Rules | Models | MITRE TTPs | Event Types | Parsers |
---|---|---|---|---|
128 | 57 | 13 | 10 | 10 |
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
External Remote Services Valid Accounts |
User Execution |
External Remote Services Valid Accounts |
Valid Accounts Exploitation for Privilege Escalation |
Obfuscated Files or Information: Indicator Removal from Tools Valid Accounts Obfuscated Files or Information |
Brute Force |
Account Discovery |
Remote Services Remote Services: SMB/Windows Admin Shares |
Data from Information Repositories |
Proxy: Multi-hop Proxy Application Layer Protocol Proxy |
Exfiltration Over Physical Medium Automated Exfiltration |