Merge pull request #2287 from frack113/tags

Add missing Mitre Techniques Tags for windows rules
This commit is contained in:
Florian Roth
2021-11-20 15:38:25 +01:00
committed by GitHub
51 changed files with 128 additions and 49 deletions
@@ -14,6 +14,7 @@ references:
tags:
- attack.credential_access
- attack.command_and_control
- attack.t1071
logsource:
product: windows
service: dns-server
@@ -12,6 +12,7 @@ references:
- https://securelist.com/apt-slingshot/84312/
tags:
- attack.persistence
- attack.t1053
- attack.s0111
logsource:
product: windows
@@ -12,6 +12,7 @@ date: 2021/06/30
modified: 2021/07/08
tags:
- attack.execution
- attack.t1569
- cve.2021.1675
logsource:
product: windows
@@ -9,6 +9,7 @@ references:
date: 2021/07/01
tags:
- attack.execution
- attack.t1569
- cve.2021.1675
logsource:
product: windows
@@ -9,6 +9,7 @@ references:
date: 2021/07/02
tags:
- attack.execution
- attack.t1569
- cve.2021.1675
- cve.2021.34527
logsource:
@@ -7,6 +7,7 @@ modified: 2021/08/09
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
tags:
- attack.persistence
- attack.t1554
references:
- https://twitter.com/Cyb3rWard0g/status/1381642789369286662
logsource:
@@ -6,6 +6,7 @@ date: 2021/04/12
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
tags:
- attack.persistence
- attack.t1554
references:
- https://twitter.com/Cyb3rWard0g/status/1381642789369286662
logsource:
@@ -9,6 +9,7 @@ references:
- https://threathunterplaybook.com/notebooks/windows/07_discovery/WIN-190826010110.html
tags:
- attack.discovery
- attack.t1010
logsource:
product: windows
service: security
@@ -6,6 +6,7 @@ author: Thomas Patzke
date: 2019/12/03
tags:
- attack.persistence
- attack.t1098
logsource:
product: windows
service: security
@@ -9,6 +9,7 @@ date: 2020/09/15
modified: 2021/08/09
tags:
- attack.privilege_escalation
- attack.t1548
logsource:
product: windows
service: system
@@ -7,6 +7,7 @@ modified: 2021/06/10
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
tags:
- attack.persistence
- attack.t1554
references:
- https://twitter.com/Cyb3rWard0g/status/1381642789369286662
logsource:
@@ -12,6 +12,7 @@ logsource:
tags:
- attack.privilege_escalation
- cve.2021.21551
- attack.t1543
detection:
selection_image:
ImageLoaded|contains: '\DBUtil_2_3.Sys'
@@ -8,6 +8,8 @@ author: Florian Roth
date: 2021/11/16
tags:
- attack.persistence
- attack.execution
- attack.t1053
logsource:
product: windows
category: file_event
@@ -13,6 +13,8 @@ modified: 2021/07/01
tags:
- attack.execution
- attack.privilege_escalation
- attack.resource_development
- attack.t1587
- cve.2021.1675
logsource:
category: file_event
@@ -27,3 +27,6 @@ fields:
falsepositives:
- unknown
level: critical
tags:
- attack.resource_development
- attack.t1587
@@ -12,6 +12,7 @@ date: 2019/10/22
modified: 2021/10/04
tags:
- attack.command_and_control
- attack.t1071
logsource:
category: image_load
product: windows
@@ -16,3 +16,6 @@ detection:
falsepositives:
- Unlikely
level: critical
tags:
- attack.resource_development
- attack.t1587
@@ -17,3 +17,7 @@ detection:
falsepositives:
- Rarely observed
level: high
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1055
+2 -1
View File
@@ -25,4 +25,5 @@ falsepositives:
- Unlikely
level: high
tags:
- attack.execution
- attack.execution
- attack.t1204
@@ -38,3 +38,6 @@ detection:
falsepositives:
- Legitimate use of crypto miners
level: high
tags:
- attack.impact
- attack.t1496
@@ -16,4 +16,7 @@ detection:
condition: keywords
falsepositives:
- Unknown, please report false positives via https://github.com/SigmaHQ/sigma/issues
level: critical
level: critical
tags:
- attack.lateral_movement
- attack.t1210
@@ -4,9 +4,12 @@ status: experimental
description: Detects a named pipe used by Turla group samples
references:
- Internal Research
- https://attack.mitre.org/groups/G0010/
date: 2017/11/06
tags:
- attack.g0010
- attack.execution
- attack.t1106
author: Markus Neis
logsource:
product: windows
@@ -7,13 +7,16 @@ references:
date: 2021/09/01
author: Florian Roth
logsource:
product: windows
category: pipe_created
definition: 'Note that you have to configure logging for Named Pipe Events in Sysmon config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config, https://github.com/olafhartong/sysmon-modular. How to test detection? You can check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575'
product: windows
category: pipe_created
