Skip to content

Commit 49e5ddb

Browse files
committed
sample
1 parent ded738a commit 49e5ddb

File tree

3 files changed

+3
-0
lines changed

3 files changed

+3
-0
lines changed

exampleAlerts/Sample_high_severity_alert.yml renamed to sample/high_severity_alert.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010
Refer to NIST guidelines when creating password policies."
1111
category: "Credential Access"
1212
tactic: "Brute Force: Password Guessing"
13+
dataTypes: ["sample-data"]
1314
reference:
1415
- "https://attack.mitre.org/tactics/TA0006"
1516
- "https://attack.mitre.org/techniques/T1110/001/"

exampleAlerts/Sample_low_severity_alert.yml renamed to sample/low_severity_alert.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@
1313
Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector."
1414
category: "Defense Evasion"
1515
tactic: "Clear Windows Event Logs"
16+
dataTypes: ["sample-data"]
1617
reference:
1718
- "https://attack.mitre.org/tactics/TA0005/"
1819
- "https://attack.mitre.org/techniques/T1070/001/"

exampleAlerts/Sample_medium_severity_alert.yml renamed to sample/medium_severity_alert.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,7 @@
1313
expected. Exceptions can be added to this rule to filter expected behavior."
1414
category: "Transfer Data to Cloud Account"
1515
tactic: "Exfiltration"
16+
dataTypes: ["sample-data"]
1617
reference:
1718
- "https://docs.microsoft.com/en-us/exchange/security-and-compliance/mail-flow-rules/mail-flow-rules"
1819
- "https://attack.mitre.org/techniques/T1537/"

0 commit comments

Comments
 (0)