25 lines
841 B
YAML
25 lines
841 B
YAML
title: Executable from Webdav
|
|
description: "Detects executable access via webdav6. Can be seen in APT 29 such as from the emulated APT 29 hackathon https://github.com/OTRF/detection-hackathon-apt29/"
|
|
id: aac2fd97-bcba-491b-ad66-a6edf89c71bf
|
|
author: 'SOC Prime, Adam Swan'
|
|
references:
|
|
- http://carnal0wnage.attackresearch.com/2012/06/webdav-server-to-download-custom.html
|
|
- https://github.com/OTRF/detection-hackathon-apt29
|
|
tags:
|
|
- attack.command_and_control
|
|
- attack.T1043
|
|
logsource:
|
|
category: proxy
|
|
date: 2020/05/01
|
|
detection:
|
|
selection_webdav:
|
|
- c-useragent: '*WebDAV*'
|
|
- c-uri: '*webdav*'
|
|
selection_executable:
|
|
- resp_mime_types: '*dosexec*'
|
|
- c-uri: '*.exe'
|
|
condition: selection_webdav AND selection_executable
|
|
falsepositives:
|
|
- unknown
|
|
level: medium
|
|
status: experimental |