Compare commits
876 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 1986bcb843 | |||
| fa0aaa7d2b | |||
| 67707b6c82 | |||
| 8023011bb1 | |||
| 89c1d7b63d | |||
| 748ac2e206 | |||
| 2cf402aa1f | |||
| 60bc5253cf | |||
| 04d91573f3 | |||
| 2ecc55c13f | |||
| f3edc39535 | |||
| 6bf010fb4b | |||
| 4168c0ec64 | |||
| 36ba9f78da | |||
| 7c1e856095 | |||
| 323a7313fd | |||
| 84690280c5 | |||
| 241d814221 | |||
| f65f693a88 | |||
| 7b63c92fc0 | |||
| 253417a367 | |||
| 75ec169d5c | |||
| b60cfbe244 | |||
| 346022cfe8 | |||
| 4a775650a2 | |||
| e675cdf9c4 | |||
| 544dfe3704 | |||
| c937fe3c1b | |||
| 74ca0eeb88 | |||
| 2d0c08cc8b | |||
| 7d10491bf2 | |||
| 5867b5da74 | |||
| 194afa739f | |||
| af0bd1b082 | |||
| 97541ac267 | |||
| 7e163d71eb | |||
| 4e63e925cf | |||
| 11ed7e7ef8 | |||
| e271484eef | |||
| 3d20e0bc98 | |||
| 71ff6bd943 | |||
| 36aeb19721 | |||
| f86342012a | |||
| 9e2345c491 | |||
| a6d2a5d79b | |||
| 9f1bbb0a0d | |||
| 694fa567b6 | |||
| 1c36bfde79 | |||
| d5f49c5777 | |||
| 508d1cdae0 | |||
| 13522b97a7 | |||
| 275896dbe6 | |||
| 5dfe39c05b | |||
| 1ca57719b0 | |||
| 1c2bc87946 | |||
| 6585c83077 | |||
| 526468bec3 | |||
| f4d8dcaa1e | |||
| 25c0330dca | |||
| 995c03eef9 | |||
| a361664ed2 | |||
| 56f64ca47d | |||
| c50119b913 | |||
| 46c789105b | |||
| 595f22552d | |||
| 27199fc231 | |||
| 15a4c7e477 | |||
| 666e859d14 | |||
| 14b10c232e | |||
| f51e918a2e | |||
| 31946426a5 | |||
| f01fbd6b79 | |||
| e60fe1f46d | |||
| 3dd76a9c5e | |||
| 792095734d | |||
| 378ba5b38f | |||
| 8e6295e402 | |||
| 1e2ef92104 | |||
| 121e21960e | |||
| 9b67705799 | |||
| 763939a8ca | |||
| eb022f3908 | |||
| cfb4f32651 | |||
| 16bf5eef0f | |||
| 17ae9ea91c | |||
| 8cf505fcb3 | |||
| 79f7edb6b4 | |||
| 6918784e87 | |||
| c90d3e811e | |||
| e9af99c147 | |||
| 4559aa4e00 | |||
| d0bd8a2a41 | |||
| 87abd20c0f | |||
| 34c426a95b | |||
| f0b0f54500 | |||
| 765fe9dcd9 | |||
| d0950bd077 | |||
| b47900fbee | |||
| 38d548868d | |||
| dd9648b31e | |||
| a85acdfd02 | |||
| 0713360443 | |||
| 49beb5d1a8 | |||
| bdd184a24c | |||
| 80f45349ed | |||
| aab3dbee4f | |||
| 03d8184990 | |||
| 5249279a66 | |||
| d5fa51eab9 | |||
| e32708154f | |||
| 74dd008b10 | |||
| 8a5ae01f0e | |||
| d75ea35295 | |||
| 8609fc7ece | |||
| f78413deab | |||
| 4808f49e0d | |||
| 1a4a74b64b | |||
| 76780ccce2 | |||
| 7c5f985f6f | |||
| 4298abffb7 | |||
| 615a802a8e | |||
| 0a960ed3cd | |||
| 0e8a46aaf7 | |||
| 4e16bbafa8 | |||
| 17470d1545 | |||
| daaee558a1 | |||
| 612a7642d2 | |||
| 65b81dad32 | |||
| 1d3159bef0 | |||
| d872c52a43 | |||
| 5194e8778c | |||
| 1e262f5055 | |||
| cb0a87e21e | |||
| 08ec8597a5 | |||
| 5463128ea0 | |||
| 74fce5f511 | |||
| eb8a0636c5 | |||
| 51d19b36cc | |||
| 4b43db2aac | |||
| 6351c5a350 | |||
| 038918d2c0 | |||
| 75d36165fc | |||
| 51e65be98b | |||
| cd456a1d2b | |||
| c775b7a033 | |||
| 89fb726875 | |||
| f0c8c428bb | |||
| ca4b710c01 | |||
| 97376c00de | |||
| 766b8b8d18 | |||
| 788e75ef1b | |||
| 840eb2f519 | |||
| eb690d8902 | |||
| 1915561351 | |||
| 81693d81b6 | |||
| c4b8f75940 | |||
| 41b4d800c5 | |||
| 22958c45a3 | |||
| b4ac9a432f | |||
| 353e457104 | |||
| d5818a417b | |||
| 9c5575d003 | |||
| edb98f2781 | |||
| d0d51b6601 | |||
| 2b814011cd | |||
| 13f86e9333 | |||
| b4b7d810fc | |||
| e0459cec1c | |||
| d32e5c10b8 | |||
| 7e058e611c | |||
| 9ada22b8e0 | |||
| d2e605fc5c | |||
| 865d971704 | |||
| eda5298457 | |||
| 0756b00cdf | |||
| 9c1a5a5264 | |||
| 56b68a0266 | |||
| b941f6411f | |||
| 516c8f3ea1 | |||
| 3d69727332 | |||
| 016261cacf | |||
| a85c668f6f | |||
| d62bc41bfb | |||
| 32c6b34746 | |||
| 548145ce10 | |||
| ddb2d92a98 | |||
| e3f99c323b | |||
| 6cc1770351 | |||
| b76925f838 | |||
| d067087632 | |||
| 5c5a16c4d5 | |||
| 453bd10e6e | |||
| 8e854b06f6 | |||
| 0419ff215a | |||
| d06a5431eb | |||
| c7553dc8a1 | |||
| e473efb7c3 | |||
| 3f2ce4b71f | |||
| 51c42a15a7 | |||
| 0242c40360 | |||
| 60c4fed2e0 | |||
| ffac77fb37 | |||
| 1adb040e0b | |||
| 2ad2ba9589 | |||
| 140a32d8c9 | |||
| 2dda9a7b77 | |||
| be25aa2c37 | |||
| 8512417de0 | |||
| 5c4d8bc2ca | |||
| 5e973a6321 | |||
| 0864d05aa5 | |||
| 9be6b8b1a5 | |||
| 3f7e08733a | |||
| 8d1723e65c | |||
| 5e3a25537e | |||
| 4650271117 | |||
| 33db032a16 | |||
| bb026e4692 | |||
| 0aaac1a48e | |||
| 1e29c9c1ce | |||
| 1f47dc1cdc | |||
| 96492834c5 | |||
| aca36c88cc | |||
| aac632bb41 | |||
| 5ffc027f22 | |||
| 25b680bfec | |||
| 3b193fb691 | |||
| aee0d1dd67 | |||
| 5dc229b590 | |||
| 95b47972f0 | |||
| c4003ff410 | |||
| bd38cff042 | |||
| 909c09f4ac | |||
| 5d54e9c8a1 | |||
| c22265c655 | |||
| 8dd39a2653 | |||
| 783d8c4268 | |||
| 7f4557d183 | |||
| 075df83118 | |||
| c3b079990a | |||
| 361f2ffa5f | |||
| fe9e50167f | |||
| 49532438eb | |||
| a1ba04aec8 | |||
| 082ee586bf | |||
| 6d97c6d0bb | |||
| a429f09cc1 | |||
| 3c1948f089 | |||
| c235944a0c | |||
| c97f0f097b | |||
| e9ddd933f8 | |||
| 475113b1c1 | |||
| c2a16591af | |||
| 1182ee2de2 | |||
| 5a64f572e3 | |||
| a82ea0a022 | |||
| 83c0c71bc7 | |||
| d7c25adfb6 | |||
| cb7243de5d | |||
| 8bec627ff1 | |||
| 5154460726 | |||
| 05cc7e455d | |||
| 725ab99e90 | |||
| 283bd278f4 | |||
| 971bd49071 | |||
| 534f250c35 | |||
| bb95347745 | |||
| 6232362f04 | |||
| 07807837ee | |||
| be108d95cc | |||
| 40241c1fdf | |||
| 99595a7f89 | |||
| 879017818f | |||
| 2c0cc87ab8 | |||
| cf186387af | |||
| c5796d7853 | |||
| 8179d182c4 | |||
| b2952b9f78 | |||
| c8be6e649b | |||
| 45458121c6 | |||
| ae1541242c | |||
| 17e9729ddd | |||
| 58c61430a2 | |||
| be2ca8dc4d | |||
| 33e490e4fa | |||
| 7b3d67ae66 | |||
| 9a3ceb8421 | |||
| bef5f03015 | |||
| 1a583c158d | |||
| 2188001f98 | |||
| bd4e61acd8 | |||
| f80cf52982 | |||
| 99b15edf8a | |||
| 56a1ed1eac | |||
| 7602309138 | |||
| 1aac9baaed | |||
| 7bebedbac1 | |||
| af6a1ff26a | |||
| f560e83886 | |||
| fc683ac7ee | |||
| 2345cbf7bd | |||
| 690807c846 | |||
| 6bdb4ab78a | |||
| 155e273a1c | |||
| 8ce4b1530d | |||
| c922f7d73f | |||
| 58a32f35d9 | |||
| f278a00174 | |||
| e7f5cbc22a | |||
| a60b53a7df | |||
| 8b7f0508a7 | |||
| 7d3d819ea5 | |||
| bdf0dd8e21 | |||
| a022333382 | |||
| f0c89239d3 | |||
| 1a6faf385c | |||
| 3a7160d52b | |||
| f25416bd65 | |||
| afa18245bf | |||
| c17f9d172f | |||
| 02239fa288 | |||
| 18d012cc2e | |||
| 5c63ef17d2 | |||
| bdf44be077 | |||
| 87994ca46b | |||
| d3b623e92a | |||
| 343a40ced7 | |||
| c8701ac6e9 | |||
| 8ae37f5d64 | |||
| 3a994d0d63 | |||
| 5935eaa572 | |||
| aca470961a | |||
| c474bfcae5 | |||
| 07dec06222 | |||
| 9ef314486e | |||
| eeae74e245 | |||
| ae62acf3d2 | |||
| 2e3a2b9ba6 | |||
| f0a4aede24 | |||
| 08e00945aa | |||
| 34f9d17b26 | |||
| 2e61233e31 | |||
| 97b28f4308 | |||
| cd3cdc9451 | |||
| 8d819cfeea | |||
| 004497075d | |||
| c2eda887fa | |||
| b16bb4bf9b | |||
| be26ada875 | |||
| 74e3c79f40 | |||
| a5af134bfe | |||
| 01570f88db | |||
| 6dd4b4775a | |||
| ff5081f186 | |||
| 14769938e9 | |||
| d43e67a882 | |||
| 3cd6de2864 | |||
| 01dfc23a26 | |||
| d9aceeb7eb | |||
| 5866d8eb71 | |||
| 4429d7564f | |||
| a815b7eb9b | |||
| aab703a4b4 | |||
| 05424883dd | |||
| efb223b147 | |||
| 7e732a2a89 | |||
| d2743351e7 | |||
| c8c06763b4 | |||
| d151deaa29 | |||
| 91862f284b | |||
| 423fdca32c | |||
| adb6690c80 | |||
| f0f0bdae40 | |||
| 7192f149a3 | |||
| e6217928f3 | |||
| 2f66ba25f0 | |||
| a9731d211d | |||
| 4d048c71bb | |||
| 54ec01bcdd | |||
| a0bac993ed | |||
| 04f1edd171 | |||
| 22b67a67ac | |||
| 353f66dd7c | |||
| 150499d151 | |||
| c78ac9333c | |||
| 21f34ab8ba | |||
| 35ebcff543 | |||
| 65e4ba5aba | |||
| bad80ffa78 | |||
| cc8a89b679 | |||
| 046510f021 | |||
| 5d94b9f0bc | |||
| 5092b1e603 | |||
| 32c098294f | |||
| 8f684ddd06 | |||
| 2f5eb08b41 | |||
| a276d3083d | |||
| dfd4ce878f | |||
| 5b92790e3f | |||
| abf5a5088e | |||
| 98a18fd4a2 | |||
| 7d159fb980 | |||
| 3ef930b094 | |||
| 9c44bb04a7 | |||
| 9403128aef | |||
| 6215a694a8 | |||
| 37e13c9f41 | |||
| 8a0784ad33 | |||
| 6440bc962b | |||
| 6436cb3ae1 | |||
| 27c2684a0f | |||
| a8d1e7c62b | |||
| 6c8d08942e | |||
| f61b44efa8 | |||
| 086e62a495 | |||
| a2eac623a6 | |||
| c9ec469180 | |||
| 516bfc88ff | |||
| cd2af196e3 | |||
| 96220e776f | |||
| 7e4bb1d21a | |||
| 3c7f46a6cd | |||
| 9ce7d18712 | |||
| ecffe28933 | |||
| e3d61047bb | |||
| 90e8eba530 | |||
| cc6e0baef1 | |||
| b1ea976f66 | |||
| 8c4b21f063 | |||
| f99df33b01 | |||
| 3eaf83cf5a | |||
| 96eb460944 | |||
| ba64f485ac | |||
| 4bc4c94a91 | |||
| 5645c75576 | |||
| f759e8b07c | |||
| 7622b17415 | |||
| 2fd88c837d | |||
| 4e83bfeb16 | |||
| a9cf14438c | |||
| 8336b47530 | |||
| cc4b806b94 | |||
| 5cba0b9946 | |||
| ed1ee80f2d | |||
| 7634128143 | |||
| e585858128 | |||
| 9a6b3b5389 | |||
| 604d88cf1e | |||
| 63f96d58b4 | |||
| b7eb79f8da | |||
| d4a1fe786a | |||
| aa37ef2559 | |||
| 44f18db80d | |||
| b5531be4bf | |||
| 9f56b9e99b | |||
| bf9a567afd | |||
| faeaf1dfef | |||
| 0c3b0e25a8 | |||
| 8b94860ee6 | |||
| ee417dd2ea | |||
| 925ffae9b8 | |||
| 55f8993a96 | |||
| 0a5e79b1e0 | |||
| 4e21289bdc | |||
| f318f328d6 | |||
| f7e53929fa | |||
| 73b0c3a25b | |||
| c8c419f205 | |||
| 75c7d65240 | |||
| ffd43823cf | |||
| a7fa20546a | |||
| 99f773dcf6 | |||
| 172236e130 | |||
| 188d3a83b8 | |||
| 6206692bce | |||
| 49eb03cda8 | |||
| b0cb0abc01 | |||
| b5d78835b6 | |||
| a0486edeea | |||
| 68866433e8 | |||
| 4175d0cdd5 | |||
| b520897176 | |||
| 4e3f6c366b | |||
| 93d1d700d4 | |||
| 1f707cb37c | |||
| 2091c90538 | |||
| 9567ce588d | |||
| 8c577a329f | |||
| a35f945c71 | |||
| 2e5a739c6c | |||
| 9b15b64a9a | |||
| abc941b57c | |||
| 246ad7c59a | |||
| 87ce07088f | |||
| bff7ec52db | |||
| 104ee6c33b | |||
| 328762ed67 | |||
| 6dc36c8749 | |||
| c8990962d2 | |||
| f0b23af10d | |||
| f9d9d653dc | |||
| 3288f6425b | |||
| 900db72557 | |||
| 3861dd5912 | |||
| 2bf0170956 | |||
| 2c5c92ab0a | |||
| a805d18bba | |||
| 7e05b2546a | |||
| 9f1df6164b | |||
| 2ebbdebe46 | |||
| e502550d76 | |||
| f6ad36f530 | |||
| 1118b80288 | |||
| 0a5caae5df | |||
| 99e0a4defb | |||
| 50c74b94bc | |||
| c848c473a3 | |||
| 31eae25756 | |||
| e43909678e | |||
| c2eb87133d | |||
| 7ba1fe4309 | |||
| e7762c71ce | |||
| ec83ab5e13 | |||
| aa1a953a65 | |||
| 26d888aec3 | |||
| a1940c6eaa | |||
| 9e28669c33 | |||
| 60538e2e12 | |||
| 49d464f979 | |||
| a31acd6571 | |||
| fd06cde641 | |||
| 23eddafb39 | |||
| cd5950749e | |||
| 742192b452 | |||
| b92c032c2d | |||
| fc7a750f0f | |||
| 102b56dfe3 | |||
| 396a030ed1 | |||
| 6b8ddd6ac0 | |||
| 116a0e9f03 | |||
| fe79be894b | |||
| 5053cc4e95 | |||
| a88b1e81ec | |||
| 0ee515db47 | |||
| 9bfdcba400 | |||
| 42ed8acec9 | |||
| 418f8d10a3 | |||
| 0e4842962b | |||
| bd5b823725 | |||
| ca6ba4a85b | |||
| 26f73d60fa | |||
| 37294d023f | |||
| 580692aab4 | |||
| eacfaa7460 | |||
| 423a73efd5 | |||
| 1b1f22c5c2 | |||
| b2d6d73034 | |||
| 16e3838a90 | |||
| 6b14930302 | |||
| 67b416379f | |||
| 60b6f5d50a | |||
| ff98991c80 | |||
| a2da73053d | |||
| 96d6d520b7 | |||
| 0fd8b986fd | |||
| 0cc8b77307 | |||
| 732de3458f | |||
| fdd0823e07 | |||
| 60765d903a | |||
| 5609728a8a | |||
| e501c4a5b9 | |||
| 44ff9d154e | |||
| 265ce115a0 | |||
| a61b3d352a | |||
| 5b33713ef8 | |||
| 38ec257f7e | |||
| 9f48265eb1 | |||
| 7e184f01c6 | |||
| ab2ebae6b0 | |||
| 3c3b14a26b | |||
| fd34437575 | |||
| fdd264d946 | |||
| 440b0ddffe | |||
| b0983047eb | |||
| 2f533c54b3 | |||
| 1b92a158b5 | |||
| ffbb968fcd | |||
| 182781229c | |||
| 7997cb3001 | |||
| bbb67fbba4 | |||
| aabaa0257b | |||
| 4b85a34b34 | |||
| e28bc35cad | |||
| 54678fcb36 | |||
| 4eeb07a736 | |||
| fc45df144c | |||
| 143f8644c6 | |||
| 87aa1b5521 | |||
| 2ac19d32a1 | |||
| cd3661b60c | |||
| 14c5dcf413 | |||
| 85ad10d558 | |||
| bed88cf813 | |||
| 7165128fa5 | |||
| 2242fc5ac8 | |||
| 85f0ddd188 | |||
| 19e2bad96e | |||
| daddec9217 | |||
| aafe9c6dae | |||
| f29ffc0697 | |||
| bbddcd0f9a | |||
| 468af42de5 | |||
| f2d83a5a00 | |||
| c289484c5c | |||
| dec7568d4c | |||
| 1c2431f33b | |||
| 451c18628d | |||
| 38d17e5169 | |||
| a2c6f344ba | |||
| f35308a4d3 | |||
| 815236449b | |||
| d0a527af5e | |||
| 14337a2aac | |||
| 2766d8f881 | |||
| c66b00356d | |||
| edf8dde958 | |||
| c73a9e4164 | |||
| cc82207882 | |||
| fe6f4c7475 | |||
| 81515b530c | |||
| 1d12fc290c | |||
| 2fbf17ff34 | |||
| 41a8ef2fd9 | |||
| 2330306db1 | |||
| ba76f04fe6 | |||
| d81946df39 | |||
| 210f7ac044 | |||
| 13276ecf31 | |||
| e5c7dd18de | |||
| 7311d727ba | |||
| 84b8eb5154 | |||
| 82916f0cff | |||
| 1294af4a71 | |||
| 48254f7a7e | |||
| 6f5a73b2e2 | |||
| 68896d9294 | |||
| 788678feb8 | |||
| 5d714ab44e | |||
| d0f2fbb6d6 | |||
| 3f444b5fc2 | |||
| 69e65c0bdc | |||
| 7a74e86819 | |||
| 863736587c | |||
| 4bb01a8c24 | |||
| 7ce5b3515b | |||
| d866097c07 | |||
| cf48a77d5a | |||
| 3154be82f3 | |||
| 525326d15f | |||
| 13e41f29d6 | |||
| f3c60a6309 | |||
| 7f875af1ca | |||
| ec1bd77f2e | |||
| 30fc4bd030 | |||
| 49f7da6412 | |||
| 3c240be8a8 | |||
| 9c878bef79 | |||
| afadda8c04 | |||
| d94c1d2046 | |||
| 1c87f77223 | |||
| 9cb78558d3 | |||
| b57f3ded64 | |||
| 2a0fcf6bea | |||
| 7a3890ad76 | |||
| d83f124f5f | |||
| e70395744b | |||
| d17cc5c07d | |||
| 75d72344ca | |||
| a722fcd2b0 | |||
| ee15b451b4 | |||
| f2fd3b9443 | |||
| 6e7208553a | |||
| 2f256aa1ef | |||
| 1d7722c1cb | |||
| 8308cd6c1a | |||
| 87e39b8768 | |||
| 60a5922582 | |||
| 5b3175d1d6 | |||
| df9f6688eb | |||
| eda6f3b9ca | |||
| 6bde2cd08f | |||
| 234a48af19 | |||
| c7d4b4853d | |||
| f47a5c2206 | |||
| 49af499353 | |||
| 9235175e26 | |||
| 96cedc31f9 | |||
| 73535e58a5 | |||
| d647a7de07 | |||
| 5de3cd71a4 | |||
| 040ba0338d | |||
| 0c729d1eea | |||
| 6ee31f6cd1 | |||
| 3f5c32c6da | |||
| 76aabe7e05 | |||
| 29bed766dd | |||
| 468f040c0a | |||
| e371d945ed | |||
| ca7e8d6468 | |||
| 5bb6f566ba | |||
| 8ecf167e85 | |||
| 9a61f40cef | |||
| 07e411fe6b | |||
| 4e91462838 | |||
| 92dc08a304 | |||
| 7c05b85bcd | |||
| 320bb9f8c4 | |||
| 430972231f | |||
| 2715c44173 | |||
| a8d1831382 | |||
| dce4b4825d | |||
| 2c0e76be3d | |||
| e0b3f91b2a | |||
| 5b02695b13 | |||
| 7cdc13ef11 | |||
| 392351af25 | |||
| 4d721f1803 | |||
| b9f433414d | |||
| 01215a645e | |||
| 58afccb2f3 | |||
| e44b4f450e | |||
| 92c0e0321a | |||
| a245820519 | |||
| 294677a2cc | |||
| a57e87b345 | |||
| 99253763af | |||
| 0bff27ec21 | |||
| 198cb63182 | |||
| 518e21fcd2 | |||
| b9fdf07926 | |||
| b50c13dd1f | |||
| 5d5d42eb9b | |||
| 80eaedab8b | |||
| 3509fbd201 | |||
| b049210641 | |||
| 3456f9a74d | |||
| b9d0e3172f | |||
| 64fa3b162d | |||
| 6472be5e19 | |||
| 21bee17ffd | |||
| fc091fe3d7 | |||
| b65cb5eaca | |||
| f8246e9f49 | |||
| 0e986cae4d | |||
| e6c3313168 | |||
| af9f636199 | |||
| acfdb591d0 | |||
| 1f845aa1d9 | |||
| 1c9d0a176e | |||
| 8ceebba0d2 | |||
| df74460629 | |||
| e02af9aa37 | |||
| eb440b3357 | |||
| 36ada66007 | |||
| 920c4b061d | |||
| b938fdb0a3 | |||
| db07648f33 | |||
| 5fc118dcac | |||
| d235a9e017 | |||
| 50a6a92d20 | |||
| 405bc4a0d1 | |||
| 096bc35447 | |||
| 4ffbb25960 | |||
| cad6e8d314 | |||
| 1c4c67053c | |||
| 88a4a5d36a | |||
| 595327ace4 | |||
| c8043368bd | |||
| a9fcecab88 | |||
| 294ca20350 | |||
| 3a0de01bad | |||
| b9425d13df | |||
| e550bf5c3b | |||
| a2329de03c | |||
| 016b15a2a9 | |||
| 7796492c2b | |||
| 5e3211928f | |||
| f039f95f4d | |||
| 089498b0b3 | |||
| dd857c4470 | |||
| cf7f5c7473 | |||
| b415fc8d42 | |||
| db82322d17 | |||
| 0e9c5bb14a | |||
| fd8c5c5bf6 | |||
| ad580635ea | |||
| afe8bd6a57 | |||
| 6728a5ccaa | |||
| 0fa914139c | |||
| c99dc9f643 | |||
| bfc7012043 | |||
| 0d8bc922a3 | |||
| 1601b00862 | |||
| 01e7675e24 | |||
| 30d255ab6f | |||
| baaf8006bc | |||
| ee330bf7fb | |||
| e275d44462 | |||
| c4edc26267 | |||
| 1abb13c5d9 | |||
| a8501cb446 | |||
| 983ee6eeb9 | |||
| 54f5870658 | |||
| b76fa884ec | |||
| 1898157df5 | |||
| 16160dfc80 | |||
| 1134051fba | |||
| 03a64cca74 | |||
| dfb77e936d | |||
| 0f1b440b91 | |||
| ffb0cf5ed5 | |||
| 5f48fa64ff | |||
| e6cbc17c12 | |||
| 8d9b12be07 | |||
| 28705b3790 | |||
| fbde251ebc | |||
| 91e6b8ca6b | |||
| cf175d7b7e | |||
| 097660c678 | |||
| c8e21b3f24 | |||
| b85aec6157 | |||
| 3e2184ac61 | |||
| 408a961e59 | |||
| 080892b5ab | |||
| 76f277d5fe | |||
| 7e74527344 | |||
| 9f607a7c43 | |||
| 1e61adfad1 | |||
| 83d6f12ce3 | |||
| f98158f5ad | |||
| fc08077086 | |||
| 05b91847cd | |||
| cea2dcbd89 | |||
| 9767f22756 | |||
| f27252bfaa | |||
| bdea097b80 | |||
| 926dc7d56b | |||
| c2b1a58813 | |||
| 45782c6328 | |||
| 46f29d2eb2 | |||
| 2d4145cfe8 | |||
| 83acff6859 | |||
| d340487e94 | |||
| 2e7d366da5 | |||
| bb78c1428e | |||
| 2edeaee748 | |||
| e5baca0ac4 | |||
| fdfe346adc | |||
| 7fbc3a35a3 | |||
| 881f72e418 | |||
| 09ac41949c | |||
| 04b89befce | |||
| bb9bef4deb | |||
| 72480d304b | |||
| c5d5c52850 | |||
| 0c93040da5 | |||
| a8e19bb4ba | |||
| 116fe16512 | |||
| b621e9c3a8 | |||
| a2ee36eac7 | |||
| 32c70b26d8 | |||
| 43d951b173 | |||
| a6cd7a3d6b | |||
| 7a2b1ae790 | |||
| 376d0414d8 | |||
| 90a8cc9d40 |
+11
-1
@@ -1,7 +1,10 @@
|
||||
language: python
|
||||
dist: xenial
|
||||
python:
|
||||
- 3.5
|
||||
# - 3.5 # Deactivated because Travis CI tests failed randomly (Travis's problem)
|
||||
- 3.6
|
||||
- 3.7
|
||||
sudo: true
|
||||
services:
|
||||
- elasticsearch
|
||||
cache: pip
|
||||
@@ -12,3 +15,10 @@ install:
|
||||
script:
|
||||
- make test
|
||||
- make test-backend-es-qs
|
||||
notifications:
|
||||
email:
|
||||
recipients:
|
||||
- venom14@gmail.com
|
||||
- thomas@patzke.org
|
||||
on_success: change
|
||||
on_failure: always
|
||||
|
||||
@@ -1,4 +1,12 @@
|
||||
---
|
||||
# https://yamllint.readthedocs.io/en/latest/configuration.html
|
