Detection rules

3297 catalog-relevant detection rules from Sigma, Elastic, and Splunk — 3297 parsed into the vendor-neutral intermediate representation, spanning 349 MITRE ATT&CK techniques. 9 equivalence classes group rules with identical canonical predicate form. Each rule page surfaces predicates, exclusions, and the indicators that other rules share with it.

3297 rules (counts update on filter)
Status:

Reconnaissance

Gather Victim Identity Information: Credentials T1589.001 1 rule
Gather Victim Identity Information: Email Addresses T1589.002 2 rules
Gather Victim Network Information T1590 4 rules
Gather Victim Network Information: Domain Properties T1590.001 1 rule
Gather Victim Network Information: DNS T1590.002 1 rule
Gather Victim Network Information: IP Addresses T1590.005 2 rules
Gather Victim Host Information T1592 3 rules
Gather Victim Host Information: Hardware T1592.001 1 rule
Search Open Websites/Domains: Code Repositories T1593.003 1 rule
Active Scanning T1595 2 rules
Active Scanning: Scanning IP Blocks T1595.001 1 rule
Active Scanning: Vulnerability Scanning T1595.002 1 rule

Resource Development

Compromise Infrastructure T1584 1 rule
Develop Capabilities T1587 1 rule
Develop Capabilities: Malware T1587.001 6 rules
Obtain Capabilities: Tool T1588.002 10 rules
Stage Capabilities T1608 2 rules

Initial Access

Valid Accounts T1078 35 rules
Valid Accounts: Default Accounts T1078.001 1 rule
Valid Accounts: Domain Accounts T1078.002 19 rules
Valid Accounts: Local Accounts T1078.003 2 rules
Replication Through Removable Media T1091 5 rules
External Remote Services T1133 17 rules
Drive-by Compromise T1189 2 rules
Exploit Public-Facing Application T1190 24 rules
Supply Chain Compromise T1195 7 rules
Supply Chain Compromise: Compromise Software Dependencies and Development Tools T1195.001 1 rule
Supply Chain Compromise: Compromise Software Supply Chain T1195.002 6 rules
Hardware Additions T1200 6 rules
Phishing T1566 8 rules
Phishing: Spearphishing Attachment T1566.001 30 rules
Phishing: Spearphishing Link T1566.002 6 rules

Execution

Windows Management Instrumentation T1047 48 rules
Scheduled Task/Job T1053 16 rules
Scheduled Task/Job: At T1053.002 2 rules
Scheduled Task/Job: Scheduled Task T1053.005 48 rules
Command and Scripting Interpreter T1059 94 rules
Command and Scripting Interpreter: PowerShell T1059.001 229 rules
Command and Scripting Interpreter: Windows Command Shell T1059.003 31 rules
Command and Scripting Interpreter: Visual Basic T1059.005 26 rules
Command and Scripting Interpreter: Python T1059.006 3 rules
Command and Scripting Interpreter: JavaScript T1059.007 20 rules
Software Deployment Tools T1072 6 rules
Native API T1106 13 rules
Shared Modules T1129 2 rules
Exploitation for Client Execution T1203 13 rules
User Execution T1204 8 rules
User Execution: Malicious Link T1204.001 3 rules
User Execution: Malicious File T1204.002 34 rules
User Execution: Malicious Copy and Paste T1204.004 6 rules
Inter-Process Communication T1559 6 rules
Inter-Process Communication: Component Object Model T1559.001 4 rules
Inter-Process Communication: Dynamic Data Exchange T1559.002 1 rule
System Services T1569 4 rules
System Services: Service Execution T1569.002 45 rules

