Skip to content

Latest commit

 

History

History
21 lines (19 loc) · 9.65 KB

ds_vmware_vmware_view.md

File metadata and controls

21 lines (19 loc) · 9.65 KB

Vendor: VMware

Product: VMware View

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
130 54 22 5 2
Use-Case Activity Types(Legacy Event Type)/Parsers MITRE ATT&CK® TTP Content
Abnormal Authentication & Access user-password-modify:success(account-password-change)
vmware-view-kv-user-password-modify-success-pwdchanged

app-activity:success(app-activity)
vmware-view-kv-app-activity-success-desktopid

app-login:success(app-login)
vmware-view-str-app-login-success-viewuser
vmware-view-kv-app-login-success-viewuserloggedin

app-login:fail(failed-app-login)
vmware-view-kv-app-login-fail-viewuserauthfailed

ssh-traffic:success(remote-logon)
vmware-view-kv-endpoint-login-success-agentconnected
vmware-view-str-endpoint-login-fail-viewuser
T1021 - Remote Services
T1078 - Valid Accounts
T1078.002 - T1078.002
T1078.003 - Valid Accounts: Local Accounts
T1133 - External Remote Services
  • 35 Rules
  • 14 Models
Account Manipulation user-password-modify:success(account-password-change)
vmware-view-kv-user-password-modify-success-pwdchanged

app-activity:success(app-activity)
vmware-view-kv-app-activity-success-desktopid
T1098 - Account Manipulation
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions
  • 4 Rules
  • 1 Models
Data Leak app-activity:success(app-activity)
vmware-view-kv-app-activity-success-desktopid
T1114 - Email Collection
T1114.003 - Email Collection: Email Forwarding Rule
  • 3 Rules
Privilege Escalation app-activity:success(app-activity)
vmware-view-kv-app-activity-success-desktopid

ssh-traffic:success(remote-logon)
vmware-view-kv-endpoint-login-success-agentconnected
vmware-view-str-endpoint-login-fail-viewuser
T1078 - Valid Accounts
T1098 - Account Manipulation
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions
T1555 - Credentials from Password Stores
T1555.005 - T1555.005
  • 5 Rules
  • 2 Models
Next Page -->>

MITRE ATT&CK® Framework for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
External Remote Services

Valid Accounts

Exploit Public Fasing Application

External Remote Services

Valid Accounts

Account Manipulation

Account Manipulation: Exchange Email Delegate Permissions

Valid Accounts

Exploitation for Privilege Escalation

Valid Accounts

Use Alternate Authentication Material

Use Alternate Authentication Material: Pass the Hash

Use Alternate Authentication Material: Pass the Ticket

Valid Accounts: Local Accounts

Steal or Forge Kerberos Tickets

Credentials from Password Stores

Steal or Forge Kerberos Tickets: Kerberoasting

Remote System Discovery

Remote Services

Use Alternate Authentication Material

Email Collection

Email Collection: Email Forwarding Rule

Proxy: Multi-hop Proxy

Proxy