Files
blue-team-tools/rules/network/zeek/zeek_http_webdav_put_request.yml
T
2022-03-16 13:43:54 +01:00

29 lines
748 B
YAML

title: WebDav Put Request
id: 705072a5-bb6f-4ced-95b6-ecfa6602090b
status: test
description: A General detection for WebDav user-agent being used to PUT files on a WebDav network share. This could be an indicator of exfiltration.
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
references:
- https://github.com/OTRF/detection-hackathon-apt29/issues/17
date: 2020/05/02
modified: 2021/11/27
logsource:
product: zeek
service: http
detection:
selection:
user_agent|contains: 'WebDAV'
method: 'PUT'
filter:
id.resp_h:
- 192.168.0.0/16
- 172.16.0.0/12
- 10.0.0.0/8
condition: selection and not filter
falsepositives:
- Unknown
level: low
tags:
- attack.exfiltration
- attack.t1048.003