Product: ISE
Use-Case: Lateral Movement
Rules | Models | MITRE ATT&CK® TTPs | Event Types | Parsers |
---|---|---|---|---|
56 | 19 | 12 | 8 | 8 |
Event Type | Rules | Models |
---|---|---|
app-activity | T1090.003 - Proxy: Multi-hop Proxy ↳ Auth-Tor-Shost: User authentication or login from a known TOR IP |
|
authentication-failed | T1078 - Valid Accounts ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP T1090.003 - Proxy: Multi-hop Proxy ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP |
|
authentication-successful | T1090.003 - Proxy: Multi-hop Proxy ↳ Auth-Tor-Shost: User authentication or login from a known TOR IP |
|
failed-logon | T1550.002 - Use Alternate Authentication Material: Pass the Hash ↳ A-PTH-ALERT-sH-Failed: Failed pass the hash attack with keylength of 0 in NTLM event and a 'null' sid on this source host. ↳ FAIL-PTH-ALERT-sH: Possible unsuccessful pass the hash attack from the source ↳ FAIL-PTH-ALERT-dH: Possible unsuccessful pass the hash attack by the user ↳ PTH-ALERT-sH-Failed: Failed pass the hash attack with keylength of 0 in NTLM event and a 'null' sid. T1021.001 - Remote Services: Remote Desktop Protocol ↳ RDP-Brute-Force: Abnormal number of RDP failed logons for this user T1110 - Brute Force ↳ A-FL-MULTI-USERS-S: Multiple users failed to login (S) ↳ A-FL-MULTI-USERS-L: Multiple users failed to login (L) ↳ A-FL-MULTI-USERS-M: Multiple users failed to login (M) ↳ A-FL-MULTI-DEST-S: Failed logins to multiple destinations from host (S) ↳ A-FL-MULTI-DEST-M: Failed logins to multiple destinations from host (M) ↳ RDP-Brute-Force: Abnormal number of RDP failed logons for this user T1078 - Valid Accounts ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP T1090.003 - Proxy: Multi-hop Proxy ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP T1550.003 - Use Alternate Authentication Material: Pass the Ticket ↳ KL-TfG: Rare Kerberos ticket failure code ↳ KL-Tf-fail: Failed logon due to a malformed authentication ticket T1558 - Steal or Forge Kerberos Tickets ↳ KL-TfG: Rare Kerberos ticket failure code ↳ KL-Tf-fail: Failed logon due to a malformed authentication ticket T1110.003 - T1110.003 ↳ A-FL-MULTI-USERS-SRC: The same host failed to login to multiple users |
• AE-OHr: Random hostnames |
failed-vpn-login | T1078 - Valid Accounts ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP T1090.003 - Proxy: Multi-hop Proxy ↳ Auth-Tor-Shost-Failed: User authentication or login failure from a known TOR IP |
|
nac-logon | T1078 - Valid Accounts ↳ NAC-UL-F: First network location for user ↳ NAC-UL-A: Abnormal network location for user ↳ NAC-UM-F: First MAC for user ↳ NAC-UM-A: Abnormal MAC for user T1021 - Remote Services ↳ NAC-UL-F: First network location for user ↳ NAC-UL-A: Abnormal network location for user |
• NAC-UM: MAC addresses for user • NAC-UL: Network locations for user |
remote-logon | T1021 - Remote Services ↳ A-RLA-sHdZ-F: First remote access to zone from asset ↳ A-RLA-sHdZ-A: Abnormal remote access to zone from asset ↳ A-RLA-dHsZ-F: First remote access from zone to asset ↳ A-RLA-dHsZ-A: Abnormal remote access from zone to asset ↳ RL-UH-sZ-F: First remote logon to asset from new or abnormal source network zone ↳ RL-UH-sZ-A: Abnormal remote logon to asset from new or abnormal source network zone ↳ RLA-UsZ-F: First source network zone for user ↳ RLA-UsZ-A: Abnormal source network zone for user ↳ RLA-UsH-dZ-F: First remote access to zone from new asset ↳ RLA-UsH-dZ-A: Abnormal remote access to zone from new asset ↳ RLA-dZsZ-F: First inter-zone communication from destination to source ↳ RLA-sZdZ-F: First inter-zone communication from source to destination ↳ RLA-sZdZ-A: Abnormal inter-zone communication ↳ RL-UH-F: First remote logon to asset ↳ RL-UH-A: Abnormal remote logon to asset ↳ RL-GH-F: First remote logon to asset for group ↳ RL-GH-A-new: Abnormal remote logon to asset for group by new user ↳ RL-HU-F-new: Remote logon to private asset for new user T1078 - Valid Accounts ↳ RL-UH-sZ-F: First remote logon to asset from new or abnormal source network zone ↳ RL-UH-sZ-A: Abnormal remote logon to asset from new or abnormal source network zone ↳ RLA-UsZ-F: First source network zone for user ↳ RLA-UsZ-A: Abnormal source network zone for user ↳ RLA-UsH-dZ-F: First remote access to zone from new asset ↳ RLA-UsH-dZ-A: Abnormal remote access to zone from new asset ↳ RLA-dZsZ-F: First inter-zone communication from destination to source ↳ RLA-sZdZ-F: First inter-zone communication from source to destination ↳ RLA-sZdZ-A: Abnormal inter-zone communication ↳ RL-UH-F: First remote logon to asset ↳ RL-UH-A: Abnormal remote logon to asset ↳ RL-GH-F: First remote logon to asset for group ↳ RL-GH-A-new: Abnormal remote logon to asset for group by new user ↳ RL-HU-F-new: Remote logon to private asset for new user T1550.002 - Use Alternate Authentication Material: Pass the Hash ↳ A-AE-SwSh-F: New server hostname using NTLM authentication in the organization. ↳ A-NTLM-WsSrv: Hostname contains workstation or server ↳ A-NTLM-mismatch: Mismatch between logged and resolved hostnames ↳ A-PTH-ALERT-sH-Possible: Possible pass the hash attack with keylength of 0 in NTLM event and a 'null' sid on this source host. ↳ AE-NTLM-WsSrv: New generic hostname found using ntlm authentication ↳ NTLM-mismatch: ↳ PTH-ALERT-sH-Possible: Possible pass the hash attack with keylength of 0 in NTLM event and a 'null' sid. T1550 - Use Alternate Authentication Material ↳ RLA-UAPackage-F: First time usage of Windows authentication package ↳ RLA-UAPackage-A: Abnormal usage of Windows authentication package T1090.003 - Proxy: Multi-hop Proxy ↳ Auth-Tor-Shost: User authentication or login from a known TOR IP T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting ↳ A-KL-ToEt-Roast: Suspicious or weak encryption type used for obtaining the kerberos TGTs using non kerberos service for this asset ↳ KL-ToEt-Roast: Suspicious or weak encryption type used for obtaining kerberos TGTs using non kerberos service T1550.003 - Use Alternate Authentication Material: Pass the Ticket ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected T1558 - Steal or Forge Kerberos Tickets ↳ EXPERT-PENTEST-DOMAINS: Possible credentials theft attack detected T1018 - Remote System Discovery ↳ A-RLA-sHdZ-F: First remote access to zone from asset ↳ A-RLA-sHdZ-A: Abnormal remote access to zone from asset ↳ A-RLA-dHsZ-F: First remote access from zone to asset ↳ A-RLA-dHsZ-A: Abnormal remote access from zone to asset |
• RL-HU: Remote logon users • RL-GH-A: Assets accessed remotely by this peer group • RLA-UAPackage: Windows authentication packages used when connecting to remote hosts • RL-UH: Remote logons • AE-NTLM: Models ntlm hostnames in the organization • AE-OHr: Random hostnames • RLA-sZdZ: Destination zone communication • RLA-dZsZ: Source zone communication • AL-UsH: Source hosts per User • RLA-UsZ: Source zones for user • A-AE-OHr: Random hostnames on asset • A-AE-NTLM: Models the NTLM hostnames seen in the organization • A-RLA-dHsZ: Destination Host to Source zone communication • A-RLA-sHdZ: Source Host to Destination zone communication |
vpn-login | T1090.003 - Proxy: Multi-hop Proxy ↳ Auth-Tor-Shost: User authentication or login from a known TOR IP |
|
vpn-logout | T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting ↳ KL-USnCOUNT-A: Abnormal number of services used to obtain TGTs by user ↳ KL-GSnCOUNT-A: Abnormal number of services used to obtain TGTs by peer group T1021 - Remote Services ↳ RA-UHcount-S: Abnormal number of accessed hosts for user (S) ↳ RA-UHcount-M: Abnormal number of accessed hosts for user (M) ↳ RA-UHcount-L: Abnormal number of accessed hosts for user (L) ↳ RA-OHcount: Abnormal number of accessed hosts for the organization ↳ RA-GHcount: Abnormal number of accessed assets for group T1078 - Valid Accounts ↳ RA-UHcount-S: Abnormal number of accessed hosts for user (S) ↳ RA-UHcount-M: Abnormal number of accessed hosts for user (M) ↳ RA-UHcount-L: Abnormal number of accessed hosts for user (L) ↳ RA-OHcount: Abnormal number of accessed hosts for the organization ↳ RA-GHcount: Abnormal number of accessed assets for group |
• KL-GSnCOUNT: Count of services used to obtain kerberos TGTs in a session for peer group • KL-USnCOUNT: Count of services used to obtain kerberos TGTs in a session for user • RA-OHcount: Count of assets access per user in the organization |