Vendor: Microsoft

July 25, 2023 · View on GitHub

Product: Web Application Proxy

RulesModelsMITRE TTPsEvent TypesParsers
110481833
Use-CaseEvent Types/ParsersMITRE TTPContent
Brute Force Attackremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1078 - Valid Accounts
  • 1 Rules
  • 1 Models
Compromised Credentialsremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1021 - Remote Services
T1071.001 - Application Layer Protocol: Web Protocols
T1078 - Valid Accounts
T1078.003 - Valid Accounts: Local Accounts
T1102 - Web Service
T1133 - External Remote Services
T1550.002 - Use Alternate Authentication Material: Pass the Hash
  • 55 Rules
  • 29 Models
Cryptominingremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1071.001 - Application Layer Protocol: Web Protocols
T1496 - Resource Hijacking
  • 3 Rules
Data Exfiltrationremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1030 - Data Transfer Size Limits
T1071.001 - Application Layer Protocol: Web Protocols
T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage
T1568 - Dynamic Resolution
  • 4 Rules
Data Leakremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1030 - Data Transfer Size Limits
T1071.001 - Application Layer Protocol: Web Protocols
T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage
  • 4 Rules
  • 1 Models
Evasionremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1071.001 - Application Layer Protocol: Web Protocols
T1090.003 - Proxy: Multi-hop Proxy
  • 4 Rules
  • 1 Models
Lateral Movementremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1018 - Remote System Discovery
T1021 - Remote Services
T1071 - Application Layer Protocol
T1071.001 - Application Layer Protocol: Web Protocols
T1078 - Valid Accounts
T1078.003 - Valid Accounts: Local Accounts
T1550 - Use Alternate Authentication Material
T1550.002 - Use Alternate Authentication Material: Pass the Hash
T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting
  • 38 Rules
  • 21 Models
Malwareremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1071 - Application Layer Protocol
T1071.001 - Application Layer Protocol: Web Protocols
T1078 - Valid Accounts
T1204 - User Execution
T1550.002 - Use Alternate Authentication Material: Pass the Hash
T1568.002 - Dynamic Resolution: Domain Generation Algorithms
  • 30 Rules
  • 8 Models
Phishingremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1071.001 - Application Layer Protocol: Web Protocols
T1566.002 - Phishing: Spearphishing Link
  • 1 Rules
Privilege Abuseremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1078 - Valid Accounts
  • 3 Rules
  • 2 Models
Privilege Escalationremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1078 - Valid Accounts
  • 2 Rules
  • 1 Models
Privileged Activityremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1068 - Exploitation for Privilege Escalation
T1071.001 - Application Layer Protocol: Web Protocols
T1078 - Valid Accounts
T1102 - Web Service
  • 4 Rules
  • 2 Models
Ransomwareremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1071 - Application Layer Protocol
T1078 - Valid Accounts
  • 4 Rules
Workforce Protectionremote-logon
microsoft-remote-desktop

web-activity-allowed
tmg-proxy

web-activity-denied
tmg-proxy
T1071.001 - Application Layer Protocol: Web Protocols
  • 3 Rules
  • 2 Models

ATT&CK Matrix for Enterprise

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Phishing: Spearphishing Link

External Remote Services

Valid Accounts

Phishing

User Execution

External Remote Services

Valid Accounts

Valid Accounts

Exploitation for Privilege Escalation

Valid Accounts

Use Alternate Authentication Material

Use Alternate Authentication Material: Pass the Hash

Valid Accounts: Local Accounts

Steal or Forge Kerberos Tickets

Steal or Forge Kerberos Tickets: Kerberoasting

Remote System Discovery

Remote Services

Use Alternate Authentication Material

Web Service

Application Layer Protocol: Web Protocols

Dynamic Resolution

Dynamic Resolution: Domain Generation Algorithms

Proxy: Multi-hop Proxy

Application Layer Protocol

Proxy

Data Transfer Size Limits

Exfiltration Over Web Service: Exfiltration to Cloud Storage

Exfiltration Over Web Service

Resource Hijacking