From 8ba60aab59b687ea3336ef9de0df814472881c18 Mon Sep 17 00:00:00 2001
From: sn0w0tter <42819997+sn0w0tter@users.noreply.github.com>
Date: Thu, 21 Nov 2019 02:07:40 +0100
Subject: [PATCH] markdown + analytics regenerated
---
.../Customers/CU_0001_TESTCUSTOMER.md | 2 +-
.../Detection_Rules/av_exploiting.md | 35 +
.../Detection_Rules/av_password_dumper.md | 35 +
.../Detection_Rules/av_relevant_files.md | 35 +
.../Detection_Rules/av_webshell.md | 35 +
.../powershell_data_compressed.md | 35 +
.../powershell_downgrade_attack.md | 35 +
.../powershell_exe_calling_ps.md | 35 +
.../powershell_malicious_commandlets.md | 35 +
.../powershell_malicious_keywords.md | 35 +
.../powershell_ntfs_ads_access.md | 35 +
.../powershell_prompt_credentials.md | 35 +
.../Detection_Rules/powershell_psattack.md | 35 +
.../powershell_shellcode_b64.md | 35 +
.../powershell_suspicious_download.md | 35 +
...owershell_suspicious_invocation_generic.md | 35 +
...wershell_suspicious_invocation_specific.md | 35 +
.../powershell_suspicious_keywords.md | 35 +
.../powershell_winlogon_helper_dll.md | 35 +
.../Detection_Rules/sysmon_ads_executable.md | 7 +-
.../Detection_Rules/sysmon_cactustorch.md | 7 +-
.../Detection_Rules/sysmon_cmstp_execution.md | 10 +-
.../sysmon_cobaltstrike_process_injection.md | 31 +-
.../Detection_Rules/sysmon_dhcp_calloutdll.md | 8 +-
.../sysmon_dns_serverlevelplugindll.md | 9 +-
.../sysmon_ghostpack_safetykatz.md | 5 +-
...on_logon_scripts_userinitmprlogonscript.md | 71 +-
.../Detection_Rules/sysmon_lsass_memdump.md | 7 +-
.../Detection_Rules/sysmon_mal_namedpipes.md | 7 +-
.../sysmon_malware_backconnect_ports.md | 14 +-
.../sysmon_malware_verclsid_shellcode.md | 5 +-
.../sysmon_mimikatz_detection_lsass.md | 8 +-
.../sysmon_mimikatz_inmemory_detection.md | 3 +-
.../sysmon_mimikatz_trough_winrm.md | 7 +-
.../sysmon_password_dumper_lsass.md | 10 +-
.../sysmon_powershell_exploit_scripts.md | 5 +-
.../sysmon_powershell_network_connection.md | 17 +-
.../sysmon_quarkspw_filedump.md | 5 +-
.../sysmon_rdp_reverse_tunnel.md | 17 +-
.../sysmon_rdp_settings_hijack.md | 13 +-
...sysmon_registry_persistence_key_linking.md | 95 +
.../sysmon_renamed_powershell.md | 9 +-
.../sysmon_renamed_procdump.md | 96 +
.../Detection_Rules/sysmon_renamed_psexec.md | 23 +-
.../sysmon_rundll32_net_connections.md | 14 +-
.../sysmon_ssp_added_lsa_config.md | 7 +-
.../sysmon_stickykey_like_backdoor.md | 11 +-
.../sysmon_susp_download_run_key.md | 95 +
.../sysmon_susp_driver_load.md | 11 +-
.../sysmon_susp_file_characteristics.md | 8 +-
.../Detection_Rules/sysmon_susp_image_load.md | 7 +-
.../sysmon_susp_lsass_dll_load.md | 98 +
.../sysmon_susp_powershell_rundll32.md | 7 +-
...n_susp_prog_location_network_connection.md | 5 +-
.../Detection_Rules/sysmon_susp_rdp.md | 22 +-
.../sysmon_susp_reg_persist_explorer_run.md | 7 +-
.../sysmon_susp_run_key_img_folder.md | 30 +-
.../sysmon_suspicious_keyboard_layout_load.md | 98 +
.../sysmon_svchost_dll_search_order_hijack.md | 107 +
.../sysmon_sysinternals_eula_accepted.md | 10 +-
.../sysmon_tsclient_filewrite_startup.md | 7 +-
.../sysmon_uac_bypass_eventvwr.md | 7 +-
.../sysmon_uac_bypass_sdclt.md | 7 +-
.../sysmon_webshell_creation_detect.md | 115 +
.../sysmon_win_binary_github_com.md | 14 +-
.../sysmon_win_binary_susp_com.md | 14 +-
.../sysmon_win_reg_persistence.md | 19 +-
.../sysmon_wmi_event_subscription.md | 5 +-
..._persistence_commandline_event_consumer.md | 3 +-
...persistence_script_event_consumer_write.md | 3 +-
.../sysmon_wmi_susp_scripting.md | 7 +-
.../Detection_Rules/win_GPO_scheduledtasks.md | 35 +
.../win_account_backdoor_dcsync_rights.md | 35 +
.../Detection_Rules/win_account_discovery.md | 35 +
.../Detection_Rules/win_admin_rdp_login.md | 35 +
.../Detection_Rules/win_admin_share_access.md | 35 +
...win_alert_active_directory_user_control.md | 35 +
.../win_alert_ad_user_backdoors.md | 35 +
.../win_alert_enable_weak_encryption.md | 35 +
.../Detection_Rules/win_alert_lsass_access.md | 35 +
.../win_alert_mimikatz_keywords.md | 35 +
.../Detection_Rules/win_alert_ruler.md | 35 +
.../Detection_Rules/win_apt_bluemashroom.md | 37 +-
.../Detection_Rules/win_apt_mustangpanda.md | 37 +-
.../Detection_Rules/win_atsvc_task.md | 35 +
.../win_attrib_hiding_files.md | 35 +
.../Detection_Rules/win_av_relevant_match.md | 35 +
.../Detection_Rules/win_bypass_squiblytwo.md | 35 +
.../win_change_default_file_association.md | 35 +
.../Detection_Rules/win_cmdkey_recon.md | 37 +-
.../win_cmstp_com_object_access.md | 35 +
.../Detection_Rules/win_control_panel_item.md | 37 +-
.../win_data_compressed_with_rar.md | 35 +
.../Detection_Rules/win_dcsync.md | 35 +
.../win_disable_event_logging.md | 35 +
.../win_encoded_frombase64string.md | 35 +
.../Detection_Rules/win_encoded_iex.md | 35 +
.../Detection_Rules/win_etw_trace_evasion.md | 37 +-
.../win_exploit_cve_2015_1641.md | 37 +-
.../win_exploit_cve_2017_0261.md | 37 +-
.../win_exploit_cve_2017_11882.md | 37 +-
.../win_exploit_cve_2017_8759.md | 37 +-
.../win_exploit_cve_2019_1378.md | 35 +
.../win_exploit_cve_2019_1388.md | 35 +
.../Detection_Rules/win_hack_rubeus.md | 37 +-
.../Detection_Rules/win_hack_smbexec.md | 35 +
.../Detection_Rules/win_hwp_exploits.md | 37 +-
.../win_impacket_lateralization.md | 35 +
.../win_impacket_secretdump.md | 35 +
.../win_install_reg_debugger_backdoor.md | 37 +-
...d_party_drivers_exploits_token_stealing.md | 35 +
.../Detection_Rules/win_lethalhta.md | 37 +-
.../Detection_Rules/win_lm_namedpipe.md | 35 +
...in_local_system_owner_account_discovery.md | 35 +
.../Detection_Rules/win_mal_adwind.md | 37 +-
.../Detection_Rules/win_mal_creddumper.md | 37 +-
.../Detection_Rules/win_mal_ryuk.md | 37 +-
.../win_mal_service_installs.md | 35 +
.../Detection_Rules/win_mal_ursnif.md | 35 +
.../Detection_Rules/win_mal_wceaux_dll.md | 37 +-
.../Detection_Rules/win_malware_dridex.md | 37 +-
.../Detection_Rules/win_malware_dtrack.md | 37 +-
.../Detection_Rules/win_malware_emotet.md | 37 +-
.../Detection_Rules/win_malware_formbook.md | 35 +
.../Detection_Rules/win_malware_notpetya.md | 37 +-
.../Detection_Rules/win_malware_qbot.md | 37 +-
.../win_malware_script_dropper.md | 37 +-
.../Detection_Rules/win_malware_wannacry.md | 37 +-
.../Detection_Rules/win_mavinject_proc_inj.md | 37 +-
.../Detection_Rules/win_mmc_spawn_shell.md | 37 +-
.../Detection_Rules/win_mshta_spawn_shell.md | 37 +-
.../win_multiple_suspicious_cli.md | 37 +-
.../Detection_Rules/win_net_ntlm_downgrade.md | 37 +-
.../Detection_Rules/win_netsh_fw_add.md | 37 +-
.../win_netsh_packet_capture.md | 35 +
.../Detection_Rules/win_netsh_port_fwd.md | 37 +-
.../win_netsh_port_fwd_3389.md | 37 +-
.../Detection_Rules/win_network_sniffing.md | 35 +
.../Detection_Rules/win_office_shell.md | 37 +-
...n_office_spawn_exe_from_users_directory.md | 37 +-
.../Detection_Rules/win_overpass_the_hash.md | 35 +
.../Detection_Rules/win_pass_the_hash.md | 37 +-
.../Detection_Rules/win_pass_the_hash_2.md | 35 +
.../win_plugx_susp_exe_locations.md | 37 +-
.../win_possible_applocker_bypass.md | 35 +
.../win_powershell_amsi_bypass.md | 37 +-
.../win_powershell_b64_shellcode.md | 37 +-
.../win_powershell_dll_execution.md | 35 +
.../win_powershell_download.md | 37 +-
...wershell_suspicious_parameter_variation.md | 37 +-
.../win_powershell_xor_commandline.md | 37 +-
.../win_powersploit_empire_schtasks.md | 37 +-
.../Detection_Rules/win_proc_wrong_parent.md | 37 +-
...win_process_creation_bitsadmin_download.md | 37 +-
.../Detection_Rules/win_psexesvc_start.md | 35 +
.../Detection_Rules/win_query_registry.md | 35 +
.../win_ransomware_shadowcopy.md | 37 +-
.../win_rare_schtask_creation.md | 35 +
.../win_rare_schtasks_creations.md | 35 +
.../win_rare_service_installs.md | 35 +
.../win_rdp_bluekeep_poc_scanner.md | 35 +
.../win_rdp_localhost_login.md | 35 +
.../win_rdp_potential_cve-2019-0708.md | 35 +
.../Detection_Rules/win_rdp_reverse_tunnel.md | 35 +
.../Detection_Rules/win_renamed_binary.md | 35 +
.../Detection_Rules/win_renamed_paexec.md | 35 +
.../win_sdbinst_shim_persistence.md | 37 +-
.../Detection_Rules/win_service_execution.md | 35 +
.../win_shell_spawn_susp_program.md | 35 +
.../Detection_Rules/win_spn_enum.md | 35 +
.../win_susp_add_sid_history.md | 37 +-
.../Detection_Rules/win_susp_backup_delete.md | 35 +
.../Detection_Rules/win_susp_bcdedit.md | 35 +
.../Detection_Rules/win_susp_bginfo.md | 35 +
.../Detection_Rules/win_susp_calc.md | 37 +-
.../Detection_Rules/win_susp_cdb.md | 35 +
.../win_susp_certutil_command.md | 37 +-
.../win_susp_certutil_encode.md | 37 +-
.../Detection_Rules/win_susp_cli_escape.md | 37 +-
.../win_susp_cmd_http_appdata.md | 37 +-
.../win_susp_codepage_switch.md | 37 +-
.../win_susp_commands_recon_activity.md | 37 +-
.../win_susp_compression_params.md | 35 +
.../win_susp_comsvcs_procdump.md | 35 +
.../win_susp_control_dll_load.md | 37 +-
.../Detection_Rules/win_susp_csc.md | 37 +-
.../Detection_Rules/win_susp_csc_folder.md | 37 +-
.../win_susp_devtoolslauncher.md | 35 +
.../Detection_Rules/win_susp_dhcp_config.md | 35 +
.../win_susp_dhcp_config_failed.md | 37 +-
.../Detection_Rules/win_susp_dns_config.md | 37 +-
.../Detection_Rules/win_susp_dnx.md | 35 +
.../win_susp_double_extension.md | 37 +-
.../win_susp_dsrm_password_change.md | 35 +
.../Detection_Rules/win_susp_dxcap.md | 35 +
.../win_susp_eventlog_clear.md | 35 +
.../win_susp_eventlog_cleared.md | 35 +
.../Detection_Rules/win_susp_exec_folder.md | 37 +-
.../win_susp_execution_path.md | 37 +-
.../win_susp_execution_path_webserver.md | 37 +-
.../win_susp_failed_logon_reasons.md | 35 +
.../win_susp_failed_logons_single_source.md | 37 +-
.../win_susp_firewall_disable.md | 37 +-
.../Detection_Rules/win_susp_fsutil_usage.md | 35 +
.../Detection_Rules/win_susp_gup.md | 37 +-
.../win_susp_interactive_logons.md | 37 +-
.../win_susp_iss_module_install.md | 37 +-
.../win_susp_kerberos_manipulation.md | 37 +-
.../Detection_Rules/win_susp_lsass_dump.md | 35 +
.../win_susp_mshta_execution.md | 37 +-
.../Detection_Rules/win_susp_msiexec_cwd.md | 37 +-
.../win_susp_msiexec_web_install.md | 37 +-
.../Detection_Rules/win_susp_msmpeng_crash.md | 35 +
.../Detection_Rules/win_susp_msoffice.md | 35 +
.../Detection_Rules/win_susp_net_execution.md | 37 +-
.../win_susp_net_recon_activity.md | 35 +
.../Detection_Rules/win_susp_ntdsutil.md | 37 +-
.../Detection_Rules/win_susp_ntlm_auth.md | 35 +
.../Detection_Rules/win_susp_odbcconf.md | 35 +
.../Detection_Rules/win_susp_openwith.md | 35 +
.../Detection_Rules/win_susp_outlook.md | 37 +-
.../Detection_Rules/win_susp_outlook_temp.md | 37 +-
.../Detection_Rules/win_susp_ping_hex_ip.md | 37 +-
.../win_susp_powershell_empire_launch.md | 37 +-
.../win_susp_powershell_empire_uac_bypass.md | 37 +-
.../win_susp_powershell_enc_cmd.md | 37 +-
.../win_susp_powershell_hidden_b64_cmd.md | 37 +-
.../win_susp_powershell_parent_combo.md | 35 +
.../Detection_Rules/win_susp_procdump.md | 37 +-
.../win_susp_process_creations.md | 37 +-
.../win_susp_prog_location_process_starts.md | 37 +-
.../Detection_Rules/win_susp_ps_appdata.md | 37 +-
.../Detection_Rules/win_susp_psexec.md | 35 +
.../win_susp_psr_capture_screenshots.md | 35 +
.../win_susp_raccess_sensitive_fext.md | 35 +
.../win_susp_rasdial_activity.md | 37 +-
.../Detection_Rules/win_susp_rc4_kerberos.md | 35 +
.../win_susp_recon_activity.md | 37 +-
.../win_susp_regsvr32_anomalies.md | 37 +-
.../Detection_Rules/win_susp_rottenpotato.md | 35 +
.../Detection_Rules/win_susp_run_locations.md | 37 +-
.../win_susp_rundll32_activity.md | 37 +-
.../win_susp_rundll32_by_ordinal.md | 37 +-
.../Detection_Rules/win_susp_sam_dump.md | 35 +
.../Detection_Rules/win_susp_samr_pwset.md | 35 +
.../win_susp_schtask_creation.md | 35 +
.../win_susp_script_execution.md | 37 +-
.../Detection_Rules/win_susp_sdelete.md | 37 +-
.../win_susp_security_eventlog_cleared.md | 37 +-
.../win_susp_squirrel_lolbin.md | 37 +-
.../Detection_Rules/win_susp_svchost.md | 37 +-
.../win_susp_sysprep_appdata.md | 37 +-
.../Detection_Rules/win_susp_sysvol_access.md | 37 +-
.../win_susp_taskmgr_localsystem.md | 35 +
.../win_susp_taskmgr_parent.md | 37 +-
.../win_susp_time_modification.md | 35 +
.../win_susp_tscon_localsystem.md | 35 +
.../win_susp_tscon_rdp_redirect.md | 37 +-
.../win_susp_userinit_child.md | 37 +-
.../win_susp_vssadmin_ntds_activity.md | 37 +-
.../Detection_Rules/win_susp_whoami.md | 35 +
.../Detection_Rules/win_susp_wmi_execution.md | 37 +-
.../win_svcctl_remote_service.md | 35 +
.../win_sysmon_driver_unload.md | 35 +
.../Detection_Rules/win_system_exe_anomaly.md | 37 +-
.../win_termserv_proc_spawn.md | 35 +
.../Detection_Rules/win_tool_psexec.md | 37 +-
.../Detection_Rules/win_usb_device_plugged.md | 37 +-
.../win_user_added_to_local_administrators.md | 35 +
.../Detection_Rules/win_user_creation.md | 35 +
.../win_vul_java_remote_debugging.md | 37 +-
.../Detection_Rules/win_webshell_detection.md | 37 +-
.../Detection_Rules/win_webshell_spawn.md | 37 +-
.../win_win10_sched_task_0day.md | 37 +-
...n_wmi_backdoor_exchange_transport_agent.md | 37 +-
.../Detection_Rules/win_wmi_persistence.md | 37 +-
...n_wmi_persistence_script_event_consumer.md | 37 +-
.../win_wmi_spwns_powershell.md | 37 +-
.../Detection_Rules/win_workflow_compiler.md | 37 +-
.../win_xsl_script_processing.md | 35 +
analytics/generated/analytics.csv | 8397 ++++-------------
analytics/generated/atc_es_index.json | 996 +-
.../atc_attack_navigator_profile.json | 2 +-
analytics/generated/pivoting.csv | 2096 ++--
284 files changed, 12385 insertions(+), 8510 deletions(-)
create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_registry_persistence_key_linking.md
create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_renamed_procdump.md
create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_download_run_key.md
create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_lsass_dll_load.md
create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_suspicious_keyboard_layout_load.md
create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_svchost_dll_search_order_hijack.md
create mode 100644 Atomic_Threat_Coverage/Detection_Rules/sysmon_webshell_creation_detect.md
diff --git a/Atomic_Threat_Coverage/Customers/CU_0001_TESTCUSTOMER.md b/Atomic_Threat_Coverage/Customers/CU_0001_TESTCUSTOMER.md
index 6eddac4..0ef917d 100644
--- a/Atomic_Threat_Coverage/Customers/CU_0001_TESTCUSTOMER.md
+++ b/Atomic_Threat_Coverage/Customers/CU_0001_TESTCUSTOMER.md
@@ -4,4 +4,4 @@
| Description | Some text description here. It will be merged into one line. |
| Data Needed |
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
| Logging Policy | - [LP_0001_windows_audit_process_creation](../Logging_Policies/LP_0001_windows_audit_process_creation.md)
- [LP_0002_windows_audit_process_creation_with_commandline](../Logging_Policies/LP_0002_windows_audit_process_creation_with_commandline.md)
- [LP_0003_windows_sysmon_process_creation](../Logging_Policies/LP_0003_windows_sysmon_process_creation.md)
|
-| Detection Rule | - [SquiblyTwo](../Detection_Rules/win_bypass_squiblytwo.md)
- [Cmdkey Cached Credentials Recon](../Detection_Rules/win_cmdkey_recon.md)
- [CMSTP UAC Bypass via COM Object Access](../Detection_Rules/win_cmstp_com_object_access.md)
- [Suspicious XOR Encoded PowerShell Command Line](../Detection_Rules/powershell_xor_commandline.md)
- [Hiding files with attrib.exe](../Detection_Rules/win_attrib_hiding_files.md)
- [CMSTP Execution](../Detection_Rules/sysmon_cmstp_execution.md)
- [Exploit for CVE-2015-1641](../Detection_Rules/win_exploit_cve_2015_1641.md)
- [Exploit for CVE-2017-0261](../Detection_Rules/win_exploit_cve_2017_0261.md)
- [Dridex Process Pattern](../Detection_Rules/win_malware_dridex.md)
|
\ No newline at end of file
+| Detection Rule | - [SquiblyTwo](../Detection_Rules/win_bypass_squiblytwo.md)
- [Cmdkey Cached Credentials Recon](../Detection_Rules/win_cmdkey_recon.md)
- [CMSTP UAC Bypass via COM Object Access](../Detection_Rules/win_cmstp_com_object_access.md)
- [Suspicious XOR Encoded PowerShell Command Line](../Detection_Rules/win_powershell_xor_commandline.md)
- [Hiding files with attrib.exe](../Detection_Rules/win_attrib_hiding_files.md)
- [CMSTP Execution](../Detection_Rules/sysmon_cmstp_execution.md)
- [Exploit for CVE-2015-1641](../Detection_Rules/win_exploit_cve_2015_1641.md)
- [Exploit for CVE-2017-0261](../Detection_Rules/win_exploit_cve_2017_0261.md)
- [Dridex Process Pattern](../Detection_Rules/win_malware_dridex.md)
|
\ No newline at end of file
diff --git a/Atomic_Threat_Coverage/Detection_Rules/av_exploiting.md b/Atomic_Threat_Coverage/Detection_Rules/av_exploiting.md
index 36826aa..b682770 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/av_exploiting.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/av_exploiting.md
@@ -59,6 +59,27 @@ level: critical
+### es-qs
+
+```
+Signature.keyword:(*MeteTool* OR *MPreter* OR *Meterpreter* OR *Metasploit* OR *PowerSploit* OR *CobaltSrike* OR *Swrort* OR *Rozena* OR *Backdoor.Cobalt*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Antivirus-Exploitation-Framework-Detection <[https://twitter.com/0xrawsec/status/1002478725605273600?s=21](https://twitter.com/0xrawsec/status/1002478725605273600?s=21) |
| Author | Florian Roth, @0xrawsec |
-| Other Tags | |
+| Other Tags | |
## Detection Rules
@@ -19,6 +19,7 @@
```
title: Executable in ADS
+id: b69888d4-380c-45ce-9cf9-d9ce46e67821
status: experimental
description: Detects the creation of an ADS data stream that contains an executable (non-empty imphash)
references:
@@ -70,7 +71,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-(EventID:"15" AND NOT (Imphash:"00000000000000000000000000000000"))
+(EventID:"15" AND (NOT (Imphash:"00000000000000000000000000000000")))
```
@@ -84,7 +85,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="15" -(Imphash="00000000000000000000000000000000"))
+(event_id="15" -(Imphash="00000000000000000000000000000000"))
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_cactustorch.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_cactustorch.md
index b589fc6..ef3baef 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_cactustorch.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_cactustorch.md
@@ -19,12 +19,13 @@
```
title: CACTUSTORCH Remote Thread Creation
+id: 2e4e488a-6164-4811-9ea1-f960c7359c40
description: Detects remote thread creation from CACTUSTORCH as described in references.
