Merge pull request #133 from james0d0a/attack_tags

added a few mitre attack tags to windows sysmon rules
This commit is contained in:
Thomas Patzke 2018-07-27 07:55:56 +02:00 committed by GitHub
commit db07648f33
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
8 changed files with 30 additions and 0 deletions

View File

@ -3,6 +3,10 @@ status: experimental
description: Detects process access to LSASS which is typical for Mimikatz (0x1000 PROCESS_QUERY_ LIMITED_INFORMATION, 0x0400 PROCESS_QUERY_ INFORMATION, 0x0010 PROCESS_VM_READ)
references:
- https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow
tags:
- attack.s0002
- attack.lateral_movement
- attack.credential_access
logsource:
product: windows
service: sysmon

View File

@ -3,6 +3,10 @@ status: experimental
description: Detects certain DLL loads when Mimikatz gets executed
references:
- https://securityriskadvisors.com/blog/post/detecting-in-memory-mimikatz/
tags:
- attack.s0002
- attack.lateral_movement
- attack.credential_access
logsource:
product: windows
service: sysmon

View File

@ -2,6 +2,9 @@ title: PowerShell Download from URL
status: experimental
description: Detects a Powershell process that contains download commands in its command line string
author: Florian Roth
tags:
- attack.t1086
- attack.execution
logsource:
product: windows
service: sysmon

View File

@ -5,6 +5,10 @@ references:
- https://www.hybrid-analysis.com/sample/759fb4c0091a78c5ee035715afe3084686a8493f39014aea72dae36869de9ff6?environmentId=100
author: Florian Roth
date: 2017/11/04
tags:
- attack.t1085
- attack.defense_evasion
- attack.execution
logsource:
product: windows
service: sysmon

View File

@ -4,6 +4,11 @@ description: Detects execution of Net.exe, whether suspicious or benign.
references:
- https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
author: Michael Haag, Mark Woan (improvements)
tags:
- attack.s0039
- attack.lateral_movement
- attack.discovery
logsource:
product: windows
service: sysmon

View File

@ -4,6 +4,10 @@ description: Detects various anomalies in relation to regsvr32.exe
author: Florian Roth
references:
- https://subt0x10.blogspot.de/2017/04/bypass-application-whitelisting-script.html
tags:
- attack.t1117
- attack.defense_evasion
- attack.execution
logsource:
product: windows
service: sysmon

View File

@ -5,6 +5,9 @@ references:
- https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
author: Thomas Patzke
date: 2018/03/07
tags:
- attack.t1084
- attack.persistence
logsource:
product: windows
service: sysmon

View File

@ -5,6 +5,9 @@ references:
- https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
author: Thomas Patzke
date: 2018/03/07
tags:
- attack.t1084
- attack.persistence
logsource:
product: windows
service: sysmon