||||
extends: default
|
||||
rules:
|
||||
comments: disable
|
||||
comments-indentation: disable
|
||||
document-start: disable
|
||||
empty-lines: {max: 2, max-start: 2, max-end: 2}
|
||||
indentation: disable
|
||||
line-length: disable
|
||||
new-line-at-end-of-file: disable
|
||||
trailing-spaces: disable
|
||||
|
||||
@@ -1,7 +1,7 @@
|
||||
.PHONY: test test-yaml test-sigmac
|
||||
TMPOUT = $(shell tempfile)
|
||||
COVSCOPE = tools/sigma/*.py,tools/sigmac,tools/merge_sigma
|
||||
test: clearcov test-yaml test-sigmac test-merge build finish
|
||||
.PHONY: test test-rules test-sigmac
|
||||
TMPOUT = $(shell tempfile||mktemp)
|
||||
COVSCOPE = tools/sigma/*.py,tools/sigma/backends/*.py,tools/sigmac,tools/merge_sigma
|
||||
test: clearcov test-rules test-sigmac test-merge build finish
|
||||
|
||||
clearcov:
|
||||
rm -f .coverage
|
||||
@@ -10,31 +10,47 @@ finish:
|
||||
coverage report --fail-under=90
|
||||
rm -f $(TMPOUT)
|
||||
|
||||
test-yaml:
|
||||
test-rules:
|
||||
yamllint rules
|
||||
tests/test_rules.py
|
||||
|
||||
test-sigmac:
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -h
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -l
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -O rulecomment -rvdI -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t kibana rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvd -t es-qs rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs --shoot-yourself-in-the-foot rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -O rulecomment -rvdI -c tools/config/elk-winlogbeat.yml -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t kibana -c tools/config/elk-winlogbeat.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t graylog rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t xpack-watcher rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunkxml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t logpoint rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t xpack-watcher -c tools/config/elk-winlogbeat.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t elastalert -c tools/config/elk-winlogbeat.yml -O alert_methods=http_post,email -O emails=test@test.invalid -O http_post_url=http://test.invalid rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t elastalert-dsl -c tools/config/elk-winlogbeat.yml -O alert_methods=http_post,email -O emails=test@test.invalid -O http_post_url=http://test.invalid rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-all-index.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunkxml -c tools/config/splunk-windows-all-index.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t logpoint -c tools/config/logpoint-windows-all.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t wdatp rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-dsl rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t ala rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t ala --backend-config tests/backend_config.yml rules/windows/process_creation/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-dsl -c tools/config/elk-winlogbeat.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t powershell -c tools/config/powershell-windows-all.yml -Ocsv rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t arcsight -c tools/config/arcsight.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qradar -c tools/config/arcsight.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qradar -c tools/config/qradar.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qualys -c tools/config/qualys.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'level>=high,level<=critical,status=stable,logsource=windows' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'level>=high,level<=critical,status=xstable,logsource=windows' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'level>=high,level<=xcritical,status=stable,logsource=windows' rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'level=critical' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'level=xcritical' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -f 'foo=bar' rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t netwitness -c tools/config/netwitness.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t sumologic -c tools/config/sumologic.yml rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-all-index.yml -f 'level>=high,level<=critical,status=stable,logsource=windows,tag=attack.execution' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-all-index.yml -f 'level>=high,level<=critical,status=xstable,logsource=windows' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-all-index.yml -f 'level>=high,level<=xcritical,status=stable,logsource=windows' rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-all-index.yml -f 'level=critical' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-all-index.yml -f 'level=xcritical' rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-all-index.yml -f 'foo=bar' rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-windows.yml -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c sysmon -c elk-windows -t es-qs rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c sysmon -c elk-windows -t splunk rules/ > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-windows.yml -c tools/config/generic/sysmon.yml -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-linux.yml -t es-qs rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-windows.yml -t kibana rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-windows.yml -Ooutput=curl -t kibana rules/ > /dev/null
|
||||
@@ -44,21 +60,23 @@ test-sigmac:
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-linux.yml -t xpack-watcher rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/elk-defaultindex.yml -t xpack-watcher rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/splunk-windows-all.yml -t splunk rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logpoint-windows-all.yml -t logpoint rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/generic/sysmon.yml -c tools/config/splunk-windows-all.yml -t splunk rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t grep rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t fieldlist rules/ > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -O output=plain -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -o $(TMPOUT) tests/collection_repeat.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -O output=foobar -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/not_existing.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_yaml.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_sigma-no_identifiers.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_sigma-no_condition.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_sigma-invalid_identifier_reference.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_sigma-invalid_aggregation.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs tests/invalid_sigma-wrong_identifier_definition.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs rules/windows/builtin/win_susp_failed_logons_single_source.yml
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -o /not_possible rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/elk-winlogbeat.yml -O output=plain -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t kibana -c tests/config-multiple_mapping.yml -c tests/config-multiple_mapping-2.yml tests/mapping-conditional-multi.yml > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/elk-winlogbeat.yml -O output=json -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/elk-winlogbeat.yml -o $(TMPOUT) - < tests/collection_repeat.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/elk-winlogbeat.yml -O output=foobar -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/elk-winlogbeat.yml tests/not_existing.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/elk-winlogbeat.yml tests/invalid_yaml.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/elk-winlogbeat.yml tests/invalid_sigma-no_identifiers.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/elk-winlogbeat.yml tests/invalid_sigma-no_condition.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/elk-winlogbeat.yml tests/invalid_sigma-invalid_identifier_reference.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/elk-winlogbeat.yml tests/invalid_sigma-invalid_aggregation.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/elk-winlogbeat.yml tests/invalid_sigma-wrong_identifier_definition.yml > /dev/null
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/elk-winlogbeat.yml rules/windows/builtin/win_susp_failed_logons_single_source.yml
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/elk-winlogbeat.yml -o /not_possible rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c not_existing rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tests/invalid_yaml.yml rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tests/invalid_config.yml rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
|
||||
@@ -24,6 +24,12 @@ This repository contains:
|
||||
|
||||
[](https://www.youtube.com/watch?v=OheVuE9Ifhs "Sigma - Generic Signatures for Log Events")
|
||||
|
||||
## SANS Webcast on MITRE ATT&CK and Sigma
|
||||
|
||||
The SANS webcast on Sigma contains a very good 20 min introduction to the project by John Hubbart from minute 39 onward. (SANS account required; registration is free)
|
||||
|
||||
[MITRE ATT&CK and Sigma Alerting Webcast Recording](https://www.sans.org/webcasts/mitre-att-ck-sigma-alerting-110010 "MITRE ATT&CK and Sigma Alerting")
|
||||
|
||||
# Use Cases
|
||||
|
||||
* Describe your detection method in Sigma to make it sharable
|
||||
@@ -61,7 +67,7 @@ Florian wrote a short [rule creation tutorial](https://www.nextron-systems.com/2
|
||||
1. Download or clone the respository
|
||||
2. Check the `./rules` sub directory for an overview on the rule base
|
||||
3. Run `python sigmac --help` in folder `./tools` to get a help on the rule converter
|
||||
4. Convert a rule of your choice with `sigmac` like `python sigmac -t splunk ../rules/windows/builtin/win_susp_process_creations.yml`
|
||||
4. Convert a rule of your choice with `sigmac` like `./sigmac -t splunk -c tools/config/generic/sysmon.yml ./rules/windows/process_creation/win_susp_whoami.yml`
|
||||
5. Convert a whole rule directory with `python sigmac -t splunk -r ../rules/proxy/`
|
||||
6. Check the `./tools/config` folder and the [wiki](https://github.com/Neo23x0/sigma/wiki/Converter-Tool-Sigmac) if you need custom field or log source mappings in your environment
|
||||
|
||||
@@ -90,18 +96,104 @@ Sigmac converts sigma rules into queries or inputs of the supported targets list
|
||||
Sigma library that may be used to integrate Sigma support in other projects. Further, there's `merge_sigma.py` which
|
||||
merges multiple YAML documents of a Sigma rule collection into simple Sigma rules.
|
||||
|
||||

|
||||
### Usage
|
||||
|
||||
```
|
||||
usage: sigmac [-h] [--recurse] [--filter FILTER]
|
||||
[--target {arcsight,es-qs,es-dsl,kibana,xpack-watcher,elastalert,graylog,logpoint,grep,netwitness,powershell,qradar,qualys,splunk,splunkxml,sumologic,fieldlist,wdatp}]
|
||||
[--target-list] [--config CONFIG] [--output OUTPUT]
|
||||
[--backend-option BACKEND_OPTION] [--defer-abort]
|
||||
[--ignore-backend-errors] [--verbose] [--debug]
|
||||
[inputs [inputs ...]]
|
||||
|
||||
Convert Sigma rules into SIEM signatures.
|
||||
|
||||
positional arguments:
|
||||
inputs Sigma input files ('-' for stdin)
|
||||
|
||||
optional arguments:
|
||||
-h, --help show this help message and exit
|
||||
--recurse, -r Use directory as input (recurse into subdirectories is
|
||||
not implemented yet)
|
||||
--filter FILTER, -f FILTER
|
||||
Define comma-separated filters that must match (AND-
|
||||
linked) to rule to be processed. Valid filters:
|
||||
level<=x, level>=x, level=x, status=y, logsource=z,
|
||||
tag=t. x is one of: low, medium, high, critical. y is
|
||||
one of: experimental, testing, stable. z is a word
|
||||
appearing in an arbitrary log source attribute. t is a
|
||||
tag that must appear in the rules tag list, case-
|
||||
insensitive matching. Multiple log source
|
||||
specifications are AND linked.
|
||||
--target {arcsight,es-qs,es-dsl,kibana,xpack-watcher,elastalert,graylog,logpoint,grep,netwitness,powershell,qradar,qualys,splunk,splunkxml,sumologic,fieldlist,wdatp}, -t {arcsight,es-qs,es-dsl,kibana,xpack-watcher,elastalert,graylog,logpoint,grep,netwitness,powershell,qradar,qualys,splunk,splunkxml,sumologic,fieldlist,wdatp}
|
||||
Output target format
|
||||
--target-list, -l List available output target formats
|
||||
--config CONFIG, -c CONFIG
|
||||
Configurations with field name and index mapping for
|
||||
target environment. Multiple configurations are merged
|
||||
into one. Last config is authorative in case of
|
||||
conflicts.
|
||||
--output OUTPUT, -o OUTPUT
|
||||
Output file or filename prefix if multiple files are
|
||||
generated
|
||||
--backend-option BACKEND_OPTION, -O BACKEND_OPTION
|
||||
Options and switches that are passed to the backend
|
||||
--defer-abort, -d Don't abort on parse or conversion errors, proceed
|
||||
with next rule. The exit code from the last error is
|
||||
returned
|
||||
--ignore-backend-errors, -I
|
||||
Only return error codes for parse errors and ignore
|
||||
errors for rules that cause backend errors. Useful,
|
||||
when you want to get as much queries as possible.
|
||||
--verbose, -v Be verbose
|
||||
--debug, -D Debugging output
|
||||
```
|
||||
|
||||
### Examples
|
||||
|
||||
#### Single Rule Translation
|
||||
Translate a single rule
|
||||
```
|
||||
tools/sigmac -t splunk rules/windows/sysmon/sysmon_susp_image_load.yml
|
||||
```
|
||||
#### Rule Set Translation
|
||||
Translate a whole rule directory and ignore backend errors (`-I`) in rule conversion for the selected backend (`-t splunk`)
|
||||
```
|
||||
tools/sigmac -I -t splunk -r rules/windows/sysmon/
|
||||
```
|
||||
#### Rule Set Translation with Custom Config
|
||||
Apply your own config file (`-c ~/my-elk-winlogbeat.yml`) during conversion, which can contain you custom field and source mappings
|
||||
```
|
||||
tools/sigmac -t es-qs -c ~/my-elk-winlogbeat.yml -r rules/windows/sysmon
|
||||
```
|
||||
#### Generic Rule Set Translation
|
||||
Use a config file for `process_creation` rules (`-r rules/windows/process_creation`) that instructs sigmac to create queries for a Sysmon log source (`-c tools/config/generic/sysmon.yml`) and the ElasticSearch target backend (`-t es-qs`)
|
||||
```
|
||||
tools/sigmac -t es-qs -c tools/config/generic/sysmon.yml -r rules/windows/process_creation
|
||||
```
|
||||
#### Generic Rule Set Translation with Custom Config
|
||||
Use a config file for a single `process_creation` rule (`./rules/windows/process_creation/win_susp_outlook.yml`) that instructs sigmac to create queries for process creation events generated in the Windows Security Eventlog (`-c tools/config/generic/windows-audit.yml`) and a Splunk target backend (`-t splunk`)
|
||||
```
|
||||
tools/sigmac -t splunk -c ~/my-splunk-mapping.yml -c tools/config/generic/windows-audit.yml ./rules/windows/process_creation/win_susp_outlook.yml
|
||||
```
|
||||
(See @blubbfiction's [blog post](https://patzke.org/a-guide-to-generic-log-sources-in-sigma.html) for more information)
|
||||
|
||||
### Supported Targets
|
||||
|
||||
* [Splunk](https://www.splunk.com/)
|
||||
* [ElasticSearch](https://www.elastic.co/)
|
||||
* [Splunk](https://www.splunk.com/) (plainqueries and dashboards)
|
||||
* [ElasticSearch Query Strings](https://www.elastic.co/)
|
||||
* [ElasticSearch Query DSL](https://www.elastic.co/guide/en/elasticsearch/reference/current/query-dsl.html)
|
||||
* [Kibana](https://www.elastic.co/de/products/kibana)
|
||||
* [Elastic X-Pack Watcher](https://www.elastic.co/guide/en/x-pack/current/xpack-alerting.html)
|
||||
* [Logpoint](https://www.logpoint.com)
|
||||
* [Windows Defender Advanced Threat Protection (WDATP)](https://www.microsoft.com/en-us/windowsforbusiness/windows-atp)
|
||||
* Grep with Perl-compatible regular expression support
|
||||
* [Azure Sentinel / Azure Log Analytics](https://azure.microsoft.com/en-us/services/azure-sentinel/)
|
||||
* [ArcSight](https://software.microfocus.com/en-us/products/siem-security-information-event-management/overview)
|
||||
* [QRadar](https://www.ibm.com/de-de/marketplace/ibm-qradar-siem)
|
||||
* [Qualys](https://www.qualys.com/apps/threat-protection/)
|
||||
* [RSA NetWitness](https://www.rsa.com/en-us/products/threat-detection-response)
|
||||
* [PowerShell](https://docs.microsoft.com/en-us/powershell/scripting/getting-started/getting-started-with-windows-powershell?view=powershell-6)
|
||||
* [Grep](https://www.gnu.org/software/grep/manual/grep.html) with Perl-compatible regular expression support
|
||||
|
||||
Current work-in-progress
|
||||
* [Splunk Data Models](https://docs.splunk.com/Documentation/Splunk/7.1.0/Knowledge/Aboutdatamodels)
|
||||
@@ -132,6 +224,30 @@ For development (e.g. execution of integration tests with `make` and packaging),
|
||||
pip3 install -r tools/requirements-devel.txt
|
||||
```
|
||||
|
||||
## Sigma2MISP
|
||||
|
||||
Import Sigma rules to MISP events. Depends on PyMISP.
