|
VIP Keylogger
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-04-16
|
|
Axios Supply Chain Post Compromise
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Linux Auditd Proctitle, Osquery Results, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon for Linux EventID 1, Windows Event Log Security 4688
|
Command And Control
Credential Access
Defense Impairment
Execution
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-03-31
|
|
Gh0st RAT
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4703, Windows Event Log System 7045
|
Defense Impairment
Discovery
Execution
Impact
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-03-24
|
|
BlankGrabber Stealer
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4663, Windows Event Log Security 4688
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Initial Access
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-03-03
|
|
MacOS Post-Exploitation
|
Osquery Results
|
Defense Impairment
Discovery
Exfiltration
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-02-26
|
|
MacOS Persistence Techniques
|
Osquery Results
|
Defense Impairment
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-02-26
|
|
MacOS Privilege Escalation
|
Osquery Results
|
Credential Access
Defense Impairment
Persistence
Privilege Escalation
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-02-26
|
|
SolarWinds WHD RCE Post Exploitation
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 3, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Command And Control
Defense Impairment
Discovery
Execution
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-02-09
|
|
Malicious PowerShell
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log System 7045
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-01-22
|
|
Scattered Spider
|
Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Palo Alto Network Traffic, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4663, Windows Event Log Security 4688
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Impact
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-01-22
|
|
VoidLink Cloud-Native Linux Malware
|
Cisco Isovalent Process Connect, Cisco Isovalent Process Exec, Cisco Isovalent Process Kprobe, CrowdStrike ProcessRollup2, Linux Auditd Cwd, Linux Auditd Path, Osquery Results, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-01-20
|
|
Storm-0501 Ransomware
|
Azure Active Directory Add member to role, Azure Active Directory Set domain authentication, Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Windows Event Log Security 4688
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2026-01-20
|
|
NPM Supply Chain Compromise
|
Cisco Isovalent Process Exec, Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, GitHub Enterprise Audit Logs, GitHub Organizations Audit Logs, Sysmon EventID 11, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688
|
Collection
Command And Control
Credential Access
Defense Impairment
Execution
Impact
Initial Access
Persistence
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-11-25
|
|
Suspicious Cisco Adaptive Security Appliance Activity
|
Cisco ASA Logs
|
Collection
Credential Access
Defense Impairment
Discovery
Exfiltration
Impact
Initial Access
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-11-19
|
|
NetSupport RMM Tool Abuse
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 14, Sysmon EventID 1, Sysmon EventID 29, Sysmon EventID 3, Sysmon EventID 7, Windows Event Log RemoteConnectionManager 1149, Windows Event Log Security 4688, Windows Event Log Security 4946, Windows Event Log Security 4947, Windows Event Log Security 4948
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-11-14
|
|
Castle RAT
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702
|
Collection
Defense Impairment
Discovery
Execution
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-10-31
|
|
Microsoft WSUS CVE-2025-59287
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Sysmon for Linux EventID 1, Windows Event Log Security 4688
|
Command And Control
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-10-24
|
|
Scattered Lapsus$ Hunters
|
ASL AWS CloudTrail, AWS CloudTrail DeactivateMFADevice, AWS CloudTrail DeleteVirtualMFADevice, AWS CloudTrail DescribeEventAggregates, AWS CloudTrail ModifyDBInstance, AWS CloudWatchLogs VPCflow, Azure Active Directory Add member to role, Azure Active Directory Disable Strong Authentication, Azure Active Directory Enable account, Azure Active Directory Reset password (by admin), Azure Active Directory Set domain authentication, Azure Active Directory Update user, Azure Active Directory User registered security info, Azure Active Directory, Cisco IOS Logs, Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, G Suite Drive, Google Workspace login_failure, Google Workspace, Ivanti VTM Audit, Linux Auditd Execve, Nginx Access, O365 UserLoggedIn, O365 UserLoginFailed, Office 365 Universal Audit Log, Okta, Palo Alto Network Threat, Palo Alto Network Traffic, PingID, Powershell Script Block Logging 4104, Splunk Stream TCP, Suricata, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Sysmon for Linux EventID 1, Windows Event Log Security 1100, Windows Event Log Security 4624, Windows Event Log Security 4625, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4703, Windows Event Log Security 4720, Windows Event Log Security 4727, Windows Event Log Security 4731, Windows Event Log Security 4732, Windows Event Log Security 4744, Windows Event Log Security 4749, Windows Event Log Security 4754, Windows Event Log Security 4756, Windows Event Log Security 4759, Windows Event Log Security 4768, Windows Event Log Security 4769, Windows Event Log Security 4781, Windows Event Log Security 4783, Windows Event Log Security 4790, Windows Event Log Security 4794, Windows Event Log System 7036
