AlertLogic logs via ALERTLOGIC_API_v3 or ALERTLOGIC_IRIS_API
Cisco Application Visibility and Control (AVC) logs via Netflow V9
Crowdstrike via FALCON_STREAMING_API or FALCON_DATA_REPLICATOR
Dragos Platform via Syslog and Nozomi SCADA Guardian/CMC via NOZOMI_API
Microsoft Entra Identity Protection via HTTPS_ADVANCED (Graph API)
Microsoft IIS Performance Monitoring via OMI or FortiSIEM Agent
Microsoft Windows Application Log via OMI or FortiSIEM Agent
Microsoft Windows Certificate Monitoring via FortiSIEM Agent
Microsoft Windows Code Integrity/Operational logs via FortiSIEM Agent
Microsoft Windows Diagnosis Scripted logs via FortiSIEM Agent
Microsoft Windows DNS (with debug log enabled) via FortiSIEM Agent
Microsoft Windows Firewall with Advanced Security logs via FortiSIEM Agent
Microsoft Windows MSExchange Management Logs via FortiSIEM Agent
Microsoft Windows OpenSSH/Operational and OpenSSH/Admin Logs via FortiSIEM Agent
Microsoft Windows Performance Monitoring via OMI or FortiSIEM Agent
Microsoft Windows Powershell Operational Logs via FortiSIEM Agent
Microsoft Windows Task Scheduler Operational Logs via FortiSIEM Agent
Microsoft Windows Terminal Services LocalSessionManager/Operational logs via FortiSIEM Agent
Name | Tactic | Technique | Severity |
---|---|---|---|
Linux: NMAP Process Activity | Reconnaissance | T1592.002,T1595.001 | 7 |
Linux: Nping Process Activity | Reconnaissance | T1595.001 | 7 |
Mimecast: User clicked malicious link in email | Reconnaissance | T1598.003 | 9 |
Phishing attack found but not remediated | Reconnaissance | T1598.002,T1598.003 | 9 |
Windows: PUA - Crassus Execution | Reconnaissance | T1590.001 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Suspicious Botnet like End host DNS Behavior | Command and Control | none | 6 |
Traffic to bogon networks | Command and Control | none | 8 |
AWS SecHub: Tactics: Command-and-Control Detected | Command and Control | none | 8 |
Crowdstrike: User Compromise | Command and Control | none | 8 |
FortiGate detects Botnet | Command and Control | none | 9 |
FortiSandbox detects Botnet | Command and Control | none | 9 |
Outbreak: HAFNIUM Exchange OWA Server Authentication Bypass | Command and Control | none | 9 |
Outbreak: HAFNIUM FortiGate Permitted IPS Event | Command and Control | none | 9 |
Outbreak: HAFNIUM Infected File Detected by FortiGate | Command and Control | none | 9 |
Outbreak: HAFNIUM Suspicious File hash match | Command and Control | none | 9 |
Outbreak: SUNBURST Suspicious File Created | Command and Control | none | 9 |
Outbreak: SUNBURST Suspicious File Hash Match | Command and Control | none | 9 |
Permitted Traffic from Emerging Threat IP List | Command and Control | none | 7 |
Windows: Powershell opening TCP Connection | Command and Control | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Suspicious Botnet like End host DNS Behavior | Command and Control | none | 6 |
FortiGate detects Botnet | Command and Control | none | 9 |
FortiSandbox detects Botnet | Command and Control | none | 9 |
Outbreak: FortiWeb detected Zerobot Botnet Activity on Network | Lateral Movement | T1210 | 9 |
Outbreak: Sysrv-K Botnet Activity Detected on Host | Resource Development | T1584.005 | 9 |
Outbreak: Sysrv-K Botnet Activity Detected on Network | Resource Development | T1584.005 | 9 |
Outbreak: Zerobot Botnet Activity Detected on Host | Lateral Movement | T1210 | 9 |
Outbreak: Zerobot Botnet Activity Detected on Network | Lateral Movement | T1210 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
AWS EC2 Instance Down | Impact | T1529 | 4 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Code Injection Attack detected by NIPS | Execution | none | 9 |
FortiSandbox detects Network Attack | Execution | none | 7 |
FortiWeb: Permitted Inbound Attack Detected | Lateral Movement | T1210 | 9 |
High Risk Rating Cisco IPS Exploit | Execution | none | 9 |
High Severity Inbound Denied Security Exploit | Execution | none | 5 |
High Severity Inbound Permitted IPS Exploit | Execution | none | 9 |
High Severity Outbound Denied IPS Exploit | Execution | none | 9 |
High Severity Outbound Permitted IPS Exploit | Execution | none | 9 |
High Severity Symantec Host IPS Exploit | Execution | none | 9 |
Multiple Distinct IPS Events From Same Src | Execution | none | 9 |
System Exploit Detected by Network IPS | Execution | none | 7 |
System Exploit Detected by Network IPS: Likely Success | Execution | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Concurrent Failed Authentications To Same Account From Multiple Cities of the same Country | Credential Access | T1110.001 | 7 |
Concurrent Failed Authentications To Same Account From Multiple Countries | Credential Access | T1110.001 | 9 |
Concurrent Successful Authentications To Same Account From Multiple Cities of the same Country | Credential Access | T1110.001 | 7 |
Concurrent Successful Authentications To Same Account From Multiple Countries | Credential Access | T1110.001 | 9 |
Concurrent Successful VPN Authentications To Same Account From Different Countries | Credential Access | T1110.001 | 9 |
Sudden User Location Change | Credential Access | none | 9 |
Sudden User Login Pattern Change | Behavioral Anomaly | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
AWS SecHub: Tactics: Impact: Data Destruction Detected | Impact | none | 7 |
Crowdstrike: Data Deletion | Impact | none | 8 |
Website defacement attack | Impact | T1491.001,T1491.002 | 9 |
Windows: Deleted Data Overwritten Via Cipher.EXE | Impact | T1485 | 5 |
Windows: Deletion of Volume Shadow Copies via WMI with PowerShell | Impact | T1490 | 7 |
Windows: Potential File Overwrite Via Sysinternals SDelete | Impact | T1485 | 7 |
Windows: Shadow Copies Deletion Using Operating Systems Utilities | Impact | T1490 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Half Open TCP DDOS Attack | Impact | T1498.001 | 7 |
TCP DDOS Attack | Impact | T1498.001 | 8 |
AWS SecHub: Tactics: Impact: Denial of Service Detected | Impact | T1498.001 | 8 |
Distributed DoS Attack detected by NIPS | Impact | T1498.001 | 9 |
DoS Attack detected by NIPS | Impact | T1498.001 | 9 |
DoS Attack on Network Devices by Network IPS | Impact | T1498.001 | 9 |
DoS Attack on WLAN Infrastructure by Network IPS | Impact | T1498.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Critical APC Trap | Environmental | none | 9 |
Critical APC Trap: can be auto cleared | Environmental | none | 9 |
FPC Current THD high | Environmental | none | 9 |
FPC Voltage THD high | Environmental | none | 9 |
FPC ground current high | Environmental | none | 9 |
HVAC humidity high | HVAC | none | 9 |
HVAC humidity low | HVAC | none | 9 |
HVAC temp high | HVAC | none | 9 |
HVAC temp low | HVAC | none | 9 |
NetBotz camera motion detected | Environmental | none | 7 |
NetBotz module door open | Environmental | none | 7 |
UPS Battery Metrics Critical | UPS | none | 9 |
UPS Battery Status Critical | UPS | none | 9 |
Warning APC Trap | Environmental | none | 7 |
Warning APC Trap: can be auto cleared | Environmental | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiSIEM DB Leader Changed | FortiSIEM | none | 7 |
FortiSIEM Replication Leader Changed | FortiSIEM | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
AlertLogic Incident | Execution | none | 7 |
Armis Alert Detected | Behavioral Anomaly | none | 9 |
Cortex XDR Alert Detected | Behavioral Anomaly | none | 9 |
Cortex XDR Alert Prevented | Behavioral Anomaly | none | 7 |
Cylance Waived Threat | Execution | none | 3 |
FortiNDR Cloud: High Severity Detection triggered for a Host | Privilege Escalation | T1068 | 9 |
FortiNDR Cloud: Low Severity Detection triggered for a Host | Privilege Escalation | T1068 | 4 |
FortiNDR Cloud: Moderate Severity Detection triggered for a Host | Privilege Escalation | T1068 | 7 |
