Skip to content

Latest commit

 

History

History
9 lines (9 loc) · 14.9 KB

2_ds_microsoft_microsoft_sentinel.md

File metadata and controls

9 lines (9 loc) · 14.9 KB
Use-Case Activity Type (Legacy Event Type)/Parsers MITRE ATT&CK® TTP Content
Compromised Credentials scheduled_task-trigger:success (app-activity)
microsoft-sentinel-json-app-acivity-success-usermanagement
microsoft-sentinel-json-app-acivity-success-administrative
microsoft-sentinel-json-app-acivity-success-policy

app-login:success (app-login)
microsoft-sentinel-json-app-login-success-logon

app-login:fail (failed-app-login)
microsoft-sentinel-json-app-login-fail-failedlogon

process-create:success (process-created)
microsoft-sentinel-json-process-create-success-processcreation

alert-trigger:success (security-alert)
microsoft-sentinel-sk4-alert-trigger-success-loganalytics
microsoft-sentinel-sk4-alert-trigger-success-loganalyticscr
T1003 - OS Credential Dumping
T1003.001 - T1003.001
T1003.002 - T1003.002
T1003.003 - T1003.003
T1003.005 - T1003.005
T1016 - System Network Configuration Discovery
T1027 - Obfuscated Files or Information
T1027.005 - Obfuscated Files or Information: Indicator Removal from Tools
T1040 - Network Sniffing
T1078 - Valid Accounts
T1133 - External Remote Services
T1190 - Exploit Public Fasing Application
T1218 - Signed Binary Proxy Execution
T1218.011 - Signed Binary Proxy Execution: Rundll32
T1555 - Credentials from Password Stores
TA0002 - TA0002
  • 95 Rules
  • 38 Models
Data Access scheduled_task-trigger:success (app-activity)
microsoft-sentinel-json-app-acivity-success-usermanagement
microsoft-sentinel-json-app-acivity-success-administrative
microsoft-sentinel-json-app-acivity-success-policy

app-login:success (app-login)
microsoft-sentinel-json-app-login-success-logon

app-login:fail (failed-app-login)
microsoft-sentinel-json-app-login-fail-failedlogon

process-create:success (process-created)
microsoft-sentinel-json-process-create-success-processcreation
T1003 - OS Credential Dumping
T1078 - Valid Accounts
  • 21 Rules
  • 11 Models
Lateral Movement app-login:success (app-login)
microsoft-sentinel-json-app-login-success-logon

app-login:fail (failed-app-login)
microsoft-sentinel-json-app-login-fail-failedlogon

process-create:success (process-created)
microsoft-sentinel-json-process-create-success-processcreation

alert-trigger:success (security-alert)
microsoft-sentinel-sk4-alert-trigger-success-loganalytics
microsoft-sentinel-sk4-alert-trigger-success-loganalyticscr
T1021 - Remote Services
T1021.001 - Remote Services: Remote Desktop Protocol
T1021.003 - T1021.003
T1021.006 - T1021.006
T1027 - Obfuscated Files or Information
T1027.005 - Obfuscated Files or Information: Indicator Removal from Tools
T1047 - Windows Management Instrumentation
T1059 - Command and Scripting Interperter
T1059.001 - Command and Scripting Interperter: PowerShell
T1078 - Valid Accounts
T1090 - Proxy
T1090.003 - Proxy: Multi-hop Proxy
T1210 - Exploitation of Remote Services
T1219 - Remote Access Software
T1563 - Remote Service Session Hijacking
T1563.002 - T1563.002
  • 26 Rules
  • 1 Models
Malware app-login:success (app-login)
microsoft-sentinel-json-app-login-success-logon

process-create:success (process-created)
microsoft-sentinel-json-process-create-success-processcreation

