Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Symmetry Access Control |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
APC |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ASUPIM |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Load Balancer |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Absolute SIEM Connector |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Kiteworks |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
AirWatch |
|
T1078 - Valid Accounts T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Web Application Firewall |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Akamai Siem |
|
T1078 - Valid Accounts |
|
Cloud Akamai |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Alert Logic |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
AWS Bastion |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
AWS CloudTrail |
|
T1078 - Valid Accounts TA0011 - TA0011 |
|
AWS CloudWatch |
|
TA0002 - TA0002 |
|
AWS GuardDuty |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
AWS Redshift |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Apache |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
Apache Guacamole |
|
T1078 - Valid Accounts |
|
Cassandra |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
AppSense Application Manager |
|
T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
macOS |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Arbor |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Armis |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
AssetView |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Atlassian BitBucket |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BOTsink |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Auth0 |
|
T1078 - Valid Accounts T1210 - Exploitation of Remote Services TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Avaya Ethernet Routing Switch |
|
T1078 - Valid Accounts |
|
Avaya VPN |
|
T1071 - Application Layer Protocol T1078 - Valid Accounts T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Axway SFTP |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BIND |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Barracuda Firewall |
|
T1078 - Valid Accounts TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BeyondTrust PasswordSafe |
|
TA0002 - TA0002 |
|
BeyondTrust PowerBroker |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
BeyondTrust Privilege Management |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071 - Application Layer Protocol T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
BeyondTrust Privileged Identity |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
BeyondTrust Secure Remote Access |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
GravityZone |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1189 - Drive-by Compromise T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.001 - T1204.001 T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Bitglass CASB |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BlackBerry Protect |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BlueCat Networks Adonis |
|
TA0002 - TA0002 |
|
BlueCat Networks DHCP |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Box Cloud Content Management |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Bromium Secure Platform |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
CA Privileged Access Manager Server Control |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
CDS |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cato Cloud |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1210 - Exploitation of Remote Services T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Centrify Audit and Monitoring Service |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Centrify Authentication Service |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Centrify Infrastructure Services |
|
T1210 - Exploitation of Remote Services |
|
Centrify Zero Trust Privilege Services |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Adaptive Threat Intelligence |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Endpoint Security |
|
TA0002 - TA0002 |
|
Identity Awareness |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
NGFW |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 TA0011 - TA0011 |
|
Security Gateway |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
Security Gateway Virtual Edition (vSEC) |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Threat Prevention |
|
TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cimtrak |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ACI |
|
T1078 - Valid Accounts |
|
AnyConnect |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Cisco |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Cisco ACS |
|
T1078 - Valid Accounts |
|
Cisco ADC |
|
TA0002 - TA0002 |
|
Cisco Adaptive Security Appliance |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1189 - Drive-by Compromise T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.001 - T1204.001 T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Cisco Advance Malware Protection (AMP) |
|
TA0002 - TA0002 |
|
Cisco Airespace |
|
TA0002 - TA0002 |
|
Cisco Call Manager |
|
T1078 - Valid Accounts |
|
Cisco Cloud Web Security |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Cisco CloudLock |
|
TA0002 - TA0002 |
|
Cisco Console |
|
T1078 - Valid Accounts |
|
Cisco Firepower |
|
T1071 - Application Layer Protocol T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 TA0002 - TA0002 TA0011 - TA0011 |
|
Cisco ISE |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Cisco Meraki MX appliances |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 TA0011 - TA0011 |
|
Cisco NPE |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Cisco Netflow |
|
TA0011 - TA0011 |
|
Cisco Secure Endpoint |
|
TA0002 - TA0002 |
|
Cisco Secure Web Appliance |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Cisco TACACS |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Cisco Umbrella |
|
T1071 - Application Layer Protocol T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 |
|
Duo Access Security |
|
T1078 - Valid Accounts T1210 - Exploitation of Remote Services |
|
IronPort Email |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
IronPort Web Security |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Proxy Umbrella |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Citrix AppFW |
|
TA0011 - TA0011 |
|