Persistence

Boot or Logon Initialization Scripts T1037 1 rule
Boot or Logon Initialization Scripts: Logon Script (Windows) T1037.001 4 rules
Scheduled Task/Job T1053 16 rules
Scheduled Task/Job: At T1053.002 2 rules
Scheduled Task/Job: Scheduled Task T1053.005 48 rules
Valid Accounts T1078 35 rules
Valid Accounts: Default Accounts T1078.001 1 rule
Valid Accounts: Domain Accounts T1078.002 19 rules
Valid Accounts: Local Accounts T1078.003 2 rules
Account Manipulation T1098 55 rules
Account Manipulation: Additional Local or Domain Groups T1098.007 1 rule
Modify Registry T1112 149 rules
External Remote Services T1133 17 rules
Create Account T1136 3 rules
Create Account: Local Account T1136.001 15 rules
Create Account: Domain Account T1136.002 8 rules
Office Application Startup T1137 11 rules
Office Application Startup: Office Test T1137.002 1 rule
Office Application Startup: Outlook Forms T1137.003 1 rule
Office Application Startup: Add-ins T1137.006 4 rules
Software Extensions: Browser Extensions T1176.001 2 rules
BITS Jobs T1197 14 rules
Server Software Component: SQL Stored Procedures T1505.001 4 rules
Server Software Component: Transport Agent T1505.002 1 rule
Server Software Component: Web Shell T1505.003 16 rules
Server Software Component: IIS Components T1505.004 9 rules
Server Software Component: Terminal Services DLL T1505.005 1 rule
Pre-OS Boot T1542 1 rule
Pre-OS Boot: System Firmware T1542.001 2 rules
Pre-OS Boot: Bootkit T1542.003 2 rules
Create or Modify System Process T1543 18 rules
Create or Modify System Process: Windows Service T1543.003 50 rules
Event Triggered Execution T1546 15 rules
Event Triggered Execution: Change Default File Association T1546.001 6 rules
Event Triggered Execution: Screensaver T1546.002 5 rules
Event Triggered Execution: Windows Management Instrumentation Event Subscription T1546.003 14 rules
Event Triggered Execution: Netsh Helper DLL T1546.007 4 rules
Event Triggered Execution: Accessibility Features T1546.008 9 rules
Event Triggered Execution: AppCert DLLs T1546.009 3 rules
Event Triggered Execution: AppInit DLLs T1546.010 2 rules
Event Triggered Execution: Application Shimming T1546.011 8 rules
Event Triggered Execution: Image File Execution Options Injection T1546.012 4 rules
Event Triggered Execution: PowerShell Profile T1546.013 3 rules
Event Triggered Execution: Component Object Model Hijacking T1546.015 11 rules
Boot or Logon Autostart Execution T1547 11 rules
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder T1547.001 37 rules
Boot or Logon Autostart Execution: Authentication Package T1547.002 1 rule
Boot or Logon Autostart Execution: Time Providers T1547.003 2 rules
Boot or Logon Autostart Execution: Winlogon Helper DLL T1547.004 2 rules
Boot or Logon Autostart Execution: Security Support Provider T1547.005 2 rules
Boot or Logon Autostart Execution: Kernel Modules and Extensions T1547.006 2 rules
Boot or Logon Autostart Execution: LSASS Driver T1547.008 2 rules
Boot or Logon Autostart Execution: Shortcut Modification T1547.009 5 rules
Boot or Logon Autostart Execution: Port Monitors T1547.010 5 rules
Boot or Logon Autostart Execution: Print Processors T1547.012 6 rules
Boot or Logon Autostart Execution: Active Setup T1547.014 3 rules
Boot or Logon Autostart Execution: Login Items T1547.015 1 rule
Compromise Host Software Binary T1554 8 rules
Modify Authentication Process T1556 4 rules
Modify Authentication Process: Password Filter DLL T1556.002 3 rules
Hijack Execution Flow T1574 7 rules
Hijack Execution Flow: DLL T1574.001 91 rules
Hijack Execution Flow: Dylib Hijacking T1574.004 1 rule
Hijack Execution Flow: Executable Installer File Permissions Weakness T1574.005 2 rules
Hijack Execution Flow: Dynamic Linker Hijacking T1574.006 2 rules
Hijack Execution Flow: Path Interception by PATH Environment Variable T1574.007 3 rules
Hijack Execution Flow: Path Interception by Search Order Hijacking T1574.008 2 rules
Hijack Execution Flow: Path Interception by Unquoted Path T1574.009 1 rule
Hijack Execution Flow: Services Registry Permissions Weakness T1574.011 12 rules
Hijack Execution Flow: COR_PROFILER T1574.012 2 rules
Hijack Execution Flow: AppDomainManager T1574.014 1 rule

