Product: Zeek
Use-Case: Lateral Movement
Rules | Models | MITRE ATT&CK® TTPs | Activity Types | Parsers |
---|---|---|---|---|
128 | 44 | 19 | 13 | 30 |
Event Type | Rules | Models |
---|---|---|
authentication-failed | T1078 - Valid Accounts ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP T1090 - Proxy ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP T1090.003 - Proxy: Multi-hop Proxy ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP |
|
authentication-successful | T1090 - Proxy ↳ Auth-Tor-Shost: User authentication or login from a known TOR IP T1090.003 - Proxy: Multi-hop Proxy ↳ Auth-Tor-Shost: User authentication or login from a known TOR IP |
|
failed-logon | T1550 - Use Alternate Authentication Material ↳ FAIL-PTH-ALERT-sH: Possible unsuccessful pass the hash attack from the source ↳ FAIL-PTH-ALERT-dH: Possible unsuccessful pass the hash attack by the user ↳ KL-TfG: Rare Kerberos ticket failure code ↳ KL-Tf-fail: Failed logon due to a malformed authentication ticket ↳ A-PTH-ALERT-sH-Failed: Failed pass the hash attack with keylength of 0 in NTLM event and a 'null' sid on this source host. T1550.002 - Use Alternate Authentication Material: Pass the Hash ↳ FAIL-PTH-ALERT-sH: Possible unsuccessful pass the hash attack from the source ↳ FAIL-PTH-ALERT-dH: Possible unsuccessful pass the hash attack by the user ↳ A-PTH-ALERT-sH-Failed: Failed pass the hash attack with keylength of 0 in NTLM event and a 'null' sid on this source host. T1110 - Brute Force ↳ RDP-Brute-Force: Abnormal number of RDP failed logons for this user ↳ A-FL-MULTI-USERS-SRC: The same host failed to login to multiple users ↳ A-FL-MULTI-USERS-S: Multiple users failed to login (S) ↳ A-FL-MULTI-USERS-L: Multiple users failed to login (L) ↳ A-FL-MULTI-USERS-M: Multiple users failed to login (M) ↳ A-FL-MULTI-DEST-S: Failed logins to multiple destinations from host (S) ↳ A-FL-MULTI-DEST-M: Failed logins to multiple destinations from host (M) T1110.003 - T1110.003 ↳ A-FL-MULTI-USERS-SRC: The same host failed to login to multiple users T1021 - Remote Services ↳ RDP-Brute-Force: Abnormal number of RDP failed logons for this user T1021.001 - Remote Services: Remote Desktop Protocol ↳ RDP-Brute-Force: Abnormal number of RDP failed logons for this user T1078 - Valid Accounts ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP T1090 - Proxy ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP T1090.003 - Proxy: Multi-hop Proxy ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP T1550.003 - Use Alternate Authentication Material: Pass the Ticket ↳ KL-TfG: Rare Kerberos ticket failure code ↳ KL-Tf-fail: Failed logon due to a malformed authentication ticket T1558 - Steal or Forge Kerberos Tickets ↳ KL-TfG: Rare Kerberos ticket failure code ↳ KL-Tf-fail: Failed logon due to a malformed authentication ticket |
• AE-OHr: Random hostnames |
kerberos-logon | T1558 - Steal or Forge Kerberos Tickets ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected ↳ NKL-UH-A: Abnormal NTLM/Kerberos logon to asset ↳ NKL-GH-F-new: First kerberos/ntlm logon to server for peer group by new user ↳ NKL-GH-A-new: Abnormal kerberos/ntlm logon on asset for peer group by new user ↳ NKL-HU-F-new: Ntlm/Kerberos logon to private asset for new user ↳ A-KL-ToEt-Roast: Suspicious or weak encryption type used for obtaining the kerberos TGTs using non kerberos service for this asset T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting ↳ A-KL-ToEt-Roast: Suspicious or weak encryption type used for obtaining the kerberos TGTs using non kerberos service for this asset T1078 - Valid Accounts ↳ NKL-UH-A: Abnormal NTLM/Kerberos logon to asset ↳ NKL-GH-F-new: First kerberos/ntlm logon to server for peer group by new user ↳ NKL-GH-A-new: Abnormal kerberos/ntlm logon on asset for peer group by new user ↳ NKL-HU-F-new: Ntlm/Kerberos