Skip to content

Latest commit

 

History

History
25 lines (23 loc) · 12.7 KB

ds_cds_cds.md

File metadata and controls

25 lines (23 loc) · 12.7 KB

Vendor: CDS

Product: CDS

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
102 36 21 2 1
Use-Case Activity Types (Legacy Event Type)/Parsers MITRE ATT&CK® TTP Content
Abnormal Authentication & Access endpoint-login:fail (failed-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth

endpoint-login:success (remote-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth
T1021 - Remote Services
T1078 - Valid Accounts
T1078.002 - T1078.002
T1078.003 - Valid Accounts: Local Accounts
T1110 - Brute Force
T1133 - External Remote Services
  • 34 Rules
  • 16 Models
Brute Force Attack endpoint-login:fail (failed-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth
T1021 - Remote Services
T1021.001 - Remote Services: Remote Desktop Protocol
T1110 - Brute Force
T1110.003 - T1110.003
  • 9 Rules
Compromised Credentials endpoint-login:fail (failed-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth

endpoint-login:success (remote-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth
T1021 - Remote Services
T1078 - Valid Accounts
T1078.002 - T1078.002
T1078.003 - Valid Accounts: Local Accounts
T1133 - External Remote Services
T1550 - Use Alternate Authentication Material
T1550.003 - Use Alternate Authentication Material: Pass the Ticket
T1558 - Steal or Forge Kerberos Tickets
  • 39 Rules
  • 17 Models
Lateral Movement endpoint-login:fail (failed-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth

endpoint-login:success (remote-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth
T1018 - Remote System Discovery
T1021 - Remote Services
T1021.001 - Remote Services: Remote Desktop Protocol
T1078 - Valid Accounts
T1090 - Proxy
T1090.003 - Proxy: Multi-hop Proxy
T1110 - Brute Force
T1110.003 - T1110.003
T1550 - Use Alternate Authentication Material
T1550.002 - Use Alternate Authentication Material: Pass the Hash
T1550.003 - Use Alternate Authentication Material: Pass the Ticket
T1558 - Steal or Forge Kerberos Tickets
T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting
  • 40 Rules
  • 13 Models
Malware endpoint-login:fail (failed-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth

endpoint-login:success (remote-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth
T1078 - Valid Accounts
T1210 - Exploitation of Remote Services
T1550 - Use Alternate Authentication Material
T1550.003 - Use Alternate Authentication Material: Pass the Ticket
T1558 - Steal or Forge Kerberos Tickets
TA0002 - TA0002
  • 7 Rules
  • 2 Models
Privilege Abuse endpoint-login:fail (failed-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth

endpoint-login:success (remote-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth
T1078 - Valid Accounts
T1078.002 - T1078.002
  • 12 Rules
  • 7 Models
Privilege Escalation endpoint-login:fail (failed-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth

endpoint-login:success (remote-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth
T1078 - Valid Accounts
T1210 - Exploitation of Remote Services
T1555 - Credentials from Password Stores
T1555.005 - T1555.005
  • 3 Rules
  • 1 Models
Privileged Activity endpoint-login:fail (failed-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth

endpoint-login:success (remote-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth
T1021 - Remote Services
T1068 - Exploitation for Privilege Escalation
T1078 - Valid Accounts
T1078.002 - T1078.002
  • 16 Rules
  • 7 Models
Ransomware endpoint-login:fail (failed-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth

endpoint-login:success (remote-logon)
cds-cds-kv-endpoint-login-userlogin
cds-cds-kv-endpoint-login-userauth
T1078 - Valid Accounts
  • 1 Rules

MITRE ATT&CK® Framework for Enterprise

Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
External Remote Services

Valid Accounts

External Remote Services

Valid Accounts

Valid Accounts

Exploitation for Privilege Escalation

Valid Accounts

Use Alternate Authentication Material

Use Alternate Authentication Material: Pass the Hash

Use Alternate Authentication Material: Pass the Ticket

Valid Accounts: Local Accounts

Brute Force

Steal or Forge Kerberos Tickets

Credentials from Password Stores

Steal or Forge Kerberos Tickets: Kerberoasting

Remote System Discovery

Exploitation of Remote Services

Remote Services

Use Alternate Authentication Material

Remote Services: Remote Desktop Protocol

Proxy: Multi-hop Proxy

Proxy