Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ATT&CK subtechniques v2 #845

Merged
merged 4 commits into from Jun 18, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
23 changes: 12 additions & 11 deletions rules/cloud/aws_cloudtrail_disable_logging.yml
Expand Up @@ -5,20 +5,21 @@ author: vitaliy0x1
date: 2020/01/21
description: Detects disabling, deleting and updating of a Trail
references:
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/best-practices-security.html
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/best-practices-security.html
logsource:
service: cloudtrail
service: cloudtrail
detection:
selection_source:
- eventSource: cloudtrail.amazonaws.com
events:
- eventName:
- StopLogging
- UpdateTrail
- DeleteTrail
condition: selection_source AND events
selection_source:
- eventSource: cloudtrail.amazonaws.com
events:
- eventName:
- StopLogging
- UpdateTrail
- DeleteTrail
condition: selection_source AND events
level: medium
falsepositives:
- Valid change in a Trail
tags:
- attack.t1089
- attack.t1089
- attack.t1562.001
19 changes: 10 additions & 9 deletions rules/cloud/aws_config_disable_recording.yml
Expand Up @@ -5,17 +5,18 @@ author: vitaliy0x1
date: 2020/01/21
description: Detects AWS Config Service disabling
logsource:
service: cloudtrail
service: cloudtrail
detection:
selection_source:
- eventSource: config.amazonaws.com
events:
- eventName:
- DeleteDeliveryChannel
- StopConfigurationRecorder
condition: selection_source AND events
selection_source:
- eventSource: config.amazonaws.com
events:
- eventName:
- DeleteDeliveryChannel
- StopConfigurationRecorder
condition: selection_source AND events
level: high
falsepositives:
- Valid change in AWS Config Service
tags:
- attack.t1089
- attack.t1089
- attack.t1562.001
1 change: 1 addition & 0 deletions rules/cloud/aws_ec2_startup_script_change.yml
Expand Up @@ -21,3 +21,4 @@ falsepositives:
- Valid changes to the startup script
tags:
- attack.t1064
- attack.t1059
1 change: 1 addition & 0 deletions rules/cloud/aws_guardduty_disruption.yml
Expand Up @@ -19,3 +19,4 @@ falsepositives:
- Valid change in the GuardDuty (e.g. to ignore internal scanners)
tags:
- attack.t1089
- attack.t1562.001
1 change: 1 addition & 0 deletions rules/linux/auditd/lnx_auditd_alter_bash_profile.yml
Expand Up @@ -9,6 +9,7 @@ tags:
- attack.s0003
- attack.t1156
- attack.persistence
- attack.t1546.004
author: Peter Matkovski
logsource:
product: linux
Expand Down
1 change: 1 addition & 0 deletions rules/linux/auditd/lnx_auditd_auditing_config_change.yml
Expand Up @@ -11,6 +11,7 @@ references:
tags:
- attack.defense_evasion
- attack.t1054
- attack.t1562.006
author: Mikhail Larin, oscd.community
status: experimental
date: 2019/10/25
Expand Down
1 change: 1 addition & 0 deletions rules/linux/auditd/lnx_auditd_logging_config_change.yml
Expand Up @@ -10,6 +10,7 @@ references:
tags:
- attack.defense_evasion
- attack.t1054
- attack.t1562.006
author: Mikhail Larin, oscd.community
status: experimental
date: 2019/10/25
Expand Down
1 change: 1 addition & 0 deletions rules/linux/auditd/lnx_auditd_web_rce.yml
Expand Up @@ -5,6 +5,7 @@ description: Detects posible command execution by web application/web shell
tags:
- attack.persistence
- attack.t1100
- attack.t1505.003
references:
- personal experience
author: Ilyas Ochkov, Beyu Denis, oscd.community
Expand Down
4 changes: 2 additions & 2 deletions rules/linux/auditd/lnx_data_compressed.yml
@@ -1,8 +1,7 @@
title: Data Compressed
id: a3b5e3e9-1b49-4119-8b8e-0344a01f21ee