logon to private asset for new user T1550 - Use Alternate Authentication Material ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected ↳ NKL-UH-A: Abnormal NTLM/Kerberos logon to asset ↳ NKL-GH-F-new: First kerberos/ntlm logon to server for peer group by new user ↳ NKL-GH-A-new: Abnormal kerberos/ntlm logon on asset for peer group by new user ↳ NKL-HU-F-new: Ntlm/Kerberos logon to private asset for new user T1550.002 - Use Alternate Authentication Material: Pass the Hash ↳ NKL-UH-A: Abnormal NTLM/Kerberos logon to asset ↳ NKL-GH-F-new: First kerberos/ntlm logon to server for peer group by new user ↳ NKL-GH-A-new: Abnormal kerberos/ntlm logon on asset for peer group by new user ↳ NKL-HU-F-new: Ntlm/Kerberos logon to private asset for new user T1550.003 - Use Alternate Authentication Material: Pass the Ticket ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected ↳ NKL-UH-A: Abnormal NTLM/Kerberos logon to asset ↳ NKL-GH-F-new: First kerberos/ntlm logon to server for peer group by new user ↳ NKL-GH-A-new: Abnormal kerberos/ntlm logon on asset for peer group by new user ↳ NKL-HU-F-new: Ntlm/Kerberos logon to private asset for new user |
• NKL-HU: Users logging into this host remotely • KL-GH: Assets accessed by this peer group while logging in remotely |
nac-logon | T1078 - Valid Accounts ↳ NAC-UL-F: First network location for user ↳ NAC-UL-A: Abnormal network location for user ↳ NAC-UM-F: First MAC for user ↳ NAC-UM-A: Abnormal MAC for user T1021 - Remote Services ↳ NAC-UL-F: First network location for user ↳ NAC-UL-A: Abnormal network location for user |
• NAC-UM: MAC addresses for user • NAC-UL: Network locations for user |
network-connection-failed | T1190 - Exploit Public Fasing Application ↳ A-NETF-Log4j-IP: There was a failed attempt to access this asset by an external IP associated with Log4j exploit TA0010 - TA0010 ↳ A-NETF-HCountry-Outbound-F: First failed outbound connection to this country from asset ↳ A-NETF-HCountry-Outbound-A: Outbound connection to abnormal country for asset has failed ↳ A-NETF-OCountry-Outbound-F: First failed outbound connection to this country from organization ↳ A-NETF-OCountry-Outbound-A: Outbound connection to abnormal country for the organization has failed ↳ A-NETF-ZCountry-Outbound-A: Outbound connection to abnormal country for the zone has failed ↳ A-NETF-ZCountry-Outbound-F: First failed outbound connection to this country from zone ↳ A-NETF-OsH-Outbound-F: First failed outbound connection for host in the organization ↳ A-NETF-OsH-Outbound-A: Abnormal outbound connection from host failed in the organization ↳ A-NETF-ZsH-Outbound-F: First failed outbound connection for host in the zone ↳ A-NETF-ZsH-Outbound-A: Abnormal outbound connection from host failed in the zone ↳ A-NETF-HsH-Outbound-F: First failed outbound connection for host ↳ A-NETF-HsH-Outbound-A: Abnormal outbound connection from host failed ↳ A-NETF-OsZ-Outbound-F: First failed outbound connection from zone ↳ A-NETF-OsZ-Outbound-A: Abnormal outbound connection from zone failed TA0011 - TA0011 ↳ A-NETF-HCountry-Outbound-F: First failed outbound connection to this country from asset ↳ A-NETF-HCountry-Outbound-A: Outbound connection to abnormal country for asset has failed ↳ A-NETF-OCountry-Outbound-F: First failed outbound connection to this country from organization ↳ A-NETF-OCountry-Outbound-A: Outbound connection to abnormal country for the organization has failed ↳ A-NETF-ZCountry-Outbound-A: Outbound connection to abnormal country for the zone has failed ↳ A-NETF-ZCountry-Outbound-F: First failed outbound connection to this country from zone ↳ A-NET-TI-H-Outbound: Outbound connection to a known malicious host ↳ A-NETF-TI-H-Outbound: Outbound failed connection to a known malicious host ↳ A-NETF-OsH-Outbound-F: First failed outbound connection for host in