Skip to content

Commit 42b3b6d

Browse files
committed
adding generic type
1 parent 5a1a26b commit 42b3b6d

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

sample/high_severity_alert.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
Refer to NIST guidelines when creating password policies."
1111
category: "Credential Access"
1212
tactic: "Brute Force: Password Guessing"
13-
dataTypes: ["sample-data"]
13+
dataTypes: ["sample-data", "generic"]
1414
reference:
1515
- "https://attack.mitre.org/tactics/TA0006"
1616
- "https://attack.mitre.org/techniques/T1110/001/"

sample/low_severity_alert.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector."
1414
category: "Defense Evasion"
1515
tactic: "Clear Windows Event Logs"
16-
dataTypes: ["sample-data"]
16+
dataTypes: ["sample-data", "generic"]
1717
reference:
1818
- "https://attack.mitre.org/tactics/TA0005/"
1919
- "https://attack.mitre.org/techniques/T1070/001/"

sample/medium_severity_alert.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@
1313
expected. Exceptions can be added to this rule to filter expected behavior."
1414
category: "Transfer Data to Cloud Account"
1515
tactic: "Exfiltration"
16-
dataTypes: ["sample-data"]
16+
dataTypes: ["sample-data", "generic"]
1717
reference:
1818
- "https://docs.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules"
1919
- "https://attack.mitre.org/techniques/T1537/"

0 commit comments

Comments
 (0)