Skip to content

Latest commit

 

History

History
15 lines (13 loc) · 2.29 KB

r_m_ibm_db2_Malware.md

File metadata and controls

15 lines (13 loc) · 2.29 KB

Rules by Product and UseCase

Vendor: IBM

Product: DB2

Use-Case: Malware

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
6 2 5 2 1
Event Type Rules Models
remote-logon TA0002 - TA0002
DEF-TEMP-DIRECTORY-F: First time process has been executed from a temporary directory by this user
DEF-TEMP-DIRECTORY-A: Abnormal process has been executed from a temporary directory by this user
A-EPA-TEMP-DIRECTORY-F: First execution of this process from a temporary directory on this asset
A-EPA-TEMP-DIRECTORY-A: Abnormal execution of this process from a temporary directory

T1078 - Valid Accounts
Auth-Blacklist-Shost: User authentication or login from a known blacklisted IP

T1550 - Use Alternate Authentication Material
EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected

T1550.003 - Use Alternate Authentication Material: Pass the Ticket
EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected

T1558 - Steal or Forge Kerberos Tickets
EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected
A-EPA-UP-TEMP: Processes executed from TEMP directories on this asset
AE-UP-TEMP: Process executable TEMP directories for this user during a session
security-alert TA0002 - TA0002
DEF-TEMP-DIRECTORY-F: First time process has been executed from a temporary directory by this user
DEF-TEMP-DIRECTORY-A: Abnormal process has been executed from a temporary directory by this user
A-EPA-TEMP-DIRECTORY-F: First execution of this process from a temporary directory on this asset
A-EPA-TEMP-DIRECTORY-A: Abnormal execution of this process from a temporary directory
A-EPA-UP-TEMP: Processes executed from TEMP directories on this asset
AE-UP-TEMP: Process executable TEMP directories for this user during a session