references:
- https://twitter.com/SBousseaden/status/1090588499517079552
- https://github.com/mdsecactivebreach/CACTUSTORCH
status: experimental
-author: "@SBousseaden (detection), Thomas Patzke (rule)"
+author: '@SBousseaden (detection), Thomas Patzke (rule)'
logsource:
product: windows
service: sysmon
@@ -71,7 +72,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-(EventID:"8" AND SourceImage:("*\\\\System32\\\\cscript.exe" "*\\\\System32\\\\wscript.exe" "*\\\\System32\\\\mshta.exe" "*\\\\winword.exe" "*\\\\excel.exe") AND TargetImage:"*\\\\SysWOW64\\\\*" AND NOT _exists_:StartModule)
+(EventID:"8" AND SourceImage.keyword:(*\\\\System32\\\\cscript.exe *\\\\System32\\\\wscript.exe *\\\\System32\\\\mshta.exe *\\\\winword.exe *\\\\excel.exe) AND TargetImage.keyword:*\\\\SysWOW64\\\\* AND NOT _exists_:StartModule)
```
@@ -85,7 +86,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="8" SourceImage IN ["*\\\\System32\\\\cscript.exe", "*\\\\System32\\\\wscript.exe", "*\\\\System32\\\\mshta.exe", "*\\\\winword.exe", "*\\\\excel.exe"] TargetImage="*\\\\SysWOW64\\\\*" -StartModule=*)
+(event_id="8" SourceImage IN ["*\\\\System32\\\\cscript.exe", "*\\\\System32\\\\wscript.exe", "*\\\\System32\\\\mshta.exe", "*\\\\winword.exe", "*\\\\excel.exe"] TargetImage="*\\\\SysWOW64\\\\*" -StartModule=*)
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_cmstp_execution.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_cmstp_execution.md
index a03688f..636845e 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_cmstp_execution.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_cmstp_execution.md
@@ -3,7 +3,7 @@
| Description | Detects various indicators of Microsoft Connection Manager Profile Installer execution |
| ATT&CK Tactic | - [TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)
- [TA0002: Execution](https://attack.mitre.org/tactics/TA0002)
|
| ATT&CK Technique | - [T1191: CMSTP](https://attack.mitre.org/techniques/T1191)
|
-| Data Needed | - [DN_0016_12_windows_sysmon_RegistryEvent](../Data_Needed/DN_0016_12_windows_sysmon_RegistryEvent.md)
- [DN_0014_10_windows_sysmon_ProcessAccess](../Data_Needed/DN_0014_10_windows_sysmon_ProcessAccess.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0017_13_windows_sysmon_RegistryEvent](../Data_Needed/DN_0017_13_windows_sysmon_RegistryEvent.md)
|
+| Data Needed | - [DN_0016_12_windows_sysmon_RegistryEvent](../Data_Needed/DN_0016_12_windows_sysmon_RegistryEvent.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0014_10_windows_sysmon_ProcessAccess](../Data_Needed/DN_0014_10_windows_sysmon_ProcessAccess.md)
- [DN_0017_13_windows_sysmon_RegistryEvent](../Data_Needed/DN_0017_13_windows_sysmon_RegistryEvent.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1191: CMSTP](../Triggers/T1191.md)
|
| Severity Level | high |
@@ -11,16 +11,16 @@
| Development Status | stable |
| References | - [http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/](http://www.endurant.io/cmstp/detecting-cmstp-enabled-code-execution-and-uac-bypass-with-sysmon/)
|
| Author | Nik Seetharaman |
-| Other Tags | - attack.g0069
- attack.g0069
- car.2019-04-001
- car.2019-04-001
|
+| Other Tags | - attack.g0069
- car.2019-04-001
|
## Detection Rules
### Sigma rule
```
----
action: global
title: CMSTP Execution
+id: 9d26fede-b526-4413-b069-6e24b6d07167
status: stable
description: Detects various indicators of Microsoft Connection Manager Profile Installer execution
tags:
@@ -89,7 +89,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-((EventID:"12" AND TargetObject:"*\\\\cmmgr32.exe*") OR (EventID:"13" AND TargetObject:"*\\\\cmmgr32.exe*") OR (EventID:"10" AND CallTrace:"*cmlua.dll*"))\nParentImage:"*\\\\cmstp.exe"
+((EventID:"12" AND TargetObject.keyword:*\\\\cmmgr32.exe*) OR (EventID:"13" AND TargetObject.keyword:*\\\\cmmgr32.exe*) OR (EventID:"10" AND CallTrace.keyword:*cmlua.dll*))\nParentImage.keyword:*\\\\cmstp.exe
```
@@ -103,7 +103,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-((EventID="12" TargetObject="*\\\\cmmgr32.exe*") OR (EventID="13" TargetObject="*\\\\cmmgr32.exe*") OR (EventID="10" CallTrace="*cmlua.dll*"))\nParentImage="*\\\\cmstp.exe"
+((event_id="12" TargetObject="*\\\\cmmgr32.exe*") OR (event_id="13" TargetObject="*\\\\cmmgr32.exe*") OR (event_id="10" CallTrace="*cmlua.dll*"))\n(event_id="1" ParentImage="*\\\\cmstp.exe")
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_cobaltstrike_process_injection.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_cobaltstrike_process_injection.md
index 915fcf6..8f62439 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_cobaltstrike_process_injection.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_cobaltstrike_process_injection.md
@@ -9,8 +9,8 @@
| Severity Level | high |
| False Positives | |
| Development Status | experimental |
-| References | - [https://medium.com/@olafhartong/cobalt-strike-remote-threads-detection-206372d11d0f](https://medium.com/@olafhartong/cobalt-strike-remote-threads-detection-206372d11d0f)
|
-| Author | Olaf Hartong, Florian Roth |
+| References | - [https://medium.com/@olafhartong/cobalt-strike-remote-threads-detection-206372d11d0f](https://medium.com/@olafhartong/cobalt-strike-remote-threads-detection-206372d11d0f)
- [https://blog.cobaltstrike.com/2018/04/09/cobalt-strike-3-11-the-snake-that-eats-its-tail/](https://blog.cobaltstrike.com/2018/04/09/cobalt-strike-3-11-the-snake-that-eats-its-tail/)
|
+| Author | Olaf Hartong, Florian Roth, Aleksey Potapov, oscd.community |
## Detection Rules
@@ -18,22 +18,29 @@
### Sigma rule
```
-title: CobaltStrike Process Injection
-description: Detects a possible remote threat creation with certain characteristics which are typical for Cobalt Strike beacons
+title: CobaltStrike Process Injection
+id: 6309645e-122d-4c5b-bb2b-22e4f9c2fa42
+description: Detects a possible remote threat creation with certain characteristics which are typical for Cobalt Strike beacons
references:
- https://medium.com/@olafhartong/cobalt-strike-remote-threads-detection-206372d11d0f
+ - https://blog.cobaltstrike.com/2018/04/09/cobalt-strike-3-11-the-snake-that-eats-its-tail/
tags:
- attack.defense_evasion
- attack.t1055
status: experimental
-author: Olaf Hartong, Florian Roth
+author: Olaf Hartong, Florian Roth, Aleksey Potapov, oscd.community
+date: 2018/11/30
+modified: 2019/11/08
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 8
- TargetProcessAddress: '*0B80'
+ TargetProcessAddress|endswith:
+ - '0B80'
+ - '0C7C'
+ - '0C88'
condition: selection
falsepositives:
- unknown
@@ -49,42 +56,42 @@ level: high
### es-qs
```
-(EventID:"8" AND TargetProcessAddress.keyword:*0B80)
+(EventID:"8" AND TargetProcessAddress.keyword:(*0B80 OR *0C7C OR *0C88))
```
### xpack-watcher
```
-curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/CobaltStrike-Process-Injection <[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003)[TA0008: Lateral Movement](https://attack.mitre.org/tactics/TA0008) |
| ATT&CK Technique | - [T1037: Logon Scripts](https://attack.mitre.org/techniques/T1037)
|
-| Data Needed | - [DN_0016_12_windows_sysmon_RegistryEvent](../Data_Needed/DN_0016_12_windows_sysmon_RegistryEvent.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0017_13_windows_sysmon_RegistryEvent](../Data_Needed/DN_0017_13_windows_sysmon_RegistryEvent.md)
- [DN_0015_11_windows_sysmon_FileCreate](../Data_Needed/DN_0015_11_windows_sysmon_FileCreate.md)
- [DN_0018_14_windows_sysmon_RegistryEvent](../Data_Needed/DN_0018_14_windows_sysmon_RegistryEvent.md)
|
+| Data Needed | - [DN_0016_12_windows_sysmon_RegistryEvent](../Data_Needed/DN_0016_12_windows_sysmon_RegistryEvent.md)
- [DN_0018_14_windows_sysmon_RegistryEvent](../Data_Needed/DN_0018_14_windows_sysmon_RegistryEvent.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0015_11_windows_sysmon_FileCreate](../Data_Needed/DN_0015_11_windows_sysmon_FileCreate.md)
- [DN_0017_13_windows_sysmon_RegistryEvent](../Data_Needed/DN_0017_13_windows_sysmon_RegistryEvent.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1037: Logon Scripts](../Triggers/T1037.md)
|
| Severity Level | high |
@@ -18,7 +18,9 @@
### Sigma rule
```
+action: global
title: Logon Scripts (UserInitMprLogonScript)
+id: 0a98a10c-685d-4ab0-bddc-b6bdd1d48458
status: experimental
description: Detects creation or execution of UserInitMprLogonScript persistence method
references:
@@ -28,30 +30,45 @@ tags:
- attack.persistence
- attack.lateral_movement
author: Tom Ueltschi (@c_APT_ure)
-logsource:
- product: windows
- service: sysmon
-detection:
- exec_selection:
- EventID: 1 # Migration to process_creation requires multipart YAML
- ParentImage: '*\userinit.exe'
- exec_exclusion:
- Image: '*\explorer.exe'
- CommandLine: '*\netlogon.bat'
- create_selection:
- EventID:
- - 1
- - 11
- - 12
- - 13
- - 14
- create_keywords:
- - UserInitMprLogonScript
- condition: (exec_selection and not exec_exclusion) or (create_selection and create_keywords)
falsepositives:
- exclude legitimate logon scripts
- penetration tests, red teaming
level: high
+---
+logsource:
+ category: process_creation
+ product: windows
+detection:
+ exec_selection:
+ ParentImage: '*\userinit.exe'
+ exec_exclusion1:
+ Image: '*\explorer.exe'
+ exec_exclusion2:
+ CommandLine: '*\netlogon.bat'
+ condition: exec_selection and not exec_exclusion1 and not exec_exclusion2
+---
+logsource:
+ category: process_creation
+ product: windows
+detection:
+ create_keywords_cli:
+ CommandLine: '*UserInitMprLogonScript*'
+ condition: create_keywords_cli
+---
+logsource:
+ product: windows
+ service: sysmon
+detection:
+ create_selection_reg:
+ EventID:
+ - 11
+ - 12
+ - 13
+ - 14
+ create_keywords_reg:
+ TargetObject: '*UserInitMprLogonScript*'
+ condition: create_selection_reg and create_keywords_reg
+
```
@@ -61,42 +78,42 @@ level: high
### es-qs
```
-(((EventID:"1" AND ParentImage.keyword:*\\\\userinit.exe) AND (NOT (Image.keyword:*\\\\explorer.exe AND CommandLine.keyword:*\\\\netlogon.bat))) OR (EventID:("1" OR "11" OR "12" OR "13" OR "14") AND "UserInitMprLogonScript"))
+((ParentImage.keyword:*\\\\userinit.exe AND (NOT (Image.keyword:*\\\\explorer.exe))) AND (NOT (CommandLine.keyword:*\\\\netlogon.bat)))\nCommandLine.keyword:*UserInitMprLogonScript*\n(EventID:("11" OR "12" OR "13" OR "14") AND TargetObject.keyword:*UserInitMprLogonScript*)
```
### xpack-watcher
```
-curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Logon-Scripts-UserInitMprLogonScript <[https://blog.menasec.net/2019/02/threat-hunting-21-procdump-or-taskmgr.html](https://blog.menasec.net/2019/02/threat-hunting-21-procdump-or-taskmgr.html) |
| Author | Samir Bousseaden |
-| Other Tags | |
+| Other Tags | |
## Detection Rules
@@ -19,6 +19,7 @@
```
title: LSASS Memory Dump
+id: 5ef9853e-4d0e-4a70-846f-a9ca37d876da
status: experimental
description: Detects process LSASS memory dump using procdump or taskmgr based on the CallTrace pointing to dbghelp.dll or dbgcore.dll for win10
author: Samir Bousseaden
@@ -67,7 +68,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-(EventID:"10" AND TargetImage:"C\\:\\\\windows\\\\system32\\\\lsass.exe" AND GrantedAccess:"0x1fffff" AND CallTrace:("*dbghelp.dll*" "*dbgcore.dll*"))
+(EventID:"10" AND TargetImage:"C\\:\\\\windows\\\\system32\\\\lsass.exe" AND GrantedAccess:"0x1fffff" AND CallTrace.keyword:(*dbghelp.dll* *dbgcore.dll*))
```
@@ -81,7 +82,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="10" TargetImage="C:\\\\windows\\\\system32\\\\lsass.exe" GrantedAccess="0x1fffff" CallTrace IN ["*dbghelp.dll*", "*dbgcore.dll*"])
+(event_id="10" TargetImage="C:\\\\windows\\\\system32\\\\lsass.exe" GrantedAccess="0x1fffff" CallTrace IN ["*dbghelp.dll*", "*dbgcore.dll*"])
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_mal_namedpipes.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_mal_namedpipes.md
index a03c132..4310b04 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_mal_namedpipes.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_mal_namedpipes.md
@@ -3,7 +3,7 @@
| Description | Detects the creation of a named pipe used by known APT malware |
| ATT&CK Tactic | - [TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)
- [TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004)
|
| ATT&CK Technique | - [T1055: Process Injection](https://attack.mitre.org/techniques/T1055)
|
-| Data Needed | - [DN_0021_18_windows_sysmon_PipeEvent](../Data_Needed/DN_0021_18_windows_sysmon_PipeEvent.md)
- [DN_0020_17_windows_sysmon_PipeEvent](../Data_Needed/DN_0020_17_windows_sysmon_PipeEvent.md)
|
+| Data Needed | - [DN_0020_17_windows_sysmon_PipeEvent](../Data_Needed/DN_0020_17_windows_sysmon_PipeEvent.md)
- [DN_0021_18_windows_sysmon_PipeEvent](../Data_Needed/DN_0021_18_windows_sysmon_PipeEvent.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1055: Process Injection](../Triggers/T1055.md)
|
| Severity Level | critical |
@@ -19,6 +19,7 @@
```
title: Malicious Named Pipe
+id: fe3ac066-98bb-432a-b1e7-a5229cb39d4a
status: experimental
description: Detects the creation of a named pipe used by known APT malware
references:
@@ -82,7 +83,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-(EventID:("17" "18") AND PipeName:("\\\\isapi_http" "\\\\isapi_dg" "\\\\isapi_dg2" "\\\\sdlrpc" "\\\\ahexec" "\\\\winsession" "\\\\lsassw" "\\\\46a676ab7f179e511e30dd2dc41bd388" "\\\\9f81f59bc58452127884ce513865ed20" "\\\\e710f28d59aa529d6792ca6ff0ca1b34" "\\\\rpchlp_3" "\\\\NamePipe_MoreWindows" "\\\\pcheap_reuse" "\\\\msagent_*"))
+(EventID:("17" "18") AND PipeName.keyword:(\\\\isapi_http \\\\isapi_dg \\\\isapi_dg2 \\\\sdlrpc \\\\ahexec \\\\winsession \\\\lsassw \\\\46a676ab7f179e511e30dd2dc41bd388 \\\\9f81f59bc58452127884ce513865ed20 \\\\e710f28d59aa529d6792ca6ff0ca1b34 \\\\rpchlp_3 \\\\NamePipe_MoreWindows \\\\pcheap_reuse \\\\msagent_*))
```
@@ -96,7 +97,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID IN ["17", "18"] PipeName IN ["\\\\isapi_http", "\\\\isapi_dg", "\\\\isapi_dg2", "\\\\sdlrpc", "\\\\ahexec", "\\\\winsession", "\\\\lsassw", "\\\\46a676ab7f179e511e30dd2dc41bd388", "\\\\9f81f59bc58452127884ce513865ed20", "\\\\e710f28d59aa529d6792ca6ff0ca1b34", "\\\\rpchlp_3", "\\\\NamePipe_MoreWindows", "\\\\pcheap_reuse", "\\\\msagent_*"])
+(event_id IN ["17", "18"] PipeName IN ["\\\\isapi_http", "\\\\isapi_dg", "\\\\isapi_dg2", "\\\\sdlrpc", "\\\\ahexec", "\\\\winsession", "\\\\lsassw", "\\\\46a676ab7f179e511e30dd2dc41bd388", "\\\\9f81f59bc58452127884ce513865ed20", "\\\\e710f28d59aa529d6792ca6ff0ca1b34", "\\\\rpchlp_3", "\\\\NamePipe_MoreWindows", "\\\\pcheap_reuse", "\\\\msagent_*"])
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_malware_backconnect_ports.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_malware_backconnect_ports.md
index 159f035..7eabe93 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_malware_backconnect_ports.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_malware_backconnect_ports.md
@@ -19,6 +19,7 @@
```
title: Suspicious Typical Malware Back Connect Ports
+id: 4b89abaa-99fe-4232-afdd-8f9aa4d20382
status: experimental
description: Detects programs that connect to typical malware back connect ports based on statistical analysis from two different sandbox system databases
references:
@@ -35,6 +36,7 @@ logsource:
detection:
selection:
EventID: 3
+ Initiated: 'true'
DestinationPort:
- '4443'
- '2448'
@@ -124,42 +126,42 @@ level: medium
### es-qs
```
-((EventID:"3" AND DestinationPort:("4443" OR "2448" OR "8143" OR "1777" OR "1443" OR "243" OR "65535" OR "13506" OR "3360" OR "200" OR "198" OR "49180" OR "13507" OR "6625" OR "4444" OR "4438" OR "1904" OR "13505" OR "13504" OR "12102" OR "9631" OR "5445" OR "2443" OR "777" OR "13394" OR "13145" OR "12103" OR "5552" OR "3939" OR "3675" OR "666" OR "473" OR "5649" OR "4455" OR "4433" OR "1817" OR "100" OR "65520" OR "1960" OR "1515" OR "743" OR "700" OR "14154" OR "14103" OR "14102" OR "12322" OR "10101" OR "7210" OR "4040" OR "9943")) AND (NOT ((Image.keyword:*\\\\Program\\ Files* OR (DestinationIp.keyword:(10.* OR 192.168.* OR 172.16.* OR 172.17.* OR 172.18.* OR 172.19.* OR 172.20.* OR 172.21.* OR 172.22.* OR 172.23.* OR 172.24.* OR 172.25.* OR 172.26.* OR 172.27.* OR 172.28.* OR 172.29.* OR 172.30.* OR 172.31.* OR 127.*) AND DestinationIsIpv6:"false")))))
+((EventID:"3" AND Initiated:"true" AND DestinationPort:("4443" OR "2448" OR "8143" OR "1777" OR "1443" OR "243" OR "65535" OR "13506" OR "3360" OR "200" OR "198" OR "49180" OR "13507" OR "6625" OR "4444" OR "4438" OR "1904" OR "13505" OR "13504" OR "12102" OR "9631" OR "5445" OR "2443" OR "777" OR "13394" OR "13145" OR "12103" OR "5552" OR "3939" OR "3675" OR "666" OR "473" OR "5649" OR "4455" OR "4433" OR "1817" OR "100" OR "65520" OR "1960" OR "1515" OR "743" OR "700" OR "14154" OR "14103" OR "14102" OR "12322" OR "10101" OR "7210" OR "4040" OR "9943")) AND (NOT ((Image.keyword:*\\\\Program\\ Files* OR (DestinationIp.keyword:(10.* OR 192.168.* OR 172.16.* OR 172.17.* OR 172.18.* OR 172.19.* OR 172.20.* OR 172.21.* OR 172.22.* OR 172.23.* OR 172.24.* OR 172.25.* OR 172.26.* OR 172.27.* OR 172.28.* OR 172.29.* OR 172.30.* OR 172.31.* OR 127.*) AND DestinationIsIpv6:"false")))))
```
### xpack-watcher
```
-curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Typical-Malware-Back-Connect-Ports <[https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow](https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow)[https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html](https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html) |
| Author | Author of this Detection Rule haven't introduced himself |
-| Other Tags | - attack.s0002
- attack.s0002
- car.2019-04-004
- car.2019-04-004
|
+| Other Tags | - attack.s0002
- car.2019-04-004
|
## Detection Rules
@@ -19,8 +19,10 @@
```
title: Mimikatz Detection LSASS Access
+id: 0d894093-71bc-43c3-8c4d-ecfc28dcf5d9
status: experimental
-description: Detects process access to LSASS which is typical for Mimikatz (0x1000 PROCESS_QUERY_ LIMITED_INFORMATION, 0x0400 PROCESS_QUERY_ INFORMATION "only old versions", 0x0010 PROCESS_VM_READ)
+description: Detects process access to LSASS which is typical for Mimikatz (0x1000 PROCESS_QUERY_ LIMITED_INFORMATION, 0x0400 PROCESS_QUERY_ INFORMATION "only old
+ versions", 0x0010 PROCESS_VM_READ)
references:
- https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow
- https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html
@@ -81,7 +83,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="10" TargetImage="C:\\\\windows\\\\system32\\\\lsass.exe" GrantedAccess IN ["0x1410", "0x1010"])
+(event_id="10" TargetImage="C:\\\\windows\\\\system32\\\\lsass.exe" GrantedAccess IN ["0x1410", "0x1010"])
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_mimikatz_inmemory_detection.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_mimikatz_inmemory_detection.md
index 4fd604c..f571b6d 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_mimikatz_inmemory_detection.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_mimikatz_inmemory_detection.md
@@ -11,7 +11,7 @@
| Development Status | experimental |
| References | - [https://securityriskadvisors.com/blog/post/detecting-in-memory-mimikatz/](https://securityriskadvisors.com/blog/post/detecting-in-memory-mimikatz/)
|
| Author | Author of this Detection Rule haven't introduced himself |
-| Other Tags | - attack.s0002
- attack.s0002
- car.2019-04-004
- car.2019-04-004
|
+| Other Tags | - attack.s0002
- car.2019-04-004
|
## Detection Rules
@@ -19,6 +19,7 @@
```
title: Mimikatz In-Memory
+id: c0478ead-5336-46c2-bd5e-b4c84bc3a36e
status: experimental
description: Detects certain DLL loads when Mimikatz gets executed
references:
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_mimikatz_trough_winrm.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_mimikatz_trough_winrm.md
index 33a72e9..3c20cc0 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_mimikatz_trough_winrm.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_mimikatz_trough_winrm.md
@@ -11,14 +11,15 @@
| Development Status | stable |
| References | - [https://pentestlab.blog/2018/05/15/lateral-movement-winrm/](https://pentestlab.blog/2018/05/15/lateral-movement-winrm/)
|
| Author | Patryk Prauze - ING Tech |
-| Other Tags | |
+| Other Tags | |
## Detection Rules
### Sigma rule
```
-title: Mimikatz through Windows Remote Management
+title: Mimikatz through Windows Remote Management
+id: aa35a627-33fb-4d04-a165-d33b4afca3e8
description: Detects usage of mimikatz through WinRM protocol by monitoring access to lsass process by wsmprovhost.exe.
references:
- https://pentestlab.blog/2018/05/15/lateral-movement-winrm/
@@ -80,7 +81,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="10" TargetImage="C:\\\\windows\\\\system32\\\\lsass.exe" SourceImage="C:\\\\Windows\\\\system32\\\\wsmprovhost.exe")
+(event_id="10" TargetImage="C:\\\\windows\\\\system32\\\\lsass.exe" SourceImage="C:\\\\Windows\\\\system32\\\\wsmprovhost.exe")
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_password_dumper_lsass.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_password_dumper_lsass.md
index 4460799..ec47090 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_password_dumper_lsass.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_password_dumper_lsass.md
@@ -11,15 +11,17 @@
| Development Status | stable |
| References | - [https://jpcertcc.github.io/ToolAnalysisResultSheet/details/WCE.htm](https://jpcertcc.github.io/ToolAnalysisResultSheet/details/WCE.htm)
|
| Author | Thomas Patzke |
-| Other Tags | |
+| Other Tags | |
## Detection Rules
### Sigma rule
```
-title: Password Dumper Remote Thread in LSASS
-description: Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage. The process in field Process is the malicious program. A single execution can lead to hundreds of events.
+title: Password Dumper Remote Thread in LSASS
+id: f239b326-2f41-4d6b-9dfa-c846a60ef505
+description: Detects password dumper activity by monitoring remote thread creation EventID 8 in combination with the lsass.exe process as TargetImage. The process
+ in field Process is the malicious program. A single execution can lead to hundreds of events.
