Skip to content

Latest commit

 

History

History
22 lines (20 loc) · 7.11 KB

ds_leap_leap.md

File metadata and controls

22 lines (20 loc) · 7.11 KB

Vendor: LEAP

Product: LEAP

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
61 26 9 2 6
Use-Case Activity Types (Legacy Event Type)/Parsers MITRE ATT&CK® TTP Content
Abnormal Authentication & Access scheduled_task-trigger:success (app-activity)
leap-l-csv-app-activity-success-tuaccess
leap-l-str-app-activity-success-leapaccess
leap-l-csv-app-activity-success-tuaudit
leap-l-csv-app-activity-success-leapaudit
leap-l-csv-app-activity-success-leapaccess
leap-l-str-app-activity-success-leapshk
leap-l-str-app-activity-success-leapaudit

app-login:success (app-login)
leap-l-csv-app-activity-success-tuaccess
leap-l-str-app-activity-success-leapaccess
T1078 - Valid Accounts
T1133 - External Remote Services
  • 12 Rules
  • 4 Models
Account Manipulation scheduled_task-trigger:success (app-activity)
leap-l-csv-app-activity-success-tuaccess
leap-l-str-app-activity-success-leapaccess
leap-l-csv-app-activity-success-tuaudit
leap-l-csv-app-activity-success-leapaudit
leap-l-csv-app-activity-success-leapaccess
leap-l-str-app-activity-success-leapshk
leap-l-str-app-activity-success-leapaudit
T1098 - Account Manipulation
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions
  • 3 Rules
  • 1 Models
Lateral Movement app-login:success (app-login)
leap-l-csv-app-activity-success-tuaccess
leap-l-str-app-activity-success-leapaccess
T1090 - Proxy
T1090.003 - Proxy: Multi-hop Proxy
  • 1 Rules
Malware app-login:success (app-login)
leap-l-csv-app-activity-success-tuaccess
leap-l-str-app-activity-success-leapaccess
T1078 - Valid Accounts
  • 1 Rules
Ransomware app-login:success (app-login)
leap-l-csv-app-activity-success-tuaccess
leap-l-str-app-activity-success-leapaccess
T1078 - Valid Accounts
  • 1 Rules
Next Page -->>

MITRE ATT&CK® Framework for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
External Remote Services

Valid Accounts

Exploit Public Fasing Application

External Remote Services

Valid Accounts

Account Manipulation

Account Manipulation: Exchange Email Delegate Permissions

Valid Accounts

Valid Accounts

Email Collection

Email Collection: Email Forwarding Rule

Proxy: Multi-hop Proxy

Proxy