|
||||
|
||||
Parameters that aren't changed frequently (`--url`, `--key`) can be put without the prefixing dashes `--` into a file
|
||||
and included with `@filename` as parameter on the command line.
|
||||
|
||||
Example:
|
||||
*misp.conf*:
|
||||
```
|
||||
url https://host
|
||||
key foobarfoobarfoobarfoobarfoobarfoobarfoo
|
||||
```
|
||||
|
||||
Load Sigma rule into MISP event 1234:
|
||||
```
|
||||
sigma2misp @misp.conf --event 1234 sigma_rule.py
|
||||
```
|
||||
|
||||
Load Sigma rules in directory sigma_rules/ into one newly created MISP event with info set to *Test Event*:
|
||||
```
|
||||
sigma2misp @misp.conf --same-event --info "Test Event" -r sigma_rules/
|
||||
```
|
||||
|
||||
## Evt2Sigma
|
||||
|
||||
[Evt2Sigma](https://github.com/Neo23x0/evt2sigma) helps you with the rule creation. It generates a Sigma rule from a log entry.
|
||||
@@ -151,13 +267,15 @@ These tools are not part of the main toolchain and maintained separately by thei
|
||||
* Integration into Threat Intel Exchanges
|
||||
* Attempts to convince others to use the rule format in their reports, threat feeds, blog posts, threat sharing platforms
|
||||
|
||||
# Projects that use Sigma
|
||||
# Projects or Products that use Sigma
|
||||
|
||||
* [MISP](http://www.misp-project.org/2017/03/26/MISP.2.4.70.released.html) (since version 2.4.70, March 2017)
|
||||
* [TA-Sigma-Searches](https://github.com/dstaulcu/TA-Sigma-Searches) (Splunk App)
|
||||
* [SOC Prime - Sigma Rule Editor](https://tdm.socprime.com/sigma/)
|
||||
* [ypsilon](https://github.com/P4T12ICK/ypsilon) - Automated Use Case Testing
|
||||
* [uncoder.io](https://uncoder.io/) - Online Translator for SIEM Searches
|
||||
* [SPARK](https://www.nextron-systems.com/2018/06/28/spark-applies-sigma-rules-in-eventlog-scan/) - Scan with Sigma rules on endpoints
|
||||
* [RANK VASA](https://globenewswire.com/news-release/2019/03/04/1745907/0/en/RANK-Software-to-Help-MSSPs-Scale-Cybersecurity-Offerings.html)
|
||||
|
||||
# Licenses
|
||||
|
||||
@@ -171,4 +289,6 @@ The content of this repository is released under the following licenses:
|
||||
|
||||
This is a private project mainly developed by Florian Roth and Thomas Patzke with feedback from many fellow analysts and friends. Rules are our own or have been drived from blog posts, tweets or other public sources that are referenced in the rules.
|
||||
|
||||
Copyright for Tree Image: [studiobarcelona / 123RF Stock Photo](http://www.123rf.com/profile_studiobarcelona)
|
||||
# Info Graphic
|
||||
|
||||

|
||||
|
||||
@@ -102,13 +102,13 @@ def rule_element(file_content, elements):
|
||||
:return: the value of the key in the yaml document
|
||||
"""
|
||||
try:
|
||||
yaml.load(file_content.replace("---",""))
|
||||
yaml.safe_load(file_content.replace("---",""))
|
||||
except:
|
||||
raise Exception('Unsupported')
|
||||
element_output = ""
|
||||
for e in elements:
|
||||
try:
|
||||
element_output = yaml.load(file_content.replace("---",""))[e]
|
||||
element_output = yaml.safe_load(file_content.replace("---",""))[e]
|
||||
except:
|
||||
pass
|
||||
if element_output is None:
|
||||
|
||||
@@ -0,0 +1,247 @@
|
||||
#!/usr/bin/python
|
||||
# Copyright 2018 juju4
|
||||
|
||||
# This program is free software: you can redistribute it and/or modify
|
||||
# it under the terms of the GNU Lesser General Public License as published by
|
||||
# the Free Software Foundation, either version 3 of the License, or
|
||||
# (at your option) any later version.
|
||||
|
||||
# This program is distributed in the hope that it will be useful,
|
||||
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
# GNU Lesser General Public License for more details.
|
||||
|
||||
# You should have received a copy of the GNU Lesser General Public License
|
||||
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
"""
|
||||
Project: sigma2sumologic.py
|
||||
Date: 11 Jan 2019
|
||||
Author: juju4
|
||||
Version: 1.0
|
||||
Description: This script executes sumologic search queries from Sigma SIEM rules.
|
||||
Workflow:
|
||||
1. Convert rules with sigmac
|
||||
2. Enrich: add ignore+local custom rules, priority
|
||||
3. Format
|
||||
4. Get results and save to txt/xlsx files
|
||||
Requirements:
|
||||
$ pip install sumologic-sdk pyyaml pandas
|
||||
"""
|
||||
|
||||
import re
|
||||
import os, sys, stat
|
||||
import glob
|
||||
import subprocess
|
||||
import argparse
|
||||
import yaml
|
||||
import traceback
|
||||
import logging
|
||||
from sumologic import SumoLogic
|
||||
import time
|
||||
import datetime
|
||||
import json
|
||||
import pandas
|
||||
|
||||
logging.basicConfig(level=logging.DEBUG)
|
||||
logger = logging.getLogger(__name__)
|
||||
formatter = logging.Formatter('%(asctime)s - %(name)s - p%(process)s {%(pathname)s:%(lineno)d} - %(levelname)s - %(message)s')
|
||||
handler = logging.FileHandler('sigma2sumo.log')
|
||||
handler.setFormatter(formatter)
|
||||
logger.addHandler(handler)
|
||||
|
||||
parser = argparse.ArgumentParser(description='Execute sigma rules in sumologic')
|
||||
parser.add_argument("--conf", help="script yaml config file", type=str, required=True)
|
||||
parser.add_argument("--accessid", help="Sumologic Access ID", type=str, required=False)
|
||||
parser.add_argument("--accesskey", help="Sumologic Access Key", type=str, required=False)
|
||||
parser.add_argument("--endpoint", help="Sumologic url endpoint", type=str, required=False)
|
||||
parser.add_argument("--ruledir", help="sigma rule directory path to convert", type=str, required=False)
|
||||
parser.add_argument("--outdir", help="output directory to create rules", type=str, required=False)
|
||||
parser.add_argument("--sigmac", help="Sigmac location", default="../tools/sigmac", type=str)
|
||||
parser.add_argument("--realerttime", help="Realert time (optional value, default 5 minutes)", type=str, default=5)
|
||||
parser.add_argument("--debug", help="Show debug output", type=bool, default=False)
|
||||
args = parser.parse_args()
|
||||
|
||||
LIMIT = 100
|
||||
delay = 5
|
||||
|
||||
def rule_element(file_content, elements):
|
||||
"""
|
||||
Function used to get specific element from yaml document and return content
|
||||
:type file_content: str
|
||||
:type elements: list
|
||||
:param file_content:
|
||||
:param elements: list of elements of the yaml document to get "title", "description"
|
||||
:return: the value of the key in the yaml document
|
||||
"""
|
||||
try:
|
||||
logger.debug("file_content: %s" % file_content)
|
||||
yaml.safe_load(file_content.replace("---",""))
|
||||
except:
|
||||
raise Exception('Unsupported')
|
||||
element_output = ""
|
||||
for e in elements:
|
||||
try:
|
||||
element_output = yaml.safe_load(file_content.replace("---",""))[e]
|
||||
except:
|
||||
pass
|
||||
if element_output is None:
|
||||
return ""
|
||||
return element_output
|
||||
|
||||
def get_rule_as_sumologic(file):
|
||||
"""
|
||||
Function used to get sumologic query output from rule file
|
||||
:type file: str
|
||||
:param file: rule filename
|
||||
:return: string query
|
||||
"""
|
||||
if not os.path.exists(args.sigmac):
|
||||
logger.error("Cannot find sigmac rule coverter at '%s', please set a correct location via '--sigmac'")
|
||||
cmd = [args.sigmac, file, "--target", "sumologic"]
|
||||
logger.info('get_rule_as_sumologic cmd: %s' % cmd)
|
||||
process = subprocess.Popen(cmd,stdout=subprocess.PIPE, stderr=subprocess.PIPE)
|
||||
output, err = process.communicate()
|
||||
|
||||
# output is byte-string...
|
||||
output = output.decode("utf-8")
|
||||
err = err.decode("utf-8")
|
||||
|
||||
logger.info('get_rule_as_sumologic output: %s' % output)
|
||||
logger.info('get_rule_as_sumologic stderr: %s' % err)
|
||||
if err or "unsupported" in err:
|
||||
logger.error('Unsupported output at this time')
|
||||
raise Exception('Unsupported output at this time')
|
||||
output = output.split("\n")
|
||||
# Remove empty string from \n
|
||||
output = [a for a in output if a]
|
||||
# Handle case of multiple queries returned
|
||||
if len(output) > 1:
|
||||
return " OR ".join(output)
|
||||
return "".join(output)
|
||||
|
||||
if args.help:
|
||||
parser_print_help()
|
||||
|
||||
if args.conf:
|
||||
with open(args.conf, 'r') as ymlfile:
|
||||
cfg = yaml.load(ymlfile)
|
||||
args.accessid = cfg['accessid']
|
||||
args.accesskey = cfg['accesskey']
|
||||
args.endpoint = cfg['endpoint']
|
||||
args.ruledir = cfg['ruledir']
|
||||
args.outdir = cfg['outdir']
|
||||
args.sigmac = cfg['sigmac']
|
||||
try:
|
||||
args.recursive = cfg['recursive']
|
||||
except:
|
||||
args.recursive = False
|
||||
if args.recursive:
|
||||
globpath = args.ruledir + "/**/*.yml"
|
||||
else:
|
||||
globpath = args.ruledir + "/*.yml"
|
||||
logger.debug("args: %s" % args)
|
||||
logger.debug("globpath: %s" % globpath)
|
||||
|
||||
if args.outdir and not os.path.isdir(args.outdir):
|
||||
os.mkdir(args.outdir, stat.S_IRWXU)
|
||||
|
||||
# recursive
|
||||
for file in glob.iglob(globpath):
|
||||
# non-recursive (above, not working...)
|
||||
#for file in glob.iglob(args.ruledir + "/*.yml"):
|
||||
|
||||
file_basename = os.path.basename(os.path.splitext(file)[0])
|
||||
file_basenamepath = os.path.splitext(file)[0]
|
||||
file_ext = os.path.splitext(file)[1]
|
||||
try:
|
||||
if file_ext != '.yml':
|
||||
continue
|
||||
|
||||
logger.info("Processing %s ..." % file_basename)
|
||||
with open(file, "rb") as f:
|
||||
file_content = f.read()
|
||||
|
||||
logger.info("Rule file: %s" % file)
|
||||
|
||||
sumo_query = get_rule_as_sumologic(file)
|
||||
|
||||
logger.info(" Checking if custom query file: %s" % file_basenamepath + '.custom')
|
||||
if os.path.isfile(file_basenamepath + '.custom'):
|
||||
# FIXME! want to add something in the middle for parsing for example...
|
||||
logger.info(" Adding custom part to end query from: %s" % file_basenamepath + '.custom')
|
||||
with open(file_basenamepath + '.custom', "rb") as f:
|
||||
sumo_query += " " + f.read().decode('utf-8')
|
||||
elif 'count ' not in sumo_query and ('EventID=' in sumo_query):
|
||||
sumo_query += " | count _sourceCategory, hostname, EventID, msg_summary, _raw"
|
||||
elif 'count ' not in sumo_query:
|
||||
sumo_query += " | count _sourceCategory, hostname, _raw"
|
||||
|
||||
logger.info("Final sumo query: %s" % sumo_query)
|
||||
|
||||
except Exception as e:
|
||||
if args.debug:
|
||||
traceback.print_exc()
|
||||
logger.exception("error generating sumo query " + str(file) + "----" + str(e))
|
||||
pass
|
||||
|
||||
try:
|
||||
# Run query
|
||||
# https://github.com/SumoLogic/sumologic-python-sdk/blob/master/scripts/search-job.py
|
||||
sumo = SumoLogic(args.accessid, args.accesskey, args.endpoint)
|
||||
toTime = datetime.datetime.now().strftime("%Y-%m-%dT%H:%M:%S")
|
||||
fromTime = datetime.datetime.strptime(toTime, "%Y-%m-%dT%H:%M:%S") - datetime.timedelta(hours = 24)
|
||||
fromTime = fromTime.strftime("%Y-%m-%dT%H:%M:%S")
|
||||
timeZone = 'UTC'
|
||||
byReceiptTime = True
|
||||
|
||||
sj = sumo.search_job(sumo_query, fromTime, toTime, timeZone, byReceiptTime)
|
||||
|
||||
status = sumo.search_job_status(sj)
|
||||
while status['state'] != 'DONE GATHERING RESULTS':
|
||||
if status['state'] == 'CANCELLED':
|
||||
break
|
||||
time.sleep(delay)
|
||||
status = sumo.search_job_status(sj)
|
||||
|
||||
except Exception as e:
|
||||
if args.debug:
|
||||
traceback.print_exc()
|
||||
logger.exception("error seaching sumo " + str(file) + "----" + str(e))
|
||||
with open(os.path.join(args.outdir, "sigma-" + file_basename + '-error.txt'), "w") as f:
|
||||
f.write(json.dumps(r, indent=4, sort_keys=True) + " ERROR: %s\n\nQUERY: %s" % (e, sumo_query))
|
||||
pass
|
||||
|
||||
logger.info("Sumo search job status: %s" % status['state'])
|
||||
|
||||
try:
|
||||
if status['state'] == 'DONE GATHERING RESULTS':
|
||||
count = status['recordCount']
|
||||
limit = count if count < LIMIT and count != 0 else LIMIT # compensate bad limit check
|
||||
r = sumo.search_job_records(sj, limit=limit)
|
||||
logger.info("Sumo search results: %s" % r)
|
||||
|
||||
logger.info("Saving final sumo query for %s to %s" % (file, os.path.join(args.outdir, "sigma-" + file_basename + '.sumo')))
|
||||
with open(os.path.join(args.outdir, "sigma-" + file_basename + '.sumo'), "w") as f:
|
||||
f.write(sumo_query)
|
||||
if r and r['records'] != []:
|
||||
logger.info("Saving results")
|
||||
# as json text file
|
||||
with open(os.path.join(args.outdir, "sigma-" + file_basename + '.txt'), "w") as f:
|
||||
f.write(json.dumps(r, indent=4, sort_keys=True))
|
||||
# as excel file
|
||||
df = pandas.io.json.json_normalize(r['records'])
|
||||
with pandas.ExcelWriter(os.path.join(args.outdir, "sigma-" + file_basename + ".xlsx")) as writer:
|
||||
df.to_excel(writer, 'data')
|
||||
pandas.DataFrame({'References': [
|
||||
"timeframe: from %s to %s" % (fromTime, toTime),
|
||||
"Sumo endpoint: %s" % args.endpoint,
|
||||
"Sumo query: %s" % sumo_query
|
||||
]}).to_excel(writer, 'comments')
|
||||
|
||||
# and do whatever you want, email alert, report, ticket...
|
||||
|
||||
except Exception as e:
|
||||
if args.debug:
|
||||
traceback.print_exc()
|
||||
logger.exception("error saving results " + str(file) + "----" + str(e))
|
||||
pass
|
||||
Binary file not shown.
|
After Width: | Height: | Size: 1.8 MiB |
Binary file not shown.
