0% found this document useful (0 votes)
110 views10 pages

UEBA Use Cases With Scenario Examples

The document outlines various use cases for User and Entity Behavior Analytics (UEBA) and User Behavior Analytics (UBA), detailing scenarios that involve abnormal user activities, potential credential compromises, and policy violations. Each use case includes specific MITRE ATT&CK mappings, log analysis, unusual activity indicators, and recommended response steps. The scenarios range from detecting unusual access patterns to monitoring for phishing attempts and ensuring compliance with regulatory requirements.

Uploaded by

Abd Arief Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views10 pages

UEBA Use Cases With Scenario Examples

The document outlines various use cases for User and Entity Behavior Analytics (UEBA) and User Behavior Analytics (UBA), detailing scenarios that involve abnormal user activities, potential credential compromises, and policy violations. Each use case includes specific MITRE ATT&CK mappings, log analysis, unusual activity indicators, and recommended response steps. The scenarios range from detecting unusual access patterns to monitoring for phishing attempts and ensuring compliance with regulatory requirements.

Uploaded by

Abd Arief Khan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

UEBA/UBA USE

CASES WITH
SCENARIO
EXAMPLES AND
MITRE ATT&CK
MAPPING

BY IZZMIER IZZUDDIN
USE CASES

1. Detecting abnormal working hours and unusual access patterns to sensitive


data

 T1078: Valid Accounts: Abuse of legitimate credentials to access resources


during unusual hours.
 T1071: Application Layer Protocol: Unusual access patterns can also indicate
C2 communication using common protocols.

Scenario: A financial analyst in a bank is accessing a large volume of sensitive


financial records late at night, which is not typical for their role.

Logs Analysis:

1. Log Data:
o Time: 02:30 AM
o User: Izzmier
o Accessed Resources: Financial Records Database
o IP Address: 192.168.10.23
2. Unusual Activity:
o User Izzmier typically accesses the financial records database
between 09:00 AM to 05:00 PM.
o Accessing a large volume of records during unusual hours indicates
potential misuse or compromise.
3. Response Steps:
o Identify: Confirm the user's usual working hours and typical access
patterns.
o Investigate: Check if the user is on leave or reported any unusual
activity on their account.
o Mitigate: Temporarily lock the account and reset credentials.
o Report: Document the incident and notify the relevant teams for
further action.

2. Detecting logins from unusual geographic locations and sudden changes in


user behaviour

 T1078: Valid Accounts: Compromised accounts used from different geographic


locations.
 T1098: Account Manipulation: Changes in user behaviour might indicate
account changes or compromise.

Scenario: A user account shows logins from two different geographic locations
within a short time span, suggesting possible credential compromise.

Logs Analysis:
1. Log Data:
o Time: 10:00 AM
o User: Izzmier
o Location 1: Kuala Lumpur, Malaysia
o IP Address: 192.168.20.45
o Time: 10:15 AM
o User: Izzmier
o Location 2: Manchester, UK
o IP Address: 203.0.113.78
2. Unusual Activity:
o Rapid geographic change is unlikely without VPN or similar services.
o Indicates potential credential compromise and unauthorised access.
3. Response Steps:
o Identify: Validate the login events and check for the use of VPNs or
remote access services.
o Investigate: Contact the user to confirm their recent activities and
locations.
o Mitigate: Reset the user's credentials and enforce multifactor
authentication (MFA).
o Report: Document the incident and perform a security audit on the
affected account.

3. Monitoring actions of users with elevated privileges and detecting unusual use
of administrative credentials

 T1078.003: Valid Accounts: Local Accounts: Use of privileged accounts in an


unusual manner.
 T1087: Account Discovery: Detecting discovery activities by privileged
accounts.

Scenario: An IT administrator is accessing and making changes to the HR database,


which they typically do not handle.

Logs Analysis:

1. Log Data:
o Time: 11:30 AM
o User: Izzmier
o Accessed Resources: HR Database
o Changes Made: Added new user accounts, modified employee
records
o IP Address: 192.168.30.67
2. Unusual Activity:
o Izzmier typically manages IT infrastructure, not HR databases.
o Unusual access and changes indicate potential misuse or insider
threat.
3. Response Steps:
o Identify: Verify the admin's role and usual access privileges.
o Investigate: Check if the changes were authorised and review recent
activities.
o Mitigate: Restrict access to sensitive resources and review admin
account permissions.
o Report: Document the incident and notify HR and IT security teams
for further investigation.

4. Detecting unusual lateral movement within the network

 T1021: Remote Services: Use of remote services for lateral movement.


 T1071: Application Layer Protocol: Anomalous network connections indicative
of lateral movement.

Scenario: A user is accessing multiple servers and databases that they usually do
not interact with, indicating possible lateral movement by an attacker.