alert-trigger:success (security-alert)
microsoft-sentinel-sk4-alert-trigger-success-loganalytics
microsoft-sentinel-sk4-alert-trigger-success-loganalyticscr
T1003 - OS Credential Dumping
T1003.002 - T1003.002
T1012 - Query Registry
T1021 - Remote Services
T1021.002 - Remote Services: SMB/Windows Admin Shares
T1027 - Obfuscated Files or Information
T1027.004 - Obfuscated Files or Information: Compile After Delivery
T1036 - Masquerading
T1036.004 - T1036.004
T1047 - Windows Management Instrumentation
T1053 - Scheduled Task/Job
T1053.003 - T1053.003
T1053.005 - Scheduled Task/Job: Scheduled Task
T1055 - Process Injection
T1055.001 - Process Injection: Dynamic-link Library Injection
T1059 - Command and Scripting Interperter
T1059.001 - Command and Scripting Interperter: PowerShell
T1059.003 - T1059.003
T1059.005 - T1059.005
T1059.007 - T1059.007
T1078 - Valid Accounts
T1083 - File and Directory Discovery
T1105 - Ingress Tool Transfer
T1112 - Modify Registry
T1113 - Screen Capture
T1123 - Audio Capture
T1127 - Trusted Developer Utilities Proxy Execution
T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild
T1134 - Access Token Manipulation
T1134.001 - Access Token Manipulation: Token Impersonation/Theft
T1134.002 - T1134.002
T1135 - Network Share Discovery
T1190 - Exploit Public Fasing Application
T1197 - BITS Jobs
T1202 - Indirect Command Execution
T1203 - Exploitation for Client Execution
T1204 - User Execution
T1204.002 - T1204.002
T1210 - Exploitation of Remote Services
T1218 - Signed Binary Proxy Execution
T1218.001 - Signed Binary Proxy Execution: Compiled HTML File
T1218.002 - Signed Binary Proxy Execution: Control Panel
T1218.004 - Signed Binary Proxy Execution: InstallUtil
T1218.005 - T1218.005
T1218.007 - Signed Binary Proxy Execution: Msiexec
T1218.008 - T1218.008
T1218.010 - Signed Binary Proxy Execution: Regsvr32
T1218.011 - Signed Binary Proxy Execution: Rundll32
T1482 - Domain Trust Discovery
T1490 - Inhibit System Recovery
T1505 - Server Software Component
T1505.003 - Server Software Component: Web Shell
T1543 - Create or Modify System Process
T1543.003 - Create or Modify System Process: Windows Service
T1546 - Event Triggered Execution
T1546.001 - T1546.001
T1546.003 - T1546.003
T1546.011 - T1546.011
T1547 - Boot or Logon Autostart Execution
T1547.001 - T1547.001
T1547.002 - T1547.002
T1550 - Use Alternate Authentication Material
T1550.003 - Use Alternate Authentication Material: Pass the Ticket
T1555 - Credentials from Password Stores
T1558 - Steal or Forge Kerberos Tickets
T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting
T1562 - Impair Defenses
T1562.004 - Impair Defenses: Disable or Modify System Firewall
T1563 - Remote Service Session Hijacking
T1563.002 - T1563.002
T1569 - System Services
T1574 - Hijack Execution Flow
T1574.002 - Hijack Execution Flow: DLL Side-Loading
T1574.010 - T1574.010
T1574.011 - T1574.011
TA0002 - TA0002
  • 166 Rules
  • 26 Models
Privilege Abuse scheduled_task-trigger:success (app-activity)
microsoft-sentinel-json-app-acivity-success-usermanagement
microsoft-sentinel-json-app-acivity-success-administrative
microsoft-sentinel-json-app-acivity-success-policy

app-login:success (app-login)
microsoft-sentinel-json-app-login-success-logon

app-login:fail (failed-app-login)
microsoft-sentinel-json-app-login-fail-failedlogon

group-member-add:success (member-added)
microsoft-sentinel-json-group-member-add-success-addmembertogroup