references:
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/WCE.htm
status: stable
@@ -78,7 +80,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="8" TargetImage="C:\\\\Windows\\\\System32\\\\lsass.exe" -StartModule=*)
+(event_id="8" TargetImage="C:\\\\Windows\\\\System32\\\\lsass.exe" -StartModule=*)
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_powershell_exploit_scripts.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_powershell_exploit_scripts.md
index 0320760..ea7f23c 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_powershell_exploit_scripts.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_powershell_exploit_scripts.md
@@ -19,6 +19,7 @@
```
title: Malicious PowerShell Commandlet Names
+id: f331aa1f-8c53-4fc3-b083-cc159bc971cb
status: experimental
description: Detects the creation of known powershell scripts for exploitation
references:
@@ -159,7 +160,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-(EventID:"11" AND TargetFilename:("*\\\\Invoke\\-DllInjection.ps1" "*\\\\Invoke\\-WmiCommand.ps1" "*\\\\Get\\-GPPPassword.ps1" "*\\\\Get\\-Keystrokes.ps1" "*\\\\Get\\-VaultCredential.ps1" "*\\\\Invoke\\-CredentialInjection.ps1" "*\\\\Invoke\\-Mimikatz.ps1" "*\\\\Invoke\\-NinjaCopy.ps1" "*\\\\Invoke\\-TokenManipulation.ps1" "*\\\\Out\\-Minidump.ps1" "*\\\\VolumeShadowCopyTools.ps1" "*\\\\Invoke\\-ReflectivePEInjection.ps1" "*\\\\Get\\-TimedScreenshot.ps1" "*\\\\Invoke\\-UserHunter.ps1" "*\\\\Find\\-GPOLocation.ps1" "*\\\\Invoke\\-ACLScanner.ps1" "*\\\\Invoke\\-DowngradeAccount.ps1" "*\\\\Get\\-ServiceUnquoted.ps1" "*\\\\Get\\-ServiceFilePermission.ps1" "*\\\\Get\\-ServicePermission.ps1" "*\\\\Invoke\\-ServiceAbuse.ps1" "*\\\\Install\\-ServiceBinary.ps1" "*\\\\Get\\-RegAutoLogon.ps1" "*\\\\Get\\-VulnAutoRun.ps1" "*\\\\Get\\-VulnSchTask.ps1" "*\\\\Get\\-UnattendedInstallFile.ps1" "*\\\\Get\\-WebConfig.ps1" "*\\\\Get\\-ApplicationHost.ps1" "*\\\\Get\\-RegAlwaysInstallElevated.ps1" "*\\\\Get\\-Unconstrained.ps1" "*\\\\Add\\-RegBackdoor.ps1" "*\\\\Add\\-ScrnSaveBackdoor.ps1" "*\\\\Gupt\\-Backdoor.ps1" "*\\\\Invoke\\-ADSBackdoor.ps1" "*\\\\Enabled\\-DuplicateToken.ps1" "*\\\\Invoke\\-PsUaCme.ps1" "*\\\\Remove\\-Update.ps1" "*\\\\Check\\-VM.ps1" "*\\\\Get\\-LSASecret.ps1" "*\\\\Get\\-PassHashes.ps1" "*\\\\Show\\-TargetScreen.ps1" "*\\\\Port\\-Scan.ps1" "*\\\\Invoke\\-PoshRatHttp.ps1" "*\\\\Invoke\\-PowerShellTCP.ps1" "*\\\\Invoke\\-PowerShellWMI.ps1" "*\\\\Add\\-Exfiltration.ps1" "*\\\\Add\\-Persistence.ps1" "*\\\\Do\\-Exfiltration.ps1" "*\\\\Start\\-CaptureServer.ps1" "*\\\\Invoke\\-ShellCode.ps1" "*\\\\Get\\-ChromeDump.ps1" "*\\\\Get\\-ClipboardContents.ps1" "*\\\\Get\\-FoxDump.ps1" "*\\\\Get\\-IndexedItem.ps1" "*\\\\Get\\-Screenshot.ps1" "*\\\\Invoke\\-Inveigh.ps1" "*\\\\Invoke\\-NetRipper.ps1" "*\\\\Invoke\\-EgressCheck.ps1" "*\\\\Invoke\\-PostExfil.ps1" "*\\\\Invoke\\-PSInject.ps1" "*\\\\Invoke\\-RunAs.ps1" "*\\\\MailRaider.ps1" "*\\\\New\\-HoneyHash.ps1" "*\\\\Set\\-MacAttribute.ps1" "*\\\\Invoke\\-DCSync.ps1" "*\\\\Invoke\\-PowerDump.ps1" "*\\\\Exploit\\-Jboss.ps1" "*\\\\Invoke\\-ThunderStruck.ps1" "*\\\\Invoke\\-VoiceTroll.ps1" "*\\\\Set\\-Wallpaper.ps1" "*\\\\Invoke\\-InveighRelay.ps1" "*\\\\Invoke\\-PsExec.ps1" "*\\\\Invoke\\-SSHCommand.ps1" "*\\\\Get\\-SecurityPackages.ps1" "*\\\\Install\\-SSP.ps1" "*\\\\Invoke\\-BackdoorLNK.ps1" "*\\\\PowerBreach.ps1" "*\\\\Get\\-SiteListPassword.ps1" "*\\\\Get\\-System.ps1" "*\\\\Invoke\\-BypassUAC.ps1" "*\\\\Invoke\\-Tater.ps1" "*\\\\Invoke\\-WScriptBypassUAC.ps1" "*\\\\PowerUp.ps1" "*\\\\PowerView.ps1" "*\\\\Get\\-RickAstley.ps1" "*\\\\Find\\-Fruit.ps1" "*\\\\HTTP\\-Login.ps1" "*\\\\Find\\-TrustedDocuments.ps1" "*\\\\Invoke\\-Paranoia.ps1" "*\\\\Invoke\\-WinEnum.ps1" "*\\\\Invoke\\-ARPScan.ps1" "*\\\\Invoke\\-PortScan.ps1" "*\\\\Invoke\\-ReverseDNSLookup.ps1" "*\\\\Invoke\\-SMBScanner.ps1" "*\\\\Invoke\\-Mimikittenz.ps1"))
+(EventID:"11" AND TargetFilename.keyword:(*\\\\Invoke\\-DllInjection.ps1 *\\\\Invoke\\-WmiCommand.ps1 *\\\\Get\\-GPPPassword.ps1 *\\\\Get\\-Keystrokes.ps1 *\\\\Get\\-VaultCredential.ps1 *\\\\Invoke\\-CredentialInjection.ps1 *\\\\Invoke\\-Mimikatz.ps1 *\\\\Invoke\\-NinjaCopy.ps1 *\\\\Invoke\\-TokenManipulation.ps1 *\\\\Out\\-Minidump.ps1 *\\\\VolumeShadowCopyTools.ps1 *\\\\Invoke\\-ReflectivePEInjection.ps1 *\\\\Get\\-TimedScreenshot.ps1 *\\\\Invoke\\-UserHunter.ps1 *\\\\Find\\-GPOLocation.ps1 *\\\\Invoke\\-ACLScanner.ps1 *\\\\Invoke\\-DowngradeAccount.ps1 *\\\\Get\\-ServiceUnquoted.ps1 *\\\\Get\\-ServiceFilePermission.ps1 *\\\\Get\\-ServicePermission.ps1 *\\\\Invoke\\-ServiceAbuse.ps1 *\\\\Install\\-ServiceBinary.ps1 *\\\\Get\\-RegAutoLogon.ps1 *\\\\Get\\-VulnAutoRun.ps1 *\\\\Get\\-VulnSchTask.ps1 *\\\\Get\\-UnattendedInstallFile.ps1 *\\\\Get\\-WebConfig.ps1 *\\\\Get\\-ApplicationHost.ps1 *\\\\Get\\-RegAlwaysInstallElevated.ps1 *\\\\Get\\-Unconstrained.ps1 *\\\\Add\\-RegBackdoor.ps1 *\\\\Add\\-ScrnSaveBackdoor.ps1 *\\\\Gupt\\-Backdoor.ps1 *\\\\Invoke\\-ADSBackdoor.ps1 *\\\\Enabled\\-DuplicateToken.ps1 *\\\\Invoke\\-PsUaCme.ps1 *\\\\Remove\\-Update.ps1 *\\\\Check\\-VM.ps1 *\\\\Get\\-LSASecret.ps1 *\\\\Get\\-PassHashes.ps1 *\\\\Show\\-TargetScreen.ps1 *\\\\Port\\-Scan.ps1 *\\\\Invoke\\-PoshRatHttp.ps1 *\\\\Invoke\\-PowerShellTCP.ps1 *\\\\Invoke\\-PowerShellWMI.ps1 *\\\\Add\\-Exfiltration.ps1 *\\\\Add\\-Persistence.ps1 *\\\\Do\\-Exfiltration.ps1 *\\\\Start\\-CaptureServer.ps1 *\\\\Invoke\\-ShellCode.ps1 *\\\\Get\\-ChromeDump.ps1 *\\\\Get\\-ClipboardContents.ps1 *\\\\Get\\-FoxDump.ps1 *\\\\Get\\-IndexedItem.ps1 *\\\\Get\\-Screenshot.ps1 *\\\\Invoke\\-Inveigh.ps1 *\\\\Invoke\\-NetRipper.ps1 *\\\\Invoke\\-EgressCheck.ps1 *\\\\Invoke\\-PostExfil.ps1 *\\\\Invoke\\-PSInject.ps1 *\\\\Invoke\\-RunAs.ps1 *\\\\MailRaider.ps1 *\\\\New\\-HoneyHash.ps1 *\\\\Set\\-MacAttribute.ps1 *\\\\Invoke\\-DCSync.ps1 *\\\\Invoke\\-PowerDump.ps1 *\\\\Exploit\\-Jboss.ps1 *\\\\Invoke\\-ThunderStruck.ps1 *\\\\Invoke\\-VoiceTroll.ps1 *\\\\Set\\-Wallpaper.ps1 *\\\\Invoke\\-InveighRelay.ps1 *\\\\Invoke\\-PsExec.ps1 *\\\\Invoke\\-SSHCommand.ps1 *\\\\Get\\-SecurityPackages.ps1 *\\\\Install\\-SSP.ps1 *\\\\Invoke\\-BackdoorLNK.ps1 *\\\\PowerBreach.ps1 *\\\\Get\\-SiteListPassword.ps1 *\\\\Get\\-System.ps1 *\\\\Invoke\\-BypassUAC.ps1 *\\\\Invoke\\-Tater.ps1 *\\\\Invoke\\-WScriptBypassUAC.ps1 *\\\\PowerUp.ps1 *\\\\PowerView.ps1 *\\\\Get\\-RickAstley.ps1 *\\\\Find\\-Fruit.ps1 *\\\\HTTP\\-Login.ps1 *\\\\Find\\-TrustedDocuments.ps1 *\\\\Invoke\\-Paranoia.ps1 *\\\\Invoke\\-WinEnum.ps1 *\\\\Invoke\\-ARPScan.ps1 *\\\\Invoke\\-PortScan.ps1 *\\\\Invoke\\-ReverseDNSLookup.ps1 *\\\\Invoke\\-SMBScanner.ps1 *\\\\Invoke\\-Mimikittenz.ps1))
```
@@ -173,7 +174,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="11" TargetFilename IN ["*\\\\Invoke-DllInjection.ps1", "*\\\\Invoke-WmiCommand.ps1", "*\\\\Get-GPPPassword.ps1", "*\\\\Get-Keystrokes.ps1", "*\\\\Get-VaultCredential.ps1", "*\\\\Invoke-CredentialInjection.ps1", "*\\\\Invoke-Mimikatz.ps1", "*\\\\Invoke-NinjaCopy.ps1", "*\\\\Invoke-TokenManipulation.ps1", "*\\\\Out-Minidump.ps1", "*\\\\VolumeShadowCopyTools.ps1", "*\\\\Invoke-ReflectivePEInjection.ps1", "*\\\\Get-TimedScreenshot.ps1", "*\\\\Invoke-UserHunter.ps1", "*\\\\Find-GPOLocation.ps1", "*\\\\Invoke-ACLScanner.ps1", "*\\\\Invoke-DowngradeAccount.ps1", "*\\\\Get-ServiceUnquoted.ps1", "*\\\\Get-ServiceFilePermission.ps1", "*\\\\Get-ServicePermission.ps1", "*\\\\Invoke-ServiceAbuse.ps1", "*\\\\Install-ServiceBinary.ps1", "*\\\\Get-RegAutoLogon.ps1", "*\\\\Get-VulnAutoRun.ps1", "*\\\\Get-VulnSchTask.ps1", "*\\\\Get-UnattendedInstallFile.ps1", "*\\\\Get-WebConfig.ps1", "*\\\\Get-ApplicationHost.ps1", "*\\\\Get-RegAlwaysInstallElevated.ps1", "*\\\\Get-Unconstrained.ps1", "*\\\\Add-RegBackdoor.ps1", "*\\\\Add-ScrnSaveBackdoor.ps1", "*\\\\Gupt-Backdoor.ps1", "*\\\\Invoke-ADSBackdoor.ps1", "*\\\\Enabled-DuplicateToken.ps1", "*\\\\Invoke-PsUaCme.ps1", "*\\\\Remove-Update.ps1", "*\\\\Check-VM.ps1", "*\\\\Get-LSASecret.ps1", "*\\\\Get-PassHashes.ps1", "*\\\\Show-TargetScreen.ps1", "*\\\\Port-Scan.ps1", "*\\\\Invoke-PoshRatHttp.ps1", "*\\\\Invoke-PowerShellTCP.ps1", "*\\\\Invoke-PowerShellWMI.ps1", "*\\\\Add-Exfiltration.ps1", "*\\\\Add-Persistence.ps1", "*\\\\Do-Exfiltration.ps1", "*\\\\Start-CaptureServer.ps1", "*\\\\Invoke-ShellCode.ps1", "*\\\\Get-ChromeDump.ps1", "*\\\\Get-ClipboardContents.ps1", "*\\\\Get-FoxDump.ps1", "*\\\\Get-IndexedItem.ps1", "*\\\\Get-Screenshot.ps1", "*\\\\Invoke-Inveigh.ps1", "*\\\\Invoke-NetRipper.ps1", "*\\\\Invoke-EgressCheck.ps1", "*\\\\Invoke-PostExfil.ps1", "*\\\\Invoke-PSInject.ps1", "*\\\\Invoke-RunAs.ps1", "*\\\\MailRaider.ps1", "*\\\\New-HoneyHash.ps1", "*\\\\Set-MacAttribute.ps1", "*\\\\Invoke-DCSync.ps1", "*\\\\Invoke-PowerDump.ps1", "*\\\\Exploit-Jboss.ps1", "*\\\\Invoke-ThunderStruck.ps1", "*\\\\Invoke-VoiceTroll.ps1", "*\\\\Set-Wallpaper.ps1", "*\\\\Invoke-InveighRelay.ps1", "*\\\\Invoke-PsExec.ps1", "*\\\\Invoke-SSHCommand.ps1", "*\\\\Get-SecurityPackages.ps1", "*\\\\Install-SSP.ps1", "*\\\\Invoke-BackdoorLNK.ps1", "*\\\\PowerBreach.ps1", "*\\\\Get-SiteListPassword.ps1", "*\\\\Get-System.ps1", "*\\\\Invoke-BypassUAC.ps1", "*\\\\Invoke-Tater.ps1", "*\\\\Invoke-WScriptBypassUAC.ps1", "*\\\\PowerUp.ps1", "*\\\\PowerView.ps1", "*\\\\Get-RickAstley.ps1", "*\\\\Find-Fruit.ps1", "*\\\\HTTP-Login.ps1", "*\\\\Find-TrustedDocuments.ps1", "*\\\\Invoke-Paranoia.ps1", "*\\\\Invoke-WinEnum.ps1", "*\\\\Invoke-ARPScan.ps1", "*\\\\Invoke-PortScan.ps1", "*\\\\Invoke-ReverseDNSLookup.ps1", "*\\\\Invoke-SMBScanner.ps1", "*\\\\Invoke-Mimikittenz.ps1"])
+(event_id="11" TargetFilename IN ["*\\\\Invoke-DllInjection.ps1", "*\\\\Invoke-WmiCommand.ps1", "*\\\\Get-GPPPassword.ps1", "*\\\\Get-Keystrokes.ps1", "*\\\\Get-VaultCredential.ps1", "*\\\\Invoke-CredentialInjection.ps1", "*\\\\Invoke-Mimikatz.ps1", "*\\\\Invoke-NinjaCopy.ps1", "*\\\\Invoke-TokenManipulation.ps1", "*\\\\Out-Minidump.ps1", "*\\\\VolumeShadowCopyTools.ps1", "*\\\\Invoke-ReflectivePEInjection.ps1", "*\\\\Get-TimedScreenshot.ps1", "*\\\\Invoke-UserHunter.ps1", "*\\\\Find-GPOLocation.ps1", "*\\\\Invoke-ACLScanner.ps1", "*\\\\Invoke-DowngradeAccount.ps1", "*\\\\Get-ServiceUnquoted.ps1", "*\\\\Get-ServiceFilePermission.ps1", "*\\\\Get-ServicePermission.ps1", "*\\\\Invoke-ServiceAbuse.ps1", "*\\\\Install-ServiceBinary.ps1", "*\\\\Get-RegAutoLogon.ps1", "*\\\\Get-VulnAutoRun.ps1", "*\\\\Get-VulnSchTask.ps1", "*\\\\Get-UnattendedInstallFile.ps1", "*\\\\Get-WebConfig.ps1", "*\\\\Get-ApplicationHost.ps1", "*\\\\Get-RegAlwaysInstallElevated.ps1", "*\\\\Get-Unconstrained.ps1", "*\\\\Add-RegBackdoor.ps1", "*\\\\Add-ScrnSaveBackdoor.ps1", "*\\\\Gupt-Backdoor.ps1", "*\\\\Invoke-ADSBackdoor.ps1", "*\\\\Enabled-DuplicateToken.ps1", "*\\\\Invoke-PsUaCme.ps1", "*\\\\Remove-Update.ps1", "*\\\\Check-VM.ps1", "*\\\\Get-LSASecret.ps1", "*\\\\Get-PassHashes.ps1", "*\\\\Show-TargetScreen.ps1", "*\\\\Port-Scan.ps1", "*\\\\Invoke-PoshRatHttp.ps1", "*\\\\Invoke-PowerShellTCP.ps1", "*\\\\Invoke-PowerShellWMI.ps1", "*\\\\Add-Exfiltration.ps1", "*\\\\Add-Persistence.ps1", "*\\\\Do-Exfiltration.ps1", "*\\\\Start-CaptureServer.ps1", "*\\\\Invoke-ShellCode.ps1", "*\\\\Get-ChromeDump.ps1", "*\\\\Get-ClipboardContents.ps1", "*\\\\Get-FoxDump.ps1", "*\\\\Get-IndexedItem.ps1", "*\\\\Get-Screenshot.ps1", "*\\\\Invoke-Inveigh.ps1", "*\\\\Invoke-NetRipper.ps1", "*\\\\Invoke-EgressCheck.ps1", "*\\\\Invoke-PostExfil.ps1", "*\\\\Invoke-PSInject.ps1", "*\\\\Invoke-RunAs.ps1", "*\\\\MailRaider.ps1", "*\\\\New-HoneyHash.ps1", "*\\\\Set-MacAttribute.ps1", "*\\\\Invoke-DCSync.ps1", "*\\\\Invoke-PowerDump.ps1", "*\\\\Exploit-Jboss.ps1", "*\\\\Invoke-ThunderStruck.ps1", "*\\\\Invoke-VoiceTroll.ps1", "*\\\\Set-Wallpaper.ps1", "*\\\\Invoke-InveighRelay.ps1", "*\\\\Invoke-PsExec.ps1", "*\\\\Invoke-SSHCommand.ps1", "*\\\\Get-SecurityPackages.ps1", "*\\\\Install-SSP.ps1", "*\\\\Invoke-BackdoorLNK.ps1", "*\\\\PowerBreach.ps1", "*\\\\Get-SiteListPassword.ps1", "*\\\\Get-System.ps1", "*\\\\Invoke-BypassUAC.ps1", "*\\\\Invoke-Tater.ps1", "*\\\\Invoke-WScriptBypassUAC.ps1", "*\\\\PowerUp.ps1", "*\\\\PowerView.ps1", "*\\\\Get-RickAstley.ps1", "*\\\\Find-Fruit.ps1", "*\\\\HTTP-Login.ps1", "*\\\\Find-TrustedDocuments.ps1", "*\\\\Invoke-Paranoia.ps1", "*\\\\Invoke-WinEnum.ps1", "*\\\\Invoke-ARPScan.ps1", "*\\\\Invoke-PortScan.ps1", "*\\\\Invoke-ReverseDNSLookup.ps1", "*\\\\Invoke-SMBScanner.ps1", "*\\\\Invoke-Mimikittenz.ps1"])
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_powershell_network_connection.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_powershell_network_connection.md
index 18b92aa..dcb4a67 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_powershell_network_connection.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_powershell_network_connection.md
@@ -19,8 +19,10 @@
```
title: PowerShell Network Connections
+id: 1f21ec3f-810d-4b0e-8045-322202e22b4b
status: experimental
-description: "Detects a Powershell process that opens network connections - check for suspicious target ports and target systems - adjust to your environment (e.g. extend filters with company's ip range')"
+description: Detects a Powershell process that opens network connections - check for suspicious target ports and target systems - adjust to your environment (e.g.
+ extend filters with company's ip range')
author: Florian Roth
references:
- https://www.youtube.com/watch?v=DLtJTxMWZ2o
@@ -34,6 +36,7 @@ detection:
selection:
EventID: 3
Image: '*\powershell.exe'
+ Initiated: 'true'
filter:
DestinationIp:
- '10.*'
@@ -71,42 +74,42 @@ level: low
### es-qs
```
-((EventID:"3" AND Image.keyword:*\\\\powershell.exe) AND (NOT (DestinationIp.keyword:(10.* OR 192.168.* OR 172.16.* OR 172.17.* OR 172.18.* OR 172.19.* OR 172.20.* OR 172.21.* OR 172.22.* OR 172.23.* OR 172.24.* OR 172.25.* OR 172.26.* OR 172.27.* OR 172.28.* OR 172.29.* OR 172.30.* OR 172.31.* OR 127.0.0.1) AND DestinationIsIpv6:"false" AND User:"NT\\ AUTHORITY\\\\SYSTEM")))
+((EventID:"3" AND Image.keyword:*\\\\powershell.exe AND Initiated:"true") AND (NOT (DestinationIp.keyword:(10.* OR 192.168.* OR 172.16.* OR 172.17.* OR 172.18.* OR 172.19.* OR 172.20.* OR 172.21.* OR 172.22.* OR 172.23.* OR 172.24.* OR 172.25.* OR 172.26.* OR 172.27.* OR 172.28.* OR 172.29.* OR 172.30.* OR 172.31.* OR 127.0.0.1) AND DestinationIsIpv6:"false" AND User:"NT\\ AUTHORITY\\\\SYSTEM")))
```
### xpack-watcher
```
-curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/PowerShell-Network-Connections <[https://twitter.com/SBousseaden/status/1096148422984384514](https://twitter.com/SBousseaden/status/1096148422984384514) |
| Author | Samir Bousseaden |
-| Other Tags | - car.2013-07-002
- car.2013-07-002
|
+| Other Tags | |
## Detection Rules
@@ -19,6 +19,7 @@
```
title: RDP over Reverse SSH Tunnel
+id: 5f699bc5-5446-4a4a-a0b7-5ef2885a3eb4
status: experimental
description: Detects svchost hosting RDP termsvcs communicating with the loopback address and on TCP port 3389
references:
@@ -37,6 +38,7 @@ detection:
selection:
EventID: 3
Image: '*\svchost.exe'
+ Initiated: 'true'
SourcePort: 3389
DestinationIp:
- '127.*'
@@ -45,6 +47,7 @@ detection:
falsepositives:
- unknown
level: high
+
```
@@ -54,42 +57,42 @@ level: high
### es-qs
```
-(EventID:"3" AND Image.keyword:*\\\\svchost.exe AND SourcePort:"3389" AND DestinationIp.keyword:(127.* OR \\:\\:1))
+(EventID:"3" AND Image.keyword:*\\\\svchost.exe AND Initiated:"true" AND SourcePort:"3389" AND DestinationIp.keyword:(127.* OR \\:\\:1))
```
### xpack-watcher
```
-curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/RDP-over-Reverse-SSH-Tunnel <[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003) |
+| ATT&CK Technique | - [T1122: Component Object Model Hijacking](https://attack.mitre.org/techniques/T1122)
|
+| Data Needed | - [DN_0016_12_windows_sysmon_RegistryEvent](../Data_Needed/DN_0016_12_windows_sysmon_RegistryEvent.md)
|
+| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
+| Trigger | - [T1122: Component Object Model Hijacking](../Triggers/T1122.md)
|
+| Severity Level | medium |
+| False Positives | - Maybe some system utilities in rare cases use linking keys for backward compability
|
+| Development Status | experimental |
+| References | - [https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/](https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/)
|
+| Author | Kutepov Anton, oscd.community |
+
+
+## Detection Rules
+
+### Sigma rule
+
+```
+title: Windows Registry Persistence - COM key linking
+id: 9b0f8a61-91b2-464f-aceb-0527e0a45020
+status: experimental
+description: Detects COM object hijacking via TreatAs subkey
+references:
+ - https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/
+author: Kutepov Anton, oscd.community
+date: 2019/10/23
+modified: 2019/11/07
+tags:
+ - attack.persistence
+ - attack.t1122
+logsource:
+ product: windows
+ service: sysmon
+detection:
+ selection:
+ EventID: 12
+ TargetObject|startswith: 'HKU\'
+ TargetObject|contains: '_Classes\CLSID\'
+ TargetObject|endswith: '\TreatAs'
+ condition: selection
+falsepositives:
+ - Maybe some system utilities in rare cases use linking keys for backward compability
+level: medium
+
+```
+
+
+
+
+
+### es-qs
+
+```
+(EventID:"12" AND TargetObject:"HKU\\*" AND TargetObject.keyword:*_Classes\\\\CLSID\\* AND TargetObject.keyword:*\\\\TreatAs)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Windows-Registry-Persistence---COM-key-linking <[DN_0011_7_windows_sysmon_image_loaded](../Data_Needed/DN_0011_7_windows_sysmon_image_loaded.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0011_7_windows_sysmon_image_loaded](../Data_Needed/DN_0011_7_windows_sysmon_image_loaded.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | critical |
@@ -11,7 +11,7 @@
| Development Status | experimental |
| References | - [https://twitter.com/christophetd/status/1164506034720952320](https://twitter.com/christophetd/status/1164506034720952320)
|
| Author | Florian Roth |
-| Other Tags | - car.2013-05-009
- car.2013-05-009
|
+| Other Tags | |
## Detection Rules
@@ -19,8 +19,9 @@
```
title: Renamed PowerShell
+id: d178a2d7-129a-4ba4-8ee6-d6e1fecd5d20
status: experimental
-description: Detects the execution of a renamed PowerShell often used by attackers or malware
+description: Detects the execution of a renamed PowerShell often used by attackers or malware
references:
- https://twitter.com/christophetd/status/1164506034720952320
author: Florian Roth
@@ -66,7 +67,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-((Description:"Windows PowerShell" AND Company:"Microsoft Corporation") AND NOT (Image:("*\\\\powershell.exe" "*\\\\powershell_ise.exe")))
+((Description:"Windows PowerShell" AND Company:"Microsoft Corporation") AND (NOT (Image.keyword:(*\\\\powershell.exe *\\\\powershell_ise.exe))))
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_renamed_procdump.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_renamed_procdump.md
new file mode 100644
index 0000000..214992e
--- /dev/null
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_renamed_procdump.md
@@ -0,0 +1,96 @@
+| Title | Renamed ProcDump |
+|:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Description | Detects the execution of a renamed ProcDump executable often used by attackers or malware |
+| ATT&CK Tactic | - [TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)
|
+| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0011_7_windows_sysmon_image_loaded](../Data_Needed/DN_0011_7_windows_sysmon_image_loaded.md)
|
+| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
+| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
+| Severity Level | critical |
+| False Positives | - Procdump illegaly bundled with legitimate software
- Weird admins who renamed binaries
|
+| Development Status | experimental |
+| References | - [https://docs.microsoft.com/en-us/sysinternals/downloads/procdump](https://docs.microsoft.com/en-us/sysinternals/downloads/procdump)
|
+| Author | Florian Roth |
+
+
+## Detection Rules
+
+### Sigma rule
+
+```
+title: Renamed ProcDump
+id: 4a0b2c7e-7cb2-495d-8b63-5f268e7bfd67
+status: experimental
+description: Detects the execution of a renamed ProcDump executable often used by attackers or malware
+references:
+ - https://docs.microsoft.com/en-us/sysinternals/downloads/procdump
+author: Florian Roth
+date: 2019/11/18
+tags:
+ - attack.defense_evasion
+ - attack.t1036
+logsource:
+ product: windows
+ service: sysmon
+detection:
+ selection:
+ OriginalFileName: 'procdump'
+ filter:
+ Image:
+ - '*\procdump.exe'
+ - '*\procdump64.exe'
+ condition: selection and not filter
+falsepositives:
+ - Procdump illegaly bundled with legitimate software
+ - Weird admins who renamed binaries
+level: critical
+
+```
+
+
+
+
+
+### es-qs
+
+```
+(OriginalFileName:"procdump" AND (NOT (Image.keyword:(*\\\\procdump.exe OR *\\\\procdump64.exe))))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Renamed-ProcDump <[DN_0011_7_windows_sysmon_image_loaded](../Data_Needed/DN_0011_7_windows_sysmon_image_loaded.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0011_7_windows_sysmon_image_loaded](../Data_Needed/DN_0011_7_windows_sysmon_image_loaded.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | high |
@@ -11,7 +11,7 @@
| Development Status | experimental |
| References | - [https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/megacortex-ransomware-spotted-attacking-enterprise-networks](https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/megacortex-ransomware-spotted-attacking-enterprise-networks)
|
| Author | Florian Roth |
-| Other Tags | - car.2013-05-009
- car.2013-05-009
|
+| Other Tags | |
## Detection Rules
@@ -19,8 +19,9 @@
```
title: Renamed PsExec
+id: a7a7e0e5-1d57-49df-9c58-9fe5bc0346a2
status: experimental
-description: Detects the execution of a renamed PsExec often used by attackers or malware
+description: Detects the execution of a renamed PsExec often used by attackers or malware
references:
- https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/megacortex-ransomware-spotted-attacking-enterprise-networks
author: Florian Roth
@@ -35,7 +36,9 @@ detection:
Description: 'Execute processes remotely'
Product: 'Sysinternals PsExec'
filter:
- Image: '*\PsExec.exe'
+ Image:
+ - '*\PsExec.exe'
+ - '*\PsExec64.exe'
condition: selection and not filter
falsepositives:
- Software that illegaly integrates PsExec in a renamed form