the organization ↳ A-NETF-OsH-Outbound-A: Abnormal outbound connection from host failed in the organization ↳ A-NETF-ZsH-Outbound-F: First failed outbound connection for host in the zone ↳ A-NETF-ZsH-Outbound-A: Abnormal outbound connection from host failed in the zone ↳ A-NETF-HsH-Outbound-F: First failed outbound connection for host ↳ A-NETF-HsH-Outbound-A: Abnormal outbound connection from host failed ↳ A-NETF-OsZ-Outbound-F: First failed outbound connection from zone ↳ A-NETF-OsZ-Outbound-A: Abnormal outbound connection from zone failed T1090 - Proxy ↳ A-NETF-TOR-Outbound: Outbound failed connection to a known TOR IP T1090.003 - Proxy: Multi-hop Proxy ↳ A-NETF-TOR-Outbound: Outbound failed connection to a known TOR IP |
• A-NET-OsZ-Outbound: Outbound communicating zones in the organization • A-NET-HsH-Outbound: Outbound communicating hosts for the asset • A-NET-ZsH-Outbound: Outbound communicating hosts in the zone • A-NET-OsH-Outbound: Outbound communicating hosts • A-NETF-ZCountry-Outbound: Failed outbound country per zone • A-NETF-OCountry-Outbound: Failed outbound country per organization • A-NETF-HCountry-Outbound: Failed outbound country per asset |
network-connection-successful | T1190 - Exploit Public Fasing Application ↳ A-NET-HdPort-Inbound-F: First inbound connection on port for asset ↳ A-NET-HdPort-Inbound-A: Abnormal inbound network connection to this port for asset ↳ A-NET-ZdPort-Inbound-F: First inbound connection on port for zone ↳ A-NET-ZdPort-Inbound-A: Abnormal inbound connection on port for zone ↳ A-NET-HCountry-Inbound-F: First inbound connection from this country for asset ↳ A-NET-HCountry-Inbound-A: Abnormal connection from this country for asset ↳ A-NET-ZCountry-Inbound-F: First inbound connection from this country for zone ↳ A-NET-ZCountry-Inbound-A: Abnormal connection from this country for the zone ↳ A-NET-OCountry-Inbound-F: First inbound connection from this country for organization ↳ A-NET-OCountry-Inbound-A: Abnormal connection from this country for the organization ↳ A-NET-Log4j-IP: Asset was accessed by an external IP associated with Log4j exploit T1071 - Application Layer Protocol ↳ A-NET-ZdH-Inbound-A: Abnormal inbound connection to host for the zone. TA0011 - TA0011 ↳ A-NET-HdPort-Inbound-F: First inbound connection on port for asset ↳ A-NET-HdPort-Inbound-A: Abnormal inbound network connection to this port for asset ↳ A-NET-ZdPort-Inbound-F: First inbound connection on port for zone ↳ A-NET-ZdPort-Inbound-A: Abnormal inbound connection on port for zone ↳ A-NET-HCountry-Inbound-F: First inbound connection from this country for asset ↳ A-NET-HCountry-Inbound-A: Abnormal connection from this country for asset ↳ A-NET-ZCountry-Inbound-F: First inbound connection from this country for zone ↳ A-NET-ZCountry-Inbound-A: Abnormal connection from this country for the zone ↳ A-NET-OCountry-Inbound-F: First inbound connection from this country for organization ↳ A-NET-OCountry-Inbound-A: Abnormal connection from this country for the organization ↳ A-NET-HCountry-Outbound-F: First outbound connection to this country from asset ↳ A-NET-HCountry-Outbound-A: Abnormal outbound communication country for asset ↳ A-NET-ZCountry-Outbound-F: First outbound connection to this country from zone ↳ A-NET-ZCountry-Outbound-A: Abnormal outbound connection country for the zone ↳ A-NET-OCountry-Outbound-F: First outbound connection to this country from organization ↳ A-NET-OCountry-Outbound-A: Abnormal outbound connection country for the organization ↳ A-NET-TI-H-Outbound: Outbound connection to a known malicious host ↳ A-NET-TI-IP-Inbound: Inbound connection from a known malicious IP ↳ A-NET-TI-H-Inbound: Inbound connection from a known malicious host ↳ A-NET-OdPort-Inbound-F: First inbound traffic on previously unused port for the organization. ↳ A-NET-OdPort-Inbound-A: Abnormal inbound traffic on previously unused port for the organization. ↳ A-NET-OsH-Outbound-A: Abnormal outbound connection for asset in the organization ↳ A-NET-ZsH-Outbound-F: First outbound connection for asset for zone ↳ A-NET-ZsH-Outbound-A: Abnormal outbound connection for asset for zone ↳ A-NET-HsH-Outbound-F: First outbound connection for asset ↳ A-NET-HsH-Outbound-A: Abnormal outbound connection for asset ↳ A-NET-OsZ-Outbound-F: First outbound connection from zone for organization ↳ A-NET-OsZ-Outbound-A: Abnormal outbound connection from zone for organization ↳ A-NET-ZsZ-Outbound-F: First outbound connection from zone ↳ A-NET-ZsZ-Outbound-A: Abnormal outbound connection from zone for asset ↳ A-NET-HsZ-Outbound-F: First outbound connection from zone for asset ↳ A-NET-HsZ-Outbound-A: Abnormal outbound connection from zone ↳ A-NET-OdH-Inbound-F: First inbound connection to host for the organization. ↳ A-NET-OdH-Inbound-A: Abnormal inbound connection to host for the organization. ↳ A-NET-ZdH-Inbound-F: First inbound connection to host for the zone. TA0010 - TA0010 ↳ A-NET-HCountry-Outbound-F: First outbound connection to this country from asset ↳ A-NET-HCountry-Outbound-A: Abnormal outbound communication country for asset ↳ A-NET-ZCountry-Outbound-F: First outbound connection to this country from zone ↳ A-NET-ZCountry-Outbound-A: Abnormal outbound connection country for the zone ↳ A-NET-OCountry-Outbound-F: First outbound connection to this country from organization ↳ A-NET-OCountry-Outbound-A: Abnormal outbound connection country for the organization ↳ A-NET-OsH-Outbound-A: Abnormal outbound connection for asset in the organization ↳ A-NET-ZsH-Outbound-F: First outbound connection for asset for zone ↳ A-NET-ZsH-Outbound-A: Abnormal outbound connection for asset for zone ↳ A-NET-HsH-Outbound-F: First outbound connection for asset ↳ A-NET-HsH-Outbound-A: Abnormal outbound connection for asset ↳ A-NET-OsZ-Outbound-F: First outbound connection from zone for organization ↳ A-NET-OsZ-Outbound-A: Abnormal outbound connection from zone for organization ↳ A-NET-ZsZ-Outbound-F: First outbound connection from zone ↳ A-NET-ZsZ-Outbound-A: Abnormal outbound connection from zone for asset ↳ A-NET-HsZ-Outbound-F: First outbound connection from zone for asset ↳ A-NET-HsZ-Outbound-A: Abnormal outbound connection from zone T1090 - Proxy ↳ A-NET-TOR-Outbound: Outbound connection to a known TOR IP ↳ A-NET-TOR-Inbound: Inbound connection from a known TOR IP T1090.003 - Proxy: Multi-hop Proxy ↳ A-NET-TOR-Outbound: Outbound connection to a known TOR IP ↳ A-NET-TOR-Inbound: Inbound connection from a known TOR IP |
• A-NET-ZdH-Inbound: Hosts receiving inbound communications in the zone • A-NET-OdH-Inbound: Hosts receiving inbound communications in the organization • A-NET-HsZ-Outbound: Outbound communicating zones for the asset • A-NET-ZsZ-Outbound: Outbound communicating zones • A-NET-OsZ-Outbound: Outbound communicating zones in the organization • A-NET-HsH-Outbound: Outbound communicating hosts for the asset • A-NET-ZsH-Outbound: Outbound communicating hosts in the zone • A-NET-OsH-Outbound: Outbound communicating hosts • A-NET-OdPort-Inbound: Inbound destination ports per organization • A-NET-OCountry-Outbound: Outbound country per organization • A-NET-ZCountry-Outbound: Outbound country per zone • A-NET-HCountry-Outbound: Outbound country per asset • A-NET-OCountry-Inbound: Origination country per organization • A-NET-ZCountry-Inbound: Origination country per zone • A-NET-HCountry-Inbound: Inbound country per asset • A-NET-ZdPort-Inbound: Inbound destination ports per zone • A-NET-HdPort-Inbound: Inbound destination ports per asset |
