Compare commits
304 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| d5885686fc | |||
| 805c739611 | |||
| 31c6ffcb61 | |||
| 2c57b443e4 | |||
| de74eb4eb7 | |||
| bf0179c0d5 | |||
| e8b9a6500e | |||
| a295334355 | |||
| 0ca15e5c5e | |||
| 8a3117d73e | |||
| e2050404bc | |||
| 6881967889 | |||
| 1bb29dca26 | |||
| b9ff280209 | |||
| b20b42b9c9 | |||
| 5489f870cc | |||
| 134bfebe57 | |||
| 576912eb7a | |||
| 2b062a0de7 | |||
| 5bc10a4855 | |||
| f7ba2b3976 | |||
| 0b883a90b6 | |||
| f5a8a81ff7 | |||
| ce43d600e3 | |||
| 337681cfce | |||
| 161965d14c | |||
| 66f7f5b516 | |||
| 141c4f42f3 | |||
| 74021d53d8 | |||
| 15e2f5df5f | |||
| f4c8745cde | |||
| 6fab5d7f23 | |||
| 377872c91e | |||
| 1cb84d0592 | |||
| a61ad9c9a6 | |||
| c09c1c1b6e | |||
| 0c7151c901 | |||
| 2f123f64a7 | |||
| feac0be8a4 | |||
| ad386474bf | |||
| 708f3ef002 | |||
| 41dc076959 | |||
| 0ea3a681df | |||
| 2cbefb208b | |||
| 39b5eddfc7 | |||
| 654a009c9e | |||
| 559d0f4ba8 | |||
| 2df0e9765c | |||
| 49533a5909 | |||
| 84de12635e | |||
| 059957138d | |||
| a11d800353 | |||
| 26036e0d35 | |||
| ff7128209e | |||
| 5aecb6a5af | |||
| 0f8849a652 | |||
| f4c86f15b8 | |||
| 429c29ed5a | |||
| f4da0c5540 | |||
| 960cd69d50 | |||
| f271685f59 | |||
| e4e8ebbf95 | |||
| dbbc1751ef | |||
| d14f5c3436 | |||
| d82df83ef1 | |||
| 84c7320849 | |||
| 07e2ee474c | |||
| 1d26708887 | |||
| d7443d71a4 | |||
| fdce7ad9bf | |||
| f70549ec54 | |||
| 2d22a3fe02 | |||
| a23f15d42b | |||
| 5715413da9 | |||
| d61a971874 | |||
| 3bcfc53905 | |||
| fce2a45dac | |||
| eae7e3ab10 | |||
| 407d8214f7 | |||
| 5827165c2d | |||
| cf947e3720 | |||
| 6a39b4fb41 | |||
| 10db09c596 | |||
| a0c9f1594e | |||
| 491c519d1f | |||
| 80560dc12f | |||
| 5e7ae0590c | |||
| df35d70ab1 | |||
| 2163208e9c | |||
| 8a0f706cca | |||
| 1986bcb843 | |||
| 4e96666c04 | |||
| 673973e523 | |||
| fa0aaa7d2b | |||
| 67707b6c82 | |||
| 8023011bb1 | |||
| 89c1d7b63d | |||
| 748ac2e206 | |||
| 2cf402aa1f | |||
| 60bc5253cf | |||
| 04d91573f3 | |||
| 2ecc55c13f | |||
| f3edc39535 | |||
| d866e75750 | |||
| e8a7c5f7b9 | |||
| 6bf010fb4b | |||
| 4168c0ec64 | |||
| 36ba9f78da | |||
| 7c1e856095 | |||
| 323a7313fd | |||
| 38f3966751 | |||
| eb9564557e | |||
| 84690280c5 | |||
| 241d814221 | |||
| f65f693a88 | |||
| 7b63c92fc0 | |||
| 253417a367 | |||
| 75ec169d5c | |||
| b60cfbe244 | |||
| 346022cfe8 | |||
| 4a775650a2 | |||
| e675cdf9c4 | |||
| 544dfe3704 | |||
| c937fe3c1b | |||
| 74ca0eeb88 | |||
| 2d0c08cc8b | |||
| 7d10491bf2 | |||
| 5867b5da74 | |||
| 194afa739f | |||
| af0bd1b082 | |||
| 97541ac267 | |||
| 7e163d71eb | |||
| 4e63e925cf | |||
| 11ed7e7ef8 | |||
| e271484eef | |||
| 3d20e0bc98 | |||
| 71ff6bd943 | |||
| 36aeb19721 | |||
| f86342012a | |||
| 9e2345c491 | |||
| a6d2a5d79b | |||
| 9f1bbb0a0d | |||
| 694fa567b6 | |||
| 1c36bfde79 | |||
| d5f49c5777 | |||
| 508d1cdae0 | |||
| 13522b97a7 | |||
| 275896dbe6 | |||
| b6c4e64a9b | |||
| 2778558ae3 | |||
| 5dfe39c05b | |||
| 1ca57719b0 | |||
| 1c2bc87946 | |||
| 6585c83077 | |||
| 526468bec3 | |||
| f4d8dcaa1e | |||
| 25c0330dca | |||
| 995c03eef9 | |||
| a361664ed2 | |||
| 56f64ca47d | |||
| c50119b913 | |||
| 46c789105b | |||
| 595f22552d | |||
| 27199fc231 | |||
| 15a4c7e477 | |||
| 666e859d14 | |||
| 14b10c232e | |||
| f51e918a2e | |||
| 31946426a5 | |||
| f01fbd6b79 | |||
| e60fe1f46d | |||
| 3dd76a9c5e | |||
| 792095734d | |||
| 378ba5b38f | |||
| 8e6295e402 | |||
| 1e2ef92104 | |||
| 121e21960e | |||
| 9b67705799 | |||
| 763939a8ca | |||
| eb022f3908 | |||
| cfb4f32651 | |||
| 16bf5eef0f | |||
| 17ae9ea91c | |||
| 8cf505fcb3 | |||
| 79f7edb6b4 | |||
| 6918784e87 | |||
| c90d3e811e | |||
| e9af99c147 | |||
| 4559aa4e00 | |||
| d0bd8a2a41 | |||
| 87abd20c0f | |||
| 34c426a95b | |||
| f0b0f54500 | |||
| 765fe9dcd9 | |||
| d0950bd077 | |||
| b47900fbee | |||
| 38d548868d | |||
| dd9648b31e | |||
| a85acdfd02 | |||
| 0713360443 | |||
| 49beb5d1a8 | |||
| bdd184a24c | |||
| 80f45349ed | |||
| aab3dbee4f | |||
| 03d8184990 | |||
| 5249279a66 | |||
| d5fa51eab9 | |||
| e32708154f | |||
| 74dd008b10 | |||
| 8a5ae01f0e | |||
| d75ea35295 | |||
| 8609fc7ece | |||
| f78413deab | |||
| 4808f49e0d | |||
| 1a4a74b64b | |||
| 76780ccce2 | |||
| 7c5f985f6f | |||
| 4298abffb7 | |||
| 615a802a8e | |||
| 0a960ed3cd | |||
| 0e8a46aaf7 | |||
| 4e16bbafa8 | |||
| 17470d1545 | |||
| daaee558a1 | |||
| 612a7642d2 | |||
| 65b81dad32 | |||
| 1d3159bef0 | |||
| d872c52a43 | |||
| 5194e8778c | |||
| 1e262f5055 | |||
| cb0a87e21e | |||
| 08ec8597a5 | |||
| 5463128ea0 | |||
| 74fce5f511 | |||
| eb8a0636c5 | |||
| 51d19b36cc | |||
| 4b43db2aac | |||
| 6351c5a350 | |||
| 038918d2c0 | |||
| 75d36165fc | |||
| 51e65be98b | |||
| cd456a1d2b | |||
| c775b7a033 | |||
| 89fb726875 | |||
| f0c8c428bb | |||
| 152febcea2 | |||
| ca4b710c01 | |||
| 97376c00de | |||
| 766b8b8d18 | |||
| 788e75ef1b | |||
| 840eb2f519 | |||
| eb690d8902 | |||
| 1915561351 | |||
| 81693d81b6 | |||
| c4b8f75940 | |||
| 41b4d800c5 | |||
| 22958c45a3 | |||
| b4ac9a432f | |||
| 353e457104 | |||
| d5818a417b | |||
| 9c5575d003 | |||
| edb98f2781 | |||
| d0d51b6601 | |||
| 2b814011cd | |||
| 13f86e9333 | |||
| b4b7d810fc | |||
| e0459cec1c | |||
| d32e5c10b8 | |||
| 7e058e611c | |||
| 9ada22b8e0 | |||
| d2e605fc5c | |||
| 865d971704 | |||
| eda5298457 | |||
| 0756b00cdf | |||
| 9c1a5a5264 | |||
| 56b68a0266 | |||
| b941f6411f | |||
| 516c8f3ea1 | |||
| 3d69727332 | |||
| 016261cacf | |||
| a85c668f6f | |||
| d62bc41bfb | |||
| 32c6b34746 | |||
| 548145ce10 | |||
| ddb2d92a98 | |||
| e3f99c323b | |||
| 6cc1770351 | |||
| b76925f838 | |||
| d067087632 | |||
| 5c5a16c4d5 | |||
| 453bd10e6e | |||
| 8e854b06f6 | |||
| 0419ff215a | |||
| d06a5431eb | |||
| c7553dc8a1 | |||
| e473efb7c3 | |||
| 3f2ce4b71f | |||
| 51c42a15a7 | |||
| 0242c40360 | |||
| 60c4fed2e0 | |||
| ffac77fb37 | |||
| 1adb040e0b | |||
| 2ad2ba9589 | |||
| f0c89239d3 |
@@ -0,0 +1,30 @@
|
||||
# Breaking Changes in Sigma
|
||||
|
||||
Improvement sometimes makes it inavoidable to break with the past. This file describes the planned and implemented
|
||||
breaking changes since 2019. Monitor this file if you use Sigma in productive environments.
|
||||
|
||||
Columns:
|
||||
|
||||
* Date: The date the change was or will be implemented. Planned dates may be sunject of changes.
|
||||
* Status may be one of:
|
||||
* Planned: there's the idea, but work hasn't begun.
|
||||
* Development: the change is currently developed.
|
||||
* Implemented: the development is finished, but the change was not yet merged to the master.
|
||||
* Merged: the change has been merged to the master branch. Breaking changes affecting only rules
|
||||
skip this state.
|
||||
* Released: the change has been released officially, this means:
|
||||
* Code or configuration of Sigma tools was pushed as [PyPI release](https://pypi.org/project/sigmatools/)
|
||||
* Sigma rules were merged to master.
|
||||
* Issues: GitHub issues in the project repository for further details.
|
||||
* Commit/Branch:
|
||||
* a development branch for the states *Development* and *Implemented*.
|
||||
* a commit reference to the merge commit for states from *Merged*.
|
||||
* Release: [PyPI release](https://pypi.org/project/sigmatools/) that implements or will implement the change.
|
||||
* Description: contains a short description of the change.