Privilege Escalation

Boot or Logon Initialization Scripts T1037 1 rule
Boot or Logon Initialization Scripts: Logon Script (Windows) T1037.001 4 rules
Scheduled Task/Job T1053 16 rules
Scheduled Task/Job: At T1053.002 2 rules
Scheduled Task/Job: Scheduled Task T1053.005 48 rules
Process Injection T1055 43 rules
Process Injection: Dynamic-link Library Injection T1055.001 8 rules
Process Injection: Portable Executable Injection T1055.002 4 rules
Process Injection: Thread Execution Hijacking T1055.003 2 rules
Process Injection: Extra Window Memory Injection T1055.011 1 rule
Process Injection: Process Hollowing T1055.012 5 rules
Exploitation for Privilege Escalation T1068 22 rules
Valid Accounts T1078 35 rules
Valid Accounts: Default Accounts T1078.001 1 rule
Valid Accounts: Domain Accounts T1078.002 19 rules
Valid Accounts: Local Accounts T1078.003 2 rules
Account Manipulation T1098 55 rules
Account Manipulation: Additional Local or Domain Groups T1098.007 1 rule
Access Token Manipulation T1134 12 rules
Access Token Manipulation: Token Impersonation/Theft T1134.001 13 rules
Access Token Manipulation: Create Process with Token T1134.002 9 rules
Access Token Manipulation: Make and Impersonate Token T1134.003 4 rules
Access Token Manipulation: Parent PID Spoofing T1134.004 1 rule
Access Token Manipulation: SID-History Injection T1134.005 6 rules
Domain or Tenant Policy Modification T1484 14 rules
Domain or Tenant Policy Modification: Group Policy Modification T1484.001 15 rules
Create or Modify System Process T1543 18 rules
Create or Modify System Process: Windows Service T1543.003 50 rules
Event Triggered Execution T1546 15 rules
Event Triggered Execution: Change Default File Association T1546.001 6 rules
Event Triggered Execution: Screensaver T1546.002 5 rules
Event Triggered Execution: Windows Management Instrumentation Event Subscription T1546.003 14 rules
Event Triggered Execution: Netsh Helper DLL T1546.007 4 rules
Event Triggered Execution: Accessibility Features T1546.008 9 rules
Event Triggered Execution: AppCert DLLs T1546.009 3 rules
Event Triggered Execution: AppInit DLLs T1546.010 2 rules
Event Triggered Execution: Application Shimming T1546.011 8 rules
Event Triggered Execution: Image File Execution Options Injection T1546.012 4 rules
Event Triggered Execution: PowerShell Profile T1546.013 3 rules
Event Triggered Execution: Component Object Model Hijacking T1546.015 11 rules
Boot or Logon Autostart Execution T1547 11 rules
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder T1547.001 37 rules
Boot or Logon Autostart Execution: Authentication Package T1547.002 1 rule
Boot or Logon Autostart Execution: Time Providers T1547.003 2 rules
Boot or Logon Autostart Execution: Winlogon Helper DLL T1547.004 2 rules
Boot or Logon Autostart Execution: Security Support Provider T1547.005 2 rules
Boot or Logon Autostart Execution: Kernel Modules and Extensions T1547.006 2 rules
Boot or Logon Autostart Execution: LSASS Driver T1547.008 2 rules
Boot or Logon Autostart Execution: Shortcut Modification T1547.009 5 rules
Boot or Logon Autostart Execution: Port Monitors T1547.010 5 rules
Boot or Logon Autostart Execution: Print Processors T1547.012 6 rules
Boot or Logon Autostart Execution: Active Setup T1547.014 3 rules
Boot or Logon Autostart Execution: Login Items T1547.015 1 rule
Abuse Elevation Control Mechanism T1548 11 rules
Abuse Elevation Control Mechanism: Bypass User Account Control T1548.002 70 rules
Hijack Execution Flow T1574 7 rules
Hijack Execution Flow: DLL T1574.001 91 rules
Hijack Execution Flow: Dylib Hijacking T1574.004 1 rule
Hijack Execution Flow: Executable Installer File Permissions Weakness T1574.005 2 rules
Hijack Execution Flow: Dynamic Linker Hijacking T1574.006 2 rules
Hijack Execution Flow: Path Interception by PATH Environment Variable T1574.007 3 rules
Hijack Execution Flow: Path Interception by Search Order Hijacking T1574.008 2 rules
Hijack Execution Flow: Path Interception by Unquoted Path T1574.009 1 rule
Hijack Execution Flow: Services Registry Permissions Weakness T1574.011 12 rules
Hijack Execution Flow: COR_PROFILER T1574.012 2 rules
Hijack Execution Flow: AppDomainManager T1574.014 1 rule
Escape to Host T1611 1 rule