status: experimental
description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount
of data sent over the network
description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network
author: Timur Zinniatullin, oscd.community
date: 2019/10/21
modified: 2019/11/04
Expand Down Expand Up @@ -30,3 +29,4 @@ level: low
tags:
- attack.exfiltration
- attack.t1002
- attack.t1560
1 change: 1 addition & 0 deletions rules/linux/lnx_pers_systemd_reload.yml
Expand Up @@ -5,6 +5,7 @@ status: experimental
tags:
- attack.persistence
- attack.t1501
- attack.t1543.002
author: Jakob Weinzettl, oscd.community
date: 2019/09/23
logsource:
Expand Down
3 changes: 2 additions & 1 deletion rules/linux/lnx_shell_clear_cmd_history.yml
Expand Up @@ -22,7 +22,7 @@ detection:
keywords:
- 'rm *bash_history'
- 'echo "" > *bash_history'
- 'cat /dev/null > *bash_history'
- 'cat /dev/null > *bash_history'
- 'ln -sf /dev/null *bash_history'
- 'truncate -s0 *bash_history'
# - 'unset HISTFILE' # prone to false positives
Expand All @@ -38,3 +38,4 @@ level: high
tags:
- attack.defense_evasion
- attack.t1146
- attack.t1551.003
2 changes: 2 additions & 0 deletions rules/network/cisco/aaa/cisco_cli_clear_logs.yml
Expand Up @@ -11,6 +11,8 @@ tags:
- attack.defense_evasion
- attack.t1146
- attack.t1070
- attack.t1551.003
- attack.t1551
logsource:
product: cisco
service: aaa
Expand Down
1 change: 1 addition & 0 deletions rules/network/cisco/aaa/cisco_cli_collect_data.yml
Expand Up @@ -17,6 +17,7 @@ tags:
- attack.t1003
- attack.t1081
- attack.t1005
- attack.t1552.001
logsource:
product: cisco
service: aaa
Expand Down
2 changes: 2 additions & 0 deletions rules/network/cisco/aaa/cisco_cli_crypto_actions.yml
Expand Up @@ -12,6 +12,8 @@ tags:
- attack.defense_evasion
- attack.t1130
- attack.t1145
- attack.t1553.004
- attack.t1552.004
logsource:
product: cisco
service: aaa
Expand Down
1 change: 1 addition & 0 deletions rules/network/cisco/aaa/cisco_cli_disable_logging.yml
Expand Up @@ -9,6 +9,7 @@ date: 2019/08/11
tags:
- attack.defense_evasion
- attack.t1089
- attack.t1562.001
logsource:
product: cisco
service: aaa
Expand Down
3 changes: 3 additions & 0 deletions rules/network/cisco/aaa/cisco_cli_file_deletion.yml
Expand Up @@ -14,6 +14,9 @@ tags:
- attack.t1107
- attack.t1488
- attack.t1487
- attack.t1561.002
- attack.t1551.004
- attack.t1561.001
logsource:
product: cisco
service: aaa
Expand Down
1 change: 1 addition & 0 deletions rules/network/cisco/aaa/cisco_cli_input_capture.yml
Expand Up @@ -12,6 +12,7 @@ tags:
- attack.credential_access
- attack.t1139
- attack.t1056
- attack.t1552.003
logsource:
product: cisco
service: aaa
Expand Down
3 changes: 3 additions & 0 deletions rules/network/cisco/aaa/cisco_cli_modify_config.yml
Expand Up @@ -16,6 +16,9 @@ tags:
- attack.t1100
- attack.t1168
- attack.t1490
- attack.t1565.002
- attack.t1505
- attack.t1053
logsource:
product: cisco
service: aaa
Expand Down
2 changes: 2 additions & 0 deletions rules/network/cisco/aaa/cisco_cli_moving_data.yml
Expand Up @@ -19,6 +19,8 @@ tags:
- attack.t1105
- attack.t1492
- attack.t1002
- attack.t1560
- attack.t1565.001
logsource:
product: cisco
service: aaa
Expand Down
11 changes: 6 additions & 5 deletions rules/network/net_susp_dns_txt_exec_strings.yml
Expand Up @@ -7,17 +7,18 @@ references:
- https://github.com/samratashok/nishang/blob/master/Backdoors/DNS_TXT_Pwnage.ps1
tags:
- attack.t1071
- attack.t1071.004
author: Markus Neis
date: 2018/08/08
logsource:
category: dns
detection:
selection:
record_type: 'TXT'
answer:
- '*IEX*'