ntlm-logon | T1550 - Use Alternate Authentication Material ↳ AE-NTLM-WsSrv: New generic hostname found using ntlm authentication ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected ↳ NKL-UH-A: Abnormal NTLM/Kerberos logon to asset ↳ NKL-GH-F-new: First kerberos/ntlm logon to server for peer group by new user ↳ NKL-GH-A-new: Abnormal kerberos/ntlm logon on asset for peer group by new user ↳ NKL-HU-F-new: Ntlm/Kerberos logon to private asset for new user ↳ A-AE-SwSh-F: New server hostname using NTLM authentication in the organization. ↳ A-PTH-ALERT-dH: Possible pass the hash attack by this user account T1550.002 - Use Alternate Authentication Material: Pass the Hash ↳ AE-NTLM-WsSrv: New generic hostname found using ntlm authentication ↳ NKL-UH-A: Abnormal NTLM/Kerberos logon to asset ↳ NKL-GH-F-new: First kerberos/ntlm logon to server for peer group by new user ↳ NKL-GH-A-new: Abnormal kerberos/ntlm logon on asset for peer group by new user ↳ NKL-HU-F-new: Ntlm/Kerberos logon to private asset for new user ↳ A-AE-SwSh-F: New server hostname using NTLM authentication in the organization. ↳ A-PTH-ALERT-dH: Possible pass the hash attack by this user account T1078 - Valid Accounts ↳ NKL-UH-A: Abnormal NTLM/Kerberos logon to asset ↳ NKL-GH-F-new: First kerberos/ntlm logon to server for peer group by new user ↳ NKL-GH-A-new: Abnormal kerberos/ntlm logon on asset for peer group by new user ↳ NKL-HU-F-new: Ntlm/Kerberos logon to private asset for new user T1550.003 - Use Alternate Authentication Material: Pass the Ticket ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected ↳ NKL-UH-A: Abnormal NTLM/Kerberos logon to asset ↳ NKL-GH-F-new: First kerberos/ntlm logon to server for peer group by new user ↳ NKL-GH-A-new: Abnormal kerberos/ntlm logon on asset for peer group by new user ↳ NKL-HU-F-new: Ntlm/Kerberos logon to private asset for new user T1558 - Steal or Forge Kerberos Tickets ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected ↳ NKL-UH-A: Abnormal NTLM/Kerberos logon to asset ↳ NKL-GH-F-new: First kerberos/ntlm logon to server for peer group by new user ↳ NKL-GH-A-new: Abnormal kerberos/ntlm logon on asset for peer group by new user ↳ NKL-HU-F-new: Ntlm/Kerberos logon to private asset for new user |
• A-AE-OHr: Random hostnames on asset • A-AE-NTLM: Models the NTLM hostnames seen in the organization • NKL-HU: Users logging into this host remotely • KL-GH: Assets accessed by this peer group while logging in remotely |
remote-access | T1550 - Use Alternate Authentication Material ↳ AE-NTLM-WsSrv: New generic hostname found using ntlm authentication ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected ↳ RLA-UAPackage-F: First time usage of Windows authentication package ↳ RLA-UAPackage-A: Abnormal usage of Windows authentication package ↳ A-AE-SwSh-F: New server hostname using NTLM authentication in the organization. ↳ A-NTLM-WsSrv: Hostname contains workstation or server ↳ A-NTLM-mismatch: Mismatch between logged and resolved hostnames ↳ A-PTH-ALERT-sH-Possible: Possible pass the hash attack with keylength of 0 in NTLM event and a 'null' sid on this source host. T1550.002 - Use Alternate Authentication Material: Pass the Hash ↳ AE-NTLM-WsSrv: New generic hostname found using ntlm authentication ↳ A-AE-SwSh-F: New server hostname using NTLM authentication in the organization. ↳ A-NTLM-WsSrv: Hostname contains workstation or server ↳ A-NTLM-mismatch: Mismatch between logged and resolved hostnames ↳ A-PTH-ALERT-sH-Possible: Possible pass the hash attack with keylength of 0 in NTLM event and a 'null' sid on this source host. T1558 - Steal or Forge Kerberos Tickets ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected ↳ A-KL-ToEt-Roast: Suspicious or weak encryption type used for obtaining the kerberos TGTs using non kerberos service for this asset T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting ↳ A-KL-ToEt-Roast: Suspicious or weak encryption type used for obtaining the kerberos