Defense Evasion

Direct Volume Access T1006 1 rule
Rootkit T1014 2 rules
Obfuscated Files or Information T1027 106 rules
Obfuscated Files or Information: Binary Padding T1027.001 1 rule
Obfuscated Files or Information: Software Packing T1027.002 1 rule
Obfuscated Files or Information: Steganography T1027.003 1 rule
Obfuscated Files or Information: Compile After Delivery T1027.004 5 rules
Obfuscated Files or Information: Indicator Removal from Tools T1027.005 6 rules
Obfuscated Files or Information: Embedded Payloads T1027.009 1 rule
Obfuscated Files or Information: Command Obfuscation T1027.010 19 rules
Obfuscated Files or Information: Fileless Storage T1027.011 3 rules
Obfuscated Files or Information: Encrypted/Encoded File T1027.013 1 rule
Masquerading T1036 49 rules
Masquerading: Right-to-Left Override T1036.002 4 rules
Masquerading: Rename Legitimate Utilities T1036.003 26 rules
Masquerading: Masquerade Task or Service T1036.004 1 rule
Masquerading: Match Legitimate Resource Name or Location T1036.005 14 rules
Masquerading: Double File Extension T1036.007 3 rules
Masquerading: Masquerade File Type T1036.008 1 rule
Masquerading: Break Process Trees T1036.009 2 rules
Process Injection T1055 43 rules
Process Injection: Dynamic-link Library Injection T1055.001 8 rules
Process Injection: Portable Executable Injection T1055.002 4 rules
Process Injection: Thread Execution Hijacking T1055.003 2 rules
Process Injection: Extra Window Memory Injection T1055.011 1 rule
Process Injection: Process Hollowing T1055.012 5 rules
Indicator Removal T1070 24 rules
Indicator Removal: Clear Windows Event Logs T1070.001 10 rules
Indicator Removal: Clear Command History T1070.003 9 rules
Indicator Removal: File Deletion T1070.004 15 rules
Indicator Removal: Network Share Connection Removal T1070.005 4 rules
Indicator Removal: Timestomp T1070.006 4 rules
Valid Accounts T1078 35 rules
Valid Accounts: Default Accounts T1078.001 1 rule
Valid Accounts: Domain Accounts T1078.002 19 rules
Valid Accounts: Local Accounts T1078.003 2 rules
Modify Registry T1112 149 rules
Trusted Developer Utilities Proxy Execution T1127 22 rules
Trusted Developer Utilities Proxy Execution: MSBuild T1127.001 3 rules
Access Token Manipulation T1134 12 rules
Access Token Manipulation: Token Impersonation/Theft T1134.001 13 rules
Access Token Manipulation: Create Process with Token T1134.002 9 rules
Access Token Manipulation: Make and Impersonate Token T1134.003 4 rules
Access Token Manipulation: Parent PID Spoofing T1134.004 1 rule
Access Token Manipulation: SID-History Injection T1134.005 6 rules
Deobfuscate/Decode Files or Information T1140 25 rules
BITS Jobs T1197 14 rules
Indirect Command Execution T1202 39 rules
Rogue Domain Controller T1207 6 rules
Exploitation for Defense Evasion T1211 5 rules
System Script Proxy Execution T1216 13 rules
System Script Proxy Execution: PubPrn T1216.001 2 rules
System Binary Proxy Execution T1218 136 rules
System Binary Proxy Execution: Compiled HTML File T1218.001 5 rules
System Binary Proxy Execution: Control Panel T1218.002 1 rule
System Binary Proxy Execution: CMSTP T1218.003 11 rules
System Binary Proxy Execution: InstallUtil T1218.004 1 rule