Citrix Endpoint Management |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Citrix Netscaler |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Citrix Netscaler VPN |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
Citrix ShareFile |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Citrix XenApp |
|
T1078 - Valid Accounts |
|
Citrix XenDesktop |
|
T1078 - Valid Accounts |
|
Netscaler WAF |
|
TA0011 - TA0011 |
|
Web Logging |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Clearsense |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cloud Application |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cloudflare CDN |
|
T1078 - Valid Accounts |
|
Cloudflare Insights |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Cloudflare WAF |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Code42 Incydr |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Phishme |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cognitas CrossLink |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Falcon |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0010 - TA0010 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
CyberArk Endpoint Privilege Management |
|
TA0002 - TA0002 |
|
CyberArk Vault |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Privileged Session Manager |
|
T1078 - Valid Accounts |
|
Privileged Threat Analytics |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Failsafe |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Darktrace |
|
T1078 - Valid Accounts |
|
Darktrace Enterprise Immune System |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
EMC Isilon |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
One Identity Manager |
|
TA0002 - TA0002 |
|
RSA Authentication Manager |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
SonicWALL Aventail |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Digital Arts i-FILTER for Business |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Digital Guardian Endpoint Protection |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 TA0011 - TA0011 |
|
Digital Guardian Network DLP |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Dropbox |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
DTEX InTERCEPT |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
EMP |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ESET Endpoint Security |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1210 - Exploitation of Remote Services T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ESector DEFESA |
|
T1003.002 - T1003.002 T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1505.003 - Server Software Component: Web Shell T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
EdgeWave iPrism |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Egnyte |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
EnSilo |
|
T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
EndPoint |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IdentityGuard |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Epic SIEM |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Exabeam Advanced Analytics |
|
T1078 - Valid Accounts |
|
Exabeam DL |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Reveal(x) |
|
T1071 - Application Layer Protocol T1078 - Valid Accounts T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BIG-IP DNS |
|
T1071 - Application Layer Protocol T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 |
|
F5 Advanced Web Application Firewall (WAF) |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0011 - TA0011 |
|
F5 BIG-IP |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
F5 BIG-IP Access Policy Manager (APM) |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
F5 BIG-IP Advanced Firewall Module (AFM) |
|
T1078 - Valid Accounts TA0011 - TA0011 |
|
F5 BIG-IP Application Security Manager (ASM) |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
F5 Silverline |
|
TA0011 - TA0011 |
|
WebSafe |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
FTP |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Fidelis Network |
|
T1210 - Exploitation of Remote Services |
|
Fidelis XPS |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
FileAuditor |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
FireEye Email Gateway |
|
TA0002 - TA0002 |
|
FireEye Endpoint Security (CM) |
|
TA0002 - TA0002 |
|
FireEye Endpoint Security (HX) |
|
T1003.002 - T1003.002 T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1505.003 - Server Software Component: Web Shell T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
FireEye Helix |
|
TA0002 - TA0002 |
|
FireEye Network Security (Helix) |
|
TA0002 - TA0002 |
|
FireEye Network Security (NX) |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Forcepoint CASB |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Forcepoint DLP |
|
TA0002 - TA0002 |
|
Forcepoint NGFW |
|
T1078 - Valid Accounts TA0002 - TA0002 TA0011 - TA0011 |
|
Websense ESG |
|
T1071 - Application Layer Protocol T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 |
|
Websense Secure Gateway |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
EyeInspect |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Forescout CounterACT |
|
T1078 - Valid Accounts TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
FortiAuthenticator |
|
T1078 - Valid Accounts |
|
Fortinet Enterprise Firewall |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 TA0011 - TA0011 |
|
Fortinet FortiWeb |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Fortinet UTM |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Fortinet VPN |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
GTBInspector |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Access Control |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Gamma |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Gemalto MFA |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
GitHub |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
GoAnywhere MFT |
|
T1078 - Valid Accounts T1210 - Exploitation of Remote Services T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cloud Platform |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 TA0011 - TA0011 |
|
Workspace |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Aruba ClearPass Access Control and Policy Management |
|
TA0011 - TA0011 |
|
Aruba Mobility Master |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Aruba Wireless controller |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0011 - TA0011 |
|