|
After Width: | Height: | Size: 870 KiB |
@@ -0,0 +1,2653 @@
|
||||
{
|
||||
"name": "SIGMA Rule Coverage",
|
||||
"version": "2.1",
|
||||
"domain": "mitre-enterprise",
|
||||
"description": "Accurate to commit #: 81693d81b6823bb5f064919453eac70c1d097d3e\nhttps://github.com/Neo23x0/sigma/commit/81693d81b6823bb5f064919453eac70c1d097d3e",
|
||||
"filters": {
|
||||
"stages": [
|
||||
"act"
|
||||
],
|
||||
"platforms": [
|
||||
"windows",
|
||||
"linux",
|
||||
"mac"
|
||||
]
|
||||
},
|
||||
"sorting": 0,
|
||||
"viewMode": 0,
|
||||
"hideDisabled": false,
|
||||
"techniques": [
|
||||
{
|
||||
"techniqueID": "T1156",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1134",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1134",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1015",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_stickykey_like_backdoor.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1015",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_stickykey_like_backdoor.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1087",
|
||||
"tactic": "discovery",
|
||||
"score": 5,
|
||||
"color": "",
|
||||
"comment": "win_account_discovery.yml\nwin_alert_hacktool_use.yml\nwin_susp_net_recon_activity.yml\nwin_susp_commands_recon_activity.yml\nwin_susp_recon_activity.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1098",
|
||||
"tactic": "credential-access",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "apt_judgement_panda_gtr19.yml\nwin_alert_ad_user_backdoors.yml\nwin_susp_dsrm_password_change.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1098",
|
||||
"tactic": "persistence",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "apt_judgement_panda_gtr19.yml\nwin_alert_ad_user_backdoors.yml\nwin_susp_dsrm_password_change.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1182",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1182",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1103",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1103",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1155",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1155",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1017",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1138",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_sdbinst_shim_persistence.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1138",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_sdbinst_shim_persistence.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1010",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1123",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1131",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1119",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1020",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1197",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_process_creation_bitsadmin_download.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1197",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_process_creation_bitsadmin_download.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1139",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1009",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1067",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_bcdedit.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1217",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1176",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1110",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1088",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "win_cmstp_com_object_access.yml\nsysmon_uac_bypass_eventvwr.yml\nsysmon_uac_bypass_sdclt.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1088",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "win_cmstp_com_object_access.yml\nsysmon_uac_bypass_eventvwr.yml\nsysmon_uac_bypass_sdclt.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1191",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_cmstp_com_object_access.yml\nsysmon_cmstp_execution.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1191",
|
||||
"tactic": "execution",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_cmstp_com_object_access.yml\nsysmon_cmstp_execution.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1042",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1146",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "lnx_shell_clear_cmd_history.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1115",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1116",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1059",
|
||||
"tactic": "execution",
|
||||
"score": 12,
|
||||
"color": "",
|
||||
"comment": "apt_babyshark.yml\napt_equationgroup_dll_u_load.yml\napt_equationgroup_lnx.yml\napt_sofacy.yml\napt_sofacy_zebrocy.yml\napt_turla_commands.yml\napt_zxshell.yml\ncrime_fireball.yml\nwin_alert_hacktool_use.yml\nwin_office_shell.yml\nwin_susp_cmd_http_appdata.yml\nwin_susp_outlook.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1043",
|
||||
"tactic": "command-and-control",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_malware_backconnect_ports.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1092",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1223",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1223",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1109",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1109",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1122",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1122",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1090",
|
||||
"tactic": "command-and-control",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_netsh_fw_add.yml\nwin_netsh_port_fwd.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1196",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1196",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1136",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1003",
|
||||
"tactic": "credential-access",
|
||||
"score": 23,
|
||||
"color": "",
|
||||
"comment": "apt_bear_activity_gtr19.yml\nwin_alert_lsass_access.yml\nwin_alert_mimikatz_keywords.yml\nwin_dcsync.yml\nwin_impacket_secretdump.yml\nwin_mal_creddumper.yml\nwin_mal_wceaux_dll.yml\nwin_susp_lsass_dump.yml\nwin_susp_sam_dump.yml\nav_password_dumper.yml\nwin_cmdkey_recon.yml\nwin_hack_rubeus.yml\nwin_malware_notpetya.yml\nwin_susp_ntdsutil.yml\nwin_susp_procdump.yml\nwin_susp_sysvol_access.yml\nwin_susp_vssadmin_ntds_activity.yml\nsysmon_ghostpack_safetykatz.yml\nsysmon_lsass_memdump.yml\nsysmon_mimikatz_detection_lsass.yml\nsysmon_mimikatz_inmemory_detection.yml\nsysmon_password_dumper_lsass.yml\nsysmon_quarkspw_filedump.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1081",
|
||||
"tactic": "credential-access",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_bear_activity_gtr19.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1214",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1094",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1024",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1207",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1038",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1038",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1038",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1073",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 9,
|
||||
"color": "",
|
||||
"comment": "win_susp_dhcp_config.yml\nwin_susp_dhcp_config_failed.yml\nwin_susp_dns_config.yml\nwin_plugx_susp_exe_locations.yml\nwin_susp_control_dll_load.yml\nwin_susp_gup.yml\nsysmon_dhcp_calloutdll.yml\nsysmon_dns_serverlevelplugindll.yml\nsysmon_susp_image_load.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1002",
|
||||
"tactic": "exfiltration",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_judgement_panda_gtr19.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1132",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1022",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1001",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1074",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1030",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1213",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1005",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1039",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1025",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1140",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "win_susp_mshta_execution.yml\nwin_susp_certutil_command.yml\nwin_susp_cli_escape.yml\nwin_susp_ping_hex_ip.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1089",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_alert_enable_weak_encryption.yml\nwin_susp_msmpeng_crash.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1175",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_mmc_source.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1172",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1189",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1157",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1157",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1173",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1114",
|
||||
"tactic": "collection",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_alert_hacktool_use.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1106",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1129",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1048",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1041",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1011",
|
||||
"tactic": "exfiltration",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_ssp_added_lsa_config.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1052",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1190",
|
||||
"tactic": "initial-access",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "web_cve_2018_2894_weblogic_exploit.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1203",
|
||||
"tactic": "execution",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "av_exploiting.yml\nwin_exploit_cve_2017_8759.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1212",
|
||||
"tactic": "credential-access",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "win_net_ntlm_downgrade.yml\nwin_susp_kerberos_manipulation.yml\nwin_susp_samr_pwset.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1211",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_susp_msmpeng_crash.yml\nwin_exploit_cve_2017_11882.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1068",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_hurricane_panda.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1210",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1133",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1181",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1181",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1008",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1107",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_susp_backup_delete.yml\nwin_susp_sdelete.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1222",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1006",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1044",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1044",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1083",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_turla_commands.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1187",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1144",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1061",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1148",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1200",
|
||||
"tactic": "initial-access",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_usb_device_plugged.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1158",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_attrib_hiding_files.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1158",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_attrib_hiding_files.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1147",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1143",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1179",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1179",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1179",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1062",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1183",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_win_reg_persistence.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1183",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_win_reg_persistence.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1183",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_win_reg_persistence.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1054",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_disable_event_logging.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1066",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_sdelete.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1070",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "win_susp_eventlog_cleared.yml\nwin_susp_security_eventlog_cleared.yml\nwin_malware_notpetya.yml\nwin_susp_bcdedit.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1202",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_office_shell.yml\nwin_susp_outlook.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1056",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1056",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1141",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1130",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1118",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1118",
|
||||
"tactic": "execution",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1208",
|
||||
"tactic": "credential-access",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_susp_rc4_kerberos.yml\nwin_spn_enum.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1215",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1142",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1161",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1149",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1171",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1177",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1177",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1159",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1160",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1160",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1152",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1152",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1152",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1168",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1168",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1162",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1037",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_logon_scripts_userinitmprlogonscript.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1037",
|
||||
"tactic": "persistence",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "sysmon_logon_scripts_userinitmprlogonscript.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1185",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1036",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 14,
|
||||
"color": "",
|
||||
"comment": "apt_ta17_293a_ps.yml\nwin_exploit_cve_2015_1641.yml\nwin_powershell_b64_shellcode.yml\nwin_susp_calc.yml\nwin_susp_csc.yml\nwin_susp_execution_path.yml\nwin_susp_exec_folder.yml\nwin_susp_procdump.yml\nwin_susp_prog_location_process_starts.yml\nwin_susp_run_locations.yml\nwin_susp_svchost.yml\nwin_susp_taskmgr_localsystem.yml\nwin_susp_taskmgr_parent.yml\nwin_system_exe_anomaly.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1031",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1112",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "apt_chafer_mar18.yml\nwin_mal_ursnif.yml\nsysmon_dhcp_calloutdll.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1170",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "apt_babyshark.yml\nwin_lethalhta.yml\nwin_mshta_spawn_shell.yml\nwin_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1170",
|
||||
"tactic": "execution",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "apt_babyshark.yml\nwin_lethalhta.yml\nwin_mshta_spawn_shell.yml\nwin_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1104",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1188",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1026",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1079",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1096",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "powershell_ntfs_ads_access.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1128",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1046",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_vul_java_remote_debugging.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1126",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1135",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_turla_commands.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1040",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1040",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1050",
|
||||
"tactic": "persistence",
|
||||
"score": 7,
|
||||
"color": "",
|
||||
"comment": "apt_apt29_tor.yml\napt_carbonpaper_turla.yml\napt_stonedrill.yml\napt_turla_service_png.yml\nwin_mal_service_installs.yml\nwin_rare_service_installs.yml\nsysmon_susp_driver_load.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1050",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 7,
|
||||
"color": "",
|
||||
"comment": "apt_apt29_tor.yml\napt_carbonpaper_turla.yml\napt_stonedrill.yml\napt_turla_service_png.yml\nwin_mal_service_installs.yml\nwin_rare_service_installs.yml\nsysmon_susp_driver_load.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1027",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_susp_ping_hex_ip.yml\nsysmon_ads_executable.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1137",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1075",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "win_alert_hacktool_use.yml\nwin_overpass_the_hash.yml\nwin_pass_the_hash.yml\nwin_susp_ntlm_auth.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1097",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1174",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1201",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1034",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1034",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1120",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1069",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_net_recon_activity.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1150",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1150",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1150",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1205",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1205",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1205",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1013",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1013",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1086",
|
||||
"tactic": "execution",
|
||||
"score": 28,
|
||||
"color": "",
|
||||
"comment": "apt_apt29_thinktanks.yml\napt_babyshark.yml\napt_empiremonkey.yml\npowershell_downgrade_attack.yml\npowershell_exe_calling_ps.yml\npowershell_malicious_commandlets.yml\npowershell_malicious_keywords.yml\npowershell_prompt_credentials.yml\npowershell_psattack.yml\npowershell_shellcode_b64.yml\npowershell_suspicious_download.yml\npowershell_suspicious_invocation_generic.yml\npowershell_suspicious_invocation_specific.yml\npowershell_suspicious_keywords.yml\npowershell_xor_commandline.yml\nwin_powershell_amsi_bypass.yml\nwin_powershell_dll_execution.yml\nwin_powershell_download.yml\nwin_powershell_renamed_ps.yml\nwin_powershell_suspicious_parameter_variation.yml\nwin_susp_powershell_enc_cmd.yml\nwin_susp_powershell_hidden_b64_cmd.yml\nwin_susp_powershell_parent_combo.yml\nwin_susp_ps_appdata.yml\nsysmon_powershell_exploit_scripts.yml\nsysmon_powershell_network_connection.yml\nsysmon_powersploit_schtasks.yml\nsysmon_susp_powershell_rundll32.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1145",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1057",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1186",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1093",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1055",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 8,
|
||||
"color": "",
|
||||
"comment": "powershell_shellcode_b64.yml\nwin_exploit_cve_2017_0261.yml\nwin_malware_dridex.yml\nwin_mavinject_proc_inj.yml\nsysmon_cactustorch.yml\nsysmon_cobaltstrike_process_injection.yml\nsysmon_malware_verclsid_shellcode.yml\nsysmon_mal_namedpipes.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1055",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 8,
|
||||
"color": "",
|
||||
"comment": "powershell_shellcode_b64.yml\nwin_exploit_cve_2017_0261.yml\nwin_malware_dridex.yml\nwin_mavinject_proc_inj.yml\nsysmon_cactustorch.yml\nsysmon_cobaltstrike_process_injection.yml\nsysmon_malware_verclsid_shellcode.yml\nsysmon_mal_namedpipes.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1012",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "apt_babyshark.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1163",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1164",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1108",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1108",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1060",
|
||||
"tactic": "persistence",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "sysmon_susp_reg_persist_explorer_run.yml\nsysmon_susp_run_key_img_folder.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1121",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1121",
|
||||
"tactic": "execution",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1117",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_regsvr32_anomalies.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1117",
|
||||
"tactic": "execution",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_regsvr32_anomalies.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1219",
|
||||
"tactic": "command-and-control",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "av_exploiting.yml\nwin_susp_tscon_localsystem.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1076",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "win_rdp_localhost_login.yml\nwin_rdp_reverse_tunnel.yml\nwin_susp_tscon_rdp_redirect.yml\nsysmon_rdp_reverse_tunnel.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1105",
|
||||
"tactic": "command-and-control",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "apt_pandemic.yml\nwin_susp_certutil_command.yml\nsysmon_win_binary_github_com.yml\nsysmon_win_binary_susp_com.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1105",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "apt_pandemic.yml\nwin_susp_certutil_command.yml\nsysmon_win_binary_github_com.yml\nsysmon_win_binary_susp_com.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1021",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_netsh_port_fwd_3389.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1018",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1091",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1091",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1014",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1085",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 11,
|
||||
"color": "",
|
||||
"comment": "apt_equationgroup_dll_u_load.yml\napt_sofacy.yml\napt_tropictrooper.yml\napt_unidentified_nov_18.yml\napt_zxshell.yml\ncrime_fireball.yml\nwin_malware_notpetya.yml\nwin_susp_control_dll_load.yml\nwin_susp_rundll32_activity.yml\nsysmon_rundll32_net_connections.yml\nsysmon_susp_powershell_rundll32.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1085",
|
||||
"tactic": "execution",
|
||||
"score": 11,
|
||||
"color": "",
|
||||
"comment": "apt_equationgroup_dll_u_load.yml\napt_sofacy.yml\napt_tropictrooper.yml\napt_unidentified_nov_18.yml\napt_zxshell.yml\ncrime_fireball.yml\nwin_malware_notpetya.yml\nwin_susp_control_dll_load.yml\nwin_susp_rundll32_activity.yml\nsysmon_rundll32_net_connections.yml\nsysmon_susp_powershell_rundll32.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1178",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_add_sid_history.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1198",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1198",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1184",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1053",
|
||||
"tactic": "execution",
|
||||
"score": 8,
|
||||
"color": "",
|
||||
"comment": "apt_chafer_mar18.yml\napt_slingshot.yml\nwin_atsvc_task.yml\nwin_GPO_scheduledtasks.yml\nwin_rare_schtasks_creations.yml\nwin_rare_schtask_creation.yml\nwin_susp_schtask_creation.yml\nsysmon_powersploit_schtasks.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1053",
|
||||
"tactic": "persistence",
|
||||
"score": 8,
|
||||
"color": "",
|
||||
"comment": "apt_chafer_mar18.yml\napt_slingshot.yml\nwin_atsvc_task.yml\nwin_GPO_scheduledtasks.yml\nwin_rare_schtasks_creations.yml\nwin_rare_schtask_creation.yml\nwin_susp_schtask_creation.yml\nsysmon_powersploit_schtasks.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1053",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 8,
|
||||
"color": "",
|
||||
"comment": "apt_chafer_mar18.yml\napt_slingshot.yml\nwin_atsvc_task.yml\nwin_GPO_scheduledtasks.yml\nwin_rare_schtasks_creations.yml\nwin_rare_schtask_creation.yml\nwin_susp_schtask_creation.yml\nsysmon_powersploit_schtasks.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1029",
|
||||
"tactic": "exfiltration",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1113",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1180",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1064",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 10,
|
||||
"color": "",
|
||||
"comment": "apt_cloudhopper.yml\nwin_malware_script_dropper.yml\nwin_mal_adwind.yml\nwin_mal_lockergoga.yml\nwin_shell_spawn_susp_program.yml\nwin_susp_rasdial_activity.yml\nwin_susp_script_execution.yml\nwin_wmi_spwns_powershell.yml\nsysmon_cactustorch.yml\nsysmon_susp_file_characteristics.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1064",
|
||||
"tactic": "execution",
|
||||
"score": 10,
|
||||
"color": "",
|
||||
"comment": "apt_cloudhopper.yml\nwin_malware_script_dropper.yml\nwin_mal_adwind.yml\nwin_mal_lockergoga.yml\nwin_shell_spawn_susp_program.yml\nwin_susp_rasdial_activity.yml\nwin_susp_script_execution.yml\nwin_wmi_spwns_powershell.yml\nsysmon_cactustorch.yml\nsysmon_susp_file_characteristics.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1063",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1101",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1167",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1035",
|
||||
"tactic": "execution",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "win_hack_smbexec.yml\nwin_tool_psexec.yml\nwin_psexesvc_start.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1058",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1058",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1166",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1166",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1051",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1023",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1218",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_mavinject_proc_inj.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1218",
|
||||
"tactic": "execution",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_mavinject_proc_inj.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1216",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1216",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1045",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1153",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1151",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1151",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1193",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1192",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1194",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1071",
|
||||
"tactic": "command-and-control",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "net_susp_dns_txt_exec_strings.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1032",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1095",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1165",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1165",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1169",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1206",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1195",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1019",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1082",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_commands_recon_activity.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1016",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1049",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1033",
|
||||
"tactic": "discovery",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_whoami.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1007",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1124",
|
||||
"tactic": "discovery",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1080",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1221",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1072",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1072",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1209",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1099",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 1,
|
||||
"color": "",
|
||||
"comment": "win_susp_time_modification.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1154",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1154",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1127",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml\nwin_workflow_compiler.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1127",
|
||||
"tactic": "execution",
|
||||
"score": 2,
|
||||
"color": "",
|
||||
"comment": "win_possible_applocker_bypass.yml\nwin_workflow_compiler.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1199",
|
||||
"tactic": "initial-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1111",
|
||||
"tactic": "credential-access",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1065",
|
||||
"tactic": "command-and-control",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1204",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1078",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "win_admin_rdp_login.yml\nwin_alert_active_directory_user_control.yml\nwin_susp_failed_logons_single_source.yml\nwin_susp_failed_logon_reasons.yml\nwin_susp_interactive_logons.yml\nwin_user_added_to_local_administrators.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1078",
|
||||
"tactic": "persistence",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "win_admin_rdp_login.yml\nwin_alert_active_directory_user_control.yml\nwin_susp_failed_logons_single_source.yml\nwin_susp_failed_logon_reasons.yml\nwin_susp_interactive_logons.yml\nwin_user_added_to_local_administrators.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1078",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "win_admin_rdp_login.yml\nwin_alert_active_directory_user_control.yml\nwin_susp_failed_logons_single_source.yml\nwin_susp_failed_logon_reasons.yml\nwin_susp_interactive_logons.yml\nwin_user_added_to_local_administrators.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1078",
|
||||
"tactic": "initial-access",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "win_admin_rdp_login.yml\nwin_alert_active_directory_user_control.yml\nwin_susp_failed_logons_single_source.yml\nwin_susp_failed_logon_reasons.yml\nwin_susp_interactive_logons.yml\nwin_user_added_to_local_administrators.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1125",
|
||||
"tactic": "collection",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1102",
|
||||
"tactic": "command-and-control",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "proxy_cobalt_amazon.yml\nproxy_cobalt_ocsp.yml\nproxy_cobalt_onedrive.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1102",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "proxy_cobalt_amazon.yml\nproxy_cobalt_ocsp.yml\nproxy_cobalt_onedrive.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1100",
|
||||
"tactic": "persistence",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "web_cve_2018_2894_weblogic_exploit.yml\nav_webshell.yml\nwin_susp_execution_path_webserver.yml\nwin_susp_iss_module_install.yml\nwin_webshell_detection.yml\nwin_webshell_spawn.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1100",
|
||||
"tactic": "privilege-escalation",
|
||||
"score": 6,
|
||||
"color": "",
|
||||
"comment": "web_cve_2018_2894_weblogic_exploit.yml\nav_webshell.yml\nwin_susp_execution_path_webserver.yml\nwin_susp_iss_module_install.yml\nwin_webshell_detection.yml\nwin_webshell_spawn.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1077",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 5,
|
||||
"color": "",
|
||||
"comment": "apt_turla_commands.yml\nwin_admin_share_access.yml\nwin_hack_smbexec.yml\nwin_lm_namedpipe.yml\nwin_susp_psexec.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1047",
|
||||
"tactic": "execution",
|
||||
"score": 4,
|
||||
"color": "",
|
||||
"comment": "win_wmi_persistence.yml\nwin_bypass_squiblytwo.yml\nwin_susp_wmi_execution.yml\nwin_wmi_persistence_script_event_consumer.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1084",
|
||||
"tactic": "persistence",
|
||||
"score": 3,
|
||||
"color": "",
|
||||
"comment": "sysmon_wmi_event_subscription.yml\nsysmon_wmi_persistence_commandline_event_consumer.yml\nsysmon_wmi_persistence_script_event_consumer_write.yml",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1028",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1028",
|
||||
"tactic": "lateral-movement",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1004",
|
||||
"tactic": "persistence",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1220",
|
||||
"tactic": "defense-evasion",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
},
|
||||
{
|
||||
"techniqueID": "T1220",
|
||||
"tactic": "execution",
|
||||
"score": 0,
|
||||
"color": "",
|
||||
"comment": "",
|
||||
"enabled": true,
|
||||
"metadata": []
|
||||
}
|
||||
],
|
||||
"gradient": {
|
||||
"colors": [
|
||||
"#ffffff",
|
||||
"#66b1ff"
|
||||
],
|
||||
"minValue": 0,
|
||||
"maxValue": 2
|
||||
},
|
||||
"legendItems": [],
|
||||
"metadata": [],
|
||||
"showTacticRowBackground": false,
|
||||
"tacticRowBackground": "#dddddd",
|
||||
"selectTechniquesAcrossTactics": true
|
||||
}
|
||||
Binary file not shown.
|
After Width: | Height: | Size: 373 KiB |
@@ -0,0 +1,20 @@
|
||||
title: APT29
|
||||
description: 'This method detects a suspicious powershell command line combination as used by APT29 in a campaign against US think tanks'
|
||||
references:
|
||||
- https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.g0016
|
||||
- attack.t1086
|
||||
author: Florian Roth
|
||||
date: 2018/12/04
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine: '*-noni -ep bypass $*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: critical
|
||||
Regular → Executable
+11
-12
@@ -4,30 +4,29 @@ title: APT29 Google Update Service Install
|
||||
description: 'This method detects malicious services mentioned in APT29 report by FireEye. The legitimate path for the Google update service is C:\Program Files (x86)\Google\Update\GoogleUpdate.exe so the service names and executable locations used by APT29 are specific enough to be detected in log files.'