process-create:success (process-created)
microsoft-sentinel-json-process-create-success-processcreation
T1047 - Windows Management Instrumentation
T1078 - Valid Accounts
T1098 - Account Manipulation
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions
T1136 - Create Account
T1136.001 - Create Account: Create: Local Account
  • 40 Rules
  • 20 Models
Privilege Escalation scheduled_task-trigger:success (app-activity)
microsoft-sentinel-json-app-acivity-success-usermanagement
microsoft-sentinel-json-app-acivity-success-administrative
microsoft-sentinel-json-app-acivity-success-policy

process-create:success (process-created)
microsoft-sentinel-json-process-create-success-processcreation
T1003 - OS Credential Dumping
T1007 - System Service Discovery
T1012 - Query Registry
T1016 - System Network Configuration Discovery
T1018 - Remote System Discovery
T1027 - Obfuscated Files or Information
T1027.004 - Obfuscated Files or Information: Compile After Delivery
T1033 - System Owner/User Discovery
T1036 - Masquerading
T1036.004 - T1036.004
T1047 - Windows Management Instrumentation
T1049 - System Network Connections Discovery
T1053 - Scheduled Task/Job
T1053.002 - Scheduled Task/Job: At (Windows)
T1053.005 - Scheduled Task/Job: Scheduled Task
T1057 - Process Discovery
T1059 - Command and Scripting Interperter
T1059.001 - Command and Scripting Interperter: PowerShell
T1059.003 - T1059.003
T1068 - Exploitation for Privilege Escalation
T1082 - System Information Discovery
T1087 - Account Discovery
T1087.001 - Account Discovery: Local Account
T1087.002 - Account Discovery: Domain Account
T1098 - Account Manipulation
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions
T1127 - Trusted Developer Utilities Proxy Execution
T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild
T1134 - Access Token Manipulation
T1134.001 - Access Token Manipulation: Token Impersonation/Theft
T1134.002 - T1134.002
T1135 - Network Share Discovery
T1218 - Signed Binary Proxy Execution
T1218.002 - Signed Binary Proxy Execution: Control Panel
T1218.003 - Signed Binary Proxy Execution: CMSTP
T1218.010 - Signed Binary Proxy Execution: Regsvr32
T1218.011 - Signed Binary Proxy Execution: Rundll32
T1222 - File and Directory Permissions Modification
T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification
T1482 - Domain Trust Discovery
T1484 - Group Policy Modification
T1484.001 - T1484.001
T1518 - Software Discovery
T1518.001 - T1518.001
T1543 - Create or Modify System Process
T1543.003 - Create or Modify System Process: Windows Service
T1547 - Boot or Logon Autostart Execution
T1547.002 - T1547.002
T1548 - Abuse Elevation Control Mechanism
T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control
T1552 - Unsecured Credentials
T1552.006 - T1552.006
T1558 - Steal or Forge Kerberos Tickets
T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting
T1574 - Hijack Execution Flow
T1574.002 - Hijack Execution Flow: DLL Side-Loading
T1574.011 - T1574.011
  • 47 Rules
  • 7 Models
Privileged Activity scheduled_task-trigger:success (app-activity)
microsoft-sentinel-json-app-acivity-success-usermanagement
microsoft-sentinel-json-app-acivity-success-administrative
microsoft-sentinel-json-app-acivity-success-policy

app-login:success (app-login)
microsoft-sentinel-json-app-login-success-logon

app-login:fail (failed-app-login)
microsoft-sentinel-json-app-login-fail-failedlogon

process-create:success (process-created)
microsoft-sentinel-json-process-create-success-processcreation

alert-trigger:success (security-alert)
microsoft-sentinel-sk4-alert-trigger-success-loganalytics
microsoft-sentinel-sk4-alert-trigger-success-loganalyticscr
T1068 - Exploitation for Privilege Escalation
T1078 - Valid Accounts
T1482 - Domain Trust Discovery
  • 4 Rules
  • 1 Models