Vendor: Sophos Product: Sophos Endpoint Protection Rules Models MITRE ATT&CK® TTPs Activity Types Parsers 162 65 31 10 36 Use-Case Activity Types (Legacy Event Type)/Parsers MITRE ATT&CK® TTP Content Abnormal Authentication & Access http-session:fail (web-activity-denied) ↳sophos-ep-json-http-session-fail-endpoint T1071 - Application Layer ProtocolT1071.001 - Application Layer Protocol: Web Protocols 3 Rules3 Models Compromised Credentials alert-trigger:success (network-alert) ↳sophos-ep-kv-alert-trigger-success-devicecontrol alert-trigger:success (security-alert) ↳sophos-ep-xml-alert-trigger-success-antivirus ↳sophos-ep-json-alert-trigger-success-webcontrolviolation ↳sophos-ep-leef-alert-trigger-success-spyware ↳sophos-ep-sk4-alert-trigger-success-userauthorised ↳sophos-ep-cef-alert-trigger-success-applicationcontrol ↳sophos-ep-leef-alert-trigger-success-enterpriseconsole ↳sophos-ep-json-alert-trigger-success-applicationblocked ↳sophos-ep-cef-alert-trigger-success-corepuadetected ↳sophos-ep-sk4-alert-trigger-success-userblocked ↳sophos-ep-kv-alert-trigger-success-virus ↳sophos-ep-kv-alert-trigger-success-alerttriggerd ↳sophos-ep-json-alert-trigger-success-datalosspreventionuserblocked ↳sophos-ep-json-alert-trigger-success-datalosspreventionuserallowed ↳sophos-ep-kv-alert-trigger-success-alertdetected ↳sophos-ep-kv-alert-trigger-success-variablebindings ↳sophos-invincea-kv-alert-trigger-success-invincea ↳sophos-invincea-leef-alert-trigger-success-kiwisyslogserver ↳sophos-ep-cef-alert-trigger-success-coredetection ↳sophos-ep-cef-alert-trigger-success-corecleanfailed ↳sophos-ep-cef-alert-trigger-success-endpointfirewall ↳sophos-ep-cef-alert-trigger-success-corepuacleanfailed ↳sophos-ep-cef-alert-trigger-success-hmpaexploitprevented ↳sophos-ep-cef-alert-trigger-success-webfilteringblocked ↳sophos-ep-cef-alert-trigger-success-hmpabehaviourprevented ↳sophos-ep-cef-alert-trigger-success-applicationcontrol-1 ↳sophos-ep-kv-alert-trigger-success-728 http-session:fail (web-activity-denied) ↳sophos-ep-json-http-session-fail-endpoint T1027 - Obfuscated Files or InformationT1027.005 - Obfuscated Files or Information: Indicator Removal from ToolsT1071 - Application Layer ProtocolT1071.001 - Application Layer Protocol: Web ProtocolsT1078 - Valid AccountsT1102 - Web ServiceT1133 - External Remote ServicesT1189 - Drive-by CompromiseT1190 - Exploit Public Fasing ApplicationT1204 - User ExecutionT1204.001 - T1204.001T1566 - PhishingT1566.002 - Phishing: Spearphishing LinkT1568 - Dynamic ResolutionT1568.002 - Dynamic Resolution: Domain Generation Algorithms 66 Rules31 Models Cryptomining http-session:fail (web-activity-denied) ↳sophos-ep-json-http-session-fail-endpoint T1071 - Application Layer ProtocolT1071.001 - Application Layer Protocol: Web ProtocolsT1496 - Resource Hijacking 1 Rules Phishing http-session:fail (web-activity-denied) ↳sophos-ep-json-http-session-fail-endpoint T1189 - Drive-by CompromiseT1204 - User ExecutionT1204.001 - T1204.001T1534 - Internal SpearphishingT1566 - PhishingT1566.002 - Phishing: Spearphishing LinkT1598 - T1598T1598.003 - T1598.003 3 Rules Ransomware http-session:fail (web-activity-denied) ↳sophos-ep-json-http-session-fail-endpoint T1071 - Application Layer ProtocolT1071.001 - Application Layer Protocol: Web Protocols 1 Rules Next Page -->> MITRE ATT&CK® Framework for Enterprise Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact Phishing: Spearphishing LinkExternal Remote ServicesValid AccountsDrive-by CompromiseExploit Public Fasing ApplicationReplication Through Removable MediaPhishing User Execution External Remote ServicesValid Accounts Valid AccountsExploitation for Privilege Escalation Obfuscated Files or Information: Indicator Removal from ToolsValid AccountsObfuscated Files or Information Replication Through Removable MediaInternal Spearphishing Web ServiceApplication Layer Protocol: Web ProtocolsDynamic ResolutionDynamic Resolution: Domain Generation AlgorithmsProxy: Multi-hop ProxyApplication Layer ProtocolProxy Exfiltration Over Physical Medium: Exfiltration over USBExfiltration Over Physical MediumAutomated ExfiltrationExfiltration Over Web Service: Exfiltration to Cloud StorageExfiltration Over Web Service Resource Hijacking