|
||||
references:
|
||||
- https://www.fireeye.com/blog/threat-research/2017/03/apt29_domain_frontin.html
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.g0016
|
||||
- attack.t1050
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
detection:
|
||||
service:
|
||||
service_install:
|
||||
EventID: 7045
|
||||
ServiceName: 'Google Update'
|
||||
timeframe: 5m
|
||||
condition: service | near process
|
||||
condition: service_install | near process
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
|
||||
---
|
||||
# Windows Audit Log
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
process:
|
||||
EventID: 4688
|
||||
NewProcessName:
|
||||
- 'C:\Program Files(x86)\Google\GoogleService.exe'
|
||||
- 'C:\Program Files(x86)\Google\GoogleUpdate.exe'
|
||||
---
|
||||
# Sysmon
|
||||
detection:
|
||||
process:
|
||||
EventID: 1
|
||||
Image:
|
||||
- 'C:\Program Files(x86)\Google\GoogleService.exe'
|
||||
- 'C:\Program Files(x86)\Google\GoogleUpdate.exe'
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Baby Shark Activity
|
||||
status: experimental
|
||||
description: Detects activity that could be related to Baby Shark malware
|
||||
references:
|
||||
- https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059
|
||||
- attack.t1086
|
||||
- attack.discovery
|
||||
- attack.t1012
|
||||
- attack.defense_evasion
|
||||
- attack.t1170
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
author: Florian Roth
|
||||
date: 2019/02/24
|
||||
detection:
|
||||
selection:
|
||||
CommandLine:
|
||||
- reg query "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default"
|
||||
- powershell.exe mshta.exe http*
|
||||
- cmd.exe /c taskkill /im cmd.exe
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: high
|
||||
@@ -0,0 +1,24 @@
|
||||
title: Judgement Panda Exfil Activity
|
||||
description: Detects Russian group activity as described in Global Threat Report 2019 by Crowdstrike
|
||||
references:
|
||||
- https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/
|
||||
author: Florian Roth
|
||||
date: 2019/02/21
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1081
|
||||
- attack.t1003
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection1:
|
||||
Image: '*\xcopy.exe'
|
||||
CommandLine: '* /S /E /C /Q /H \\*'
|
||||
selection2:
|
||||
Image: '*\adexplorer.exe'
|
||||
CommandLine: '* -snapshot "" c:\users\\*'
|
||||
condition: selection1 or selection2
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: critical
|
||||
Regular → Executable
+4
@@ -2,6 +2,10 @@ title: Turla Service Install
|
||||
description: 'This method detects a service install of malicious services mentioned in Carbon Paper - Turla report by ESET'
|
||||
references:
|
||||
- https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.g0010
|
||||
- attack.t1050
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
|
||||
Regular → Executable
+25
-5
@@ -4,7 +4,15 @@ title: Chafer Activity
|
||||
description: Detects Chafer activity attributed to OilRig as reported in Nyotron report in March 2018
|
||||
references:
|
||||
- https://nyotron.com/nyotron-discovers-next-generation-oilrig-attacks/
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.g0049
|
||||
- attack.t1053
|
||||
- attack.s0111
|
||||
- attack.defense_evasion
|
||||
- attack.t1112
|
||||
date: 2018/03/23
|
||||
modified: 2019/03/01
|
||||
author: Florian Roth, Markus Neis
|
||||
detection:
|
||||
condition: 1 of them
|
||||
@@ -22,6 +30,16 @@ detection:
|
||||
- 'SC Scheduled Scan'
|
||||
- 'UpdatMachine'
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
selection_service:
|
||||
EventID: 4698
|
||||
TaskName:
|
||||
- 'SC Scheduled Scan'
|
||||
- 'UpdatMachine'
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
@@ -37,17 +55,19 @@ detection:
|
||||
TargetObject: '*\Control\SecurityProviders\WDigest\UseLogonCredential'
|
||||
EventType: 'SetValue'
|
||||
Details: 'DWORD (0x00000001)'
|
||||
---
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection_process1:
|
||||
EventID: 1
|
||||
CommandLine:
|
||||
- '*\Service.exe i'
|
||||
- '*\Service.exe u'
|
||||
- '*\microsoft\Taskbar\autoit3.exe'
|
||||
- 'C:\wsc.exe*'
|
||||
selection_process2:
|
||||
EventID: 1
|
||||
Image: '*\Windows\Temp\DB\*.exe'
|
||||
Image: '*\Windows\Temp\DB\\*.exe'
|
||||
selection_process3:
|
||||
EventID: 1
|
||||
CommandLine: '*\nslookup.exe -q=TXT*'
|
||||
ParentImage: '*\Autoit*'
|
||||
ParentImage: '*\Autoit*'
|
||||
|
||||
Regular → Executable
+5
-2
@@ -3,12 +3,15 @@ description: Detects suspicious file execution by wscript and cscript
|
||||
author: Florian Roth
|
||||
references:
|
||||
- https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.g0045
|
||||
- attack.t1064
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
Image: '*\cscript.exe'
|
||||
CommandLine: '*.vbs /shell *'
|
||||
condition: selection
|
||||
|
||||
Regular → Executable
+8
-25
@@ -1,36 +1,19 @@
|
||||
---
|
||||
action: global
|
||||
title: CrackMapExecWin
|
||||
description: Detects CrackMapExecWin Activity as Described by NCSC
|
||||
status: experimental
|
||||
references:
|
||||
- https://www.ncsc.gov.uk/alerts/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control
|
||||
tags:
|
||||
- attack.g0035
|
||||
author: Markus Neis
|
||||
detection:
|
||||
condition: 1 of them
|
||||
falsepositives:
|
||||
- None
|
||||
level: critical
|
||||
---
|
||||
# Windows Audit Log
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation'
|
||||
detection:
|
||||
selection1:
|
||||
# Does not require group policy 'Audit Process Creation' > Include command line in process creation events
|
||||
EventID: 4688
|
||||
NewProcessName:
|
||||
- '*\crackmapexec.exe'
|
||||
---
|
||||
# Sysmon
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection1:
|
||||
# Does not require group policy 'Audit Process Creation' > Include command line in process creation events
|
||||
EventID: 1
|
||||
selection:
|
||||
Image:
|
||||
- '*\crackmapexec.exe'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- None
|
||||
level: critical
|
||||
Regular → Executable
+5
-3
@@ -3,18 +3,20 @@ status: experimental
|
||||
description: Detects Elise backdoor acitivty as used by APT32
|
||||
references:
|
||||
- https://community.rsa.com/community/products/netwitness/blog/2018/01/30/apt32-continues-asean-targeting
|
||||
tags:
|
||||
- attack.g0030
|
||||
- attack.g0050
|
||||
- attack.s0081
|
||||
author: Florian Roth
|
||||
date: 2018/01/31
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 1
|
||||
Image: 'C:\Windows\SysWOW64\cmd.exe'
|
||||
CommandLine: '*\Windows\Caches\NavShExt.dll *'
|
||||
selection2:
|
||||
EventID: 1
|
||||
CommandLine: '*\AppData\Roaming\MICROS~1\Windows\Caches\NavShExt.dll,Setting'
|
||||
condition: 1 of them
|
||||
falsepositives:
|
||||
|
||||
@@ -0,0 +1,32 @@
|
||||
---
|
||||
action: global
|
||||
title: Empire Monkey
|
||||
description: Detects EmpireMonkey APT reported Activity
|
||||
references:
|
||||
- https://app.any.run/tasks/a4107649-8cb0-41af-ad75-113152d4d57b
|
||||
tags:
|
||||
- attack.t1086
|
||||
- attack.execution
|
||||
date: 2019/04/02
|
||||
author: Markus Neis
|
||||
detection:
|
||||
condition: 1 of them
|
||||
falsepositives:
|
||||
- Very Unlikely
|
||||
level: critical
|
||||
---
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection_cutil:
|
||||
CommandLine:
|
||||
- '*/i:%APPDATA%\logs.txt scrobj.dll'
|
||||
Image:
|
||||
- '*\cutil.exe'
|
||||
selection_regsvr32:
|
||||
CommandLine:
|
||||
- '*/i:%APPDATA%\logs.txt scrobj.dll'
|
||||
Description:
|
||||
- Microsoft(C) Registerserver
|
||||
|
||||
Regular → Executable
+6
-3
@@ -3,16 +3,19 @@ description: Detects communication to C2 servers mentioned in the operational no
|
||||
references:
|
||||
- 'https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation'
|
||||
- 'https://medium.com/@msuiche/the-nsa-compromised-swift-network-50ec3000b195'
|
||||
tags:
|
||||
- attack.command_and_control
|
||||
- attack.g0020
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
product: firewall
|
||||
category: firewall
|
||||
detection:
|
||||
outgoing:
|
||||
dst:
|
||||
dst_ip:
|
||||
- '69.42.98.86'
|
||||
- '89.185.234.145'
|
||||
incoming:
|
||||
src:
|
||||
src_ip:
|
||||
- '69.42.98.86'
|
||||
- '89.185.234.145'
|
||||
condition: 1 of them
|
||||
|
||||
Regular → Executable
+10
-23
@@ -1,13 +1,19 @@
|
||||
---
|
||||
action: global
|
||||
title: Equation Group DLL_U Load
|
||||
author: Florian Roth
|
||||
description: Detects a specific tool and export used by EquationGroup
|
||||
references:
|
||||
- https://github.com/adamcaudill/EquationGroupLeak/search?utf8=%E2%9C%93&q=dll_u&type=
|
||||
- https://securelist.com/apt-slingshot/84312/
|
||||
- https://twitter.com/cyb3rops/status/972186477512839170
|
||||
author: Florian Roth
|
||||
date: 2018/03/10
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.g0020
|
||||
- attack.t1059
|
||||
- attack.defense_evasion
|
||||
- attack.t1085
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection1:
|
||||
Image: '*\rundll32.exe'
|
||||
@@ -18,22 +24,3 @@ detection:
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: critical
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 1
|
||||
selection2:
|
||||
EventID: 1
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation'
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 4688
|
||||
selection2:
|
||||
EventID: 4688
|
||||
Regular → Executable
+4
-1
@@ -2,6 +2,10 @@ title: Equation Group Indicators
|
||||
description: Detects suspicious shell commands used in various Equation Group scripts and tools
|
||||
references:
|
||||
- https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.g0020
|
||||
- attack.t1059
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
product: linux
|
||||
@@ -64,7 +68,6 @@ detection:
|
||||
- 'chmod 755 /usr/vmsys/bin/pipe'
|
||||
- 'chmod -R 755 /usr/vmsys'
|
||||
- 'chmod 755 $opbin/*tunnel'
|
||||
- '< /dev/console | uudecode && uncompress'
|
||||
- 'chmod 700 sendmail'
|
||||
- 'chmod 0700 sendmail'
|
||||
- '/usr/bin/wget http*sendmail;chmod +x sendmail;'
|
||||
|
||||
Regular → Executable
+8
-20
@@ -1,12 +1,16 @@
|
||||
---
|
||||
action: global
|
||||
title: Hurricane Panda Activity
|
||||
author: Florian Roth
|
||||
status: experimental
|
||||
description: Detects Hurricane Panda Activity
|
||||
references:
|
||||
- https://www.crowdstrike.com/blog/crowdstrike-discovers-use-64-bit-zero-day-privilege-escalation-exploit-cve-2014-4113-hurricane-panda/
|
||||
author: Florian Roth
|
||||
date: 2018/02/25
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.g0009
|
||||
- attack.t1068
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine:
|
||||
@@ -16,20 +20,4 @@ detection:
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4688
|
||||
|
||||
|
||||
|
||||
@@ -0,0 +1,33 @@
|
||||
title: Judgement Panda Exfil Activity
|
||||
description: Detects Judgement Panda activity as described in Global Threat Report 2019 by Crowdstrike
|
||||
references:
|
||||
- https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/
|
||||
author: Florian Roth
|
||||
date: 2019/02/21
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.g0010
|
||||
- attack.credential_access
|
||||
- attack.t1098
|
||||
- attack.exfiltration
|
||||
- attack.t1002
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection1:
|
||||
CommandLine:
|
||||
- '*\ldifde.exe -f -n *'
|
||||
- '*\7za.exe a 1.7z *'
|
||||
- '* eprod.ldf'
|
||||
- '*\aaaa\procdump64.exe*'
|
||||
- '*\aaaa\netsess.exe*'
|
||||
- '*\aaaa\7za.exe*'
|
||||
- '*copy .\1.7z \\*'
|
||||
- '*copy \\client\c$\aaaa\*'
|
||||
selection2:
|
||||
Image: C:\Users\Public\7za.exe
|
||||
condition: selection1 or selection2
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: critical
|
||||
@@ -0,0 +1,27 @@
|
||||
title: OceanLotus Registry Activity
|
||||
status: experimental
|
||||
description: Detects registry keys created in OceanLotus (also known as APT32) attacks
|
||||
references:
|
||||
- https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/
|
||||
tags:
|
||||
- attack.t1112
|
||||
author: megan201296
|
||||
date: 2019/04/14
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 13
|
||||
TargetObject:
|
||||
- '*\SOFTWARE\Classes\CLSID\{E08A0F4B-1F65-4D4D-9A09-BD4625B9C5A1}\Model'
|
||||
- '*\SOFTWARE\App\AppXbf13d4ea2945444d8b13e2121cb6b663\Application'
|
||||
- '*\SOFTWARE\App\AppXbf13d4ea2945444d8b13e2121cb6b663\DefaultIcon'
|
||||
- '*\SOFTWARE\App\AppX70162486c7554f7f80f481985d67586d\Application'
|
||||
- '*\SOFTWARE\App\AppX70162486c7554f7f80f481985d67586d\DefaultIcon'
|
||||
- '*\SOFTWARE\App\AppX37cc7fdccd644b4f85f4b22d5a3f105a\Application'
|
||||
- '*\SOFTWARE\App\AppX37cc7fdccd644b4f85f4b22d5a3f105a\DefaultIcon'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: critical
|
||||
Regular → Executable
+23
-12
@@ -1,23 +1,16 @@
|
||||
---
|
||||
action: global
|
||||
title: Pandemic Registry Key
|
||||
status: experimental
|
||||
description: Detects Pandemic Windows Implant
|
||||
references:
|
||||
- https://wikileaks.org/vault7/#Pandemic
|
||||
- https://twitter.com/MalwareJake/status/870349480356454401
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1105
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 13
|
||||
TargetObject:
|
||||
- '\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\services\null\Instance*'
|
||||
- '\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\null\Instance*'
|
||||
- '\REGISTRY\MACHINE\SYSTEM\ControlSet002\services\null\Instance*'
|
||||
selection2:
|
||||
EventID: 1
|
||||
Command: 'loaddll -a *'
|
||||
condition: 1 of them
|
||||
fields:
|
||||
- EventID
|
||||
@@ -29,4 +22,22 @@ fields:
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: critical
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 13
|
||||
TargetObject:
|
||||
- '\REGISTRY\MACHINE\SYSTEM\CurrentControlSet\services\null\Instance*'
|
||||
- '\REGISTRY\MACHINE\SYSTEM\ControlSet001\services\null\Instance*'
|
||||
- '\REGISTRY\MACHINE\SYSTEM\ControlSet002\services\null\Instance*'
|
||||
---
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection2:
|
||||
Command: 'loaddll -a *'
|
||||
|
||||
|
||||
Regular → Executable
+11
-13
@@ -1,35 +1,33 @@
|
||||
---
|
||||
action: global
|
||||
title: Defrag Deactivation
|
||||
author: Florian Roth
|
||||
description: Detects the deactivation of the Scheduled defragmentation task as seen by Slingshot APT group
|
||||
references:
|
||||
- https://securelist.com/apt-slingshot/84312/
|
||||
author: Florian Roth
|
||||
date: 2018/03/10
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Audit Other Object Access Events > Success'
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.t1053
|
||||
- attack.s0111
|
||||
detection:
|
||||
condition: selection
|
||||
condition: 1 of them
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: medium
|
||||
---
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
selection1:
|
||||
CommandLine:
|
||||
- '*schtasks* /delete *Defrag\ScheduledDefrag*'
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Audit Other Object Access Events > Success'
|
||||
definition: 'Requirements: Audit Policy : Audit Other Object Access Events > Success'
|
||||
detection:
|
||||
selection:
|
||||
selection2:
|
||||
EventID: 4701
|
||||
TaskName: '\Microsoft\Windows\Defrag\ScheduledDefrag'
|
||||
TaskName: '\Microsoft\Windows\Defrag\ScheduledDefrag'
|
||||
|
||||
Regular → Executable
+12
-22
@@ -1,36 +1,26 @@
|
||||
|
||||
---
|
||||
action: global
|
||||
title: Sofacy Trojan Loader Activity
|
||||
author: Florian Roth
|
||||
status: experimental
|
||||
description: Detects Trojan loader acitivty as used by APT28
|
||||
references:
|
||||
- https://researchcenter.paloaltonetworks.com/2018/02/unit42-sofacy-attacks-multiple-government-entities/
|
||||
- https://www.reverse.it/sample/e3399d4802f9e6d6d539e3ae57e7ea9a54610a7c4155a6541df8e94d67af086e?environmentId=100
|
||||
- https://twitter.com/ClearskySec/status/960924755355369472
|
||||
author: Florian Roth
|
||||
date: 2018/03/01
|
||||
tags:
|
||||
- attack.g0007
|
||||
- attack.execution
|
||||
- attack.t1059
|
||||
- attack.defense_evasion
|
||||
- attack.t1085
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine:
|
||||
- 'rundll32.exe %APPDATA%\*.dat",*'
|
||||
- 'rundll32.exe %APPDATA%\*.dll",#1'
|
||||
- 'rundll32.exe %APPDATA%\\*.dat",*'
|
||||
- 'rundll32.exe %APPDATA%\\*.dll",#1'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: critical
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4688
|
||||
@@ -0,0 +1,19 @@
|
||||
title: Sofacy Zebrocy
|
||||
author: Florian Roth
|
||||
description: Detects Sofacy's Zebrocy malware execution
|
||||
references:
|
||||
- https://app.any.run/tasks/54acca9a-394e-4384-a0c8-91a96d36c81d
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.g0020
|
||||
- attack.t1059
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine: '*cmd.exe /c SYSTEMINFO & TASKLIST'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: critical
|
||||
Regular → Executable
+4
@@ -3,6 +3,10 @@ description: 'This method detects a service install of the malicious Microsoft N
|
||||
author: Florian Roth
|
||||
references:
|
||||
- https://securelist.com/blog/research/77725/from-shamoon-to-stonedrill/
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.g0064
|
||||
- attack.t1050
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
|
||||
Regular → Executable
+5
-2
@@ -2,14 +2,17 @@ title: Ps.exe Renamed SysInternals Tool
|
||||
description: Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documentied in TA17-293A report
|
||||
references:
|
||||
- https://www.us-cert.gov/ncas/alerts/TA17-293A
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.g0035
|
||||
- attack.t1036
|
||||
author: Florian Roth
|
||||
date: 2017/10/22
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
CommandLine: 'ps.exe -accepteula'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
|
||||
@@ -0,0 +1,17 @@
|
||||
title: TropicTrooper Campaign November 2018
|
||||
author: "@41thexplorer, Windows Defender ATP"
|
||||
status: stable
|
||||
description: Detects TropicTrooper activity, an actor who targeted high-profile organizations in the energy and food and beverage sectors in Asia
|
||||
references:
|
||||
- https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1085
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
CommandLine: '*abCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCc*'
|
||||
condition: selection
|
||||
level: high
|
||||
Regular → Executable
+14
-9
@@ -5,34 +5,39 @@ status: experimental
|
||||
description: Detects automated lateral movement by Turla group
|
||||
references:
|
||||
- https://securelist.com/the-epic-turla-operation/65545/
|
||||
tags:
|
||||
- attack.g0010
|
||||
- attack.execution
|
||||
- attack.t1059
|
||||
- attack.lateral_movement
|
||||
- attack.t1077
|
||||
- attack.discovery
|
||||
- attack.t1083
|
||||
- attack.t1135
|
||||
author: Markus Neis
|
||||
date: 2017/11/07
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
category: process_creation
|
||||
product: windows
|
||||
falsepositives:
|
||||
- Unknown
|
||||
---
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
CommandLine:
|
||||
- 'net use \\%DomainController%\C$ "P@ssw0rd" *'
|
||||
- 'dir c:\*.doc* /s'
|
||||
- 'dir %TEMP%\*.exe'
|
||||
- 'dir c:\\*.doc* /s'
|
||||
- 'dir %TEMP%\\*.exe'
|
||||
condition: selection
|
||||
level: critical
|
||||
---
|
||||
detection:
|
||||
netCommand1:
|
||||
EventID: 1
|
||||
CommandLine: 'net view /DOMAIN'
|
||||
netCommand2:
|
||||
EventID: 1
|
||||
CommandLine: 'net session'
|
||||
netCommand3:
|
||||
EventID: 1
|
||||
CommandLine: 'net share'
|
||||
timeframe: 1m
|
||||
condition: netCommand1 | near netCommand1 and netCommand1
|
||||
condition: netCommand1 | near netCommand2 and netCommand3
|
||||
level: medium
|
||||
|
||||
Regular → Executable
+3
-1
@@ -4,11 +4,13 @@ description: Detects a named pipe used by Turla group samples
|
||||
references:
|
||||
- Internal Research
|
||||
date: 2017/11/06
|
||||
tags:
|
||||
- attack.g0010
|
||||
author: Markus Neis
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
description: 'Note that you have to configure logging for PipeEvents in Symson config'
|
||||
definition: 'Note that you have to configure logging for PipeEvents in Symson config'
|
||||
detection:
|
||||
selection:
|
||||
EventID:
|
||||
|
||||
@@ -0,0 +1,21 @@
|
||||
title: Turla PNG Dropper Service
|
||||
description: 'This method detects malicious services mentioned in Turla PNG dropper report by NCC Group in November 2018'
|
||||
references:
|
||||
- https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/november/turla-png-dropper-is-back/
|
||||
author: Florian Roth
|
||||
date: 2018/11/23
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.g0010
|
||||
- attack.t1050
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
detection:
|
||||
selection:
|
||||
EventID: 7045
|
||||
ServiceName: 'WerFaultSvc'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- unlikely
|
||||
level: critical
|
||||
@@ -0,0 +1,33 @@
|
||||
---
|
||||
action: global
|
||||
title: Unidentified Attacker November 2018
|
||||
status: stable
|
||||
description: A sigma rule detecting an unidetefied attacker who used phishing emails to target high profile orgs on November 2018. The Actor shares some TTPs with YYTRIUM/APT29 campaign in 2016.
|
||||
references:
|
||||
- https://twitter.com/DrunkBinary/status/1063075530180886529
|
||||
author: "@41thexplorer, Windows Defender ATP"
|
||||
date: 2018/11/20
|
||||
modified: 2018/12/11
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1085
|
||||
detection:
|
||||
condition: 1 of them
|
||||
level: high
|
||||
---
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection1:
|
||||
CommandLine: '*cyzfc.dat, PointFunctionCall'
|
||||
---
|
||||
# Sysmon: File Creation (ID 11)
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection2:
|
||||
EventID: 11
|
||||
TargetFilename:
|
||||
- '*ds7002.lnk*'
|
||||
Regular → Executable
+7
-2
@@ -3,12 +3,17 @@ description: Detects a ZxShell start by the called and well-known function name
|
||||
author: Florian Roth
|
||||
references:
|
||||
- https://www.hybrid-analysis.com/sample/5d2a4cde9fa7c2fdbf39b2e2ffd23378d0c50701a3095d1e91e3cf922d7b0b16?environmentId=100
|
||||
tags:
|
||||
- attack.g0001
|
||||
- attack.execution
|
||||
- attack.t1059
|
||||
- attack.defense_evasion
|
||||
- attack.t1085
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
Command:
|
||||
- 'rundll32.exe *,zxFunction*'
|
||||
- 'rundll32.exe *,RemoteDiskXXXXX'
|
||||
|
||||
Regular → Executable
+6
-2
@@ -6,12 +6,16 @@ date: 2017/06/03
|
||||
references:
|
||||
- https://www.virustotal.com/en/file/9b4971349ae85aa09c0a69852ed3e626c954954a3927b3d1b6646f139b930022/analysis/
|
||||
- https://www.hybrid-analysis.com/sample/9b4971349ae85aa09c0a69852ed3e626c954954a3927b3d1b6646f139b930022?environmentId=100
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.t1059
|
||||
- attack.defense_evasion
|
||||
- attack.t1085
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
CommandLine: '*\rundll32.exe *,InstallArcherSvc'
|
||||
condition: selection
|
||||
fields:
|
||||
|
||||
@@ -1,9 +1,9 @@
|
||||
title: Buffer Overflow Attempts
|
||||
description: Detects buffer overflow attempts in Linux system log files
|
||||
description: Detects buffer overflow attempts in Unix system log files
|
||||
references:
|
||||
- https://github.com/ossec/ossec-hids/blob/master/etc/rules/attack_rules.xml
|
||||
logsource:
|
||||
product: linux
|
||||
product: unix
|
||||
detection:
|
||||
keywords:
|
||||
- 'attempt to execute code on stack by'
|
||||
|
||||
@@ -0,0 +1,27 @@
|
||||
title: Clear Command History
|
||||
status: experimental
|
||||
description: Clear command history in linux which is used for defense evasion.