MS 365 Defender: Delivery Detected | Impact | none | 8 |
MS 365 Defender: Exploit Detected | Execution | none | 9 |
MS 365 Defender: Generic Alert | PH_RULE_SECURITY_Suspicious_Activity | none | 7 |
MS 365 Defender: Incident Triggered | Suspicious Activity | none | 7 |
Microsoft ATA Center: Security Alert Triggered | Behavioral Anomaly | none | 6 |
UserGate UTM IDPS Alert Detected | Behavioral Anomaly | none | 8 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiDeceptor: IPS Attack to Decoy | Lateral Movement | none | 9 |
FortiDeceptor: Successful FTP/TFTP Operations to Decoy | Initial Access ICS | T0886 | 9 |
FortiDeceptor: Successful IOT SCADA Operations to Decoy | Initial Access ICS | T0886 | 9 |
FortiDeceptor: Successful RDP Login to Decoy | Initial Access ICS | T0886 | 9 |
FortiDeceptor: Successful SAMBA Operations to Decoy | Initial Access ICS | T0886 | 9 |
FortiDeceptor: Successful SSH Login to Decoy | Initial Access ICS | T0886 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
AWS SecHub: Tactics: Initial Access Detected | Initial Access | none | 7 |
Azure External Guest User Invitation | Initial Access | T1078.004 | 3 |
Windows: External Disk Drive or USB Storage Device | Initial Access | T1091,T1200 | 3 |
Windows: ISO Image Mount | Initial Access | T1566.001 | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
AWS CloudTrail Log Deleted | Defense Evasion | T1562.008 | 9 |
AWS CloudWatch Alarm Deleted | Defense Evasion | T1562.008 | 5 |
AWS CloudWatch Log Stream Deleted | Defense Evasion | T1070.004 | 9 |
AWS EC2 Flow Log Deleted | Defense Evasion | T1562.008 | 7 |
CyberArk Vault User History Clear | Defense Evasion | T1070.003 | 8 |
GCP: Logging Sink Deleted | Defense Evasion | T1562.008 | 8 |
GCP: Storage or Logging Bucket Deleted | Defense Evasion | T1562.008 | 6 |
Linux: Clear System Logs | Defense Evasion | T1070.002 | 9 |
Windows Security Log Cleared | Defense Evasion | T1070.001 | 9 |
Windows: Backup Catalog Deleted | Defense Evasion | T1070.004 | 5 |
Windows: Disable of ETW Trace | Defense Evasion | T1562.006 | 7 |
Windows: Eventlog Cleared | Defense Evasion | T1070.001 | 5 |
Windows: Suspicious Eventlog Clear or Configuration Change | Defense Evasion | T1562.002 | 7 |
Windows: System Eventlog Cleared | Defense Evasion | T1070.001 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
AWS CloudTrail Log Suspended | Defense Evasion | T1562.008 | 9 |
AWS CloudWatch Log Group Deleted | Defense Evasion | T1070.004 | 9 |
AWS Configuration Recorder Stopped | Defense Evasion | T1562.008 | 7 |
AWS GuardDuty Detector Deleted | Defense Evasion | T1562.008 | 7 |
Azure Event Hub Deleted | Defense Evasion | T1562.008 | 9 |
Azure Network Watcher Deleted | Defense Evasion | T1562.007 | 5 |
Linux: Attempt to Disable Syslog Service | Defense Evasion | T1562.004 | 9 |
Windows Logging Service Shutdown | Defense Evasion | T1562.002 | 9 |
Windows Security Log is Full | Defense Evasion | T1070.001 | 9 |
Windows: Disable Security Events Logging Adding Reg Key MiniNt | Defense Evasion | T1562.001 | 7 |
Windows: Disable Windows IIS HTTP Logging | Defense Evasion | T1562.002 | 7 |
Windows: Sysmon Channel Reference Deletion | Defense Evasion | T1112 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiSandbox detects Phishing URL | Execution | T1204.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
AWS RDS Instance/Cluster Stopped | Impact | T1489 | 5 |
Windows: Application Uninstalled | Impact | T1489 | 3 |
Windows: Delete All Scheduled Tasks | Impact | T1489 | 7 |
Windows: Delete Important Scheduled Task | Impact | T1489 | 7 |
Windows: Disable Important Scheduled Task | Impact | T1489 | 7 |
Windows: Stop Windows Service Via Net.EXE | Impact | T1489 | 3 |
Windows: Stop Windows Service Via PowerShell Stop-Service | Impact | T1489 | 3 |
Windows: Stop Windows Service Via Sc.EXE | Impact | T1489 | 3 |
Windows: Suspicious Execution of Shutdown | Impact | T1529 | 5 |
Windows: Suspicious Execution of Shutdown to Log Out | Impact | T1529 | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Suspicious Logon Failure without successful login - Scheduled | Credential Access | T1110.001 | 8 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows: Cobalt Strike Service Installations: Security Log | Execution | T1569.002 | 7 |
Windows: CobaltStrike Service Installations: System Log | Execution | T1569.002 | 9 |
Windows: Metasploit Or Impacket Service Installation Via SMB PsExec | Lateral Movement | T1570 | 7 |
Windows: Meterpreter or Cobalt Strike Getsystem Service Installation - System | Defense Evasion | T1134.002 | 9 |
Windows: Meterpreter or Cobalt Strike Service Installation: Security Log | Defense Evasion | T1134.002 | 9 |
Windows: Potential Meterpreter/CobaltStrike Activity | Defense Evasion | T1134.002 | 7 |
Windows: PsExec Service Child Process Execution as LOCAL SYSTEM | Persistence | none | 7 |
Windows: PsExec Service Execution | Persistence | none | 5 |
Windows: PsExec Service File Creation | Execution | T1569.002 | 3 |
Windows: Renamed PsExec Service Execution | Persistence | none | 7 |
Windows: Suspicious PsExec Execution | Lateral Movement | T1021.002 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Linux: Potential DNS Tunneling via Iodine | Command And Control | T1071.004 | 7 |
Tunneled traffic detected | Command And Control | T1572 | 7 |
Windows: Communication To Ngrok Tunneling Service | Command And Control | T1572 | 7 |
Windows: DNS Exfiltration and Tunneling Tools Execution | Command And Control | T1048.001,T1071.004,T1132.001 | 7 |
Windows: PUA - Chisel Tunneling Tool Execution | Command And Control | T1090.001 | 7 |
Windows: Potential RDP Tunneling Via SSH | Command And Control | T1572 | 7 |
Windows: Potential RDP Tunneling Via SSH Plink | Command And Control | T1572 | 7 |
Windows: RDP Over Reverse SSH Tunnel | Command And Control | T1572 | 7 |
Windows: RDP over Reverse SSH Tunnel WFP | Command And Control | T1090.002 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Machine Learning Anomaly Detected | Policy Violation | none | 7 |
UEBA AI detects unusual drive unmounted | UEBA | none | 7 |
UEBA AI detects unusual file creation | UEBA | T1074.001 | 7 |
UEBA AI detects unusual file deletion | UEBA | none | 7 |
UEBA AI detects unusual file download | UEBA | none | 7 |
UEBA AI detects unusual file movement | UEBA | none | 7 |
UEBA AI detects unusual file printed | UEBA | none | 7 |
UEBA AI detects unusual file reading | UEBA | none | 7 |
UEBA AI detects unusual file renamed | UEBA | none | 7 |
UEBA AI detects unusual file upload | UEBA | none | 7 |
UEBA AI detects unusual file writing | UEBA | none | 7 |
UEBA AI detects unusual machine off | UEBA | none | 7 |
UEBA AI detects unusual machine on | UEBA | none | 7 |
UEBA AI detects unusual new drive mounted | UEBA | none | 7 |
UEBA AI detects unusual process created | UEBA | none | 7 |
UEBA AI detects unusual process not restarted | UEBA | none | 7 |
UEBA AI detects unusual process started | UEBA | none | 7 |
UEBA AI detects unusual process stopped | UEBA | none | 7 |
Windows DNS Server: Suspicious DNS Traffic Resolved | Behavioral Anomaly | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows Dormant Account Detected | Credential Access | T1110.001 | 4 |
Name | Tactic | Technique | Severity |
---|---|---|---|
AWS SecHub: Host Vulnerability Detected | Impact | T1499.004 | 8 |
Otorio RAM2 Vulnerability Discovered | Policy Violation | none | 9 |
Scanner found medium vulnerability | Impact | T1499.004 | 7 |
Scanner found severe vulnerability | Impact | T1499.004 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
AlertLogic Incident | Execution | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Agent FIM: Linux File Content Modified | Defense Evasion | T1070.004,T1565.001 | 7 |