|
||||
|
||||
| Date | Status | Issues | Commit/Branch | Release | Description |
|
||||
|------------|----------|---------------------|-----------------|---------|-------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| 2019-10-01 | Planned | - | - | - | Field name cleanup |
|
||||
| 2019-08-01 | Released | - | config-cleanup | 0.12 | Configuration name cleanup |
|
||||
| 2019-08-01 | Released | - | devel-modifiers | 0.12 | Pipe character must be escaped with backslash in field value names due to introduction of value modifiers |
|
||||
| 2019-03-02 | Released | #136 #137 #139 #147 | 56a1ed1 | 0.9 | Introduction of [generic log sources](https://patzke.org/introducing-generic-log-sources-in-sigma.html) and *process_creation* as first generic log source. |
|
||||
@@ -19,65 +19,68 @@ test-sigmac:
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -h
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -l
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvd -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -O rulecomment -rvdI -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t kibana rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs --shoot-yourself-in-the-foot rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c winlogbeat tests/test-modifiers.yml > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -O rulecomment -rvdI -c tools/config/winlogbeat.yml -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t kibana -c tools/config/winlogbeat.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t graylog rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t xpack-watcher rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t elastalert -O alert_methods=http_post,email -O emails=test@test.invalid -O http_post_url=http://test.invalid rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunkxml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t logpoint rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t xpack-watcher -O email,index,webhook -c tools/config/winlogbeat.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t elastalert -c tools/config/winlogbeat.yml -O alert_methods=http_post,email -O emails=test@test.invalid -O http_post_url=http://test.invalid rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t elastalert-dsl -c tools/config/winlogbeat.yml -O alert_methods=http_post,email -O emails=test@test.invalid -O http_post_url=http://test.invalid rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunkxml -c tools/config/splunk-windows.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t logpoint -c tools/config/logpoint-windows.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t wdatp rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t ala rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t ala --backend-config tests/backend_config.yml rules/windows/process_creation/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-dsl rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t powershell -c tools/config/powershell-windows-all.yml -Ocsv rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-dsl -c tools/config/winlogbeat.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t powershell -c tools/config/powershell.yml -Ocsv rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t arcsight -c tools/config/arcsight.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qradar -c tools/config/arcsight.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qradar -c tools/config/qradar.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qualys -c tools/config/qualys.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t netwitness -c tools/config/netwitness.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t sumologic -c tools/config/sumologic.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'level>=high,level<=critical,status=stable,logsource=windows,tag=attack.execution' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'level>=high,level<=critical,status=xstable,logsource=windows' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'level>=high,level<=xcritical,status=stable,logsource=windows' rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'level=critical' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'level=xcritical' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'foo=bar' rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-windows.yml -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/generic/sysmon.yml -c tools/config/elk-windows.yml -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-linux.yml -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-windows.yml -t kibana rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-windows.yml -Ooutput=curl -t kibana rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-linux.yml -t kibana rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-linux.yml -Ooutput=curl -t kibana rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-windows.yml -t xpack-watcher rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-linux.yml -t xpack-watcher rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-defaultindex.yml -t xpack-watcher rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/splunk-windows-all.yml -t splunk rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/splunk-windows-all-index.yml -t splunk rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/generic/sysmon.yml -c tools/config/splunk-windows-all.yml -t splunk rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logpoint-windows-all.yml -t logpoint rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t sumologic -O rulecomment -c tools/config/sumologic.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level>=high,level<=critical,status=stable,logsource=windows,tag=attack.execution' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level>=high,level<=critical,status=xstable,logsource=windows' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level>=high,level<=xcritical,status=stable,logsource=windows' rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level=critical' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level=xcritical' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'foo=bar' rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c sysmon -c logstash-windows -t es-qs rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c sysmon -c logstash-windows -t splunk rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -c tools/config/generic/sysmon.yml -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -t kibana rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -Ooutput=curl -t kibana rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -t kibana rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -Ooutput=curl -t kibana rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -t xpack-watcher rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -t xpack-watcher rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/filebeat-defaultindex.yml -t xpack-watcher rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/splunk-windows.yml -t splunk rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/generic/sysmon.yml -c tools/config/splunk-windows.yml -t splunk rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t grep rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t fieldlist rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -O output=plain -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/winlogbeat.yml -O output=plain -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t kibana -c tests/config-multiple_mapping.yml -c tests/config-multiple_mapping-2.yml tests/mapping-conditional-multi.yml > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -O output=json -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -o $(TMPOUT) - < tests/collection_repeat.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -O output=foobar -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/not_existing.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_yaml.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_sigma-no_identifiers.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_sigma-no_condition.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_sigma-invalid_identifier_reference.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_sigma-invalid_aggregation.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_sigma-wrong_identifier_definition.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs rules/windows/builtin/win_susp_failed_logons_single_source.yml
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -o /not_possible rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/winlogbeat.yml -O output=json -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml -o $(TMPOUT) - < tests/collection_repeat.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/winlogbeat.yml -O output=foobar -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/not_existing.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_yaml.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-no_identifiers.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-no_condition.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-invalid_identifier_reference.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-invalid_aggregation.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-wrong_identifier_definition.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml rules/windows/builtin/win_susp_failed_logons_single_source.yml
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml -o /not_possible rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c not_existing rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tests/invalid_yaml.yml rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tests/invalid_config.yml rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rv -c tools/config/elk-defaultindex.yml -t kibana rules/ > /dev/null
|
||||
|
||||
test-merge:
|
||||
tests/test-merge.sh
|
||||
|
||||
@@ -187,6 +187,7 @@ tools/sigmac -t splunk -c ~/my-splunk-mapping.yml -c tools/config/generic/window
|
||||
* [Elastic X-Pack Watcher](https://www.elastic.co/guide/en/x-pack/current/xpack-alerting.html)
|
||||
* [Logpoint](https://www.logpoint.com)
|
||||
* [Windows Defender Advanced Threat Protection (WDATP)](https://www.microsoft.com/en-us/windowsforbusiness/windows-atp)
|
||||
* [Azure Sentinel / Azure Log Analytics](https://azure.microsoft.com/en-us/services/azure-sentinel/)
|
||||
* [ArcSight](https://software.microfocus.com/en-us/products/siem-security-information-event-management/overview)
|
||||
* [QRadar](https://www.ibm.com/de-de/marketplace/ibm-qradar-siem)
|
||||
* [Qualys](https://www.qualys.com/apps/threat-protection/)
|
||||
|
||||
@@ -162,12 +162,12 @@ for file in glob.glob(args.ruledir + "/*"):
|
||||
output_elast_config = re.sub(entry, str(convert_args[entry]), output_elast_config)
|
||||
for entry in translate_func:
|
||||
output_elast_config = re.sub(entry, translate_func[entry], output_elast_config)
|
||||
print "Converting file " + file
|
||||
print("Converting file " + file)
|
||||
with open(os.path.join(args.outdir, "sigma-" + file.split("/")[-1]), "w") as f:
|
||||
f.write(output_elast_config)
|
||||
except Exception as e:
|
||||
if args.debug:
|
||||
traceback.print_exc()
|
||||
print "error " + str(file) + "----" + str(e)
|
||||
print("error " + str(file) + "----" + str(e))
|
||||
pass
|
||||
|
||||
|
||||
+37
-23
@@ -25,11 +25,13 @@ Workflow:
|
||||
3. Format
|
||||
4. Get results and save to txt/xlsx files
|
||||
Requirements:
|
||||
$ pip install sumologic-sdk pyyaml pandas
|
||||
$ pip install sumologic-sdk pyyaml pandas openpyxl
|
||||
"""
|
||||
|
||||
import re
|
||||
import os, sys, stat
|
||||
import os
|
||||
import sys
|
||||
import stat
|
||||
import glob
|
||||
import subprocess
|
||||
import argparse
|
||||
@@ -64,6 +66,7 @@ args = parser.parse_args()
|
||||
LIMIT = 100
|
||||
delay = 5
|
||||
|
||||
|
||||
def rule_element(file_content, elements):
|
||||
"""
|
||||
Function used to get specific element from yaml document and return content
|
||||
@@ -75,19 +78,20 @@ def rule_element(file_content, elements):
|
||||
"""
|
||||
try:
|
||||
logger.debug("file_content: %s" % file_content)
|
||||
yaml.safe_load(file_content.replace("---",""))
|
||||
except:
|
||||
yaml.safe_load(file_content.replace("---", ""))
|
||||
except TypeError:
|
||||
raise Exception('Unsupported')
|
||||
element_output = ""
|
||||
for e in elements:
|
||||
try:
|
||||
element_output = yaml.safe_load(file_content.replace("---",""))[e]
|
||||
except:
|
||||
element_output = yaml.safe_load(file_content.replace("---", ""))[e]
|
||||
except TypeError:
|
||||
pass
|
||||
if element_output is None:
|
||||
return ""
|
||||
return element_output
|
||||
|
||||
|
||||
def get_rule_as_sumologic(file):
|
||||
"""
|
||||
Function used to get sumologic query output from rule file
|
||||
@@ -99,7 +103,7 @@ def get_rule_as_sumologic(file):
|
||||
logger.error("Cannot find sigmac rule coverter at '%s', please set a correct location via '--sigmac'")
|
||||
cmd = [args.sigmac, file, "--target", "sumologic"]
|
||||
logger.info('get_rule_as_sumologic cmd: %s' % cmd)
|
||||
process = subprocess.Popen(cmd,stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
||||
process = subprocess.Popen(cmd, stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
||||
output, err = process.communicate()
|
||||
|
||||
# output is byte-string...
|
||||
@@ -133,7 +137,7 @@ if args.conf:
|
||||
args.sigmac = cfg['sigmac']
|
||||
try:
|
||||
args.recursive = cfg['recursive']
|
||||
except:
|
||||
except TypeError:
|
||||
args.recursive = False
|
||||
if args.recursive:
|
||||
globpath = args.ruledir + "/**/*.yml"
|
||||
@@ -145,10 +149,10 @@ if args.conf:
|
||||
if args.outdir and not os.path.isdir(args.outdir):
|
||||
os.mkdir(args.outdir, stat.S_IRWXU)
|
||||
|
||||
# recursive
|
||||
for file in glob.iglob(globpath):
|
||||
# non-recursive (above, not working...)
|
||||
#for file in glob.iglob(args.ruledir + "/*.yml"):
|
||||
# for file in glob.iglob(args.ruledir + "/*.yml"):
|
||||
# recursive
|
||||
for file in glob.iglob(globpath, recursive=True):
|
||||
|
||||
file_basename = os.path.basename(os.path.splitext(file)[0])
|
||||
file_basenamepath = os.path.splitext(file)[0]
|
||||
@@ -170,26 +174,34 @@ for file in glob.iglob(globpath):
|
||||
# FIXME! want to add something in the middle for parsing for example...
|
||||
logger.info(" Adding custom part to end query from: %s" % file_basenamepath + '.custom')
|
||||
with open(file_basenamepath + '.custom', "rb") as f:
|
||||
sumo_query += " " + f.read().decode('utf-8')
|
||||
# FIXME ! manage pipe inside queries
|
||||
if "| count" in sumo_query:
|
||||
pos = sumo_query.find('| count')
|
||||
sumo_query = sumo_query[:pos] + f.read().decode('utf-8') + sumo_query[pos:]
|
||||
else:
|
||||
sumo_query += " " + f.read().decode('utf-8')
|
||||
elif 'count ' not in sumo_query and ('EventID=' in sumo_query):
|
||||
sumo_query += " | count _sourceCategory, hostname, EventID, msg_summary, _raw"
|
||||
sumo_query += " | count _sourceCategory, hostname, EventID, msg_summary, _raw"
|
||||
elif 'count ' not in sumo_query:
|
||||
sumo_query += " | count _sourceCategory, hostname, _raw"
|
||||
sumo_query += " | count _sourceCategory, hostname, _raw"
|
||||
|
||||
logger.info("Final sumo query: %s" % sumo_query)
|
||||
logger.debug("Final sumo query: %s" % sumo_query)
|
||||
|
||||
except Exception as e:
|
||||
if args.debug:
|
||||
traceback.print_exc()
|
||||
logger.exception("error generating sumo query " + str(file) + "----" + str(e))
|
||||
pass
|
||||
with open(os.path.join(args.outdir, "sigma-" + file_basename + '-error-generation.txt'), "w") as f:
|
||||
# f.write(json.dumps(r, indent=4, sort_keys=True) + " ERROR: %s\n\nQUERY: %s" % (e, sumo_query))
|
||||
f.write(" ERROR for file: %s\n\Exception:\n %s" % (file, e))
|
||||
continue
|
||||
|
||||
try:
|
||||
# Run query
|
||||
# https://github.com/SumoLogic/sumologic-python-sdk/blob/master/scripts/search-job.py
|
||||
sumo = SumoLogic(args.accessid, args.accesskey, args.endpoint)
|
||||
toTime = datetime.datetime.now().strftime("%Y-%m-%dT%H:%M:%S")
|
||||
fromTime = datetime.datetime.strptime(toTime, "%Y-%m-%dT%H:%M:%S") - datetime.timedelta(hours = 24)
|
||||
fromTime = datetime.datetime.strptime(toTime, "%Y-%m-%dT%H:%M:%S") - datetime.timedelta(hours=24)
|
||||
fromTime = fromTime.strftime("%Y-%m-%dT%H:%M:%S")
|
||||
timeZone = 'UTC'
|
||||
byReceiptTime = True
|
||||
@@ -208,19 +220,21 @@ for file in glob.iglob(globpath):
|
||||
traceback.print_exc()
|
||||
logger.exception("error seaching sumo " + str(file) + "----" + str(e))
|
||||
with open(os.path.join(args.outdir, "sigma-" + file_basename + '-error.txt'), "w") as f:
|
||||
f.write(json.dumps(r, indent=4, sort_keys=True) + " ERROR: %s\n\nQUERY: %s" % (e, sumo_query))
|
||||
# f.write(json.dumps(r, indent=4, sort_keys=True) + " ERROR: %s\n\nQUERY: %s" % (e, sumo_query))
|
||||
f.write(" ERROR: %s\n\nQUERY: %s" % (e, sumo_query))
|
||||
pass
|
||||
|
||||
logger.info("Sumo search job status: %s" % status['state'])
|
||||
logger.debug("Sumo search job status: %s" % status['state'])
|
||||
|
||||
try:
|
||||
if status['state'] == 'DONE GATHERING RESULTS':
|
||||
count = status['recordCount']
|
||||
limit = count if count < LIMIT and count != 0 else LIMIT # compensate bad limit check
|
||||
# compensate bad limit check
|
||||
limit = count if count < LIMIT and count != 0 else LIMIT
|
||||
r = sumo.search_job_records(sj, limit=limit)
|
||||
logger.info("Sumo search results: %s" % r)
|
||||
logger.debug("Sumo search results: %s" % r)
|
||||
|
||||
logger.info("Saving final sumo query for %s to %s" % (file, os.path.join(args.outdir, "sigma-" + file_basename + '.sumo')))
|
||||
logger.debug("Saving final sumo query for %s to %s" % (file, os.path.join(args.outdir, "sigma-" + file_basename + '.sumo')))
|
||||
with open(os.path.join(args.outdir, "sigma-" + file_basename + '.sumo'), "w") as f:
|
||||
f.write(sumo_query)
|
||||
if r and r['records'] != []:
|
||||
@@ -236,7 +250,7 @@ for file in glob.iglob(globpath):
|
||||
"timeframe: from %s to %s" % (fromTime, toTime),
|
||||
"Sumo endpoint: %s" % args.endpoint,
|
||||
"Sumo query: %s" % sumo_query
|
||||
]}).to_excel(writer, 'comments')
|
||||
]}).to_excel(writer, 'comments')