System Binary Proxy Execution: Mshta T1218.005 10 rules
System Binary Proxy Execution: Msiexec T1218.007 9 rules
System Binary Proxy Execution: Odbcconf T1218.008 8 rules
System Binary Proxy Execution: Regsvcs/Regasm T1218.009 6 rules
System Binary Proxy Execution: Regsvr32 T1218.010 20 rules
System Binary Proxy Execution: Rundll32 T1218.011 35 rules
System Binary Proxy Execution: Mavinject T1218.013 2 rules
System Binary Proxy Execution: MMC T1218.014 3 rules
XSL Script Processing T1220 5 rules
File and Directory Permissions Modification T1222 2 rules
File and Directory Permissions Modification: Windows File and Directory Permissions Modification T1222.001 16 rules
Domain or Tenant Policy Modification T1484 14 rules
Domain or Tenant Policy Modification: Group Policy Modification T1484.001 15 rules
Virtualization/Sandbox Evasion: System Checks T1497.001 1 rule
Pre-OS Boot T1542 1 rule
Pre-OS Boot: System Firmware T1542.001 2 rules
Pre-OS Boot: Bootkit T1542.003 2 rules
Abuse Elevation Control Mechanism T1548 11 rules
Abuse Elevation Control Mechanism: Bypass User Account Control T1548.002 70 rules
Use Alternate Authentication Material T1550 7 rules
Use Alternate Authentication Material: Pass the Hash T1550.002 7 rules
Use Alternate Authentication Material: Pass the Ticket T1550.003 5 rules
Subvert Trust Controls T1553 1 rule
Subvert Trust Controls: Code Signing T1553.002 1 rule
Subvert Trust Controls: SIP and Trust Provider Hijacking T1553.003 3 rules
Subvert Trust Controls: Install Root Certificate T1553.004 8 rules
Subvert Trust Controls: Mark-of-the-Web Bypass T1553.005 10 rules
Modify Authentication Process T1556 4 rules
Modify Authentication Process: Password Filter DLL T1556.002 3 rules
Impair Defenses T1562 35 rules
Impair Defenses: Disable or Modify Tools T1562.001 171 rules
Impair Defenses: Disable Windows Event Logging T1562.002 28 rules
Impair Defenses: Disable or Modify System Firewall T1562.004 21 rules
Impair Defenses: Indicator Blocking T1562.006 7 rules
Impair Defenses: Downgrade Attack T1562.010 1 rule
Hide Artifacts T1564 11 rules
Hide Artifacts: Hidden Files and Directories T1564.001 7 rules
Hide Artifacts: Hidden Users T1564.002 3 rules
Hide Artifacts: Hidden Window T1564.003 8 rules
Hide Artifacts: NTFS File Attributes T1564.004 25 rules
Hide Artifacts: Run Virtual Instance T1564.006 2 rules
Hijack Execution Flow T1574 7 rules
Hijack Execution Flow: DLL T1574.001 91 rules
Hijack Execution Flow: Dylib Hijacking T1574.004 1 rule
Hijack Execution Flow: Executable Installer File Permissions Weakness T1574.005 2 rules
Hijack Execution Flow: Dynamic Linker Hijacking T1574.006 2 rules
Hijack Execution Flow: Path Interception by PATH Environment Variable T1574.007 3 rules
Hijack Execution Flow: Path Interception by Search Order Hijacking T1574.008 2 rules
Hijack Execution Flow: Path Interception by Unquoted Path T1574.009 1 rule
Hijack Execution Flow: Services Registry Permissions Weakness T1574.011 12 rules
Hijack Execution Flow: COR_PROFILER T1574.012 2 rules
Hijack Execution Flow: AppDomainManager T1574.014 1 rule
Network Boundary Bridging: Network Address Translation Traversal T1599.001 1 rule
Reflective Code Loading T1620 3 rules
Debugger Evasion T1622 1 rule