@@ -51,42 +54,42 @@ level: high
### es-qs
```
-((Description:"Execute\\ processes\\ remotely" AND Product:"Sysinternals\\ PsExec") AND (NOT (Image.keyword:*\\\\PsExec.exe)))
+((Description:"Execute\\ processes\\ remotely" AND Product:"Sysinternals\\ PsExec") AND (NOT (Image.keyword:(*\\\\PsExec.exe OR *\\\\PsExec64.exe))))
```
### xpack-watcher
```
-curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Renamed-PsExec <[https://blogs.technet.microsoft.com/jonathantrull/2016/10/03/detecting-sticky-key-backdoors/](https://blogs.technet.microsoft.com/jonathantrull/2016/10/03/detecting-sticky-key-backdoors/) |
| Author | Florian Roth, @twjackomo |
-| Other Tags | - car.2014-11-003
- car.2014-11-003
- car.2014-11-008
- car.2014-11-008
|
+| Other Tags | - car.2014-11-003
- car.2014-11-008
|
## Detection Rules
### Sigma rule
```
----
action: global
title: Sticky Key Like Backdoor Usage
-description: Detects the usage and installation of a backdoor that uses an option to register a malicious debugger for built-in tools that are accessible in the login screen
+id: baca5663-583c-45f9-b5dc-ea96a22ce542
+description: Detects the usage and installation of a backdoor that uses an option to register a malicious debugger for built-in tools that are accessible in the login
+ screen
references:
- https://blogs.technet.microsoft.com/jonathantrull/2016/10/03/detecting-sticky-key-backdoors/
tags:
@@ -91,7 +92,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-(EventID:"13" AND TargetObject:("*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\sethc.exe\\\\Debugger" "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\utilman.exe\\\\Debugger" "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\osk.exe\\\\Debugger" "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\Magnify.exe\\\\Debugger" "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\Narrator.exe\\\\Debugger" "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\DisplaySwitch.exe\\\\Debugger") AND EventType:"SetValue")\n(ParentImage:("*\\\\winlogon.exe") AND CommandLine:("*cmd.exe sethc.exe *" "*cmd.exe utilman.exe *" "*cmd.exe osk.exe *" "*cmd.exe Magnify.exe *" "*cmd.exe Narrator.exe *" "*cmd.exe DisplaySwitch.exe *"))
+(EventID:"13" AND TargetObject.keyword:(*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\sethc.exe\\\\Debugger *\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\utilman.exe\\\\Debugger *\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\osk.exe\\\\Debugger *\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\Magnify.exe\\\\Debugger *\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\Narrator.exe\\\\Debugger *\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\DisplaySwitch.exe\\\\Debugger) AND EventType:"SetValue")\n(ParentImage.keyword:(*\\\\winlogon.exe) AND CommandLine.keyword:(*cmd.exe sethc.exe * *cmd.exe utilman.exe * *cmd.exe osk.exe * *cmd.exe Magnify.exe * *cmd.exe Narrator.exe * *cmd.exe DisplaySwitch.exe *))
```
@@ -105,7 +106,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="13" TargetObject IN ["*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\sethc.exe\\\\Debugger", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\utilman.exe\\\\Debugger", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\osk.exe\\\\Debugger", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\Magnify.exe\\\\Debugger", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\Narrator.exe\\\\Debugger", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\DisplaySwitch.exe\\\\Debugger"] EventType="SetValue")\n(ParentImage IN ["*\\\\winlogon.exe"] CommandLine IN ["*cmd.exe sethc.exe *", "*cmd.exe utilman.exe *", "*cmd.exe osk.exe *", "*cmd.exe Magnify.exe *", "*cmd.exe Narrator.exe *", "*cmd.exe DisplaySwitch.exe *"])
+(event_id="13" TargetObject IN ["*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\sethc.exe\\\\Debugger", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\utilman.exe\\\\Debugger", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\osk.exe\\\\Debugger", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\Magnify.exe\\\\Debugger", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\Narrator.exe\\\\Debugger", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\DisplaySwitch.exe\\\\Debugger"] EventType="SetValue")\n(event_id="1" ParentImage IN ["*\\\\winlogon.exe"] CommandLine IN ["*cmd.exe sethc.exe *", "*cmd.exe utilman.exe *", "*cmd.exe osk.exe *", "*cmd.exe Magnify.exe *", "*cmd.exe Narrator.exe *", "*cmd.exe DisplaySwitch.exe *"])
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_download_run_key.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_download_run_key.md
new file mode 100644
index 0000000..7f40cb1
--- /dev/null
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_download_run_key.md
@@ -0,0 +1,95 @@
+| Title | Suspicious RUN Key from Download |
+|:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Description | Detects the suspicious RUN keys created by software located in Download or temporary Outlook/Internet Explorer directories |
+| ATT&CK Tactic | - [TA0003: Persistence](https://attack.mitre.org/tactics/TA0003)
|
+| ATT&CK Technique | - [T1060: Registry Run Keys / Startup Folder](https://attack.mitre.org/techniques/T1060)
|
+| Data Needed | - [DN_0017_13_windows_sysmon_RegistryEvent](../Data_Needed/DN_0017_13_windows_sysmon_RegistryEvent.md)
|
+| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
+| Trigger | - [T1060: Registry Run Keys / Startup Folder](../Triggers/T1060.md)
|
+| Severity Level | high |
+| False Positives | - Software installers downloaded and used by users
|
+| Development Status | experimental |
+| References | - [https://app.any.run/tasks/c5bef5b7-f484-4c43-9cf3-d5c5c7839def/](https://app.any.run/tasks/c5bef5b7-f484-4c43-9cf3-d5c5c7839def/)
|
+| Author | Florian Roth |
+
+
+## Detection Rules
+
+### Sigma rule
+
+```
+title: Suspicious RUN Key from Download
+id: 9c5037d1-c568-49b3-88c7-9846a5bdc2be
+status: experimental
+description: Detects the suspicious RUN keys created by software located in Download or temporary Outlook/Internet Explorer directories
+references:
+ - https://app.any.run/tasks/c5bef5b7-f484-4c43-9cf3-d5c5c7839def/
+author: Florian Roth
+date: 2019/10/01
+tags:
+ - attack.persistence
+ - attack.t1060
+logsource:
+ product: windows
+ service: sysmon
+detection:
+ selection:
+ EventID: 13
+ Image:
+ - '*\Downloads\\*'
+ - '*\Temporary Internet Files\Content.Outlook\\*'
+ - '*\Local Settings\Temporary Internet Files\\*'
+ TargetObject: '*\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\*'
+ condition: selection
+falsepositives:
+ - Software installers downloaded and used by users
+level: high
+```
+
+
+
+
+
+### es-qs
+
+```
+(EventID:"13" AND Image.keyword:(*\\\\Downloads\\\\* OR *\\\\Temporary\\ Internet\\ Files\\\\Content.Outlook\\\\* OR *\\\\Local\\ Settings\\\\Temporary\\ Internet\\ Files\\\\*) AND TargetObject.keyword:*\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-RUN-Key-from-Download <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1064: Scripting](https://attack.mitre.org/techniques/T1064)
|
-| Data Needed | - [DN_0011_7_windows_sysmon_image_loaded](../Data_Needed/DN_0011_7_windows_sysmon_image_loaded.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0011_7_windows_sysmon_image_loaded](../Data_Needed/DN_0011_7_windows_sysmon_image_loaded.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1064: Scripting](../Triggers/T1064.md)
|
-| Severity Level | high |
+| Severity Level | medium |
| False Positives | |
| Development Status | experimental |
| References | - [https://securelist.com/muddywater/88059/](https://securelist.com/muddywater/88059/)
- [https://www.virustotal.com/#/file/276a765a10f98cda1a38d3a31e7483585ca3722ecad19d784441293acf1b7beb/detection](https://www.virustotal.com/#/file/276a765a10f98cda1a38d3a31e7483585ca3722ecad19d784441293acf1b7beb/detection)
|
@@ -19,6 +19,7 @@
```
title: Suspicious File Characteristics due to Missing Fields
+id: 9637e8a5-7131-4f7f-bdc7-2b05d8670c43
description: Detects Executables without FileVersion,Description,Product,Company likely created with py2exe
status: experimental
references:
@@ -26,6 +27,7 @@ references:
- https://www.virustotal.com/#/file/276a765a10f98cda1a38d3a31e7483585ca3722ecad19d784441293acf1b7beb/detection
author: Markus Neis
date: 2018/11/22
+modified: 2019/11/09
tags:
- attack.defense_evasion
- attack.execution
@@ -49,7 +51,7 @@ fields:
- ParentCommandLine
falsepositives:
- Unknown
-level: high
+level: medium
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_image_load.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_image_load.md
index 6f1408f..f04a6b7 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_image_load.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_image_load.md
@@ -18,7 +18,8 @@
### Sigma rule
```
-title: Possible Process Hollowing Image Loading
+title: Possible Process Hollowing Image Loading
+id: e32ce4f5-46c6-4c47-ba69-5de3c9193cd7
status: experimental
description: Detects Loading of samlib.dll, WinSCard.dll from untypical process e.g. through process hollowing by Mimikatz
references:
@@ -67,7 +68,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-(EventID:"7" AND Image:("*\\\\notepad.exe") AND ImageLoaded:("*\\\\samlib.dll" "*\\\\WinSCard.dll"))
+(EventID:"7" AND Image.keyword:(*\\\\notepad.exe) AND ImageLoaded.keyword:(*\\\\samlib.dll *\\\\WinSCard.dll))
```
@@ -81,7 +82,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="7" Image IN ["*\\\\notepad.exe"] ImageLoaded IN ["*\\\\samlib.dll", "*\\\\WinSCard.dll"])
+(event_id="7" Image IN ["*\\\\notepad.exe"] ImageLoaded IN ["*\\\\samlib.dll", "*\\\\WinSCard.dll"])
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_lsass_dll_load.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_lsass_dll_load.md
new file mode 100644
index 0000000..dba708f
--- /dev/null
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_lsass_dll_load.md
@@ -0,0 +1,98 @@
+| Title | DLL Load via LSASS |
+|:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Description | Detects a method to load DLL via LSASS process using an undocumented Registry key |
+| ATT&CK Tactic | - [TA0002: Execution](https://attack.mitre.org/tactics/TA0002)
|
+| ATT&CK Technique | - [T1177: LSASS Driver](https://attack.mitre.org/techniques/T1177)
|
+| Data Needed | - [DN_0016_12_windows_sysmon_RegistryEvent](../Data_Needed/DN_0016_12_windows_sysmon_RegistryEvent.md)
- [DN_0017_13_windows_sysmon_RegistryEvent](../Data_Needed/DN_0017_13_windows_sysmon_RegistryEvent.md)
|
+| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
+| Trigger | - [T1177: LSASS Driver](../Triggers/T1177.md)
|
+| Severity Level | high |
+| False Positives | |
+| Development Status | experimental |
+| References | - [https://blog.xpnsec.com/exploring-mimikatz-part-1/](https://blog.xpnsec.com/exploring-mimikatz-part-1/)
- [https://twitter.com/SBousseaden/status/1183745981189427200](https://twitter.com/SBousseaden/status/1183745981189427200)
|
+| Author | Florian Roth |
+
+
+## Detection Rules
+
+### Sigma rule
+
+```
+title: DLL Load via LSASS
+id: b3503044-60ce-4bf4-bbcb-e3db98788823
+status: experimental
+description: Detects a method to load DLL via LSASS process using an undocumented Registry key
+author: Florian Roth
+date: 2019/10/16
+references:
+ - https://blog.xpnsec.com/exploring-mimikatz-part-1/
+ - https://twitter.com/SBousseaden/status/1183745981189427200
+logsource:
+ product: windows
+ service: sysmon
+detection:
+ selection:
+ EventID:
+ - 12
+ - 13
+ TargetObject:
+ - '*\CurrentControlSet\Services\NTDS\DirectoryServiceExtPt*'
+ - '*\CurrentControlSet\Services\NTDS\LsaDbExtPt*'
+ condition: selection
+tags:
+ - attack.execution
+ - attack.t1177
+falsepositives:
+ - Unknown
+level: high
+
+
+```
+
+
+
+
+
+### es-qs
+
+```
+(EventID:("12" OR "13") AND TargetObject.keyword:(*\\\\CurrentControlSet\\\\Services\\\\NTDS\\\\DirectoryServiceExtPt* OR *\\\\CurrentControlSet\\\\Services\\\\NTDS\\\\LsaDbExtPt*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/DLL-Load-via-LSASS <[https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708](https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708) |
| Author | Markus Neis - Swisscom |
-| Other Tags | - car.2013-07-002
- car.2013-07-002
|
+| Other Tags | |
## Detection Rules
### Sigma rule
```
-title: Suspicious Outbound RDP Connections
+title: Suspicious Outbound RDP Connections
+id: ed74fe75-7594-4b4b-ae38-e38e3fd2eb23
status: experimental
description: Detects Non-Standard Tools Connecting to TCP port 3389 indicating possible lateral movement
references:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708
-author: Markus Neis - Swisscom
+author: Markus Neis - Swisscom
date: 2019/05/15
tags:
- attack.lateral_movement
@@ -35,7 +36,8 @@ logsource:
detection:
selection:
EventID: 3
- DestinationPort: 3389
+ DestinationPort: 3389
+ Initiated: 'true'
filter:
Image:
- '*\mstsc.exe'
@@ -71,42 +73,42 @@ level: high
### es-qs
```
-((EventID:"3" AND DestinationPort:"3389") AND (NOT (Image.keyword:(*\\\\mstsc.exe OR *\\\\RTSApp.exe OR *\\\\RTS2App.exe OR *\\\\RDCMan.exe OR *\\\\ws_TunnelService.exe OR *\\\\RSSensor.exe OR *\\\\RemoteDesktopManagerFree.exe OR *\\\\RemoteDesktopManager.exe OR *\\\\RemoteDesktopManager64.exe OR *\\\\mRemoteNG.exe OR *\\\\mRemote.exe OR *\\\\Terminals.exe OR *\\\\spiceworks\\-finder.exe OR *\\\\FSDiscovery.exe OR *\\\\FSAssessment.exe OR *\\\\MobaRTE.exe OR *\\\\chrome.exe OR *\\\\thor.exe OR *\\\\thor64.exe))))
+((EventID:"3" AND DestinationPort:"3389" AND Initiated:"true") AND (NOT (Image.keyword:(*\\\\mstsc.exe OR *\\\\RTSApp.exe OR *\\\\RTS2App.exe OR *\\\\RDCMan.exe OR *\\\\ws_TunnelService.exe OR *\\\\RSSensor.exe OR *\\\\RemoteDesktopManagerFree.exe OR *\\\\RemoteDesktopManager.exe OR *\\\\RemoteDesktopManager64.exe OR *\\\\mRemoteNG.exe OR *\\\\mRemote.exe OR *\\\\Terminals.exe OR *\\\\spiceworks\\-finder.exe OR *\\\\FSDiscovery.exe OR *\\\\FSAssessment.exe OR *\\\\MobaRTE.exe OR *\\\\chrome.exe OR *\\\\thor.exe OR *\\\\thor64.exe))))
```
### xpack-watcher
```
-curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Outbound-RDP-Connections <[https://researchcenter.paloaltonetworks.com/2018/07/unit42-upatre-continues-evolve-new-anti-analysis-techniques/](https://researchcenter.paloaltonetworks.com/2018/07/unit42-upatre-continues-evolve-new-anti-analysis-techniques/) |
| Author | Florian Roth |
-| Other Tags | |
+| Other Tags | |
## Detection Rules
@@ -19,6 +19,7 @@
```
title: Registry Persistence via Explorer Run Key
+id: b7916c2a-fa2f-4795-9477-32b731f70f11
status: experimental
description: Detects a possible persistence mechanism using RUN key for Windows Explorer and poiting to a suspicious folder
author: Florian Roth
@@ -76,7 +77,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-(EventID:"13" AND TargetObject:"*\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\Explorer\\\\Run" AND Details:("C\\:\\\\Windows\\\\Temp\\\\*" "C\\:\\\\ProgramData\\\\*" "*\\\\AppData\\\\*" "C\\:\\\\$Recycle.bin\\\\*" "C\\:\\\\Temp\\\\*" "C\\:\\\\Users\\\\Public\\\\*" "C\\:\\\\Users\\\\Default\\\\*"))
+(EventID:"13" AND TargetObject.keyword:*\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\Explorer\\\\Run AND Details.keyword:(C\\:\\\\Windows\\\\Temp\\\\* C\\:\\\\ProgramData\\\\* *\\\\AppData\\\\* C\\:\\\\$Recycle.bin\\\\* C\\:\\\\Temp\\\\* C\\:\\\\Users\\\\Public\\\\* C\\:\\\\Users\\\\Default\\\\*))
```
@@ -90,7 +91,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="13" TargetObject="*\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\Explorer\\\\Run" Details IN ["C:\\\\Windows\\\\Temp\\\\*", "C:\\\\ProgramData\\\\*", "*\\\\AppData\\\\*", "C:\\\\$Recycle.bin\\\\*", "C:\\\\Temp\\\\*", "C:\\\\Users\\\\Public\\\\*", "C:\\\\Users\\\\Default\\\\*"])
+(event_id="13" TargetObject="*\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\Explorer\\\\Run" Details IN ["C:\\\\Windows\\\\Temp\\\\*", "C:\\\\ProgramData\\\\*", "*\\\\AppData\\\\*", "C:\\\\$Recycle.bin\\\\*", "C:\\\\Temp\\\\*", "C:\\\\Users\\\\Public\\\\*", "C:\\\\Users\\\\Default\\\\*"])
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_run_key_img_folder.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_run_key_img_folder.md
index 21cc04d..9f224a8 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_run_key_img_folder.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_susp_run_key_img_folder.md
@@ -19,6 +19,7 @@
```
title: New RUN Key Pointing to Suspicious Folder
+id: 02ee49e2-e294-4d0f-9278-f5b3212fc588
status: experimental
description: Detects suspicious new RUN key element pointing to an executable in a suspicious folder
references:
@@ -28,6 +29,7 @@ tags:
- attack.persistence
- attack.t1060
date: 2018/25/08
+modified: 2019/10/01
logsource:
product: windows
service: sysmon
@@ -38,13 +40,17 @@ detection:
- '*\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\*'
- '*\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\\*'
Details:
- - 'C:\Windows\Temp\\*'
+ - '*C:\Windows\Temp\\*'
- '*\AppData\\*'
- - 'C:\$Recycle.bin\\*'
- - 'C:\Temp\\*'
- - 'C:\Users\Public\\*'
- - 'C:\Users\Default\\*'
- - 'C:\Users\Desktop\\*'
+ - '%AppData%\\*'
+ - '*C:\$Recycle.bin\\*'
+ - '*C:\Temp\\*'
+ - '*C:\Users\Public\\*'
+ - '%Public%\\*'
+ - '*C:\Users\Default\\*'
+ - '*C:\Users\Desktop\\*'
+ - 'wscript*'
+ - 'cscript*'
condition: selection
fields:
- Image
@@ -61,42 +67,42 @@ level: high
### es-qs
```
-(EventID:"13" AND TargetObject.keyword:(*\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\* OR *\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\RunOnce\\\\*) AND Details.keyword:(C\\:\\\\Windows\\\\Temp\\\\* OR *\\\\AppData\\\\* OR C\\:\\\\$Recycle.bin\\\\* OR C\\:\\\\Temp\\\\* OR C\\:\\\\Users\\\\Public\\\\* OR C\\:\\\\Users\\\\Default\\\\* OR C\\:\\\\Users\\\\Desktop\\\\*))
+(EventID:"13" AND TargetObject.keyword:(*\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\* OR *\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\RunOnce\\\\*) AND Details.keyword:(*C\\:\\\\Windows\\\\Temp\\\\* OR *\\\\AppData\\\\* OR %AppData%\\\\* OR *C\\:\\\\$Recycle.bin\\\\* OR *C\\:\\\\Temp\\\\* OR *C\\:\\\\Users\\\\Public\\\\* OR %Public%\\\\* OR *C\\:\\\\Users\\\\Default\\\\* OR *C\\:\\\\Users\\\\Desktop\\\\* OR wscript* OR cscript*))
```
### xpack-watcher
```
-curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/New-RUN-Key-Pointing-to-Suspicious-Folder <[DN_0017_13_windows_sysmon_RegistryEvent](../Data_Needed/DN_0017_13_windows_sysmon_RegistryEvent.md) |
+| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
+| Trigger | There is no documented Trigger for this Detection Rule yet |
+| Severity Level | medium |
+| False Positives | - Administrators or users that actually use the selected keyboard layouts (heavily depends on the organisation's user base)
|
+| Development Status | Development Status wasn't defined for this Detection Rule yet |
+| References | - [https://renenyffenegger.ch/notes/Windows/registry/tree/HKEY_CURRENT_USER/Keyboard-Layout/Preload/index](https://renenyffenegger.ch/notes/Windows/registry/tree/HKEY_CURRENT_USER/Keyboard-Layout/Preload/index)
- [https://github.com/SwiftOnSecurity/sysmon-config/pull/92/files](https://github.com/SwiftOnSecurity/sysmon-config/pull/92/files)
|
+| Author | Florian Roth |
+
+
+## Detection Rules
+
+### Sigma rule
+
+```
+title: Suspicious Keyboard Layout Load
+id: 34aa0252-6039-40ff-951f-939fd6ce47d8
+description: Detects the keyboard preload installation with a suspicious keyboard layout, e.g. Chinese, Iranian or Vietnamese layout load in user session on systems
+ maintained by US staff only
+references:
+ - https://renenyffenegger.ch/notes/Windows/registry/tree/HKEY_CURRENT_USER/Keyboard-Layout/Preload/index
+ - https://github.com/SwiftOnSecurity/sysmon-config/pull/92/files
+author: Florian Roth
+date: 2019/10/12
+modified: 2019/10/15
+logsource:
+ product: windows
+ service: sysmon
+ definition: 'Requirements: Sysmon config that monitors \Keyboard Layout\Preload subkey of the HKLU hives - see https://github.com/SwiftOnSecurity/sysmon-config/pull/92/files'
+detection:
+ selection_registry:
+ EventID: 13
+ TargetObject:
+ - '*\Keyboard Layout\Preload\*'
+ - '*\Keyboard Layout\Substitutes\*'
+ Details:
+ - 00000429 # Persian (Iran)
+ - 00050429 # Persian (Iran)
+ - 0000042a # Vietnamese
+ condition: selection_registry
+falsepositives:
+ - "Administrators or users that actually use the selected keyboard layouts (heavily depends on the organisation's user base)"
+level: medium
+
+```
+
+
+
+
+
+### es-qs
+
+```
+(EventID:"13" AND TargetObject.keyword:(*\\\\Keyboard\\ Layout\\\\Preload\\* OR *\\\\Keyboard\\ Layout\\\\Substitutes\\*) AND Details:("00000429" OR "00050429" OR "0000042a"))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Keyboard-Layout-Load <[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003)[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
+| ATT&CK Technique | - [T1073: DLL Side-Loading](https://attack.mitre.org/techniques/T1073)
- [T1038: DLL Search Order Hijacking](https://attack.mitre.org/techniques/T1038)
- [T1112: Modify Registry](https://attack.mitre.org/techniques/T1112)
|
+| Data Needed | - [DN_0011_7_windows_sysmon_image_loaded](../Data_Needed/DN_0011_7_windows_sysmon_image_loaded.md)
|
+| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
+| Trigger | - [T1073: DLL Side-Loading](../Triggers/T1073.md)
- [T1038: DLL Search Order Hijacking](../Triggers/T1038.md)
- [T1112: Modify Registry](../Triggers/T1112.md)
|
+| Severity Level | high |
+| False Positives | |
+| Development Status | experimental |
+| References | - [https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992](https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992)
|
+| Author | SBousseaden |
+
+
+## Detection Rules
+
+### Sigma rule
+
+```
+title: Svchost DLL Search Order Hijack
+id: 602a1f13-c640-4d73-b053-be9a2fa58b77
+status: experimental
+description: IKEEXT and SessionEnv service, as they call LoadLibrary on files that do not exist within C:\Windows\System32\ by default. An attacker can place their
+ malicious logic within the PROCESS_ATTACH block of their library and restart the aforementioned services "svchost.exe -k netsvcs" to gain code execution on a
+ remote machine.