|
||||
references:
|
||||
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1146/T1146.yaml
|
||||
- https://attack.mitre.org/techniques/T1146/
|
||||
author: Patrick Bareiss
|
||||
date: 2019/03/24
|
||||
logsource:
|
||||
product: linux
|
||||
detection:
|
||||
keywords:
|
||||
- 'rm *bash_history'
|
||||
- 'echo "" > *bash_history'
|
||||
- 'cat /dev/null > *bash_history'
|
||||
- 'ln -sf /dev/null *bash_history'
|
||||
- 'truncate -s0 *bash_history'
|
||||
# - 'unset HISTFILE' # prone to false positives
|
||||
- 'export HISTFILESIZE=0'
|
||||
- 'history -c'
|
||||
condition: keywords
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1146
|
||||
@@ -0,0 +1,64 @@
|
||||
title: Privilege Escalation Preparation
|
||||
status: experimental
|
||||
description: Detects suspicious shell commands indicating the information gathering phase as preparation for the Privilege Escalation.
|
||||
references:
|
||||
- https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
|
||||
- https://patrick-bareiss.com/detect-privilege-escalation-preparation-in-linux-with-sigma/
|
||||
author: Patrick Bareiss
|
||||
date: 2019/04/05
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.t1068
|
||||
level: medium
|
||||
logsource:
|
||||
product: linux
|
||||
detection:
|
||||
keywords:
|
||||
# distribution type and kernel version
|
||||
- 'cat /etc/issue'
|
||||
- 'cat /etc/*-release'
|
||||
- 'cat /proc/version'
|
||||
- 'uname -a'
|
||||
- 'uname -mrs'
|
||||
- 'rpm -q kernel'
|
||||
- 'dmesg | grep Linux'
|
||||
- 'ls /boot | grep vmlinuz-'
|
||||
# environment variables
|
||||
- 'cat /etc/profile'
|
||||
- 'cat /etc/bashrc'
|
||||
- 'cat ~/.bash_profile'
|
||||
- 'cat ~/.bashrc'
|
||||
- 'cat ~/.bash_logout'
|
||||
# applications and services as root
|
||||
- 'ps -aux | grep root'
|
||||
- 'ps -ef | grep root'
|
||||
# scheduled tasks
|
||||
- 'crontab -l'
|
||||
- 'cat /etc/cron*'
|
||||
- 'cat /etc/cron.allow'
|
||||
- 'cat /etc/cron.deny'
|
||||
- 'cat /etc/crontab'
|
||||
# search for plain text user/passwords
|
||||
- 'grep -i user *'
|
||||
- 'grep -i pass *'
|
||||
# networking
|
||||
- 'ifconfig'
|
||||
- 'cat /etc/network/interfaces'
|
||||
- 'cat /etc/sysconfig/network'
|
||||
- 'cat /etc/resolv.conf'
|
||||
- 'cat /etc/networks'
|
||||
- 'iptables -L'
|
||||
- 'lsof -i'
|
||||
- 'netstat -antup'
|
||||
- 'netstat -antpx'
|
||||
- 'netstat -tulpn'
|
||||
- 'arp -e'
|
||||
- 'route'
|
||||
# sensitive files
|
||||
- 'cat /etc/passwd'
|
||||
- 'cat /etc/group'
|
||||
- 'cat /etc/shadow'
|
||||
timeframe: 30m
|
||||
condition: keywords | count() by host > 6
|
||||
falsepositives:
|
||||
- Troubleshooting on Linux Machines
|
||||
@@ -6,6 +6,8 @@ references:
|
||||
- http://pastebin.com/FtygZ1cg
|
||||
- https://artkond.com/2017/03/23/pivoting-guide/
|
||||
author: Florian Roth
|
||||
date: 2017/08/21
|
||||
modified: 2019/02/05
|
||||
logsource:
|
||||
product: linux
|
||||
detection:
|
||||
@@ -15,30 +17,37 @@ detection:
|
||||
- 'wget * - http* | sh'
|
||||
- 'wget * - http* | bash'
|
||||
- 'python -m SimpleHTTPServer'
|
||||
- 'import pty; pty.spawn'
|
||||
- '-m http.server' # Python 3
|
||||
- 'import pty; pty.spawn*'
|
||||
- 'socat exec:*'
|
||||
- 'socat -O /tmp/*'
|
||||
- 'socat tcp-connect*'
|
||||
- '*echo binary >>*'
|
||||
# Malware
|
||||
- '*wget *; chmod +x*'
|
||||
- '*wget *; chmod 777 *'
|
||||
- '*cd /tmp || cd /var/run || cd /mnt*'
|
||||
# Apache Struts in-the-wild exploit codes
|
||||
- 'stop;service iptables stop;'
|
||||
- 'stop;SuSEfirewall2 stop;'
|
||||
- 'chmod 777 2020'
|
||||
- '">>/etc/rc.local;'
|
||||
- 'wget -c *;chmod 777'
|
||||
- '*stop;service iptables stop;*'
|
||||
- '*stop;SuSEfirewall2 stop;*'
|
||||
- 'chmod 777 2020*'
|
||||
- '*>>/etc/rc.local'
|
||||
# Metasploit framework exploit codes
|
||||
- 'base64 -d /tmp/'
|
||||
- ' | base64 -d'
|
||||
- '/bin/chmod u+s'
|
||||
- 'chmod +s /tmp/'
|
||||
- 'chmod u+s /tmp/'
|
||||
- '/tmp/haxhax'
|
||||
- '/tmp/ns_sploit'
|
||||
- 'nc -l -p '
|
||||
- 'cp /bin/ksh '
|
||||
- 'cp /bin/sh '
|
||||
- ' /tmp/*.b64 '
|
||||
- '/tmp/ysocereal.jar'
|
||||
- '*base64 -d /tmp/*'
|
||||
- '* | base64 -d *'
|
||||
- '*/chmod u+s *'
|
||||
- '*chmod +s /tmp/*'
|
||||
- '*chmod u+s /tmp/*'
|
||||
- '* /tmp/haxhax*'
|
||||
- '* /tmp/ns_sploit*'
|
||||
- 'nc -l -p *'
|
||||
- 'cp /bin/ksh *'
|
||||
- 'cp /bin/sh *'
|
||||
- '* /tmp/*.b64 *'
|
||||
- '*/tmp/ysocereal.jar*'
|
||||
- '*/tmp/x *'
|
||||
- '*; chmod +x /tmp/*'
|
||||
- '*;chmod +x /tmp/*'
|
||||
condition: keywords
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
@@ -0,0 +1,40 @@
|
||||
title: Suspicious Reverse Shell Command Line
|
||||
status: experimental
|
||||
description: Detects suspicious shell commands or program code that may be exected or used in command line to establish a reverse shell
|
||||
references:
|
||||
- https://alamot.github.io/reverse_shells/
|
||||
author: Florian Roth
|
||||
date: 2019/04/02
|
||||
logsource:
|
||||
product: linux
|
||||
detection:
|
||||
keywords:
|
||||
- 'BEGIN {s = "/inet/tcp/0/'
|
||||
- 'bash -i >& /dev/tcp/'
|
||||
- 'bash -i >& /dev/udp/'
|
||||
- 'sh -i >$ /dev/udp/'
|
||||
- 'sh -i >$ /dev/tcp/'
|
||||
- '&& while read line 0<&5; do'
|
||||
- '/bin/bash -c exec 5<>/dev/tcp/'
|
||||
- '/bin/bash -c exec 5<>/dev/udp/'
|
||||
- 'nc -e /bin/sh '
|
||||
- '/bin/sh | nc'
|
||||
- 'rm -f backpipe; mknod /tmp/backpipe p && nc '
|
||||
- ';socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i))))'
|
||||
- ';STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'
|
||||
- '/bin/sh -i <&3 >&3 2>&3'
|
||||
- 'uname -a; w; id; /bin/bash -i'
|
||||
- '$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2); $stream.Write($sendbyte,0,$sendbyte.Length); $stream.Flush()};'
|
||||
- ";os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);os.putenv('HISTFILE','/dev/null');"
|
||||
- '.to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'
|
||||
- ';while(cmd=c.gets);IO.popen(cmd,"r"){|io|c.print'
|
||||
- "socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp:"
|
||||
- 'rm -f /tmp/p; mknod /tmp/p p &&'
|
||||
- ' | /bin/bash | telnet '
|
||||
- ',echo=0,raw tcp-listen:'
|
||||
- 'nc -lvvp '
|
||||
- 'xterm -display 1'
|
||||
condition: keywords
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -0,0 +1,16 @@
|
||||
title: SSHD Error Message CVE-2018-15473
|
||||
description: Detects exploitation attempt using public exploit code for CVE-2018-15473
|
||||
references:
|
||||
- https://github.com/Rhynorater/CVE-2018-15473-Exploit
|
||||
author: Florian Roth
|
||||
date: 2017/08/24
|
||||
logsource:
|
||||
product: linux
|
||||
service: sshd
|
||||
detection:
|
||||
keywords:
|
||||
- 'error: buffer_get_ret: trying to get more bytes 1907 than in buffer 308 [preauth]'
|
||||
condition: keywords
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: medium
|
||||
@@ -0,0 +1,17 @@
|
||||
title: JexBoss Command Sequence
|
||||
description: Detects suspicious command sequence that JexBoss
|
||||
references:
|
||||
- https://www.us-cert.gov/ncas/analysis-reports/AR18-312A
|
||||
author: Florian Roth
|
||||
date: 2017/08/24
|
||||
logsource:
|
||||
product: linux
|
||||
detection:
|
||||
selection1:
|
||||
- 'bash -c /bin/bash'
|
||||
selection2:
|
||||
- '&/dev/tcp/'
|
||||
condition: selection1 and selection2
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -0,0 +1,19 @@
|
||||
title: Possible DNS Tunneling
|
||||
status: experimental
|
||||
description: Normally, DNS logs contain a limited amount of different dns queries for a single domain. This rule detects a high amount of queries for a single domain, which can be an indicator that DNS is used to transfer data.
|
||||
references:
|
||||
- https://zeltser.com/c2-dns-tunneling/
|
||||
- https://patrick-bareiss.com/detect-c2-traffic-over-dns-using-sigma/
|
||||
author: Patrick Bareiss
|
||||
date: 2019/04/07
|
||||
logsource:
|
||||
product: dns
|
||||
detection:
|
||||
selection:
|
||||
parent_domain: '*'
|
||||
condition: selection | count(dns_query) by parent_domain > 1000
|
||||
falsepositives:
|
||||
- Valid software, which uses dns for transferring data
|
||||
level: high
|
||||
tags:
|
||||
- attack.t1043
|
||||
@@ -0,0 +1,23 @@
|
||||
title: DNS TXT Answer with possible execution strings
|
||||
status: experimental
|
||||
description: Detects strings used in command execution in DNS TXT Answer
|
||||
references:
|
||||
- https://twitter.com/stvemillertime/status/1024707932447854592
|
||||
- https://github.com/samratashok/nishang/blob/master/Backdoors/DNS_TXT_Pwnage.ps1
|
||||
tags:
|
||||
- attack.t1071
|
||||
author: Markus Neis
|
||||
date: 2018/08/08
|
||||
logsource:
|
||||
category: dns
|
||||
detection:
|
||||
selection:
|
||||
record_type: 'TXT'
|
||||
answer:
|
||||
- '*IEX*'
|
||||
- '*Invoke-Expression*'
|
||||
- '*cmd.exe*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -0,0 +1,20 @@
|
||||
title: Chafer Malware URL Pattern
|
||||
status: experimental
|
||||
description: Detects HTTP requests used by Chafer malware
|
||||
references:
|
||||
- https://securelist.com/chafer-used-remexi-malware/89538/
|
||||
author: Florian Roth
|
||||
date: 2019/01/31
|
||||
logsource:
|
||||
category: proxy
|
||||
detection:
|
||||
selection:
|
||||
c-uri-query: '*/asp.asp?ui=*'
|
||||
condition: selection
|
||||
fields:
|
||||
- ClientIP
|
||||
- URL
|
||||
- UserAgent
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: critical
|
||||
@@ -0,0 +1,27 @@
|
||||
title: CobaltStrike Malleable Amazon browsing traffic profile
|
||||
status: experimental
|
||||
description: Detects Malleable Amazon Profile
|
||||
references:
|
||||
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/master/normal/amazon.profile
|
||||
- https://www.hybrid-analysis.com/sample/ee5eca8648e45e2fea9dac0d920ef1a1792d8690c41ee7f20343de1927cc88b9?environmentId=100
|
||||
author: Markus Neis
|
||||
tags:
|
||||
- attack.t1102
|
||||
logsource:
|
||||
category: proxy
|
||||
detection:
|
||||
selection1:
|
||||
UserAgent: "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko"
|
||||
HttpMethod: 'GET'
|
||||
URL: '/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books'
|
||||
Host: 'www.amazon.com'
|
||||
Cookie: '*=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996'
|
||||
selection2:
|
||||
UserAgent: "Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko"
|
||||
HttpMethod: 'POST'
|
||||
URL: '/N4215/adj/amzn.us.sr.aps'
|
||||
Host: 'www.amazon.com'
|
||||
condition: selection1 or selection2
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -0,0 +1,19 @@
|
||||
title: CobaltStrike Malleable (OCSP) Profile
|
||||
status: experimental
|
||||
description: Detects Malleable (OCSP) Profile with Typo (OSCP) in URL
|
||||
references:
|
||||
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/master/normal/ocsp.profile
|
||||
author: Markus Neis
|
||||
tags:
|
||||
- attack.t1102
|
||||
logsource:
|
||||
category: proxy
|
||||
detection:
|
||||
selection:
|
||||
URL: '*/oscp/*'
|
||||
Host: 'ocsp.verisign.com'
|
||||
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -0,0 +1,21 @@
|
||||
title: CobaltStrike Malleable OneDrive browsing traffic profile
|
||||
status: experimental
|
||||
description: Detects Malleable OneDrive Profile
|
||||
references:
|
||||
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/master/normal/onedrive_getonly.profile
|
||||
author: Markus Neis
|
||||
tags:
|
||||
- attack.t1102
|
||||
logsource:
|
||||
category: proxy
|
||||
detection:
|
||||
selection:
|
||||
HttpMethod: 'GET'
|
||||
URL: '*?manifest=wac'
|
||||
Host: 'onedrive.live.com'
|
||||
filter:
|
||||
URL: 'http*://onedrive.live.com/*'
|
||||
condition: selection and not filter
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -56,7 +56,6 @@ detection:
|
||||
- '*.mooo.com'
|
||||
- '*.dns-dns.com'
|
||||
- '*.strangled.net'
|
||||
- '*.ddns.info'
|
||||
- '*.adultdns.net'
|
||||
- '*.craftx.biz'
|
||||
- '*.ddns01.com'
|
||||
|
||||
@@ -53,14 +53,12 @@ detection:
|
||||
- '*.vip'
|
||||
- '*.party'
|
||||
- '*.tech'
|
||||
- '*.tech'
|
||||
- '*.xyz'
|
||||
- '*.date'
|
||||
- '*.faith'
|
||||
- '*.zip'
|
||||
- '*.cricket'
|
||||
- '*.space'
|
||||
- '*.top'
|
||||
# McAfee report
|
||||
- '*.info'
|
||||
- '*.vn'
|
||||
@@ -94,11 +92,12 @@ detection:
|
||||
- '*.trade'
|
||||
- '*.accountant'
|
||||
# Spamhaus 2018 https://krebsonsecurity.com/2018/06/bad-men-at-work-please-dont-click/
|
||||
- '*.click'
|
||||
- '*.cf'
|
||||
- '*.gq'
|
||||
- '*.ml'
|
||||
- '*.ga'
|
||||
# Custom
|
||||
- '*.pw'
|
||||
condition: selection
|
||||
fields:
|
||||
- ClientIP
|
||||
|
||||
@@ -8,9 +8,8 @@ logsource:
|
||||
category: proxy
|
||||
detection:
|
||||
selection:
|
||||
UserAgent:
|
||||
# Empty string - as used by Powershell's (New-Object Net.WebClient).DownloadString
|
||||
- ''
|
||||
# Empty string - as used by Powershell's (New-Object Net.WebClient).DownloadString
|
||||
UserAgent: ''
|
||||
condition: selection
|
||||
fields:
|
||||
- ClientIP
|
||||
|
||||
@@ -1,46 +1,52 @@
|
||||
title: APT User Agent
|
||||
status: experimental
|
||||
description: Detects suspicious user agent strings used in APT malware in proxy logs
|
||||
references:
|
||||
- Internal Research
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
category: proxy
|
||||
detection:
|
||||
selection:
|
||||
UserAgent:
|
||||
# APT Related
|
||||
- 'SJZJ (compatible; MSIE 6.0; Win32)' # APT Backspace
|
||||
- 'Mozilla/5.0 (Windows NT 6.; WOW64; rv:20.0) Gecko/20100101 Firefox/20.0' # APT GrizzlySteppe - ChopStick - US CERT https://goo.gl/1DTHwi
|
||||
- 'User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC' # Comment Crew Miniasp
|
||||
- 'Mozilla/4.0 (compatible; MSIE 7.4; Win32;32-bit)' # Comment Crew Miniasp
|
||||
- 'webclient' # Naikon APT
|
||||
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/200' # Naikon APT
|
||||
- 'Mozilla/4.0 (compatible; MSI 6.0;' # SnowGlobe Babar - yes, it is cut
|
||||
- 'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0' # Sofacy - Xtunnel
|
||||
- 'Mozilla/5.0 (Windows NT 6.2; WOW64; rv:20.0) Gecko/20100101 Firefox/' # Sofacy - Xtunnel
|
||||
- 'Mozilla/5.0 (Windows NT 6.; WOW64; rv:20.0) Gecko/20100101 Firefox/2' # Sofacy - Xtunnel
|
||||
- 'Mozilla/4.0' # Derusbi backdoor ELF https://github.com/fideliscyber/indicators/tree/master/FTA-1021
|
||||
- 'Netscape' # Unit78020 Malware
|
||||
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7' # Unit78020 Malware
|
||||
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.13) Firefox/3.6.13 GTB7.1' # Winnti related
|
||||
- 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)' # Winnti related
|
||||
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NETCLR 2.0.50727)' # APT17
|
||||
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; SV1)' # Bronze Butler - Daserf
|
||||
- 'Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; SV1)' # Bronze Butler - Daserf
|
||||
- 'Mozilla/4.0 (compatible; MSIE 8.0; Win32)' # TSCookie https://app.any.run/tasks/0996b314-5133-491b-8d23-d431ffdec597
|
||||
- 'Mozilla v5.1 (Windows NT 6.1; rv:6.0.1) Gecko/20100101 Firefox/6.0.1' # Delphi downloader https://www.welivesecurity.com/2018/04/24/sednit-update-analysis-zebrocy/
|
||||
- 'Mozilla/6.1 (compatible; MSIE 9.0; Windows NT 5.3; Trident/5.0)' # VPNFilter https://blog.talosintelligence.com/2018/05/VPNFilter.html
|
||||
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.04506.648; InfoPath.1)' # Sofacy User-Agent https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
|
||||
- 'Mozilla/5.0 (Windows NT 6.1; WOW64) WinHttp/1.6.3.8 (WinHTTP/5.1) like Gecko' # Sofacy User-Agent https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
|
||||
- 'Mozilla v5.1 *' # Sofacy Zebrocy samples
|
||||
- 'MSIE 8.0' # Sofacy Azzy Backdoor from https://www.hybrid-analysis.com/sample/a80e29c0757bee05338fd5c22a542d852ad86c477068e3eb4aacc1c3e59e2eef?environmentId=100
|
||||
condition: selection
|
||||
fields:
|
||||
- ClientIP
|
||||
- URL
|
||||
- UserAgent
|
||||
falsepositives:
|
||||
- Old browsers
|
||||
level: high
|
||||
|
||||
title: APT User Agent
|
||||
status: experimental
|
||||
description: Detects suspicious user agent strings used in APT malware in proxy logs
|
||||
references:
|
||||
- Internal Research
|
||||
author: Florian Roth, Markus Neis
|
||||
logsource:
|
||||
category: proxy
|
||||
detection:
|
||||
selection:
|
||||
UserAgent:
|
||||
# APT Related
|
||||
- 'SJZJ (compatible; MSIE 6.0; Win32)' # APT Backspace
|
||||
- 'Mozilla/5.0 (Windows NT 6.; WOW64; rv:20.0) Gecko/20100101 Firefox/20.0' # APT GrizzlySteppe - ChopStick - US CERT https://goo.gl/1DTHwi
|
||||
- 'User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC' # Comment Crew Miniasp
|
||||
- 'Mozilla/4.0 (compatible; MSIE 7.4; Win32;32-bit)' # Comment Crew Miniasp
|
||||
- 'webclient' # Naikon APT
|
||||
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/200' # Naikon APT
|
||||
- 'Mozilla/4.0 (compatible; MSI 6.0;' # SnowGlobe Babar - yes, it is cut
|
||||
- 'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0' # Sofacy - Xtunnel
|
||||
- 'Mozilla/5.0 (Windows NT 6.2; WOW64; rv:20.0) Gecko/20100101 Firefox/' # Sofacy - Xtunnel
|
||||
- 'Mozilla/5.0 (Windows NT 6.; WOW64; rv:20.0) Gecko/20100101 Firefox/2' # Sofacy - Xtunnel
|
||||
- 'Mozilla/4.0' # Derusbi backdoor ELF https://github.com/fideliscyber/indicators/tree/master/FTA-1021
|
||||
- 'Netscape' # Unit78020 Malware
|
||||
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7' # Unit78020 Malware
|
||||
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.13) Firefox/3.6.13 GTB7.1' # Winnti related
|
||||
- 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)' # Winnti related
|
||||
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NETCLR 2.0.50727)' # APT17
|
||||
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; SV1)' # Bronze Butler - Daserf
|
||||
- 'Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; SV1)' # Bronze Butler - Daserf
|
||||
- 'Mozilla/4.0 (compatible; MSIE 8.0; Win32)' # TSCookie https://app.any.run/tasks/0996b314-5133-491b-8d23-d431ffdec597
|
||||
- 'Mozilla v5.1 (Windows NT 6.1; rv:6.0.1) Gecko/20100101 Firefox/6.0.1' # Delphi downloader https://www.welivesecurity.com/2018/04/24/sednit-update-analysis-zebrocy/
|
||||
- 'Mozilla/6.1 (compatible; MSIE 9.0; Windows NT 5.3; Trident/5.0)' # VPNFilter https://blog.talosintelligence.com/2018/05/VPNFilter.html
|
||||
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.04506.648; InfoPath.1)' # Sofacy User-Agent https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
|
||||
