BluSapphire
  • 01_Introduction
  • 02_Unified Cyber Defense Platform
  • 03_The Stack
  • 04_Features and capabilities
  • 05_Operations
  • 06_Architecture
    • Architecture - Version 3
    • Architecture - Version 4
  • 07_Integration
    • Cisco pxGrid Integration
    • Threat Intel Sources
  • 08_Use cases
    • SIGMA Rules
      • SIGMA Detection Attributes
      • Understanding SIGMA Rule
      • Creating SIGMA Rule
  • 09_CaseHub
    • Events
    • Cases
      • Case-Templates
    • Event-Rules
    • Reflex Query Language (RQL)
    • Input Configuration
      • Credentials
      • Agents
      • Field Templates
  • 10_Active-Defense-Services
    • Services (ADS - LIADS)
      • Network Services
      • Database Services
      • Web-Apps
    • Tokens (ADS - Tokens)
  • 11_Data-Pipeline-Manager (DPM)
    • Basic Concepts
    • Getting Started
  • 12_Deployment / Log Forwarding
    • Log Forwarding (on-prem) - How To
      • Fortimanager
      • Fortinet
      • Cisco ASA with FirePOWER services
      • Cisco ASA
      • Cisco VPN 3000 Concentrator
      • Cisco IOS Switch
      • Cisco ASA using ASDM
      • Cisco Router
      • Cisco Sourcefire
      • Cisco Ironport
      • Cisco Nexus Switch
      • Cisco VPN Concentrator
      • NetScreen Firewall
        • Configure/Enable Syslog Messages for Netscreen Firewall device using CLI Console:
      • Palo Alto Firewalls
        • Configure Syslog Monitoring
        • Configure a Syslog server profile
        • Create a log forwarding profile
        • Configure security policy rule action as log forwarding
        • Configure syslog forwarding for System, Config, HIP Match, and Correlation logs
      • Juniper
        • Using J-Web
        • Using CLI
        • Using J-Web
        • Using CLI
        • Configuring to send Syslog Messages directly from Sensor
      • Sonicwall
        • Configuring SonicWALL To Direct Log Streams
        • Configuring SonicWALL Logging Level
      • Checkpoint
        • R80.20
        • R80.10
        • R77.30
      • Blue Coat Proxy Logs
        • To Forward Blue Coat Logs Using Web Interface
        • To Forward Blue Coat Proxy Logs Using CLI
      • Tipping Point
      • FireEye
        • To Forward Fireeye NX Alert Logs
      • UBUNTU
      • CENTOS-RHEL
      • Citrix Access Gateway
      • SYMANTEC AV
      • DarkTrace
      • Nutanix
      • SAP
      • Cisco Meraki Firewall
      • Zoho Vault Integration
      • Zoho Analytics Integration
      • Sophos EDR Integration
      • PowerDMARC Integration
      • Perception Point Integration
      • MS Intune Integration
      • AWS-Cloudtrail & AWS-Cloudwatch integration
      • Dell PowerEdge Log Integration
      • HPE ProLiant DX380 Gen10 Log Integration
      • Lenovo ThinkSystem SR650 Log Integration
      • Aruba-3810M-L3 Switch
      • Cisco HX220C-M5SX Log Integration
      • Aruba-6200F-48-Access Switch
      • Brocade & Ruckus Switch Log Integration
      • Cavera L2 Switch Log Integration
      • CentOS & RHEL Log Integration
      • Cisco L2 Switch Log Integration
      • Cisco L3 Switch Log Integration
      • Dell EMC Switch Log Integration
      • Dell Powervault ME4 & ME5 Series Log Integration
      • HCI_CISCO_HX 240C_M5SX_CIMS(Intersight)
      • IBM AIX Log Integration
      • IBM Storwize Log Integration
      • Lenovo L2 Switch Log Integration
      • Lenovo Think System Storage Log Integration
      • lenovo_think_system_manager_851
      • Netgear M4300 Switch Log Integration
      • Net Gear Ready NAS 314 & Net Gear Ready NAS 428
      • qnap storage log integration
      • Ruckus SmartZone 100 Wi-Fi Controller Log Integration
      • Seqrite Endpoint Security 7.6 Log Integration
      • Suse log integration
      • Ubuntu log integration
      • Vcenter log integration
      • Microsoft SQL DB integration
      • Vios log integration
      • Cisco SF/SG 200 & 300 Series Switches
      • oracle db integration
      • lenovo thinksystem storage