+references:
+ - https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
+author: SBousseaden
+date: 2019/10/28
+tags:
+ - attack.persistence
+ - attack.defense_evasion
+ - attack.t1073
+ - attack.t1038
+ - attack.t1112
+logsource:
+ product: windows
+ service: sysmon
+detection:
+ selection:
+ EventID: 7
+ Image:
+ - '*\svchost.exe'
+ ImageLoaded:
+ - '*\tsmsisrv.dll'
+ - '*\tsvipsrv.dll'
+ - '*\wlbsctrl.dll'
+ filter:
+ EventID: 7
+ Image:
+ - '*\svchost.exe'
+ ImageLoaded:
+ - 'C:\Windows\WinSxS\*'
+ condition: selection and not filter
+falsepositives:
+ - Pentest
+level: high
+```
+
+
+
+
+
+### es-qs
+
+```
+((EventID:"7" AND Image.keyword:(*\\\\svchost.exe) AND ImageLoaded.keyword:(*\\\\tsmsisrv.dll OR *\\\\tsvipsrv.dll OR *\\\\wlbsctrl.dll)) AND (NOT (EventID:"7" AND Image.keyword:(*\\\\svchost.exe) AND ImageLoaded:("C\\:\\\\Windows\\\\WinSxS\\*"))))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Svchost-DLL-Search-Order-Hijack <[https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/](https://enigma0x3.net/2016/08/15/fileless-uac-bypass-using-eventvwr-exe-and-registry-hijacking/)[https://www.hybrid-analysis.com/sample/e122bc8bf291f15cab182a5d2d27b8db1e7019e4e96bb5cdbd1dfe7446f3f51f?environmentId=100](https://www.hybrid-analysis.com/sample/e122bc8bf291f15cab182a5d2d27b8db1e7019e4e96bb5cdbd1dfe7446f3f51f?environmentId=100) |
| Author | Florian Roth |
-| Other Tags | - car.2019-04-001
- car.2019-04-001
|
+| Other Tags | |
## Detection Rules
@@ -19,6 +19,7 @@
```
title: UAC Bypass via Event Viewer
+id: 7c81fec3-1c1d-43b0-996a-46753041b1b6
status: experimental
description: Detects UAC bypass method using Windows event viewer
references:
@@ -72,7 +73,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-((EventID:"13" AND TargetObject:"HKEY_USERS\\\\*\\\\mscfile\\\\shell\\\\open\\\\command") OR ((EventID:"1" AND ParentImage:"*\\\\eventvwr.exe") AND NOT (Image:"*\\\\mmc.exe")))
+((EventID:"13" AND TargetObject.keyword:HKEY_USERS\\\\*\\\\mscfile\\\\shell\\\\open\\\\command) OR ((EventID:"1" AND ParentImage.keyword:*\\\\eventvwr.exe) AND (NOT (Image.keyword:*\\\\mmc.exe))))
```
@@ -86,7 +87,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-((EventID="13" TargetObject="HKEY_USERS\\\\*\\\\mscfile\\\\shell\\\\open\\\\command") OR ((EventID="1" ParentImage="*\\\\eventvwr.exe") -(Image="*\\\\mmc.exe")))
+((event_id="13" TargetObject="HKEY_USERS\\\\*\\\\mscfile\\\\shell\\\\open\\\\command") OR ((event_id="1" ParentImage="*\\\\eventvwr.exe") -(Image="*\\\\mmc.exe")))
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_uac_bypass_sdclt.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_uac_bypass_sdclt.md
index d96b775..7d92578 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_uac_bypass_sdclt.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_uac_bypass_sdclt.md
@@ -11,7 +11,7 @@
| Development Status | experimental |
| References | - [https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/](https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/)
|
| Author | Omer Yampel |
-| Other Tags | - car.2019-04-001
- car.2019-04-001
|
+| Other Tags | |
## Detection Rules
@@ -19,6 +19,7 @@
```
title: UAC Bypass via sdclt
+id: 5b872a46-3b90-45c1-8419-f675db8053aa
status: experimental
description: Detects changes to HKCU:\Software\Classes\exefile\shell\runas\command\isolatedCommand
references:
@@ -65,7 +66,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-(EventID:"13" AND TargetObject:"HKEY_USERS\\\\*\\\\Classes\\\\exefile\\\\shell\\\\runas\\\\command\\\\isolatedCommand")
+(EventID:"13" AND TargetObject.keyword:HKEY_USERS\\\\*\\\\Classes\\\\exefile\\\\shell\\\\runas\\\\command\\\\isolatedCommand)
```
@@ -79,7 +80,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="13" TargetObject="HKEY_USERS\\\\*\\\\Classes\\\\exefile\\\\shell\\\\runas\\\\command\\\\isolatedCommand")
+(event_id="13" TargetObject="HKEY_USERS\\\\*\\\\Classes\\\\exefile\\\\shell\\\\runas\\\\command\\\\isolatedCommand")
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_webshell_creation_detect.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_webshell_creation_detect.md
new file mode 100644
index 0000000..0cbc5fe
--- /dev/null
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_webshell_creation_detect.md
@@ -0,0 +1,115 @@
+| Title | Windows webshell creation |
+|:---------------------|:------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| Description | Posible webshell file creation on a static web site |
+| ATT&CK Tactic | - [TA0003: Persistence](https://attack.mitre.org/tactics/TA0003)
|
+| ATT&CK Technique | - [T1100: Web Shell](https://attack.mitre.org/techniques/T1100)
|
+| Data Needed | - [DN_0015_11_windows_sysmon_FileCreate](../Data_Needed/DN_0015_11_windows_sysmon_FileCreate.md)
|
+| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
+| Trigger | - [T1100: Web Shell](../Triggers/T1100.md)
|
+| Severity Level | critical |
+| False Positives | - Legitimate administrator or developer creating legitimate executable files in a web application folder
|
+| Development Status | experimental |
+| References | - [PT ESC rule and personal experience](PT ESC rule and personal experience)
|
+| Author | Beyu Denis, oscd.community |
+
+
+## Detection Rules
+
+### Sigma rule
+
+```
+title: Windows webshell creation
+id: 39f1f9f2-9636-45de-98f6-a4046aa8e4b9
+status: experimental
+description: Posible webshell file creation on a static web site
+references:
+ - PT ESC rule and personal experience
+author: Beyu Denis, oscd.community
+date: 2019/10/22
+modified: 2019/11/04
+tags:
+ - attack.persistence
+ - attack.t1100
+level: critical
+logsource:
+ product: windows
+ service: sysmon
+detection:
+ selection_1:
+ EventID: 11
+ selection_2:
+ TargetFilename|contains: '\inetpub\wwwroot\'
+ selection_3:
+ TargetFilename|contains:
+ - '.asp'
+ - '.ashx'
+ - '.ph'
+ selection_4:
+ TargetFilename|contains:
+ - '\www\'
+ - '\htdocs\'
+ - '\html\'
+ selection_5:
+ TargetFilename|contains: '.ph'
+ selection_6:
+ - TargetFilename|contains|all:
+ - '\'
+ - '.jsp'
+ - TargetFilename|contains|all:
+ - '\cgi-bin\'
+ - '.pl'
+ condition: selection_1 and ( selection_2 and selection_3 ) or
+ selection_1 and ( selection_4 and selection_5 ) or
+ selection_1 and selection_6
+falsepositives:
+ - Legitimate administrator or developer creating legitimate executable files in a web application folder
+
+```
+
+
+
+
+
+### es-qs
+
+```
+(EventID:"11" AND ((TargetFilename.keyword:*\\\\inetpub\\\\wwwroot\\* AND TargetFilename.keyword:(*.asp* OR *.ashx* OR *.ph*)) OR (TargetFilename.keyword:(*\\\\www\\* OR *\\\\htdocs\\* OR *\\\\html\\*) AND TargetFilename.keyword:*.ph*) OR (TargetFilename.keyword:*\\* AND TargetFilename.keyword:*.jsp*) OR (TargetFilename.keyword:*\\\\cgi\\-bin\\* AND TargetFilename.keyword:*.pl*)))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Windows-webshell-creation <[https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe/](https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe/) |
| Author | Karneades |
-| Other Tags | - car.2013-01-002
- car.2013-01-002
|
+| Other Tags | |
## Detection Rules
@@ -19,22 +19,23 @@
```
title: Registry Persistence Mechanisms
-description: Detects persistence registry keys
+id: 36803969-5421-41ec-b92f-8500f79c23b0
+description: Detects persistence registry keys
references:
- https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe/
date: 2018/04/11
author: Karneades
logsource:
- product: windows
- service: sysmon
+ product: windows
+ service: sysmon
detection:
selection_reg1:
- EventID: 13
- TargetObject:
+ EventID: 13
+ TargetObject:
- '*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\\*\GlobalFlag'
- '*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SilentProcessExit\\*\ReportingMode'
- '*\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SilentProcessExit\\*\MonitorProcess'
- EventType: 'SetValue'
+ EventType: SetValue
condition: selection_reg1
tags:
- attack.privilege_escalation
@@ -69,7 +70,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-(EventID:"13" AND TargetObject:("*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\*\\\\GlobalFlag" "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\*\\\\ReportingMode" "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\*\\\\MonitorProcess") AND EventType:"SetValue")
+(EventID:"13" AND TargetObject.keyword:(*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\*\\\\GlobalFlag *\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\*\\\\ReportingMode *\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\*\\\\MonitorProcess) AND EventType:"SetValue")
```
@@ -83,7 +84,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="13" TargetObject IN ["*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\*\\\\GlobalFlag", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\*\\\\ReportingMode", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\*\\\\MonitorProcess"] EventType="SetValue")
+(event_id="13" TargetObject IN ["*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Image File Execution Options\\\\*\\\\GlobalFlag", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\*\\\\ReportingMode", "*\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\SilentProcessExit\\\\*\\\\MonitorProcess"] EventType="SetValue")
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_event_subscription.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_event_subscription.md
index c97b989..39ca824 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_event_subscription.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_event_subscription.md
@@ -3,7 +3,7 @@
| Description | Detects creation of WMI event subscription persistence method |
| ATT&CK Tactic | - [TA0003: Persistence](https://attack.mitre.org/tactics/TA0003)
|
| ATT&CK Technique | - [T1084: Windows Management Instrumentation Event Subscription](https://attack.mitre.org/techniques/T1084)
|
-| Data Needed | - [DN_0024_21_windows_sysmon_WmiEvent](../Data_Needed/DN_0024_21_windows_sysmon_WmiEvent.md)
- [DN_0023_20_windows_sysmon_WmiEvent](../Data_Needed/DN_0023_20_windows_sysmon_WmiEvent.md)
- [DN_0022_19_windows_sysmon_WmiEvent](../Data_Needed/DN_0022_19_windows_sysmon_WmiEvent.md)
|
+| Data Needed | - [DN_0023_20_windows_sysmon_WmiEvent](../Data_Needed/DN_0023_20_windows_sysmon_WmiEvent.md)
- [DN_0024_21_windows_sysmon_WmiEvent](../Data_Needed/DN_0024_21_windows_sysmon_WmiEvent.md)
- [DN_0022_19_windows_sysmon_WmiEvent](../Data_Needed/DN_0022_19_windows_sysmon_WmiEvent.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1084: Windows Management Instrumentation Event Subscription](../Triggers/T1084.md)
|
| Severity Level | high |
@@ -19,6 +19,7 @@
```
title: WMI Event Subscription
+id: 0f06a3a5-6a09-413f-8743-e6cf35561297
status: experimental
description: Detects creation of WMI event subscription persistence method
references:
@@ -79,7 +80,7 @@ EventID:("19" "20" "21")
### logpoint
```
-EventID IN ["19", "20", "21"]
+event_id IN ["19", "20", "21"]
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_persistence_commandline_event_consumer.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_persistence_commandline_event_consumer.md
index 5e5dff0..6273f9f 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_persistence_commandline_event_consumer.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_persistence_commandline_event_consumer.md
@@ -19,6 +19,7 @@
```
title: WMI Persistence - Command Line Event Consumer
+id: 05936ce2-ee05-4dae-9d03-9a391cf2d2c6
status: experimental
description: Detects WMI command line event consumers
references:
@@ -78,7 +79,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="7" Image="C:\\\\Windows\\\\System32\\\\wbem\\\\WmiPrvSE.exe" ImageLoaded="wbemcons.dll")
+(event_id="7" Image="C:\\\\Windows\\\\System32\\\\wbem\\\\WmiPrvSE.exe" ImageLoaded="wbemcons.dll")
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_persistence_script_event_consumer_write.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_persistence_script_event_consumer_write.md
index 7f9c485..4ca73b5 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_persistence_script_event_consumer_write.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_persistence_script_event_consumer_write.md
@@ -19,6 +19,7 @@
```
title: WMI Persistence - Script Event Consumer File Write
+id: 33f41cdd-35ac-4ba8-814b-c6a4244a1ad4
status: experimental
description: Detects file writes of WMI script event consumer
references:
@@ -77,7 +78,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="11" Image="C:\\\\WINDOWS\\\\system32\\\\wbem\\\\scrcons.exe")
+(event_id="11" Image="C:\\\\WINDOWS\\\\system32\\\\wbem\\\\scrcons.exe")
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_susp_scripting.md b/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_susp_scripting.md
index f87d553..e248f9c 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_susp_scripting.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/sysmon_wmi_susp_scripting.md
@@ -19,8 +19,9 @@
```
title: Suspicious Scripting in a WMI Consumer
+id: fe21810c-2a8c-478f-8dd3-5a287fb2a0e0
status: experimental
-description: Detects suspicious scripting in WMI Event Consumers
+description: Detects suspicious scripting in WMI Event Consumers
author: Florian Roth
references:
- https://in.security/an-intro-into-abusing-and-identifying-wmi-event-subscriptions-for-persistence/
@@ -77,7 +78,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### graylog
```
-(EventID:"20" AND Destination:("*new\\-object system.net.webclient\\).downloadstring\\(*" "*new\\-object system.net.webclient\\).downloadfile\\(*" "*new\\-object net.webclient\\).downloadstring\\(*" "*new\\-object net.webclient\\).downloadfile\\(*" "* iex\\(*" "*WScript.shell*" "* \\-nop *" "* \\-noprofile *" "* \\-decode *" "* \\-enc *"))
+(EventID:"20" AND Destination.keyword:(*new\\-object system.net.webclient\\).downloadstring\\(* *new\\-object system.net.webclient\\).downloadfile\\(* *new\\-object net.webclient\\).downloadstring\\(* *new\\-object net.webclient\\).downloadfile\\(* * iex\\(* *WScript.shell* * \\-nop * * \\-noprofile * * \\-decode * * \\-enc *))
```
@@ -91,7 +92,7 @@ curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9
### logpoint
```
-(EventID="20" Destination IN ["*new-object system.net.webclient).downloadstring(*", "*new-object system.net.webclient).downloadfile(*", "*new-object net.webclient).downloadstring(*", "*new-object net.webclient).downloadfile(*", "* iex(*", "*WScript.shell*", "* -nop *", "* -noprofile *", "* -decode *", "* -enc *"])
+(event_id="20" Destination IN ["*new-object system.net.webclient).downloadstring(*", "*new-object system.net.webclient).downloadfile(*", "*new-object net.webclient).downloadstring(*", "*new-object net.webclient).downloadfile(*", "* iex(*", "*WScript.shell*", "* -nop *", "* -noprofile *", "* -decode *", "* -enc *"])
```
diff --git a/Atomic_Threat_Coverage/Detection_Rules/win_GPO_scheduledtasks.md b/Atomic_Threat_Coverage/Detection_Rules/win_GPO_scheduledtasks.md
index c9eaf46..6af5b40 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/win_GPO_scheduledtasks.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/win_GPO_scheduledtasks.md
@@ -49,6 +49,27 @@ level: high
+### es-qs
+
+```
+(EventID:"5145" AND ShareName.keyword:\\\\*\\\\SYSVOL AND RelativeTargetName.keyword:*ScheduledTasks.xml AND Accesses.keyword:*WriteData*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Persistence-and-Execution-at-scale-via-GPO-scheduled-task <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1117: Regsvr32](https://attack.mitre.org/techniques/T1117)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1117: Regsvr32](../Triggers/T1117.md)
|
| Severity Level | critical |
@@ -48,6 +48,27 @@ level: critical
+### es-qs
+
+```
+CommandLine.keyword:(*\\\\regsvr32*\\\\AppData\\\\Local\\\\* OR *\\\\AppData\\\\Local\\\\*,DllEntry*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/BlueMashroom-DLL-Load <[DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | high |
@@ -56,6 +56,27 @@ level: high
+### es-qs
+
+```
+(CommandLine.keyword:(*Temp\\\\wtask.exe\\ \\/create* OR *%windir\\:\\~\\-3,1%%PUBLIC\\:\\~\\-9,1%* OR *\\/E\\:vbscript\\ *\\ C\\:\\\\Users\\*.txt\\"\\ \\/F OR *\\/tn\\ \\"Security\\ Script\\ * OR *%windir\\:\\~\\-1,1%*) OR Image.keyword:(*Temp\\\\winwsh.exe))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Mustang-Panda-Dropper <[TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006) |
| ATT&CK Technique | - [T1003: Credential Dumping](https://attack.mitre.org/techniques/T1003)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1003: Credential Dumping](../Triggers/T1003.md)
|
| Severity Level | low |
@@ -51,6 +51,27 @@ level: low
+### es-qs
+
+```
+(Image.keyword:*\\\\cmdkey.exe AND CommandLine.keyword:*\\ \\/list\\ *)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Cmdkey-Cached-Credentials-Recon <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1196: Control Panel Items](https://attack.mitre.org/techniques/T1196)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1196: Control Panel Items](../Triggers/T1196.md)
|
| Severity Level | critical |
@@ -51,6 +51,27 @@ falsepositives:
+### es-qs
+
+```
+(CommandLine.keyword:*.cpl AND (NOT (CommandLine.keyword:(*\\\\System32\\\\* OR *%System%*))))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Control-Panel-Items <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1070: Indicator Removal on Host](https://attack.mitre.org/techniques/T1070)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1070: Indicator Removal on Host](../Triggers/T1070.md)
|
| Severity Level | high |
@@ -52,6 +52,27 @@ detection:
+### es-qs
+
+```
+(CommandLine.keyword:*\\ cl\\ *\\/Trace* OR CommandLine.keyword:*\\ clear\\-log\\ *\\/Trace* OR CommandLine.keyword:*\\ sl*\\ \\/e\\:false* OR CommandLine.keyword:*\\ set\\-log*\\ \\/e\\:false*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Disable-of-ETW-Trace <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | critical |
@@ -48,6 +48,27 @@ level: critical
+### es-qs
+
+```
+(ParentImage.keyword:*\\\\WINWORD.EXE AND Image.keyword:*\\\\MicroScMgmt.exe\\ )
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Exploit-for-CVE-2015-1641 <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004) |
| ATT&CK Technique | - [T1055: Process Injection](https://attack.mitre.org/techniques/T1055)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1055: Process Injection](../Triggers/T1055.md)
|
| Severity Level | medium |
@@ -48,6 +48,27 @@ level: medium
+### es-qs
+
+```
+(ParentImage.keyword:*\\\\WINWORD.EXE AND Image.keyword:*\\\\FLTLDR.exe*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Exploit-for-CVE-2017-0261 <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1211: Exploitation for Defense Evasion](https://attack.mitre.org/techniques/T1211)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1211: Exploitation for Defense Evasion](../Triggers/T1211.md)
|
| Severity Level | critical |
@@ -49,6 +49,27 @@ level: critical
+### es-qs
+
+```
+ParentImage.keyword:*\\\\EQNEDT32.EXE
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Droppers-exploiting-CVE-2017-11882 <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1203: Exploitation for Client Execution](https://attack.mitre.org/techniques/T1203)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1203: Exploitation for Client Execution](../Triggers/T1203.md)
|
| Severity Level | critical |
@@ -47,6 +47,27 @@ level: critical
+### es-qs
+
+```
+(ParentImage.keyword:*\\\\WINWORD.EXE AND Image.keyword:*\\\\csc.exe)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Exploit-for-CVE-2017-8759 <[TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006) |
| ATT&CK Technique | - [T1003: Credential Dumping](https://attack.mitre.org/techniques/T1003)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1003: Credential Dumping](../Triggers/T1003.md)
|
| Severity Level | critical |
@@ -55,6 +55,27 @@ level: critical
+### es-qs
+
+```
+CommandLine.keyword:(*\\ asreproast\\ * OR *\\ dump\\ \\/service\\:krbtgt\\ * OR *\\ kerberoast\\ * OR *\\ createnetonly\\ \\/program\\:* OR *\\ ptt\\ \\/ticket\\:* OR *\\ \\/impersonateuser\\:* OR *\\ renew\\ \\/ticket\\:* OR *\\ asktgt\\ \\/user\\:* OR *\\ harvest\\ \\/interval\\:*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Rubeus-Hack-Tool <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0001: Initial Access](https://attack.mitre.org/tactics/TA0001) |
| ATT&CK Technique | - [T1059: Command-Line Interface](https://attack.mitre.org/techniques/T1059)
- [T1202: Indirect Command Execution](https://attack.mitre.org/techniques/T1202)
- [T1193: Spearphishing Attachment](https://attack.mitre.org/techniques/T1193)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1059: Command-Line Interface](../Triggers/T1059.md)
- [T1202: Indirect Command Execution](../Triggers/T1202.md)
- [T1193: Spearphishing Attachment](../Triggers/T1193.md)
|
| Severity Level | high |
@@ -56,6 +56,27 @@ level: high
+### es-qs
+
+```
+(ParentImage.keyword:*\\\\Hwp.exe AND Image.keyword:*\\\\gbb.exe)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-HWP-Sub-Processes <[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003)[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004) |
| ATT&CK Technique | - [T1015: Accessibility Features](https://attack.mitre.org/techniques/T1015)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1015: Accessibility Features](../Triggers/T1015.md)
|
| Severity Level | high |
@@ -54,6 +54,27 @@ level: high
+### es-qs
+
+```
+CommandLine.keyword:(*\\\\CurrentVersion\\\\Image\\ File\\ Execution\\ Options\\\\sethc.exe* OR *\\\\CurrentVersion\\\\Image\\ File\\ Execution\\ Options\\\\utilman.exe* OR *\\\\CurrentVersion\\\\Image\\ File\\ Execution\\ Options\\\\osk.exe* OR *\\\\CurrentVersion\\\\Image\\ File\\ Execution\\ Options\\\\magnify.exe* OR *\\\\CurrentVersion\\\\Image\\ File\\ Execution\\ Options\\\\narrator.exe* OR *\\\\CurrentVersion\\\\Image\\ File\\ Execution\\ Options\\\\displayswitch.exe*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Debugger-Registration-Cmdline <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1170: Mshta](https://attack.mitre.org/techniques/T1170)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1170: Mshta](../Triggers/T1170.md)
|
| Severity Level | high |
@@ -48,6 +48,27 @@ level: high
+### es-qs
+
+```
+(ParentImage.keyword:*\\\\svchost.exe AND Image.keyword:*\\\\mshta.exe)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/MSHTA-spwaned-by-SVCHOST-as-seen-in-LethalHTA <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1064: Scripting](https://attack.mitre.org/techniques/T1064)
|
-| Data Needed | - [DN_0015_11_windows_sysmon_FileCreate](../Data_Needed/DN_0015_11_windows_sysmon_FileCreate.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0017_13_windows_sysmon_RegistryEvent](../Data_Needed/DN_0017_13_windows_sysmon_RegistryEvent.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0015_11_windows_sysmon_FileCreate](../Data_Needed/DN_0015_11_windows_sysmon_FileCreate.md)
- [DN_0017_13_windows_sysmon_RegistryEvent](../Data_Needed/DN_0017_13_windows_sysmon_RegistryEvent.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1064: Scripting](../Triggers/T1064.md)
|
| Severity Level | high |
@@ -70,6 +70,27 @@ detection:
+### es-qs
+
+```
+CommandLine.keyword:(*\\\\AppData\\\\Roaming\\\\Oracle*\\\\java*.exe\\ * OR *cscript.exe\\ *Retrive*.vbs\\ *)\n(EventID:"11" AND TargetFilename.keyword:(*\\\\AppData\\\\Roaming\\\\Oracle\\\\bin\\\\java*.exe OR *\\\\Retrive*.vbs))\n(EventID:"13" AND TargetObject.keyword:\\\\REGISTRY\\\\MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run* AND Details.keyword:%AppData%\\\\Roaming\\\\Oracle\\\\bin\\\\*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Adwind-RAT-/-JRAT <[TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006) |
| ATT&CK Technique | - [T1003: Credential Dumping](https://attack.mitre.org/techniques/T1003)
|
-| Data Needed | - [DN_0083_16_access_history_in_hive_was_cleared](../Data_Needed/DN_0083_16_access_history_in_hive_was_cleared.md)
- [DN_0063_4697_service_was_installed_in_the_system](../Data_Needed/DN_0063_4697_service_was_installed_in_the_system.md)
- [DN_0005_7045_windows_service_insatalled](../Data_Needed/DN_0005_7045_windows_service_insatalled.md)
|
+| Data Needed | - [DN_0005_7045_windows_service_insatalled](../Data_Needed/DN_0005_7045_windows_service_insatalled.md)
- [DN_0083_16_access_history_in_hive_was_cleared](../Data_Needed/DN_0083_16_access_history_in_hive_was_cleared.md)
- [DN_0063_4697_service_was_installed_in_the_system](../Data_Needed/DN_0063_4697_service_was_installed_in_the_system.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1003: Credential Dumping](../Triggers/T1003.md)
|
| Severity Level | high |
@@ -60,6 +60,27 @@ detection:
+### es-qs
+
+```
+((Message.keyword:(*WCE\\ SERVICE* OR *WCESERVICE* OR *DumpSvc*) AND (EventID:("7045") OR EventID:"4697")) OR (EventID:"16" AND HiveName.keyword:*\\\\AppData\\\\Local\\\\Temp\\\\SAM*.dmp))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Malicious-Service-Install <[DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | critical |
@@ -46,6 +46,27 @@ level: critical
+### es-qs
+
+```