Agentless FIM: Audited file or directory created | Collection | T1074.001,T1565.001 | 8 |
Agentless FIM: Audited file or directory deleted | Defense Evasion | T1070.004,T1565.001 | 8 |
Agentless FIM: Audited file or directory ownership or permission changed | Defense Evasion | T1222.002,T1565.001 | 9 |
Agentless FIM: Audited target file content modified | Defense Evasion | T1070.004,T1565.001 | 8 |
Audited file or directory content modified in SVN | Defense Evasion | T1070.004,T1565.001 | 8 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Difference between Running and Startup Config | Policy Violation | none | 7 |
Running Config Change | Defense Evasion | T1562.004 | 6 |
Startup Config Change | Defense Evasion | T1562.004 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Default Password Detected by System | Policy Violation | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Network Device Degraded: Lossy Ping Response | Impact | T1529 | 7 |
Network Device Down: no ping response | Impact | T1529 | 7 |
Server Degraded: Lossy Ping Response | Impact | T1529 | 7 |
Server Down: No Ping Response | Impact | T1529 | 7 |
Sudden Increase in Ping Response Times | Impact | T1499.002 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Service Degraded: Slow Response to STM | Impact | T1489 | 7 |
Service Degraded: Slow Response to STM: Has IP | Impact | T1499.003 | 7 |
Service Down: No Response to STM | Impact | T1499.003 | 9 |
Service Down: No Response to STM: Has IP | Application | none | 9 |
Service Staying Down: No Response to STM | Impact | T1499.003 | 8 |
Service Staying Down: No Response to STM: Has IP | Application | none | 8 |
Sudden Increase in STM Response Times | Impact | T1499.002 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Server Hardware Critical | Hardware | none | 9 |
Server Hardware Warning | Hardware | none | 5 |
Storage Port Down | Impact | T1489 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Sudden Decrease in Reported Events From A Host | FortiSIEM | none | 7 |
Sudden Increase in Reported Events From A Host | Discovery | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Network Installed Software Change | Defense Evasion | T1218.001 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
UPS Battery Metrics Critical | UPS | none | 9 |
UPS Battery Status Critical | UPS | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Brute Force App Login Success | Credential Access | T1110.001 | 9 |
Excessive HTTP Client Side Errors | Impact | T1498.001 | 7 |
Excessive Web Request Failures | Application | none | 7 |
Repeated Multiple Logon Failures: Misc App | Credential Access | T1110.001 | 9 |
Web Traffic to Anomali ThreatStream Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiGuard Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiSandbox Malicious URLs | Exfiltration | T1041 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
NetBotz camera motion detected | Environmental | none | 7 |
NetBotz module door open | Environmental | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Critical APC Trap | Environmental | none | 9 |
Critical APC Trap: can be auto cleared | Environmental | none | 9 |
Warning APC Trap | Environmental | none | 7 |
Warning APC Trap: can be auto cleared | Environmental | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Armis Alert Detected | Behavioral Anomaly | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
ArubaOS-CX: Config Change Detected | Audit | none | 7 |
ArubaOS-CX: Multiple Users Deleted | Impact | T1531 | 9 |
ArubaOS-CX: User Added | Persistence | T1136.001 | 9 |
ArubaOS-CX: User Deleted | Impact | T1531 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Rogue or Unsecure AP Detected | Initial Access | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Multiple Logon Failures: WLAN | Credential Access | T1110.001 | 6 |
Repeated Multiple Logon Failures: WLAN | Credential Access | T1110.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
AWS EC2 Instance Down | Impact | T1529 | 4 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Web Traffic to Anomali ThreatStream Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiGuard Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiSandbox Malicious URLs | Exfiltration | T1041 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Web Traffic to Anomali ThreatStream Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiGuard Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiSandbox Malicious URLs | Exfiltration | T1041 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Barracuda WAF: Config Change Detected | Defense Evasion | T1562.004 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
DNS Traffic to Anomali ThreatStream Malware Domains | Exfiltration | T1048.001 | 9 |
DNS Traffic to FortiGuard Malware Domains | Exfiltration | T1048.001 | 9 |
Excessive Uncommon DNS Queries | Exfiltration | T1048.002 | 6 |
Outbreak: SUNBURST Domain Traffic | Command And Control | T1568.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Carbon Black Fatal Errors | Application | none | 8 |
Malware found but not remediated | Exfiltration | T1041 | 9 |
Malware outbreak | Lateral Movement | none | 9 |
Spyware found but not remediated | Execution | T1204.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Failed Checkpoint Firewall Policy Install | Audit | none | 8 |
Successful Checkpoint Firewall Policy Install | Audit | none | 7 |
Web Traffic to Anomali ThreatStream Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiGuard Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiSandbox Malicious URLs | Exfiltration | T1041 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Cisco ACI Cluster Unavailable | SDN | none | 9 |
Cisco ACI Critical Fault | SDN | none | 9 |
Cisco ACI Node Health Critical | SDN | none | 9 |
Cisco ACI Node Health Warning | SDN | none | 7 |
Cisco ACI System Health Critical | SDN | none | 9 |
Cisco ACI System Health Warning | SDN | none | 7 |
Cisco ACI Tenant Health Critical | SDN | none | 9 |
Cisco ACI Tenant Health Warning | SDN | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Spyware Found And Cleaned | Execution | T1204.001 | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Cisco AVC: Application Flows with QoS Queue Packet Drops | Application | none | 5 |
Cisco AVC: Application Response Time Late | Application | none | 7 |
Cisco AVC: P2P Applications that exceed interface utilization | Interface | none | 1 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Running Config Change: with login info | Defense Evasion | T1562.004 | 6 |
Startup Config Change: with login | Defense Evasion | T1562.004 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
High throughput VPN session | Audit | none | 7 |
Long lasting VPN session | Audit | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Degraded VoIP Call Quality | Impact | T1499.002 | 7 |
Poor VoIP Call Quality | Impact | T1499.002 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FireAMP Malicious file execution | Persistence | none | 9 |
Malware found but not remediated | Exfiltration | T1041 | 9 |
Malware outbreak | Lateral Movement | none | 9 |
Spyware found but not remediated | Execution | T1204.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Degraded IPSLA DNS Test | Impact | T1499.002 | 7 |
Degraded IPSLA ICMP Test | Impact | T1499.002 | 7 |
Degraded IPSLA UDP Echo Test | Impact | T1499.002 | 7 |
Degraded VoIP IPSLA Call Quality | Impact | T1499.002 | 7 |
IPSLA HTTP Test Failure | Impact | T1499.002 | 7 |
Poor VoIP IPSLA Call Quality | Impact | T1499.002 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Running Config Change: with login info | Defense Evasion | T1562.004 | 6 |