|
||||
|
||||
# and do whatever you want, email alert, report, ticket...
|
||||
|
||||
|
||||
@@ -0,0 +1,2653 @@
|
||||
{
|
||||
"name": "SIGMA Rule Coverage",
|
||||
"version": "2.1",
|
||||
"domain": "mitre-enterprise",
|
||||
"description": "Accurate to commit #: 81693d81b6823bb5f064919453eac70c1d097d3e\nhttps://github.com/Neo23x0/sigma/commit/81693d81b6823bb5f064919453eac70c1d097d3e",
|
||||
"filters": {
|
||||
"stages": [
|
||||
"act"
|
||||
],
|
||||
"platforms": [
|
||||
"windows",
|
||||
"linux",
|
||||
"mac"
|
||||
]
|
||||
},
|
||||
"sorting": 0,
|
||||
"viewMode": 0,
|
||||
"hideDisabled": false,
|
||||
"techniques": [
|
||||
{
|
||||
"techniqueID": "T1156",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1134",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1134",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1015",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_stickykey_like_backdoor.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1015",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_stickykey_like_backdoor.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1087",
|
||||
"tactic": "discovery",
|
||||
"score": 5,
|
||||
"color": "",
|
||||
"comment": "win_account_discovery.yml\nwin_alert_hacktool_use.yml\nwin_susp_net_recon_activity.yml\nwin_susp_commands_recon_activity.yml\nwin_susp_recon_activity.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1098",
|
||||
"tactic": "credential-access",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "apt_judgement_panda_gtr19.yml\nwin_alert_ad_user_backdoors.yml\nwin_susp_dsrm_password_change.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1098",
|
||||
"tactic": "persistence",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "apt_judgement_panda_gtr19.yml\nwin_alert_ad_user_backdoors.yml\nwin_susp_dsrm_password_change.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1182",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1182",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1103",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1103",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1155",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1155",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1017",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1138",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_sdbinst_shim_persistence.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1138",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_sdbinst_shim_persistence.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1010",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1123",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1131",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1119",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1020",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1197",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_process_creation_bitsadmin_download.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1197",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_process_creation_bitsadmin_download.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1139",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1009",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1067",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_bcdedit.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1217",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1176",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1110",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1088",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "win_cmstp_com_object_access.yml\nsysmon_uac_bypass_eventvwr.yml\nsysmon_uac_bypass_sdclt.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1088",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "win_cmstp_com_object_access.yml\nsysmon_uac_bypass_eventvwr.yml\nsysmon_uac_bypass_sdclt.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1191",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_cmstp_com_object_access.yml\nsysmon_cmstp_execution.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1191",
|
||||
"tactic": "execution",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_cmstp_com_object_access.yml\nsysmon_cmstp_execution.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1042",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1146",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "lnx_shell_clear_cmd_history.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1115",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1116",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1059",
|
||||
"tactic": "execution",
|
||||
"score": 12,
|
||||
"color": "",
|
||||
"comment": "apt_babyshark.yml\napt_equationgroup_dll_u_load.yml\napt_equationgroup_lnx.yml\napt_sofacy.yml\napt_sofacy_zebrocy.yml\napt_turla_commands.yml\napt_zxshell.yml\ncrime_fireball.yml\nwin_alert_hacktool_use.yml\nwin_office_shell.yml\nwin_susp_cmd_http_appdata.yml\nwin_susp_outlook.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1043",
|
||||
"tactic": "command-and-control",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_malware_backconnect_ports.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1092",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1223",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1223",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1109",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1109",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1122",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1122",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1090",
|
||||
"tactic": "command-and-control",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_netsh_fw_add.yml\nwin_netsh_port_fwd.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1196",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1196",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1136",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1003",
|
||||
"tactic": "credential-access",
|
||||
"score": 23,
|
||||
"color": "",
|
||||
"comment": "apt_bear_activity_gtr19.yml\nwin_alert_lsass_access.yml\nwin_alert_mimikatz_keywords.yml\nwin_dcsync.yml\nwin_impacket_secretdump.yml\nwin_mal_creddumper.yml\nwin_mal_wceaux_dll.yml\nwin_susp_lsass_dump.yml\nwin_susp_sam_dump.yml\nav_password_dumper.yml\nwin_cmdkey_recon.yml\nwin_hack_rubeus.yml\nwin_malware_notpetya.yml\nwin_susp_ntdsutil.yml\nwin_susp_procdump.yml\nwin_susp_sysvol_access.yml\nwin_susp_vssadmin_ntds_activity.yml\nsysmon_ghostpack_safetykatz.yml\nsysmon_lsass_memdump.yml\nsysmon_mimikatz_detection_lsass.yml\nsysmon_mimikatz_inmemory_detection.yml\nsysmon_password_dumper_lsass.yml\nsysmon_quarkspw_filedump.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1081",
|
||||
"tactic": "credential-access",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_bear_activity_gtr19.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1214",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1094",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1024",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1207",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1038",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1038",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1038",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1073",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 9,
|
||||
"color": "",
|
||||
"comment": "win_susp_dhcp_config.yml\nwin_susp_dhcp_config_failed.yml\nwin_susp_dns_config.yml\nwin_plugx_susp_exe_locations.yml\nwin_susp_control_dll_load.yml\nwin_susp_gup.yml\nsysmon_dhcp_calloutdll.yml\nsysmon_dns_serverlevelplugindll.yml\nsysmon_susp_image_load.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1002",
|
||||
"tactic": "exfiltration",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_judgement_panda_gtr19.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1132",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1022",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1001",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1074",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1030",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1213",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1005",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1039",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1025",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1140",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "win_susp_mshta_execution.yml\nwin_susp_certutil_command.yml\nwin_susp_cli_escape.yml\nwin_susp_ping_hex_ip.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1089",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_alert_enable_weak_encryption.yml\nwin_susp_msmpeng_crash.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1175",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_mmc_source.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1172",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1189",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1157",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1157",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1173",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1114",
|
||||
"tactic": "collection",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_alert_hacktool_use.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1106",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1129",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1048",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1041",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1011",
|
||||
"tactic": "exfiltration",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_ssp_added_lsa_config.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1052",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1190",
|
||||
"tactic": "initial-access",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "web_cve_2018_2894_weblogic_exploit.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1203",
|
||||
"tactic": "execution",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "av_exploiting.yml\nwin_exploit_cve_2017_8759.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1212",
|
||||
"tactic": "credential-access",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "win_net_ntlm_downgrade.yml\nwin_susp_kerberos_manipulation.yml\nwin_susp_samr_pwset.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1211",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_susp_msmpeng_crash.yml\nwin_exploit_cve_2017_11882.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1068",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_hurricane_panda.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1210",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1133",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1181",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1181",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1008",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1107",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_susp_backup_delete.yml\nwin_susp_sdelete.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1222",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1006",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1044",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1044",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1083",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_turla_commands.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1187",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1144",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1061",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1148",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1200",
|
||||
"tactic": "initial-access",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_usb_device_plugged.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1158",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_attrib_hiding_files.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1158",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_attrib_hiding_files.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1147",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1143",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1179",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1179",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1179",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1062",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1183",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_win_reg_persistence.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1183",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_win_reg_persistence.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1183",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_win_reg_persistence.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1054",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_disable_event_logging.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1066",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_sdelete.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1070",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "win_susp_eventlog_cleared.yml\nwin_susp_security_eventlog_cleared.yml\nwin_malware_notpetya.yml\nwin_susp_bcdedit.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1202",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_office_shell.yml\nwin_susp_outlook.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1056",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1056",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1141",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1130",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1118",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1118",
|
||||
"tactic": "execution",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1208",
|
||||
"tactic": "credential-access",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_susp_rc4_kerberos.yml\nwin_spn_enum.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1215",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1142",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1161",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1149",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1171",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1177",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1177",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1159",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1160",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1160",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1152",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1152",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1152",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1168",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1168",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1162",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1037",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_logon_scripts_userinitmprlogonscript.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1037",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_logon_scripts_userinitmprlogonscript.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1185",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1036",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 14,
|
||||
"color": "",
|
||||
"comment": "apt_ta17_293a_ps.yml\nwin_exploit_cve_2015_1641.yml\nwin_powershell_b64_shellcode.yml\nwin_susp_calc.yml\nwin_susp_csc.yml\nwin_susp_execution_path.yml\nwin_susp_exec_folder.yml\nwin_susp_procdump.yml\nwin_susp_prog_location_process_starts.yml\nwin_susp_run_locations.yml\nwin_susp_svchost.yml\nwin_susp_taskmgr_localsystem.yml\nwin_susp_taskmgr_parent.yml\nwin_system_exe_anomaly.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1031",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1112",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "apt_chafer_mar18.yml\nwin_mal_ursnif.yml\nsysmon_dhcp_calloutdll.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1170",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "apt_babyshark.yml\nwin_lethalhta.yml\nwin_mshta_spawn_shell.yml\nwin_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1170",
|
||||
"tactic": "execution",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "apt_babyshark.yml\nwin_lethalhta.yml\nwin_mshta_spawn_shell.yml\nwin_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1104",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1188",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1026",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1079",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1096",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "powershell_ntfs_ads_access.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1128",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1046",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_vul_java_remote_debugging.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1126",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1135",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_turla_commands.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1040",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1040",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1050",
|
||||
"tactic": "persistence",
|
||||
"score": 7,
|
||||
"color": "",
|
||||
"comment": "apt_apt29_tor.yml\napt_carbonpaper_turla.yml\napt_stonedrill.yml\napt_turla_service_png.yml\nwin_mal_service_installs.yml\nwin_rare_service_installs.yml\nsysmon_susp_driver_load.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1050",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 7,
|
||||
"color": "",
|
||||
"comment": "apt_apt29_tor.yml\napt_carbonpaper_turla.yml\napt_stonedrill.yml\napt_turla_service_png.yml\nwin_mal_service_installs.yml\nwin_rare_service_installs.yml\nsysmon_susp_driver_load.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1027",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_susp_ping_hex_ip.yml\nsysmon_ads_executable.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1137",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1075",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "win_alert_hacktool_use.yml\nwin_overpass_the_hash.yml\nwin_pass_the_hash.yml\nwin_susp_ntlm_auth.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1097",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1174",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1201",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1034",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1034",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1120",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1069",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_net_recon_activity.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1150",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1150",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1150",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1205",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1205",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1205",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1013",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1013",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1086",
|
||||
"tactic": "execution",
|
||||
"score": 28,
|
||||
"color": "",
|
||||