+CommandLine.keyword:(*\\\\net.exe\\ stop\\ \\"samss\\"\\ * OR *\\\\net.exe\\ stop\\ \\"audioendpointbuilder\\"\\ * OR *\\\\net.exe\\ stop\\ \\"unistoresvc_?????\\"\\ *)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Ryuk-Ransomware <[TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006) |
| ATT&CK Technique | - [T1003: Credential Dumping](https://attack.mitre.org/techniques/T1003)
|
-| Data Needed | - [DN_0062_4663_attempt_was_made_to_access_an_object](../Data_Needed/DN_0062_4663_attempt_was_made_to_access_an_object.md)
- [DN_0061_4660_object_was_deleted](../Data_Needed/DN_0061_4660_object_was_deleted.md)
- [DN_0058_4656_handle_to_an_object_was_requested](../Data_Needed/DN_0058_4656_handle_to_an_object_was_requested.md)
- [DN_0060_4658_handle_to_an_object_was_closed](../Data_Needed/DN_0060_4658_handle_to_an_object_was_closed.md)
|
+| Data Needed | - [DN_0060_4658_handle_to_an_object_was_closed](../Data_Needed/DN_0060_4658_handle_to_an_object_was_closed.md)
- [DN_0062_4663_attempt_was_made_to_access_an_object](../Data_Needed/DN_0062_4663_attempt_was_made_to_access_an_object.md)
- [DN_0061_4660_object_was_deleted](../Data_Needed/DN_0061_4660_object_was_deleted.md)
- [DN_0058_4656_handle_to_an_object_was_requested](../Data_Needed/DN_0058_4656_handle_to_an_object_was_requested.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1003: Credential Dumping](../Triggers/T1003.md)
|
| Severity Level | critical |
@@ -52,6 +52,27 @@ level: critical
+### es-qs
+
+```
+(EventID:("4656" OR "4658" OR "4660" OR "4663") AND ObjectName.keyword:*\\\\wceaux.dll)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/WCE-wceaux.dll-Access <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004) |
| ATT&CK Technique | - [T1055: Process Injection](https://attack.mitre.org/techniques/T1055)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1055: Process Injection](../Triggers/T1055.md)
|
| Severity Level | critical |
@@ -52,6 +52,27 @@ level: critical
+### es-qs
+
+```
+(CommandLine.keyword:*\\\\svchost.exe\\ C\\:\\\\Users\\\\*\\\\Desktop\\\\* OR (ParentImage.keyword:*\\\\svchost.exe* AND CommandLine.keyword:(*whoami.exe\\ \\/all OR *net.exe\\ view)))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Dridex-Process-Pattern <[DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | critical |
@@ -48,6 +48,27 @@ level: critical
+### es-qs
+
+```
+CommandLine.keyword:*\\ echo\\ EEEE\\ \\ *
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/DTRACK-Process-Creation < .*'
+```
+
+
diff --git a/Atomic_Threat_Coverage/Detection_Rules/win_malware_emotet.md b/Atomic_Threat_Coverage/Detection_Rules/win_malware_emotet.md
index a8efb45..2f1f97e 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/win_malware_emotet.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/win_malware_emotet.md
@@ -3,7 +3,7 @@
| Description | Detects all Emotet like process executions that are not covered by the more generic rules |
| ATT&CK Tactic | This Detection Rule wasn't mapped to ATT&CK Tactic yet |
| ATT&CK Technique | This Detection Rule wasn't mapped to ATT&CK Technique yet |
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | critical |
@@ -56,6 +56,27 @@ level: critical
+### es-qs
+
+```
+CommandLine.keyword:(*\\ \\-e*\\ PAA* OR *JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ* OR *QAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUA* OR *kAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlA* OR *IgAoACcAKgAnACkAOwAkA* OR *IAKAAnACoAJwApADsAJA* OR *iACgAJwAqACcAKQA7ACQA*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Emotet-Process-Creation < \\"C:\\\\Users\\\\*\\\\Desktop\\\\*.exe"])
+```
+
+
+### grep
+
+```
+grep -P \'^(?:.*(?=.*(?:.*C:\\Windows\\System32\\\\.*\\.exe|.*C:\\Windows\\SysWOW64\\\\.*\\.exe))(?=.*(?:.*.* /c del "C:\\Users\\\\.*\\AppData\\Local\\Temp\\\\.*\\.exe|.*.* /c del "C:\\Users\\\\.*\\Desktop\\\\.*\\.exe|.*.* /C type nul > "C:\\Users\\\\.*\\Desktop\\\\.*\\.exe)))\'
+```
+
+
diff --git a/Atomic_Threat_Coverage/Detection_Rules/win_malware_notpetya.md b/Atomic_Threat_Coverage/Detection_Rules/win_malware_notpetya.md
index 9485828..09fd964 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/win_malware_notpetya.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/win_malware_notpetya.md
@@ -3,7 +3,7 @@
| Description | Detects NotPetya ransomware activity in which the extracted passwords are passed back to the main module via named pipe, the file system journal of drive C is deleted and windows eventlogs are cleared using wevtutil |
| ATT&CK Tactic | - [TA0002: Execution](https://attack.mitre.org/tactics/TA0002)
- [TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006)
- [TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)
|
| ATT&CK Technique | - [T1085: Rundll32](https://attack.mitre.org/techniques/T1085)
- [T1070: Indicator Removal on Host](https://attack.mitre.org/techniques/T1070)
- [T1003: Credential Dumping](https://attack.mitre.org/techniques/T1003)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1085: Rundll32](../Triggers/T1085.md)
- [T1070: Indicator Removal on Host](../Triggers/T1070.md)
- [T1003: Credential Dumping](../Triggers/T1003.md)
|
| Severity Level | critical |
@@ -60,6 +60,27 @@ level: critical
+### es-qs
+
+```
+(CommandLine.keyword:*\\\\AppData\\\\Local\\\\Temp\\\\*\\ \\\\.\\\\pipe\\\\* OR (Image.keyword:*\\\\rundll32.exe AND CommandLine.keyword:*.dat,#1) OR *\\\\perfc.dat*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/NotPetya-Ransomware-Activity <[DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | critical |
@@ -50,6 +50,27 @@ level: critical
+### es-qs
+
+```
+((ParentImage.keyword:*\\\\WinRAR.exe AND Image.keyword:*\\\\wscript.exe) OR CommandLine.keyword:*\\ \\/c\\ ping.exe\\ \\-n\\ 6\\ 127.0.0.1\\ &\\ type\\ *)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/QBot-Process-Creation <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1064: Scripting](https://attack.mitre.org/techniques/T1064)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1064: Scripting](../Triggers/T1064.md)
|
| Severity Level | high |
@@ -63,6 +63,27 @@ level: high
+### es-qs
+
+```
+((Image.keyword:(*\\\\wscript.exe OR *\\\\cscript.exe) AND CommandLine.keyword:(*\\ C\\:\\\\Users\\\\*.jse\\ * OR *\\ C\\:\\\\Users\\\\*.vbe\\ * OR *\\ C\\:\\\\Users\\\\*.js\\ * OR *\\ C\\:\\\\Users\\\\*.vba\\ * OR *\\ C\\:\\\\Users\\\\*.vbs\\ * OR *\\ C\\:\\\\ProgramData\\\\*.jse\\ * OR *\\ C\\:\\\\ProgramData\\\\*.vbe\\ * OR *\\ C\\:\\\\ProgramData\\\\*.js\\ * OR *\\ C\\:\\\\ProgramData\\\\*.vba\\ * OR *\\ C\\:\\\\ProgramData\\\\*.vbs\\ *)) AND (NOT (ParentImage.keyword:*\\\\winzip*)))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/WScript-or-CScript-Dropper <[DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | critical |
@@ -63,6 +63,27 @@ level: critical
+### es-qs
+
+```
+(Image.keyword:(*\\\\tasksche.exe OR *\\\\mssecsvc.exe OR *\\\\taskdl.exe OR *\\\\@WanaDecryptor@* OR *\\\\WanaDecryptor* OR *\\\\taskhsvc.exe OR *\\\\taskse.exe OR *\\\\111.exe OR *\\\\lhdfrgui.exe OR *\\\\diskpart.exe OR *\\\\linuxnew.exe OR *\\\\wannacry.exe) OR CommandLine.keyword:(*icacls\\ *\\ \\/grant\\ Everyone\\:F\\ \\/T\\ \\/C\\ \\/Q* OR *bcdedit\\ \\/set\\ \\{default\\}\\ recoveryenabled\\ no* OR *wbadmin\\ delete\\ catalog\\ \\-quiet* OR *@Please_Read_Me@.txt*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/WannaCry-Ransomware <[T1055: Process Injection](https://attack.mitre.org/techniques/T1055)[T1218: Signed Binary Proxy Execution](https://attack.mitre.org/techniques/T1218) |
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1055: Process Injection](../Triggers/T1055.md)
- [T1218: Signed Binary Proxy Execution](../Triggers/T1218.md)
|
| Severity Level | critical |
@@ -48,6 +48,27 @@ level: critical
+### es-qs
+
+```
+CommandLine.keyword:*\\ \\/INJECTRUNNING\\ *
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/MavInject-Process-Injection <[TA0008: Lateral Movement](https://attack.mitre.org/tactics/TA0008) |
| ATT&CK Technique | - [T1175: Component Object Model and Distributed COM](https://attack.mitre.org/techniques/T1175)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1175: Component Object Model and Distributed COM](../Triggers/T1175.md)
|
| Severity Level | high |
@@ -55,6 +55,27 @@ level: high
+### es-qs
+
+```
+(ParentImage.keyword:*\\\\mmc.exe AND Image.keyword:(*\\\\cmd.exe OR *\\\\powershell.exe OR *\\\\wscript.exe OR *\\\\cscript.exe OR *\\\\sh.exe OR *\\\\bash.exe OR *\\\\reg.exe OR *\\\\regsvr32.exe OR *\\\\BITSADMIN*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/MMC-Spawning-Windows-Shell <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1170: Mshta](https://attack.mitre.org/techniques/T1170)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1170: Mshta](../Triggers/T1170.md)
|
| Severity Level | high |
@@ -63,6 +63,27 @@ level: high
+### es-qs
+
+```
+(ParentImage.keyword:*\\\\mshta.exe AND Image.keyword:(*\\\\cmd.exe OR *\\\\powershell.exe OR *\\\\wscript.exe OR *\\\\cscript.exe OR *\\\\sh.exe OR *\\\\bash.exe OR *\\\\reg.exe OR *\\\\regsvr32.exe OR *\\\\BITSADMIN*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/MSHTA-Spawning-Windows-Shell <[DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | low |
@@ -84,6 +84,27 @@ level: low
+### es-qs
+
+```
+
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Quick-Execution-of-a-Series-of-Suspicious-Commands < 5
+```
+
+
+### grep
+
+```
+grep -P '^(?:.*arp\\.exe|.*at\\.exe|.*attrib\\.exe|.*cscript\\.exe|.*dsquery\\.exe|.*hostname\\.exe|.*ipconfig\\.exe|.*mimikatz\\.exe|.*nbtstat\\.exe|.*net\\.exe|.*netsh\\.exe|.*nslookup\\.exe|.*ping\\.exe|.*quser\\.exe|.*qwinsta\\.exe|.*reg\\.exe|.*runas\\.exe|.*sc\\.exe|.*schtasks\\.exe|.*ssh\\.exe|.*systeminfo\\.exe|.*taskkill\\.exe|.*telnet\\.exe|.*tracert\\.exe|.*wscript\\.exe|.*xcopy\\.exe|.*pscp\\.exe|.*copy\\.exe|.*robocopy\\.exe|.*certutil\\.exe|.*vssadmin\\.exe|.*powershell\\.exe|.*wevtutil\\.exe|.*psexec\\.exe|.*bcedit\\.exe|.*wbadmin\\.exe|.*icacls\\.exe|.*diskpart\\.exe)'
+```
+
+
diff --git a/Atomic_Threat_Coverage/Detection_Rules/win_net_ntlm_downgrade.md b/Atomic_Threat_Coverage/Detection_Rules/win_net_ntlm_downgrade.md
index b065a34..5f19f6a 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/win_net_ntlm_downgrade.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/win_net_ntlm_downgrade.md
@@ -3,7 +3,7 @@
| Description | Detects post exploitation using NetNTLM downgrade attacks |
| ATT&CK Tactic | - [TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006)
|
| ATT&CK Technique | - [T1212: Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212)
|
-| Data Needed | - [DN_0059_4657_registry_value_was_modified](../Data_Needed/DN_0059_4657_registry_value_was_modified.md)
- [DN_0017_13_windows_sysmon_RegistryEvent](../Data_Needed/DN_0017_13_windows_sysmon_RegistryEvent.md)
|
+| Data Needed | - [DN_0017_13_windows_sysmon_RegistryEvent](../Data_Needed/DN_0017_13_windows_sysmon_RegistryEvent.md)
- [DN_0059_4657_registry_value_was_modified](../Data_Needed/DN_0059_4657_registry_value_was_modified.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1212: Exploitation for Credential Access](../Triggers/T1212.md)
|
| Severity Level | critical |
@@ -66,6 +66,27 @@ detection:
+### es-qs
+
+```
+(EventID:"13" AND TargetObject.keyword:(*SYSTEM\\\\*ControlSet*\\\\Control\\\\Lsa\\\\lmcompatibilitylevel OR *SYSTEM\\\\*ControlSet*\\\\Control\\\\Lsa\\\\NtlmMinClientSec OR *SYSTEM\\\\*ControlSet*\\\\Control\\\\Lsa\\\\RestrictSendingNTLMTraffic))\n(EventID:"4657" AND ObjectName.keyword:\\\\REGISTRY\\\\MACHINE\\\\SYSTEM\\\\*ControlSet*\\\\Control\\\\Lsa AND ObjectValueName:("LmCompatibilityLevel" OR "NtlmMinClientSec" OR "RestrictSendingNTLMTraffic"))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/NetNTLM-Downgrade-Attack <[TA0008: Lateral Movement](https://attack.mitre.org/tactics/TA0008)[TA0011: Command and Control](https://attack.mitre.org/tactics/TA0011) |
| ATT&CK Technique | - [T1090: Connection Proxy](https://attack.mitre.org/techniques/T1090)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1090: Connection Proxy](../Triggers/T1090.md)
|
| Severity Level | medium |
@@ -49,6 +49,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(*netsh\\ firewall\\ add*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Netsh <[TA0008: Lateral Movement](https://attack.mitre.org/tactics/TA0008)[TA0011: Command and Control](https://attack.mitre.org/tactics/TA0011) |
| ATT&CK Technique | - [T1090: Connection Proxy](https://attack.mitre.org/techniques/T1090)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1090: Connection Proxy](../Triggers/T1090.md)
|
| Severity Level | medium |
@@ -48,6 +48,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(netsh\\ interface\\ portproxy\\ add\\ v4tov4\\ *)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Netsh-Port-Forwarding <[TA0008: Lateral Movement](https://attack.mitre.org/tactics/TA0008) |
| ATT&CK Technique | - [T1021: Remote Services](https://attack.mitre.org/techniques/T1021)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1021: Remote Services](../Triggers/T1021.md)
|
| Severity Level | high |
@@ -48,6 +48,27 @@ level: high
+### es-qs
+
+```
+CommandLine.keyword:(netsh\\ i*\\ p*\\=3389\\ c*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Netsh-RDP-Port-Forwarding <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1059: Command-Line Interface](https://attack.mitre.org/techniques/T1059)
- [T1202: Indirect Command Execution](https://attack.mitre.org/techniques/T1202)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1059: Command-Line Interface](../Triggers/T1059.md)
- [T1202: Indirect Command Execution](../Triggers/T1202.md)
|
| Severity Level | high |
@@ -80,6 +80,27 @@ level: high
+### es-qs
+
+```
+(ParentImage.keyword:(*\\\\WINWORD.EXE OR *\\\\EXCEL.EXE OR *\\\\POWERPNT.exe OR *\\\\MSPUB.exe OR *\\\\VISIO.exe OR *\\\\OUTLOOK.EXE) AND Image.keyword:(*\\\\cmd.exe OR *\\\\powershell.exe OR *\\\\wscript.exe OR *\\\\cscript.exe OR *\\\\sh.exe OR *\\\\bash.exe OR *\\\\scrcons.exe OR *\\\\schtasks.exe OR *\\\\regsvr32.exe OR *\\\\hh.exe OR *\\\\wmic.exe OR *\\\\mshta.exe OR *\\\\rundll32.exe OR *\\\\msiexec.exe OR *\\\\forfiles.exe OR *\\\\scriptrunner.exe OR *\\\\mftrace.exe OR *\\\\AppVLP.exe OR *\\\\svchost.exe))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Microsoft-Office-Product-Spawning-Windows-Shell <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1059: Command-Line Interface](https://attack.mitre.org/techniques/T1059)
- [T1202: Indirect Command Execution](https://attack.mitre.org/techniques/T1202)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1059: Command-Line Interface](../Triggers/T1059.md)
- [T1202: Indirect Command Execution](../Triggers/T1202.md)
|
| Severity Level | high |
@@ -62,6 +62,27 @@ level: high
+### es-qs
+
+```
+(ParentImage.keyword:(*\\\\WINWORD.EXE OR *\\\\EXCEL.EXE OR *\\\\POWERPNT.exe OR *\\\\MSPUB.exe OR *\\\\VISIO.exe OR *\\\\OUTLOOK.EXE) AND Image.keyword:(C\\:\\\\users\\\\*.exe))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/MS-Office-Product-Spawning-Exe-in-User-Dir <[TA0008: Lateral Movement](https://attack.mitre.org/tactics/TA0008) |
| ATT&CK Technique | - [T1075: Pass the Hash](https://attack.mitre.org/techniques/T1075)
|
-| Data Needed | - [DN_0057_4625_account_failed_to_logon](../Data_Needed/DN_0057_4625_account_failed_to_logon.md)
- [DN_0004_4624_windows_account_logon](../Data_Needed/DN_0004_4624_windows_account_logon.md)
|
+| Data Needed | - [DN_0004_4624_windows_account_logon](../Data_Needed/DN_0004_4624_windows_account_logon.md)
- [DN_0057_4625_account_failed_to_logon](../Data_Needed/DN_0057_4625_account_failed_to_logon.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1075: Pass the Hash](../Triggers/T1075.md)
|
| Severity Level | medium |
@@ -59,6 +59,27 @@ level: medium
+### es-qs
+
+```
+((LogonType:"3" AND LogonProcessName:"NtLmSsp" AND WorkstationName:"%Workstations%" AND ComputerName:"%Workstations%" AND (EventID:"4624" OR EventID:"4625")) AND (NOT (AccountName:"ANONYMOUS\\ LOGON")))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Pass-the-Hash-Activity <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1073: DLL Side-Loading](https://attack.mitre.org/techniques/T1073)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1073: DLL Side-Loading](../Triggers/T1073.md)
|
| Severity Level | high |
@@ -121,6 +121,27 @@ level: high
+### es-qs
+
+```
+((((((((((((Image.keyword:*\\\\CamMute.exe AND (NOT (Image.keyword:*\\\\Lenovo\\\\Communication\\ Utility\\\\*))) OR (Image.keyword:*\\\\chrome_frame_helper.exe AND (NOT (Image.keyword:*\\\\Google\\\\Chrome\\\\application\\\\*)))) OR (Image.keyword:*\\\\dvcemumanager.exe AND (NOT (Image.keyword:*\\\\Microsoft\\ Device\\ Emulator\\\\*)))) OR (Image.keyword:*\\\\Gadget.exe AND (NOT (Image.keyword:*\\\\Windows\\ Media\\ Player\\\\*)))) OR (Image.keyword:*\\\\hcc.exe AND (NOT (Image.keyword:*\\\\HTML\\ Help\\ Workshop\\\\*)))) OR (Image.keyword:*\\\\hkcmd.exe AND (NOT (Image.keyword:(*\\\\System32\\\\* OR *\\\\SysNative\\\\* OR *\\\\SysWowo64\\\\*))))) OR (Image.keyword:*\\\\Mc.exe AND (NOT (Image.keyword:(*\\\\Microsoft\\ Visual\\ Studio* OR *\\\\Microsoft\\ SDK* OR *\\\\Windows\\ Kit*))))) OR (Image.keyword:*\\\\MsMpEng.exe AND (NOT (Image.keyword:(*\\\\Microsoft\\ Security\\ Client\\\\* OR *\\\\Windows\\ Defender\\\\* OR *\\\\AntiMalware\\\\*))))) OR (Image.keyword:*\\\\msseces.exe AND (NOT (Image.keyword:(*\\\\Microsoft\\ Security\\ Center\\\\* OR *\\\\Microsoft\\ Security\\ Client\\\\* OR *\\\\Microsoft\\ Security\\ Essentials\\\\*))))) OR (Image.keyword:*\\\\OInfoP11.exe AND (NOT (Image.keyword:*\\\\Common\\ Files\\\\Microsoft\\ Shared\\\\*)))) OR (Image.keyword:*\\\\OleView.exe AND (NOT (Image.keyword:(*\\\\Microsoft\\ Visual\\ Studio* OR *\\\\Microsoft\\ SDK* OR *\\\\Windows\\ Kit* OR *\\\\Windows\\ Resource\\ Kit\\\\*))))) OR (Image.keyword:*\\\\rc.exe AND (NOT (Image.keyword:(*\\\\Microsoft\\ Visual\\ Studio* OR *\\\\Microsoft\\ SDK* OR *\\\\Windows\\ Kit* OR *\\\\Windows\\ Resource\\ Kit\\\\* OR *\\\\Microsoft.NET\\\\*)))))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Executable-used-by-PlugX-in-Uncommon-Location---Sysmon-Version <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1086: PowerShell](https://attack.mitre.org/techniques/T1086)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1086: PowerShell](../Triggers/T1086.md)
|
| Severity Level | high |
@@ -52,6 +52,27 @@ level: high
+### es-qs
+
+```
+(CommandLine.keyword:(*System.Management.Automation.AmsiUtils*) AND CommandLine.keyword:(*amsiInitFailed*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Powershell-AMSI-Bypass-via-.NET-Reflection <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | critical |
@@ -50,6 +50,27 @@ level: critical
+### es-qs
+
+```
+(CommandLine.keyword:*AAAAYInlM* AND CommandLine.keyword:(*OiCAAAAYInlM* OR *OiJAAAAYInlM*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/PowerShell-Base64-Encoded-Shellcode <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1086: PowerShell](https://attack.mitre.org/techniques/T1086)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1086: PowerShell](../Triggers/T1086.md)
|
| Severity Level | medium |
@@ -51,6 +51,27 @@ level: medium
+### es-qs
+
+```
+(Image.keyword:*\\\\powershell.exe AND CommandLine.keyword:(*new\\-object\\ system.net.webclient\\).downloadstring\\(* OR *new\\-object\\ system.net.webclient\\).downloadfile\\(* OR *new\\-object\\ net.webclient\\).downloadstring\\(* OR *new\\-object\\ net.webclient\\).downloadfile\\(*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/PowerShell-Download-from-URL <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1086: PowerShell](https://attack.mitre.org/techniques/T1086)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1086: PowerShell](../Triggers/T1086.md)
|
| Severity Level | high |
@@ -87,6 +87,27 @@ level: high
+### es-qs
+
+```
+(Image.keyword:(*\\\\Powershell.exe) AND CommandLine:("\\ \\-windowstyle\\ h\\ " OR "\\ \\-windowstyl\\ h" OR "\\ \\-windowsty\\ h" OR "\\ \\-windowst\\ h" OR "\\ \\-windows\\ h" OR "\\ \\-windo\\ h" OR "\\ \\-wind\\ h" OR "\\ \\-win\\ h" OR "\\ \\-wi\\ h" OR "\\ \\-win\\ h\\ " OR "\\ \\-win\\ hi\\ " OR "\\ \\-win\\ hid\\ " OR "\\ \\-win\\ hidd\\ " OR "\\ \\-win\\ hidde\\ " OR "\\ \\-NoPr\\ " OR "\\ \\-NoPro\\ " OR "\\ \\-NoProf\\ " OR "\\ \\-NoProfi\\ " OR "\\ \\-NoProfil\\ " OR "\\ \\-nonin\\ " OR "\\ \\-nonint\\ " OR "\\ \\-noninte\\ " OR "\\ \\-noninter\\ " OR "\\ \\-nonintera\\ " OR "\\ \\-noninterac\\ " OR "\\ \\-noninteract\\ " OR "\\ \\-noninteracti\\ " OR "\\ \\-noninteractiv\\ " OR "\\ \\-ec\\ " OR "\\ \\-encodedComman\\ " OR "\\ \\-encodedComma\\ " OR "\\ \\-encodedComm\\ " OR "\\ \\-encodedCom\\ " OR "\\ \\-encodedCo\\ " OR "\\ \\-encodedC\\ " OR "\\ \\-encoded\\ " OR "\\ \\-encode\\ " OR "\\ \\-encod\\ " OR "\\ \\-enco\\ " OR "\\ \\-en\\ "))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-PowerShell-Parameter-Substring <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1086: PowerShell](https://attack.mitre.org/techniques/T1086)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1086: PowerShell](../Triggers/T1086.md)
|
| Severity Level | medium |
@@ -45,6 +45,27 @@ logsource:
+### es-qs
+
+```
+CommandLine.keyword:(*\\ \\-bxor*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-XOR-Encoded-PowerShell-Command-Line <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003)[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004) |
| ATT&CK Technique | - [T1053: Scheduled Task](https://attack.mitre.org/techniques/T1053)
- [T1086: PowerShell](https://attack.mitre.org/techniques/T1086)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1053: Scheduled Task](../Triggers/T1053.md)
- [T1086: PowerShell](../Triggers/T1086.md)
|
| Severity Level | high |
@@ -61,6 +61,27 @@ level: high
+### es-qs
+
+```
+(ParentImage.keyword:(*\\\\powershell.exe) AND CommandLine.keyword:(*schtasks*\\/Create*\\/SC\\ *ONLOGON*\\/TN\\ *Updater*\\/TR\\ *powershell* OR *schtasks*\\/Create*\\/SC\\ *DAILY*\\/TN\\ *Updater*\\/TR\\ *powershell* OR *schtasks*\\/Create*\\/SC\\ *ONIDLE*\\/TN\\ *Updater*\\/TR\\ *powershell* OR *schtasks*\\/Create*\\/SC\\ *Updater*\\/TN\\ *Updater*\\/TR\\ *powershell*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Default-PowerSploit-and-Empire-Schtasks-Persistence <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | low |
@@ -67,6 +67,27 @@ level: low
+### es-qs
+
+```
+((Image.keyword:(*\\\\svchost.exe OR *\\\\taskhost.exe OR *\\\\lsm.exe OR *\\\\lsass.exe OR *\\\\services.exe OR *\\\\lsaiso.exe OR *\\\\csrss.exe OR *\\\\wininit.exe OR *\\\\winlogon.exe) AND (NOT (ParentImage.keyword:(*\\\\System32\\\\* OR *\\\\SysWOW64\\\\* OR *\\\\SavService.exe OR *\\\\Windows\\ Defender\\\\*\\\\MsMpEng.exe)))) AND (NOT (NOT _exists_:ParentImage)))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Windows-Processes-Suspicious-Parent-Directory <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003) |
| ATT&CK Technique | - [T1197: BITS Jobs](https://attack.mitre.org/techniques/T1197)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1197: BITS Jobs](../Triggers/T1197.md)
|
| Severity Level | medium |
@@ -54,6 +54,27 @@ level: medium
+### es-qs
+
+```
+(Image.keyword:(*\\\\bitsadmin.exe) AND CommandLine:("\\/transfer"))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Bitsadmin-Download <[DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | critical |
@@ -49,6 +49,27 @@ level: critical
+### es-qs
+
+```
+CommandLine.keyword:(*vssadmin\\ delete\\ shadows* OR *wmic\\ SHADOWCOPY\\ DELETE*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Ransomware-Deletes-Volume-Shadow-Copies <[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003) |
| ATT&CK Technique | - [T1138: Application Shimming](https://attack.mitre.org/techniques/T1138)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1138: Application Shimming](../Triggers/T1138.md)
|
| Severity Level | high |
@@ -48,6 +48,27 @@ level: high
+### es-qs
+
+```
+(Image.keyword:(*\\\\sdbinst.exe) AND CommandLine.keyword:(*.sdb*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Possible-Shim-Database-Persistence-via-sdbinst.exe <[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003)[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004) |
| ATT&CK Technique | - [T1178: SID-History Injection](https://attack.mitre.org/techniques/T1178)
|
-| Data Needed | - [DN_0027_4738_user_account_was_changed](../Data_Needed/DN_0027_4738_user_account_was_changed.md)
- [DN_0074_4765_sid_history_was_added_to_an_account](../Data_Needed/DN_0074_4765_sid_history_was_added_to_an_account.md)
- [DN_0075_4766_attempt_to_add_sid_history_to_an_account_failed](../Data_Needed/DN_0075_4766_attempt_to_add_sid_history_to_an_account_failed.md)
|
+| Data Needed | - [DN_0027_4738_user_account_was_changed](../Data_Needed/DN_0027_4738_user_account_was_changed.md)
- [DN_0075_4766_attempt_to_add_sid_history_to_an_account_failed](../Data_Needed/DN_0075_4766_attempt_to_add_sid_history_to_an_account_failed.md)
- [DN_0074_4765_sid_history_was_added_to_an_account](../Data_Needed/DN_0074_4765_sid_history_was_added_to_an_account.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1178: SID-History Injection](../Triggers/T1178.md)
|
| Severity Level | low |
@@ -54,6 +54,27 @@ level: low
+### es-qs
+
+```