HP Comware |
|
T1210 - Exploitation of Remote Services |
|
HP SafeCom |
|
TA0002 - TA0002 |
|
Print Server |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
HashiCorp Vault |
|
TA0002 - TA0002 |
|
Terraform |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Powertech Identity Access Manager (BoKs) |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Hornet Email |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Enterprise Network Firewall |
|
TA0011 - TA0011 |
|
Unified Security Gateway |
|
T1078 - Valid Accounts TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IBM DB2 |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
IBM Endpoint Manager |
|
TA0011 - TA0011 |
|
IBM Lotus Notes |
|
TA0011 - TA0011 |
|
IBM Racf |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
IBM Sametime |
|
T1078 - Valid Accounts |
|
IBM Security Access Manager |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
IBM Sterling B2B Integrator |
|
T1078 - Valid Accounts T1210 - Exploitation of Remote Services T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Infosphere Guardium |
|
TA0002 - TA0002 |
|
Lotus Mobile Connect |
|
T1078 - Valid Accounts |
|
Proventia Network IPS |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ICPAM |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IMSS |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IMSVA |
|
TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IPTables |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IXIA ThreatArmor |
|
T1078 - Valid Accounts TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Illumio |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
CounterBreach |
|
TA0002 - TA0002 |
|
Imperva File Activity Monitoring (FAM) |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Imperva SecureSphere |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Incapsula |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Imprivata |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
InfoWatch |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
BloxOne |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0011 - TA0011 |
|
NIOS |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IPswitch MoveIt |
|
T1078 - Valid Accounts |
|
MoveIt DMZ |
|
T1003.002 - T1003.002 T1047 - Windows Management Instrumentation T1059.005 - T1059.005 T1059.007 - T1059.007 T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1210 - Exploitation of Remote Services T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
IronDefense |
|
T1210 - Exploitation of Remote Services |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
JH |
|
TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Johnson Controls P2000 |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Juniper Networks |
|
TA0011 - TA0011 |
|
Juniper Networks Pulse Secure |
|
T1078 - Valid Accounts TA0011 - TA0011 |
|
Juniper SRX |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 TA0011 - TA0011 |
|
Juniper VPN |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Kaspersky AV |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Kaspersky Endpoint Security for Business |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Kemp LoadMaster |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Load Balancer |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
LEAP |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SharePoint |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
LanScope Cat |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1189 - Drive-by Compromise T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.001 - T1204.001 T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0010 - TA0010 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
LastPass |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Lastline |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
OnGuard |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Linux CentOs |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
SSH |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
RemotelyAnywhere |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
LogRhythm |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Lumension |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Lyrix |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Malwarebytes Endpoint Protection |
|
TA0002 - TA0002 |
|
Malwarebytes Incident Response |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
MasterSAM PAM |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
McAfee DLP |
|
TA0002 - TA0002 |
|
McAfee Email Protection |
|
TA0002 - TA0002 |
|
McAfee Endpoint Security |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
McAfee Enterprise Security Manager |
|
TA0002 - TA0002 |
|
McAfee NSM |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
McAfee Network Security Platform (IPS) |
|
TA0002 - TA0002 |
|
McAfee Solidifier |
|
T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
McAfee Web Gateway |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Skyhigh Networks CASB |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
365 Defender |
|
TA0002 - TA0002 |
|
Advanced Threat Analytics (ATA) |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Advanced Threat Protection |
|
TA0002 - TA0002 |
|
AppLocker |
|
TA0002 - TA0002 |
|
Azure |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071 - Application Layer Protocol T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0011 - TA0011 |
|
Azure AD Identity Protection |
|
T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Azure Active Directory |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Azure Advanced Threat Protection |
|
TA0002 - TA0002 |
|
Azure MFA |
|
T1078 - Valid Accounts |
|
Azure Security Center |
|
TA0002 - TA0002 |
|
Cloud App Security (MCAS) |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Defender ATP |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1189 - Drive-by Compromise T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.001 - T1204.001 T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0010 - TA0010 TA0011 - TA0011 |
|
Defender Antivirus |
|
TA0002 - TA0002 |
|
DirectAccess |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Exchange |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
IIS |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
Office 365 |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1189 - Drive-by Compromise T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.001 - T1204.001 T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