Logs Analysis:

1. Log Data:
o Time: 02:00 PM
o User: Izzmier
o Accessed Servers: Server1, Server2, Server3
o IP Address: 192.168.40.89
o Activity: Accessing and querying databases across multiple servers
2. Unusual Activity:
o Izzmier typically accesses only one server related to their department.
o Multiple server access indicates potential lateral movement.
3. Response Steps:
o Identify: Confirm the user's usual access patterns and servers.
o Investigate: Check for any signs of compromised credentials or
access.
o Mitigate: Isolate the user account and monitor network traffic for
further anomalies.
o Report: Document the incident and notify network security teams for
detailed analysis.

5. Detecting unusual behaviour on endpoints and identifying potentially


compromised devices

 T1059: Command and Scripting Interpreter: Unusual scripts or commands


running on endpoints.
 T1082: System Information Discovery: Identifying unusual system discovery
activities.

Scenario: An employee's workstation is running an unusual script that is attempting


to connect to an external IP address.
Logs Analysis:

1. Log Data:
o Time: 04:00 PM
o User: Izzmier
o Endpoint: WorkstationIzzmier
o Script: SuspiciousScript.ps1
o External IP Address: 203.0.113.99
2. Unusual Activity:
o Izzmier does not typically run scripts or connect to external IPs.
o The script activity suggests potential malware or unauthorised
actions.
3. Response Steps:
o Identify: Validate the script execution and external connections.
o Investigate: Check for any malware infections or unauthorised
changes on the workstation.
o Mitigate: Isolate the workstation, terminate the script, and conduct a
full malware scan.
o Report: Document the incident and notify endpoint security teams for
further investigation.

6. Detecting unusual patterns in network traffic and potential command and


control (C2) communication

 T1071: Application Layer Protocol: Unusual application layer traffic indicative


of C2.
 T1071.004: Application Layer Protocol: DNS: Use of DNS for C2
communication.

Scenario: A spike in outbound traffic to an unfamiliar domain is detected, which


could indicate data exfiltration.

Logs Analysis:

1. Log Data:
o Time: 01:45 PM
o User: IzzmierInternalNetwork
o Unusual Domain: exfil.example.com
o Spike in Traffic: 500MB data transfer
o IP Address: 192.168.50.100
2. Unusual Activity:
o Unfamiliar domain not previously accessed.
o Large volume of outbound traffic indicating potential data exfiltration.
3. Response Steps:
o Identify: Verify the domain and check DNS logs for recent queries.
o Investigate: Analyse traffic patterns and inspect data transferred.
o Mitigate: Block the domain and isolate affected systems.
o Report: Document the incident and inform network and data
protection teams.

7. Monitoring the behaviour of applications and detecting unauthorised changes


to application settings

 T1496: Resource Hijacking: Unauthorised changes might indicate resource


hijacking.
 T1036: Masquerading: Unauthorised application behaviour might indicate
masquerading activities.

Scenario: An internal application is accessing files and directories it typically


doesn't interact with, suggesting possible exploitation.

Logs Analysis:

1. Log Data:
o Time: 09:30 AM
o Application: InternalApp
o Accessed Files: SensitiveConfig.cfg, AdminDirectory/
o IP Address: 192.168.60.110
2. Unusual Activity:
o Application usually interacts with a specific set of files.
o Accessing sensitive configurations and directories indicates possible
exploitation.
3. Response Steps:
o Identify: Verify usual behaviour of the application and recent
updates.
o Investigate: Review application logs and check for unauthorised
changes.
o Mitigate: Revert unauthorised changes and enhance application
monitoring.
o Report: Document the incident and notify application security teams.

8. Identifying behaviour consistent with malware infection and monitoring for


unusual file downloads and executions

 T1204: User Execution: User execution of malicious files.


 T1059: Command and Scripting Interpreter: Unusual script executions
indicative of malware activity.

Scenario: A user downloads a file from an email, and shortly after, multiple
endpoints show unusual behaviour indicative of ransomware.

Logs Analysis:

1. Log Data:
o Time: 11:00 AM
o User: Izzmier
o Downloaded File: SuspiciousAttachment.zip
o Affected Endpoints: Workstation1, Workstation2, Server3
o IP Address: 192.168.70.120
2. Unusual Activity:
o Multiple endpoints exhibiting unusual behaviour such as file
encryption.
o Indicates potential ransomware spread initiated by the downloaded
file.
3. Response Steps:
o Identify: Confirm the source of the download and affected endpoints.
o Investigate: Isolate affected systems and check for malware
signatures.
o Mitigate: Implement endpoint isolation, restore from backups, and
update anti-malware defences.
o Report: Document the incident and notify incident response and
recovery teams.

9. Identifying patterns indicative of successful phishing attempts and monitoring


user behaviour post-phishing attack

 T1566: Phishing: Techniques used to execute phishing attacks.