Startup Config Change: with login | Defense Evasion | T1562.004 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Suspicious Logon Failure without successful login - Scheduled | Credential Access | T1110.001 | 8 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Mail Hard Bounce Delivery Failures | Mail Server | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Meraki Device Cellular Connection Disconnected | Network | none | 7 |
Meraki Device Down | Impact | T1489 | 9 |
Meraki Device IP Conflict | Network | none | 7 |
Meraki Device Interface Down | Network | none | 7 |
Meraki Device Port Cable Error | Network | none | 8 |
Meraki Device VPN Connectivity Down | Network | none | 9 |
Meraki Foreign AP Detected | Policy Violation | none | 7 |
Meraki New DHCP Server | Network | none | 7 |
Meraki New Splash User | Persistence | T1098.001 | 7 |
Meraki No DHCP lease | Network | none | 7 |
Meraki Rogue DHCP Server | Policy Violation | none | 7 |
Meraki Unreachable Device | Network | none | 9 |
Meraki Unreachable RADIUS Server | Network | none | 9 |
Meraki VPN Failover | Network | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Cisco Umbrella: Failed DNS Requests to Malware Domains: Same source and Multiple Destinations | Command And Control | T1071.004 | 9 |
Cisco Umbrella: Intelligent Proxy Blocked a Malware Request by Policy | Command And Control | T1071.004 | 9 |
Cisco Umbrella: Multiple Failed DNS Requests to a Malware Domain: Same Source and Destination | Command And Control | T1071.004 | 9 |
DNS Traffic to Anomali ThreatStream Malware Domains | Exfiltration | T1048.001 | 9 |
DNS Traffic to FortiGuard Malware Domains | Exfiltration | T1048.001 | 9 |
Excessive Uncommon DNS Queries | Exfiltration | T1048.002 | 6 |
Outbreak: SUNBURST Domain Traffic | Command And Control | T1568.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Cisco Umbrella: Failed DNS Requests to Malware Domains: Same source and Multiple Destinations | Command And Control | T1071.004 | 9 |
Cisco Umbrella: Intelligent Proxy Blocked a Malware Request by Policy | Command And Control | T1071.004 | 9 |
Cisco Umbrella: Multiple Failed DNS Requests to a Malware Domain: Same Source and Destination | Command And Control | T1071.004 | 9 |
DNS Traffic to Anomali ThreatStream Malware Domains | Exfiltration | T1048.001 | 9 |
DNS Traffic to FortiGuard Malware Domains | Exfiltration | T1048.001 | 9 |
Excessive Uncommon DNS Queries | Exfiltration | T1048.002 | 6 |
Outbreak: SUNBURST Domain Traffic | Command And Control | T1568.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Multiple Logon Failures: WLAN | Credential Access | T1110.001 | 6 |
Repeated Multiple Logon Failures: WLAN | Credential Access | T1110.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Excessive Rogue or Unsecure APs Detected | Initial Access | none | 9 |
Wireless Host Blacklisted | Policy Violation | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Rogue or Unsecure AP Detected | Initial Access | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
CyberArk Vault Blocked Operations | Credential Access | none | 8 |
CyberArk Vault CPM Password Disabled | Credential Access | none | 8 |
CyberArk Vault Excessive Failed PSM Connections | Credential Access | none | 8 |
CyberArk Vault Excessive Impersonations | Credential Access | none | 8 |
CyberArk Vault Excessive PSM Keystroke Logging Failure | Credential Access | none | 8 |
CyberArk Vault Excessive PSM Session Monitoring Failure | Credential Access | T1110.001 | 8 |
CyberArk Vault Excessive Password Release Failure | Credential Access | T1110.001 | 8 |
CyberArk Vault File Operation Failure | Credential Access | none | 8 |
CyberArk Vault Object Content Validation Failure | Credential Access | none | 8 |
CyberArk Vault Unauthorized User Stations | Credential Access | none | 8 |
CyberArk Vault User History Clear | Defense Evasion | T1070.003 | 8 |
Name | Tactic | Technique | Severity |
---|---|---|---|
CyberX Detected Malware | Behavioral Anomaly | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Cylance Blocked Exploit | Execution | none | 7 |
Cylance Found Active Script | Execution | none | 7 |
Cylance Found Corrupt File | Impact | none | 7 |
Cylance High Severity Threat | Persistence | none | 9 |
Cylance Low Severity Threat | Persistence | none | 3 |
Cylance Medium Severity Threat | Persistence | none | 7 |
Cylance Quarantined Host | Execution | none | 7 |
Cylance Waived Threat | Execution | none | 3 |
CylanceProtect Threat Changed | Execution | none | 7 |
Malware found but not remediated | Exfiltration | T1041 | 9 |
Malware outbreak | Lateral Movement | none | 9 |
Spyware found but not remediated | Execution | T1204.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
EqualLogic Connection Read/Write Latency Critical | Impact | T1499.001 | 9 |
EqualLogic Connection Read/Write Latency Warning | Impact | T1499.001 | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Scanner found medium vulnerability | Impact | T1499.004 | 7 |
Scanner found severe vulnerability | Impact | T1499.004 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Unregistered EMC Clariion Host | Storage | none | 4 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Brute Force App Login Success | Credential Access | T1110.001 | 9 |
Repeated Multiple Logon Failures: Misc App | Credential Access | T1110.001 | 9 |
Web Traffic to Anomali ThreatStream Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiGuard Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiSandbox Malicious URLs | Exfiltration | T1041 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FireEye HX IOC found | Persistence | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FireEye Malware Callback | Exfiltration | T1041 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Sudden Increase In Firewall Connections | Impact | T1498.001 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiAnalyzer: No logs received from a device in 4 hours | Network | none | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Scanner found medium vulnerability | Impact | T1499.004 | 7 |
Scanner found severe vulnerability | Impact | T1499.004 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Account Locked: Network Device | Credential Access | T1110.001 | 9 |
FortiDeceptor: IPS Attack to Decoy | Lateral Movement | none | 9 |
FortiDeceptor: Successful FTP/TFTP Operations to Decoy | Initial Access ICS | T0886 | 9 |
FortiDeceptor: Successful IOT SCADA Operations to Decoy | Initial Access ICS | T0886 | 9 |
FortiDeceptor: Successful RDP Login to Decoy | Initial Access ICS | T0886 | 9 |
FortiDeceptor: Successful SAMBA Operations to Decoy | Initial Access ICS | T0886 | 9 |
FortiDeceptor: Successful SSH Login to Decoy | Initial Access ICS | T0886 | 9 |
Suspicious logon attempt | Credential Access | T1110.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiEDR: Inconclusive or PUP Process Blocked | Execution | T1204.002 | 7 |
FortiEDR: Inconclusive or PUP Process Detected | Execution | T1204.002 | 8 |
FortiEDR: Likely Safe Process Blocked | Execution | T1204.002 | 2 |
FortiEDR: Likely Safe Process Detected | Execution | T1204.002 | 4 |
FortiEDR: Malicious Process Blocked | Execution | T1204.002 | 9 |
FortiEDR: Malicious Process Detected | Execution | T1204.002 | 10 |
FortiEDR: Safe Process Blocked | Execution | T1204.002 | 1 |
FortiEDR: Safe Process Detected | Execution | T1204.002 | 3 |
FortiEDR: Suspicious Process Blocked | Execution | T1204.002 | 7 |
FortiEDR: Suspicious Process Detected | Execution | T1204.002 | 8 |
Malware found but not remediated | Exfiltration | T1041 | 9 |
Malware outbreak | Lateral Movement | none | 9 |
Spyware found but not remediated | Execution | T1204.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Malware found but not remediated | Exfiltration | T1041 | 9 |