OneDrive |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Routing and Remote Access Service |
|
T1078 - Valid Accounts |
|
SQL Server |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Sysmon |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071 - Application Layer Protocol T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1189 - Drive-by Compromise T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.001 - T1204.001 T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0010 - TA0010 TA0011 - TA0011 |
|
Web Application Proxy |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1210 - Exploitation of Remote Services T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
Web Application Proxy-TLS Gateway |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Windows |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071 - Application Layer Protocol T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1189 - Drive-by Compromise T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.001 - T1204.001 T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1569.002 - T1569.002 T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 T1583.001 - T1583.001 TA0002 - TA0002 TA0010 - TA0010 TA0011 - TA0011 |
|
Windows DNSServer |
|
T1071 - Application Layer Protocol T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 |
|
Windows Defender |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Email Security |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Targeted Threat Protection - URL |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
MobileIron |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Morphisec EPTP |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
N3K |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NCP |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NNT ChangeTracker |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Namespace rDirectory |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Nasuni |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NetApp |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NetDocs |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NetIQ |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NetMotion Wireless |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Netskope Security Cloud |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1189 - Drive-by Compromise T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.001 - T1204.001 T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Netwrix Auditor |
|
T1003.002 - T1003.002 T1071 - Application Layer Protocol T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Nexthink |
|
T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1059.001 - Command and Scripting Interperter: PowerShell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Nokia VitalQIP |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Nortel Contivity VPN |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
eDirectory |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ObserveIT |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Okta Adaptive MFA |
|
T1078 - Valid Accounts T1210 - Exploitation of Remote Services TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Onapsis |
|
T1071 - Application Layer Protocol T1078 - Valid Accounts T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
OneLogin |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Digipass |
|
T1078 - Valid Accounts |
|
OneSpan |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
OpenDJ LDAP |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Access Manager |
|
T1078 - Valid Accounts |
|
Oracle Database |
|
T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Solaris |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Ordr SCE |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Osirium |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Cortex XDR |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
GlobalProtect |
|
T1071 - Application Layer Protocol T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 TA0002 - TA0002 |
|
Magnifier |
|
T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
NGFW |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 TA0011 - TA0011 |
|
Palo Alto Aperture |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Prisma Cloud |
|
T1078 - Valid Accounts |
|
Traps |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
WildFire |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Password Manager Pro |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NET2DOOR |
|
TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Phantom |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Ping Identity |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
PingID |
|
T1078 - Valid Accounts |
|
PingOne |
|
T1071 - Application Layer Protocol T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Portnox CLEAR |
|
T1574.010 - T1574.010 T1574.011 - T1574.011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
PostScript |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
PostgreSQL |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
PowerSentry |
|
T1078 - Valid Accounts TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Pro.File DMS |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ObserveIT |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Proofpoint CASB |
|
TA0002 - TA0002 |
|
Proofpoint DLP |
|
TA0002 - TA0002 |
|
Proofpoint TAP/POD |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Qualys |
|
TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Change Auditor |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
RS2 |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
RSA |
|
T1078 - Valid Accounts |
|
RSA DLP |
|
TA0002 - TA0002 |
|
SecurID |
|
T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1059.001 - Command and Scripting Interperter: PowerShell T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Radius |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
RangerAudit |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
InsightVM |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Nexpose |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Red Canary |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Ricoh |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SAP |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SFTP |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SIGSCI |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SSL Open VPN |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Data Protection Suite (DPS) |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