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-10-14
|
|
Hellcat Ransomware
|
AWS CloudTrail CreateTask, Azure Active Directory Set domain authentication, Azure Active Directory Update user, Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense File Event, CrowdStrike ProcessRollup2, CrushFTP, Ivanti VTM Audit, Linux Auditd Execve, Nginx Access, Osquery Results, Palo Alto Network Threat, Powershell Script Block Logging 4104, Splunk Stream HTTP, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 20, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 5, Sysmon EventID 7, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, VMWare ESXi Syslog, Windows Event Log Application 17135, Windows Event Log CAPI2 70, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5145, Windows Event Log System 7036, Windows Event Log System 7045
|
Collection
Command And Control
Credential Access
Defense Impairment
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-10-14
|
|
Suspicious Microsoft 365 Copilot Activities
|
M365 Copilot Graph API, M365 Exported eDiscovery Prompts
|
Credential Access
Defense Impairment
Initial Access
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-09-24
|
|
ArcaneDoor
|
Cisco ASA Logs, Cisco Secure Firewall Threat Defense Intrusion Event
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Exfiltration
Initial Access
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-09-23
|
|
GhostRedirector IIS Module and Rungan Backdoor
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Nginx Access, Powershell Installed IIS Modules, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 3, Sysmon for Linux EventID 1, Windows Event Log Application 15457, Windows Event Log Security 4688, Windows Event Log Security 4703, Windows Event Log Security 4720, Windows Event Log System 4720, Windows Event Log System 4726, Windows IIS 29
|
Command And Control
Defense Impairment
Execution
Exfiltration
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-09-18
|
|
NotDoor Malware
|
Sysmon EventID 11, Sysmon EventID 13
|
Command And Control
Defense Impairment
Execution
Persistence
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-09-09
|
|
Cisco Smart Install Remote Code Execution CVE-2018-0171
|
Cisco IOS Logs, Cisco Secure Firewall Threat Defense Intrusion Event, Splunk Stream TCP
|
Collection
Credential Access
Defense Impairment
Discovery
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-08-21
|
|
China-Nexus Threat Activity
|
AWS CloudWatchLogs VPCflow, Cisco Network Visibility Module Flow Data, Cisco Secure Access Firewall, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Linux Auditd Cwd, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Syscall, Palo Alto Network Traffic, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, VMWare ESXi Syslog, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4703, Windows Event Log System 7045
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-08-18
|
|
MSIX Package Abuse
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Event Log AppXDeployment-Server 400, Windows Event Log AppXDeployment-Server 854, Windows Event Log AppXDeployment-Server 855, Windows Event Log AppXPackaging 171, Windows Event Log Security 4688
|
Defense Impairment
Execution
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-08-05
|
|
Windows RDP Artifacts and Defense Evasion
|
Cisco Secure Access Firewall, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 3, Windows Event Log Microsoft Windows TerminalServices RDPClient 1024, Windows Event Log RemoteConnectionManager 1149, Windows Event Log Security 4624, Windows Event Log Security 4688, Zeek Conn
|
Credential Access
Defense Impairment
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-07-30
|
|
Quasar RAT
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 23, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702
|
Credential Access
Defense Impairment
Discovery
Execution
Impact
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-07-16
|
|
Malicious Inno Setup Loader
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-05-25
|
|
ESXi Post Compromise
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, VMWare ESXi Syslog, Windows Event Log Security 4688
|
Collection
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-05-08
|
|
XWorm
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4698
|
Command And Control
Defense Impairment
Execution
Impact
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-05-06
|
|
Storm-2460 CLFS Zero Day Exploitation