TGTs using non kerberos service for this asset T1018 - Remote System Discovery ↳ A-RLA-sHdZ-F: First remote access to zone from asset ↳ A-RLA-sHdZ-A: Abnormal remote access to zone from asset ↳ A-RLA-dHsZ-F: First remote access from zone to asset ↳ A-RLA-dHsZ-A: Abnormal remote access from zone to asset T1021 - Remote Services ↳ RA-UH-sZ-F: First remote access to asset from first or abnormal zone ↳ RA-UH-sZ-A: Abnormal remote access to asset from first or abnormal zone ↳ RLA-UsZ-F: First source network zone for user ↳ RLA-UsZ-A: Abnormal source network zone for user ↳ RLA-UsH-dZ-F: First remote access to zone from new asset ↳ RLA-UsH-dZ-A: Abnormal remote access to zone from new asset ↳ RLA-dZsZ-F: First inter-zone communication from destination to source ↳ RLA-sZdZ-F: First inter-zone communication from source to destination ↳ RLA-sZdZ-A: Abnormal inter-zone communication ↳ RA-UH-CS-NC: Remote access to a critical system for user with no information ↳ RA-F-F-CS: First remote access to critical system for user ↳ RA-F-A-CS: Abnormal remote access to critical system for user ↳ RA-UH-A: Abnormal access to asset ↳ RA-UH-F: First access to asset ↳ RA-GH-A-new: Abnormal access to asset for group by new user ↳ RA-GH-F-new: First access to asset for group by a new user ↳ RA-HT-EXEC-new: New user remote access to executive asset ↳ A-RLA-sHdZ-F: First remote access to zone from asset ↳ A-RLA-sHdZ-A: Abnormal remote access to zone from asset ↳ A-RLA-dHsZ-F: First remote access from zone to asset ↳ A-RLA-dHsZ-A: Abnormal remote access from zone to asset T1078 - Valid Accounts ↳ RA-UH-sZ-F: First remote access to asset from first or abnormal zone ↳ RA-UH-sZ-A: Abnormal remote access to asset from first or abnormal zone ↳ RLA-UsZ-F: First source network zone for user ↳ RLA-UsZ-A: Abnormal source network zone for user ↳ RLA-UsH-dZ-F: First remote access to zone from new asset ↳ RLA-UsH-dZ-A: Abnormal remote access to zone from new asset ↳ RLA-dZsZ-F: First inter-zone communication from destination to source ↳ RLA-sZdZ-F: First inter-zone communication from source to destination ↳ RLA-sZdZ-A: Abnormal inter-zone communication ↳ RA-UH-CS-NC: Remote access to a critical system for user with no information ↳ RA-F-F-CS: First remote access to critical system for user ↳ RA-F-A-CS: Abnormal remote access to critical system for user ↳ RA-UH-A: Abnormal access to asset ↳ RA-UH-F: First access to asset ↳ RA-GH-A-new: Abnormal access to asset for group by new user ↳ RA-GH-F-new: First access to asset for group by a new user ↳ RA-HT-EXEC-new: New user remote access to executive asset T1550.003 - Use Alternate Authentication Material: Pass the Ticket ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected |
• A-AE-OHr: Random hostnames on asset • A-AE-NTLM: Models the NTLM hostnames seen in the organization • A-RLA-dHsZ: Destination Host to Source zone communication • A-RLA-sHdZ: Source Host to Destination zone communication • AL-HT-EXEC: Executive Assets • RA-GH: Assets accessed by this peer group remotely • RLA-UAPackage: Windows authentication packages used when connecting to remote hosts • RA-UH: Assets accessed by this user remotely • RLA-sZdZ: Destination zone communication • RLA-dZsZ: Source zone communication • AL-UsH: Source hosts per User • RLA-UsZ: Source zones for user |
