |
External Remote Services Valid Accounts Account Manipulation Account Manipulation: Exchange Email Delegate Permissions |
Valid Accounts |
Valid Accounts |
Email Collection Email Collection: Email Forwarding Rule |
Proxy: Multi-hop Proxy Proxy |