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4688
|
Command And Control
Credential Access
Defense Impairment
Execution
Impact
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-04-16
|
|
Salt Typhoon
|
Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense Intrusion Event, CrowdStrike ProcessRollup2, Linux Auditd Cwd, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4703, Windows Event Log System 7045
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-03-19
|
|
Cactus Ransomware
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Windows Event Log Security 4688, Windows Event Log Security 4698
|
Command And Control
Credential Access
Defense Impairment
Execution
Exfiltration
Impact
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-03-18
|
|
Medusa Ransomware
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 5, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4728, Windows Event Log Security 4946, Windows Event Log Security 4947, Windows Event Log Security 4948
|
Command And Control
Defense Impairment
Discovery
Execution
Impact
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-03-14
|
|
SnappyBee
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4703
|
Credential Access
Defense Impairment
Discovery
Execution
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-02-07
|
|
Black Basta Ransomware
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 7, VMWare ESXi Syslog, Windows Event Log Printservice 316, Windows Event Log Printservice 4909, Windows Event Log Printservice 808, Windows Event Log Security 4688
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-02-03
|
|
Windows Audit Policy Tampering
|
CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4719
|
Defense Impairment
Persistence
Privilege Escalation
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-01-28
|
|
Backdoor Pingpong
|
Cisco Secure Access Firewall, Palo Alto Network Traffic, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1
|
Command And Control
Defense Impairment
Persistence
Privilege Escalation
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-01-27
|
|
Security Solution Tampering
|
CrowdStrike ProcessRollup2, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log System 7036
|
Defense Impairment
Impact
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-01-21
|
|
GitHub Malicious Activity
|
GitHub Enterprise Audit Logs, GitHub Organizations Audit Logs
|
Defense Impairment
Impact
Initial Access
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2025-01-14
|
|
XorDDos
|
Linux Auditd Cwd, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Syscall, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-12-17
|
|
Crypto Stealer
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 15, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 5, Sysmon EventID 6, Windows Event Log Security 4624, Windows Event Log Security 4625, Windows Event Log Security 4688, Windows Event Log System 7045
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-12-17
|
|
CISA AA23-347A
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4699, Windows Event Log Security 4703, Windows Event Log System 7040, Windows Event Log System 7045
|
Collection
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-12-09
|
|
Defense Evasion or Unauthorized Access Via SDDL Tampering
|
CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688
|
Defense Impairment
Execution
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-12-06
|
|
AWS Bedrock Security
|
AWS CloudTrail DeleteGuardrail, AWS CloudTrail DeleteKnowledgeBase, AWS CloudTrail DeleteModelInvocationLoggingConfiguration, AWS CloudTrail
|
Defense Impairment
Discovery
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Security Analytics for AWS, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-12-05
|
|
PXA Stealer
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4663, Windows Event Log Security 4688
|
Defense Impairment
Discovery
Execution
Initial Access
Reconnaissance
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-11-18
|
|
Braodo Stealer
|
Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4663
|
Collection
Credential Access
Defense Impairment
Discovery
Execution
Persistence
Privilege Escalation
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-10-24
|
|
CISA AA24-241A
|
CrowdStrike ProcessRollup2, Palo Alto Network Threat, Powershell Script Block Logging 4104, Suricata, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 14, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4648, Windows Event Log Security 4688, Windows Event Log Security 4720, Windows Event Log Security 4732, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201, Windows IIS
|
Command And Control
Defense Impairment
Execution
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-10-07
|
|
Windows Defense Evasion Tactics
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 15, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log System 7040
|
Credential Access
Defense Impairment
Discovery
Execution
Impact
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-09-24
|
|
Azure Active Directory Persistence
|