FAM |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
IdentityNow |
|
T1078 - Valid Accounts |
|
SecurityIQ |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Salesforce |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
NGAF |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Seclore |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell T1569 - System Services T1569.002 - T1569.002 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Secure Computing SafeWord |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Secure Envoy |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SecureAuth Login |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SecureLink |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SecureNet |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
iSensor IPS |
|
TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SecurityExpert |
|
TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Singularity |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071 - Application Layer Protocol T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1189 - Drive-by Compromise T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.001 - T1204.001 T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 T1583.001 - T1583.001 TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ServiceNow |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Shibboleth IdP |
|
TA0011 - TA0011 |
|
Shibboleth SSO |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Siemens |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Silverfort |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SiteMinder |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
ClientView |
|
T1003.002 - T1003.002 T1071 - Application Layer Protocol T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1505.003 - Server Software Component: Web Shell T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Slack |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Snort |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Sonicwall |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1210 - Exploitation of Remote Services T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Sophos Endpoint Protection |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 TA0011 - TA0011 |
|
Sophos Firewall |
|
T1078 - Valid Accounts TA0011 - TA0011 |
|
Sophos SafeGuard |
|
T1078 - Valid Accounts |
|
Sophos UTM |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Sophos XG Firewall |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Specops Password Reset |
|
TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Splunk Stream |
|
T1071 - Application Layer Protocol T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Squid |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
StealthIntercept |
|
T1003.002 - T1003.002 T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1505.003 - Server Software Component: Web Shell T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
LDAP |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Suricata |
|
T1078 - Valid Accounts |
|
Suricata IDS |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Swivel |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Sybase |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Symantec Advanced Threat Protection |
|
T1078 - Valid Accounts |
|
Symantec Blue Coat Content Analysis System |
|
T1078 - Valid Accounts |
|
Symantec Blue Coat ProxySG Appliance |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Symantec Brightmail |
|
TA0002 - TA0002 |
|
Symantec CloudSOC |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Symantec Critical System Protection |
|
T1210 - Exploitation of Remote Services T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Symantec DLP |
|
T1210 - Exploitation of Remote Services TA0002 - TA0002 |
|
Symantec EDR |
|
T1003.002 - T1003.002 T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1210 - Exploitation of Remote Services T1505.003 - Server Software Component: Web Shell T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
Symantec Email Security.cloud |
|
T1047 - Windows Management Instrumentation T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.010 - Signed Binary Proxy Execution: Regsvr32 TA0002 - TA0002 |
|
Symantec Endpoint Protection |
|
T1078 - Valid Accounts T1210 - Exploitation of Remote Services T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 TA0011 - TA0011 |
|
Symantec Endpoint Protection Mobile |
|
T1078 - Valid Accounts |
|
Symantec Fireglass |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Symantec Managed Security Services |
|
TA0002 - TA0002 |
|
Symantec Secure Web Gateway |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Symantec VIP |
|
T1071 - Application Layer Protocol T1078 - Valid Accounts T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1583.001 - T1583.001 |
|
Symantec WSS |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071.001 - Application Layer Protocol: Web Protocols T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1189 - Drive-by Compromise T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.001 - T1204.001 T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Endpoint Platform |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Integrity Monitor |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Tenable.io |
|
TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Teradata RDBMS |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Secret Server |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
TitanFTP |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
TrapX |
|
T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Apex One |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Cloud App Security |
|
TA0002 - TA0002 |
|
Deep Discovery Email Inspector |
|
TA0002 - TA0002 |
|
Deep Discovery Inspector |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Deep Security Agent |
|
TA0002 - TA0002 TA0011 - TA0011 |
|
InterScan Web Security |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
OfficeScan |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 |
|
ScanMail |
|
TA0002 - TA0002 |
|
TippingPoint NGIPS |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Trend Micro |
|
TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Tripwire Enterprise |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SecureTrack |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
