Merge pull request #4211 from fukusuket/refactor-use-all-modifier-without-field-instead-of-all-of
chore: refactor use `'|all'` instead of using `all of` for a single selector.
This commit is contained in:
@@ -7,55 +7,61 @@ tags:
|
||||
- attack.t1059.001
|
||||
author: Florian Roth (Nextron Systems), Jonhnathan Ribeiro
|
||||
date: 2017/03/05
|
||||
modified: 2022/04/11
|
||||
modified: 2023/05/04
|
||||
logsource:
|
||||
product: windows
|
||||
service: powershell
|
||||
definition: Script block logging must be enabled for 4104, Module Logging must be enabled for 4103
|
||||
detection:
|
||||
convert_b64:
|
||||
- '-nop'
|
||||
- ' -w '
|
||||
- 'hidden'
|
||||
- ' -c '
|
||||
- '[Convert]::FromBase64String'
|
||||
iex_selection:
|
||||
- ' -w '
|
||||
- 'hidden'
|
||||
- '-noni'
|
||||
- '-nop'
|
||||
- ' -c '
|
||||
- 'iex'
|
||||
- 'New-Object'
|
||||
enc_selection:
|
||||
- ' -w '
|
||||
- 'hidden'
|
||||
- '-ep'
|
||||
- 'bypass'
|
||||
- '-Enc'
|
||||
reg_selection:
|
||||
- 'powershell'
|
||||
- 'reg'
|
||||
- 'add'
|
||||
- 'HKCU\software\microsoft\windows\currentversion\run'
|
||||
webclient_selection:
|
||||
- 'bypass'
|
||||
- '-noprofile'
|
||||
- '-windowstyle'
|
||||
- 'hidden'
|
||||
- 'new-object'
|
||||
- 'system.net.webclient'
|
||||
- '.download'
|
||||
iex_webclient:
|
||||
- 'iex'
|
||||
- 'New-Object'
|
||||
- 'Net.WebClient'
|
||||
- '.Download'
|
||||
selection_convert_b64:
|
||||
'|all':
|
||||
- '-nop'
|
||||
- ' -w '
|
||||
- 'hidden'
|
||||
- ' -c '
|
||||
- '[Convert]::FromBase64String'
|
||||
selection_iex:
|
||||
'|all':
|
||||
- ' -w '
|
||||
- 'hidden'
|
||||
- '-noni'
|
||||
- '-nop'
|
||||
- ' -c '
|
||||
- 'iex'
|
||||
- 'New-Object'
|
||||
selection_enc:
|
||||
'|all':
|
||||
- ' -w '
|
||||
- 'hidden'
|
||||
- '-ep'
|
||||
- 'bypass'
|
||||
- '-Enc'
|
||||
selection_reg:
|
||||
'|all':
|
||||
- 'powershell'
|
||||
- 'reg'
|
||||
- 'add'
|
||||
- 'HKCU\software\microsoft\windows\currentversion\run'
|
||||
selection_webclient:
|
||||
'|all':
|
||||
- 'bypass'
|
||||
- '-noprofile'
|
||||
- '-windowstyle'
|
||||
- 'hidden'
|
||||
- 'new-object'
|
||||
- 'system.net.webclient'
|
||||
- '.download'
|
||||
selection_iex_webclient:
|
||||
'|all':
|
||||
- 'iex'
|
||||
- 'New-Object'
|
||||
- 'Net.WebClient'
|
||||
- '.Download'
|
||||
filter_chocolatey:
|
||||
- "(New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1"
|
||||
- "(New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1')"
|
||||
- 'Write-ChocolateyWarning'
|
||||
condition: (all of convert_b64 or all of iex_selection or all of enc_selection or all of reg_selection or all of webclient_selection or all of iex_webclient) and not 1 of filter_*
|
||||
condition: 1 of selection_* and not 1 of filter_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
|
||||
@@ -6,9 +6,9 @@ description: |
|
||||
This rule detect using dd and truncate to add a junk data to file.
