Rules | Models | MITRE TTPs | Event Types | Parsers |
---|---|---|---|---|
74 | 25 | 11 | 3 | 3 |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
Phishing: Spearphishing Link Drive-by Compromise Phishing |
User Execution |
Web Service Application Layer Protocol: DNS Application Layer Protocol: Web Protocols Dynamic Resolution Dynamic Resolution: Domain Generation Algorithms Proxy: Multi-hop Proxy Application Layer Protocol Proxy |
Data Transfer Size Limits Exfiltration Over Web Service: Exfiltration to Cloud Storage Exfiltration Over Web Service |
Resource Hijacking |