+(EventID:("4765" OR "4766") OR (EventID:"4738" AND (NOT (SidHistory:("\\-" OR "%%1793")))))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Addition-of-SID-History-to-Active-Directory-Object <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | high |
@@ -50,6 +50,27 @@ level: high
+### es-qs
+
+```
+(CommandLine.keyword:*\\\\calc.exe\\ * OR (Image.keyword:*\\\\calc.exe AND (NOT (Image.keyword:*\\\\Windows\\\\Sys*))))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Calculator-Usage <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1140: Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140)
- [T1105: Remote File Copy](https://attack.mitre.org/techniques/T1105)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1140: Deobfuscate/Decode Files or Information](../Triggers/T1140.md)
- [T1105: Remote File Copy](../Triggers/T1105.md)
|
| Severity Level | high |
@@ -73,6 +73,27 @@ level: high
+### es-qs
+
+```
+CommandLine.keyword:(*\\ \\-decode\\ * OR *\\ \\/decode\\ * OR *\\ \\-decodehex\\ * OR *\\ \\/decodehex\\ * OR *\\ \\-urlcache\\ * OR *\\ \\/urlcache\\ * OR *\\ \\-verifyctl\\ * OR *\\ \\/verifyctl\\ * OR *\\ \\-encode\\ * OR *\\ \\/encode\\ * OR *certutil*\\ \\-URL* OR *certutil*\\ \\/URL* OR *certutil*\\ \\-ping* OR *certutil*\\ \\/ping*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Certutil-Command <[DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | medium |
@@ -48,6 +48,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(certutil\\ \\-f\\ \\-encode\\ * OR certutil.exe\\ \\-f\\ \\-encode\\ * OR certutil\\ \\-encode\\ \\-f\\ * OR certutil.exe\\ \\-encode\\ \\-f\\ *)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Certutil-Encode <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1140: Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1140: Deobfuscate/Decode Files or Information](../Triggers/T1140.md)
|
| Severity Level | low |
@@ -53,6 +53,27 @@ level: low
+### es-qs
+
+```
+CommandLine:("\\^h\\^t\\^t\\^p" OR "h\\"t\\"t\\"p")
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Commandline-Escape < powershell) |
| ATT&CK Tactic | - [TA0002: Execution](https://attack.mitre.org/tactics/TA0002)
|
| ATT&CK Technique | - [T1059: Command-Line Interface](https://attack.mitre.org/techniques/T1059)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1059: Command-Line Interface](../Triggers/T1059.md)
|
| Severity Level | medium |
@@ -52,6 +52,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(cmd.exe\\ \\/c\\ *http\\:\\/\\/*%AppData% OR cmd.exe\\ \\/c\\ *https\\:\\/\\/*%AppData%)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Command-Line-Execution-with-suspicious-URL-and-AppData-Strings < powershell)",\n "tags": [\n "attack.execution",\n "attack.t1059"\n ],\n "query": "CommandLine.keyword:(cmd.exe\\\\ \\\\/c\\\\ *http\\\\:\\\\/\\\\/*%AppData% OR cmd.exe\\\\ \\\\/c\\\\ *https\\\\:\\\\/\\\\/*%AppData%)"\n },\n "trigger": {\n "schedule": {\n "interval": "30m"\n }\n },\n "input": {\n "search": {\n "request": {\n "body": {\n "size": 0,\n "query": {\n "bool": {\n "must": [\n {\n "query_string": {\n "query": "CommandLine.keyword:(cmd.exe\\\\ \\\\/c\\\\ *http\\\\:\\\\/\\\\/*%AppData% OR cmd.exe\\\\ \\\\/c\\\\ *https\\\\:\\\\/\\\\/*%AppData%)",\n "analyze_wildcard": true\n }\n }\n ],\n "filter": {\n "range": {\n "timestamp": {\n "gte": "now-30m/m"\n }\n }\n }\n }\n }\n },\n "indices": []\n }\n }\n },\n "condition": {\n "compare": {\n "ctx.payload.hits.total": {\n "not_eq": 0\n }\n }\n },\n "actions": {\n "send_email": {\n "email": {\n "to": "root@localhost",\n "subject": "Sigma Rule \'Command Line Execution with suspicious URL and AppData Strings\'",\n "body": "Hits:\\n{{#ctx.payload.hits.hits}}Hit on {{_source.@timestamp}}:\\n CommandLine = {{_source.CommandLine}}\\nParentCommandLine = {{_source.ParentCommandLine}}================================================================================\\n{{/ctx.payload.hits.hits}}",\n "attachments": {\n "data.json": {\n "data": {\n "format": "json"\n }\n }\n }\n }\n }\n }\n}\nEOF\n
+```
+
+
+### graylog
+
+```
+CommandLine.keyword:(cmd.exe \\/c *http\\:\\/\\/*%AppData% cmd.exe \\/c *https\\:\\/\\/*%AppData%)
+```
+
+
### splunk
```
@@ -59,4 +80,18 @@ level: medium
```
+### logpoint
+
+```
+(event_id="1" CommandLine IN ["cmd.exe /c *http://*%AppData%", "cmd.exe /c *https://*%AppData%"])
+```
+
+
+### grep
+
+```
+grep -P '^(?:.*cmd\\.exe /c .*http://.*%AppData%|.*cmd\\.exe /c .*https://.*%AppData%)'
+```
+
+
diff --git a/Atomic_Threat_Coverage/Detection_Rules/win_susp_codepage_switch.md b/Atomic_Threat_Coverage/Detection_Rules/win_susp_codepage_switch.md
index a62dd67..1a08314 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/win_susp_codepage_switch.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/win_susp_codepage_switch.md
@@ -3,7 +3,7 @@
| Description | Detects a code page switch in command line or batch scripts to a rare language |
| ATT&CK Tactic | This Detection Rule wasn't mapped to ATT&CK Tactic yet |
| ATT&CK Technique | This Detection Rule wasn't mapped to ATT&CK Technique yet |
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | medium |
@@ -52,6 +52,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(chcp*\\ 936 OR chcp*\\ 1258)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Code-Page-Switch <[TA0007: Discovery](https://attack.mitre.org/tactics/TA0007) |
| ATT&CK Technique | - [T1087: Account Discovery](https://attack.mitre.org/techniques/T1087)
- [T1082: System Information Discovery](https://attack.mitre.org/techniques/T1082)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1087: Account Discovery](../Triggers/T1087.md)
- [T1082: System Information Discovery](../Triggers/T1082.md)
|
| Severity Level | medium |
@@ -69,6 +69,27 @@ level: medium
+### es-qs
+
+```
+
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Reconnaissance-Activity-with-Net-Command < 4
+```
+
+
+### grep
+
+```
+grep -P \'^(?:.*tasklist|.*net time|.*systeminfo|.*whoami|.*nbtstat|.*net start|.*.*\\net1 start|.*qprocess|.*nslookup|.*hostname\\.exe|.*.*\\net1 user /domain|.*.*\\net1 group /domain|.*.*\\net1 group "domain admins" /domain|.*.*\\net1 group "Exchange Trusted Subsystem" /domain|.*.*\\net1 accounts /domain|.*.*\\net1 user net localgroup administrators|.*netstat -an)\'
+```
+
+
diff --git a/Atomic_Threat_Coverage/Detection_Rules/win_susp_compression_params.md b/Atomic_Threat_Coverage/Detection_Rules/win_susp_compression_params.md
index 99dd776..b52c07c 100644
--- a/Atomic_Threat_Coverage/Detection_Rules/win_susp_compression_params.md
+++ b/Atomic_Threat_Coverage/Detection_Rules/win_susp_compression_params.md
@@ -59,6 +59,27 @@ level: high
+### es-qs
+
+```
+((OriginalFileName.keyword:(7z*.exe OR *rar.exe OR *Command*Line*RAR*) AND CommandLine.keyword:(*\\ \\-p* OR *\\ \\-ta* OR *\\ \\-tb* OR *\\ \\-sdel* OR *\\ \\-dw* OR *\\ \\-hp*)) AND (NOT (ParentImage.keyword:C\\:\\\\Program*)))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Compression-Tool-Parameters <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1073: DLL Side-Loading](https://attack.mitre.org/techniques/T1073)
- [T1085: Rundll32](https://attack.mitre.org/techniques/T1085)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1073: DLL Side-Loading](../Triggers/T1073.md)
- [T1085: Rundll32](../Triggers/T1085.md)
|
| Severity Level | high |
@@ -54,6 +54,27 @@ level: high
+### es-qs
+
+```
+((ParentImage.keyword:*\\\\System32\\\\control.exe AND CommandLine.keyword:*\\\\rundll32.exe\\ *) AND (NOT (CommandLine.keyword:*Shell32.dll*)))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Control-Panel-DLL-Load <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | high |
@@ -50,6 +50,27 @@ level: high
+### es-qs
+
+```
+(Image.keyword:*\\\\csc.exe* AND ParentImage.keyword:(*\\\\wscript.exe OR *\\\\cscript.exe OR *\\\\mshta.exe))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Parent-of-Csc.exe <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1500: Compile After Delivery](https://attack.mitre.org/techniques/T1500)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1500: Compile After Delivery](../Triggers/T1500.md)
|
| Severity Level | high |
@@ -52,6 +52,27 @@ level: high
+### es-qs
+
+```
+(Image.keyword:*\\\\csc.exe AND CommandLine.keyword:(*\\\\AppData\\\\* OR *\\\\Windows\\\\Temp\\\\*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Csc.exe-Source-File-Folder <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1073: DLL Side-Loading](https://attack.mitre.org/techniques/T1073)
|
-| Data Needed | - [DN_0049_1034_dhcp_service_failed_to_load_callout_dlls](../Data_Needed/DN_0049_1034_dhcp_service_failed_to_load_callout_dlls.md)
- [DN_0047_1032_dhcp_service_callout_dll_file_has_caused_an_exception](../Data_Needed/DN_0047_1032_dhcp_service_callout_dll_file_has_caused_an_exception.md)
- [DN_0046_1031_dhcp_service_callout_dll_file_has_caused_an_exception](../Data_Needed/DN_0046_1031_dhcp_service_callout_dll_file_has_caused_an_exception.md)
|
+| Data Needed | - [DN_0046_1031_dhcp_service_callout_dll_file_has_caused_an_exception](../Data_Needed/DN_0046_1031_dhcp_service_callout_dll_file_has_caused_an_exception.md)
- [DN_0047_1032_dhcp_service_callout_dll_file_has_caused_an_exception](../Data_Needed/DN_0047_1032_dhcp_service_callout_dll_file_has_caused_an_exception.md)
- [DN_0049_1034_dhcp_service_failed_to_load_callout_dlls](../Data_Needed/DN_0049_1034_dhcp_service_failed_to_load_callout_dlls.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1073: DLL Side-Loading](../Triggers/T1073.md)
|
| Severity Level | critical |
@@ -53,6 +53,27 @@ level: critical
+### es-qs
+
+```
+(EventID:("1031" OR "1032" OR "1034") AND Source:"Microsoft\\-Windows\\-DHCP\\-Server")
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/DHCP-Server-Error-Failed-Loading-the-CallOut-DLL <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1073: DLL Side-Loading](https://attack.mitre.org/techniques/T1073)
|
-| Data Needed | - [DN_0036_150_dns_server_could_not_load_dll](../Data_Needed/DN_0036_150_dns_server_could_not_load_dll.md)
- [DN_0043_770_dns_server_plugin_dll_has_been_loaded](../Data_Needed/DN_0043_770_dns_server_plugin_dll_has_been_loaded.md)
|
+| Data Needed | - [DN_0043_770_dns_server_plugin_dll_has_been_loaded](../Data_Needed/DN_0043_770_dns_server_plugin_dll_has_been_loaded.md)
- [DN_0036_150_dns_server_could_not_load_dll](../Data_Needed/DN_0036_150_dns_server_could_not_load_dll.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1073: DLL Side-Loading](../Triggers/T1073.md)
|
| Severity Level | critical |
@@ -52,6 +52,27 @@ level: critical
+### es-qs
+
+```
+EventID:("150" OR "770")
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/DNS-Server-Error-Failed-Loading-the-ServerLevelPluginDLL <[TA0001: Initial Access](https://attack.mitre.org/tactics/TA0001) |
| ATT&CK Technique | - [T1193: Spearphishing Attachment](https://attack.mitre.org/techniques/T1193)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1193: Spearphishing Attachment](../Triggers/T1193.md)
|
| Severity Level | critical |
@@ -58,6 +58,27 @@ level: critical
+### es-qs
+
+```
+Image.keyword:(*.doc.exe OR *.docx.exe OR *.xls.exe OR *.xlsx.exe OR *.ppt.exe OR *.pptx.exe OR *.rtf.exe OR *.pdf.exe OR *.txt.exe OR *\\ \\ \\ \\ \\ \\ .exe OR *______.exe)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Double-Extension <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | high |
@@ -64,6 +64,27 @@ level: high
+### es-qs
+
+```
+Image.keyword:(C\\:\\\\PerfLogs\\\\* OR C\\:\\\\$Recycle.bin\\\\* OR C\\:\\\\Intel\\\\Logs\\\\* OR C\\:\\\\Users\\\\Default\\\\* OR C\\:\\\\Users\\\\Public\\\\* OR C\\:\\\\Users\\\\NetworkService\\\\* OR C\\:\\\\Windows\\\\Fonts\\\\* OR C\\:\\\\Windows\\\\Debug\\\\* OR C\\:\\\\Windows\\\\Media\\\\* OR C\\:\\\\Windows\\\\Help\\\\* OR C\\:\\\\Windows\\\\addins\\\\* OR C\\:\\\\Windows\\\\repair\\\\* OR C\\:\\\\Windows\\\\security\\\\* OR *\\\\RSA\\\\MachineKeys\\\\* OR C\\:\\\\Windows\\\\system32\\\\config\\\\systemprofile\\\\*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Executables-Started-in-Suspicious-Folder <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | high |
@@ -55,6 +55,27 @@ level: high
+### es-qs
+
+```
+Image.keyword:(*\\\\$Recycle.bin OR *\\\\Users\\\\All\\ Users\\\\* OR *\\\\Users\\\\Default\\\\* OR *\\\\Users\\\\Public\\\\* OR C\\:\\\\Perflogs\\\\* OR *\\\\config\\\\systemprofile\\\\* OR *\\\\Windows\\\\Fonts\\\\* OR *\\\\Windows\\\\IME\\\\* OR *\\\\Windows\\\\addins\\\\*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Execution-in-Non-Executable-Folder <[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003) |
| ATT&CK Technique | - [T1100: Web Shell](https://attack.mitre.org/techniques/T1100)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1100: Web Shell](../Triggers/T1100.md)
|
| Severity Level | medium |
@@ -57,6 +57,27 @@ level: medium
+### es-qs
+
+```
+(Image.keyword:(*\\\\wwwroot\\\\* OR *\\\\wmpub\\\\* OR *\\\\htdocs\\\\*) AND (NOT (Image.keyword:(*bin\\\\* OR *\\\\Tools\\\\* OR *\\\\SMSComponent\\\\*) AND ParentImage.keyword:(*\\\\services.exe))))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Execution-in-Webserver-Root-Folder <[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003)[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004) |
| ATT&CK Technique | - [T1078: Valid Accounts](https://attack.mitre.org/techniques/T1078)
|
-| Data Needed | - [DN_0041_529_logon_failure](../Data_Needed/DN_0041_529_logon_failure.md)
- [DN_0057_4625_account_failed_to_logon](../Data_Needed/DN_0057_4625_account_failed_to_logon.md)
- [DN_0079_4776_computer_attempted_to_validate_the_credentials_for_an_account](../Data_Needed/DN_0079_4776_computer_attempted_to_validate_the_credentials_for_an_account.md)
|
+| Data Needed | - [DN_0079_4776_computer_attempted_to_validate_the_credentials_for_an_account](../Data_Needed/DN_0079_4776_computer_attempted_to_validate_the_credentials_for_an_account.md)
- [DN_0057_4625_account_failed_to_logon](../Data_Needed/DN_0057_4625_account_failed_to_logon.md)
- [DN_0041_529_logon_failure](../Data_Needed/DN_0041_529_logon_failure.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1078: Valid Accounts](../Triggers/T1078.md)
|
| Severity Level | medium |
@@ -59,6 +59,27 @@ level: medium
+### es-qs
+
+```
+
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Multiple-Failed-Logins-with-Different-Accounts-from-Single-Source-System <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | This Detection Rule wasn't mapped to ATT&CK Technique yet |
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | medium |
@@ -48,6 +48,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(netsh\\ firewall\\ set\\ opmode\\ mode\\=disable OR netsh\\ advfirewall\\ set\\ *\\ state\\ off)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Firewall-Disabled-via-Netsh <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1073: DLL Side-Loading](https://attack.mitre.org/techniques/T1073)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1073: DLL Side-Loading](../Triggers/T1073.md)
|
| Severity Level | high |
@@ -52,6 +52,27 @@ level: high
+### es-qs
+
+```
+(Image.keyword:*\\\\GUP.exe AND (NOT (Image.keyword:(C\\:\\\\Users\\\\*\\\\AppData\\\\Local\\\\Notepad\\+\\+\\\\updater\\\\gup.exe OR C\\:\\\\Users\\\\*\\\\AppData\\\\Roaming\\\\Notepad\\+\\+\\\\updater\\\\gup.exe OR C\\:\\\\Program\\ Files\\\\Notepad\\+\\+\\\\updater\\\\gup.exe OR C\\:\\\\Program\\ Files\\ \\(x86\\)\\\\Notepad\\+\\+\\\\updater\\\\gup.exe))))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-GUP-Usage <[TA0008: Lateral Movement](https://attack.mitre.org/tactics/TA0008) |
| ATT&CK Technique | - [T1078: Valid Accounts](https://attack.mitre.org/techniques/T1078)
|
-| Data Needed | - [DN_0041_529_logon_failure](../Data_Needed/DN_0041_529_logon_failure.md)
- [DN_0040_528_user_successfully_logged_on_to_a_computer](../Data_Needed/DN_0040_528_user_successfully_logged_on_to_a_computer.md)
- [DN_0057_4625_account_failed_to_logon](../Data_Needed/DN_0057_4625_account_failed_to_logon.md)
- [DN_0004_4624_windows_account_logon](../Data_Needed/DN_0004_4624_windows_account_logon.md)
|
+| Data Needed | - [DN_0004_4624_windows_account_logon](../Data_Needed/DN_0004_4624_windows_account_logon.md)
- [DN_0040_528_user_successfully_logged_on_to_a_computer](../Data_Needed/DN_0040_528_user_successfully_logged_on_to_a_computer.md)
- [DN_0057_4625_account_failed_to_logon](../Data_Needed/DN_0057_4625_account_failed_to_logon.md)
- [DN_0041_529_logon_failure](../Data_Needed/DN_0041_529_logon_failure.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1078: Valid Accounts](../Triggers/T1078.md)
|
| Severity Level | medium |
@@ -55,6 +55,27 @@ level: medium
+### es-qs
+
+```
+((EventID:("528" OR "529" OR "4624" OR "4625") AND LogonType:"2" AND ComputerName:("%ServerSystems%" OR "%DomainControllers%")) AND (NOT (LogonProcessName:"Advapi" AND ComputerName:"%Workstations%")))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Interactive-Logon-to-Server-Systems <[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003) |
| ATT&CK Technique | - [T1100: Web Shell](https://attack.mitre.org/techniques/T1100)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1100: Web Shell](../Triggers/T1100.md)
|
| Severity Level | medium |
@@ -47,6 +47,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(*\\\\APPCMD.EXE\\ install\\ module\\ \\/name\\:*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/IIS-Native-Code-Module-Command-Line-Installation <[TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006) |
| ATT&CK Technique | - [T1212: Exploitation for Credential Access](https://attack.mitre.org/techniques/T1212)
|
-| Data Needed | - [DN_0077_4769_kerberos_service_ticket_was_requested](../Data_Needed/DN_0077_4769_kerberos_service_ticket_was_requested.md)
- [DN_0078_4771_kerberos_pre_authentication_failed](../Data_Needed/DN_0078_4771_kerberos_pre_authentication_failed.md)
- [DN_0042_675_kerberos_preauthentication_failed](../Data_Needed/DN_0042_675_kerberos_preauthentication_failed.md)
- [DN_0076_4768_kerberos_authentication_ticket_was_requested](../Data_Needed/DN_0076_4768_kerberos_authentication_ticket_was_requested.md)
|
+| Data Needed | - [DN_0042_675_kerberos_preauthentication_failed](../Data_Needed/DN_0042_675_kerberos_preauthentication_failed.md)
- [DN_0077_4769_kerberos_service_ticket_was_requested](../Data_Needed/DN_0077_4769_kerberos_service_ticket_was_requested.md)
- [DN_0078_4771_kerberos_pre_authentication_failed](../Data_Needed/DN_0078_4771_kerberos_pre_authentication_failed.md)
- [DN_0076_4768_kerberos_authentication_ticket_was_requested](../Data_Needed/DN_0076_4768_kerberos_authentication_ticket_was_requested.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1212: Exploitation for Credential Access](../Triggers/T1212.md)
|
| Severity Level | high |
@@ -77,6 +77,27 @@ level: high
+### es-qs
+
+```
+(EventID:("675" OR "4768" OR "4769" OR "4771") AND FailureCode:("0x9" OR "0xA" OR "0xB" OR "0xF" OR "0x10" OR "0x11" OR "0x13" OR "0x14" OR "0x1A" OR "0x1F" OR "0x21" OR "0x22" OR "0x23" OR "0x24" OR "0x26" OR "0x27" OR "0x28" OR "0x29" OR "0x2C" OR "0x2D" OR "0x2E" OR "0x2F" OR "0x31" OR "0x32" OR "0x3E" OR "0x3F" OR "0x40" OR "0x41" OR "0x43" OR "0x44"))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Kerberos-Manipulation <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1140: Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1140: Deobfuscate/Decode Files or Information](../Triggers/T1140.md)
|
| Severity Level | high |
@@ -65,6 +65,27 @@ detection:
+### es-qs
+
+```
+(CommandLine.keyword:(*mshta\\ vbscript\\:CreateObject\\(\\"Wscript.Shell\\"\\)* OR *mshta\\ vbscript\\:Execute\\(\\"Execute* OR *mshta\\ vbscript\\:CreateObject\\(\\"Wscript.Shell\\"\\).Run\\(\\"mshta.exe*) OR (Image:("C\\:\\\\Windows\\\\system32\\\\mshta.exe") AND CommandLine.keyword:(*.jpg* OR *.png* OR *.lnk* OR *.xls* OR *.doc* OR *.zip*)))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/MSHTA-Suspicious-Execution-01 <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | high |
@@ -51,6 +51,27 @@ level: high
+### es-qs
+
+```
+(Image.keyword:*\\\\msiexec.exe AND (NOT (Image.keyword:(C\\:\\\\Windows\\\\System32\\\\* OR C\\:\\\\Windows\\\\SysWOW64\\\\* OR C\\:\\\\Windows\\\\WinSxS\\\\*))))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-MsiExec-Directory <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | This Detection Rule wasn't mapped to ATT&CK Technique yet |
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | medium |
@@ -47,6 +47,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(*\\ msiexec*\\:\\/\\/*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/MsiExec-Web-Install <[TA0008: Lateral Movement](https://attack.mitre.org/tactics/TA0008)[TA0007: Discovery](https://attack.mitre.org/tactics/TA0007) |
| ATT&CK Technique | This Detection Rule wasn't mapped to ATT&CK Technique yet |
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | low |
@@ -60,6 +60,27 @@ level: low
+### es-qs
+
+```
+(Image.keyword:(*\\\\net.exe OR *\\\\net1.exe) AND CommandLine.keyword:(*\\ group* OR *\\ localgroup* OR *\\ user* OR *\\ view* OR *\\ share OR *\\ accounts* OR *\\ use* OR *\\ stop\\ *))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Net.exe-Execution <[TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006) |
| ATT&CK Technique | - [T1003: Credential Dumping](https://attack.mitre.org/techniques/T1003)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1003: Credential Dumping](../Triggers/T1003.md)
|
| Severity Level | high |
@@ -45,6 +45,27 @@ level: high
+### es-qs
+
+```
+CommandLine.keyword:*\\\\ntdsutil*
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Invocation-of-Active-Directory-Diagnostic-Tool-ntdsutil.exe <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1059: Command-Line Interface](https://attack.mitre.org/techniques/T1059)
- [T1202: Indirect Command Execution](https://attack.mitre.org/techniques/T1202)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1059: Command-Line Interface](../Triggers/T1059.md)
- [T1202: Indirect Command Execution](../Triggers/T1202.md)
|
| Severity Level | high |
@@ -51,6 +51,27 @@ level: high
+### es-qs
+
+```
+(CommandLine.keyword:*EnableUnsafeClientMailRules* OR (ParentImage.keyword:*\\\\outlook.exe AND CommandLine.keyword:\\\\\\\\*\\\\*.exe))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Execution-from-Outlook <[TA0001: Initial Access](https://attack.mitre.org/tactics/TA0001) |
| ATT&CK Technique | - [T1193: Spearphishing Attachment](https://attack.mitre.org/techniques/T1193)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1193: Spearphishing Attachment](../Triggers/T1193.md)
|
| Severity Level | high |
@@ -47,6 +47,27 @@ level: high
+### es-qs
+
+```
+Image.keyword:*\\\\Temporary\\ Internet\\ Files\\\\Content.Outlook\\\\*
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Execution-in-Outlook-Temp-Folder <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1140: Deobfuscate/Decode Files or Information](https://attack.mitre.org/techniques/T1140)
- [T1027: Obfuscated Files or Information](https://attack.mitre.org/techniques/T1027)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1140: Deobfuscate/Decode Files or Information](../Triggers/T1140.md)
- [T1027: Obfuscated Files or Information](../Triggers/T1027.md)
|
| Severity Level | high |
@@ -51,6 +51,27 @@ level: high
+### es-qs
+
+```
+CommandLine.keyword:(*\\\\ping.exe\\ 0x* OR *\\\\ping\\ 0x*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Ping-Hex-IP <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1086: PowerShell](https://attack.mitre.org/techniques/T1086)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1086: PowerShell](../Triggers/T1086.md)
|
| Severity Level | critical |
@@ -50,6 +50,27 @@ level: critical
+### es-qs
+
+```
+CommandLine.keyword:(*\\ \\-NoP\\ \\-sta\\ \\-NonI\\ \\-W\\ Hidden\\ \\-Enc\\ * OR *\\ \\-noP\\ \\-sta\\ \\-w\\ 1\\ \\-enc\\ * OR *\\ \\-NoP\\ \\-NonI\\ \\-W\\ Hidden\\ \\-enc\\ *)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Empire-PowerShell-Launch-Parameters <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004) |
| ATT&CK Technique | - [T1088: Bypass User Account Control](https://attack.mitre.org/techniques/T1088)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1088: Bypass User Account Control](../Triggers/T1088.md)
|
| Severity Level | critical |
@@ -54,6 +54,27 @@ level: critical
+### es-qs
+
+```
+CommandLine.keyword:(*\\ \\-NoP\\ \\-NonI\\ \\-w\\ Hidden\\ \\-c\\ $x\\=$\\(\\(gp\\ HKCU\\:Software\\\\Microsoft\\\\Windows\\ Update\\).Update\\)* OR *\\ \\-NoP\\ \\-NonI\\ \\-c\\ $x\\=$\\(\\(gp\\ HKCU\\:Software\\\\Microsoft\\\\Windows\\ Update\\).Update\\);*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Empire-PowerShell-UAC-Bypass <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1086: PowerShell](https://attack.mitre.org/techniques/T1086)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1086: PowerShell](../Triggers/T1086.md)
|
| Severity Level | high |
@@ -65,6 +65,27 @@ level: high
+### es-qs
+
+```