"comment": "apt_apt29_thinktanks.yml\napt_babyshark.yml\napt_empiremonkey.yml\npowershell_downgrade_attack.yml\npowershell_exe_calling_ps.yml\npowershell_malicious_commandlets.yml\npowershell_malicious_keywords.yml\npowershell_prompt_credentials.yml\npowershell_psattack.yml\npowershell_shellcode_b64.yml\npowershell_suspicious_download.yml\npowershell_suspicious_invocation_generic.yml\npowershell_suspicious_invocation_specific.yml\npowershell_suspicious_keywords.yml\npowershell_xor_commandline.yml\nwin_powershell_amsi_bypass.yml\nwin_powershell_dll_execution.yml\nwin_powershell_download.yml\nwin_powershell_renamed_ps.yml\nwin_powershell_suspicious_parameter_variation.yml\nwin_susp_powershell_enc_cmd.yml\nwin_susp_powershell_hidden_b64_cmd.yml\nwin_susp_powershell_parent_combo.yml\nwin_susp_ps_appdata.yml\nsysmon_powershell_exploit_scripts.yml\nsysmon_powershell_network_connection.yml\nsysmon_powersploit_schtasks.yml\nsysmon_susp_powershell_rundll32.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1145",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1057",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1186",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1093",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1055",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 8,
|
||||
"color": "",
|
||||
"comment": "powershell_shellcode_b64.yml\nwin_exploit_cve_2017_0261.yml\nwin_malware_dridex.yml\nwin_mavinject_proc_inj.yml\nsysmon_cactustorch.yml\nsysmon_cobaltstrike_process_injection.yml\nsysmon_malware_verclsid_shellcode.yml\nsysmon_mal_namedpipes.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1055",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 8,
|
||||
"color": "",
|
||||
"comment": "powershell_shellcode_b64.yml\nwin_exploit_cve_2017_0261.yml\nwin_malware_dridex.yml\nwin_mavinject_proc_inj.yml\nsysmon_cactustorch.yml\nsysmon_cobaltstrike_process_injection.yml\nsysmon_malware_verclsid_shellcode.yml\nsysmon_mal_namedpipes.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1012",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_babyshark.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1163",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1164",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1108",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1108",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1060",
|
||||
"tactic": "persistence",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "sysmon_susp_reg_persist_explorer_run.yml\nsysmon_susp_run_key_img_folder.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1121",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1121",
|
||||
"tactic": "execution",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1117",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_regsvr32_anomalies.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1117",
|
||||
"tactic": "execution",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_regsvr32_anomalies.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1219",
|
||||
"tactic": "command-and-control",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "av_exploiting.yml\nwin_susp_tscon_localsystem.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1076",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "win_rdp_localhost_login.yml\nwin_rdp_reverse_tunnel.yml\nwin_susp_tscon_rdp_redirect.yml\nsysmon_rdp_reverse_tunnel.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1105",
|
||||
"tactic": "command-and-control",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "apt_pandemic.yml\nwin_susp_certutil_command.yml\nsysmon_win_binary_github_com.yml\nsysmon_win_binary_susp_com.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1105",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "apt_pandemic.yml\nwin_susp_certutil_command.yml\nsysmon_win_binary_github_com.yml\nsysmon_win_binary_susp_com.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1021",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_netsh_port_fwd_3389.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1018",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1091",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1091",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1014",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1085",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 11,
|
||||
"color": "",
|
||||
"comment": "apt_equationgroup_dll_u_load.yml\napt_sofacy.yml\napt_tropictrooper.yml\napt_unidentified_nov_18.yml\napt_zxshell.yml\ncrime_fireball.yml\nwin_malware_notpetya.yml\nwin_susp_control_dll_load.yml\nwin_susp_rundll32_activity.yml\nsysmon_rundll32_net_connections.yml\nsysmon_susp_powershell_rundll32.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1085",
|
||||
"tactic": "execution",
|
||||
"score": 11,
|
||||
"color": "",
|
||||
"comment": "apt_equationgroup_dll_u_load.yml\napt_sofacy.yml\napt_tropictrooper.yml\napt_unidentified_nov_18.yml\napt_zxshell.yml\ncrime_fireball.yml\nwin_malware_notpetya.yml\nwin_susp_control_dll_load.yml\nwin_susp_rundll32_activity.yml\nsysmon_rundll32_net_connections.yml\nsysmon_susp_powershell_rundll32.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1178",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_add_sid_history.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1198",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1198",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1184",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1053",
|
||||
"tactic": "execution",
|
||||
"score": 8,
|
||||
"color": "",
|
||||
"comment": "apt_chafer_mar18.yml\napt_slingshot.yml\nwin_atsvc_task.yml\nwin_GPO_scheduledtasks.yml\nwin_rare_schtasks_creations.yml\nwin_rare_schtask_creation.yml\nwin_susp_schtask_creation.yml\nsysmon_powersploit_schtasks.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1053",
|
||||
"tactic": "persistence",
|
||||
"score": 8,
|
||||
"color": "",
|
||||
"comment": "apt_chafer_mar18.yml\napt_slingshot.yml\nwin_atsvc_task.yml\nwin_GPO_scheduledtasks.yml\nwin_rare_schtasks_creations.yml\nwin_rare_schtask_creation.yml\nwin_susp_schtask_creation.yml\nsysmon_powersploit_schtasks.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1053",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 8,
|
||||
"color": "",
|
||||
"comment": "apt_chafer_mar18.yml\napt_slingshot.yml\nwin_atsvc_task.yml\nwin_GPO_scheduledtasks.yml\nwin_rare_schtasks_creations.yml\nwin_rare_schtask_creation.yml\nwin_susp_schtask_creation.yml\nsysmon_powersploit_schtasks.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1029",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1113",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1180",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1064",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 10,
|
||||
"color": "",
|
||||
"comment": "apt_cloudhopper.yml\nwin_malware_script_dropper.yml\nwin_mal_adwind.yml\nwin_mal_lockergoga.yml\nwin_shell_spawn_susp_program.yml\nwin_susp_rasdial_activity.yml\nwin_susp_script_execution.yml\nwin_wmi_spwns_powershell.yml\nsysmon_cactustorch.yml\nsysmon_susp_file_characteristics.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1064",
|
||||
"tactic": "execution",
|
||||
"score": 10,
|
||||
"color": "",
|
||||
"comment": "apt_cloudhopper.yml\nwin_malware_script_dropper.yml\nwin_mal_adwind.yml\nwin_mal_lockergoga.yml\nwin_shell_spawn_susp_program.yml\nwin_susp_rasdial_activity.yml\nwin_susp_script_execution.yml\nwin_wmi_spwns_powershell.yml\nsysmon_cactustorch.yml\nsysmon_susp_file_characteristics.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1063",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1101",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1167",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1035",
|
||||
"tactic": "execution",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "win_hack_smbexec.yml\nwin_tool_psexec.yml\nwin_psexesvc_start.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1058",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1058",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1166",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1166",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1051",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1023",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1218",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_mavinject_proc_inj.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1218",
|
||||
"tactic": "execution",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_mavinject_proc_inj.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1216",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1216",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1045",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1153",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1151",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1151",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1193",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1192",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1194",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1071",
|
||||
"tactic": "command-and-control",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "net_susp_dns_txt_exec_strings.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1032",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1095",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1165",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1165",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1169",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1206",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1195",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1019",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1082",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_commands_recon_activity.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1016",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1049",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1033",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_whoami.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1007",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1124",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1080",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1221",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1072",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1072",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1209",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1099",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_time_modification.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1154",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1154",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1127",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml\nwin_workflow_compiler.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1127",
|
||||
"tactic": "execution",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml\nwin_workflow_compiler.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1199",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1111",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1065",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1204",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1078",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "win_admin_rdp_login.yml\nwin_alert_active_directory_user_control.yml\nwin_susp_failed_logons_single_source.yml\nwin_susp_failed_logon_reasons.yml\nwin_susp_interactive_logons.yml\nwin_user_added_to_local_administrators.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1078",
|
||||
"tactic": "persistence",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "win_admin_rdp_login.yml\nwin_alert_active_directory_user_control.yml\nwin_susp_failed_logons_single_source.yml\nwin_susp_failed_logon_reasons.yml\nwin_susp_interactive_logons.yml\nwin_user_added_to_local_administrators.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1078",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "win_admin_rdp_login.yml\nwin_alert_active_directory_user_control.yml\nwin_susp_failed_logons_single_source.yml\nwin_susp_failed_logon_reasons.yml\nwin_susp_interactive_logons.yml\nwin_user_added_to_local_administrators.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1078",
|
||||
"tactic": "initial-access",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "win_admin_rdp_login.yml\nwin_alert_active_directory_user_control.yml\nwin_susp_failed_logons_single_source.yml\nwin_susp_failed_logon_reasons.yml\nwin_susp_interactive_logons.yml\nwin_user_added_to_local_administrators.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1125",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1102",
|
||||
"tactic": "command-and-control",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "proxy_cobalt_amazon.yml\nproxy_cobalt_ocsp.yml\nproxy_cobalt_onedrive.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1102",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "proxy_cobalt_amazon.yml\nproxy_cobalt_ocsp.yml\nproxy_cobalt_onedrive.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1100",
|
||||
"tactic": "persistence",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "web_cve_2018_2894_weblogic_exploit.yml\nav_webshell.yml\nwin_susp_execution_path_webserver.yml\nwin_susp_iss_module_install.yml\nwin_webshell_detection.yml\nwin_webshell_spawn.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1100",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "web_cve_2018_2894_weblogic_exploit.yml\nav_webshell.yml\nwin_susp_execution_path_webserver.yml\nwin_susp_iss_module_install.yml\nwin_webshell_detection.yml\nwin_webshell_spawn.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1077",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 5,
|
||||
"color": "",
|
||||
"comment": "apt_turla_commands.yml\nwin_admin_share_access.yml\nwin_hack_smbexec.yml\nwin_lm_namedpipe.yml\nwin_susp_psexec.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1047",
|
||||
"tactic": "execution",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "win_wmi_persistence.yml\nwin_bypass_squiblytwo.yml\nwin_susp_wmi_execution.yml\nwin_wmi_persistence_script_event_consumer.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1084",
|
||||
"tactic": "persistence",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "sysmon_wmi_event_subscription.yml\nsysmon_wmi_persistence_commandline_event_consumer.yml\nsysmon_wmi_persistence_script_event_consumer_write.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1028",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1028",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1004",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1220",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1220",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
}
|
||||
],
|
||||
"gradient": {
|
||||
"colors": [
|
||||
"#ffffff",
|
||||
"#66b1ff"
|
||||
],
|
||||
"minValue": 0,
|
||||
"maxValue": 2
|
||||
},
|
||||
"legendItems": [],
|
||||
"metadata": [],
|
||||
"showTacticRowBackground": false,
|
||||
"tacticRowBackground": "#dddddd",
|
||||
"selectTechniquesAcrossTactics": true
|
||||
}
|
||||
Binary file not shown.
|
After Width: | Height: | Size: 373 KiB |
@@ -0,0 +1,32 @@
|
||||
---
|
||||
action: global
|
||||
title: Empire Monkey
|
||||
description: Detects EmpireMonkey APT reported Activity
|
||||
references:
|
||||
- https://app.any.run/tasks/a4107649-8cb0-41af-ad75-113152d4d57b
|
||||
tags:
|
||||
- attack.t1086
|
||||
- attack.execution
|
||||
date: 2019/04/02
|
||||
author: Markus Neis
|
||||
detection:
|
||||
condition: 1 of them
|
||||
falsepositives:
|
||||
- Very Unlikely
|
||||
level: critical
|
||||
---
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection_cutil:
|
||||
CommandLine:
|
||||
- '*/i:%APPDATA%\logs.txt scrobj.dll'
|
||||
Image:
|
||||
- '*\cutil.exe'
|
||||
selection_regsvr32:
|
||||
CommandLine:
|
||||
- '*/i:%APPDATA%\logs.txt scrobj.dll'
|
||||
Description:
|
||||
- Microsoft(C) Registerserver
|
||||
|
||||
@@ -0,0 +1,27 @@
|
||||
title: OceanLotus Registry Activity
|
||||
status: experimental
|
||||
description: Detects registry keys created in OceanLotus (also known as APT32) attacks
|
||||
references:
|
||||
- https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/
|
||||
tags:
|
||||
- attack.t1112
|
||||
author: megan201296
|
||||
date: 2019/04/14
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 13
|
||||
TargetObject:
|
||||
- '*\SOFTWARE\Classes\CLSID\{E08A0F4B-1F65-4D4D-9A09-BD4625B9C5A1}\Model'
|
||||
- '*\SOFTWARE\App\AppXbf13d4ea2945444d8b13e2121cb6b663\Application'
|
||||
- '*\SOFTWARE\App\AppXbf13d4ea2945444d8b13e2121cb6b663\DefaultIcon'
|
||||
- '*\SOFTWARE\App\AppX70162486c7554f7f80f481985d67586d\Application'
|
||||
- '*\SOFTWARE\App\AppX70162486c7554f7f80f481985d67586d\DefaultIcon'
|
||||
- '*\SOFTWARE\App\AppX37cc7fdccd644b4f85f4b22d5a3f105a\Application'
|
||||
- '*\SOFTWARE\App\AppX37cc7fdccd644b4f85f4b22d5a3f105a\DefaultIcon'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: critical
|
||||
@@ -12,6 +12,7 @@ tags:
|
||||
- attack.t1059
|
||||
- attack.defense_evasion
|
||||
- attack.t1085
|
||||
- car.2013-10-002
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
@@ -1,11 +1,12 @@
|
||||
title: Ps.exe Renamed SysInternals Tool
|
||||
description: Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documentied in TA17-293A report
|
||||
description: Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documented in TA17-293A report
|
||||
references:
|
||||
- https://www.us-cert.gov/ncas/alerts/TA17-293A
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.g0035
|
||||
- attack.t1036
|
||||
- car.2013-05-009
|
||||
author: Florian Roth
|
||||
date: 2017/10/22
|
||||
logsource:
|
||||
|
||||
@@ -0,0 +1,30 @@
|
||||
title: Detects Suspicious edit of .bash_profile and .bashrc on Linux systems
|
||||
status: experimental
|
||||
description: Detects change of user environment. Adversaries can insert code into these files to gain persistence each time a user logs in or opens a new shell.
|
||||
references:
|
||||
- 'MITRE Attack technique T1156; .bash_profile and .bashrc. '
|
||||
date: 2019/05/12
|
||||
tags:
|
||||
- attack.s0003
|
||||
- attack.t1156
|
||||
- attack.persistence
|
||||
author: Peter Matkovski
|
||||
logsource:
|
||||
product: linux
|
||||
service: auditd
|
||||
detection:
|
||||
selection:
|
||||
type: 'PATH'
|
||||
name:
|
||||
- '/home/*/.bashrc'
|
||||
- '/home/*/.bash_profile'
|
||||
- '/home/*/.profile'
|
||||
- '/etc/profile'
|
||||
- '/etc/shells'
|
||||
- '/etc/bashrc'
|
||||
- '/etc/csh.cshrc'
|
||||
- '/etc/csh.login'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Admin or User activity
|
||||
level: medium
|
||||
@@ -9,20 +9,23 @@ logsource:
|
||||
product: linux
|
||||
service: auditd
|
||||
detection:
|
||||
cmds:
|
||||
- type: 'EXECVE'
|
||||
a0: 'chmod'
|
||||
a1: '777'
|
||||
- type: 'EXECVE'
|
||||
a0: 'chmod'
|
||||
a1: 'u+s'
|
||||
- type: 'EXECVE'
|
||||
a0: 'cp'
|
||||
a1: '/bin/ksh'
|
||||
- type: 'EXECVE'
|
||||
a0: 'cp'
|
||||
a1: '/bin/sh'
|
||||
condition: 1 of cmds
|
||||
cmd1:
|
||||
type: 'EXECVE'
|
||||
a0: 'chmod'
|
||||
a1: '777'
|
||||
cmd2:
|
||||
type: 'EXECVE'
|
||||
a0: 'chmod'
|
||||
a1: 'u+s'
|
||||
cmd3:
|
||||
type: 'EXECVE'
|
||||
a0: 'cp'
|
||||
a1: '/bin/ksh'
|
||||
cmd4:
|
||||
type: 'EXECVE'
|
||||
a0: 'cp'
|
||||
a1: '/bin/sh'
|
||||
condition: 1 of them
|
||||
falsepositives:
|
||||
- Admin activity
|
||||
level: medium
|
||||
@@ -0,0 +1,27 @@
|
||||
title: Clear Command History
|
||||
status: experimental
|
||||
description: Clear command history in linux which is used for defense evasion.
