Rules | Models | MITRE TTPs | Event Types | Parsers |
---|---|---|---|---|
73 | 30 | 17 | 2 | 2 |
Use-Case | Event Types/Parsers | MITRE TTP | Content |
---|---|---|---|
Abnormal Authentication & Access | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1078 - Valid Accounts T1133 - External Remote Services |
|
Abnormal Remote Access | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1018 - Remote System Discovery T1021 - Remote Services T1021.001 - Remote Services: Remote Desktop Protocol T1075 - T1075 T1078 - Valid Accounts T1110 - Brute Force T1550 - Use Alternate Authentication Material |
|
Abnormal User Activity | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1021 - Remote Services T1078 - Valid Accounts T1078.003 - Valid Accounts: Local Accounts T1110 - Brute Force T1133 - External Remote Services |
|
Account Manipulation | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1078 - Valid Accounts |
|
Account Switch | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1078 - Valid Accounts |
|
Brute Force Attack | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1021.001 - Remote Services: Remote Desktop Protocol T1078 - Valid Accounts T1110 - Brute Force |
|
Bypass Access Controls | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1210 - Exploitation of Remote Services |
|
Compromised Service Account | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1078 - Valid Accounts |
|
Evasion | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1090.003 - Proxy: Multi-hop Proxy |
|
Executive Account Abuse | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1078 - Valid Accounts |
|
Executive Account Activity | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1068 - Exploitation for Privilege Escalation T1078 - Valid Accounts |
|
Malware | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1078 - Valid Accounts T1090.003 - Proxy: Multi-hop Proxy T1204 - User Execution T1210 - Exploitation of Remote Services |
|
Pass the Hash | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1550.002 - Use Alternate Authentication Material: Pass the Hash |
|
Pass the Ticket | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1078 - Valid Accounts T1550.002 - Use Alternate Authentication Material: Pass the Hash T1550.003 - Use Alternate Authentication Material: Pass the Ticket T1550.004 - Use Alternate Authentication Material: Web Session Cookie T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting |
|
Privileged Asset Abuse | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1078 - Valid Accounts |
|
Ransomware | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1078 - Valid Accounts |
|
Service Account Abuse | failed-logon ↳ sterling-failed-logon-1 ↳ sterling-failed-logon-2 remote-logon ↳ sterling-remote-logon |
T1078 - Valid Accounts |
|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|
External Remote Services Valid Accounts |
User Execution |
External Remote Services Valid Accounts |
Valid Accounts Exploitation for Privilege Escalation |
Valid Accounts Use Alternate Authentication Material Use Alternate Authentication Material: Pass the Hash Use Alternate Authentication Material: Web Session Cookie Use Alternate Authentication Material: Pass the Ticket Valid Accounts: Local Accounts |
Brute Force Steal or Forge Kerberos Tickets Steal or Forge Kerberos Tickets: Kerberoasting |
Remote System Discovery |
Exploitation of Remote Services Remote Services Use Alternate Authentication Material Remote Services: Remote Desktop Protocol |
Proxy: Multi-hop Proxy Proxy |