< Provide query description and usage tips >
< Insert query string here >
This query can be used to detect the following attack techniques and tactics (see MITRE ATT&CK framework) or security configuration states.
Technique, tactic, or state | Covered? (v=yes) | Notes |
---|---|---|
Initial access | ||
Execution | ||
Persistence | ||
Privilege escalation | ||
Defense evasion | ||
Credential Access | ||
Discovery | ||
Lateral movement | ||
Collection | ||
Command and control | ||
Exfiltration | ||
Impact | ||
Vulnerability | ||
Exploit | ||
Misconfiguration | ||
Malware, component | ||
Ransomware |
Contributor: < your name > GitHub alias: < your github alias > Organization: < your org > Contact info: < email or website >