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1146/T1146.yaml
|
||||
- https://attack.mitre.org/techniques/T1146/
|
||||
author: Patrick Bareiss
|
||||
date: 2019/03/24
|
||||
logsource:
|
||||
product: linux
|
||||
detection:
|
||||
keywords:
|
||||
- 'rm *bash_history'
|
||||
- 'echo "" > *bash_history'
|
||||
- 'cat /dev/null > *bash_history'
|
||||
- 'ln -sf /dev/null *bash_history'
|
||||
- 'truncate -s0 *bash_history'
|
||||
# - 'unset HISTFILE' # prone to false positives
|
||||
- 'export HISTFILESIZE=0'
|
||||
- 'history -c'
|
||||
condition: keywords
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1146
|
||||
@@ -0,0 +1,64 @@
|
||||
title: Privilege Escalation Preparation
|
||||
status: experimental
|
||||
description: Detects suspicious shell commands indicating the information gathering phase as preparation for the Privilege Escalation.
|
||||
references:
|
||||
- https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
|
||||
- https://patrick-bareiss.com/detect-privilege-escalation-preparation-in-linux-with-sigma/
|
||||
author: Patrick Bareiss
|
||||
date: 2019/04/05
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.t1068
|
||||
level: medium
|
||||
logsource:
|
||||
product: linux
|
||||
detection:
|
||||
keywords:
|
||||
# distribution type and kernel version
|
||||
- 'cat /etc/issue'
|
||||
- 'cat /etc/*-release'
|
||||
- 'cat /proc/version'
|
||||
- 'uname -a'
|
||||
- 'uname -mrs'
|
||||
- 'rpm -q kernel'
|
||||
- 'dmesg | grep Linux'
|
||||
- 'ls /boot | grep vmlinuz-'
|
||||
# environment variables
|
||||
- 'cat /etc/profile'
|
||||
- 'cat /etc/bashrc'
|
||||
- 'cat ~/.bash_profile'
|
||||
- 'cat ~/.bashrc'
|
||||
- 'cat ~/.bash_logout'
|
||||
# applications and services as root
|
||||
- 'ps -aux | grep root'
|
||||
- 'ps -ef | grep root'
|
||||
# scheduled tasks
|
||||
- 'crontab -l'
|
||||
- 'cat /etc/cron*'
|
||||
- 'cat /etc/cron.allow'
|
||||
- 'cat /etc/cron.deny'
|
||||
- 'cat /etc/crontab'
|
||||
# search for plain text user/passwords
|
||||
- 'grep -i user *'
|
||||
- 'grep -i pass *'
|
||||
# networking
|
||||
- 'ifconfig'
|
||||
- 'cat /etc/network/interfaces'
|
||||
- 'cat /etc/sysconfig/network'
|
||||
- 'cat /etc/resolv.conf'
|
||||
- 'cat /etc/networks'
|
||||
- 'iptables -L'
|
||||
- 'lsof -i'
|
||||
- 'netstat -antup'
|
||||
- 'netstat -antpx'
|
||||
- 'netstat -tulpn'
|
||||
- 'arp -e'
|
||||
- 'route'
|
||||
# sensitive files
|
||||
- 'cat /etc/passwd'
|
||||
- 'cat /etc/group'
|
||||
- 'cat /etc/shadow'
|
||||
timeframe: 30m
|
||||
condition: keywords | count() by host > 6
|
||||
falsepositives:
|
||||
- Troubleshooting on Linux Machines
|
||||
@@ -0,0 +1,40 @@
|
||||
title: Suspicious Reverse Shell Command Line
|
||||
status: experimental
|
||||
description: Detects suspicious shell commands or program code that may be exected or used in command line to establish a reverse shell
|
||||
references:
|
||||
- https://alamot.github.io/reverse_shells/
|
||||
author: Florian Roth
|
||||
date: 2019/04/02
|
||||
logsource:
|
||||
product: linux
|
||||
detection:
|
||||
keywords:
|
||||
- 'BEGIN {s = "/inet/tcp/0/'
|
||||
- 'bash -i >& /dev/tcp/'
|
||||
- 'bash -i >& /dev/udp/'
|
||||
- 'sh -i >$ /dev/udp/'
|
||||
- 'sh -i >$ /dev/tcp/'
|
||||
- '&& while read line 0<&5; do'
|
||||
- '/bin/bash -c exec 5<>/dev/tcp/'
|
||||
- '/bin/bash -c exec 5<>/dev/udp/'
|
||||
- 'nc -e /bin/sh '
|
||||
- '/bin/sh | nc'
|
||||
- 'rm -f backpipe; mknod /tmp/backpipe p && nc '
|
||||
- ';socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i))))'
|
||||
- ';STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'
|
||||
- '/bin/sh -i <&3 >&3 2>&3'
|
||||
- 'uname -a; w; id; /bin/bash -i'
|
||||
- '$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2); $stream.Write($sendbyte,0,$sendbyte.Length); $stream.Flush()};'
|
||||
- ";os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);os.putenv('HISTFILE','/dev/null');"
|
||||
- '.to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'
|
||||
- ';while(cmd=c.gets);IO.popen(cmd,"r"){|io|c.print'
|
||||
- "socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:"
|
||||
- 'rm -f /tmp/p; mknod /tmp/p p &&'
|
||||
- ' | /bin/bash | telnet '
|
||||
- ',echo=0,raw tcp-listen:'
|
||||
- 'nc -lvvp '
|
||||
- 'xterm -display 1'
|
||||
condition: keywords
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -0,0 +1,19 @@
|
||||
title: Possible DNS Tunneling
|
||||
status: experimental
|
||||
description: Normally, DNS logs contain a limited amount of different dns queries for a single domain. This rule detects a high amount of queries for a single domain, which can be an indicator that DNS is used to transfer data.
|
||||
references:
|
||||
- https://zeltser.com/c2-dns-tunneling/
|
||||
- https://patrick-bareiss.com/detect-c2-traffic-over-dns-using-sigma/
|
||||
author: Patrick Bareiss
|
||||
date: 2019/04/07
|
||||
logsource:
|
||||
product: dns
|
||||
detection:
|
||||
selection:
|
||||
parent_domain: '*'
|
||||
condition: selection | count(dns_query) by parent_domain > 1000
|
||||
falsepositives:
|
||||
- Valid software, which uses dns for transferring data
|
||||
level: high
|
||||
tags:
|
||||
- attack.t1043
|
||||
@@ -12,10 +12,11 @@ logsource:
|
||||
category: dns
|
||||
detection:
|
||||
selection:
|
||||
answer:
|
||||
- '*IEX*'
|
||||
- '*Invoke-Expression*'
|
||||
- '*cmd.exe*'
|
||||
record_type: 'TXT'
|
||||
answer:
|
||||
- '*IEX*'
|
||||
- '*Invoke-Expression*'
|
||||
- '*cmd.exe*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
@@ -0,0 +1,20 @@
|
||||
title: APT40 Dropbox Tool User Agent
|
||||
status: experimental
|
||||
description: Detects suspicious user agent string of APT40 Dropbox tool
|
||||
references:
|
||||
- Internal research from Florian Roth
|
||||
author: Thomas Patzke
|
||||
logsource:
|
||||
category: proxy
|
||||
detection:
|
||||
selection:
|
||||
UserAgent: 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.143 Safari/537.36'
|
||||
r-dns: 'api.dropbox.com'
|
||||
condition: selection
|
||||
fields:
|
||||
- c-ip
|
||||
- cs-uri
|
||||
falsepositives:
|
||||
- Old browsers
|
||||
level: high
|
||||
|
||||
@@ -22,6 +22,7 @@ detection:
|
||||
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Trident/4.0; SIMBAR={7DB0F6DE-8DE7-4841-9084-28FA914B0F2E}; SLCC1; .N'
|
||||
- 'Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)' # only use in proxy logs - not for detection in web server logs
|
||||
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/525.13 (KHTML, like Gecko) Chrome/4.0.221.6 Safari/525.13'
|
||||
- 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MAAU)' # Payloads
|
||||
|
||||
# Metasploit Update by Florian Roth 08.07.2017
|
||||
- 'Mozilla/5.0'
|
||||
|
||||
@@ -0,0 +1,20 @@
|
||||
title: Source Code Enumeration Detection by Keyword
|
||||
description: Detects source code enumeration that use GET requests by keyword searches in URL strings
|
||||
author: James Ahearn
|
||||
references:
|
||||
- 'https://pentester.land/tutorials/2018/10/25/source-code-disclosure-via-exposed-git-folder.html'
|
||||
- 'https://medium.com/@logicbomb_1/bugbounty-how-i-was-able-to-download-the-source-code-of-indias-largest-telecom-service-52cf5c5640a1'
|
||||
logsource:
|
||||
category: webserver
|
||||
detection:
|
||||
keywords:
|
||||
- '*.git/*'
|
||||
condition: keywords
|
||||
fields:
|
||||
- client_ip
|
||||
- vhost
|
||||
- url
|
||||
- response
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: medium
|
||||
@@ -0,0 +1,23 @@
|
||||
title: Persistence and Execution at scale via GPO scheduled task
|
||||
description: Detect lateral movement using GPO scheduled task, ususally used to deploy ransomware at scale
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://twitter.com/menasec1/status/1106899890377052160
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.lateral_movement
|
||||
- attack.t1053
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5145
|
||||
ShareName: \\*\SYSVOL
|
||||
RelativeTargetName: '*ScheduledTasks.xml'
|
||||
Accesses: '*WriteData*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- if the source IP is not localhost then it's super suspicious, better to monitor both local and remote changes to GPO scheduledtasks
|
||||
level: high
|
||||
@@ -0,0 +1,25 @@
|
||||
title: Powerview Add-DomainObjectAcl DCSync AD Extend Right
|
||||
description: backdooring domain object to grant the rights associated with DCSync to a regular user or machine account using Powerview\Add-DomainObjectAcl DCSync Extended Right cmdlet, will allow to re-obtain the pwd hashes of any user/computer
|
||||
status: experimental
|
||||
date: 2019/04/03
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://twitter.com/menasec1/status/1111556090137903104
|
||||
- https://www.specterops.io/assets/resources/an_ace_up_the_sleeve.pdf
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.persistence
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5136
|
||||
LDAPDisplayName: 'ntSecurityDescriptor'
|
||||
Value:
|
||||
- '*1131f6ad-9c07-11d1-f79f-00c04fc2dcd2*'
|
||||
- '*1131f6aa-9c07-11d1-f79f-00c04fc2dcd2*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- New Domain Controller computer account, check user SIDs witin the value attribute of event 5136 and verify if it's a regular user or DC computer account.
|
||||
level: critical
|
||||
@@ -0,0 +1,34 @@
|
||||
title: AD Privileged Users or Groups Reconnaissance
|
||||
description: Detect priv users or groups recon based on 4661 eventid and known privileged users or groups SIDs
|
||||
references:
|
||||
- https://blog.menasec.net/2019/02/threat-hunting-5-detecting-enumeration.html
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.t1087
|
||||
status: experimental
|
||||
author: Samir Bousseaden
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
definition: 'Requirements: enable Object Access SAM on your Domain Controllers'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4661
|
||||
ObjectType:
|
||||
- 'SAM_USER'
|
||||
- 'SAM_GROUP'
|
||||
ObjectName:
|
||||
- '*-512'
|
||||
- '*-502'
|
||||
- '*-500'
|
||||
- '*-505'
|
||||
- '*-519'
|
||||
- '*-520'
|
||||
- '*-544'
|
||||
- '*-551'
|
||||
- '*-555'
|
||||
- '*admin*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- if source account name is not an admin then its super suspicious
|
||||
level: high
|
||||
@@ -6,18 +6,20 @@ tags:
|
||||
- attack.t1003
|
||||
- attack.lateral_movement
|
||||
- attack.credential_access
|
||||
- car.2013-07-001
|
||||
- car.2019-04-004
|
||||
logsource:
|
||||
product: windows
|
||||
detection:
|
||||
keywords:
|
||||
- mimikatz
|
||||
- mimilib
|
||||
- <3 eo.oe
|
||||
- eo.oe.kiwi
|
||||
- privilege::debug
|
||||
- sekurlsa::logonpasswords
|
||||
- lsadump::sam
|
||||
- mimidrv.sys
|
||||
- "* mimikatz *"
|
||||
- "* mimilib *"
|
||||
- "* <3 eo.oe *"
|
||||
- "* eo.oe.kiwi *"
|
||||
- "* privilege::debug *"
|
||||
- "* sekurlsa::logonpasswords *"
|
||||
- "* lsadump::sam *"
|
||||
- "* mimidrv.sys *"
|
||||
condition: keywords
|
||||
falsepositives:
|
||||
- Naughty administrators
|
||||
|
||||
@@ -0,0 +1,25 @@
|
||||
title: Remote Task Creation via ATSVC named pipe
|
||||
description: Detects remote task creation via at.exe or API interacting with ATSVC namedpipe
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://blog.menasec.net/2019/03/threat-hunting-25-scheduled-tasks-for.html
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.persistence
|
||||
- attack.t1053
|
||||
- car.2013-05-004
|
||||
- car.2015-04-001
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5145
|
||||
ShareName: \\*\IPC$
|
||||
RelativeTargetName: atsvc
|
||||
Accesses: '*WriteData*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- pentesting
|
||||
level: medium
|
||||
@@ -14,7 +14,7 @@ author: '@neu5ron'
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
definition: 'Requirements: Audit Policy : Computer Management > Audit Policy Configuration, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Policy Change\Audit Audit Policy Change'
|
||||
definition: 'Requirements: Audit Policy : Computer Management > Audit Policy Configuration, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Policy Change\Audit Authorization Policy Change'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4719
|
||||