definition: 'Note that you have to configure logging for Named Pipe Events in Sysmon config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config, https://github.com/olafhartong/sysmon-modular. How to test detection? You can check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575'
detection:
selection:
Image|endswith: '\scrcons.exe'
condition: selection
selection:
Image|endswith: '\scrcons.exe'
condition: selection
falsepositives:
- Unknown
- Unknown
level: high
tags:
- attack.t1047
- attack.execution
@@ -20,3 +20,4 @@ falsepositives:
level: high
tags:
- attack.privilege_escalation
- attack.t1548
@@ -6,23 +6,24 @@ author: Austin Songer @austinsonger
date: 2021/10/12
modified: 2021/10/16
references:
- https://docs.microsoft.com/en-us/powershell/module/netsecurity/set-netfirewallprofile?view=windowsserver2019-ps
- https://www.tutorialspoint.com/how-to-get-windows-firewall-profile-settings-using-powershell
- http://powershellhelp.space/commands/set-netfirewallrule-psv5.php
- http://woshub.com/manage-windows-firewall-powershell/
- https://docs.microsoft.com/en-us/powershell/module/netsecurity/set-netfirewallprofile?view=windowsserver2019-ps
- https://www.tutorialspoint.com/how-to-get-windows-firewall-profile-settings-using-powershell
- http://powershellhelp.space/commands/set-netfirewallrule-psv5.php
- http://woshub.com/manage-windows-firewall-powershell/
logsource:
product: windows
category: ps_script
product: windows
category: ps_script
detection:
selection:
ScriptBlockText|contains|all:
- Set-NetFirewallProfile
- -Profile
- -Enabled
- 'False'
condition: selection
selection:
ScriptBlockText|contains|all:
- Set-NetFirewallProfile
- -Profile
- -Enabled
- 'False'
condition: selection
tags:
- attack.defense_evasion
- attack.defense_evasion
- attack.t1562.004
level: high
falsepositives:
- Unknown
- Unknown
@@ -13,7 +13,9 @@ references:
- https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn800669(v=ws.11)
tags:
- attack.credential_access
- attack.t1212
- attack.command_and_control
- attack.t1071
logsource:
product: windows
category: process_creation
@@ -10,7 +10,9 @@ references:
- https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn800669(v=ws.11)
tags:
- attack.credential_access
- attack.t1212
- attack.command_and_control
- attack.t1071
logsource:
product: windows
category: process_creation
@@ -9,6 +9,7 @@ references:
- https://securelist.com/apt-slingshot/84312/
tags:
- attack.persistence
- attack.t1053.005
- attack.s0111
logsource:
category: process_creation
@@ -10,6 +10,7 @@ references:
- https://docs.microsoft.com/en-us/sql/tools/sqlcmd-utility?view=sql-server-ver15
tags:
- attack.collection
- attack.t1005
logsource:
category: process_creation
product: windows
@@ -4,8 +4,13 @@ description: Detects CrackMapExecWin Activity as Described by NCSC
status: experimental
references:
- https://www.ncsc.gov.uk/alerts/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control
- https://attack.mitre.org/software/S0488/
tags:
- attack.g0035
- attack.credential_access
- attack.discovery
- attack.t1110
- attack.t1087
author: Markus Neis
date: 2018/04/08
logsource:
@@ -6,6 +6,8 @@ references:
- https://blog.malwarebytes.com/malwarebytes-news/2021/04/lazarus-apt-conceals-malicious-code-within-bmp-file-to-drop-its-rat/
tags:
- attack.g0032
- attack.execution
- attack.t1106
author: Bhabesh Raj
date: 2021/04/20
modified: 2021/06/27
@@ -7,6 +7,8 @@ references:
- https://www.hvs-consulting.de/lazarus-report/
tags:
- attack.g0032
- attack.execution
- attack.t1059
author: Florian Roth
date: 2020/12/23
modified: 2021/06/27
@@ -7,6 +7,8 @@ references:
- https://securelist.com/lazarus-covets-covid-19-related-intelligence/99906/
tags:
- attack.g0032
- attack.execution
- attack.t1059
author: Florian Roth, wagga
date: 2020/12/23
modified: 2021/06/27
@@ -13,6 +13,7 @@ date: 2021/07/03
modified: 2021/07/05
tags:
- attack.execution
- attack.t1059
- attack.g0115
logsource:
category: process_creation
@@ -7,6 +7,7 @@ references:
tags:
- attack.execution
- attack.g0092
- attack.t1106
logsource:
category: process_creation
product: windows
@@ -10,6 +10,7 @@ date: 2021/07/27
modified: 2021/08/30
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: windows
@@ -10,27 +10,30 @@ logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
- ' --cpu-priority='
- '--donate-level=0'
- ' -o pool.'