      • F5 BIG-IP Load Balancer (11.x - 17.x)
      • Seqrite 76
      • Seqrite 82
      • Aruba switch log integration
      • Windows FIM
        • FIM Integration with GPO
        • FIM Integration without GPO
      • Sophos Firewall
        • Sophos XG Firewalls Syslog
          • Netflow Configuration To Verify
      • SAP
      • Integrating Forcepoint Web Proxy (or) Email Security
      • MicroAgent - Winlogbeat & Sysmon
        • Deploy Micro-Agent/Sysmon via GPO
        • MicroAgent manual installation
      • Microsoft’s IIS Integration
      • vios log integration
      • aruba switch log integration
      • oracle db integration
      • Cisco SF/SG 200 & 300 Series Switches
      • microsoft sql db integration
      • seqrite 82
      • seqrite 76
      • List of Supported Log Sources
        • 17.x)
    • Cloud Log Forwarding
      • Azure Sentinel
      • AWS Cloud Logs
        • Collecting CloudWatch Logs
        • Collecting Cloudtrail Logs
      • Configuring Mimecast for Log Collection via API
      • Cisco Umbrella
      • Cisco Duo
      • Cisco AMP
      • Cisco CES
      • SOPHOS AV
      • CROWDSTRIKE
      • Microsoft Defender ATP
        • Enable SIEM integration in Microsoft Defender ATP
        • Assign permissions to the WindowsDefenderATPSiemConnector application
    • BluArmour Pre-Deployment Checklist & Roll out Process
    • Deploy BluArmour via SCCM
    • BluGenie GPO for Service Account, WinRM and WMI
    • Mirror / SPAN port configuration
    • Average LogSize by LogSource
    • Windows Package Installation
    • Linux Package Installation
  • 13_MITRE ATT&CK
    • MITRE ATT&CK Coverage by Tactic
    • MITRE ATT&CK Coverage by Technique
    • Rules mapping - MITRE ATT&CK
  • 14_BluArmour Endpoint Protection
    • BluArmour For ICS / AirGapped Networks
  • 15_BluGenie
    • Manual
    • How To Guides
      • BluGenie Intro
      • How To Run
      • How to Use Help
      • Running Localhost & Remote commands
      • Get-BluGenieChildItemList
      • Invoke-BluGenieYara
    • Enable-BluGenieWinRMoverWMI
  • 16_Best Practices
    • Windows Logging Recommendations
      • Windows Security Log recommendations
      • Windows General Log Recommendations
      • Windows Advanced Auditing Recommendations
    • Lateral Movement Logging Recommendations
    • Best Data Sources for Detection
    • Cloud Incident Readiness
  • 17_Threat Hunt
  • 18_Taxonomy
    • Categories
    • Web Security Gateway
    • Cloud AWS
    • Windows
    • Linux
    • Endpoint Detection
    • NGFW (Firewalls)
    • Email Gateway Security
    • Network Access Control
    • Auth (IDAM)
    • Alert Data
    • Web Security Gateway
    • Endpoint Protection
    • DHCP
    • Cloud AWS
    • Wireless Access Controllers
    • Windows
    • Load Balancers (LB)
    • Linux
    • Active Defence (Deception)
  • 19_Product Videos
  • 20_M-SOC_Self Service Portal
    • Registering as a Customer (Regulated Entity)
    • Digital Contract Signing Process
      • RACI Matrix
    • Updating Billing Information
    • Updating Escalation Matrix
    • Manage Users and Roles
    • Windows Package Installation
    • Linux Package Installation
    • RPM Package Installation
    • Frequently Asked Questions (FAQ)
    • Default Log Collection
    • Incident Management Workflow(M-SOC only)
    • Troubleshooting Installs
    • MACOS Package Installation
  • Customer Self Service Portal
    • Registering as a Customer
    • Registering as a Partner
    • Digital Contract Signing Process
    • Updating Billing Information
    • Updating Escalation Matrix
    • Manage Users and Roles
    • Windows Package Installation
    • Linux deb Package Installation
    • Linux rpm Package Installation
    • Frequently Asked Questions (FAQ)
    • Default Log Collection
    • Troubleshooting Installs
  • Appendix A
  • 21_Incident Response
    • Cloud Incident Readiness
Powered by GitBook
On this page
  1. 13_MITRE ATT&CK