|
||||
@@ -0,0 +1,21 @@
|
||||
title: Possible Impacket SecretDump remote activity
|
||||
description: Detect AD credential dumping using impacket secretdump HKTL
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://blog.menasec.net/2019/02/threat-huting-10-impacketsecretdump.html
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5145
|
||||
ShareName: \\*\ADMIN$
|
||||
RelativeTargetName: 'SYSTEM32\*.tmp'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- pentesting
|
||||
level: high
|
||||
@@ -0,0 +1,34 @@
|
||||
title: First time seen remote named pipe
|
||||
description: This detection excludes known namped pipes accessible remotely and notify on newly observed ones, may help to detect lateral movement and remote exec using named pipes
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://twitter.com/menasec1/status/1104489274387451904
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1077
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 5145
|
||||
ShareName: \\*\IPC$
|
||||
selection2:
|
||||
EventID: 5145
|
||||
ShareName: \\*\IPC$
|
||||
RelativeTargetName:
|
||||
- 'atsvc'
|
||||
- 'samr'
|
||||
- 'lsarpc'
|
||||
- 'winreg'
|
||||
- 'netlogon'
|
||||
- 'srvsvc'
|
||||
- 'protected_storage'
|
||||
- 'wkssvc'
|
||||
- 'browser'
|
||||
- 'netdfs'
|
||||
condition: selection1 and not selection2
|
||||
falsepositives:
|
||||
- update the excluded named pipe to filter out any newly observed legit named pipe
|
||||
level: high
|
||||
@@ -5,6 +5,7 @@ tags:
|
||||
- attack.persistence
|
||||
- attack.privilege_escalation
|
||||
- attack.t1050
|
||||
- car.2013-09-005
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
|
||||
@@ -7,6 +7,7 @@ author: Ilias el Matani (rule), The Information Assurance Directorate at the NSA
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1075
|
||||
- car.2016-04-004
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
|
||||
@@ -0,0 +1,32 @@
|
||||
title: Pass the Hash Activity
|
||||
status: production
|
||||
description: 'Detects the attack technique pass the hash which is used to move laterally inside the network'
|
||||
references:
|
||||
- https://github.com/iadgov/Event-Forwarding-Guidance/tree/master/Events
|
||||
- https://blog.binarydefense.com/reliably-detecting-pass-the-hash-through-event-log-analysis
|
||||
- https://blog.stealthbits.com/how-to-detect-pass-the-hash-attacks/
|
||||
author: Dave Kennedy, Jeff Warren (method) / David Vassallo (rule)
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1075
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
definition: The successful use of PtH for lateral movement between workstations would trigger event ID 4624
|
||||
detection:
|
||||
selection:
|
||||
- EventID: 4624
|
||||
SecurityID: 'NULL SID'
|
||||
LogonType: '3'
|
||||
LogonProcessName: 'NtLmSsp'
|
||||
KeyLength: '0'
|
||||
- EventID: 4624
|
||||
LogonType: '9'
|
||||
LogonProcessName: 'seclogo'
|
||||
filter:
|
||||
AccountName: 'ANONYMOUS LOGON'
|
||||
condition: selection and not filter
|
||||
falsepositives:
|
||||
- Administrator activity
|
||||
- Penetration tests
|
||||
level: medium
|
||||
@@ -7,6 +7,7 @@ tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.persistence
|
||||
- attack.t1053
|
||||
- car.2013-08-001
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
|
||||
@@ -6,6 +6,7 @@ tags:
|
||||
- attack.persistence
|
||||
- attack.privilege_escalation
|
||||
- attack.t1050
|
||||
- car.2013-09-005
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
|
||||
@@ -0,0 +1,22 @@
|
||||
title: Scanner PoC for CVE-2019-0708 RDP RCE vuln
|
||||
description: Detects the use of a scanner by zerosum0x0 that discovers targets vulnerable to CVE-2019-0708 RDP RCE aka BlueKeep
|
||||
references:
|
||||
- https://twitter.com/AdamTheAnalyst/status/1134394070045003776
|
||||
- https://github.com/zerosum0x0/CVE-2019-0708
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1210
|
||||
- car.2013-07-002
|
||||
author: Florian Roth (rule), Adam Bradbury (idea)
|
||||
date: 2019/06/02
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4625
|
||||
AccountName: AAAAAAA
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
level: critical
|
||||
@@ -7,6 +7,7 @@ modified: 2019/01/29
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1076
|
||||
- car.2013-07-002
|
||||
status: experimental
|
||||
author: Thomas Patzke
|
||||
logsource:
|
||||
|
||||
@@ -0,0 +1,21 @@
|
||||
title: Potential RDP exploit CVE-2019-0708
|
||||
description: Detect suspicious error on protocol RDP, potential CVE-2019-0708
|
||||
references:
|
||||
- https://github.com/zerosum0x0/CVE-2019-0708
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- car.2013-07-002
|
||||
status: experimental
|
||||
author: Lionel PRAT, Christophe BROCAS
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
detection:
|
||||
selection:
|
||||
EventID: 56
|
||||
Source: TermDD
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Bad connections or network interruptions
|
||||
level: high
|
||||
|
||||
@@ -9,6 +9,7 @@ tags:
|
||||
- attack.defense_evasion
|
||||
- attack.command_and_control
|
||||
- attack.t1076
|
||||
- car.2013-07-002
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
|
||||
@@ -6,19 +6,21 @@ references:
|
||||
- https://technet.microsoft.com/en-us/library/cc726884(v=ws.10).aspx
|
||||
- https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx
|
||||
date: 2017/05/15
|
||||
modified: 2019/07/17
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
author: Dimitrios Slamaris
|
||||
author: "Dimitrios Slamaris, @atc_project (fix)"
|
||||
logsource:
|
||||
product: windows
|
||||
service: dhcp
|
||||
service: system
|
||||
detection:
|
||||
selection:
|
||||
EventID:
|
||||
- 1031
|
||||
- 1032
|
||||
- 1034
|
||||
Source: Microsoft-Windows-DHCP-Server
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
@@ -7,12 +7,14 @@ author: Florian Roth
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1070
|
||||
- car.2016-04-002
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
detection:
|
||||
selection:
|
||||
EventID: 104
|
||||
Source: Microsoft-Windows-Eventlog
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
@@ -12,7 +12,7 @@ tags:
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
definition: The volume of Event ID 4661 is high on Domain Controllers and therefore "Audit SAM" and "Audit Kernel Object" advanced audit policy settings are not configured in the recommandations for server systems
|
||||
definition: The volume of Event ID 4661 is high on Domain Controllers and therefore "Audit SAM" and "Audit Kernel Object" advanced audit policy settings are not configured in the recommendations for server systems
|
||||
detection:
|
||||
selection:
|
||||
- EventID: 4661
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Suspicious PsExec execution
|
||||
description: detects execution of psexec or paexec with renamed service name, this rule helps to filter out the noise if psexec is used for legit purposes or if attacker uses a different psexec client other than sysinternal one
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://blog.menasec.net/2019/02/threat-hunting-3-detecting-psexec.html
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1077
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 5145
|
||||
ShareName: \\*\IPC$
|
||||
RelativeTargetName:
|
||||
- '*-stdin'
|
||||
- '*-stdout'
|
||||
- '*-stderr'
|
||||
selection2:
|
||||
EventID: 5145
|
||||
ShareName: \\*\IPC$
|
||||
RelativeTargetName: 'PSEXESVC*'
|
||||
condition: selection1 and not selection2
|
||||
falsepositives:
|
||||
- nothing observed so far
|
||||
level: high
|
||||
@@ -0,0 +1,30 @@
|
||||
title: Suspicious access to sensitive file extensions
|
||||
description: Detects known sensitive file extensions
|
||||
author: Samir Bousseaden
|
||||
tags:
|
||||
- attack.collection
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
selection:
|
||||
EventID:
|
||||
- 5145
|
||||
RelativeTargetName:
|
||||
- '*.pst'
|
||||
- '*.ost'
|
||||
- '*.msg'
|
||||
- '*.nst'
|
||||
- '*.oab'
|
||||
- '*.edb'
|
||||
- '*.nsf'
|
||||
- '*.bak'
|
||||
- '*.dmp'
|
||||
- '*.kirbi'
|
||||
- '*\ntds.dit'
|
||||
- '*\groups.xml'
|
||||
- '*.rdp'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Help Desk operator doing backup or re-imaging end user machine or pentest or backup software
|
||||
level: high
|
||||
@@ -3,6 +3,7 @@ description: Some threat groups tend to delete the local 'Security' Eventlog usi
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1070
|
||||
- car.2016-04-002
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
product: windows
|
||||
|
||||
@@ -0,0 +1,22 @@
|
||||
title: Remote Service Activity Detected via SVCCTL named pipe
|
||||
description: Detects remote remote service activity via remote access to the svcctl named pipe
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://blog.menasec.net/2019/03/threat-hunting-26-remote-windows.html
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.persistence
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5145
|
||||
ShareName: \\*\IPC$
|
||||
RelativeTargetName: svcctl
|
||||
Accesses: '*WriteData*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- pentesting
|
||||
level: medium
|
||||
@@ -0,0 +1,26 @@
|
||||
title: Detects local user creation
|
||||
description: Detects local user creation on windows servers, which shouldn't happen in an Active Directory environment. Apply this Sigma Use Case on your windows server logs and not on your DC logs.
|
||||
status: experimental
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1136
|
||||
references:
|
||||
- https://patrick-bareiss.com/detecting-local-user-creation-in-ad-with-sigma/
|
||||
author: Patrick Bareiss
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4720
|
||||
condition: selection
|
||||
fields:
|
||||
- EventCode
|
||||
- AccountName
|
||||
- AccountDomain
|
||||
falsepositives:
|
||||
- Domain Controller Logs
|
||||
- Local accounts managed by privileged account management tools
|
||||
level: low
|
||||
|
||||
|
||||
@@ -15,7 +15,7 @@ logsource:
|
||||
detection:
|
||||
selection:
|
||||
EventID: 13
|
||||
TargetObject: 'HKU\Software\AppDataLow\Software\Microsoft\\*'
|
||||
TargetObject: '*\Software\AppDataLow\Software\Microsoft\\*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
@@ -11,7 +11,7 @@ author: Sean Metcalf (source), Florian Roth (rule)
|
||||
logsource:
|
||||
product: windows
|
||||
service: powershell
|
||||
definition: 'It is recommanded to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
|
||||
definition: 'It is recommended to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
|
||||
detection:
|
||||
keywords:
|
||||
- Invoke-DllInjection
|
||||
|
||||
@@ -11,7 +11,7 @@ author: Sean Metcalf (source), Florian Roth (rule)
|
||||
logsource:
|
||||
product: windows
|
||||
service: powershell
|
||||
definition: 'It is recommanded to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
|
||||
definition: 'It is recommended to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
|
||||
detection:
|
||||
keywords:
|
||||
- AdjustTokenPrivileges
|
||||
|
||||
@@ -10,7 +10,7 @@ author: Sean Metcalf (source), Florian Roth (rule)
|
||||
logsource:
|
||||
product: windows
|
||||
service: powershell
|
||||
definition: 'It is recommanded to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
|
||||
definition: 'It is recommended to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4103
|
||||
|
||||
@@ -11,7 +11,7 @@ tags:
|
||||
logsource:
|
||||
product: windows
|
||||
service: powershell
|
||||
definition: 'It is recommanded to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
|
||||
definition: 'It is recommended to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
|
||||
detection:
|
||||
keywords:
|
||||
- System.Reflection.Assembly.Load
|
||||
|
||||
@@ -8,6 +8,7 @@ tags:
|
||||
- attack.t1088
|
||||
- attack.t1191
|
||||
- attack.g0069
|
||||
- car.2019-04-001
|
||||
author: Nik Seetharaman
|
||||
references:
|
||||
- http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/
|
||||
|
||||
@@ -0,0 +1,26 @@
|
||||
title: Disable of ETW Trace
|
||||
description: Detects a command that clears or disables any ETW trace log which could indicate a logging evasion.