Azure Active Directory Add member to role, Azure Active Directory Add owner to application, Azure Active Directory Add service principal, Azure Active Directory Add unverified domain, Azure Active Directory Consent to application, Azure Active Directory Enable account, Azure Active Directory Invite external user, Azure Active Directory Reset password (by admin), Azure Active Directory Set domain authentication, Azure Active Directory Update application, Azure Active Directory Update user, Azure Active Directory, Azure Audit Create or Update an Azure Automation Runbook, Azure Audit Create or Update an Azure Automation account, Azure Audit Create or Update an Azure Automation webhook, CrowdStrike ProcessRollup2, Office 365 Universal Audit Log, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4724, Windows Event Log Security 4725, Windows Event Log Security 4726
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-09-24
|
|
ValleyRAT
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4703, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Defense Impairment
Execution
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-09-11
|
|
Cisco Duo Suspicious Activity
|
Cisco Duo Activity, Cisco Duo Administrator
|
Credential Access
Defense Impairment
Persistence
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-07-08
|
|
Compromised Linux Host
|
Linux Auditd Add User, Linux Auditd Cwd, Linux Auditd Daemon Abort, Linux Auditd Daemon End, Linux Auditd Daemon Start, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Service Stop, Linux Auditd Syscall, Sysmon EventID 1
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Initial Access
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-06-25
|
|
ShrinkLocker
|
CrowdStrike ProcessRollup2, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 14, Sysmon EventID 1, Windows Event Log Security 1102, Windows Event Log Security 4688, Windows Event Log Security 4946, Windows Event Log Security 4947, Windows Event Log Security 4948, Windows Event Log System 104
|
Defense Impairment
Execution
Impact
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-06-17
|
|
Compromised Windows Host
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Suricata, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 7, Sysmon for Linux EventID 1, Windows Event Log Security 1102, Windows Event Log Security 4624, Windows Event Log Security 4627, Windows Event Log Security 4662, Windows Event Log Security 4663, Windows Event Log Security 4672, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4699, Windows Event Log Security 4738, Windows Event Log Security 4741, Windows Event Log Security 4742, Windows Event Log Security 4768, Windows Event Log Security 4769, Windows Event Log Security 4781, Windows Event Log Security 4798, Windows Event Log Security 4887, Windows Event Log Security 5136, Windows Event Log Security 5137, Windows Event Log Security 5141, Windows Event Log Security 5145, Windows Event Log System 104, Windows Event Log System 7036, Windows Event Log System 7040, Windows Event Log System 7045
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-04-18
|
|
Outlook RCE CVE-2024-21378
|
Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1
|
Defense Impairment
Initial Access
Persistence
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-03-20
|
|
Cyclops Blink
|
Sysmon for Linux EventID 1
|
Defense Impairment
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-03-14
|
|
Sneaky Active Directory Persistence Tricks
|
CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 1, Windows Active Directory Admon, Windows Event Log Security 4624, Windows Event Log Security 4662, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4720, Windows Event Log Security 4728, Windows Event Log Security 4738, Windows Event Log Security 4742, Windows Event Log Security 4794, Windows Event Log Security 5136, Windows Event Log Security 5137, Windows Event Log Security 5141
|
Credential Access
Defense Impairment
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-03-14
|
|
Okta Account Takeover
|
Okta
|
Credential Access
Defense Impairment
Discovery
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-03-06
|
|
Snake Keylogger
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 15, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 5, Sysmon EventID 6, Windows Event Log Security 4663, Windows Event Log Security 4688
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2024-02-12
|
|
Rhysida Ransomware
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 5, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log System 7045
|
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-12-12
|
|
Windows Attack Surface Reduction
|
Windows Event Log Defender 1121, Windows Event Log Defender 1122, Windows Event Log Defender 1125, Windows Event Log Defender 1126, Windows Event Log Defender 1129, Windows Event Log Defender 1131, Windows Event Log Defender 1132, Windows Event Log Defender 1133, Windows Event Log Defender 1134, Windows Event Log Defender 5007
|
Defense Impairment
Execution
Initial Access
Persistence
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-11-27
|
|
DarkGate Malware
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4703
|
Collection
