From 8ba60aab59b687ea3336ef9de0df814472881c18 Mon Sep 17 00:00:00 2001 From: sn0w0tter <42819997+sn0w0tter@users.noreply.github.com> Date: Thu, 21 Nov 2019 02:07:40 +0100 Subject: [PATCH] markdown + analytics regenerated --- .../Customers/CU_0001_TESTCUSTOMER.md | 2 +- .../Detection_Rules/av_exploiting.md | 35 + .../Detection_Rules/av_password_dumper.md | 35 + .../Detection_Rules/av_relevant_files.md | 35 + .../Detection_Rules/av_webshell.md | 35 + .../powershell_data_compressed.md | 35 + .../powershell_downgrade_attack.md | 35 + .../powershell_exe_calling_ps.md | 35 + .../powershell_malicious_commandlets.md | 35 + .../powershell_malicious_keywords.md | 35 + .../powershell_ntfs_ads_access.md | 35 + .../powershell_prompt_credentials.md | 35 + .../Detection_Rules/powershell_psattack.md | 35 + .../powershell_shellcode_b64.md | 35 + .../powershell_suspicious_download.md | 35 + ...owershell_suspicious_invocation_generic.md | 35 + ...wershell_suspicious_invocation_specific.md | 35 + .../powershell_suspicious_keywords.md | 35 + .../powershell_winlogon_helper_dll.md | 35 + .../Detection_Rules/sysmon_ads_executable.md | 7 +- .../Detection_Rules/sysmon_cactustorch.md | 7 +- .../Detection_Rules/sysmon_cmstp_execution.md | 10 +- .../sysmon_cobaltstrike_process_injection.md | 31 +- .../Detection_Rules/sysmon_dhcp_calloutdll.md | 8 +- .../sysmon_dns_serverlevelplugindll.md | 9 +- .../sysmon_ghostpack_safetykatz.md | 5 +- ...on_logon_scripts_userinitmprlogonscript.md | 71 +- .../Detection_Rules/sysmon_lsass_memdump.md | 7 +- .../Detection_Rules/sysmon_mal_namedpipes.md | 7 +- .../sysmon_malware_backconnect_ports.md | 14 +- .../sysmon_malware_verclsid_shellcode.md | 5 +- .../sysmon_mimikatz_detection_lsass.md | 8 +- .../sysmon_mimikatz_inmemory_detection.md | 3 +- .../sysmon_mimikatz_trough_winrm.md | 7 +- .../sysmon_password_dumper_lsass.md | 10 +- .../sysmon_powershell_exploit_scripts.md | 5 +- .../sysmon_powershell_network_connection.md | 17 +- .../sysmon_quarkspw_filedump.md | 5 +- .../sysmon_rdp_reverse_tunnel.md | 17 +- .../sysmon_rdp_settings_hijack.md | 13 +- ...sysmon_registry_persistence_key_linking.md | 95 + .../sysmon_renamed_powershell.md | 9 +- .../sysmon_renamed_procdump.md | 96 + .../Detection_Rules/sysmon_renamed_psexec.md | 23 +- .../sysmon_rundll32_net_connections.md | 14 +- .../sysmon_ssp_added_lsa_config.md | 7 +- .../sysmon_stickykey_like_backdoor.md | 11 +- .../sysmon_susp_download_run_key.md | 95 + .../sysmon_susp_driver_load.md | 11 +- .../sysmon_susp_file_characteristics.md | 8 +- .../Detection_Rules/sysmon_susp_image_load.md | 7 +- .../sysmon_susp_lsass_dll_load.md | 98 + .../sysmon_susp_powershell_rundll32.md | 7 +- ...n_susp_prog_location_network_connection.md | 5 +- .../Detection_Rules/sysmon_susp_rdp.md | 22 +- .../sysmon_susp_reg_persist_explorer_run.md | 7 +- .../sysmon_susp_run_key_img_folder.md | 30 +- .../sysmon_suspicious_keyboard_layout_load.md | 98 + .../sysmon_svchost_dll_search_order_hijack.md | 107 + .../sysmon_sysinternals_eula_accepted.md | 10 +- .../sysmon_tsclient_filewrite_startup.md | 7 +- .../sysmon_uac_bypass_eventvwr.md | 7 +- .../sysmon_uac_bypass_sdclt.md | 7 +- .../sysmon_webshell_creation_detect.md | 115 + .../sysmon_win_binary_github_com.md | 14 +- .../sysmon_win_binary_susp_com.md | 14 +- .../sysmon_win_reg_persistence.md | 19 +- .../sysmon_wmi_event_subscription.md | 5 +- ..._persistence_commandline_event_consumer.md | 3 +- ...persistence_script_event_consumer_write.md | 3 +- .../sysmon_wmi_susp_scripting.md | 7 +- .../Detection_Rules/win_GPO_scheduledtasks.md | 35 + .../win_account_backdoor_dcsync_rights.md | 35 + .../Detection_Rules/win_account_discovery.md | 35 + .../Detection_Rules/win_admin_rdp_login.md | 35 + .../Detection_Rules/win_admin_share_access.md | 35 + ...win_alert_active_directory_user_control.md | 35 + .../win_alert_ad_user_backdoors.md | 35 + .../win_alert_enable_weak_encryption.md | 35 + .../Detection_Rules/win_alert_lsass_access.md | 35 + .../win_alert_mimikatz_keywords.md | 35 + .../Detection_Rules/win_alert_ruler.md | 35 + .../Detection_Rules/win_apt_bluemashroom.md | 37 +- .../Detection_Rules/win_apt_mustangpanda.md | 37 +- .../Detection_Rules/win_atsvc_task.md | 35 + .../win_attrib_hiding_files.md | 35 + .../Detection_Rules/win_av_relevant_match.md | 35 + .../Detection_Rules/win_bypass_squiblytwo.md | 35 + .../win_change_default_file_association.md | 35 + .../Detection_Rules/win_cmdkey_recon.md | 37 +- .../win_cmstp_com_object_access.md | 35 + .../Detection_Rules/win_control_panel_item.md | 37 +- .../win_data_compressed_with_rar.md | 35 + .../Detection_Rules/win_dcsync.md | 35 + .../win_disable_event_logging.md | 35 + .../win_encoded_frombase64string.md | 35 + .../Detection_Rules/win_encoded_iex.md | 35 + .../Detection_Rules/win_etw_trace_evasion.md | 37 +- .../win_exploit_cve_2015_1641.md | 37 +- .../win_exploit_cve_2017_0261.md | 37 +- .../win_exploit_cve_2017_11882.md | 37 +- .../win_exploit_cve_2017_8759.md | 37 +- .../win_exploit_cve_2019_1378.md | 35 + .../win_exploit_cve_2019_1388.md | 35 + .../Detection_Rules/win_hack_rubeus.md | 37 +- .../Detection_Rules/win_hack_smbexec.md | 35 + .../Detection_Rules/win_hwp_exploits.md | 37 +- .../win_impacket_lateralization.md | 35 + .../win_impacket_secretdump.md | 35 + .../win_install_reg_debugger_backdoor.md | 37 +- ...d_party_drivers_exploits_token_stealing.md | 35 + .../Detection_Rules/win_lethalhta.md | 37 +- .../Detection_Rules/win_lm_namedpipe.md | 35 + ...in_local_system_owner_account_discovery.md | 35 + .../Detection_Rules/win_mal_adwind.md | 37 +- .../Detection_Rules/win_mal_creddumper.md | 37 +- .../Detection_Rules/win_mal_ryuk.md | 37 +- .../win_mal_service_installs.md | 35 + .../Detection_Rules/win_mal_ursnif.md | 35 + .../Detection_Rules/win_mal_wceaux_dll.md | 37 +- .../Detection_Rules/win_malware_dridex.md | 37 +- .../Detection_Rules/win_malware_dtrack.md | 37 +- .../Detection_Rules/win_malware_emotet.md | 37 +- .../Detection_Rules/win_malware_formbook.md | 35 + .../Detection_Rules/win_malware_notpetya.md | 37 +- .../Detection_Rules/win_malware_qbot.md | 37 +- .../win_malware_script_dropper.md | 37 +- .../Detection_Rules/win_malware_wannacry.md | 37 +- .../Detection_Rules/win_mavinject_proc_inj.md | 37 +- .../Detection_Rules/win_mmc_spawn_shell.md | 37 +- .../Detection_Rules/win_mshta_spawn_shell.md | 37 +- .../win_multiple_suspicious_cli.md | 37 +- .../Detection_Rules/win_net_ntlm_downgrade.md | 37 +- .../Detection_Rules/win_netsh_fw_add.md | 37 +- .../win_netsh_packet_capture.md | 35 + .../Detection_Rules/win_netsh_port_fwd.md | 37 +- .../win_netsh_port_fwd_3389.md | 37 +- .../Detection_Rules/win_network_sniffing.md | 35 + .../Detection_Rules/win_office_shell.md | 37 +- ...n_office_spawn_exe_from_users_directory.md | 37 +- .../Detection_Rules/win_overpass_the_hash.md | 35 + .../Detection_Rules/win_pass_the_hash.md | 37 +- .../Detection_Rules/win_pass_the_hash_2.md | 35 + .../win_plugx_susp_exe_locations.md | 37 +- .../win_possible_applocker_bypass.md | 35 + .../win_powershell_amsi_bypass.md | 37 +- .../win_powershell_b64_shellcode.md | 37 +- .../win_powershell_dll_execution.md | 35 + .../win_powershell_download.md | 37 +- ...wershell_suspicious_parameter_variation.md | 37 +- .../win_powershell_xor_commandline.md | 37 +- .../win_powersploit_empire_schtasks.md | 37 +- .../Detection_Rules/win_proc_wrong_parent.md | 37 +- ...win_process_creation_bitsadmin_download.md | 37 +- .../Detection_Rules/win_psexesvc_start.md | 35 + .../Detection_Rules/win_query_registry.md | 35 + .../win_ransomware_shadowcopy.md | 37 +- .../win_rare_schtask_creation.md | 35 + .../win_rare_schtasks_creations.md | 35 + .../win_rare_service_installs.md | 35 + .../win_rdp_bluekeep_poc_scanner.md | 35 + .../win_rdp_localhost_login.md | 35 + .../win_rdp_potential_cve-2019-0708.md | 35 + .../Detection_Rules/win_rdp_reverse_tunnel.md | 35 + .../Detection_Rules/win_renamed_binary.md | 35 + .../Detection_Rules/win_renamed_paexec.md | 35 + .../win_sdbinst_shim_persistence.md | 37 +- .../Detection_Rules/win_service_execution.md | 35 + .../win_shell_spawn_susp_program.md | 35 + .../Detection_Rules/win_spn_enum.md | 35 + .../win_susp_add_sid_history.md | 37 +- .../Detection_Rules/win_susp_backup_delete.md | 35 + .../Detection_Rules/win_susp_bcdedit.md | 35 + .../Detection_Rules/win_susp_bginfo.md | 35 + .../Detection_Rules/win_susp_calc.md | 37 +- .../Detection_Rules/win_susp_cdb.md | 35 + .../win_susp_certutil_command.md | 37 +- .../win_susp_certutil_encode.md | 37 +- .../Detection_Rules/win_susp_cli_escape.md | 37 +- .../win_susp_cmd_http_appdata.md | 37 +- .../win_susp_codepage_switch.md | 37 +- .../win_susp_commands_recon_activity.md | 37 +- .../win_susp_compression_params.md | 35 + .../win_susp_comsvcs_procdump.md | 35 + .../win_susp_control_dll_load.md | 37 +- .../Detection_Rules/win_susp_csc.md | 37 +- .../Detection_Rules/win_susp_csc_folder.md | 37 +- .../win_susp_devtoolslauncher.md | 35 + .../Detection_Rules/win_susp_dhcp_config.md | 35 + .../win_susp_dhcp_config_failed.md | 37 +- .../Detection_Rules/win_susp_dns_config.md | 37 +- .../Detection_Rules/win_susp_dnx.md | 35 + .../win_susp_double_extension.md | 37 +- .../win_susp_dsrm_password_change.md | 35 + .../Detection_Rules/win_susp_dxcap.md | 35 + .../win_susp_eventlog_clear.md | 35 + .../win_susp_eventlog_cleared.md | 35 + .../Detection_Rules/win_susp_exec_folder.md | 37 +- .../win_susp_execution_path.md | 37 +- .../win_susp_execution_path_webserver.md | 37 +- .../win_susp_failed_logon_reasons.md | 35 + .../win_susp_failed_logons_single_source.md | 37 +- .../win_susp_firewall_disable.md | 37 +- .../Detection_Rules/win_susp_fsutil_usage.md | 35 + .../Detection_Rules/win_susp_gup.md | 37 +- .../win_susp_interactive_logons.md | 37 +- .../win_susp_iss_module_install.md | 37 +- .../win_susp_kerberos_manipulation.md | 37 +- .../Detection_Rules/win_susp_lsass_dump.md | 35 + .../win_susp_mshta_execution.md | 37 +- .../Detection_Rules/win_susp_msiexec_cwd.md | 37 +- .../win_susp_msiexec_web_install.md | 37 +- .../Detection_Rules/win_susp_msmpeng_crash.md | 35 + .../Detection_Rules/win_susp_msoffice.md | 35 + .../Detection_Rules/win_susp_net_execution.md | 37 +- .../win_susp_net_recon_activity.md | 35 + .../Detection_Rules/win_susp_ntdsutil.md | 37 +- .../Detection_Rules/win_susp_ntlm_auth.md | 35 + .../Detection_Rules/win_susp_odbcconf.md | 35 + .../Detection_Rules/win_susp_openwith.md | 35 + .../Detection_Rules/win_susp_outlook.md | 37 +- .../Detection_Rules/win_susp_outlook_temp.md | 37 +- .../Detection_Rules/win_susp_ping_hex_ip.md | 37 +- .../win_susp_powershell_empire_launch.md | 37 +- .../win_susp_powershell_empire_uac_bypass.md | 37 +- .../win_susp_powershell_enc_cmd.md | 37 +- .../win_susp_powershell_hidden_b64_cmd.md | 37 +- .../win_susp_powershell_parent_combo.md | 35 + .../Detection_Rules/win_susp_procdump.md | 37 +- .../win_susp_process_creations.md | 37 +- .../win_susp_prog_location_process_starts.md | 37 +- .../Detection_Rules/win_susp_ps_appdata.md | 37 +- .../Detection_Rules/win_susp_psexec.md | 35 + .../win_susp_psr_capture_screenshots.md | 35 + .../win_susp_raccess_sensitive_fext.md | 35 + .../win_susp_rasdial_activity.md | 37 +- .../Detection_Rules/win_susp_rc4_kerberos.md | 35 + .../win_susp_recon_activity.md | 37 +- .../win_susp_regsvr32_anomalies.md | 37 +- .../Detection_Rules/win_susp_rottenpotato.md | 35 + .../Detection_Rules/win_susp_run_locations.md | 37 +- .../win_susp_rundll32_activity.md | 37 +- .../win_susp_rundll32_by_ordinal.md | 37 +- .../Detection_Rules/win_susp_sam_dump.md | 35 + .../Detection_Rules/win_susp_samr_pwset.md | 35 + .../win_susp_schtask_creation.md | 35 + .../win_susp_script_execution.md | 37 +- .../Detection_Rules/win_susp_sdelete.md | 37 +- .../win_susp_security_eventlog_cleared.md | 37 +- .../win_susp_squirrel_lolbin.md | 37 +- .../Detection_Rules/win_susp_svchost.md | 37 +- .../win_susp_sysprep_appdata.md | 37 +- .../Detection_Rules/win_susp_sysvol_access.md | 37 +- .../win_susp_taskmgr_localsystem.md | 35 + .../win_susp_taskmgr_parent.md | 37 +- .../win_susp_time_modification.md | 35 + .../win_susp_tscon_localsystem.md | 35 + .../win_susp_tscon_rdp_redirect.md | 37 +- .../win_susp_userinit_child.md | 37 +- .../win_susp_vssadmin_ntds_activity.md | 37 +- .../Detection_Rules/win_susp_whoami.md | 35 + .../Detection_Rules/win_susp_wmi_execution.md | 37 +- .../win_svcctl_remote_service.md | 35 + .../win_sysmon_driver_unload.md | 35 + .../Detection_Rules/win_system_exe_anomaly.md | 37 +- .../win_termserv_proc_spawn.md | 35 + .../Detection_Rules/win_tool_psexec.md | 37 +- .../Detection_Rules/win_usb_device_plugged.md | 37 +- .../win_user_added_to_local_administrators.md | 35 + .../Detection_Rules/win_user_creation.md | 35 + .../win_vul_java_remote_debugging.md | 37 +- .../Detection_Rules/win_webshell_detection.md | 37 +- .../Detection_Rules/win_webshell_spawn.md | 37 +- .../win_win10_sched_task_0day.md | 37 +- ...n_wmi_backdoor_exchange_transport_agent.md | 37 +- .../Detection_Rules/win_wmi_persistence.md | 37 +- ...n_wmi_persistence_script_event_consumer.md | 37 +- .../win_wmi_spwns_powershell.md | 37 +- .../Detection_Rules/win_workflow_compiler.md | 37 +- .../win_xsl_script_processing.md | 35 + analytics/generated/analytics.csv | 8397 ++++------------- analytics/generated/atc_es_index.json | 996 +- .../atc_attack_navigator_profile.json | 2 +- analytics/generated/pivoting.csv | 2096 ++-- 284 files changed, 12385 insertions(+), 8510 deletions(-) create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_registry_persistence_key_linking.md create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_renamed_procdump.md create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_download_run_key.md create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_lsass_dll_load.md create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_suspicious_keyboard_layout_load.md create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_svchost_dll_search_order_hijack.md create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_webshell_creation_detect.md diff --git a/Atomic_Threat_Coverage/Customers/CU_0001_TESTCUSTOMER.md b/Atomic_Threat_Coverage/Customers/CU_0001_TESTCUSTOMER.md index 6eddac4..0ef917d 100644 --- a/Atomic_Threat_Coverage/Customers/CU_0001_TESTCUSTOMER.md +++ b/Atomic_Threat_Coverage/Customers/CU_0001_TESTCUSTOMER.md @@ -4,4 +4,4 @@ | Description | Some text description here. It will be merged into one line. | | Data Needed | | | Logging Policy | | -| Detection Rule | | \ No newline at end of file +| Detection Rule | | \ No newline at end of file diff --git a/Atomic_Threat_Coverage/Detection_Rules/av_exploiting.md b/Atomic_Threat_Coverage/Detection_Rules/av_exploiting.md index 36826aa..b682770 100644 --- a/Atomic_Threat_Coverage/Detection_Rules/av_exploiting.md +++ b/Atomic_Threat_Coverage/Detection_Rules/av_exploiting.md @@ -59,6 +59,27 @@ level: critical +### es-qs + +``` +Signature.keyword:(*MeteTool* OR *MPreter* OR *Meterpreter* OR *Metasploit* OR *PowerSploit* OR *CobaltSrike* OR *Swrort* OR *Rozena* OR *Backdoor.Cobalt*) +``` + + +### xpack-watcher + +``` +curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Antivirus-Exploitation-Framework-Detection <