|
||||
references:
|
||||
- https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wevtutil
|
||||
- https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_mal_lockergoga.yml
|
||||
- https://abuse.io/lockergoga.txt
|
||||
author: '@neu5ron, Florian Roth'
|
||||
date: 2019/03/22
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1070
|
||||
- car.2016-04-002
|
||||
level: high
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection_clear_1:
|
||||
CommandLine: '* cl */Trace*'
|
||||
selection_clear_2:
|
||||
CommandLine: '* clear-log */Trace*'
|
||||
selection_disable_1:
|
||||
CommandLine: '* sl* /e:false*'
|
||||
selection_disable_2:
|
||||
CommandLine: '* set-log* /e:false*'
|
||||
condition: selection_clear_1 or selection_clear_2 or selection_disable_1 or selection_disable_2
|
||||
+25
@@ -0,0 +1,25 @@
|
||||
title: Windows Kernel and 3rd-party drivers exploits. Token stealing
|
||||
description: Detection of child processes spawned with SYSTEM privileges by parents with non-SYSTEM privileges and Medium integrity level
|
||||
references:
|
||||
- https://www.slideshare.net/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.t1068
|
||||
status: experimental
|
||||
author: Teymur Kheirkhabarov (source), Daniil Yugoslavskiy (rule)
|
||||
date: 2019/06/03
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
ParentIntegrityLevel: Medium
|
||||
IntegrityLevel: System
|
||||
User: "NT AUTHORITY\\SYSTEM"
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: critical
|
||||
enrichment:
|
||||
- EN_0001_cache_sysmon_event_id_1_info # http://bit.ly/314zc6x
|
||||
- EN_0002_enrich_sysmon_event_id_1_with_parent_info # http://bit.ly/2KmSC0l
|
||||
@@ -20,7 +20,7 @@ logsource:
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
ProcessCommandLine:
|
||||
CommandLine:
|
||||
- '*\AppData\Roaming\Oracle*\java*.exe *'
|
||||
- '*cscript.exe *Retrive*.vbs *'
|
||||
---
|
||||
|
||||
@@ -0,0 +1,18 @@
|
||||
title: LockerGoga Ransomware
|
||||
description: Detects a command that clears the WMI trace log which indicates LockaerGoga ransomware activity
|
||||
references:
|
||||
- https://abuse.io/lockergoga.txt
|
||||
author: Florian Roth
|
||||
date: 2019/03/22
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1064
|
||||
level: high
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine: '* cl Microsoft-Windows-WMI-Activity/Trace'
|
||||
condition: selection
|
||||
|
||||
@@ -1,33 +0,0 @@
|
||||
title: WannaCry Ransomware
|
||||
description: Detects WannaCry Ransomware Activity
|
||||
status: experimental
|
||||
references:
|
||||
- https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection1:
|
||||
CommandLine:
|
||||
- '*vssadmin delete shadows*'
|
||||
- '*icacls * /grant Everyone:F /T /C /Q*'
|
||||
- '*bcdedit /set {default} recoveryenabled no*'
|
||||
- '*wbadmin delete catalog -quiet*'
|
||||
selection2:
|
||||
Image:
|
||||
- '*\tasksche.exe'
|
||||
- '*\mssecsvc.exe'
|
||||
- '*\taskdl.exe'
|
||||
- '*\WanaDecryptor*'
|
||||
- '*\taskhsvc.exe'
|
||||
- '*\taskse.exe'
|
||||
- '*\111.exe'
|
||||
- '*\lhdfrgui.exe'
|
||||
- '*\diskpart.exe'
|
||||
- '*\linuxnew.exe'
|
||||
- '*\wannacry.exe'
|
||||
condition: 1 of them
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: critical
|
||||
@@ -13,6 +13,7 @@ tags:
|
||||
- attack.t1085
|
||||
- attack.t1070
|
||||
- attack.t1003
|
||||
- car.2016-04-002
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
title: WannaCry Ransomware via Sysmon
|
||||
title: WannaCry Ransomware
|
||||
status: experimental
|
||||
description: Detects WannaCry ransomware activity via Sysmon
|
||||
description: Detects WannaCry ransomware activity
|
||||
references:
|
||||
- https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100
|
||||
author: Florian Roth (rule), Tom U. @c_APT_ure (collection)
|
||||
@@ -14,6 +14,7 @@ detection:
|
||||
- '*\mssecsvc.exe'
|
||||
- '*\taskdl.exe'
|
||||
- '*\@WanaDecryptor@*'
|
||||
- '*\WanaDecryptor*'
|
||||
- '*\taskhsvc.exe'
|
||||
- '*\taskse.exe'
|
||||
- '*\111.exe'
|
||||
@@ -23,7 +24,6 @@ detection:
|
||||
- '*\wannacry.exe'
|
||||
selection2:
|
||||
CommandLine:
|
||||
- '*vssadmin delete shadows*'
|
||||
- '*icacls * /grant Everyone:F /T /C /Q*'
|
||||
- '*bcdedit /set {default} recoveryenabled no*'
|
||||
- '*wbadmin delete catalog -quiet*'
|
||||
|
||||
@@ -20,11 +20,7 @@ detection:
|
||||
- '*\reg.exe'
|
||||
- '*\regsvr32.exe'
|
||||
- '*\BITSADMIN*'
|
||||
filter:
|
||||
CommandLine:
|
||||
- '*/HP/HP*'
|
||||
- '*\HP\HP*'
|
||||
condition: selection and not filter
|
||||
condition: selection
|
||||
fields:
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
@@ -32,6 +28,10 @@ tags:
|
||||
- attack.defense_evasion
|
||||
- attack.execution
|
||||
- attack.t1170
|
||||
- car.2013-02-003
|
||||
- car.2013-03-001
|
||||
- car.2014-04-003
|
||||
falsepositives:
|
||||
- Printer software / driver installations
|
||||
- HP software
|
||||
level: high
|
||||
|
||||
@@ -0,0 +1,23 @@
|
||||
title: Netsh
|
||||
description: Allow Incoming Connections by Port or Application on Windows Firewall
|
||||
references:
|
||||
- https://attack.mitre.org/software/S0246/ (Lazarus HARDRAIN)
|
||||
- https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf
|
||||
date: 2019/01/29
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.command_and_control
|
||||
- attack.t1090
|
||||
status: experimental
|
||||
author: Markus Neis
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine:
|
||||
- '*netsh firewall add*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Legitimate administration
|
||||
level: medium
|
||||
@@ -6,6 +6,7 @@ date: 2019/01/29
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1021
|
||||
- car.2013-07-002
|
||||
status: experimental
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
|
||||
@@ -9,6 +9,8 @@ tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1059
|
||||
- attack.t1202
|
||||
- car.2013-02-003
|
||||
- car.2014-04-003
|
||||
author: Michael Haag, Florian Roth, Markus Neis
|
||||
date: 2018/04/06
|
||||
logsource:
|
||||
@@ -42,6 +44,7 @@ detection:
|
||||
- '*\scriptrunner.exe'
|
||||
- '*\mftrace.exe'
|
||||
- '*\AppVLP.exe'
|
||||
- '*\svchost.exe' # https://www.vmray.com/analyses/2d2fa29185ad/report/overview.html
|
||||
condition: selection
|
||||
fields:
|
||||
- CommandLine
|
||||
|
||||
@@ -0,0 +1,36 @@
|
||||
title: MS Office Product Spawning Exe in User Dir
|
||||
status: experimental
|
||||
description: Detects an executable in the users directory started from Microsoft Word, Excel, Powerpoint, Publisher or Visio
|
||||
references:
|
||||
- sha256=23160972c6ae07f740800fa28e421a81d7c0ca5d5cab95bc082b4a986fbac57c
|
||||
- https://blog.morphisec.com/fin7-not-finished-morphisec-spots-new-campaign
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.defense_evasion
|
||||
- attack.t1059
|
||||
- attack.t1202
|
||||
- FIN7
|
||||
- car.2013-05-002
|
||||
author: Jason Lynch
|
||||
date: 2019/04/02
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
ParentImage:
|
||||
- '*\WINWORD.EXE'
|
||||
- '*\EXCEL.EXE'
|
||||
- '*\POWERPNT.exe'
|
||||
- '*\MSPUB.exe'
|
||||
- '*\VISIO.exe'
|
||||
- '*\OUTLOOK.EXE'
|
||||
Image:
|
||||
- 'C:\users\*.exe'
|
||||
condition: selection
|
||||
fields:
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: high
|
||||
@@ -6,6 +6,7 @@ references:
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1086
|
||||
- car.2014-04-003
|
||||
author: Markus Neis
|
||||
date: 2018/08/25
|
||||
logsource:
|
||||
|
||||
@@ -7,6 +7,7 @@ references:
|
||||
tags:
|
||||
- attack.t1086
|
||||
- attack.execution
|
||||
- car.2013-05-009
|
||||
author: Tom Ueltschi (@c_APT_ure)
|
||||
logsource:
|
||||
category: process_creation
|
||||
|
||||
@@ -0,0 +1,36 @@
|
||||
title: Windows Processes Suspicious Parent Directory
|
||||
status: experimental
|
||||
description: Detect suspicious parent processes of well-known Windows processes
|
||||
author: 'vburov'
|
||||
references:
|
||||
- https://securitybytes.io/blue-team-fundamentals-part-two-windows-processes-759fe15965e2
|
||||
- https://www.carbonblack.com/2014/06/10/screenshot-demo-hunt-evil-faster-than-ever-with-carbon-black/
|
||||
- https://www.13cubed.com/downloads/windows_process_genealogy_v2.pdf
|
||||
- https://attack.mitre.org/techniques/T1036/
|
||||
date: 2019/02/23
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1036
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
- '*\svchost.exe'
|
||||
- '*\taskhost.exe'
|
||||
- '*\lsm.exe'
|
||||
- '*\lsass.exe'
|
||||
- '*\services.exe'
|
||||
- '*\lsaiso.exe'
|
||||
- '*\csrss.exe'
|
||||
- '*\wininit.exe'
|
||||
- '*\winlogon.exe'
|
||||
filter:
|
||||
ParentImage:
|
||||
- '*\System32\\*'
|
||||
- '*\SysWOW64\\*'
|
||||
condition: selection and not filter
|
||||
falsepositives:
|
||||
- Some security products seem to spawn these
|
||||
level: low
|
||||
@@ -0,0 +1,22 @@
|
||||
title: Ransomware Deleting Shadow Volume Copies
|
||||
status: experimental
|
||||
description: Detects a command that deletes all local shadow volume copies as often used by Ransomware
|
||||
references:
|
||||
- https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100
|
||||
author: Florian Roth
|
||||
date: 2019/06/01
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine:
|
||||
- '*vssadmin delete shadows*'
|
||||
- '*wmic SHADOWCOPY DELETE*'
|
||||
condition: selection
|
||||
fields:
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
falsepositives:
|
||||
- Adminsitrative scripts - e.g. to prepare image for golden image creation
|
||||
level: critical
|
||||
@@ -0,0 +1,55 @@
|
||||
title: Renamed Binary
|
||||
status: experimental
|
||||
description: Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.
|
||||
author: Matthew Green - @mgreen27
|
||||
date: 2019/06/15
|
||||
references:
|
||||
- https://attack.mitre.org/techniques/T1036/
|
||||
- https://mgreen27.github.io/posts/2019/05/12/BinaryRename.html
|
||||
- https://mgreen27.github.io/posts/2019/05/29/BinaryRename2.html
|
||||
tags:
|
||||
- attack.t1036
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
OriginalFileName:
|
||||
- "cmd.exe"
|
||||
- "powershell.exe"
|
||||
- "powershell_ise.exe"
|
||||
- "psexec.exe"
|
||||
- "cscript.exe"
|
||||
- "wscript.exe"
|
||||
- "mshta.exe"
|
||||
- "regsvr32.exe"
|
||||
- "wmic.exe"
|
||||
- "certutil.exe"
|
||||
- "rundll32.exe"
|
||||
- "cmstp.exe"
|
||||
- "msiexec.exe"
|
||||
- "7z.exe"
|
||||
- "winrar.exe"
|
||||
filter:
|
||||
Image:
|
||||
- '*\cmd.exe'
|
||||
- '*\powershell.exe'
|
||||
- '*\powershell_ise.exe'
|
||||
- '*\psexec.exe'
|
||||
- '*\psexec64.exe'
|
||||
- '*\cscript.exe'
|
||||
- '*\wscript.exe'
|
||||
- '*\mshta.exe'
|
||||
- '*\regsvr32.exe'
|
||||
- '*\wmic.exe'
|
||||
- '*\certutil.exe'
|
||||
- '*\rundll32.exe'
|
||||
- '*\cmstp.exe'
|
||||
- '*\msiexec.exe'
|
||||
- '*\7z.exe'
|
||||
- '*\winrar.exe'
|
||||
condition: selection and not filter
|
||||
falsepositives:
|
||||
- Custom applications use renamed binaries adding slight change to binary name. Typically this is easy to spot and add to whitelist
|
||||
level: medium
|
||||
@@ -0,0 +1,32 @@
|
||||
title: Execution of Renamed PaExec
|
||||
status: experimental
|
||||
description: Detects execution of renamed paexec via imphash and executable product string
|
||||
references:
|
||||
- sha256=01a461ad68d11b5b5096f45eb54df9ba62c5af413fa9eb544eacb598373a26bc
|
||||
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2018/presentations/cds18-technical-s05-att&cking-fin7.pdf
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1036
|
||||
- FIN7
|
||||
- car.2013-05-009
|
||||
date: 2019/04/17
|
||||
author: Jason Lynch
|
||||
falsepositives:
|
||||
- Unknown imphashes
|
||||
level: medium
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection1:
|
||||
Product:
|
||||
- '*PAExec*'
|
||||
selection2:
|
||||
Imphash:
|
||||
- 11D40A7B7876288F919AB819CC2D9802
|
||||
- 6444f8a34e99b8f7d9647de66aabe516
|
||||
- dfd6aa3f7b2b1035b76b718f1ddc689f
|
||||
- 1a6cca4d5460b1710a12dea39e4a592c
|
||||
filter1:
|
||||
Image: '*paexec*'
|
||||
condition: (selection1 and selection2) and not filter1
|
||||
@@ -15,7 +15,7 @@ logsource:
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
NewProcessName: '*\fsutil.exe'
|
||||
NewProcessName: '*\bcdedit.exe'
|
||||
ProcessCommandLine:
|
||||
- '*delete*'
|
||||
- '*deletevalue*'
|
||||
|
||||
@@ -12,6 +12,7 @@ tags:
|
||||
- attack.discovery
|
||||
- attack.t1087
|
||||
- attack.t1082
|
||||
- car.2016-03-001
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
@@ -9,6 +9,7 @@ tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
- attack.t1085
|
||||
- car.2013-10-002
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
@@ -0,0 +1,31 @@
|
||||
title: Suspicious Double Extension
|
||||
description: Detects suspicious use of an .exe extension after a non-executable file extension like .pdf.exe, a set of spaces or underlines to cloak the executable file in spear phishing campaigns
|
||||
references:
|
||||
- https://blu3-team.blogspot.com/2019/06/misleading-extensions-xlsexe-docexe.html
|
||||
- https://twitter.com/blackorbird/status/1140519090961825792
|
||||
author: Florian Roth (rule), @blu3_team (idea)
|
||||
date: 2019/06/26
|
||||
tags:
|
||||
- attack.initial_access
|
||||
- attack.t1193
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
- '*.doc.exe'
|
||||
- '*.docx.exe'
|
||||
- '*.xls.exe'
|
||||
- '*.xlsx.exe'
|
||||