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-10-31
|
|
Office 365 Persistence Mechanisms
|
O365 Add app role assignment grant to user., O365 Add app role assignment to service principal., O365 Add member to role., O365 Add owner to application., O365 Add service principal., O365 Change user license., O365 Consent to application., O365 Disable Strong Authentication., O365 ModifyFolderPermissions, O365 Set Company Information., O365 Update application., O365 Update user., O365, Office 365 Universal Audit Log
|
Collection
Credential Access
Defense Impairment
Persistence
Privilege Escalation
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-10-17
|
|
Office 365 Account Takeover
|
O365 Add app role assignment grant to user., O365 Consent to application., O365 Update authorization policy., O365 UserLoggedIn, O365 UserLoginFailed, O365, Office 365 Reporting Message Trace, Office 365 Universal Audit Log
|
Collection
Credential Access
Defense Impairment
Execution
Exfiltration
Impact
Initial Access
Persistence
Privilege Escalation
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-10-17
|
|
PlugX
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4703, Windows Event Log System 7045, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-10-12
|
|
Subvert Trust Controls SIP and Trust Provider Hijacking
|
Sysmon EventID 13, Windows Event Log CAPI2 81
|
Defense Impairment
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-10-10
|
|
NjRAT
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Sysmon EventID 9, Windows Event Log Security 4663, Windows Event Log Security 4688
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-09-07
|
|
Warzone RAT
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4663, Windows Event Log Security 4688
|
Credential Access
Defense Impairment
Discovery
Execution
Initial Access
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-07-26
|
|
BlackByte Ransomware
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 3, Sysmon EventID 5, Sysmon EventID 6, Sysmon EventID 7, Sysmon EventID 9, Sysmon for Linux EventID 1, Windows Event Log RemoteConnectionManager 1149, Windows Event Log Security 4688, Windows Event Log System 7045, Windows IIS
|
Collection
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-07-10
|
|
Amadey
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Defense Impairment
Discovery
Execution
Initial Access
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-06-16
|
|
Graceful Wipe Out Attack
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 3, Sysmon EventID 8, Sysmon EventID 9, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 5145
|
Collection
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-06-15
|
|
Scheduled Tasks
|
CrowdStrike ProcessRollup2, Linux Auditd Cwd, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Syscall, Powershell Script Block Logging 4104, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4699, Windows Event Log Security 4700, Windows Event Log Security 4702, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Defense Impairment
Execution
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-06-12
|
|
Volt Typhoon
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Windows Event Log Security 4625, Windows Event Log Security 4648, Windows Event Log Security 4688, Windows Event Log Security 4768, Windows Event Log Security 4771, Windows Event Log Security 4776
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Impact
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-05-25
|
|
Snake Malware
|
Sysmon EventID 11, Sysmon EventID 13, Windows Event Log System 7045
|
Defense Impairment
Execution
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-05-10
|
|
RedLine Stealer
|
CrowdStrike ProcessRollup2, Suricata, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log System 7040
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Impact
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-04-24
|
|
BlackLotus Campaign
|
Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 3
|
Defense Impairment
Impact
Persistence
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-04-14
|
|
Data Destruction
|
AWS Cloudfront, Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Linux Auditd Execve, Linux Auditd Proctitle, Linux Auditd Service Stop, Office 365 Reporting Message Trace, Office 365 Universal Audit Log, Osquery Results, Powershell Script Block Logging 4104, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 5, Sysmon EventID 7, Sysmon EventID 9, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4769, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-04-06
|
|
Active Directory Privilege Escalation
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Active Directory Admon, Windows Event Log Security 4624, Windows Event Log Security 4625, Windows Event Log Security 4627, Windows Event Log Security 4672, Windows Event Log Security 4688, Windows Event Log Security 4728, Windows Event Log Security 4732, Windows Event Log Security 4742, Windows Event Log Security 4768, Windows Event Log Security 4769, Windows Event Log Security 4781, Windows Event Log Security 5136, Windows Event Log Security 5137, Windows Event Log Security 5140, Windows Event Log Security 5145
