NON-MITRE ATT&CK Analytics
LP_Windows Login Attempt on Disabled Account
norm_id=WinServer* label=User label=Login label=Fail sub_status_code= "0xC0000072" -target_user=*−user = ∗-user IN EXCLUDED_USERS | rename user as target_user, domain as target_domain,reason as failure_reasonLP_VMware Link Up
norm_id=VmwareESX label = Link label=Up | chart count() by log_ts, host, switch, port_group, network_adapterLP_VMware Link Down
LP_LogPoint License Expiry Status
LP_Mitre Initial Access Using Spearphishing link Detected
LP_Mitre Command and Control Using Standard Application Layer Protocol Detected
LP_Endpoint Protect Threat Content Detected
LP_Endpoint Protect Device Disconnect
LP_Endpoint Protect File Delete
LP_Endpoint Protect File Copied To USB Device
LP_System Owner or User Discovery Process Detected
LP_System Services Discovery Detected
LP_SolarisLDAP Password Spraying Attack Detected
LP_Microsoft Defender AMSI Trigger
LP_Petitpotam - Anonymous RPC and File Share
RDP Sensitive Settings Changed
LP_Secure Deletion with SDelete
LP_Suspicious Keyboard Layout Load Detected
LP_Remote Code Execution using WMI Win32_Process Class over WinRM
Remote Code Execution using WMI Win32_Service Class over WinRM
LP_Suspicious Microsoft SQL Server PowerShell Module Use Detected
LP_Shadow Copy Deletion Using OS Utilities Detected
LP_Child Process Spawned via Diskshadow Detected
LP_Code Execution Via Diskshadow Detected
LP_Process Pattern Match For CVE-2021-40444 Exploitation
Suspicious Extexport Execution Detected
LP_Proxy Execution via Workfolders
Proxy Execution via Windows Update Client
Suspicious DLL Execution Using Windows Address Book
LP_Suspicious Use of Dotnet Detected
Execution of Arbitrary Executable Using Stordiag
Process Creation via Time Travel Tracer
LP_Time Travel Debugging Utility DLL Loaded
File Execution via Msdeploy
CVE-2022-40684 Exploitation Detected
Possible Proxy Execution of Malicious Code
LP_Suspicious Usage of BitLocker Management Script
Proxy Execution of Payloads via Microsoft Signed Script
Execution of Windows Defender Offline Shell from Suspicious Folder
DLL Loaded Via AccCheckConsole
LP_Proxy Execution via Appvlp
LP_Proxy DLL Execution via UtilityFunctions
Suspicious Usage of Squirrel Binary
LP_Suspicious File Share Permission
LP_Legitimate Application Dropping Script File
LP_Default Possible Non-PCI Compliant Inbound Network Traffic Detected
LP_High Severity EPP Alert
LP_Medium Severity EPP Alert
LP_Proxy Execution via Appvlp
LP_Suspicious Extexport Execution Detected
LP_Suspicious Usage of Squirrel Binary
LP_Threat Intel Connections with Suspicious Domains
Last updated
Was this helpful?