- '*.ppt.exe'
|
||||
- '*.pptx.exe'
|
||||
- '*.rtf.exe'
|
||||
- '*.pdf.exe'
|
||||
- '*.txt.exe'
|
||||
- '* .exe'
|
||||
- '*______.exe'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: critical
|
||||
@@ -15,7 +15,11 @@ detection:
|
||||
selection:
|
||||
Image: '*\GUP.exe'
|
||||
filter:
|
||||
Image: '*\updater\*'
|
||||
Image:
|
||||
- 'C:\Users\*\AppData\Local\Notepad++\updater\gup.exe'
|
||||
- 'C:\Users\*\AppData\Roaming\Notepad++\updater\gup.exe'
|
||||
- 'C:\Program Files\Notepad++\updater\gup.exe'
|
||||
- 'C:\Program Files (x86)\Notepad++\updater\gup.exe'
|
||||
condition: selection and not filter
|
||||
falsepositives:
|
||||
- Execution of tools named GUP.exe and located in folders different than Notepad++\updater
|
||||
|
||||
@@ -6,6 +6,7 @@ references:
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1175
|
||||
- car.2013-02-003
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
@@ -24,6 +24,7 @@ detection:
|
||||
- '* share'
|
||||
- '* accounts*'
|
||||
- '* use*'
|
||||
- '* stop *'
|
||||
condition: selection
|
||||
fields:
|
||||
- CommandLine
|
||||
|
||||
@@ -0,0 +1,22 @@
|
||||
title: Empire PowerShell Launch Parameters
|
||||
description: Detects suspicious powershell command line parameters used in Empire
|
||||
status: experimental
|
||||
references:
|
||||
- https://github.com/EmpireProject/Empire/blob/c2ba61ca8d2031dad0cfc1d5770ba723e8b710db/lib/common/helpers.py#L165
|
||||
- https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/lib/modules/powershell/persistence/powerbreach/deaduser.py#L191
|
||||
- https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/lib/modules/powershell/persistence/powerbreach/resolver.py#L178
|
||||
author: Florian Roth
|
||||
date: 2019/04/20
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1086
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine:
|
||||
- '* -NoP -sta -NonI -W Hidden -Enc *'
|
||||
- '* -noP -sta -w 1 -enc *'
|
||||
condition: selection
|
||||
level: critical
|
||||
@@ -5,6 +5,7 @@ references:
|
||||
- https://app.any.run/tasks/6217d77d-3189-4db2-a957-8ab239f3e01e
|
||||
author: Florian Roth, Markus Neis
|
||||
date: 2018/09/03
|
||||
modified: 2019/04/20
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1086
|
||||
@@ -18,12 +19,15 @@ detection:
|
||||
- '* -enc JAB*'
|
||||
- '* -encodedcommand JAB*'
|
||||
- '* BA^J e-'
|
||||
- '* -e SUVYI*'
|
||||
- '* -e aWV4I*'
|
||||
- '* -e SQBFAFgA*'
|
||||
- '* -e aQBlAHgA*'
|
||||
- '* -enc SUVYI*'
|
||||
- '* -enc aWV4I*'
|
||||
- '* -enc SQBFAFgA*'
|
||||
- '* -enc aQBlAHgA*'
|
||||
falsepositive1:
|
||||
Image: '*\GRR\\*'
|
||||
falsepositive2:
|
||||
CommandLine: '* -ExecutionPolicy remotesigned *'
|
||||
condition: selection and not 1 of falsepositive*
|
||||
falsepositives:
|
||||
- GRR powershell hacks
|
||||
- PowerSponse Deployments
|
||||
condition: selection and not falsepositive1
|
||||
level: high
|
||||
|
||||
@@ -11,6 +11,7 @@ tags:
|
||||
- attack.t1036
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
- car.2013-05-009
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
@@ -16,6 +16,8 @@ references:
|
||||
- http://security-research.dyndns.org/pub/slides/FIRST-TC-2018/FIRST-TC-2018_Tom-Ueltschi_Sysmon_PUBLIC.pdf
|
||||
author: Florian Roth
|
||||
modified: 2018/12/11
|
||||
tags:
|
||||
- car.2013-07-001
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
@@ -8,6 +8,8 @@ tags:
|
||||
- attack.t1117
|
||||
- attack.defense_evasion
|
||||
- attack.execution
|
||||
- car.2019-04-002
|
||||
- car.2019-04-003
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
@@ -13,11 +13,18 @@ logsource:
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine:
|
||||
Image:
|
||||
- '*:\RECYCLER\\*'
|
||||
- '*:\SystemVolumeInformation\\*'
|
||||
- '%windir%\Tasks\\*'
|
||||
- '%systemroot%\debug\\*'
|
||||
- 'C:\\Windows\\Tasks\\*'
|
||||
- 'C:\\Windows\\debug\\*'
|
||||
- 'C:\\Windows\\fonts\\*'
|
||||
- 'C:\\Windows\\help\\*'
|
||||
- 'C:\\Windows\\drivers\\*'
|
||||
- 'C:\\Windows\\addins\\*'
|
||||
- 'C:\\Windows\\cursors\\*'
|
||||
- 'C:\\Windows\\system32\tasks\\*'
|
||||
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- False positives depend on scripts and administrative tools used in the monitored environment
|
||||
|
||||
@@ -21,6 +21,7 @@ tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.t1053
|
||||
- attack.s0111
|
||||
- car.2013-08-001
|
||||
falsepositives:
|
||||
- Administrative activity
|
||||
- Software installation
|
||||
|
||||
@@ -0,0 +1,55 @@
|
||||
title: Squirrel Lolbin
|
||||
status: experimental
|
||||
description: Detects Possible Squirrel Packages Manager as Lolbin
|
||||
references:
|
||||
- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/
|
||||
tags:
|
||||
- attack.execution
|
||||
author: Karneades / Markus Neis
|
||||
falsepositives:
|
||||
- 1Clipboard
|
||||
- Beaker Browser
|
||||
- Caret
|
||||
- Collectie
|
||||
- Discord
|
||||
- Figma
|
||||
- Flow
|
||||
- Ghost
|
||||
- GitHub Desktop
|
||||
- GitKraken
|
||||
- Hyper
|
||||
- Insomnia
|
||||
- JIBO
|
||||
- Kap
|
||||
- Kitematic
|
||||
- Now Desktop
|
||||
- Postman
|
||||
- PostmanCanary
|
||||
- Rambox
|
||||
- Simplenote
|
||||
- Skype
|
||||
- Slack
|
||||
- SourceTree
|
||||
- Stride
|
||||
- Svgsus
|
||||
- WebTorrent
|
||||
- WhatsApp
|
||||
- WordPress.com
|
||||
- atom
|
||||
- gitkraken
|
||||
- slack
|
||||
- teams
|
||||
level: high
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Image:
|
||||
- '*\update.exe' # Check if folder Name matches executed binary \\(?P<first>[^\\]*)\\Update.*Start.{2}(?P<second>\1)\.exe (example: https://regex101.com/r/SGSQGz/2)
|
||||
CommandLine:
|
||||
- '*--processStart*.exe*'
|
||||
- '*–createShortcut*.exe*'
|
||||
condition: selection
|
||||
|
||||
|
||||
@@ -16,7 +16,11 @@ detection:
|
||||
ParentImage:
|
||||
- '*\services.exe'
|
||||
- '*\MsMpEng.exe'
|
||||
condition: selection and not filter
|
||||
- '*\Mrt.exe'
|
||||
- '*\rpcnet.exe'
|
||||
filter_null:
|
||||
ParentImage: null
|
||||
condition: selection and not filter and not filter_null
|
||||
fields:
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
|
||||
@@ -14,8 +14,8 @@ detection:
|
||||
ParentImage: '*\taskmgr.exe'
|
||||
filter:
|
||||
Image:
|
||||
- resmon.exe
|
||||
- mmc.exe
|
||||
- '*\resmon.exe'
|
||||
- '*\mmc.exe'
|
||||
condition: selection and not filter
|
||||
fields:
|
||||
- Image
|
||||
|
||||
@@ -8,6 +8,7 @@ tags:
|
||||
- attack.lateral_movement
|
||||
- attack.privilege_escalation
|
||||
- attack.t1076
|
||||
- car.2013-07-002
|
||||
author: Florian Roth
|
||||
date: 2018/03/17
|
||||
modified: 2018/12/11
|
||||
|
||||
@@ -0,0 +1,24 @@
|
||||
title: Suspicious Userinit Child Process
|
||||
status: experimental
|
||||
description: Detects the creation of a process from Windows task manager
|
||||
references:
|
||||
- https://twitter.com/SBousseaden/status/1139811587760562176
|
||||
author: Florian Roth (rule), Samir Bousseaden (idea)
|
||||
date: 2019/06/17
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
ParentImage: '*\userinit.exe'
|
||||
filter:
|
||||
CommandLine:
|
||||
- '*\explorer.exe*'
|
||||
- '*\\netlogon\\*'
|
||||
condition: selection and not filter
|
||||
fields:
|
||||
- CommandLine
|
||||
- ParentCommandLine
|
||||
falsepositives:
|
||||
- Administrative scripts
|
||||
level: high
|
||||
@@ -9,6 +9,7 @@ date: 2018/05/22
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.t1033
|
||||
- car.2016-03-001
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
|
||||
@@ -3,7 +3,7 @@ status: experimental
|
||||
description: Detects a Windows program executable started in a suspicious folder
|
||||
references:
|
||||
- https://twitter.com/GelosSnake/status/934900723426439170
|
||||
author: Florian Roth
|
||||
author: Florian Roth, Patrick Bareiss
|
||||
date: 2017/11/27
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
@@ -24,10 +24,17 @@ detection:
|
||||
- '*\smss.exe'
|
||||
- '*\csrss.exe'
|
||||
- '*\conhost.exe'
|
||||
- '*\wininit.exe'
|
||||
- '*\lsm.exe'
|
||||
- '*\winlogon.exe'
|
||||
- '*\explorer.exe'
|
||||
- '*\taskhost.exe'
|
||||
filter:
|
||||
Image:
|
||||
- '*\System32\\*'
|
||||
- '*\SysWow64\\*'
|
||||
- 'C:\Windows\System32\\*'
|
||||
- 'C:\Windows\SysWow64\\*'
|
||||
- 'C:\Windows\explorer.exe'
|
||||
- 'C:\Windows\winsxs\*'
|
||||
condition: selection and not filter
|
||||
falsepositives:
|
||||
- Exotic software
|
||||
|
||||
@@ -0,0 +1,22 @@
|
||||
title: Terminal Service Process Spawn
|
||||
status: experimental
|
||||
description: Detects a process spawned by the terminal service server process (this could be an indicator for an exploitation of CVE-2019-0708)
|
||||
references:
|
||||
- https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/rdp-stands-for-really-do-patch-understanding-the-wormable-rdp-vulnerability-cve-2019-0708/
|
||||
author: Florian Roth
|
||||
date: 2019/05/22
|
||||
tags:
|
||||
- car.2013-07-002
|
||||
logsource:
|
||||
product: windows
|
||||
category: process_creation
|
||||
detection:
|
||||
selection:
|
||||
ParentCommandLine: '*\svchost.exe*termsvcs'
|
||||
filter:
|
||||
Image: '*\rdpclip.exe'
|
||||
condition: selection and not filter
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
|
||||
@@ -0,0 +1,26 @@
|
||||
title: WMI Spawning Windows PowerShell
|
||||
status: experimental
|
||||
description: Detects WMI spawning PowerShell
|
||||
references:
|
||||
- https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_shell_spawn_susp_program.yml
|
||||
- https://any.run/report/68bc255f9b0db6a0d30a8f2dadfbee3256acfe12497bf93943bc1eab0735e45e/a2385d6f-34f7-403c-90d3-b1f9d2a90a5e
|
||||
author: Markus Neis / @Karneades
|
||||
date: 2019/04/03
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.defense_evasion
|
||||
- attack.t1064
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
ParentImage:
|
||||
- '*\wmiprvse.exe'
|
||||
Image:
|
||||
- '*\powershell.exe'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- AppvClient
|
||||
- CCM
|
||||
level: high
|
||||
@@ -8,6 +8,7 @@ tags:
|
||||
- attack.execution
|
||||
- attack.t1191
|
||||
- attack.g0069
|
||||
- car.2019-04-001
|
||||
author: Nik Seetharaman
|
||||
references:
|
||||
- http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/
|
||||
|
||||
@@ -0,0 +1,25 @@
|
||||
title: LSASS Memory Dump
|
||||
status: experimental
|
||||
description: Detects process LSASS memory dump using procdump or taskmgr based on the CallTrace pointing to dbghelp.dll or dbgcore.dll for win10
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://blog.menasec.net/2019/02/threat-hunting-21-procdump-or-taskmgr.html
|
||||
tags:
|
||||
- attack.t1003
|
||||
- attack.s0002
|
||||
- attack.credential_access
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 10
|
||||
TargetImage: 'C:\windows\system32\lsass.exe'
|
||||
GrantedAccess: '0x1fffff'
|
||||
CallTrace:
|
||||
- '*dbghelp.dll*'
|
||||
- '*dbgcore.dll*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: high
|
||||
@@ -1,12 +1,14 @@
|
||||
title: Mimikatz Detection LSASS Access
|
||||
status: experimental
|
||||
description: Detects process access to LSASS which is typical for Mimikatz (0x1000 PROCESS_QUERY_ LIMITED_INFORMATION, 0x0400 PROCESS_QUERY_ INFORMATION, 0x0010 PROCESS_VM_READ)
|
||||
description: Detects process access to LSASS which is typical for Mimikatz (0x1000 PROCESS_QUERY_ LIMITED_INFORMATION, 0x0400 PROCESS_QUERY_ INFORMATION "only old versions", 0x0010 PROCESS_VM_READ)
|
||||
references:
|
||||
- https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow
|
||||
- https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html
|
||||
tags:
|
||||
- attack.t1003
|
||||
- attack.s0002
|
||||
- attack.credential_access
|
||||
- car.2019-04-004
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
@@ -14,7 +16,9 @@ detection:
|
||||
selection:
|
||||
EventID: 10
|
||||
TargetImage: 'C:\windows\system32\lsass.exe'
|
||||
GrantedAccess: '0x1410'
|
||||
GrantedAccess:
|
||||
- '0x1410'
|
||||
- '0x1010'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
|
||||
@@ -8,6 +8,7 @@ tags:
|
||||
- attack.t1003
|
||||
- attack.lateral_movement
|
||||
- attack.credential_access
|
||||
- car.2019-04-004
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
|
||||
@@ -27,6 +27,7 @@ tags:
|
||||
- attack.s0111
|
||||
- attack.g0022
|
||||
- attack.g0060
|
||||
- car.2013-08-001
|
||||
falsepositives:
|
||||
- False positives are possible, depends on organisation and processes
|
||||
level: high
|
||||
|
||||
@@ -9,6 +9,7 @@ tags:
|
||||
- attack.defense_evasion
|
||||
- attack.command_and_control
|
||||
- attack.t1076
|
||||
- car.2013-07-002
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
|
||||
@@ -0,0 +1,22 @@
|
||||
title: RDP Sensitive Settings Changed
|
||||
description: Detects changes to RDP terminal service sensitive settings
|
||||
references:
|
||||
- https://blog.menasec.net/2019/02/threat-hunting-rdp-hijacking-via.html
|
||||
date: 2019/04/03
|
||||
author: Samir Bousseaden
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection_reg:
|
||||
EventID: 13
|
||||
TargetObject:
|
||||
- '*\services\TermService\Parameters\ServiceDll*'
|
||||
- '*\Control\Terminal Server\fSingleSessionPerUser*'
|
||||
- '*\Control\Terminal Server\fDenyTSConnections*'
|
||||
condition: selection_reg
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: high
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user