Rules | Models | MITRE TTPs | Event Types | Parsers |
---|---|---|---|---|
148 | 69 | 21 | 7 | 7 |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
External Remote Services Valid Accounts |
User Execution |
External Remote Services Valid Accounts Account Manipulation Account Manipulation: Exchange Email Delegate Permissions |
Valid Accounts Process Injection |
Valid Accounts Obfuscated Files or Information Process Injection Signed Binary Proxy Execution Signed Binary Proxy Execution: Rundll32 |
OS Credential Dumping |
Account Discovery File and Directory Discovery |
Remote Services Remote Services: SMB/Windows Admin Shares |
Data from Information Repositories Email Collection Email Collection: Email Forwarding Rule |
Proxy: Multi-hop Proxy Application Layer Protocol Proxy |
Exfiltration Over Alternative Protocol Automated Exfiltration |
Data Encrypted for Impact |