Malware outbreak | Lateral Movement | none | 9 |
Outbreak: Apache RocketMQ RCE Vuln Detected on Network | Lateral Movement | T1210 | 9 |
Outbreak: Multiple Vendor Camera System Attack Detected on Network | Lateral Movement | T1210 | 9 |
Outbreak: Nice Linear eMerge Command Injection Vuln Detected on Network | Lateral Movement | T1210 | 9 |
Outbreak: SolarView Compact Command Injection Vuln Detected on Network | Lateral Movement | T1210 | 9 |
Outbreak: VMware Aria Operations for Networks Command Injection Vuln Detected on Network | Lateral Movement | T1210 | 9 |
Spyware found but not remediated | Execution | T1204.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiMail Failover | Mail Server | none | 7 |
FortiMail: AntiVirus Phishing URL found | Collection | T1114.001 | 9 |
FortiMail: Antispam Malicious URL found | Collection | T1114.001 | 9 |
FortiMail: Malicious Spam File Attachment Found | Collection | T1114.001 | 9 |
Malware found in mail | Collection | T1114.001 | 9 |
Outbreak: DARKSIDE Ransomware File Activity Detected on Network | Exfiltration | T1041 | 9 |
Outbreak: DEARCRY Infected File Detected on Network | Exploit | none | 9 |
Spam/Malicious Mail Attachment found but not remediated | Collection | T1114.001 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Outbreak: FortiManager Command Execution Vulnerability Detected on Device | Lateral Movement | T1210 | 9 |
Outbreak: FortiManager Command Execution Vulnerability Detected on Network | Lateral Movement | T1210 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiNDR Cloud: High Severity Detection triggered for a Host | Privilege Escalation | T1068 | 9 |
FortiNDR Cloud: Low Severity Detection triggered for a Host | Privilege Escalation | T1068 | 4 |
FortiNDR Cloud: Moderate Severity Detection triggered for a Host | Privilege Escalation | T1068 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiNDR: Attack Chain Blocked | Malware | none | 8 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiNDR: Attack Chain Permitted | Malware | none | 10 |
Outbreak: DARKSIDE Ransomware File Activity Detected on Network | Exfiltration | T1041 | 9 |
Outbreak: DEARCRY Infected File Detected on Network | Exploit | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Exposed Service Detected on Host | Lateral Movement | T1210 | 9 |
FortiRecon: Certificate Issue Found for an Asset | Lateral Movement | T1210 | 9 |
FortiRecon: High Severity Reputation Issue Found for an Asset | Lateral Movement | T1210 | 9 |
FortiRecon: Leaked Credit or Debit Cards Found Online | Collection | T1119 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiSandbox detects Botnet | Command and Control | none | 9 |
FortiSandbox detects Network Attack | Execution | none | 7 |
FortiSandbox detects Phishing URL | Execution | T1204.001 | 9 |
FortiSandbox detects URL Malware | Exfiltration | T1041 | 9 |
FortiSandbox detects file malware with high or medium risk | Exfiltration | T1041 | 9 |
FortiSandbox detects malicious file malware from file upload | Exfiltration | T1041 | 9 |
FortiSandbox detects multiple attacks from same source | Lateral Movement | none | 9 |
FortiSandbox detects multiple hosts with infected files | Exfiltration | T1041 | 9 |
FortiSandbox detects unknown risk file malware | Exfiltration | T1041 | 7 |
Outbreak: DARKSIDE Ransomware File Activity Detected on Host | Exfiltration | T1041 | 9 |
Outbreak: DEARCRY Infected File Detected on Host | Exploit | none | 9 |
Outbreak: SUNBURST Suspicious File Hash Match | Command and Control | none | 9 |
Outbreak: SUNBURST Suspicious File Hash match by Source and Destination | Command And Control | T1095 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiSIEM DB Leader Changed | FortiSIEM | none | 7 |
FortiSIEM Replication Leader Changed | FortiSIEM | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Machine Learning Anomaly Detected | Policy Violation | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Sudden Increase In System CPU Usage | Impact | T1499.001 | 7 |
Sudden Increase in Network Interface Errors | Interface | none | 7 |
Sudden Increase in Network Interface Traffic | Impact | T1498.001 | 7 |
Sudden Increase in System Memory Usage | Impact | T1499.001 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Account Locked: Network Device | Credential Access | T1110.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FortiWeb: Permitted Inbound Attack Detected | Lateral Movement | T1210 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Running Config Change: with login info | Defense Evasion | T1562.004 | 6 |
Startup Config Change: with login | Defense Evasion | T1562.004 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Google Workspace: 2FA Enforcement Disabled for Organization | Audit | none | 9 |
Google Workspace: 2FA Verification Disabled for Organization | Audit | none | 10 |
Google Workspace: API Access Permitted for OAUTH Client | Persistence | T1098.001 | 7 |
Google Workspace: Application Added to Domain | Audit | none | 9 |
Google Workspace: Domain added to Trusted Domains List | Audit | none | 9 |
Google Workspace: Password Management Policy Changed | Audit | none | 9 |
Google Workspace: Role Assigned to User | Persistence | T1098.001 | 9 |
Google Workspace: Role Created by User | Persistence | T1098.001 | 9 |
Google Workspace: Role Deleted by User | Audit | none | 9 |
Google Workspace: Role Modified by User | Persistence | T1098.001 | 9 |
Uncommon GSuite Login | Initial Access | T1078.004 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Suspicious Logon Failure without successful login - Scheduled | Credential Access | T1110.001 | 8 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Database DDL changes | Audit | none | 7 |
Database user or group changes | Persistence | T1098.001 | 7 |
Multiple Logon Failures: Database | Credential Access | T1110.001 | 9 |
Multiple Logon Failures: Misc App | Credential Access | T1110.001 | 6 |
Repeated Multiple Logon Failures: Database | Credential Access | T1110.001 | 9 |
Repeated Multiple Logon Failures: Misc App | Credential Access | T1110.001 | 9 |
Suspicious Database Logon | Initial Access | T1078.003 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Excessive Uncommon DNS Queries | Exfiltration | T1048.002 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Isilon Protocol Latency Critical | Impact | T1499.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Brute Force App Login Success | Credential Access | T1110.001 | 9 |
Repeated Multiple Logon Failures: Misc App | Credential Access | T1110.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Suspicious Logon Failure without successful login - Scheduled | Credential Access | T1110.001 | 8 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Failed VPN Logon From Outside My Country | Credential Access | T1110.001 | 7 |
Multiple Logon Failures: VPN | Credential Access | T1110.001 | 6 |
Successful VPN Logon From Outside My Country | Credential Access | T1110.001 | 7 |
Brute Force App Login Success | Credential Access | T1110.001 | 9 |
Concurrent Successful VPN Authentications To Same Account From Different Countries | Credential Access | T1110.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
FPC Current THD high | Environmental | none | 9 |
FPC Voltage THD high | Environmental | none | 9 |
FPC ground current high | Environmental | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
HVAC humidity high | HVAC | none | 9 |
HVAC humidity low | HVAC | none | 9 |
HVAC temp high | HVAC | none | 9 |
HVAC temp low | HVAC | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Linux: Creation of Kernel Module | Persistence | T1547.006 | 5 |
Linux: Creation or Modification of Systemd Service | Persistence | T1543.002 | 5 |
Linux: Job Schedule Modification | Persistence | T1053.003 | 5 |
