Rules | Models | MITRE ATT&CK® TTPs | Event Types | Parsers |
---|---|---|---|---|
75 | 34 | 8 | 3 | 3 |
Use-Case | Event Types/Parsers | MITRE ATT&CK® TTP | Content |
---|---|---|---|
Abnormal Authentication & Access | account-switch ↳s-cyberark-tpm-account-switch app-activity ↳s-cyberark-tpm-activity app-login ↳s-cyberark-tpm-login |
T1078 - Valid Accounts T1133 - External Remote Services |
|
Account Manipulation | app-activity ↳s-cyberark-tpm-activity |
T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Compromised Credentials | app-activity ↳s-cyberark-tpm-activity app-login ↳s-cyberark-tpm-login |
T1078 - Valid Accounts T1133 - External Remote Services T1190 - Exploit Public Fasing Application |
|
Data Access | app-activity ↳s-cyberark-tpm-activity app-login ↳s-cyberark-tpm-login |
T1078 - Valid Accounts |
|
Data Leak | app-activity ↳s-cyberark-tpm-activity |
T1114.003 - Email Collection: Email Forwarding Rule |
|
Lateral Movement | app-activity ↳s-cyberark-tpm-activity app-login ↳s-cyberark-tpm-login |
T1090.003 - Proxy: Multi-hop Proxy |
|
Malware | account-switch ↳s-cyberark-tpm-account-switch app-activity ↳s-cyberark-tpm-activity app-login ↳s-cyberark-tpm-login |
T1078 - Valid Accounts TA0002 - TA0002 |
|
Privilege Abuse | account-switch ↳s-cyberark-tpm-account-switch app-activity ↳s-cyberark-tpm-activity app-login ↳s-cyberark-tpm-login |
T1078 - Valid Accounts T1098.002 - Account Manipulation: Exchange Email Delegate Permissions |
|
Privilege Escalation | account-switch ↳s-cyberark-tpm-account-switch app-activity ↳s-cyberark-tpm-activity |
T1078 - Valid Accounts T1098.002 - Account Manipulation: Exchange Email Delegate Permissions T1555.005 - T1555.005 |
|
Privileged Activity | account-switch ↳s-cyberark-tpm-account-switch app-activity ↳s-cyberark-tpm-activity app-login ↳s-cyberark-tpm-login |
T1078 - Valid Accounts |
|
Ransomware | app-activity ↳s-cyberark-tpm-activity app-login ↳s-cyberark-tpm-login |
T1078 - Valid Accounts |
|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
External Remote Services Valid Accounts Exploit Public Fasing Application |
External Remote Services Valid Accounts Account Manipulation Account Manipulation: Exchange Email Delegate Permissions |
Valid Accounts |
Valid Accounts |
Credentials from Password Stores |
Email Collection Email Collection: Email Forwarding Rule |
Proxy: Multi-hop Proxy Proxy |