Skip to content

Commit

Permalink
Update PRs m4nbat
Browse files Browse the repository at this point in the history
  • Loading branch information
Bert-JanP committed Jan 29, 2024
1 parent 08058e1 commit 640b86d
Show file tree
Hide file tree
Showing 4 changed files with 12 additions and 7 deletions.
6 changes: 4 additions & 2 deletions MITRE ATT&CK/Mapping.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,9 +9,9 @@ This section only includes references to queries that can be mapped in the MITRE
| --- | --- |
| Initial Access | 11 |
| Execution | 4 |
| Persistence | 9 |
| Persistence | 10 |
| Privilege Escalation | 4 |
| Defense Evasion | 14 |
| Defense Evasion | 15 |
| Credential Access | 5 |
| Discovery | 18 |
| Lateral Movement | 1 |
Expand Down Expand Up @@ -55,6 +55,7 @@ This section only includes references to queries that can be mapped in the MITRE
| T1078.004 | Valid Accounts: Cloud Accounts | [Cloud Persistence Activity By User AtRisk](../Azure%20Active%20Directory/CloudPersistenceActivityByUserAtRisk.md)|
| T1137 | Office Application Startup | [ASR Executable Office Content](../Defender%20For%20Endpoint/ASR%20Rules/AsrExecutableOfficeContent.md) |
| T1505.003 | Server Software Component: Web Shell | [WebShell Detection](../Defender%20For%20Endpoint/WebshellDetection.md) |
| T1543 | Create or Modify System Process | [Azure ARC Related Persistence Detection](../Defender%20For%20Endpoint/nf_ttp_t1543_scattered-spider_azure_arc_persistence.md) |
| T1556 | Modify Authentication Process | [Deletion Conditional Access Policy](../Azure%20Active%20Directory/ConditionalAccess%20-%20DeletePolicy.md) |
| T1556 | Modify Authentication Process | [Change Conditional Access Policy](../Azure%20Active%20Directory/ConditionalAccess%20-%20ChangePolicy.md) |

Expand Down Expand Up @@ -84,6 +85,7 @@ This section only includes references to queries that can be mapped in the MITRE
| T1218.010 | System Binary Proxy Execution: Regsvr32 | [Regsvr32 Started as Office Child](../Defender%20For%20Endpoint/Regsvr32StartedByOfficeApplication.md) |
| T1553.005 | Subvert Trust Controls: Mark-of-the-Web Bypass | [Hunt for rare ISO files](../Defender%20For%20Endpoint/RareISOFile.md)|
| T1562.001 | Impair Defenses: Disable or Modify Tools | [Abusing PowerShell to disable Defender components](../Defender%20For%20Endpoint/ttp_t1562-001_disabledefender.md)|
| T1562.001 | Impair Defenses: Disable or Modify Tools | [Scattered Spider Defense Evasion via Conditional Access Policies Detection](../Azure%20Active%20Directory/nf_ttp_t1562.001_scattered-spider_abuse%20conditional_access_trusted_locations.md) |
| T1562.010 | Impair Defenses: Downgrade Attack | [Potential Kerberos Encryption Downgrade](../Defender%20For%20Identity/PotentialKerberosEncryptionDowngrade.md) |

## Credential Access
Expand Down
13 changes: 8 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -69,11 +69,14 @@ Everyone can submit contributions to this repository via a Pull Request. If you
## Top contributors
| Name | Queries added | GitHub | Twitter | Query Links |
|------|---------------|--------|---------| ---------|
| [Gavin Knapp](https://www.linkedin.com/in/grjk83/) | 5 | [@m4nbat](https://github.com/m4nbat) | [@knappresearchlb](https://twitter.com/knappresearchlb) | <ul><li>[NetSupport running from unexpected directory (FIN7)](../Defender%20For%20Endpoint/ttp_t1219_netsupportrat_fin7.md)</li>
| | | | | <ul><li>[Abusing PowerShell to disable Defender components](../Defender%20For%20Endpoint/ttp_t1562-001_disabledefender.md)</li>|
| | | | | <ul><li>[Suspicious network connection from MSBuild](../Defender%20For%20Endpoint/ttp_t1127-001_suspNetworkConnMSBuild.md)</li>|
| | | | | <ul><li>[PowerShell Encoded Command](../Defender%20For%20Endpoint/ttp_t1027-010_powershellEncodedCommand.md)</li>|
| | | | | <ul><li>[PowerShell Launching Scripts From WindowsApps Directory (FIN7)](../Defender%20For%20Endpoint/ttp_t1059-001_powershell_windowsappsdir_fin7.md)</li>|
| [Gavin Knapp](https://www.linkedin.com/in/grjk83/) | 5 | [@m4nbat](https://github.com/m4nbat) | [@knappresearchlb](https://twitter.com/knappresearchlb) | <ul><li>[NetSupport running from unexpected directory (FIN7)](./Defender%20For%20Endpoint/ttp_t1219_netsupportrat_fin7.md)</li>
| | | | | <ul><li>[Abusing PowerShell to disable Defender components](./Defender%20For%20Endpoint/ttp_t1562-001_disabledefender.md)</li>|
| | | | | <ul><li>[Suspicious network connection from MSBuild](./Defender%20For%20Endpoint/ttp_t1127-001_suspNetworkConnMSBuild.md)</li>|
| | | | | <ul><li>[PowerShell Encoded Command](./Defender%20For%20Endpoint/ttp_t1027-010_powershellEncodedCommand.md)</li>|
| | | | | <ul><li>[PowerShell Launching Scripts From WindowsApps Directory (FIN7)](./Defender%20For%20Endpoint/ttp_t1059-001_powershell_windowsappsdir_fin7.md)</li>|
| | | | | <ul><li>[Azure ARC Related Persistence Detection](./Defender%20For%20Endpoint/nf_ttp_t1543_scattered-spider_azure_arc_persistence.md)</li>|
| | | | | <ul><li>[Scattered Spider Defense Evasion via Conditional Access Policies Detection](./Azure%20Active%20Directory/nf_ttp_t1562.001_scattered-spider_abuse%20conditional_access_trusted_locations.md)</li>|
| | | | | <ul><li>[Check for Phishing Emails Using IPFS in Phishing Campaigns](./Threat%20Hunting/TI%20Feed%20-%20ipfs_phishing.md)</li>|
| [Alex Teixeira](https://www.linkedin.com/in/inode/) | 2 | [@inodee](https://github.com/inodee) | [@ateixei](https://twitter.com/ateixei) | <ul><li>[Rare_Outgoing_IPv4_Connections](./Defender%20For%20Endpoint/Rare_Outgoing_IPv4_Connections.md)</li>
| | | | | <ul><li>[Detect Known RAT RMM Process Patterns](./Defender%20For%20Endpoint/Detect_Known_RAT_RMM_Process_Patterns.md)</li>|
| [Babak Mahmoodizadeh](https://www.linkedin.com/in/babak-mhz/) | 1 | [@babakmhz](https://github.com/babakmhz) | - | <ul><li>[WebShell Detection](./Defender%20For%20Endpoint/WebshellDetection.md)</li> |
Expand Down
File renamed without changes.

0 comments on commit 640b86d

Please sign in to comment.