- '*Invoke-Expression*'
- '*cmd.exe*'
record_type: 'TXT'
answer:
- '*IEX*'
- '*Invoke-Expression*'
- '*cmd.exe*'
condition: selection
falsepositives:
- Unknown
Expand Down
78 changes: 40 additions & 38 deletions rules/network/zeek/zeek_dce_rpc_mitre_bzar_execution.yml
Expand Up @@ -6,46 +6,48 @@ date: 2020/03/19
references:
- https://github.com/mitre-attack/bzar#indicators-for-attck-execution
tags:
- attack.execution
- attack.t1035
- attack.t1047
- attack.t1053
- attack.execution
- attack.t1035
- attack.t1047
- attack.t1053
- attack.t1053.002
- attack.t1569.002
logsource:
product: zeek
service: dce_rpc
product: zeek
service: dce_rpc
detection:
op1:
endpoint: 'JobAdd'
operation: 'atsvc'
op2:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcEnableTask'
op3:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRegisterTask'
op4:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRun'
op5:
endpoint: 'IWbemServices'
operation: 'ExecMethod'
op6:
endpoint: 'IWbemServices'
operation: 'ExecMethodAsync'
op7:
endpoint: 'svcctl'
operation: 'CreateServiceA'
op8:
endpoint: 'svcctl'
operation: 'CreateServiceW'
op9:
endpoint: 'svcctl'
operation: 'StartServiceA'
op10:
endpoint: 'svcctl'
operation: 'StartServiceW'
condition: 1 of them
op1:
endpoint: 'JobAdd'
operation: 'atsvc'
op2:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcEnableTask'
op3:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRegisterTask'
op4:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRun'
op5:
endpoint: 'IWbemServices'
operation: 'ExecMethod'
op6:
endpoint: 'IWbemServices'
operation: 'ExecMethodAsync'
op7:
endpoint: 'svcctl'
operation: 'CreateServiceA'
op8:
endpoint: 'svcctl'
operation: 'CreateServiceW'
op9:
endpoint: 'svcctl'
operation: 'StartServiceA'
op10:
endpoint: 'svcctl'
operation: 'StartServiceW'
condition: 1 of them
falsepositives:
- 'Windows administrator tasks or troubleshooting'
- 'Windows management scripts or software'
level: medium
level: medium
45 changes: 23 additions & 22 deletions rules/network/zeek/zeek_dce_rpc_mitre_bzar_persistence.yml
Expand Up @@ -8,30 +8,31 @@ references:
tags:
- attack.persistence
- attack.t1004
- attack.t1547.004
logsource:
product: zeek
service: dce_rpc
product: zeek
service: dce_rpc
detection:
op1:
endpoint: 'spoolss'
operation: 'RpcAddMonitor'
op2:
endpoint: 'spoolss'
operation: 'RpcAddPrintProcessor'
op3:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddMonitor'
op4:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddPrintProcessor'
op5:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonW'
op6:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonExW'
condition: 1 of them
op1:
endpoint: 'spoolss'
operation: 'RpcAddMonitor'
op2:
endpoint: 'spoolss'
operation: 'RpcAddPrintProcessor'
op3:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddMonitor'
op4:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddPrintProcessor'
op5:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonW'
op6:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonExW'
condition: 1 of them
falsepositives:
- 'Windows administrator tasks or troubleshooting'
- 'Windows management scripts or software'
level: medium
level: medium
Expand Up @@ -8,9 +8,10 @@ references:
tags:
- attack.command_and_control
- attack.t1043
- attack.t1571
logsource:
product: zeek
service: http
product: zeek
service: http
date: 2020/05/01
detection:
selection_webdav:
Expand All @@ -23,4 +24,4 @@ detection:
falsepositives:
- unknown
level: medium
status: experimental
status: experimental