- 'Mozilla/5.0 (Windows NT 6.1; WOW64) WinHttp/1.6.3.8 (WinHTTP/5.1) like Gecko' # Sofacy User-Agent https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
|
||||
- 'Mozilla v5.1 *' # Sofacy Zebrocy samples
|
||||
- 'MSIE 8.0' # Sofacy Azzy Backdoor from https://www.hybrid-analysis.com/sample/a80e29c0757bee05338fd5c22a542d852ad86c477068e3eb4aacc1c3e59e2eef?environmentId=100
|
||||
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)' # https://www.fireeye.com/blog/threat-research/2018/07/microsoft-office-vulnerabilities-used-to-distribute-felixroot-backdoor.html
|
||||
- 'Mozilla/4.0 (compatible; RMS)' # Attacks on industrial enterprises using RMS and TeamViewer https://goo.gl/GthvTw
|
||||
- 'Mozilla/4.0 (compatible; MSIE 6.0; DynGate)' # Attacks on industrial enterprises using RMS and TeamViewer https://goo.gl/GthvTw
|
||||
- 'O/9.27 (W; U; Z)' # Cmstar https://www.virustotal.com/#/file/e4328011bb2b04abc856ccd04404c9f95d67167f6c291d343e8ffa8aa2aa2099/details
|
||||
- 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; Trident/5.0*' # KerrDown UA https://goo.gl/s2WU6o
|
||||
- 'Mozilla/5.0 (Windows NT 9; *' # Suspicious 'Windows NT 9' user agent - used by APT33 malware in 2018
|
||||
condition: selection
|
||||
fields:
|
||||
- ClientIP
|
||||
- URL
|
||||
- UserAgent
|
||||
falsepositives:
|
||||
- Old browsers
|
||||
level: high
|
||||
|
||||
|
||||
@@ -0,0 +1,26 @@
|
||||
title: Bitsadmin to Uncommon TLD
|
||||
status: experimental
|
||||
description: Detects Bitsadmin connections to domains with uncommon TLDs
|
||||
- https://twitter.com/jhencinski/status/1102695118455349248
|
||||
- https://isc.sans.edu/forums/diary/Investigating+Microsoft+BITS+Activity/23281/
|
||||
author: Florian Roth
|
||||
date: 2019/03/07
|
||||
logsource:
|
||||
category: proxy
|
||||
detection:
|
||||
selection:
|
||||
UserAgent:
|
||||
- 'Microsoft BITS/*'
|
||||
falsepositives:
|
||||
r-dns:
|
||||
- '*.com'
|
||||
- '*.net'
|
||||
- '*.org'
|
||||
condition: selection and not falsepositives
|
||||
fields:
|
||||
- ClientIP
|
||||
- URL
|
||||
- UserAgent
|
||||
falsepositives:
|
||||
- Rare programs that use Bitsadmin and update from regional TLDs e.g. .uk or .ca
|
||||
level: high
|
||||
@@ -22,6 +22,7 @@ detection:
|
||||
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Trident/4.0; SIMBAR={7DB0F6DE-8DE7-4841-9084-28FA914B0F2E}; SLCC1; .N'
|
||||
- 'Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)' # only use in proxy logs - not for detection in web server logs
|
||||
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/525.13 (KHTML, like Gecko) Chrome/4.0.221.6 Safari/525.13'
|
||||
- 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MAAU)' # Payloads
|
||||
|
||||
# Metasploit Update by Florian Roth 08.07.2017
|
||||
- 'Mozilla/5.0'
|
||||
@@ -33,6 +34,7 @@ detection:
|
||||
- 'X-FORWARDED-FOR'
|
||||
- 'DotDotPwn v2.1'
|
||||
- 'SIPDROID'
|
||||
- 'Mozilla/5.0 (Windows NT 10.0; Win32; x32; rv:60.0)' # CobaltStrike https://unit42.paloaltonetworks.com/tracking-oceanlotus-new-downloader-kerrdown/
|
||||
|
||||
# Exploits
|
||||
- '*wordpress hash grabber*'
|
||||
|
||||
@@ -60,6 +60,7 @@ detection:
|
||||
|
||||
# Hack tool
|
||||
- 'ruler' # https://www.crowdstrike.com/blog/using-outlook-forms-lateral-movement-persistence/
|
||||
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; pt-PT; rv:1.9.1.2) Gecko/20090729 Firefox/3.5.2 (.NET CLR 3.5.30729)' # SQLi Dumper
|
||||
condition: selection
|
||||
fields:
|
||||
- ClientIP
|
||||
|
||||
@@ -48,6 +48,8 @@ detection:
|
||||
- 'MSIE' # Toby web shell
|
||||
- '*(Charon; Inferno)' # Loki Bot
|
||||
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/5.0)' # Fareit / Pony
|
||||
- 'Mozilla/4.0 (compatible; MSIE 6.1; Windows NT)' # https://goo.gl/g43qjs
|
||||
- 'Mozilla/4.0(compatible; MSIE 6.0; Windows NT 5.1)' # MacControl malware https://goo.gl/sqY3Ja https://www.symantec.com/connect/blogs/osxmacontrol-back-it-again
|
||||
|
||||
# Others
|
||||
- '* pxyscand*'
|
||||
|
||||
@@ -20,7 +20,12 @@ detection:
|
||||
- ' Mozilla/*' # leading space
|
||||
- 'Mozila/*' # single 'l'
|
||||
- '_'
|
||||
condition: selection
|
||||
- 'CertUtil URL Agent' # https://twitter.com/stvemillertime/status/985150675527974912
|
||||
- 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0)' # CobaltStrike Beacon https://unit42.paloaltonetworks.com/tracking-oceanlotus-new-downloader-kerrdown/
|
||||
falsepositives:
|
||||
UserAgent:
|
||||
- 'Mozilla/3.0 * Acrobat *' # Acrobat with linked content
|
||||
condition: selection and not falsepositives
|
||||
fields:
|
||||
- ClientIP
|
||||
- URL
|
||||
|
||||
@@ -0,0 +1,16 @@
|
||||
title: Apache Threading Error
|
||||
status: experimental
|
||||
description: Detects an issue in apache logs that reports threading related errors
|
||||
author: Florian Roth
|
||||
date: 2019/01/22
|
||||
references:
|
||||
- https://github.com/hannob/apache-uaf/blob/master/README.md
|
||||
logsource:
|
||||
product: apache
|
||||
detection:
|
||||
keywords:
|
||||
- '__pthread_tpp_change_priority: Assertion `new_prio == -1 || (new_prio >= fifo_min_prio && new_prio <= fifo_max_prio)'
|
||||
condition: keywords
|
||||
falsepositives:
|
||||
- https://bz.apache.org/bugzilla/show_bug.cgi?id=46185
|
||||
level: medium
|
||||
@@ -0,0 +1,30 @@
|
||||
title: Oracle WebLogic Exploit
|
||||
description: Detects access to a webshell droped into a keytore folder on the WebLogic server
|
||||
author: Florian Roth
|
||||
date: 2018/07/22
|
||||
status: experimental
|
||||
references:
|
||||
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2894
|
||||
- https://twitter.com/pyn3rd/status/1020620932967223296
|
||||
- https://github.com/LandGrey/CVE-2018-2894
|
||||
logsource:
|
||||
category: webserver
|
||||
detection:
|
||||
selection:
|
||||
c-uri-path:
|
||||
- '*/config/keystore/*.js*'
|
||||
condition: selection
|
||||
fields:
|
||||
- c-ip
|
||||
- c-dns
|
||||
falsepositives:
|
||||
- Unknown
|
||||
tags:
|
||||
- attack.t1100
|
||||
- attack.t1190
|
||||
- attack.initial_access
|
||||
- attack.persistence
|
||||
- attack.privilege_escalation
|
||||
- cve.2018-2894
|
||||
level: critical
|
||||
|
||||
@@ -1,5 +1,5 @@
|
||||
title: Webshell Detection by Keyword
|
||||
description: Detects webshells that use GET requests by keyword sarches in URL strings
|
||||
description: Detects webshells that use GET requests by keyword searches in URL strings
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
category: webserver
|
||||
|
||||
@@ -0,0 +1,23 @@
|
||||
title: Persistence and Execution at scale via GPO scheduled task
|
||||
description: Detect lateral movement using GPO scheduled task, ususally used to deploy ransomware at scale
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://twitter.com/menasec1/status/1106899890377052160
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.lateral_movement
|
||||
- attack.t1053
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5145
|
||||
ShareName: \\*\SYSVOL
|
||||
RelativeTargetName: '*ScheduledTasks.xml'
|
||||
Accesses: '*WriteData*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- if the source IP is not localhost then it's super suspicious, better to monitor both local and remote changes to GPO scheduledtasks
|
||||
level: high
|
||||
@@ -0,0 +1,25 @@
|
||||
title: Powerview Add-DomainObjectAcl DCSync AD Extend Right
|
||||
description: backdooring domain object to grant the rights associated with DCSync to a regular user or machine account using Powerview\Add-DomainObjectAcl DCSync Extended Right cmdlet, will allow to re-obtain the pwd hashes of any user/computer
|
||||
status: experimental
|
||||
date: 2019/04/03
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://twitter.com/menasec1/status/1111556090137903104
|
||||
- https://www.specterops.io/assets/resources/an_ace_up_the_sleeve.pdf
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.persistence
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5136
|
||||
LDAPDisplayName: 'ntSecurityDescriptor'
|
||||
Value:
|
||||
- '*1131f6ad-9c07-11d1-f79f-00c04fc2dcd2*'
|
||||
- '*1131f6aa-9c07-11d1-f79f-00c04fc2dcd2*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- New Domain Controller computer account, check user SIDs witin the value attribute of event 5136 and verify if it's a regular user or DC computer account.
|
||||
level: critical
|
||||
@@ -0,0 +1,34 @@
|
||||
title: AD Privileged Users or Groups Reconnaissance
|
||||
description: Detect priv users or groups recon based on 4661 eventid and known privileged users or groups SIDs
|
||||
references:
|
||||
- https://blog.menasec.net/2019/02/threat-hunting-5-detecting-enumeration.html
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.t1087
|
||||
status: experimental
|
||||
author: Samir Bousseaden
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
definition: 'Requirements: enable Object Access SAM on your Domain Controllers'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4661
|
||||
ObjectType:
|
||||
- 'SAM_USER'
|
||||
- 'SAM_GROUP'
|
||||
ObjectName:
|
||||
- '*-512'
|
||||
- '*-502'
|
||||
- '*-500'
|
||||
- '*-505'
|
||||
- '*-519'
|
||||
- '*-520'
|
||||
- '*-544'
|
||||
- '*-551'
|
||||
- '*-555'
|
||||
- '*admin*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- if source account name is not an admin then its super suspicious
|
||||
level: high
|
||||
@@ -1,13 +1,17 @@
|
||||
title: Admin User Remote Logon
|
||||
description: Detect remote login by Administrator user depending on internal pattern
|
||||
references:
|
||||
- https://car.mitre.org/wiki/CAR-2016-04-005
|
||||
- https://car.mitre.org/wiki/CAR-2016-04-005
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1078
|
||||
- car.2016-04-005
|
||||
status: experimental
|
||||
author: juju4
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Identifiable administrators usernames (pattern or special unique character. ex: "Admin-*"), internal policy mandating use only as secondary account'
|
||||
definition: 'Requirements: Identifiable administrators usernames (pattern or special unique character. ex: "Admin-*"), internal policy mandating use only as secondary account'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4624
|
||||
@@ -15,6 +19,6 @@ detection:
|
||||
AuthenticationPackageName: Negotiate
|
||||
AccountName: 'Admin-*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
falsepositives:
|
||||
- Legitimate administrative activity
|
||||
level: low
|
||||
|
||||
@@ -1,11 +1,14 @@
|
||||
title: Access to ADMIN$ Share
|
||||
description: Detects access to $ADMIN share
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1077
|
||||
status: experimental
|
||||
author: Florian Roth
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit File Share" must be configured for Success/Failure'
|
||||
definition: 'The advanced audit policy setting "Object Access > Audit File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5140
|
||||
|
||||
@@ -1,12 +1,15 @@
|
||||
title: Enabled User Right in AD to Control User Objects
|
||||
description: Detects scenario where if a user is assigned the SeEnableDelegationPrivilege right in Active Directory it would allow control of other AD user objects.
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.t1078
|
||||
references:
|
||||
- https://www.harmj0y.net/blog/activedirectory/the-most-dangerous-user-right-you-probably-have-never-heard-of/
|
||||
author: '@neu5ron'
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Policy Change > Audit Authorization Policy Change, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Policy Change\Audit Authorization Policy Change'
|
||||
definition: 'Requirements: Audit Policy : Policy Change > Audit Authorization Policy Change, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Policy Change\Audit Authorization Policy Change'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4704
|
||||
|
||||
@@ -1,14 +1,19 @@
|
||||
title: Active Directory User Backdoors
|
||||
description: Detects scenarios where one can control another users account without having to use their credentials via msDS-AllowedToDelegateTo and or service principal names (SPN).
|
||||
description: Detects scenarios where one can control another users or computers account without having to use their credentials.
|
||||
references:
|
||||
- https://msdn.microsoft.com/en-us/library/cc220234.aspx
|
||||
- https://adsecurity.org/?p=3466
|
||||
- https://www.harmj0y.net/blog/redteaming/another-word-on-delegation/
|
||||
author: '@neu5ron'
|
||||
tags:
|
||||
- attack.t1098
|
||||
- attack.credential_access
|
||||
- attack.persistence
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description1: 'Requirements: Audit Policy : Account Management > Audit User Account Management, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit User Account Management'
|
||||
description2: 'Requirements: Audit Policy : DS Access > Audit Directory Service Changes, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\DS Access\Audit Directory Service Changes'
|
||||
definition1: 'Requirements: Audit Policy : Account Management > Audit User Account Management, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit User Account Management'
|
||||
definition2: 'Requirements: Audit Policy : DS Access > Audit Directory Service Changes, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\DS Access\Audit Directory Service Changes'
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 4738
|
||||
@@ -21,7 +26,10 @@ detection:
|
||||
EventID: 5136
|
||||
ObjectClass: 'user'
|
||||
AttributeLDAPDisplayName: 'servicePrincipalName'
|
||||
condition: (selection1 and not filter1) or selection2 or selection3
|
||||
selection4:
|
||||
EventID: 5136
|
||||
AttributeLDAPDisplayName: 'msDS-AllowedToActOnBehalfOfOtherIdentity'
|
||||
condition: (selection1 and not filter1) or selection2 or selection3 or selection4
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
|
||||
@@ -4,10 +4,13 @@ references:
|
||||
- https://adsecurity.org/?p=2053
|
||||
- https://www.harmj0y.net/blog/activedirectory/roasting-as-reps/
|
||||
author: '@neu5ron'
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1089
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Account Management > Audit User Account Management, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit User Account Management'
|
||||
definition: 'Requirements: Audit Policy : Account Management > Audit User Account Management, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit User Account Management'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4738
|
||||
|
||||
@@ -1,6 +1,13 @@
|
||||
title: Hacktool Use
|
||||
description: This method detects well-known keywords, certain field combination that appear in Windows Eventlog when certain hack tools are used
|
||||
author: Florian Roth
|
||||
tags:
|
||||
- attack.discovery
|
||||
- attack.execution
|
||||
- attack.t1087
|
||||
- attack.t1075
|
||||
- attack.t1114
|
||||
- attack.t1059
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
|
||||
@@ -0,0 +1,23 @@
|
||||
title: LSASS Access Detected via Attack Surface Reduction
|
||||
description: Detects Access to LSASS Process
|
||||
status: experimental
|
||||
references:
|
||||
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-exploit-guard/attack-surface-reduction-exploit-guard?WT.mc_id=twitter
|
||||
author: Markus Neis
|
||||
date: 2018/08/26
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
# Defender Attack Surface Reduction
|
||||
logsource:
|
||||
product: windows_defender
|
||||
definition: 'Requirements:Enabled Block credential stealing from the Windows local security authority subsystem (lsass.exe) from Attack Surface Reduction (GUID: 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2)'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1121
|
||||
Path: '*\lsass.exe'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Google Chrome GoogleUpdate.exe
|
||||
- Some Taskmgr.exe related activity
|
||||
level: high
|
||||
@@ -1,18 +1,23 @@
|
||||
title: Mimikatz Use
|
||||
description: This method detects mimikatz keywords in different Eventlogs (some of them only appear in older Mimikatz version that are however still used by different threat groups)
|
||||
author: Florian Roth
|
||||
tags:
|
||||
- attack.s0002
|
||||
- attack.t1003
|
||||
- attack.lateral_movement
|
||||
- attack.credential_access
|
||||
logsource:
|
||||
product: windows
|
||||
detection:
|
||||
keywords:
|
||||
- mimikatz
|
||||
- mimilib
|
||||
- <3 eo.oe
|
||||
- eo.oe.kiwi
|
||||
- privilege::debug
|
||||
- sekurlsa::logonpasswords
|
||||
- lsadump::sam
|
||||
- mimidrv.sys
|
||||
- "* mimikatz *"
|
||||
- "* mimilib *"
|
||||
- "* <3 eo.oe *"
|
||||
- "* eo.oe.kiwi *"
|
||||
- "* privilege::debug *"
|
||||
- "* sekurlsa::logonpasswords *"
|
||||
- "* lsadump::sam *"
|
||||
- "* mimidrv.sys *"
|
||||
condition: keywords
|
||||
falsepositives:
|
||||
- Naughty administrators
|
||||
|
||||
@@ -0,0 +1,23 @@
|
||||
title: Remote Task Creation via ATSVC named pipe
|
||||
description: Detects remote task creation via at.exe or API interacting with ATSVC namedpipe
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://blog.menasec.net/2019/03/threat-hunting-25-scheduled-tasks-for.html
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.persistence
|
||||
- attack.t1053
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5145
|
||||
ShareName: \\*\IPC$
|
||||
RelativeTargetName: atsvc
|
||||
Accesses: '*WriteData*'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- pentesting
|
||||
level: medium
|
||||
@@ -6,6 +6,10 @@ author: Benjamin Delpy, Florian Roth
|
||||
references:
|
||||
- https://twitter.com/gentilkiwi/status/1003236624925413376
|
||||
- https://gist.github.com/gentilkiwi/dcc132457408cf11ad2061340dcb53c2
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.s0002
|
||||
- attack.t1003
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
|
||||
@@ -1,18 +1,20 @@
|
||||
title: Disabling Windows Event Auditing
|
||||
description: >
|
||||
Detects scenarios where system auditing (ie: windows event log auditing) is disabled. This may be used in a scenario
|
||||
description: 'Detects scenarios where system auditing (ie: windows event log auditing) is disabled. This may be used in a scenario
|
||||
where an entity would want to bypass local logging to evade detection when windows event logging is enabled and
|
||||
reviewed. Also, it is recommended to turn off "Local Group Policy Object Processing" via GPO, which will make sure
|
||||
that Active Directory GPOs take precedence over local/edited computer policies via something such as "gpedit.msc".