Credential Access

OS Credential Dumping T1003 46 rules
OS Credential Dumping: LSASS Memory T1003.001 88 rules
OS Credential Dumping: Security Account Manager T1003.002 26 rules
OS Credential Dumping: NTDS T1003.003 20 rules
OS Credential Dumping: LSA Secrets T1003.004 11 rules
OS Credential Dumping: Cached Domain Credentials T1003.005 8 rules
OS Credential Dumping: DCSync T1003.006 12 rules
Network Sniffing T1040 7 rules
Input Capture T1056 1 rule
Input Capture: Keylogging T1056.001 3 rules
Input Capture: GUI Input Capture T1056.002 3 rules
Input Capture: Credential API Hooking T1056.004 1 rule
Brute Force T1110 13 rules
Brute Force: Password Guessing T1110.001 6 rules
Brute Force: Password Cracking T1110.002 1 rule
Brute Force: Password Spraying T1110.003 23 rules
Brute Force: Credential Stuffing T1110.004 1 rule
Forced Authentication T1187 14 rules
Exploitation for Credential Access T1212 3 rules
Steal Application Access Token T1528 5 rules
Steal Web Session Cookie T1539 2 rules
Unsecured Credentials T1552 4 rules
Unsecured Credentials: Credentials In Files T1552.001 14 rules
Unsecured Credentials: Credentials in Registry T1552.002 6 rules
Unsecured Credentials: Private Keys T1552.004 10 rules
Unsecured Credentials: Group Policy Preferences T1552.006 5 rules
Credentials from Password Stores T1555 8 rules
Credentials from Password Stores: Credentials from Web Browsers T1555.003 11 rules
Credentials from Password Stores: Windows Credential Manager T1555.004 4 rules
Credentials from Password Stores: Password Managers T1555.005 1 rule
Modify Authentication Process T1556 4 rules
Modify Authentication Process: Password Filter DLL T1556.002 3 rules
Adversary-in-the-Middle T1557 14 rules
Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay T1557.001 19 rules
Adversary-in-the-Middle: DHCP Spoofing T1557.003 1 rule
Steal or Forge Kerberos Tickets T1558 14 rules
Steal or Forge Kerberos Tickets: Golden Ticket T1558.001 1 rule
Steal or Forge Kerberos Tickets: Silver Ticket T1558.002 1 rule
Steal or Forge Kerberos Tickets: Kerberoasting T1558.003 21 rules
Steal or Forge Kerberos Tickets: AS-REP Roasting T1558.004 5 rules
Steal or Forge Authentication Certificates T1649 17 rules

Discovery

System Service Discovery T1007 2 rules
Application Window Discovery T1010 2 rules
Query Registry T1012 19 rules
System Network Configuration Discovery T1016 8 rules
Remote System Discovery T1018 23 rules
System Owner/User Discovery T1033 22 rules
Network Sniffing T1040 7 rules
Network Service Discovery T1046 13 rules
System Network Connections Discovery T1049 6 rules
Process Discovery T1057 4 rules
Permission Groups Discovery T1069 5 rules
Permission Groups Discovery: Local Groups T1069.001 19 rules
Permission Groups Discovery: Domain Groups T1069.002 24 rules
System Information Discovery T1082 19 rules
File and Directory Discovery T1083 8 rules
Account Discovery T1087 20 rules
Account Discovery: Local Account T1087.001 16 rules
Account Discovery: Domain Account T1087.002 41 rules
Peripheral Device Discovery T1120 2 rules
System Time Discovery T1124 2 rules
Network Share Discovery T1135 11 rules
Password Policy Discovery T1201 6 rules
Browser Information Discovery T1217 4 rules
Domain Trust Discovery T1482 26 rules
Virtualization/Sandbox Evasion: System Checks T1497.001 1 rule
Software Discovery T1518 4 rules
Software Discovery: Security Software Discovery T1518.001 4 rules
Cloud Service Discovery T1526 1 rule
System Location Discovery: System Language Discovery T1614.001 2 rules
Group Policy Discovery T1615 6 rules
Debugger Evasion T1622 1 rule

Lateral Movement

Remote Services T1021 11 rules
Remote Services: Remote Desktop Protocol T1021.001 23 rules
Remote Services: SMB/Windows Admin Shares T1021.002 42 rules
Remote Services: Distributed Component Object Model T1021.003 16 rules
Remote Services: SSH T1021.004 4 rules
Remote Services: VNC T1021.005 1 rule
Remote Services: Windows Remote Management T1021.006 15 rules
Software Deployment Tools T1072 6 rules
Replication Through Removable Media T1091 5 rules
Exploitation of Remote Services T1210 11 rules
Use Alternate Authentication Material T1550 7 rules
Use Alternate Authentication Material: Pass the Hash T1550.002 7 rules
Use Alternate Authentication Material: Pass the Ticket T1550.003 5 rules
Remote Service Session Hijacking: RDP Hijacking T1563.002 3 rules
Lateral Tool Transfer T1570 9 rules

