Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions detection-rules/attachment_html_smuggling_atob_ics.yml
Original file line number Diff line number Diff line change
Expand Up @@ -65,6 +65,7 @@ attack_types:
tactics_and_techniques:
- "Evasion"
- "HTML smuggling"
- "ICS Phishing"
- "Scripting"
detection_methods:
- "File analysis"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ attack_types:
tactics_and_techniques:
- "Evasion"
- "HTML smuggling"
- "ICS Phishing"
- "Scripting"
detection_methods:
- "File analysis"
Expand Down
1 change: 1 addition & 0 deletions detection-rules/attachment_ics_aws_lambda_url.yml
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ attack_types:
tactics_and_techniques:
- "Evasion"
- "Free file host"
- "ICS Phishing"
detection_methods:
- "Content analysis"
- "File analysis"
Expand Down
1 change: 1 addition & 0 deletions detection-rules/attachment_ics_embedded_document.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,7 @@ attack_types:
- "Malware/Ransomware"
tactics_and_techniques:
- "Evasion"
- "ICS Phishing"
detection_methods:
- "File analysis"
id: "8f9957d9-a06a-5c5a-83af-2dc5c25bed86"
1 change: 1 addition & 0 deletions detection-rules/attachment_ics_employee_policy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ attack_types:
- "BEC/Fraud"
tactics_and_techniques:
- "Evasion"
- "ICS Phishing"
- "Social engineering"
detection_methods:
- "File analysis"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@ attack_types:
- "Malware/Ransomware"
tactics_and_techniques:
- "Evasion"
- "ICS Phishing"
detection_methods:
- "File analysis"
- "Content analysis"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -32,6 +32,7 @@ tags:
- "Attack surface reduction"
tactics_and_techniques:
- "Evasion"
- "ICS Phishing"
- "Social engineering"
detection_methods:
- "Archive analysis"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -21,6 +21,7 @@ attack_types:
- "Credential Phishing"
- "BEC/Fraud"
tactics_and_techniques:
- "ICS Phishing"
- "Open redirect"
- "Social engineering"
detection_methods:
Expand Down
1 change: 1 addition & 0 deletions detection-rules/attachment_ics_meeting_invite.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ attack_types:
- "BEC/Fraud"
- "Credential Phishing"
tactics_and_techniques:
- "ICS Phishing"
- "Social engineering"
detection_methods:
- "File analysis"
Expand Down
1 change: 1 addition & 0 deletions detection-rules/attachment_ics_non-gregorian.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ attack_types:
- "Credential Phishing"
tactics_and_techniques:
- "Evasion"
- "ICS Phishing"
detection_methods:
- "File analysis"
- "Content analysis"
Expand Down
1 change: 1 addition & 0 deletions detection-rules/attachment_ics_open_redirect.yml
Original file line number Diff line number Diff line change
Expand Up @@ -58,6 +58,7 @@ tactics_and_techniques:
- "Free email provider"
- "Free file host"
- "Free subdomain host"
- "ICS Phishing"
- "Open redirect"
detection_methods:
- "Content analysis"
Expand Down
1 change: 1 addition & 0 deletions detection-rules/attachment_ics_organizer_new_domain.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@ attack_types:
- "Callback Phishing"
tactics_and_techniques:
- "Evasion"
- "ICS Phishing"
- "Social engineering"
detection_methods:
- "File analysis"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -56,6 +56,7 @@ attack_types:
tactics_and_techniques:
- "Spoofing"
- "Evasion"
- "ICS Phishing"
detection_methods:
- "File analysis"
- "Header analysis"
Expand Down
1 change: 1 addition & 0 deletions detection-rules/attachment_ics_svg_js.yml
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,7 @@ attack_types:
tactics_and_techniques:
- "Scripting"
- "Evasion"
- "ICS Phishing"
detection_methods:
- "File analysis"
- "Javascript analysis"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,7 @@ attack_types:
- "Malware/Ransomware"
tactics_and_techniques:
- "Evasion"
- "ICS Phishing"
detection_methods:
- "File analysis"
- "Content analysis"
Expand Down
1 change: 1 addition & 0 deletions detection-rules/callback_phishing_calendar_invite.yml
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,7 @@ attack_types:
tactics_and_techniques:
- "Social engineering"
- "Evasion"
- "ICS Phishing"
detection_methods:
- "File analysis"
- "Header analysis"
Expand Down
1 change: 1 addition & 0 deletions detection-rules/link_gcal_invite_open_redirect.yml
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,7 @@ attack_types:
tactics_and_techniques:
- "Free email provider"
- "Free file host"
- "ICS Phishing"
- "Open redirect"
- "Social engineering"
detection_methods:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ source: |
attack_types:
- "Callback Phishing"
tactics_and_techniques:
- "ICS Phishing"
- "Out of band pivot"
- "Social engineering"
detection_methods:
Expand Down
Loading