+(CommandLine.keyword:(*\\ \\-e\\ JAB* OR *\\ \\-e\\ \\ JAB* OR *\\ \\-e\\ \\ \\ JAB* OR *\\ \\-e\\ \\ \\ \\ JAB* OR *\\ \\-e\\ \\ \\ \\ \\ JAB* OR *\\ \\-e\\ \\ \\ \\ \\ \\ JAB* OR *\\ \\-enc\\ JAB* OR *\\ \\-enco\\ JAB* OR *\\ \\-encodedcommand\\ JAB* OR *\\ BA\\^J\\ e\\- OR *\\ \\-e\\ SUVYI* OR *\\ \\-e\\ aWV4I* OR *\\ \\-e\\ SQBFAFgA* OR *\\ \\-e\\ aQBlAHgA* OR *\\ \\-enc\\ SUVYI* OR *\\ \\-enc\\ aWV4I* OR *\\ \\-enc\\ SQBFAFgA* OR *\\ \\-enc\\ aQBlAHgA*) AND (NOT (CommandLine.keyword:*\\ \\-ExecutionPolicy\\ remotesigned\\ *)))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Encoded-PowerShell-Command-Line <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1086: PowerShell](https://attack.mitre.org/techniques/T1086)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1086: PowerShell](../Triggers/T1086.md)
|
| Severity Level | high |
@@ -96,6 +96,27 @@ level: high
+### es-qs
+
+```
+(Image.keyword:*\\\\powershell.exe AND CommandLine.keyword:*\\ hidden\\ * AND CommandLine.keyword:(*AGkAdABzAGEAZABtAGkAbgAgAC8AdAByAGEAbgBzAGYAZQByA* OR *aXRzYWRtaW4gL3RyYW5zZmVy* OR *IAaQB0AHMAYQBkAG0AaQBuACAALwB0AHIAYQBuAHMAZgBlAHIA* OR *JpdHNhZG1pbiAvdHJhbnNmZX* OR *YgBpAHQAcwBhAGQAbQBpAG4AIAAvAHQAcgBhAG4AcwBmAGUAcg* OR *Yml0c2FkbWluIC90cmFuc2Zlc* OR *AGMAaAB1AG4AawBfAHMAaQB6AGUA* OR *JABjAGgAdQBuAGsAXwBzAGkAegBlA* OR *JGNodW5rX3Npem* OR *QAYwBoAHUAbgBrAF8AcwBpAHoAZQ* OR *RjaHVua19zaXpl* OR *Y2h1bmtfc2l6Z* OR *AE8ALgBDAG8AbQBwAHIAZQBzAHMAaQBvAG4A* OR *kATwAuAEMAbwBtAHAAcgBlAHMAcwBpAG8Abg* OR *lPLkNvbXByZXNzaW9u* OR *SQBPAC4AQwBvAG0AcAByAGUAcwBzAGkAbwBuA* OR *SU8uQ29tcHJlc3Npb2* OR *Ty5Db21wcmVzc2lvb* OR *AE8ALgBNAGUAbQBvAHIAeQBTAHQAcgBlAGEAbQ* OR *kATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtA* OR *lPLk1lbW9yeVN0cmVhb* OR *SQBPAC4ATQBlAG0AbwByAHkAUwB0AHIAZQBhAG0A* OR *SU8uTWVtb3J5U3RyZWFt* OR *Ty5NZW1vcnlTdHJlYW* OR *4ARwBlAHQAQwBoAHUAbgBrA* OR *5HZXRDaHVua* OR *AEcAZQB0AEMAaAB1AG4Aaw* OR *LgBHAGUAdABDAGgAdQBuAGsA* OR *LkdldENodW5r* OR *R2V0Q2h1bm* OR *AEgAUgBFAEEARABfAEkATgBGAE8ANgA0A* OR *QASABSAEUAQQBEAF8ASQBOAEYATwA2ADQA* OR *RIUkVBRF9JTkZPNj* OR *SFJFQURfSU5GTzY0* OR *VABIAFIARQBBAEQAXwBJAE4ARgBPADYANA* OR *VEhSRUFEX0lORk82N* OR *AHIAZQBhAHQAZQBSAGUAbQBvAHQAZQBUAGgAcgBlAGEAZA* OR *cmVhdGVSZW1vdGVUaHJlYW* OR *MAcgBlAGEAdABlAFIAZQBtAG8AdABlAFQAaAByAGUAYQBkA* OR *NyZWF0ZVJlbW90ZVRocmVhZ* OR *Q3JlYXRlUmVtb3RlVGhyZWFk* OR *QwByAGUAYQB0AGUAUgBlAG0AbwB0AGUAVABoAHIAZQBhAGQA* OR *0AZQBtAG0AbwB2AGUA* OR *1lbW1vdm* OR *AGUAbQBtAG8AdgBlA* OR *bQBlAG0AbQBvAHYAZQ* OR *bWVtbW92Z* OR *ZW1tb3Zl*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Malicious-Base64-encoded-PowerShell-Keywords-in-command-lines <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
- [T1003: Credential Dumping](https://attack.mitre.org/techniques/T1003)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
- [T1003: Credential Dumping](../Triggers/T1003.md)
|
| Severity Level | medium |
@@ -58,6 +58,27 @@ level: medium
+### es-qs
+
+```
+((CommandLine.keyword:(*\\ \\-ma\\ *) AND CommandLine.keyword:(*\\ lsass*)) OR CommandLine.keyword:(*\\ \\-ma\\ ls*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Use-of-Procdump <[DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | medium |
@@ -102,6 +102,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(vssadmin.exe\\ delete\\ shadows* OR vssadmin\\ delete\\ shadows* OR vssadmin\\ create\\ shadow\\ \\/for\\=C\\:* OR copy\\ \\\\?\\\\GLOBALROOT\\\\Device\\\\*\\\\windows\\\\ntds\\\\ntds.dit* OR copy\\ \\\\?\\\\GLOBALROOT\\\\Device\\\\*\\\\config\\\\SAM* OR reg\\ SAVE\\ HKLM\\\\SYSTEM\\ * OR reg\\ SAVE\\ HKLM\\\\SAM\\ * OR *\\ sekurlsa\\:* OR net\\ localgroup\\ administrators\\ *\\ \\/add OR net\\ group\\ \\"Domain\\ Admins\\"\\ *\\ \\/ADD\\ \\/DOMAIN OR certutil.exe\\ *\\-urlcache*\\ http* OR certutil.exe\\ *\\-urlcache*\\ ftp* OR netsh\\ advfirewall\\ firewall\\ *\\\\AppData\\\\* OR attrib\\ \\+S\\ \\+H\\ \\+R\\ *\\\\AppData\\\\* OR schtasks*\\ \\/create\\ *\\\\AppData\\\\* OR schtasks*\\ \\/sc\\ minute* OR *\\\\Regasm.exe\\ *\\\\AppData\\\\* OR *\\\\Regasm\\ *\\\\AppData\\\\* OR *\\\\bitsadmin*\\ \\/transfer* OR *\\\\certutil.exe\\ *\\ \\-decode\\ * OR *\\\\certutil.exe\\ *\\ \\-decodehex\\ * OR *\\\\certutil.exe\\ \\-ping\\ * OR icacls\\ *\\ \\/grant\\ Everyone\\:F\\ \\/T\\ \\/C\\ \\/Q OR *\\ wmic\\ shadowcopy\\ delete\\ * OR *\\ wbadmin.exe\\ delete\\ catalog\\ \\-quiet* OR *\\\\wscript.exe\\ *.jse OR *\\\\wscript.exe\\ *.js OR *\\\\wscript.exe\\ *.vba OR *\\\\wscript.exe\\ *.vbe OR *\\\\cscript.exe\\ *.jse OR *\\\\cscript.exe\\ *.js OR *\\\\cscript.exe\\ *.vba OR *\\\\cscript.exe\\ *.vbe OR *\\\\fodhelper.exe OR *waitfor*\\/s* OR *waitfor*\\/si\\ persist* OR *remote*\\/s* OR *remote*\\/c* OR *remote*\\/q* OR *AddInProcess* OR *\\ \\/stext\\ * OR *\\ \\/scomma\\ * OR *\\ \\/stab\\ * OR *\\ \\/stabular\\ * OR *\\ \\/shtml\\ * OR *\\ \\/sverhtml\\ * OR *\\ \\/sxml\\ *)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Process-Creation <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | high |
@@ -53,6 +53,27 @@ level: high
+### es-qs
+
+```
+Image.keyword:(*\\\\$Recycle.bin OR *\\\\Users\\\\Public\\\\* OR C\\:\\\\Perflogs\\\\* OR *\\\\Windows\\\\Fonts\\\\* OR *\\\\Windows\\\\IME\\\\* OR *\\\\Windows\\\\addins\\\\* OR *\\\\Windows\\\\debug\\\\*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Program-Location-Process-Starts <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1086: PowerShell](https://attack.mitre.org/techniques/T1086)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1086: PowerShell](../Triggers/T1086.md)
|
| Severity Level | medium |
@@ -49,6 +49,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(*\\ \\/c\\ powershell*\\\\AppData\\\\Local\\\\* OR *\\ \\/c\\ powershell*\\\\AppData\\\\Roaming\\\\*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/PowerShell-Script-Run-in-AppData <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1064: Scripting](https://attack.mitre.org/techniques/T1064)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1064: Scripting](../Triggers/T1064.md)
|
| Severity Level | medium |
@@ -47,6 +47,27 @@ level: medium
+### es-qs
+
+```
+CommandLine:("rasdial")
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-RASdial-Activity <[TA0007: Discovery](https://attack.mitre.org/tactics/TA0007) |
| ATT&CK Technique | - [T1087: Account Discovery](https://attack.mitre.org/techniques/T1087)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1087: Account Discovery](../Triggers/T1087.md)
|
| Severity Level | medium |
@@ -52,6 +52,27 @@ level: medium
+### es-qs
+
+```
+CommandLine:("net\\ group\\ \\"domain\\ admins\\"\\ \\/domain" OR "net\\ localgroup\\ administrators")
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Reconnaissance-Activity <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1117: Regsvr32](https://attack.mitre.org/techniques/T1117)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1117: Regsvr32](../Triggers/T1117.md)
|
| Severity Level | high |
@@ -66,6 +66,27 @@ level: high
+### es-qs
+
+```
+((Image.keyword:*\\\\regsvr32.exe AND CommandLine.keyword:*\\\\Temp\\\\*) OR (Image.keyword:*\\\\regsvr32.exe AND ParentImage.keyword:*\\\\powershell.exe) OR (Image.keyword:*\\\\regsvr32.exe AND CommandLine.keyword:(*\\/i\\:http*\\ scrobj.dll OR *\\/i\\:ftp*\\ scrobj.dll)) OR (Image.keyword:*\\\\wscript.exe AND ParentImage.keyword:*\\\\regsvr32.exe) OR (Image.keyword:*\\\\EXCEL.EXE AND CommandLine.keyword:*..\\\\..\\\\..\\\\Windows\\\\System32\\\\regsvr32.exe\\ *))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Regsvr32-Anomaly <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | medium |
@@ -57,6 +57,27 @@ level: medium
+### es-qs
+
+```
+Image.keyword:(*\\:\\\\RECYCLER\\\\* OR *\\:\\\\SystemVolumeInformation\\\\* OR C\\:\\\\Windows\\\\Tasks\\\\* OR C\\:\\\\Windows\\\\debug\\\\* OR C\\:\\\\Windows\\\\fonts\\\\* OR C\\:\\\\Windows\\\\help\\\\* OR C\\:\\\\Windows\\\\drivers\\\\* OR C\\:\\\\Windows\\\\addins\\\\* OR C\\:\\\\Windows\\\\cursors\\\\* OR C\\:\\\\Windows\\\\system32\\\\tasks\\\\*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Process-Start-Locations <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1085: Rundll32](https://attack.mitre.org/techniques/T1085)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1085: Rundll32](../Triggers/T1085.md)
|
| Severity Level | medium |
@@ -61,6 +61,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(*\\\\rundll32.exe*\\ url.dll,*OpenURL\\ * OR *\\\\rundll32.exe*\\ url.dll,*OpenURLA\\ * OR *\\\\rundll32.exe*\\ url.dll,*FileProtocolHandler\\ * OR *\\\\rundll32.exe*\\ zipfldr.dll,*RouteTheCall\\ * OR *\\\\rundll32.exe*\\ Shell32.dll,*Control_RunDLL\\ * OR *\\\\rundll32.exe\\ javascript\\:* OR *\\ url.dll,*OpenURL\\ * OR *\\ url.dll,*OpenURLA\\ * OR *\\ url.dll,*FileProtocolHandler\\ * OR *\\ zipfldr.dll,*RouteTheCall\\ * OR *\\ Shell32.dll,*Control_RunDLL\\ * OR *\\ javascript\\:* OR *.RegisterXLL*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Rundll32-Activity <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1085: Rundll32](https://attack.mitre.org/techniques/T1085)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1085: Rundll32](../Triggers/T1085.md)
|
| Severity Level | high |
@@ -50,6 +50,27 @@ level: high
+### es-qs
+
+```
+CommandLine.keyword:*\\\\rundll32.exe\\ *,#*
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Call-by-Ordinal <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1064: Scripting](https://attack.mitre.org/techniques/T1064)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1064: Scripting](../Triggers/T1064.md)
|
| Severity Level | medium |
@@ -53,6 +53,27 @@ level: medium
+### es-qs
+
+```
+(Image.keyword:(*\\\\wscript.exe OR *\\\\cscript.exe) AND CommandLine.keyword:(*.jse OR *.vbe OR *.js OR *.vba))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/WSF/JSE/JS/VBA/VBE-File-Execution <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1107: File Deletion](https://attack.mitre.org/techniques/T1107)
- [T1066: Indicator Removal from Tools](https://attack.mitre.org/techniques/T1066)
|
-| Data Needed | - [DN_0062_4663_attempt_was_made_to_access_an_object](../Data_Needed/DN_0062_4663_attempt_was_made_to_access_an_object.md)
- [DN_0058_4656_handle_to_an_object_was_requested](../Data_Needed/DN_0058_4656_handle_to_an_object_was_requested.md)
- [DN_0060_4658_handle_to_an_object_was_closed](../Data_Needed/DN_0060_4658_handle_to_an_object_was_closed.md)
|
+| Data Needed | - [DN_0060_4658_handle_to_an_object_was_closed](../Data_Needed/DN_0060_4658_handle_to_an_object_was_closed.md)
- [DN_0062_4663_attempt_was_made_to_access_an_object](../Data_Needed/DN_0062_4663_attempt_was_made_to_access_an_object.md)
- [DN_0058_4656_handle_to_an_object_was_requested](../Data_Needed/DN_0058_4656_handle_to_an_object_was_requested.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1107: File Deletion](../Triggers/T1107.md)
- [T1066: Indicator Removal from Tools](../Triggers/T1066.md)
|
| Severity Level | medium |
@@ -55,6 +55,27 @@ level: medium
+### es-qs
+
+```
+(EventID:("4656" OR "4663" OR "4658") AND ObjectName.keyword:(*.AAA OR *.ZZZ))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Secure-Deletion-with-SDelete <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1070: Indicator Removal on Host](https://attack.mitre.org/techniques/T1070)
|
-| Data Needed | - [DN_0038_1102_the_audit_log_was_cleared](../Data_Needed/DN_0038_1102_the_audit_log_was_cleared.md)
- [DN_0050_1102_audit_log_was_cleared](../Data_Needed/DN_0050_1102_audit_log_was_cleared.md)
|
+| Data Needed | - [DN_0050_1102_audit_log_was_cleared](../Data_Needed/DN_0050_1102_audit_log_was_cleared.md)
- [DN_0038_1102_the_audit_log_was_cleared](../Data_Needed/DN_0038_1102_the_audit_log_was_cleared.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1070: Indicator Removal on Host](../Triggers/T1070.md)
|
| Severity Level | high |
@@ -46,6 +46,27 @@ level: high
+### es-qs
+
+```
+EventID:("517" OR "1102")
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Security-Eventlog-Cleared <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | This Detection Rule wasn't mapped to ATT&CK Technique yet |
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | high |
@@ -83,6 +83,27 @@ detection:
+### es-qs
+
+```
+(Image.keyword:(*\\\\update.exe) AND CommandLine.keyword:(*\\-\\-processStart*.exe* OR *\\-\\-processStartAndWait*.exe* OR *\xe2\x80\x93createShortcut*.exe*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Squirrel-Lolbin <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | high |
@@ -55,6 +55,27 @@ level: high
+### es-qs
+
+```
+((Image.keyword:*\\\\svchost.exe AND (NOT (ParentImage.keyword:(*\\\\services.exe OR *\\\\MsMpEng.exe OR *\\\\Mrt.exe OR *\\\\rpcnet.exe)))) AND (NOT (NOT _exists_:ParentImage)))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Svchost-Process <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | This Detection Rule wasn't mapped to ATT&CK Technique yet |
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | medium |
@@ -49,6 +49,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:(*\\\\sysprep.exe\\ *\\\\AppData\\\\* OR sysprep.exe\\ *\\\\AppData\\\\*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Sysprep-on-AppData-Folder <[TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006) |
| ATT&CK Technique | - [T1003: Credential Dumping](https://attack.mitre.org/techniques/T1003)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1003: Credential Dumping](../Triggers/T1003.md)
|
| Severity Level | medium |
@@ -48,6 +48,27 @@ level: medium
+### es-qs
+
+```
+CommandLine.keyword:*\\\\SYSVOL\\\\*\\\\policies\\\\*
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-SYSVOL-Domain-Group-Policy-Access <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | low |
@@ -53,6 +53,27 @@ level: low
+### es-qs
+
+```
+(ParentImage.keyword:*\\\\taskmgr.exe AND (NOT (Image.keyword:(*\\\\resmon.exe OR *\\\\mmc.exe OR *\\\\taskmgr.exe))))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Taskmgr-as-Parent <[TA0008: Lateral Movement](https://attack.mitre.org/tactics/TA0008)[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004) |
| ATT&CK Technique | - [T1076: Remote Desktop Protocol](https://attack.mitre.org/techniques/T1076)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1076: Remote Desktop Protocol](../Triggers/T1076.md)
|
| Severity Level | high |
@@ -50,6 +50,27 @@ level: high
+### es-qs
+
+```
+CommandLine.keyword:*\\ \\/dest\\:rdp\\-tcp\\:*
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-RDP-Redirect-Using-TSCON <[DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)[DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md) |
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | There is no documented Trigger for this Detection Rule yet |
| Severity Level | medium |
@@ -50,6 +50,27 @@ level: medium
+### es-qs
+
+```
+((ParentImage.keyword:*\\\\userinit.exe AND (NOT (CommandLine.keyword:*\\\\netlogon\\\\*))) AND (NOT (Image.keyword:*\\\\explorer.exe)))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-Userinit-Child-Process <[TA0006: Credential Access](https://attack.mitre.org/tactics/TA0006) |
| ATT&CK Technique | - [T1003: Credential Dumping](https://attack.mitre.org/techniques/T1003)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1003: Credential Dumping](../Triggers/T1003.md)
|
| Severity Level | high |
@@ -59,6 +59,27 @@ level: high
+### es-qs
+
+```
+CommandLine.keyword:(vssadmin.exe\\ Delete\\ Shadows OR vssadmin\\ create\\ shadow\\ \\/for\\=C\\: OR copy\\ \\\\?\\\\GLOBALROOT\\\\Device\\\\*\\\\windows\\\\ntds\\\\ntds.dit OR copy\\ \\\\?\\\\GLOBALROOT\\\\Device\\\\*\\\\config\\\\SAM OR vssadmin\\ delete\\ shadows\\ \\/for\\=C\\: OR reg\\ SAVE\\ HKLM\\\\SYSTEM\\ OR esentutl.exe\\ \\/y\\ \\/vss\\ *\\\\ntds.dit*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Activity-Related-to-NTDS.dit-Domain-Hash-Retrieval <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1047: Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1047: Windows Management Instrumentation](../Triggers/T1047.md)
|
| Severity Level | medium |
@@ -58,6 +58,27 @@ level: medium
+### es-qs
+
+```
+(Image.keyword:(*\\\\wmic.exe) AND CommandLine.keyword:(*\\/NODE\\:*process\\ call\\ create\\ * OR *\\ path\\ AntiVirusProduct\\ get\\ * OR *\\ path\\ FirewallProduct\\ get\\ * OR *\\ shadowcopy\\ delete\\ *))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Suspicious-WMI-execution <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1036: Masquerading](https://attack.mitre.org/techniques/T1036)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1036: Masquerading](../Triggers/T1036.md)
|
| Severity Level | high |
@@ -67,6 +67,27 @@ level: high
+### es-qs
+
+```
+(Image.keyword:(*\\\\svchost.exe OR *\\\\rundll32.exe OR *\\\\services.exe OR *\\\\powershell.exe OR *\\\\regsvr32.exe OR *\\\\spoolsv.exe OR *\\\\lsass.exe OR *\\\\smss.exe OR *\\\\csrss.exe OR *\\\\conhost.exe OR *\\\\wininit.exe OR *\\\\lsm.exe OR *\\\\winlogon.exe OR *\\\\explorer.exe OR *\\\\taskhost.exe) AND (NOT (Image.keyword:(C\\:\\\\Windows\\\\System32\\\\* OR C\\:\\\\Windows\\\\SysWow64\\\\* OR C\\:\\\\Windows\\\\explorer.exe OR C\\:\\\\Windows\\\\winsxs\\\\*))))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/System-File-Execution-Location-Anomaly <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1035: Service Execution](https://attack.mitre.org/techniques/T1035)
|
-| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0031_7036_service_started_stopped](../Data_Needed/DN_0031_7036_service_started_stopped.md)
- [DN_0005_7045_windows_service_insatalled](../Data_Needed/DN_0005_7045_windows_service_insatalled.md)
|
+| Data Needed | - [DN_0005_7045_windows_service_insatalled](../Data_Needed/DN_0005_7045_windows_service_insatalled.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0031_7036_service_started_stopped](../Data_Needed/DN_0031_7036_service_started_stopped.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1035: Service Execution](../Triggers/T1035.md)
|
| Severity Level | low |
@@ -70,6 +70,27 @@ detection:
+### es-qs
+
+```
+(ServiceName:"PSEXESVC" AND ((EventID:"7045" AND ServiceFileName.keyword:*\\\\PSEXESVC.exe) OR EventID:"7036"))\n(Image.keyword:*\\\\PSEXESVC.exe AND User:"NT\\ AUTHORITY\\\\SYSTEM")
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/PsExec-Tool-Execution <[TA0001: Initial Access](https://attack.mitre.org/tactics/TA0001) |
| ATT&CK Technique | - [T1200: Hardware Additions](https://attack.mitre.org/techniques/T1200)
|
-| Data Needed | - [DN_0053_2100_pnp_or_power_operation_for_usb_device](../Data_Needed/DN_0053_2100_pnp_or_power_operation_for_usb_device.md)
- [DN_0052_2003_query_to_load_usb_drivers](../Data_Needed/DN_0052_2003_query_to_load_usb_drivers.md)
- [DN_0054_2102_pnp_or_power_operation_for_usb_device](../Data_Needed/DN_0054_2102_pnp_or_power_operation_for_usb_device.md)
|
+| Data Needed | - [DN_0053_2100_pnp_or_power_operation_for_usb_device](../Data_Needed/DN_0053_2100_pnp_or_power_operation_for_usb_device.md)
- [DN_0054_2102_pnp_or_power_operation_for_usb_device](../Data_Needed/DN_0054_2102_pnp_or_power_operation_for_usb_device.md)
- [DN_0052_2003_query_to_load_usb_drivers](../Data_Needed/DN_0052_2003_query_to_load_usb_drivers.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1200: Hardware Additions](../Triggers/T1200.md)
|
| Severity Level | low |
@@ -49,6 +49,27 @@ level: low
+### es-qs
+
+```
+EventID:("2003" OR "2100" OR "2102")
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/USB-Device-Plugged <[TA0007: Discovery](https://attack.mitre.org/tactics/TA0007) |
| ATT&CK Technique | - [T1046: Network Service Scanning](https://attack.mitre.org/techniques/T1046)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1046: Network Service Scanning](../Triggers/T1046.md)
|
| Severity Level | medium |
@@ -48,6 +48,27 @@ level: medium
+### es-qs
+
+```
+(CommandLine.keyword:*transport\\=dt_socket,address\\=* AND (NOT (CommandLine.keyword:*address\\=127.0.0.1* OR CommandLine.keyword:*address\\=localhost*)))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Java-Running-with-Remote-Debugging <[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004)[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003) |
| ATT&CK Technique | - [T1100: Web Shell](https://attack.mitre.org/techniques/T1100)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1100: Web Shell](../Triggers/T1100.md)
|
| Severity Level | high |
@@ -63,6 +63,27 @@ level: high
+### es-qs
+
+```
+(ParentImage.keyword:(*\\\\apache* OR *\\\\tomcat* OR *\\\\w3wp.exe OR *\\\\php\\-cgi.exe OR *\\\\nginx.exe OR *\\\\httpd.exe) AND CommandLine.keyword:(*whoami* OR *net\\ user\\ * OR *ping\\ \\-n\\ * OR *systeminfo OR *&cd&echo* OR *cd\\ \\/d*))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Webshell-Detection-With-Command-Line-Keywords <[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004)[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003) |
| ATT&CK Technique | - [T1100: Web Shell](https://attack.mitre.org/techniques/T1100)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1100: Web Shell](../Triggers/T1100.md)
|
| Severity Level | high |
@@ -56,6 +56,27 @@ level: high
+### es-qs
+
+```
+(ParentImage.keyword:(*\\\\w3wp.exe OR *\\\\httpd.exe OR *\\\\nginx.exe OR *\\\\php\\-cgi.exe) AND Image.keyword:(*\\\\cmd.exe OR *\\\\sh.exe OR *\\\\bash.exe OR *\\\\powershell.exe))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Shells-Spawned-by-Web-Servers <[TA0004: Privilege Escalation](https://attack.mitre.org/tactics/TA0004)[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1053: Scheduled Task](https://attack.mitre.org/techniques/T1053)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1053: Scheduled Task](../Triggers/T1053.md)
|
| Severity Level | high |
@@ -49,6 +49,27 @@ level: high
+### es-qs
+
+```
+(Image:"schtasks.exe" AND CommandLine.keyword:*\\/change*\\/TN*\\/RU*\\/RP*)
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Windows-10-scheduled-task-SandboxEscaper-0-day <[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003) |
| ATT&CK Technique | - [T1084: Windows Management Instrumentation Event Subscription](https://attack.mitre.org/techniques/T1084)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1084: Windows Management Instrumentation Event Subscription](../Triggers/T1084.md)
|
| Severity Level | critical |
@@ -48,6 +48,27 @@ level: critical
+### es-qs
+
+```
+ParentImage.keyword:*\\\\EdgeTransport.exe
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/WMI-Backdoor-Exchange-Transport-Agent <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003) |
| ATT&CK Technique | - [T1047: Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047)
|
-| Data Needed | - [DN_0080_5859_wmi_activity](../Data_Needed/DN_0080_5859_wmi_activity.md)
- [DN_0081_5861_wmi_activity](../Data_Needed/DN_0081_5861_wmi_activity.md)
|
+| Data Needed | - [DN_0081_5861_wmi_activity](../Data_Needed/DN_0081_5861_wmi_activity.md)
- [DN_0080_5859_wmi_activity](../Data_Needed/DN_0080_5859_wmi_activity.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1047: Windows Management Instrumentation](../Triggers/T1047.md)
|
| Severity Level | medium |
@@ -56,6 +56,27 @@ level: medium
+### es-qs
+
+```
+((EventID:"5861" AND Message.keyword:(*ActiveScriptEventConsumer* OR *CommandLineEventConsumer* OR *CommandLineTemplate*)) OR EventID:"5859")
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/WMI-Persistence <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)[TA0003: Persistence](https://attack.mitre.org/tactics/TA0003) |
| ATT&CK Technique | - [T1047: Windows Management Instrumentation](https://attack.mitre.org/techniques/T1047)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1047: Windows Management Instrumentation](../Triggers/T1047.md)
|
| Severity Level | high |
@@ -48,6 +48,27 @@ level: high
+### es-qs
+
+```
+(Image:"C\\:\\\\WINDOWS\\\\system32\\\\wbem\\\\scrcons.exe" AND ParentImage:"C\\:\\\\Windows\\\\System32\\\\svchost.exe")
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/WMI-Persistence---Script-Event-Consumer <[TA0002: Execution](https://attack.mitre.org/tactics/TA0002)[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005) |
| ATT&CK Technique | - [T1064: Scripting](https://attack.mitre.org/techniques/T1064)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1064: Scripting](../Triggers/T1064.md)
|
| Severity Level | high |
@@ -52,6 +52,27 @@ level: high
+### es-qs
+
+```
+(ParentImage.keyword:(*\\\\wmiprvse.exe) AND Image.keyword:(*\\\\powershell.exe))
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/WMI-Spawning-Windows-PowerShell <[TA0005: Defense Evasion](https://attack.mitre.org/tactics/TA0005)[TA0002: Execution](https://attack.mitre.org/tactics/TA0002) |
| ATT&CK Technique | - [T1127: Trusted Developer Utilities](https://attack.mitre.org/techniques/T1127)
|
-| Data Needed | - [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
- [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
|
+| Data Needed | - [DN_0003_1_windows_sysmon_process_creation](../Data_Needed/DN_0003_1_windows_sysmon_process_creation.md)
- [DN_0002_4688_windows_process_creation_with_commandline](../Data_Needed/DN_0002_4688_windows_process_creation_with_commandline.md)
- [DN_0001_4688_windows_process_creation](../Data_Needed/DN_0001_4688_windows_process_creation.md)
|
| Enrichment | Data for this Detection Rule doesn't require any Enrichments. |
| Trigger | - [T1127: Trusted Developer Utilities](../Triggers/T1127.md)
|
| Severity Level | high |
@@ -49,6 +49,27 @@ level: high
+### es-qs
+
+```
+Image.keyword:*\\\\Microsoft.Workflow.Compiler.exe
+```
+
+
+### xpack-watcher
+
+```
+curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/Microsoft-Workflow-Compiler <