Skip to content

Commit

Permalink
Update Use-Cases.md
Browse files Browse the repository at this point in the history
  • Loading branch information
TonyPhipps authored Oct 16, 2024
1 parent 690c286 commit b4aa600
Showing 1 changed file with 8 additions and 8 deletions.
16 changes: 8 additions & 8 deletions Use-Cases.md
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
Signatures should be mapped to use cases based on grouping that makes sense. This mapping allows the investigator to review recommended response actions. A good start would be using MITRE ATT&CK framework Tactics as Use Cases for signatures.

These less-technical use cases should also be considered for addition into your use case library:
- The mouse and/or keyboard start moving/typing on their own.
- The mouse and/or keyboard start moving/typing on their own. (https://attack.mitre.org/techniques/T1021/)
- A device performs unexpected functions on its own (like a gate opening or closing unexpectedly).
- An endpoint computer fails to boot up properly.
- A ransomware message is displayed.
- A caller claims to be the helpdesk or other member of IT Staff.
- An unidentified peripheral (like a USB) is found connected to a system.
- An email or document suggests calling a provided phone number for support (e.g. Microsoft).
- Historic events are seemingly deleted or otherwise no longer available.
- Unauthorized changes appear to have been made to a device's logic code/configuration.
- A ransomware message is displayed. (https://attack.mitre.org/techniques/T1486/)
- A caller claims to be the helpdesk or other member of IT Staff. (https://attack.mitre.org/techniques/T1656)
- An unidentified peripheral (like a USB) is found connected to a system. (https://attack.mitre.org/techniques/T1091/)
- An email or document suggests calling a provided phone number for support (e.g. Microsoft). (https://attack.mitre.org/techniques/T1566/)
- Historic events are seemingly deleted or otherwise no longer available. (https://attack.mitre.org/techniques/T1070/)
- Unauthorized changes appear to have been made to a device's logic code/configuration. (https://attack.mitre.org/techniques/T0845/)
- A secure location shows clear signs of breaking and entering.
- An unauthorized person is found in a location.
- An unauthorized person is found in a location.

0 comments on commit b4aa600

Please sign in to comment.