|
||||
Please note, that disabling "Local Group Policy Object Processing" may cause an issue in scenarios of one off
|
||||
specific GPO modifications -- however it is recommended to perform these modifications in Active Directory anyways.
|
||||
specific GPO modifications -- however it is recommended to perform these modifications in Active Directory anyways.'
|
||||
references:
|
||||
- https://bit.ly/WinLogsZero2Hero
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1054
|
||||
author: '@neu5ron'
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Computer Management > Audit Policy Configuration, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Policy Change\Audit Audit Policy Change'
|
||||
definition: 'Requirements: Audit Policy : Computer Management > Audit Policy Configuration, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Policy Change\Audit Authorization Policy Change'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4719
|
||||
|
||||
@@ -1,18 +0,0 @@
|
||||
title: Eventlog Cleared
|
||||
status: experimental
|
||||
description: Detects a cleared Windows Eventlog as e.g. caused by "wevtutil cl" command execution
|
||||
author: Florian Roth
|
||||
date: 2017/06/27
|
||||
references:
|
||||
- https://www.hybrid-analysis.com/sample/027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745?environmentId=100
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
detection:
|
||||
selection:
|
||||
EventID: 104
|
||||
Source: Eventlog
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: high
|
||||
@@ -4,8 +4,14 @@ author: Omer Faruk Celik
|
||||
date: 2018/03/20
|
||||
references:
|
||||
- https://blog.ropnop.com/using-credentials-to-own-windows-boxes-part-2-psexec-and-services/
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.execution
|
||||
- attack.t1077
|
||||
- attack.t1035
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
detection:
|
||||
service_installation:
|
||||
EventID: 7045
|
||||
|
||||
@@ -0,0 +1,21 @@
|
||||
title: Possible Impacket SecretDump remote activity
|
||||
description: Detect AD credential dumping using impacket secretdump HKTL
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://blog.menasec.net/2019/02/threat-huting-10-impacketsecretdump.html
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5145
|
||||
ShareName: \\*\ADMIN$
|
||||
RelativeTargetName: 'SYSTEM32\*.tmp'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- pentesting
|
||||
level: high
|
||||
@@ -0,0 +1,34 @@
|
||||
title: First time seen remote named pipe
|
||||
description: This detection excludes known namped pipes accessible remotely and notify on newly observed ones, may help to detect lateral movement and remote exec using named pipes
|
||||
author: Samir Bousseaden
|
||||
references:
|
||||
- https://twitter.com/menasec1/status/1104489274387451904
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1077
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
|
||||
detection:
|
||||
selection1:
|
||||
EventID: 5145
|
||||
ShareName: \\*\IPC$
|
||||
selection2:
|
||||
EventID: 5145
|
||||
ShareName: \\*\IPC$
|
||||
RelativeTargetName:
|
||||
- 'atsvc'
|
||||
- 'samr'
|
||||
- 'lsarpc'
|
||||
- 'winreg'
|
||||
- 'netlogon'
|
||||
- 'srvsvc'
|
||||
- 'protected_storage'
|
||||
- 'wkssvc'
|
||||
- 'browser'
|
||||
- 'netdfs'
|
||||
condition: selection1 and not selection2
|
||||
falsepositives:
|
||||
- update the excluded named pipe to filter out any newly observed legit named pipe
|
||||
level: high
|
||||
@@ -1,14 +1,19 @@
|
||||
---
|
||||
action: global
|
||||
title: Malicious Service Install
|
||||
description: This method detects well-known keywords of malicious services in the Windows System Eventlog
|
||||
author: Florian Roth
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
- attack.s0005
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
detection:
|
||||
selection:
|
||||
selection1:
|
||||
EventID:
|
||||
- 7045
|
||||
- 4697
|
||||
keywords:
|
||||
- 'WCE SERVICE'
|
||||
- 'WCESERVICE'
|
||||
@@ -16,7 +21,14 @@ detection:
|
||||
quarkspwdump:
|
||||
EventID: 16
|
||||
HiveName: '*\AppData\Local\Temp\SAM*.dmp'
|
||||
condition: ( selection and keywords ) or quarkspwdump
|
||||
condition: ( selection1 and keywords ) or ( selection2 and keywords ) or quarkspwdump
|
||||
falsepositives:
|
||||
- Unlikely
|
||||
level: high
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
selection2:
|
||||
EventID: 4697
|
||||
|
||||
@@ -1,6 +1,10 @@
|
||||
title: Malicious Service Installations
|
||||
description: Detects known malicious service installs that only appear in cases of lateral movement, credential dumping and other suspicious activity
|
||||
author: Florian Roth
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.privilege_escalation
|
||||
- attack.t1050
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
|
||||
@@ -5,6 +5,10 @@ author: Thomas Patzke
|
||||
references:
|
||||
- https://www.jpcert.or.jp/english/pub/sr/ir_research.html
|
||||
- https://jpcertcc.github.io/ToolAnalysisResultSheet
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1003
|
||||
- attack.s0005
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
|
||||
@@ -2,10 +2,13 @@
|
||||
action: global
|
||||
title: NetNTLM Downgrade Attack
|
||||
description: Detects post exploitation using NetNTLM downgrade attacks
|
||||
reference:
|
||||
references:
|
||||
- https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
|
||||
author: Florian Roth
|
||||
date: 2018/03/20
|
||||
tags:
|
||||
- attack.credential_access
|
||||
- attack.t1212
|
||||
detection:
|
||||
condition: 1 of them
|
||||
falsepositives:
|
||||
@@ -19,19 +22,19 @@ detection:
|
||||
selection1:
|
||||
EventID: 13
|
||||
TargetObject:
|
||||
- '*SYSTEM\*ControlSet*\Control\Lsa\lmcompatibilitylevel'
|
||||
- '*SYSTEM\*ControlSet*\Control\Lsa\NtlmMinClientSec'
|
||||
- '*SYSTEM\*ControlSet*\Control\Lsa\RestrictSendingNTLMTraffic'
|
||||
- '*SYSTEM\\*ControlSet*\Control\Lsa\lmcompatibilitylevel'
|
||||
- '*SYSTEM\\*ControlSet*\Control\Lsa\NtlmMinClientSec'
|
||||
- '*SYSTEM\\*ControlSet*\Control\Lsa\RestrictSendingNTLMTraffic'
|
||||
---
|
||||
# Windows Security Eventlog: Process Creation with Full Command Line
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Object Access > Audit Registry (Success)'
|
||||
definition: 'Requirements: Audit Policy : Object Access > Audit Registry (Success)'
|
||||
detection:
|
||||
selection2:
|
||||
EventID: 4657
|
||||
ObjectName: '\REGISTRY\MACHINE\SYSTEM\*ControlSet*\Control\Lsa'
|
||||
ObjectName: '\REGISTRY\MACHINE\SYSTEM\\*ControlSet*\Control\Lsa'
|
||||
ObjectValueName:
|
||||
- 'LmCompatibilityLevel'
|
||||
- 'NtlmMinClientSec'
|
||||
|
||||
@@ -5,6 +5,10 @@ references:
|
||||
- https://cyberwardog.blogspot.de/2017/04/chronicles-of-threat-hunter-hunting-for.html
|
||||
author: Roberto Rodriguez (source), Dominik Schaudel (rule)
|
||||
date: 2018/02/12
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1075
|
||||
- attack.s0002
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
@@ -17,4 +21,4 @@ detection:
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Runas command-line tool using /netonly parameter
|
||||
level: high
|
||||
level: high
|
||||
|
||||
@@ -4,10 +4,13 @@ description: 'Detects the attack technique pass the hash which is used to move l
|
||||
references:
|
||||
- https://github.com/iadgov/Event-Forwarding-Guidance/tree/master/Events
|
||||
author: Ilias el Matani (rule), The Information Assurance Directorate at the NSA (method)
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1075
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: The successful use of PtH for lateral movement between workstations would trigger event ID 4624, a failed logon attempt would trigger an event ID 4625
|
||||
definition: The successful use of PtH for lateral movement between workstations would trigger event ID 4624, a failed logon attempt would trigger an event ID 4625
|
||||
detection:
|
||||
selection:
|
||||
- EventID: 4624
|
||||
|
||||
@@ -1,144 +0,0 @@
|
||||
title: Executable used by PlugX in Uncommon Location
|
||||
status: experimental
|
||||
description: Detects the execution of an executable that is typically used by PlugX for DLL side loading started from an uncommon location
|
||||
references:
|
||||
- 'http://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/'
|
||||
- 'https://countuponsecurity.com/2017/06/07/threat-hunting-in-the-enterprise-with-appcompatprocessor/'
|
||||
author: Florian Roth
|
||||
date: 2017/06/12
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
|
||||
# CamMute
|
||||
selection_cammute:
|
||||
EventID: 4688
|
||||
CommandLine: '*\CamMute.exe'
|
||||
filter_cammute:
|
||||
EventID: 4688
|
||||
CommandLine: '*\Lenovo\Communication Utility\*'
|
||||
|
||||
# Chrome Frame Helper
|
||||
selection_chrome_frame:
|
||||
EventID: 4688
|
||||
CommandLine: '*\chrome_frame_helper.exe'
|
||||
filter_chrome_frame:
|
||||
EventID: 4688
|
||||
CommandLine: '*\Google\Chrome\application\*'
|
||||
|
||||
# Microsoft Device Emulator
|
||||
selection_devemu:
|
||||
EventID: 4688
|
||||
CommandLine: '*\dvcemumanager.exe'
|
||||
filter_devemu:
|
||||
EventID: 4688
|
||||
CommandLine: '*\Microsoft Device Emulator\*'
|
||||
|
||||
# Windows Media Player Gadget
|
||||
selection_gadget:
|
||||
EventID: 4688
|
||||
CommandLine: '*\Gadget.exe'
|
||||
filter_gadget:
|
||||
EventID: 4688
|
||||
CommandLine: '*\Windows Media Player\*'
|
||||
|
||||
# HTML Help Workshop
|
||||
selection_hcc:
|
||||
EventID: 4688
|
||||
CommandLine: '*\hcc.exe'
|
||||
filter_hcc:
|
||||
EventID: 4688
|
||||
CommandLine: '*\HTML Help Workshop\*'
|
||||
|
||||
# Hotkey Command Module for Intel Graphics Contollers
|
||||
selection_hkcmd:
|
||||
EventID: 4688
|
||||
CommandLine: '*\hkcmd.exe'
|
||||
filter_hkcmd:
|
||||
EventID: 4688
|
||||
CommandLine:
|
||||
- '*\System32\*'
|
||||
- '*\SysNative\*'
|
||||
- '*\SysWowo64\*'
|
||||
|
||||
# McAfee component
|
||||
selection_mc:
|
||||
EventID: 4688
|
||||
CommandLine: '*\Mc.exe'
|
||||
filter_mc:
|
||||
EventID: 4688
|
||||
CommandLine:
|
||||
- '*\Microsoft Visual Studio*'
|
||||
- '*\Microsoft SDK*'
|
||||
- '*\Windows Kit*'
|
||||
|
||||
# MsMpEng - Microsoft Malware Protection Engine
|
||||
selection_msmpeng:
|
||||
EventID: 4688
|
||||
CommandLine: '*\MsMpEng.exe'
|
||||
filter_msmpeng:
|
||||
EventID: 4688
|
||||
CommandLine:
|
||||
- '*\Microsoft Security Client\*'
|
||||
- '*\Windows Defender\*'
|
||||
- '*\AntiMalware\*'
|
||||
|
||||
# Microsoft Security Center
|
||||
selection_msseces:
|
||||
EventID: 4688
|
||||
CommandLine: '*\msseces.exe'
|
||||
filter_msseces:
|
||||
EventID: 4688
|
||||
CommandLine: '*\Microsoft Security Center\*'
|
||||
|
||||
# Microsoft Office 2003 OInfo
|
||||
selection_oinfo:
|
||||
EventID: 4688
|
||||
CommandLine: '*\OInfoP11.exe'
|
||||
filter_oinfo:
|
||||
EventID: 4688
|
||||
CommandLine: '*\Common Files\Microsoft Shared\*'
|
||||
|
||||
# OLE View
|
||||
selection_oleview:
|
||||
EventID: 4688
|
||||
CommandLine: '*\OleView.exe'
|
||||
filter_oleview:
|
||||
EventID: 4688
|
||||
CommandLine:
|
||||
- '*\Microsoft Visual Studio*'
|
||||
- '*\Microsoft SDK*'
|
||||
- '*\Windows Kit*'
|
||||
- '*\Windows Resource Kit\*'
|
||||
|
||||
# RC
|
||||
selection_rc:
|
||||
EventID: 4688
|
||||
CommandLine: '*\OleView.exe'
|
||||
filter_rc:
|
||||
EventID: 4688
|
||||
CommandLine:
|
||||
- '*\Microsoft Visual Studio*'
|
||||
- '*\Microsoft SDK*'
|
||||
- '*\Windows Kit*'
|
||||
- '*\Windows Resource Kit\*'
|
||||
- '*\Microsoft.NET\*'
|
||||
|
||||
condition: ( selection_cammute and not filter_cammute ) or
|
||||
( selection_chrome_frame and not filter_chrome_frame ) or
|
||||
( selection_devemu and not filter_devemu ) or
|
||||
( selection_gadget and not filter_gadget ) or
|
||||
( selection_hcc and not filter_hcc ) or
|
||||
( selection_hkcmd and not filter_hkcmd ) or
|
||||
( selection_mc and not filter_mc ) or
|
||||
( selection_msmpeng and not filter_msmpeng ) or
|
||||
( selection_msseces and not filter_msseces ) or
|
||||
( selection_oinfo and not filter_oinfo ) or
|
||||
( selection_oleview and not filter_oleview ) or
|
||||
( selection_rc and not filter_rc )
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
|
||||
|
||||
@@ -1,16 +0,0 @@
|
||||
title: PsExec Service Start
|
||||
description: Detects a PsExec service start
|
||||
author: Florian Roth
|
||||
date: 2018/03/13
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4688
|
||||
CommandLine: 'C:\Windows\PSEXESVC.exe'
|
||||
condition: 1 of them
|
||||
falsepositives:
|
||||
- Administrative activity
|
||||
level: low
|
||||
@@ -2,15 +2,20 @@ title: Rare Schtasks Creations
|
||||
description: Detects rare scheduled tasks creations that only appear a few times per time frame and could reveal password dumpers, backdoor installs or other types of malicious code
|
||||
status: experimental
|
||||
author: Florian Roth
|
||||
tags:
|
||||
- attack.execution
|
||||
- attack.privilege_escalation
|
||||
- attack.persistence
|
||||
- attack.t1053
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'The Advanced Audit Policy setting Object Access > Audit Other Object Access Events has to be configured to allow this detection (not in the baseline recommendations by Microsoft). We also recommend extracting the Command field from the embedded XML in the event data.'
|
||||
definition: 'The Advanced Audit Policy setting Object Access > Audit Other Object Access Events has to be configured to allow this detection (not in the baseline recommendations by Microsoft). We also recommend extracting the Command field from the embedded XML in the event data.'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4698
|
||||
timeframe: 7d
|
||||
condition: selection | count(TaskName) < 5
|
||||
condition: selection | count() by TaskName < 5
|
||||
falsepositives:
|
||||
- Software installation
|
||||
- Software updates
|
||||
|
||||
@@ -2,6 +2,10 @@ title: Rare Service Installs
|
||||
description: Detects rare service installs that only appear a few times per time frame and could reveal password dumpers, backdoor installs or other types of malicious services
|
||||
status: experimental
|
||||
author: Florian Roth
|
||||
tags:
|
||||
- attack.persistence
|
||||
- attack.privilege_escalation
|
||||
- attack.t1050
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
@@ -9,8 +13,8 @@ detection:
|
||||
selection:
|
||||
EventID: 7045
|
||||
timeframe: 7d
|
||||
condition: selection | count(ServiceFileName) < 5
|
||||
condition: selection | count() by ServiceFileName < 5
|
||||
falsepositives:
|
||||
- Software installation
|
||||
- Software updates
|
||||
level: low
|
||||
level: low
|
||||
@@ -0,0 +1,25 @@
|
||||
title: RDP Login from localhost
|
||||
description: RDP login with localhost source address may be a tunnelled login
|
||||
references:
|
||||
- https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html
|
||||
date: 2019/01/28
|
||||
modified: 2019/01/29
|
||||
tags:
|
||||
- attack.lateral_movement
|
||||
- attack.t1076
|
||||
status: experimental
|
||||
author: Thomas Patzke
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4624
|
||||
LogonType: 10
|
||||
SourceNetworkAddress:
|
||||
- "::1"
|
||||
- "127.0.0.1"
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -0,0 +1,20 @@
|
||||
title: Potential RDP exploit CVE-2019-0708
|
||||
description: Detect suspicious error on protocol RDP, potential CVE-2019-0708
|
||||
references:
|
||||
- https://github.com/zerosum0x0/CVE-2019-0708
|
||||
tags:
|
||||
- attack.initial_access
|
||||
status: experimental
|
||||
author: Lionel PRAT, Christophe BROCAS
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
detection:
|
||||
selection:
|
||||
EventID: 56
|
||||
Source: TermDD
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Bad connections or network interruptions
|
||||
level: high
|
||||
|
||||
@@ -0,0 +1,31 @@
|
||||
title: RDP over Reverse SSH Tunnel WFP
|
||||
status: experimental
|
||||
description: Detects svchost hosting RDP termsvcs communicating with the loopback address and on TCP port 3389
|
||||
references:
|
||||
- https://twitter.com/SBousseaden/status/1096148422984384514
|
||||
author: Samir Bousseaden
|
||||
date: 2019/02/16
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.command_and_control
|
||||
- attack.t1076
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
detection:
|
||||
selection:
|
||||
EventID: 5156
|
||||
sourceRDP:
|
||||
SourcePort: 3389
|
||||
DestinationAddress:
|
||||
- '127.*'
|
||||
- '::1'
|
||||
destinationRDP:
|
||||
DestinationPort: 3389
|
||||
SourceAddress:
|
||||
- '127.*'
|
||||
- '::1'
|
||||
condition: selection and ( sourceRDP or destinationRDP )
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: high
|
||||
@@ -4,6 +4,9 @@ description: An attacker can use the SID history attribute to gain additional pr
|
||||
references:
|
||||
- https://adsecurity.org/?p=1772
|
||||
author: Thomas Patzke
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.t1178
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
|
||||
@@ -5,6 +5,9 @@ references:
|
||||
- https://technet.microsoft.com/en-us/library/cc742154(v=ws.11).aspx
|
||||
- https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100
|
||||
author: Florian Roth (rule), Tom U. @c_APT_ure (collection)
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1107
|
||||
logsource:
|
||||
product: windows
|
||||
service: application
|
||||
|
||||
@@ -1,42 +0,0 @@
|
||||
---
|
||||
action: global
|
||||
title: Reconnaissance Activity with Net Command
|
||||
status: experimental
|
||||
description: 'Detects a set of commands often used in recon stages by different attack groups'
|
||||
references:
|
||||
- https://twitter.com/haroonmeer/status/939099379834658817
|
||||
- https://twitter.com/c_APT_ure/status/939475433711722497
|
||||
author: Florian Roth
|
||||
date: 2017/12/12
|
||||
detection:
|
||||
selection:
|
||||
CommandLine:
|
||||
- 'tasklist'
|
||||
- 'net time'
|
||||
- 'systeminfo'
|
||||
- 'whoami'
|
||||
- 'nbtstat'
|
||||
- 'net start'
|
||||
- '*\net1 start'
|
||||
- 'qprocess'
|
||||
- 'nslookup'
|
||||
timeframe: 1m
|
||||
condition: selection | count() > 2
|
||||
falsepositives:
|
||||
- False positives depend on scripts and administrative tools used in the monitored environment
|
||||
level: medium
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: sysmon
|
||||
detection:
|
||||
selection:
|
||||
EventID: 1
|
||||
---
|
||||
logsource:
|
||||
product: windows
|
||||
service: security
|
||||
description: 'Requirements: Audit Policy : Detailed Tracking > Audit Process creation, Group Policy : Administrative Templates\System\Audit Process Creation'
|
||||
detection:
|
||||
selection:
|
||||
EventID: 4688
|
||||
@@ -7,6 +7,9 @@ references:
|
||||
- https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx
|
||||
date: 2017/05/15
|
||||
author: Dimitrios Slamaris
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
|
||||
@@ -6,13 +6,16 @@ references:
|
||||
- https://technet.microsoft.com/en-us/library/cc726884(v=ws.10).aspx
|
||||
- https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx
|
||||
date: 2017/05/15
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1073
|
||||
author: Dimitrios Slamaris
|
||||
logsource:
|
||||
product: windows
|
||||
service: system
|
||||
service: dhcp
|
||||
detection:
|
||||
selection:
|
||||
EventID:
|
||||
EventID:
|
||||
- 1031
|
||||
- 1032
|
||||
- 1034
|
||||
|
||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user