Skip to content

Latest commit

 

History

History
22 lines (20 loc) · 6.93 KB

ds_vmware_vmware_airwatch.md

File metadata and controls

22 lines (20 loc) · 6.93 KB

Vendor: VMware

Product: VMware AirWatch

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
51 16 9 3 1
Use-Case Activity Types(Legacy Event Type)/Parsers MITRE ATT&CK® TTP Content
Abnormal Authentication & Access vpn-login:fail(authentication-failed)
vmware-airwatch-kv-endpoint-login-fail-loginfailed

vpn-login:success(authentication-successful)
vmware-airwatch-kv-endpoint-login-success-adminuserlogin
vmware-airwatch-kv-endpoint-login-success-adminuserloggedin
T1078 - Valid Accounts
T1133 - External Remote Services
  • 14 Rules
  • 4 Models
Compromised Credentials vpn-login:success(authentication-successful)
vmware-airwatch-kv-endpoint-login-success-adminuserlogin
vmware-airwatch-kv-endpoint-login-success-adminuserloggedin

alert-trigger:success(security-alert)
vmware-airwatch-kv-alert-trigger-success-airwatch
T1027 - Obfuscated Files or Information
T1027.005 - Obfuscated Files or Information: Indicator Removal from Tools
T1078 - Valid Accounts
T1133 - External Remote Services
T1190 - Exploit Public Fasing Application
  • 30 Rules
  • 13 Models
Malware vpn-login:success(authentication-successful)
vmware-airwatch-kv-endpoint-login-success-adminuserlogin
vmware-airwatch-kv-endpoint-login-success-adminuserloggedin

alert-trigger:success(security-alert)
vmware-airwatch-kv-alert-trigger-success-airwatch
T1078 - Valid Accounts
TA0002 - TA0002
  • 5 Rules
  • 2 Models
Privileged Activity alert-trigger:success(security-alert)
vmware-airwatch-kv-alert-trigger-success-airwatch
T1068 - Exploitation for Privilege Escalation
  • 1 Rules
Ransomware vpn-login:fail(authentication-failed)
vmware-airwatch-kv-endpoint-login-fail-loginfailed

vpn-login:success(authentication-successful)
vmware-airwatch-kv-endpoint-login-success-adminuserlogin
vmware-airwatch-kv-endpoint-login-success-adminuserloggedin
T1078 - Valid Accounts
  • 1 Rules
Next Page -->>

MITRE ATT&CK® Framework for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
External Remote Services

Valid Accounts

Exploit Public Fasing Application

External Remote Services

Valid Accounts

Valid Accounts

Exploitation for Privilege Escalation

Obfuscated Files or Information: Indicator Removal from Tools

Valid Accounts

Obfuscated Files or Information

Proxy: Multi-hop Proxy

Proxy