Linux: Modifications of .bash-profile and .bashrc | Persistence | T1546.004 | 7 |
Linux: Sudoers File Modification | Privilege Escalation | T1548.003 | 9 |
Modification of ld.so.preload | Defense Evasion | T1055.009 | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Agent FIM: Linux Directory Ownership or Permission Changed | Defense Evasion | T1222.002,T1565.001 | 7 |
Agent FIM: Linux File Changed From Baseline | Defense Evasion | T1070.004,T1565.001 | 7 |
Agent FIM: Linux File Ownership or Permission Changed | Defense Evasion | T1222.002,T1565.001 | 9 |
Agent FIM: Linux File or Directory Created | Collection | T1074.001,T1565.001 | 7 |
Agent FIM: Linux File or Directory Deleted | Defense Evasion | T1070.004,T1565.001 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Database Server Disk Latency Critical | Storage I/O | none | 8 |
Important process down | Impact | T1489 | 7 |
Important process staying Down | Impact | T1489 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Uncommon Linux process Created | Defense Evasion | T1036.004 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
High Process CPU: Server | Impact | T1499.003 | 8 |
High Process Memory: Server | Impact | T1499.003 | 8 |
Server CPU Critical | Impact | T1499.001 | 9 |
Server CPU Warning | Impact | T1499.001 | 5 |
Server Disk Latency Critical | Impact | T1499.001 | 9 |
Server Disk Latency Warning | Impact | T1499.001 | 5 |
Server Disk Space Critical | Impact | T1499.001 | 9 |
Server Disk space Warning | Impact | T1499.001 | 5 |
Server Installed Software Change | Defense Evasion | T1218.001 | 6 |
Server Intf Error Critical | Impact | T1499.001 | 9 |
Server Intf Error Warning | Impact | T1499.001 | 5 |
Server Intf Util Critical | Impact | T1499.001 | 9 |
Server Intf Util Warning | Impact | T1499.001 | 5 |
Server Memory Critical | Impact | T1499.001 | 9 |
Server Memory Warning | Impact | T1499.001 | 5 |
Server Network Low Port Staying Down | Network | none | 7 |
Server Swap Memory Critical | Impact | T1499.001 | 9 |
Sudden Increase in Server Process Count | Impact | T1499.001 | 7 |
Unix Server Health: Critical | Impact | T1499.001 | 9 |
Unix Server Health: Warning | Impact | T1499.001 | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Sudden Increase in Failed Logons To A Host | Initial Access | T1078.003 | 7 |
Sudden Increase in Successful Logons To A Host | Initial Access | T1078.003 | 7 |
Uncommon Linux SSH Login | Initial Access | T1078.002 | 7 |
Uncommon VPN Login | Initial Access | T1078.002 | 7 |
Uncommon Windows Server Login | Initial Access | T1078.002 | 7 |
Uncommon Windows Service | Defense Evasion | T1036.004 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
MS 365 Defender: Delivery Detected | Impact | none | 8 |
MS 365 Defender: Exploit Detected | Execution | none | 9 |
MS 365 Defender: Malware Detected | Exfiltration | T1041 | 9 |
MS 365 Defender: Persistence Detected | Persistence | none | 8 |
MS 365 Defender: Suspicious Activity Detected | Persistence | none | 7 |
MS 365 Defender: Unwanted Software Detected | Persistence | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
MS 365 Defender: Generic Alert | PH_RULE_SECURITY_Suspicious_Activity | none | 7 |
MS 365 Defender: Incident Triggered | Suspicious Activity | none | 7 |
MS 365 Defender: Ingress Tool Transfer Alert | Command And Control | T1105 | 7 |
MS 365 Defender: LSASS Memory - Credential Access Alert | Credential Access | T1003.001 | 9 |
MS 365 Defender: Masquerading - Execution Alert | Defense Evasion | T1036.004 | 9 |
MS 365 Defender: OS Credential Dumping - Suspicious Activity Alert | Credential Access | T1003.007 | 9 |
MS 365 Defender: Process Injection - Defense Evasion Alert | Defense Evasion | T1055.001 | 9 |
MS 365 Defender: Suspicious PowerShell command line Execution Alert | Execution | T1059.001 | 7 |
MS 365 Defender: Suspicious Process Discovery - Discovery Alert | Discovery | T1057 | 7 |
MS 365 Defender: Suspicious Task Scheduler activity - Persistence Alert | Persistence | T1053.002 | 9 |
MS 365 Defender: System Network Configuration Discovery - Discovery Alert | Discovery | T1016.001 | 6 |
MS 365 Defender: System Service Discovery - Discovery Alert | Discovery | T1007 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Azure Infrastructure Discovery | Discovery | T1580 | 3 |
Azure Service Discovery | Discovery | T1526 | 3 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Microsoft ATA Center: Security Alert Triggered | Behavioral Anomaly | none | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Malware found but not remediated | Exfiltration | T1041 | 9 |
Malware outbreak | Lateral Movement | none | 9 |
Spyware found but not remediated | Execution | T1204.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Excessive Uncommon DNS Queries | Exfiltration | T1048.002 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Microsoft Entra: Identity Protection Risky User Identified | Resource Development | T1586.002 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Exchange Server Mailbox Queue high | Impact | T1499.002 | 7 |
Exchange Server RPC latency high | Impact | T1499.002 | 7 |
Exchange Server RPC request high | Impact | T1499.002 | 7 |
Exchange Server SMTP Queue high | Impact | T1499.002 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
HyperV Logical Processor Total Run Time Percent Critical | Impact | T1499.001 | 5 |
HyperV Disk I/O Warning | Impact | T1499.001 | 5 |
HyperV Disk Latency Critical | Impact | T1499.001 | 9 |
HyperV Guest Critical | Impact | T1499.001 | 9 |
HyperV Guest Hypervisor Run Time Percent Warning | Impact | T1499.001 | 7 |
HyperV Logical Processor Total Run Time Percent Warning | Impact | T1499.001 | 7 |
HyperV Page fault Critical | Impact | T1499.001 | 9 |
HyperV Page fault Warning | Impact | T1499.001 | 7 |
HyperV Remaining Guest Memory Warning | Impact | T1499.001 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
IIS Virtual Memory Critical | Impact | T1499.003 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Excessive FTP Client Side Errors | Impact | T1498.001 | 7 |
Excessive HTTP Client Side Errors | Impact | T1498.001 | 7 |
Excessive Web Request Failures | Application | none | 7 |
Outbreak: HAFNIUM Exchange OWA Server Authentication Bypass | Command and Control | none | 9 |
Web Traffic to Anomali ThreatStream Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiGuard Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiSandbox Malicious URLs | Exfiltration | T1041 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Brute Force App Login Success | Credential Access | T1110.001 | 9 |
Repeated Multiple Logon Failures: Misc App | Credential Access | T1110.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Uncommon Azure Portal Login | Initial Access | T1078.004 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Database DDL changes | Audit | none | 7 |
Database user or group changes | Persistence | T1098.001 | 7 |
Excessively Slow SQL Server DB Query | Database | none | 7 |
Multiple Logon Failures: Database | Credential Access | T1110.001 | 9 |
Multiple Logon Failures: Misc App | Credential Access | T1110.001 | 6 |
MySQL Database Instance Down | Impact | T1489 | 9 |
Repeated Multiple Logon Failures: Database | Credential Access | T1110.001 | 9 |
Repeated Multiple Logon Failures: Misc App | Credential Access | T1110.001 | 9 |
SQL Server Excessive Blocking | Database | none | 7 |
SQL Server Excessive Deadlock | Database | none | 7 |
SQL Server Excessive Full Scan | Discovery | T1046 | 7 |
SQL Server Excessive Page Read/Write | Database | none | 7 |
SQL Server Low Buffer Cache Hit Ratio | Database | none | 7 |
SQL Server Low Free Pages in Buffer Pool | Database | none | 7 |
SQL Server Low Log Cache Hit Ratio | Database | none | 7 |