remote-logon | T1550 - Use Alternate Authentication Material ↳ AE-NTLM-WsSrv: New generic hostname found using ntlm authentication ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected ↳ RLA-UAPackage-F: First time usage of Windows authentication package ↳ RLA-UAPackage-A: Abnormal usage of Windows authentication package ↳ A-AE-SwSh-F: New server hostname using NTLM authentication in the organization. ↳ A-NTLM-WsSrv: Hostname contains workstation or server ↳ A-NTLM-mismatch: Mismatch between logged and resolved hostnames ↳ A-PTH-ALERT-sH-Possible: Possible pass the hash attack with keylength of 0 in NTLM event and a 'null' sid on this source host. T1550.002 - Use Alternate Authentication Material: Pass the Hash ↳ AE-NTLM-WsSrv: New generic hostname found using ntlm authentication ↳ A-AE-SwSh-F: New server hostname using NTLM authentication in the organization. ↳ A-NTLM-WsSrv: Hostname contains workstation or server ↳ A-NTLM-mismatch: Mismatch between logged and resolved hostnames ↳ A-PTH-ALERT-sH-Possible: Possible pass the hash attack with keylength of 0 in NTLM event and a 'null' sid on this source host. T1558 - Steal or Forge Kerberos Tickets ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected ↳ A-KL-ToEt-Roast: Suspicious or weak encryption type used for obtaining the kerberos TGTs using non kerberos service for this asset T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting ↳ A-KL-ToEt-Roast: Suspicious or weak encryption type used for obtaining the kerberos TGTs using non kerberos service for this asset T1018 - Remote System Discovery ↳ A-RLA-sHdZ-F: First remote access to zone from asset ↳ A-RLA-sHdZ-A: Abnormal remote access to zone from asset ↳ A-RLA-dHsZ-F: First remote access from zone to asset ↳ A-RLA-dHsZ-A: Abnormal remote access from zone to asset T1021 - Remote Services ↳ RL-UH-sZ-F: First remote logon to asset from new or abnormal source network zone ↳ RL-UH-sZ-A: Abnormal remote logon to asset from new or abnormal source network zone ↳ RLA-UsZ-F: First source network zone for user ↳ RLA-UsZ-A: Abnormal source network zone for user ↳ RLA-UsH-dZ-F: First remote access to zone from new asset ↳ RLA-UsH-dZ-A: Abnormal remote access to zone from new asset ↳ RLA-dZsZ-F: First inter-zone communication from destination to source ↳ RLA-sZdZ-F: First inter-zone communication from source to destination ↳ RLA-sZdZ-A: Abnormal inter-zone communication ↳ RL-UH-F: First remote logon to asset ↳ RL-UH-A: Abnormal remote logon to asset ↳ RL-GH-F: First remote logon to asset for group ↳ RL-GH-A-new: Abnormal remote logon to asset for group by new user ↳ RL-HU-F-new: Remote logon to private asset for new user ↳ A-RLA-sHdZ-F: First remote access to zone from asset ↳ A-RLA-sHdZ-A: Abnormal remote access to zone from asset ↳ A-RLA-dHsZ-F: First remote access from zone to asset ↳ A-RLA-dHsZ-A: Abnormal remote access from zone to asset T1078 - Valid Accounts ↳ RL-UH-sZ-F: First remote logon to asset from new or abnormal source network zone ↳ RL-UH-sZ-A: Abnormal remote logon to asset from new or abnormal source network zone ↳ RLA-UsZ-F: First source network zone for user ↳ RLA-UsZ-A: Abnormal source network zone for user ↳ RLA-UsH-dZ-F: First remote access to zone from new asset ↳ RLA-UsH-dZ-A: Abnormal remote access to zone from new asset ↳ RLA-dZsZ-F: First inter-zone communication from destination to source ↳ RLA-sZdZ-F: First inter-zone communication from source to destination ↳ RLA-sZdZ-A: Abnormal inter-zone communication ↳ RL-UH-F: First remote logon to asset ↳ RL-UH-A: Abnormal remote logon to asset ↳ RL-GH-F: First remote logon to asset for group ↳ RL-GH-A-new: Abnormal remote logon to asset for group by new user ↳ RL-HU-F-new: Remote logon to private asset for new user T1090 - Proxy ↳ Auth-Tor-Shost: User authentication or login from a known TOR IP T1090.003 - Proxy: Multi-hop Proxy ↳ Auth-Tor-Shost: User authentication or login from a known TOR IP T1550.003 - Use Alternate Authentication Material: Pass the Ticket ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected |
• A-AE-OHr: Random hostnames on asset • A-AE-NTLM: Models the NTLM hostnames seen in the organization • A-RLA-dHsZ: Destination Host to Source zone communication • A-RLA-sHdZ: Source Host to Destination zone communication • RL-HU: Remote logon users • RL-GH-A: Assets accessed remotely by this peer group • RLA-UAPackage: Windows authentication packages used when connecting to remote hosts • RL-UH: Remote logons • RLA-sZdZ: Destination zone communication • RLA-dZsZ: Source zone communication • AL-UsH: Source hosts per User • RLA-UsZ: Source zones for user |