|
Collection
Credential Access
Defense Impairment
Discovery
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-03-20
|
|
AwfulShred
|
Linux Auditd Execve, Linux Auditd Proctitle, Linux Auditd Service Stop, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1
|
Defense Impairment
Execution
Impact
Initial Access
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-01-24
|
|
Compromised User Account
|
ASL AWS CloudTrail, AWS CloudTrail ConsoleLogin, AWS CloudTrail DeleteAccountPasswordPolicy, AWS CloudTrail DescribeEventAggregates, AWS CloudTrail GetAccountPasswordPolicy, AWS CloudTrail UpdateAccountPasswordPolicy, AWS CloudTrail, Azure Active Directory MicrosoftGraphActivityLogs, Azure Active Directory NonInteractiveUserSignInLogs, Azure Active Directory Sign-in activity, Azure Active Directory User registered security info, Azure Active Directory, Cisco Secure Access Firewall, Office 365 Universal Audit Log, PingID, Sysmon EventID 3, Windows Event Log Security 4624, Windows Event Log Security 4625
|
Collection
Credential Access
Defense Impairment
Discovery
Initial Access
Persistence
Privilege Escalation
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-01-19
|
|
LockBit Ransomware
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 5, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log System 7036
|
Defense Impairment
Execution
Impact
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2023-01-16
|
|
IIS Components
|
CrowdStrike ProcessRollup2, Powershell Installed IIS Modules, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Event Log Application 2282, Windows Event Log Security 4688, Windows IIS 29
|
Defense Impairment
Persistence
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-12-19
|
|
Prestige Ransomware
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Collection
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-11-30
|
|
Windows Post-Exploitation
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Event Log Security 4663, Windows Event Log Security 4688
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Impact
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-11-30
|
|
CISA AA22-320A
|
CrowdStrike ProcessRollup2, Nginx Access, Office 365 Universal Audit Log, Powershell Script Block Logging 4104, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 6, Windows Event Log Security 4688, Windows Event Log System 7045
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-11-16
|
|
Qakbot
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4688, Windows Event Log System 7045, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Command And Control
Defense Impairment
Discovery
Execution
Impact
Initial Access
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-11-14
|
|
GCP Account Takeover
|
Google Workspace login_failure, Google Workspace
|
Credential Access
Defense Impairment
Initial Access
Persistence
Privilege Escalation
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-10-12
|
|
CISA AA22-277A
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 1, Windows Event Log Security 4688
|
Collection
Command And Control
Defense Impairment
Discovery
Execution
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-10-05
|
|
CISA AA22-264A
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 9, Sysmon for Linux EventID 1, Windows Event Log Security 1102, Windows Event Log Security 4688, Windows Event Log System 104
|
Credential Access
Defense Impairment
Execution
Impact
Initial Access
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-09-22
|
|
AWS Identity and Access Management Account Takeover
|
ASL AWS CloudTrail, AWS CloudTrail ConsoleLogin, AWS CloudTrail CreateVirtualMFADevice, AWS CloudTrail DeactivateMFADevice, AWS CloudTrail DeleteVirtualMFADevice, AWS CloudTrail DescribeEventAggregates, AWS CloudTrail GetPasswordData, AWS CloudTrail ModifyDBInstance, AWS CloudTrail
|
Collection
Credential Access
Defense Impairment
Discovery
Initial Access
Persistence
Privilege Escalation
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-08-19
|
|
Linux Living Off The Land
|
Cisco Isovalent Process Exec, CrowdStrike ProcessRollup2, Linux Auditd Add User, Linux Auditd Cwd, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Service Stop, Linux Auditd Syscall, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-07-27
|
|
DarkCrystal RAT
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Command And Control
Defense Impairment
Discovery
Execution
Impact
Initial Access
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-07-26
|
|
AWS Defense Evasion
|
ASL AWS CloudTrail, AWS CloudTrail DeleteAlarms, AWS CloudTrail DeleteDetector, AWS CloudTrail DeleteIPSet, AWS CloudTrail DeleteLogGroup, AWS CloudTrail DeleteLogStream, AWS CloudTrail DeleteLoggingConfiguration, AWS CloudTrail DeleteRuleGroup, AWS CloudTrail DeleteRule, AWS CloudTrail DeleteTrail, AWS CloudTrail DeleteWebACL, AWS CloudTrail PutBucketLifecycle, AWS CloudTrail StopLogging, AWS CloudTrail UpdateTrail
|
Defense Impairment
Impact
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-07-15
|
|
Azure Active Directory Account Takeover
|
