[Rule Tuning] T1069 and T1087 - admin wildcard (#2484)
Tuned both rules:relax the conditions by adding a wildcard to admin
This commit is contained in:
@@ -4,7 +4,7 @@ integration = ["endpoint", "windows"]
|
||||
maturity = "production"
|
||||
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
|
||||
min_stack_version = "8.3.0"
|
||||
updated_date = "2022/12/14"
|
||||
updated_date = "2023/01/18"
|
||||
|
||||
[rule]
|
||||
author = ["Elastic"]
|
||||
@@ -66,7 +66,7 @@ process where event.type == "start" and
|
||||
((process.name : "net1.exe" or process.pe.original_file_name == "net1.exe") and
|
||||
not process.parent.name : "net.exe")) and
|
||||
process.args : ("group", "user", "localgroup") and
|
||||
process.args : ("admin", "Domain Admins", "Remote Desktop Users", "Enterprise Admins", "Organization Management") and
|
||||
process.args : ("*admin*", "Domain Admins", "Remote Desktop Users", "Enterprise Admins", "Organization Management") and
|
||||
not process.args : "/add")
|
||||
|
||||
or
|
||||
@@ -83,6 +83,10 @@ id = "T1069"
|
||||
name = "Permission Groups Discovery"
|
||||
reference = "https://attack.mitre.org/techniques/T1069/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1069.001"
|
||||
name = "Local Groups"
|
||||
reference = "https://attack.mitre.org/techniques/T1069/001/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1069.002"
|
||||
name = "Domain Groups"
|
||||
reference = "https://attack.mitre.org/techniques/T1069/002/"
|
||||
@@ -92,6 +96,14 @@ reference = "https://attack.mitre.org/techniques/T1069/002/"
|
||||
id = "T1087"
|
||||
name = "Account Discovery"
|
||||
reference = "https://attack.mitre.org/techniques/T1087/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1087.001"
|
||||
name = "Local Account"
|
||||
reference = "https://attack.mitre.org/techniques/T1087/001/"
|
||||
[[rule.threat.technique.subtechnique]]
|
||||
id = "T1087.002"
|
||||
name = "Domain Account"
|
||||
reference = "https://attack.mitre.org/techniques/T1087/002/"
|
||||
|
||||
|
||||
[rule.threat.tactic]
|
||||
|
||||
@@ -2,7 +2,7 @@
|
||||
creation_date = "2020/10/15"
|
||||
integration = ["windows"]
|
||||
maturity = "production"
|
||||
updated_date = "2023/01/03"
|
||||
updated_date = "2023/01/18"
|
||||
min_stack_comments = "New fields added: required_fields, related_integrations, setup"
|
||||
min_stack_version = "8.3.0"
|
||||
|
||||
@@ -135,7 +135,7 @@ iam where event.action == "user-member-enumerated" and
|
||||
"?:\\Windows\\System32\\SystemPropertiesComputerName.exe") and
|
||||
|
||||
/* privileged local groups */
|
||||
(group.name:("admin*","RemoteDesktopUsers") or
|
||||
(group.name:("*admin*","RemoteDesktopUsers") or
|
||||
winlog.event_data.TargetSid:("S-1-5-32-544","S-1-5-32-555"))
|
||||
'''
|
||||
|
||||
|
||||
Reference in New Issue
Block a user