share-access | T1021 - Remote Services ↳ A-SA-OU-F: First admin share access to asset for this user in the organization ↳ A-SA-OU-A: Abnormal admin share access to asset for the user in the organization ↳ A-SA-OH-F: First admin share on asset for organization ↳ A-SA-OH-A: Abnormal admin share on asset in organization ↳ A-SA-ZH-F: First admin share on asset in the zone ↳ A-SA-ZH-A: Abnormal admin share on asset for zone ↳ A-SA-AsU-F: First access of admin share on asset ↳ A-SA-AsU-A: Abnormal access of admin share on the asset T1021.002 - Remote Services: SMB/Windows Admin Shares ↳ A-SA-OU-F: First admin share access to asset for this user in the organization ↳ A-SA-OU-A: Abnormal admin share access to asset for the user in the organization ↳ A-SA-OH-F: First admin share on asset for organization ↳ A-SA-OH-A: Abnormal admin share on asset in organization ↳ A-SA-ZH-F: First admin share on asset in the zone ↳ A-SA-ZH-A: Abnormal admin share on asset for zone ↳ A-SA-AsU-F: First access of admin share on asset ↳ A-SA-AsU-A: Abnormal access of admin share on the asset |
• A-SA-AsU: Users per Admin share • A-SA-ZH: Dest zones on which admin shares are accessed • A-SA-OH: Assets on which admin shares are accessed in organization • A-SA-OU: Admin Share users in organization |
web-activity-allowed | T1190 - Exploit Public Fasing Application ↳ A-NET-Log4j-IP: Asset was accessed by an external IP associated with Log4j exploit T1090 - Proxy ↳ WEB-UD-TorProxy: User has accessed a known Tor web proxy ↳ WEB-UI-Tor: User has accessed a known Tor exit node ↳ WEB-URank-Tor: User has accessed a tor-to-web proxy site ↳ A-WEB-TorProxy: Asset has accessed a known Tor web proxy ↳ A-WEB-UU-Tor: Asset has accessed a URL containing '/tor/server' ↳ A-NET-TOR-Outbound: Outbound connection to a known TOR IP T1090.003 - Proxy: Multi-hop Proxy ↳ WEB-UD-TorProxy: User has accessed a known Tor web proxy ↳ WEB-UI-Tor: User has accessed a known Tor exit node ↳ WEB-URank-Tor: User has accessed a tor-to-web proxy site ↳ A-WEB-TorProxy: Asset has accessed a known Tor web proxy ↳ A-WEB-UU-Tor: Asset has accessed a URL containing '/tor/server' ↳ A-NET-TOR-Outbound: Outbound connection to a known TOR IP T1071 - Application Layer Protocol ↳ WEB-URank-Tor: User has accessed a tor-to-web proxy site T1071.001 - Application Layer Protocol: Web Protocols ↳ WEB-URank-Tor: User has accessed a tor-to-web proxy site |
|
web-activity-denied | T1190 - Exploit Public Fasing Application ↳ A-NETF-Log4j-IP: There was a failed attempt to access this asset by an external IP associated with Log4j exploit T1090 - Proxy ↳ WEB-UD-TorProxy: User has accessed a known Tor web proxy ↳ WEB-UI-Tor: User has accessed a known Tor exit node ↳ WEB-URank-Tor: User has accessed a tor-to-web proxy site ↳ A-WEB-TorProxy: Asset has accessed a known Tor web proxy ↳ A-WEB-UU-Tor: Asset has accessed a URL containing '/tor/server' ↳ A-NETF-TOR-Outbound: Outbound failed connection to a known TOR IP T1090.003 - Proxy: Multi-hop Proxy ↳ WEB-UD-TorProxy: User has accessed a known Tor web proxy ↳ WEB-UI-Tor: User has accessed a known Tor exit node ↳ WEB-URank-Tor: User has accessed a tor-to-web proxy site ↳ A-WEB-TorProxy: Asset has accessed a known Tor web proxy ↳ A-WEB-UU-Tor: Asset has accessed a URL containing '/tor/server' ↳ A-NETF-TOR-Outbound: Outbound failed connection to a known TOR IP T1071 - Application Layer Protocol ↳ WEB-URank-Tor: User has accessed a tor-to-web proxy site T1071.001 - Application Layer Protocol: Web Protocols ↳ WEB-URank-Tor: User has accessed a tor-to-web proxy site |