Azure Active Directory Consent to application, Azure Active Directory Disable Strong Authentication, Azure Active Directory Sign-in activity, Azure Active Directory Update authorization policy, Azure Active Directory User registered security info, Azure Active Directory, Azure Monitor Activity, Office 365 Universal Audit Log, Powershell Script Block Logging 4104
|
Collection
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-07-14
|
|
Azorult
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-06-09
|
|
Industroyer2
|
CrowdStrike ProcessRollup2, Linux Auditd Proctitle, Linux Auditd Service Stop, Osquery Results, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 5, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Credential Access
Defense Impairment
Discovery
Execution
Impact
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-04-21
|
|
AgentTesla
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 6, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log System 7045
|
Command And Control
Credential Access
Defense Impairment
Execution
Initial Access
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-04-12
|
|
Sandworm Tools
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Credential Access
Defense Impairment
Discovery
Execution
Impact
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-04-05
|
|
Windows Drivers
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 6, Windows Event Log Security 4688, Windows Event Log System 7045
|
Defense Impairment
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-03-30
|
|
Double Zero Destructor
|
CrowdStrike ProcessRollup2, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 1, Windows Event Log Security 4688
|
Defense Impairment
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-03-25
|
|
Windows Registry Abuse
|
CrowdStrike ProcessRollup2, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688
|
Command And Control
Credential Access
Defense Impairment
Execution
Impact
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-03-17
|
|
Living Off The Land
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Osquery Results, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 3, Sysmon EventID 7, Sysmon EventID 8, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5145
|
Command And Control
Credential Access
Defense Impairment
Execution
Exfiltration
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-03-16
|
|
Hermetic Wiper
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Sysmon EventID 9, Sysmon for Linux EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4769, Windows Event Log Security 5145
|
Command And Control
Credential Access
Defense Impairment
Execution
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-03-02
|
|
WhisperGate
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 9, Windows Event Log Security 4688
|
Defense Impairment
Discovery
Execution
Impact
Lateral Movement
Persistence
Privilege Escalation
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2022-01-19
|
|
Linux Persistence Techniques
|
Cisco Isovalent Process Exec, Linux Auditd Add User, Linux Auditd Cwd, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Service Stop, Linux Auditd Syscall, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2021-12-17
|
|
Linux Privilege Escalation
|
Cisco Isovalent Process Exec, Linux Auditd Add User, Linux Auditd Cwd, Linux Auditd Execve, Linux Auditd Path, Linux Auditd Proctitle, Linux Auditd Service Stop, Linux Auditd Syscall, Sysmon EventID 1, Sysmon for Linux EventID 11, Sysmon for Linux EventID 1
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2021-12-17
|
|
Remcos
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Collection
Credential Access
Defense Impairment
Execution
Initial Access
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2021-09-23
|
|
FIN7
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4663, Windows Event Log Security 4688
|
Credential Access
Defense Impairment
Discovery
Execution
Impact
Initial Access
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2021-09-14
|
|
IcedID
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5140, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Collection
Command And Control
Defense Impairment
Discovery
Execution
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2021-07-29
|
|
Revil Ransomware
|
CrowdStrike ProcessRollup2, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 7, Windows Event Log Security 4688
|
Defense Impairment
Execution
Impact
Persistence
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2021-06-04
|
|
XMRig
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 15, Sysmon EventID 1, Sysmon EventID 6, Windows Event Log Security 4688, Windows Event Log Security 4798
|
Command And Control
Credential Access
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2021-05-07
|
|
Trickbot
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Sysmon EventID 8, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 5145
|
Defense Impairment
Execution
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2021-04-20
|
|
Clop Ransomware
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 26, Sysmon EventID 5, Windows Event Log Security 1100, Windows Event Log Security 1102, Windows Event Log Security 4688, Windows Event Log System 104, Windows Event Log System 7045