Collection

Data from Local System T1005 16 rules
Data from Removable Media T1025 3 rules
Data from Network Shared Drive T1039 3 rules
Input Capture T1056 1 rule
Input Capture: Keylogging T1056.001 3 rules
Input Capture: GUI Input Capture T1056.002 3 rules
Input Capture: Credential API Hooking T1056.004 1 rule
Data Staged: Local Data Staging T1074.001 4 rules
Screen Capture T1113 12 rules
Email Collection T1114 2 rules
Email Collection: Local Email Collection T1114.001 4 rules
Clipboard Data T1115 5 rules
Automated Collection T1119 4 rules
Audio Capture T1123 4 rules
Video Capture T1125 2 rules
Browser Session Hijacking T1185 5 rules
Data from Information Repositories T1213 1 rule
Adversary-in-the-Middle T1557 14 rules
Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay T1557.001 19 rules
Adversary-in-the-Middle: DHCP Spoofing T1557.003 1 rule
Archive Collected Data T1560 6 rules
Archive Collected Data: Archive via Utility T1560.001 11 rules

Command & Control

Data Obfuscation: Protocol or Service Impersonation T1001.003 2 rules
Fallback Channels T1008 8 rules
Application Layer Protocol T1071 10 rules
Application Layer Protocol: Web Protocols T1071.001 12 rules
Application Layer Protocol: Mail Protocols T1071.003 3 rules
Application Layer Protocol: DNS T1071.004 14 rules
Proxy T1090 16 rules
Proxy: Internal Proxy T1090.001 7 rules
Proxy: External Proxy T1090.002 2 rules
Proxy: Multi-hop Proxy T1090.003 3 rules
Non-Application Layer Protocol T1095 2 rules
Web Service T1102 14 rules
Web Service: Dead Drop Resolver T1102.001 2 rules
Web Service: Bidirectional Communication T1102.002 3 rules
Ingress Tool Transfer T1105 69 rules
Data Encoding: Standard Encoding T1132.001 4 rules
Remote Access Tools T1219 12 rules
Remote Access Tools: Remote Desktop Software T1219.002 37 rules
Dynamic Resolution T1568 5 rules
Dynamic Resolution: Domain Generation Algorithms T1568.002 1 rule
Non-Standard Port T1571 4 rules
Protocol Tunneling T1572 24 rules
Encrypted Channel T1573 2 rules
Encrypted Channel: Asymmetric Cryptography T1573.002 1 rule

Exfiltration

Automated Exfiltration T1020 3 rules
Exfiltration Over C2 Channel T1041 6 rules
Exfiltration Over Alternative Protocol T1048 11 rules
Exfiltration Over Alternative Protocol: Exfiltration Over Symmetric Encrypted Non-C2 Protocol T1048.001 1 rule
Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol T1048.003 6 rules
Transfer Data to Cloud Account T1537 1 rule
Exfiltration Over Web Service T1567 9 rules
Exfiltration Over Web Service: Exfiltration to Code Repository T1567.001 2 rules
Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002 12 rules

Impact

Data Destruction T1485 18 rules
Data Encrypted for Impact T1486 15 rules
Service Stop T1489 12 rules
Inhibit System Recovery T1490 26 rules
Defacement T1491 2 rules
Defacement: Internal Defacement T1491.001 4 rules
Resource Hijacking T1496 4 rules
Endpoint Denial of Service T1499 1 rule
Endpoint Denial of Service: Application or System Exploitation T1499.004 1 rule
System Shutdown/Reboot T1529 3 rules
Account Access Removal T1531 5 rules
Disk Wipe: Disk Structure Wipe T1561.002 2 rules
Data Manipulation T1565 1 rule
Data Manipulation: Transmitted Data Manipulation T1565.002 1 rule

Untagged