Slow MySQL DB Query | Database | none | 7 |
Suspicious Database Logon | Initial Access | T1078.003 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows: Deployment AppX Package Was Blocked By AppLocker | Persistence | none | 5 |
Windows: Deployment Of The AppX Package Was Blocked By The Policy | Persistence | none | 5 |
Windows: Potential Malicious AppX Package Installation Attempts | Persistence | none | 5 |
Windows: Suspicious AppX Package Installation Attempt | Persistence | none | 5 |
Windows: Suspicious AppX Package Locations | Persistence | none | 7 |
Windows: Suspicious Digital Signature Of AppX Package | Persistence | none | 5 |
Windows: Suspicious Remote AppX Package Locations | Persistence | none | 7 |
Windows: Uncommon AppX Package Locations | Persistence | none | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows: BITS Transfer Job Download To Potential Suspicious Folder | Defense Evasion | T1197 | 7 |
Windows: BITS Transfer Job With Uncommon Or Suspicious Remote TLD | Defense Evasion | T1197 | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Self-signed Windows Certificate Added | none | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows: Code Integrity Attempted DLL Load | Persistence | none | 7 |
Windows: Code Integrity Blocked Driver Load | Persistence | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows: Loading Diagcab Package From Remote Path | Persistence | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows DNS Server: Suspicious DNS Traffic Resolved | Behavioral Anomaly | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
DNS Traffic to Anomali ThreatStream Malware Domains | Exfiltration | T1048.001 | 9 |
DNS Traffic to FortiGuard Malware Domains | Exfiltration | T1048.001 | 9 |
Outbreak: SUNBURST Domain Traffic | Command And Control | T1568.001 | 9 |
Windows: DNS Query for Anonfiles.com Domain - DNS Client | Exfiltration | T1567.002 | 7 |
Windows: DNS Query for Ufile.io Upload Domain - DNS Client | Exfiltration | T1567.002 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Agent FIM: Windows File Changed From Baseline | Defense Evasion | T1070.004,T1565.001 | 7 |
Agent FIM: Windows File Content Modified | Defense Evasion | T1070.004,T1565.001 | 7 |
Agent FIM: Windows File Ownership Changed | Defense Evasion | T1070.004,T1565.001 | 7 |
Agent FIM: Windows File Permission Changed | Defense Evasion | T1222.001,T1565.001 | 7 |
Agent FIM: Windows File or Directory Archive Bit Changed | Defense Evasion | T1070.004,T1565.001 | 7 |
Agent FIM: Windows File or Directory Created | Collection | T1074.001,T1565.001 | 7 |
Agent FIM: Windows File or Directory Deleted | Defense Evasion | T1070.004,T1565.001 | 7 |
Windows Server USB File Write | Exfiltration | T1052.001 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows: New Firewall Exception Rule Added For A Suspicious Folder | Persistence | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows: Failed MSExchange Transport Agent Installation | Persistence | T1505.002 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows: OpenSSH Server Listening On Socket | Lateral Movement | T1021.004 | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Common Windows process launched by unusual parent | Persistence | T1037.001 | 8 |
Common Windows process launched from unusual path | Persistence | T1037.001 | 8 |
Windows Debugger registry key for common Windows accessibility tools | Privilege Escalation | T1574.002 | 8 |
Windows Process with deleted binaries | Defense Evasion | T1070.004 | 8 |
Windows process communicating outbound to unusual ports | Execution | T1129 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Malicious PowerShell Tool: PSAttack Detected | Execution | T1059.001 | 9 |
PowerShell Commandlet of Well Known Exploitation Framework Detected | Execution | T1059.001 | 9 |
PowerShell Downgrade Attack Detected | Lateral Movement | T1210 | 8 |
PowerShell Script Detected Calling a Credential Prompt | Execution | T1059.001 | 9 |
Windows: Powershell opening TCP Connection | Command and Control | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows: Dump Ntds.dit To Suspicious Location | Persistence | none | 5 |
Windows: Ntdsutil Abuse | Persistence | none | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows: Suspicious Application Installed | Persistence | none | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows Task Scheduler: Task Registered | Execution | T1053.002 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Windows: Ngrok Usage with Remote Desktop Service | Persistence | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Successful Windows Dormant Account Logon | Credential Access | T1110.001 | 9 |
Windows Dormant Account Detected | Credential Access | T1110.001 | 4 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Server Installed Software Change | Defense Evasion | T1218.001 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Sudden Increase in WMI or OMI Response Times | Impact | T1499.002 | 7 |
WMI or OMI Service Unavailable | Impact | T1489 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Malware found in mail | Collection | T1114.001 | 9 |
Mimecast: User clicked malicious link in email | Reconnaissance | T1598.003 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Multiple Logon Failures: WLAN | Credential Access | T1110.001 | 6 |
Repeated Multiple Logon Failures: WLAN | Credential Access | T1110.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Multiple Logon Failures: WLAN | Credential Access | T1110.001 | 6 |
Repeated Multiple Logon Failures: WLAN | Credential Access | T1110.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
NetApp Back to Back Consistency Point | Impact | T1499.001 | 9 |
NetApp CIFS Latency Critical | Impact | T1499.001 | 9 |
NetApp CIFS Read/Write Latency Warning | Impact | T1499.001 | 5 |
NetApp FCP Read/Write Latency Critical | Impact | T1499.001 | 9 |
NetApp FCP Read/Write Latency Warning | Impact | T1499.001 | 5 |
NetApp ISCSI Read/Write Latency Critical | Impact | T1499.001 | 9 |
NetApp ISCSI Read/Write Latency Warning | Impact | T1499.001 | 5 |
NetApp NFS Read/Write Latency Critical | Impact | T1499.001 | 9 |
NetApp NFS Read/Write Latency Warning | Impact | T1499.001 | 5 |
NetApp Volume Read/Write Latency Critical | Impact | T1499.001 | 9 |
NetApp Volume Read/Write Latency Warning | Impact | T1499.001 | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Critical NetApp Trap | Storage | none | 9 |
Critical NetApp Trap: can be auto cleared | Storage | none | 9 |
Warning NetApp Trap | Storage | none | 7 |
Warning NetApp Trap: can be auto cleared | Storage | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Multiple Login Failures: Net Device: No Source IP | Credential Access | T1110.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Excessive Repeated DNS Queries To Same Domain | Command And Control | T1568.001 | 6 |
Suspicious Botnet like End host DNS Behavior | Command and Control | none | 6 |
Executable file posting from external source | Execution | none | 9 |
Unapproved File Execution | Execution | none | 8 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Excessive Web Request Failures | Application | none | 7 |
Web Traffic to Anomali ThreatStream Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiGuard Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiSandbox Malicious URLs | Exfiltration | T1041 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Database DDL changes | Audit | none | 7 |
Database user or group changes | Persistence | T1098.001 | 7 |
Multiple Logon Failures: Database | Credential Access | T1110.001 | 9 |
Multiple Logon Failures: Misc App | Credential Access | T1110.001 | 6 |
Repeated Multiple Logon Failures: Database | Credential Access | T1110.001 | 9 |