MITRE ATT&CK Coverage by Technique

(listed alphabetically)

Technique

Access Token Manipulation

X

X

Accessibility Features

X

X

Account Discovery

X

Account Manipulation

X

X

AppCert DLLs

X

X

AppInit DLLs

X

X

Application Shimming

X

X

Application Window Discovery

X

Audio Capture

X

Authentication Package

X

Automated Collection

X

Binary Padding

X

BITS Jobs

X

X

Bootkit

X

Browser Extensions

X

Brute Force

X

Bypass User Account Control

X

X

Change Default File Association

X

Clipboard Data

X

CMSTP

X

X

Code Signing

X

Command-Line Interface

X

Commonly Used Port

X

Communication Through Removable Media

X

Compile After Delivery

X

Compiled HTML File

X

X

Component Object Model Hijacking

X

X

Connection Proxy

X

Control Panel Items

X

X

Create Account

X

Credential Dumping

X

Credentials in Files

X

Credentials in Registry

X

Custom Command and Control Protocol

X

Data Compressed

X

Data Destruction

X

Data Encoding

X

Data Encrypted for Impact

X

Data from Local System

X

Data from Network Shared Drive

X

Data from Removable Media

X

Data Obfuscation

X

Data Staged

X

Data Transfer Size Limits

X

DCShadow

X

Deobfuscate/Decode Files or Information

X

Disabling Security Tools

X

Disk Content Wipe

X

Disk Structure Wipe

X

DLL Search Order Hijacking

X

X

DLL Side-Loading

X

Domain Generation Algorithms

X

Domain Trust Discovery

X

Drive-by Compromise

X

Dynamic Data Exchange

X

Email Collection

X

Execution through API

X

Execution through Module Load

X

Exfiltration Over Alternative Protocol

X

Exfiltration Over Command and Control Channel

X

Exfiltration Over Other Network Medium

X

Exfiltration Over Physical Medium

X

Exploit Public-Facing Application

X

Exploitation for Client Execution

X

Exploitation for Credential Access

X

Exploitation for Defense Evasion

X

Exploitation for Privilege Escalation

X

Exploitation of Remote Services

X

External Remote Services

X

X

Extra Window Memory Injection

X

Fallback Channels

X

File and Directory Discovery

X

File Deletion

X

Forced Authentication

X

Group Policy Modification

X

Hardware Additions

X

Hidden Files and Directories

X

X

Hooking

X

X

X

Hypervisor

X

Image File Execution Options Injection

X

X

X

Indicator Blocking

X

Indicator Removal on Host

X

Indirect Command Execution

X

Inhibit System Recovery

X

Input Capture

X

X

Input Prompt

X

Install Root Certificate

X

InstallUtil

X

X

Kerberoasting

X

LLMNR/NBT-NS Poisoning and Relay

X

Logon Scripts

X

X

LSASS Driver

X

X

Masquerading

X

Modify Existing Service

X

Modify Registry

X

Mshta

X

X

Multi-hop Proxy

X

Multi-Stage Channels

X

Network Service Scanning

X

Network Share Connection Removal

X

Network Share Discovery

X

Network Sniffing

X

X

New Service

X

X

NTFS File Attributes

X

Obfuscated Files or Information

X

Office Application Startup

X

Pass the Hash

X

Pass the Ticket

X

Password Policy Discovery

X

Path Interception

X

X

Peripheral Device Discovery

X

Permission Groups Discovery

X

Port Monitors

X

X

PowerShell

X

Private Keys

X

Process Discovery

X

Process Injection

X

X

Query Registry

X

Registry Run Keys / Startup Folder

X

Regsvcs/Regasm

X

X

Regsvr32

X

X

Remote Access Tools

X

Remote Desktop Protocol

X

Remote File Copy

X

X

Remote Services

X

Remote System Discovery

X

Replication Through Removable Media

X

X

Rundll32

X

X

Scheduled Task

X

X

X

Scheduled Transfer

X

Screensaver

X

Scripting

X

X

Security Software Discovery

X

Security Support Provider

X

Service Execution

X

Service Stop

X

Signed Binary Proxy Execution

X

X

Signed Script Proxy Execution

X

X

Spearphishing Attachment

X

Spearphishing Link

X

Standard Application Layer Protocol

X

Standard Non-Application Layer Protocol

X

Stored Data Manipulation

X

System Information Discovery

X

System Network Configuration Discovery

X

System Network Connections Discovery

X

System Owner/User Discovery

X

System Service Discovery

X

System Time Discovery

X

Third-party Software

X

X

Timestomp

X

Trusted Developer Utilities

X

X

Trusted Relationship

X

Uncommonly Used Port

X

User Execution

X

Valid Accounts

X

X

X

Virtualization/Sandbox Evasion

X

Web Service

X

X

Web Shell

X

X

Windows Admin Shares

X

Windows Management Instrumentation

X

Windows Management Instrumentation Event Subscription

X

Windows Remote Management

X

X

Winlogon Helper DLL

X

jjjj

PreviousMITRE ATT&CK Coverage by TacticNextRules mapping - MITRE ATT&CK

Last updated 8 months ago

Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Exfiltration
Command & Control
Impact