Skip to content

Latest commit

 

History

History
16 lines (14 loc) · 12.7 KB

r_m_ibm_db2_Compromised_Credentials.md

File metadata and controls

16 lines (14 loc) · 12.7 KB

Rules by Product and UseCase

Vendor: IBM

Product: DB2

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
86 38 15 3 1
Event Type Rules Models
file-read T1003 - OS Credential Dumping
A-FA-LSASS: Possible Mimikatz attack on this asset by a user process
A-NTDS-Access-F: The NTDS database was accessed from a new location on this asset.
A-NTDS-Access-A: The NTDS database was accessed from a non default location on this asset.
A-NTDS-Access: The NTDS database was accessed from a non default location without 'ntds.dit' in the file path on this asset.

T1003.003 - T1003.003
A-NTDS-Access-F: The NTDS database was accessed from a new location on this asset.
A-NTDS-Access-A: The NTDS database was accessed from a non default location on this asset.
A-NTDS-Access: The NTDS database was accessed from a non default location without 'ntds.dit' in the file path on this asset.

T1003.001 - T1003.001
A-FA-LSASS: Possible Mimikatz attack on this asset by a user process

T1083 - File and Directory Discovery
FA-UA-UI-F: First file activity from ISP
FA-UA-UC-F: First file activity from country for user
FA-UA-UC-A: Abnormal file activity from country for user
FA-UA-GC-F: First file activity from country for group
FA-UA-GC-A: Abnormal file activity from country for group
FA-UA-OC-F: First file activity from country for organization
FA-UA-OC-A: Abnormal file activity from country for organization
FA-UTi: Abnormal user file activity time
FA-UH-F: First file access from asset for user
FA-UH-A: Abnormal file access from asset for user
FA-OZ-F: First file access from network zone for organization
FA-OZ-A: Abnormal file access from network zone for organization
FA-UZ-F: First file access from network zone for user
FA-UZ-A: Abnormal file access from network zone for user
FA-UA-F: First file access activity for user
FA-UA-A: Abnormal file access activity for user
FA-OU-F: First access to source code files for user in the organization
FA-OU-A: Abnormal access to source code files for user in the organization
FA-OG-F: First access to source code files for user in the peer group
FA-OG-A: Abnormal access to source code files for user in the peer group
FA-UD-F: First file server access for user
FA-UD-A: Abnormal file server access for user
FA-GD-F: First file server access for group
FA-GD-A: Abnormal file server access for group
A-NTDS-Access: Models the amount of accesses to paths that are related to NTDS
FA-GD: File server access per group
FA-UD: File server access per user
FA-OG: Users accessing source code files in the peer group
FA-OU: Users accessing source code files in the organization
FA-UA: File access activities for user
FA-UZ: File accesses from network zone for user
FA-OZ: File accesses from network zone for organization
FA-UH: User file access source host
FA-UTi: File activity time for user
FA-UA-OC: Countries for organization file activities
FA-UA-GC: Countries for peer groups file activities
FA-UA-UC: Countries for user file activity
FA-UA-UI-new: ISP of users during file activity
remote-logon T1078 - Valid Accounts
AL-HLocU-F: First local user logon to this asset
AL-HLocU-A: Abnormal local user logon to this asset
SL-UH-I: Interactive logon using a service account
SL-UH-A: Abnormal access from asset for a service account
AL-UT-F: Logon to New Asset Type
AL-UT-A: Logon to Abnormal asset type
AL-F-F-CS: First logon to a critical system for user
AL-F-A-CS: Abnormal logon to a critical system for user
AL-UH-CS-NC: Logon to a critical system for a user with no information
AL-OU-F-CS: First logon to a critical system that user has not previously accessed
AL-F-F-DC-G: First logon to a Domain Controller for peer group
AL-F-A-DC-G: Abnormal logon to a Domain Controller for Peer Group
AL-UH-F-DC: First logon to this Domain Controller for user
AL-UH-A-DC: Abnormal logon to a Domain Controller that user has not accessed often previously
AL-UH-DC-NC: Logon to a Domain Controller for user with no information
RL-UZ-F-DC: First logon to a Domain Controller from zone for user
RL-OZ-F-DC: First logon to a Domain Controller from zone for organization
RL-OZ-A-DC: Abnormal logon to a Domain Controller from zone for organization
RL-UH-F: First remote logon to asset
RL-UH-A: Abnormal remote logon to asset
AL-UZ-F: First logon to network zone
AL-UZ-A: Abnormal logon to network zone
RL-GH-F: First remote logon to asset for group
UA-UI-F: First activity from ISP
RL-GH-A-new: Abnormal remote logon to asset for group by new user
AL-GZ-F-new: First logon to network zone for new user of group
AL-GZ-A-new: Abnormal logon to network zone for group of new user
RL-HU-F-new: Remote logon to private asset for new user
UA-UC-Suspicious: Activity from suspicious country
UA-UC-Two: Activity from two different countries
UA-UC-Three: Activity from 3 different countries
A-AL-DhU-F: First user per asset
A-AL-DhU-A: Abnormal user per asset

T1133 - External Remote Services
UA-UI-F: First activity from ISP
UA-UC-Suspicious: Activity from suspicious country
UA-UC-Two: Activity from two different countries
UA-UC-Three: Activity from 3 different countries

