Skip to content

Latest commit

 

History

History
19 lines (17 loc) · 8.32 KB

ds_cisco_cisco_umbrella.md

File metadata and controls

19 lines (17 loc) · 8.32 KB

Vendor: Cisco

Product: Cisco Umbrella

Rules Models MITRE TTPs Event Types Parsers
74 25 11 3 3
Use-Case Event Types/Parsers MITRE TTP Content
Abnormal Authentication & Access dns-query
cisco-umbrella-intelligent-proxy

dns-response
s-opendns-dns-response
q-cisco-dns-response
cisco-dns-response-1
cef-cisco-dns-response-1
cef-cisco-dns-response-sk4
cef-cisco-dns-response
s-opendns-dns-response-7
s-opendns-dns-response-6
s-opendns-dns-response-5
s-opendns-dns-response-4
cl-cisco-dns-response-sk4-4
s-opendns-dns-response-3
s-opendns-dns-response-2
s-opendns-dns-response-1
cef-cisco-dns-response-sk4-2
cef-cisco-dns-response-sk4-3
cef-cisco-dns-response-sk4-4
s-opendns-dns-response-10
s-opendns-dns-response-9
s-opendns-dns-response-8

web-activity-allowed
cisco-umbrella-intelligent-proxy
T1071.001 - Application Layer Protocol: Web Protocols
  • 6 Rules
  • 6 Models
Compromised Credentials dns-query
cisco-umbrella-intelligent-proxy

dns-response
s-opendns-dns-response
q-cisco-dns-response
cisco-dns-response-1
cef-cisco-dns-response-1
cef-cisco-dns-response-sk4
cef-cisco-dns-response
s-opendns-dns-response-7
s-opendns-dns-response-6
s-opendns-dns-response-5
s-opendns-dns-response-4
cl-cisco-dns-response-sk4-4
s-opendns-dns-response-3
s-opendns-dns-response-2
s-opendns-dns-response-1
cef-cisco-dns-response-sk4-2
cef-cisco-dns-response-sk4-3
cef-cisco-dns-response-sk4-4
s-opendns-dns-response-10
s-opendns-dns-response-9
s-opendns-dns-response-8

web-activity-allowed
cisco-umbrella-intelligent-proxy
T1071.001 - Application Layer Protocol: Web Protocols
T1102 - Web Service
T1189 - Drive-by Compromise
T1204.001 - T1204.001
T1566.002 - Phishing: Spearphishing Link
T1568.002 - Dynamic Resolution: Domain Generation Algorithms
  • 33 Rules
  • 15 Models
Next Page -->>

ATT&CK Matrix for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
Phishing: Spearphishing Link

Drive-by Compromise

Phishing

User Execution

Web Service

Application Layer Protocol: DNS

Application Layer Protocol: Web Protocols

Dynamic Resolution

Dynamic Resolution: Domain Generation Algorithms

Proxy: Multi-hop Proxy

Application Layer Protocol

Proxy

Data Transfer Size Limits

Exfiltration Over Web Service: Exfiltration to Cloud Storage

Exfiltration Over Web Service

Resource Hijacking