Product: CDS
Use-Case: Malware
Rules | Models | MITRE ATT&CK® TTPs | Activity Types | Parsers |
---|---|---|---|---|
7 | 2 | 6 | 2 | 1 |
Event Type | Rules | Models |
---|---|---|
failed-logon | T1210 - Exploitation of Remote Services ↳ A-Suspicious-Bluekeep1: The account AAAAAAA failed to logon on this asset. |
|
remote-logon | TA0002 - TA0002 ↳ DEF-TEMP-DIRECTORY-F: First time process has been executed from a temporary directory by this user ↳ DEF-TEMP-DIRECTORY-A: Abnormal process has been executed from a temporary directory by this user ↳ A-EPA-TEMP-DIRECTORY-F: First execution of this process from a temporary directory on this asset ↳ A-EPA-TEMP-DIRECTORY-A: Abnormal execution of this process from a temporary directory T1078 - Valid Accounts ↳ Auth-Blacklist-Shost: User authentication or login from a known blacklisted IP T1550 - Use Alternate Authentication Material ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected T1550.003 - Use Alternate Authentication Material: Pass the Ticket ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected T1558 - Steal or Forge Kerberos Tickets ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected |
• A-EPA-UP-TEMP: Processes executed from TEMP directories on this asset • AE-UP-TEMP: Process executable TEMP directories for this user during a session |