c1a0398c3f
Updates MITRE Technique IDs for Credential Access DRs
(cherry picked from commit f6421d8c53)
57 lines
1.8 KiB
TOML
57 lines
1.8 KiB
TOML
[metadata]
|
|
creation_date = "2021/01/19"
|
|
maturity = "production"
|
|
updated_date = "2021/03/03"
|
|
|
|
[rule]
|
|
author = ["Elastic"]
|
|
description = """
|
|
Windows Credential Manager allows you to create, view, or delete saved credentials for signing into websites, connected
|
|
applications, and networks. An adversary may abuse this to list or dump credentials stored in the Credential Manager for
|
|
saved usernames and passwords. This may also be performed in preparation of lateral movement.
|
|
"""
|
|
from = "now-9m"
|
|
index = ["winlogbeat-*", "logs-endpoint.events.*", "logs-windows.*"]
|
|
language = "eql"
|
|
license = "Elastic License v2"
|
|
name = "Searching for Saved Credentials via VaultCmd"
|
|
references = [
|
|
"https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16",
|
|
"https://rastamouse.me/blog/rdp-jump-boxes/",
|
|
]
|
|
risk_score = 47
|
|
rule_id = "be8afaed-4bcd-4e0a-b5f9-5562003dde81"
|
|
severity = "medium"
|
|
tags = ["Elastic", "Host", "Windows", "Threat Detection", "Credential Access"]
|
|
timestamp_override = "event.ingested"
|
|
type = "eql"
|
|
|
|
query = '''
|
|
process where event.type in ("start", "process_started") and
|
|
(process.pe.original_file_name:"vaultcmd.exe" or process.name:"vaultcmd.exe") and
|
|
process.args:"/list*"
|
|
'''
|
|
|
|
|
|
[[rule.threat]]
|
|
framework = "MITRE ATT&CK"
|
|
[[rule.threat.technique]]
|
|
id = "T1003"
|
|
name = "OS Credential Dumping"
|
|
reference = "https://attack.mitre.org/techniques/T1003/"
|
|
[[rule.threat.technique]]
|
|
id = "T1555"
|
|
name = "Credentials from Password Stores"
|
|
reference = "https://attack.mitre.org/techniques/T1555/"
|
|
[[rule.threat.technique.subtechnique]]
|
|
id = "T1555.004"
|
|
name = "Windows Credential Manager"
|
|
reference = "https://attack.mitre.org/techniques/T1555/004/"
|
|
|
|
|
|
[rule.threat.tactic]
|
|
id = "TA0006"
|
|
name = "Credential Access"
|
|
reference = "https://attack.mitre.org/tactics/TA0006/"
|
|
|