Skip to content

Latest commit

 

History

History
17 lines (15 loc) · 1.7 KB

r_m_darktrace_darktrace_Malware.md

File metadata and controls

17 lines (15 loc) · 1.7 KB

Rules by Product and UseCase

Vendor: Darktrace

Product: Darktrace

Use-Case: Malware

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
6 2 3 4 1
Event Type Rules Models
app-login T1078 - Valid Accounts
Auth-Blacklist-Shost: User authentication or login from a known blacklisted IP
dlp-email-alert-in T1190 - Exploit Public Fasing Application
DLP-Log4j-String-2: There was an attempt via email message to exploit the CVE-2021-44228 vulnerability using known keywords.
dlp-email-alert-out T1190 - Exploit Public Fasing Application
DLP-Log4j-String-2: There was an attempt via email message to exploit the CVE-2021-44228 vulnerability using known keywords.
security-alert TA0002 - TA0002
DEF-TEMP-DIRECTORY-F: First time process has been executed from a temporary directory by this user
DEF-TEMP-DIRECTORY-A: Abnormal process has been executed from a temporary directory by this user
A-EPA-TEMP-DIRECTORY-F: First execution of this process from a temporary directory on this asset
A-EPA-TEMP-DIRECTORY-A: Abnormal execution of this process from a temporary directory
A-EPA-UP-TEMP: Processes executed from TEMP directories on this asset
AE-UP-TEMP: Process executable TEMP directories for this user during a session