- ' --nicehash'
- ' --algo=rx/0 '
- 'stratum+tcp://'
- 'stratum+udp://'
# base64 encoded: --donate-level=
- 'LS1kb25hdGUtbGV2ZWw9'
- '0tZG9uYXRlLWxldmVsP'
- 'tLWRvbmF0ZS1sZXZlbD'
# base64 encoded: stratum+tcp:// and stratum+udp://
- 'c3RyYXR1bSt0Y3A6Ly'
- 'N0cmF0dW0rdGNwOi8v'
- 'zdHJhdHVtK3RjcDovL'
- 'c3RyYXR1bSt1ZHA6Ly'
- 'N0cmF0dW0rdWRwOi8v'
- 'zdHJhdHVtK3VkcDovL'
condition: selection
selection:
CommandLine|contains:
- ' --cpu-priority='
- '--donate-level=0'
- ' -o pool.'
- ' --nicehash'
- ' --algo=rx/0 '
- 'stratum+tcp://'
- 'stratum+udp://'
# base64 encoded: --donate-level=
- 'LS1kb25hdGUtbGV2ZWw9'
- '0tZG9uYXRlLWxldmVsP'
- 'tLWRvbmF0ZS1sZXZlbD'
# base64 encoded: stratum+tcp:// and stratum+udp://
- 'c3RyYXR1bSt0Y3A6Ly'
- 'N0cmF0dW0rdGNwOi8v'
- 'zdHJhdHVtK3RjcDovL'
- 'c3RyYXR1bSt1ZHA6Ly'
- 'N0cmF0dW0rdWRwOi8v'
- 'zdHJhdHVtK3VkcDovL'
condition: selection
falsepositives:
- Legitimate use of crypto miners
- Legitimate use of crypto miners
level: high
tags:
- attack.impact
- attack.t1496
@@ -9,6 +9,7 @@ author: Florian Roth
date: 2020/11/26
tags:
- attack.execution
- attack.t1559
logsource:
category: process_creation
product: windows
@@ -7,6 +7,7 @@ date: 2020/10/29
modified: 2021/07/15
tags:
- attack.defense_evasion
- attack.t1197
references:
- https://www.fireeye.com/blog/threat-research/2020/10/kegtap-and-singlemalt-with-a-ransomware-chaser.html
- http://0xthem.blogspot.com/2014/03/t-emporal-persistence-with-and-schtasks.html
@@ -9,6 +9,8 @@ date: 2019/01/16
modified: 2021/06/13
tags:
- car.2013-04-002
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: windows
@@ -9,6 +9,7 @@ date: 2019/10/22
modified: 2021/09/19
tags:
- attack.command_and_control
- attack.t1071
logsource:
category: process_creation
product: windows
@@ -8,6 +8,7 @@ references:
- https://app.any.run/tasks/34221348-072d-4b70-93f3-aa71f6ebecad/
tags:
- attack.execution
- attack.t1106
author: Florian Roth
date: 2021/07/17
logsource:
@@ -10,6 +10,7 @@ date: 2021/08/23
modified: 2021/08/24
tags:
- attack.privilege_escalation
- attack.t1553
logsource:
category: process_creation
product: windows
@@ -9,6 +9,7 @@ references:
- https://app.any.run/tasks/34221348-072d-4b70-93f3-aa71f6ebecad/
tags:
- attack.defense_evasion
- attack.t1574
- attack.execution
logsource:
category: process_creation
@@ -22,5 +22,5 @@ falsepositives:
- Unknown
level: high
tags:
- attack.lateral_movement
- attack.discovery
- attack.resource_development
- attack.t1588.002
@@ -9,6 +9,7 @@ date: 2021/07/14
modified: 2021/11/11
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: windows
@@ -11,6 +11,7 @@ logsource:
product: windows
tags:
- attack.credential_access
- attack.t1555
- cve.2021.35211
detection:
selection:
@@ -7,6 +7,7 @@ references:
- https://app.any.run/tasks/61a296bb-81ad-4fee-955f-3b399f4aaf4b
tags:
- attack.execution
- attack.t1059
author: Florian Roth
date: 2018/06/22
modified: 2018/12/11
@@ -5,7 +5,8 @@ status: experimental
date: 2021/04/12
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
tags:
- attack.persistence
- attack.resource_development
- attack.t1608
references:
- https://twitter.com/Cyb3rWard0g/status/1381642789369286662
logsource:
@@ -8,6 +8,7 @@ author: Florian Roth
date: 2020/07/01
tags:
- attack.privilege_escalation
- attack.t1574
- cve.2021.1675
logsource:
category: registry_event
@@ -9,6 +9,7 @@ references:
author: Markus Neis, @markus_neis, Florian Roth
tags:
- attack.execution
- attack.t1204
- cve.2021.1675
- cve.2021.34527
date: 2021/07/04