2019-11-12 22:05:36 +00:00
action : global
title : Unidentified Attacker November 2018
2019-11-12 22:12:27 +00:00
id : 7453575c-a747-40b9-839b-125a0aae324b
2019-11-12 22:05:36 +00:00
status : stable
2019-11-12 22:12:27 +00:00
description : A sigma rule detecting an unidetefied attacker who used phishing emails to target high profile orgs on November 2018. The Actor shares some TTPs with
YYTRIUM/APT29 campaign in 2016.
2019-11-12 22:05:36 +00:00
references :
- https://twitter.com/DrunkBinary/status/1063075530180886529
2020-03-09 16:12:41 +00:00
author : '@41thexplorer, Microsoft Defender ATP'
2019-11-12 22:05:36 +00:00
date : 2018 /11/20
2020-08-29 04:39:30 +00:00
modified : 2020 /08/26
2019-11-12 22:05:36 +00:00
tags :
- attack.execution
2020-08-29 04:39:30 +00:00
- attack.t1218.011
- attack.t1085 # an old one
2019-11-12 22:05:36 +00:00
detection :
condition : 1 of them
level : high
---
logsource :
category : process_creation
product : windows
detection :
selection1 :
2020-11-27 02:26:18 +00:00
CommandLine|contains : 'cyzfc.dat,'
CommandLine|endswith : 'PointFunctionCall'
2019-11-12 22:05:36 +00:00
---
# Sysmon: File Creation (ID 11)
logsource :
product : windows
2020-10-02 08:45:29 +00:00
category : file_event
2019-11-12 22:05:36 +00:00
detection :
selection2 :
2020-10-15 20:36:20 +00:00
TargetFilename|contains :
- 'ds7002.lnk'