|
Defense Impairment
Execution
Impact
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2021-03-17
|
|
Suspicious Regsvr32 Activity
|
CrowdStrike ProcessRollup2, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688
|
Defense Impairment
Persistence
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2021-01-29
|
|
Cloud Federated Credential Abuse
|
ASL AWS CloudTrail, AWS CloudTrail UpdateSAMLProvider, CrowdStrike ProcessRollup2, O365 Add app role assignment grant to user., O365 UserLoginFailed, O365, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688
|
Credential Access
Defense Impairment
Initial Access
Persistence
Privilege Escalation
Stealth
|
Splunk Security Analytics for AWS, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2021-01-26
|
|
Ryuk Ransomware
|
Cisco Secure Access Firewall, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 3, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702, Zeek Conn
|
Credential Access
Defense Impairment
Discovery
Execution
Impact
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2020-11-06
|
|
Credential Dumping
|
CrowdStrike ProcessRollup2, Linux Secure, Powershell Script Block Logging 4104, Sysmon EventID 10, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 8, Windows Event Log Security 4624, Windows Event Log Security 4662, Windows Event Log Security 4663, Windows Event Log Security 4688
|
Credential Access
Defense Impairment
Execution
Impact
Initial Access
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2020-02-04
|
|
Windows Privilege Escalation
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Sysmon EventID 23, Sysmon EventID 7, Windows Event Log Security 4688, Windows Event Log Security 4769
|
Credential Access
Defense Impairment
Execution
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2020-02-04
|
|
Ransomware
|
Cisco Network Visibility Module Flow Data, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Palo Alto Network Threat, Palo Alto Network Traffic, Powershell Script Block Logging 4104, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Sysmon EventID 22, Sysmon EventID 7, Windows Event Log Security 1100, Windows Event Log Security 1102, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702, Windows Event Log System 104, Windows Event Log System 7036
|
Collection
Command And Control
Defense Impairment
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Reconnaissance
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2020-02-04
|
|
Disabling Security Tools
|
CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688
|
Defense Impairment
Discovery
Execution
Impact
Persistence
Privilege Escalation
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2020-02-04
|
|
Unusual Processes
|
Cisco Network Visibility Module Flow Data, CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 13, Sysmon EventID 1, Windows Event Log Security 4688
|
Credential Access
Defense Impairment
Discovery
Execution
Initial Access
Persistence
Privilege Escalation
Reconnaissance
Resource Development
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2020-02-04
|
|
DHS Report TA18-074A
|
Cisco Secure Access Firewall, Cisco Secure Firewall Threat Defense Connection Event, CrowdStrike ProcessRollup2, Sysmon EventID 13, Sysmon EventID 17, Sysmon EventID 18, Sysmon EventID 1, Windows Event Log Security 4688, Windows Event Log Security 4720, Windows Event Log Security 4732
|
Command And Control
Defense Impairment
Execution
Lateral Movement
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2020-01-22
|
|
Suspicious Windows Registry Activities
|
Sysmon EventID 13
|
Defense Impairment
Execution
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2018-05-31
|
|
Windows Persistence Techniques
|
CrowdStrike ProcessRollup2, Sysmon EventID 11, Sysmon EventID 12, Sysmon EventID 13, Sysmon EventID 14, Sysmon EventID 1, Windows Event Log Application 3000, Windows Event Log Security 4688, Windows Event Log Security 4698, Windows Event Log Security 4700, Windows Event Log Security 4702, Windows Event Log Security 4738, Windows Event Log Security 4742, Windows Event Log Security 5145, Windows Event Log TaskScheduler 200, Windows Event Log TaskScheduler 201
|
Credential Access
Defense Impairment
Execution
Initial Access
Persistence
Privilege Escalation
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2018-05-31
|
|
AWS Network ACL Activity
|
ASL AWS CloudTrail, AWS CloudTrail CreateNetworkAclEntry, AWS CloudTrail DeleteNetworkAclEntry, AWS CloudTrail ReplaceNetworkAclEntry
|
Defense Impairment
|
Splunk Security Analytics for AWS, Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2018-05-21
|
|
Windows Log Manipulation
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 1100, Windows Event Log Security 1102, Windows Event Log Security 4688, Windows Event Log System 104
|
Defense Impairment
Impact
Stealth
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2017-09-12
|
|
Netsh Abuse
|
CrowdStrike ProcessRollup2, Sysmon EventID 1, Windows Event Log Security 4688
|
Defense Impairment
Discovery
Execution
Impact
|
Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud
|
2017-01-05
|