CCURE Building Management System |
|
T1071 - Application Layer Protocol T1078 - Valid Accounts T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
USB |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Auditbeat |
|
T1047 - Windows Management Instrumentation T1059.005 - T1059.005 T1059.007 - T1059.007 T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1189 - Drive-by Compromise T1204.001 - T1204.001 T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 TA0010 - TA0010 TA0011 - TA0011 |
|
Unix |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0011 - TA0011 |
|
Unix Auditd |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Unix Privilege Management |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
OpenVMS |
|
T1210 - Exploitation of Remote Services T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
App Control |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558 - Steal or Forge Kerberos Tickets T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0011 - TA0011 |
|
Carbon Black Cloud Endpoint Standard |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 TA0011 - TA0011 |
|
Endpoint Detection and Response |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1071.001 - Application Layer Protocol: Web Protocols T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1189 - Drive-by Compromise T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.001 - T1204.001 T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
NSX FW |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0011 - TA0011 |
|
VMWare ID Manager (VIDM) |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
VMware ESXi |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
VMware Horizon |
|
T1078 - Valid Accounts |
|
VMware NSX |
|
TA0011 - TA0011 |
|
VMware VCenter |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
VMware View |
|
T1078 - Valid Accounts T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Data Security Platform |
|
T1003.002 - T1003.002 T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Vectra Cognito Detect |
|
TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Vormetric |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Watchguard |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Weblogin |
|
TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Workday |
|
T1003.002 - T1003.002 T1078 - Valid Accounts T1505.003 - Server Software Component: Web Shell TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
XPS |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Xceedium |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Xerox |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Zeek Network Security Monitor |
|
T1003.002 - T1003.002 T1071 - Application Layer Protocol T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1210 - Exploitation of Remote Services T1505.003 - Server Software Component: Web Shell T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms T1569 - System Services T1569.002 - T1569.002 T1583.001 - T1583.001 TA0002 - TA0002 TA0011 - TA0011 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Zlock |
|
T1078 - Valid Accounts |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Zscaler Internet Access |
|
T1071.001 - Application Layer Protocol: Web Protocols T1072 - Software Deployment Tools T1189 - Drive-by Compromise T1204.001 - T1204.001 T1546.003 - T1546.003 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms TA0002 - TA0002 TA0011 - TA0011 |
|
Zscaler Private Access |
|
T1003 - OS Credential Dumping T1003.002 - T1003.002 T1012 - Query Registry T1021.002 - Remote Services: SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.004 - Obfuscated Files or Information: Compile After Delivery T1036 - Masquerading T1036.004 - T1036.004 T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task/Job: Scheduled Task T1055 - Process Injection T1055.001 - Process Injection: Dynamic-link Library Injection T1059 - Command and Scripting Interperter T1059.001 - Command and Scripting Interperter: PowerShell T1059.003 - T1059.003 T1059.005 - T1059.005 T1059.007 - T1059.007 T1078 - Valid Accounts T1083 - File and Directory Discovery T1105 - Ingress Tool Transfer T1112 - Modify Registry T1113 - Screen Capture T1123 - Audio Capture T1127 - Trusted Developer Utilities Proxy Execution T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild T1134.001 - Access Token Manipulation: Token Impersonation/Theft T1134.002 - T1134.002 T1135 - Network Share Discovery T1197 - BITS Jobs T1202 - Indirect Command Execution T1203 - Exploitation for Client Execution T1204.002 - T1204.002 T1210 - Exploitation of Remote Services T1218 - Signed Binary Proxy Execution T1218.001 - Signed Binary Proxy Execution: Compiled HTML File T1218.002 - Signed Binary Proxy Execution: Control Panel T1218.004 - Signed Binary Proxy Execution: InstallUtil T1218.005 - T1218.005 T1218.007 - Signed Binary Proxy Execution: Msiexec T1218.010 - Signed Binary Proxy Execution: Regsvr32 T1218.011 - Signed Binary Proxy Execution: Rundll32 T1482 - Domain Trust Discovery T1490 - Inhibit System Recovery T1505.003 - Server Software Component: Web Shell T1543.003 - Create or Modify System Process: Windows Service T1546.001 - T1546.001 T1546.003 - T1546.003 T1546.011 - T1546.011 T1547.001 - T1547.001 T1547.002 - T1547.002 T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1555 - Credentials from Password Stores T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting T1562 - Impair Defenses T1563.002 - T1563.002 T1569 - System Services T1574 - Hijack Execution Flow T1574.002 - Hijack Execution Flow: DLL Side-Loading T1574.010 - T1574.010 T1574.011 - T1574.011 TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
eDocs |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
Secure Web Gateway |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
iManage |
|
T1071.001 - Application Layer Protocol: Web Protocols T1078 - Valid Accounts T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
SonarG |
|
T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1558 - Steal or Forge Kerberos Tickets TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
oVirt |
|
T1078 - Valid Accounts TA0002 - TA0002 |
|
Product | Event Types | MITRE TTP | Content |
---|---|---|---|
xsuite |
|
T1071.001 - Application Layer Protocol: Web Protocols T1189 - Drive-by Compromise T1204.001 - T1204.001 T1566.002 - Phishing: Spearphishing Link T1568.002 - Dynamic Resolution: Domain Generation Algorithms |
|