Repeated Multiple Logon Failures: Misc App | Credential Access | T1110.001 | 9 |
Suspicious Database Logon | Initial Access | T1078.003 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Excessively Slow Oracle DB Query | Database | none | 7 |
High Oracle Non-System Table Space Usage | Database | none | 7 |
High Oracle System Table Space Usage | Database | none | 7 |
Oracle DB Alert Log Error | Database | none | 8 |
Oracle DB Low Buffer Cache Hit Ratio | Database | none | 7 |
Oracle DB Low Library Cache Hit Ratio | Database | none | 7 |
Oracle DB Low Row Cache Hit Ratio | Database | none | 7 |
Oracle DB Low Row Memory Sorts Ratio | Memory | none | 7 |
Oracle Database Instance Down | Impact | T1489 | 9 |
Oracle Database Listener Down | Impact | T1489 | 9 |
Oracle Database not backed up for 1 day | Database | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Oracle OCI: Customer Secret Key Created | Persistence | T1098.001 | 9 |
Oracle OCI: Group Created | Persistence | T1098.001 | 7 |
Oracle OCI: Policy Created | Defense Evasion | T1562.007 | 7 |
Oracle OCI: Policy Deleted | Defense Evasion | T1562.007 | 7 |
Oracle OCI: User API Key Created and Uploaded | Persistence | T1098.001 | 7 |
Oracle OCI: User Activated MFA | Audit | none | 4 |
Oracle OCI: User Added to a Group | Persistence | T1098.001 | 9 |
Oracle OCI: User Auth Token Created | Persistence | T1098.001 | 7 |
Oracle OCI: User Created | Persistence | T1136.003 | 9 |
Oracle OCI: User Deleted | Impact | T1531 | 9 |
Oracle OCI: User Disabled MFA | Persistence | T1098.001 | 9 |
Oracle OCI: User OAuth Client Credential Created | Persistence | T1098.001 | 9 |
Oracle OCI: User SMTP Credentials Created | Resource Development | T1585.002 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Otorio RAM2 Alert has Triggered | Policy Violation | none | 9 |
Otorio RAM2 Vulnerability Discovered | Policy Violation | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Cortex XDR Alert Detected | Behavioral Anomaly | none | 9 |
Cortex XDR Alert Prevented | Behavioral Anomaly | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Malware found but not remediated | Exfiltration | T1041 | 9 |
Malware outbreak | Lateral Movement | none | 9 |
Spyware found but not remediated | Execution | T1204.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Excessive Postfix gateway connection failures | Impact | T1499.002 | 8 |
Excessive Postfix mail send error | Impact | T1499.002 | 8 |
Excessive Postfix mail send latency | Collection | T1114.001 | 6 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Scanner found medium vulnerability | Impact | T1499.004 | 7 |
Scanner found severe vulnerability | Impact | T1499.004 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Radvision Corrupt video packets | Video Conferencing | none | 7 |
Radvision Ethernet Loss | Impact | T1489 | 7 |
Radvision Gateway Down | Impact | T1489 | 9 |
Radvision Hardware Removed/Swapped | Video Conferencing | none | 7 |
Radvision ISDN Loss | Impact | T1489 | 7 |
Radvision call setup issues | Video Conferencing | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Scanner found medium vulnerability | Impact | T1499.004 | 7 |
Scanner found severe vulnerability | Impact | T1499.004 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
BGP Neighbor Down | Impact | T1529 | 9 |
OSPF Neighbor Down | Impact | T1529 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Malware found but not remediated | Exfiltration | T1041 | 9 |
Malware outbreak | Lateral Movement | none | 9 |
Spyware found but not remediated | Execution | T1204.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Rogue or Unsecure AP Detected | Initial Access | none | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Web Traffic to Anomali ThreatStream Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiGuard Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiSandbox Malicious URLs | Exfiltration | T1041 | 9 |
Website access policy violation | Policy Violation | none | 5 |
Website access policy violation: High volume | Policy Violation | none | 9 |
Website access policy violation: Multiple categories | Policy Violation | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Excessive HTTP Client Side Errors | Impact | T1498.001 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
NFS Disk space Warning | Impact | T1499.001 | 5 |
Storage CPU Warning | Impact | T1499.001 | 5 |
Storage Device CPU Critical | Impact | T1499.001 | 9 |
Storage Device Disk Space Critical | Impact | T1499.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
High Severity Symantec Host IPS Exploit | Execution | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Malware found but not remediated | Exfiltration | T1041 | 9 |
Malware outbreak | Lateral Movement | none | 9 |
Spyware found but not remediated | Execution | T1204.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Scanner found medium vulnerability | Impact | T1499.004 | 7 |
Scanner found severe vulnerability | Impact | T1499.004 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
ThreatDown Nebula: Malware Blocked | Initial Access | T1189 | 8 |
ThreatDown Nebula: Malware Found | Initial Access | T1189 | 10 |
ThreatDown Nebula: PUP Blocked | Defense Evasion | T1562.001 | 7 |
ThreatDown Nebula: PUP Found | Defense Evasion | T1562.001 | 6 |
ThreatDown Nebula: Suspicious Activity Blocked | Initial Access | T1189 | 8 |
ThreatDown Nebula: Suspicious Activity Found | Initial Access | T1189 | 9 |
ThreatDown Nebula: Website Blocked | Initial Access | T1189 | 7 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Trend Vision One: Critical or High Alert Triggered | Execution | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Website access policy violation | Policy Violation | none | 5 |
Website access policy violation: High volume | Policy Violation | none | 9 |
Website access policy violation: Multiple categories | Policy Violation | none | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
UserGate UTM IDPS Alert Detected | Behavioral Anomaly | none | 8 |
Web Traffic to Anomali ThreatStream Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiGuard Malicious URLs | Exfiltration | T1041 | 9 |
Web Traffic to FortiSandbox Malicious URLs | Exfiltration | T1041 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
ESX Server Health: Critical | Impact | T1499.001 | 9 |
ESX Server Health: Warning | Impact | T1499.001 | 7 |
Virtual Machine CPU Critical | Impact | T1499.001 | 9 |
Virtual Machine CPU Warning | Impact | T1499.001 | 5 |
Virtual Machine Health: Critical | Impact | T1499.001 | 9 |
Virtual Machine Health: Warning | Impact | T1499.001 | 5 |
Virtual Machine Memory Swapping Critical | Impact | T1499.001 | 9 |
Virtual Machine Memory Swapping Warning | Impact | T1499.001 | 5 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Database Server Disk Latency Critical | Storage I/O | none | 8 |
Datastore Space Warning | Impact | T1499.001 | 7 |
ESX CPU Critical | Impact | T1499.001 | 9 |
ESX CPU Warning | Impact | T1499.001 | 5 |
ESX Disk I/O Critical | Impact | T1499.001 | 9 |
ESX Disk I/O Warning | Impact | T1499.001 | 5 |
ESX Memory Critical | Impact | T1499.001 | 9 |
ESX Memory Warning | Impact | T1499.001 | 5 |
ESX Network I/O Critical | Impact | T1499.001 | 9 |
ESX Network I/O Warning | Impact | T1499.001 | 5 |
Sudden Increase in Disk I/O | Impact | T1499.001 | 7 |
VCenter Datastore Space Critical | Impact | T1499.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Attack Kill Chain Completion | Suspicious Activity | none | 9 |
Transient Windows Account Usage - Scheduled | Persistence | T1098.001 | 9 |
Name | Tactic | Technique | Severity |
---|---|---|---|
Suspicious Logon Failure without successful login - Scheduled | Credential Access | T1110.001 | 8 |