 T1078: Valid Accounts: Compromised accounts resulting from successful
phishing.

Scenario: Several employees report receiving a suspicious email, and subsequent


behaviour suggests a successful phishing attempt

Logs Analysis:

1. Log Data:
o Time: 08:00 AM
o User: Multiple Employees
o Email Subject: "Urgent: Update Your Password"
o Link Clicked: phishing.example.com
o IP Address: Multiple IPs
2. Unusual Activity:
o Employees reported suspicious emails and clicked on phishing links.
o Subsequent unauthorised activities on employee accounts indicate
compromise.
3. Response Steps:
o Identify: Collect reports of suspicious emails and analyse email
headers.
o Investigate: Check for any unauthorised access or changes in user
accounts.
o Mitigate: Reset passwords for affected accounts and conduct
phishing awareness training.
o Report: Document the incident and notify the IT and security
awareness teams.

10. Detecting multiple failed login attempts and monitoring for successful logins
following multiple failures

 T1110: Brute Force: Multiple failed login attempts indicating brute force
attempts.
 T1078: Valid Accounts: Use of valid accounts following brute force attempts.

Scenario: Multiple failed login attempts are detected on an admin account followed
by a successful login.

Logs Analysis:

1. Log Data:
o Time: 07:00 PM
o User: AdminUser
o Failed Attempts: 10
o Successful Login: Yes
o IP Address: 192.168.80.130
2. Unusual Activity:
o Multiple failed attempts followed by a successful login indicate
potential brute force attack.
3. Response Steps:
o Identify: Verify the failed login attempts and successful login details.
o Investigate: Check for any signs of compromised credentials or
unauthorised activities.
o Mitigate: Reset the admin account credentials and enhance login
security measures.
o Report: Document the incident and notify the security operations
team for further monitoring.

11. Ensuring user activities comply with regulatory requirements and detecting
policy violations

 T1480: Execution Guardrails: Ensuring activities comply with set guardrails.


 T1201: Password Policy Discovery: Detecting attempts to discover password
policies.

Scenario: An audit requires ensuring that access to sensitive financial data


complies with industry regulations.

Logs Analysis:

1. Log Data:
o Time: Throughout audit period
o User: Various financial department employees
o Accessed Resources: Sensitive financial data
o Actions Taken: Access, modify, and delete operations
o IP Addresses: Internal network IPs
2. Unusual Activity:
o Detecting any deviations from compliance requirements, such as
unauthorised access or modifications.
3. Response Steps:
o Identify: Review user activities related to sensitive financial data.
o Investigate: Check for any access violations or unauthorised
modifications.
o Mitigate: Implement stricter access controls and monitoring for
sensitive data.
o Report: Document the findings and ensure all activities comply with
regulatory requirements.

12. Monitoring for deviations from established security policies and detecting
unauthorised access to restricted areas

 T1078: Valid Accounts: Unauthorised access to restricted areas using valid


accounts.
 T1036: Masquerading: Deviations indicating potential masquerading.

Scenario: An employee uses unauthorised cloud storage services to transfer


company data.

Logs Analysis:

1. Log Data:
o Time: 03:00 PM
o User: Izzmier
o Action: Transferring data to unauthorised cloud storage
o Cloud Service: UnauthorisedCloudService.com
o IP Address: 192.168.90.140
2. Unusual Activity:
o Izzmier typically uses approved cloud storage services.
o Transferring data to an unauthorised cloud service indicates a policy
violation.
3. Response Steps:
o Identify: Verify the user's activities and cloud service usage.
o Investigate: Check for any unauthorised data transfers or access.
o Mitigate: Block access to unauthorised cloud services and enforce
security policies.
o Report: Document the incident and notify the compliance and IT
security teams.

13. Detecting anomalies in data access and usage and identifying deviations from
normal data access patterns
 T1078: Valid Accounts: Unusual data access using valid accounts.
 T1003: Credential Dumping: Deviations might indicate credential dumping
attempts.

Scenario: An employee suddenly accesses a large volume of confidential


documents.

Logs Analysis:

1. Log Data:
o Time: 10:30 AM
o User: Izzmier
o Accessed Resources: Confidential documents
o Volume of Access: 500 documents within an hour
o IP Address: 192.168.100.150
2. Unusual Activity:
o Izzmier typically accesses only a few documents related to their role.
o A sudden spike in accessing a large volume of confidential
documents indicates potential misuse or credential compromise.
3. Response Steps:
o Identify: Validate the user's usual access patterns and recent
activities.
o Investigate: Check for any signs of credential compromise or
unauthorised access.
o Mitigate: Restrict the user's access to sensitive documents and reset
their credentials.
o Report: Document the incident and notify the data protection and IT
security teams for further investigation.

You might also like