T1021 - Remote Services
RL-UZ-F-DC: First logon to a Domain Controller from zone for user
RL-OZ-F-DC: First logon to a Domain Controller from zone for organization
RL-OZ-A-DC: Abnormal logon to a Domain Controller from zone for organization
RL-UH-F: First remote logon to asset
RL-UH-A: Abnormal remote logon to asset
RL-GH-F: First remote logon to asset for group
RL-GH-A-new: Abnormal remote logon to asset for group by new user
RL-HU-F-new: Remote logon to private asset for new user

T1550 - Use Alternate Authentication Material
EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected
RLA-UAPackage-F: First time usage of Windows authentication package
RLA-UAPackage-A: Abnormal usage of Windows authentication package

T1078.002 - T1078.002
SL-UH-I: Interactive logon using a service account
SL-UH-A: Abnormal access from asset for a service account
AL-F-F-DC-G: First logon to a Domain Controller for peer group
AL-F-A-DC-G: Abnormal logon to a Domain Controller for Peer Group
AL-UH-F-DC: First logon to this Domain Controller for user
AL-UH-A-DC: Abnormal logon to a Domain Controller that user has not accessed often previously
AL-UH-DC-NC: Logon to a Domain Controller for user with no information
RL-UZ-F-DC: First logon to a Domain Controller from zone for user
RL-OZ-F-DC: First logon to a Domain Controller from zone for organization
RL-OZ-A-DC: Abnormal logon to a Domain Controller from zone for organization

T1550.003 - Use Alternate Authentication Material: Pass the Ticket
EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected

T1558 - Steal or Forge Kerberos Tickets
EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected

T1078.003 - Valid Accounts: Local Accounts
AL-HLocU-F: First local user logon to this asset
AL-HLocU-A: Abnormal local user logon to this asset
A-AL-DhU: Users per Host
RL-HU: Remote logon users
AL-GZ: Network zones accessed by this peer group
RL-GH-A: Assets accessed remotely by this peer group
RLA-UAPackage: Windows authentication packages used when connecting to remote hosts
UA-UI-new: ISP of users during application activity
RL-UH: Remote logons
RL-OZ-DC: Source zones in the organization during domain controller access
RL-UZ-DC: Source zones per user logging into domain controller
RA-UH: Assets accessed by this user remotely
AL-UH-DC: Logons to Domain Controllers
AL-OU-CS: Logon to critical servers
AL-UT: Types of hosts
AL-UsH: Source hosts per User
IL-UH-SA: Interactive logon hosts for service accounts
NKL-HU: Users logging into this host remotely
security-alert T1027 - Obfuscated Files or Information
A-ALERT-Critical: Security Alert on a critical asset
A-ALERT-Log4j: Alert associated with an exploitation or post exploitation as seen with Log4j Vulnerability was detected.

T1027.005 - Obfuscated Files or Information: Indicator Removal from Tools
A-ALERT-Critical: Security Alert on a critical asset
A-ALERT-Log4j: Alert associated with an exploitation or post exploitation as seen with Log4j Vulnerability was detected.

T1190 - Exploit Public Fasing Application
A-Log4j-Vul-Alert: Alert for the CVE-2021-44228 vulnerability on the asset.

T1078 - Valid Accounts
SA-OU-ALERT-F: First security alert triggered for this user in the organization
SA-OU-ALERT-A: Abnormal user triggering security alert in the organization
SA-OG-ALERT-F: First security alert triggered for peer group in the organization
SA-OG-ALERT-A: Abnormal peer group triggering security alert in the organization
SA-UA-F: First security alert name for user
SA-UA-A: Abnormal security alert name for user
SA-GA-F: First security alert name in the peer group
SA-GA-A: Abnormal security alert name in the peer group
SA-OA-F: First security alert name in the organization
A-SA-AN-ALERT-F: First security alert name on the asset
A-SA-AN-ALERT-A: Abnormal security alert name on the asset
A-SA-ON-ALERT-F: First security alert (by name) in the organization
A-SA-ON-ALERT-A: Abnormal security alert (by name) in the organization
A-SA-ZN-ALERT-F: First security alert (by name) in the zone
A-SA-ZN-ALERT-A: Abnormal security alert (by name) in the zone
A-SA-HN-ALERT-F: First security alert (by name) in the asset
A-SA-HN-ALERT-A: Abnormal security alert (by name) in the asset
A-SA-OA-ALERT-F: First security alert for this asset for organization
A-SA-OA-ALERT-A: Abnormal asset triggering security alert for organization

T1133 - External Remote Services
ALERT-VPN: Security Alert on asset accessed by this user during VPN session
A-SA-OA-ALERT: Assets triggering security alerts in the organization
A-SA-HN-ALERT: Security alert names triggered by the asset
A-SA-ZN-ALERT: Security alert names triggered in the zone
A-SA-ON-ALERT: Security alert names triggered in the organization
A-SA-AN-ALERT: Security alert names on asset
SA-GA: Security alert names in the peer group
SA-UA: Security alert names for user
SA-OG-ALERT: Peer groups triggering security alerts in the organization
SA-OU-ALERT: Users triggering security alerts in the organization