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027.001/T1027.001.md
|
||||
author: 'Igor Fits, oscd.community'
|
||||
author: Igor Fits, oscd.community
|
||||
date: 2020/10/13
|
||||
modified: 2023/01/06
|
||||
modified: 2023/05/03
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1027.001
|
||||
@@ -19,14 +19,16 @@ detection:
|
||||
selection_execve:
|
||||
type: 'EXECVE'
|
||||
keywords_truncate:
|
||||
- 'truncate'
|
||||
- '-s'
|
||||
'|all':
|
||||
- 'truncate'
|
||||
- '-s'
|
||||
keywords_dd:
|
||||
- 'dd'
|
||||
- 'if='
|
||||
'|all':
|
||||
- 'dd'
|
||||
- 'if='
|
||||
keywords_filter:
|
||||
- 'of='
|
||||
condition: selection_execve and (all of keywords_truncate or (all of keywords_dd and not keywords_filter))
|
||||
condition: selection_execve and (keywords_truncate or (keywords_dd and not keywords_filter))
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
|
||||
@@ -6,7 +6,7 @@ references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.001/T1552.001.md
|
||||
author: 'Igor Fits, oscd.community'
|
||||
date: 2020/10/15
|
||||
modified: 2023/01/06
|
||||
modified: 2023/04/30
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1552.001
|
||||
@@ -17,9 +17,10 @@ detection:
|
||||
selection:
|
||||
type: 'EXECVE'
|
||||
keywords:
|
||||
- 'grep'
|
||||
- 'password'
|
||||
condition: selection and all of keywords
|
||||
'|all':
|
||||
- 'grep'
|
||||
- 'password'
|
||||
condition: selection and keywords
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
|
||||
@@ -6,7 +6,7 @@ references:
|
||||
- https://blog.orange.tw/2021/08/proxylogon-a-new-attack-surface-on-ms-exchange-part-1.html
|
||||
author: Florian Roth (Nextron Systems), Rich Warren, Christian Burkard (Nextron Systems)
|
||||
date: 2021/08/09
|
||||
modified: 2023/02/28
|
||||
modified: 2023/04/30
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1505.003
|
||||
@@ -15,16 +15,18 @@ logsource:
|
||||
product: windows
|
||||
detection:
|
||||
export_command:
|
||||
- 'New-MailboxExportRequest'
|
||||
- ' -Mailbox '
|
||||
'|all':
|
||||
- 'New-MailboxExportRequest'
|
||||
- ' -Mailbox '
|
||||
export_params:
|
||||
- '-FilePath "\\\\' # We care about any share location.
|
||||
- '.aspx'
|
||||
role_assignment:
|
||||
- 'New-ManagementRoleAssignment'
|
||||
- ' -Role "Mailbox Import Export"'
|
||||
- ' -User '
|
||||
condition: (all of export_command and export_params) or all of role_assignment
|
||||
'|all':
|
||||
- 'New-ManagementRoleAssignment'
|
||||
- ' -Role "Mailbox Import Export"'
|
||||
- ' -User '
|
||||
condition: (export_command and export_params) or role_assignment
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
level: critical
|
||||
|
||||
+5
-4
@@ -4,7 +4,7 @@ status: test
|
||||
description: Detects suspicious SAM dump activity as cause by QuarksPwDump and other password dumpers
|
||||
author: Florian Roth (Nextron Systems)
|
||||
date: 2018/01/27
|
||||
modified: 2022/04/14
|
||||
modified: 2023/04/30
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003.002
|
||||
@@ -17,9 +17,10 @@ detection:
|
||||
Provider_Name: Microsoft-Windows-Kernel-General
|
||||
EventID: 16
|
||||
keywords:
|
||||
- '\AppData\Local\Temp\SAM-'
|
||||
- '.dmp'
|
||||
condition: selection and all of keywords
|
||||
'|all':
|
||||
- '\AppData\Local\Temp\SAM-'
|
||||
- '.dmp'
|
||||
condition: selection and keywords
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
|
||||
Reference in New Issue
Block a user