Skip to content

Commit

Permalink
Скорректирован префикс всех правил, для возможности подгрузки пакетов…
Browse files Browse the repository at this point in the history
… как системного контента
  • Loading branch information
DmitryOffsec committed Feb 27, 2024
1 parent 147e367 commit 2958a6f
Show file tree
Hide file tree
Showing 71 changed files with 71 additions and 71 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,4 @@ Args: {}
Tags:
- event
- normalized
ObjectId: LOC-RF-35030
ObjectId: SEC-RF-35030
Original file line number Diff line number Diff line change
Expand Up @@ -14,4 +14,4 @@ Args:
Tags:
- system
- process
ObjectId: LOC-RF-35031
ObjectId: SEC-RF-35031
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ ExpertContext:
- https://github.com/b1tg/CVE-2023-38831-winrar-exploit
Usecases:
- WinRAR до версии 6.23 позволяет злоумышленникам выполнять произвольный код, когда пользователь пытается просмотреть безопасный файл в ZIP-архиве.
ObjectId: ESC-CR-204012915
ObjectId: SEC-CR-204012915
ContentRelations:
Implements:
ATTACK:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ ExpertContext:
- https://nvd.nist.gov/vuln/detail/CVE-2023-42793
- https://github.com/H454NSec/CVE-2023-42793
- https://exploit-notes.hdks.org/exploit/web/teamcity-pentesting/
ObjectId: LOC-CR-723173698
ObjectId: SEC-CR-723173698
ContentRelations:
Implements:
ATTACK:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,4 +8,4 @@ ExpertContext:
- Sergey Scherbakov
Usecases:
- Раскладывает по полям имя/id УЗ и имя токена из запроса на токен к REST API TeamCity
ObjectId: LOC-ER-892365548
ObjectId: SEC-ER-892365548
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
EventDescriptions:
- Criteria: id = "4794_Attempt_was_made_to_set_DSRM_admin_password"
LocalizationId: 4794_Attempt_was_made_to_set_DSRM_admin_password_1
ObjectId: LOC-NF-115213330
ObjectId: SEC-NF-115213330
ExpertContext:
Created: 11.06.2023
Updated: 11.06.2023
Original file line number Diff line number Diff line change
Expand Up @@ -6,4 +6,4 @@ ExpertContext:
Updated: 05.06.2023
KnowledgeHolders:
- "@artemcun"
ObjectId: LOC-NF-186348571
ObjectId: SEC-NF-186348571
2 changes: 1 addition & 1 deletion packages/windows_open_package/_meta/metainfo.yaml
Original file line number Diff line number Diff line change
@@ -1,2 +1,2 @@
ObjectId: LOC-PKG-471366245
ObjectId: SEC-PKG-471366245
Version: 1.0.0
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-887361710
ObjectId: SEC-CR-887361710
ContentAutoName: IIS_RDP_or_SMB_Tunneling
ExpertContext:
Created: 12.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-143879217
ObjectId: SEC-CR-143879217
ContentAutoName: RDP_Tunneling
ExpertContext:
Created: 05.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-382727157
ObjectId: SEC-CR-382727157
ContentAutoName: RDP_Tunneling_via_SSH_5156
ExpertContext:
Created: 13.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-31343766
ObjectId: SEC-CR-31343766
ContentAutoName: An_attempt_was_made_to_lsass_process
ExpertContext:
Created: 12.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-105581934
ObjectId: SEC-CR-105581934
ContentAutoName: Chrome_firefox_opera_cred_read
ExpertContext:
Created: 04.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-179311440
ObjectId: SEC-CR-179311440
ContentAutoName: Credentials_MiniDumpWriteDump_Lsass
ExpertContext:
Created: 07.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-176126000
ObjectId: SEC-CR-176126000
ContentAutoName: DCSync
EventDescriptions:
- Criteria: correlation_name = "DCSync"
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-128949563
ObjectId: SEC-CR-128949563
ContentAutoName: Dump_lsass_via_process_access
ExpertContext:
Created: 09.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: ESC-CR-156832011
ObjectId: SEC-CR-156832011
ContentAutoName: KeePass_CredDump
ExpertContext:
Created: 05.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-198578044
ObjectId: SEC-CR-198578044
ContentAutoName: Keepass_Key_Dump_Via_KeeThief
ExpertContext:
Created: 06.06.2023
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ ExpertContext:
- Vulnerability scanners, misconfigured systems, remote administration tools, VPN terminators, multiuser systems like Citrix server farms
Improvements:
- Add events a lot of failure 4668 before correlation rule kerberos_pwd_spraying_4771 and add events success event 4688
ObjectId: LOC-CR-155929458
ObjectId: SEC-CR-155929458
EventDescriptions:
- Criteria: correlation_name = "Kerberos_pwd_spraying"
LocalizationId: corrname_kerberos_pwd_spraying
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-194813648
ObjectId: SEC-CR-194813648
ContentAutoName: LSASS_ProcDump
ExpertContext:
Created: 03.06.2023
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ ExpertContext:
- Provider: Microsoft-Windows-Sysmon
EventID:
- 1
ObjectId: LOC-CR-121752854
ObjectId: SEC-CR-121752854
EventDescriptions:
- Criteria: correlation_name = "Mimikatz"
LocalizationId: corrname_Mimikatz
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-420314424
ObjectId: SEC-CR-420314424
ContentAutoName: Mimikatz_Memssp_Default_Log_Detected
ExpertContext:
Created: 05.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-726341693
ObjectId: SEC-CR-726341693
ContentAutoName: PPL_Bypass_via_PPLDump_Tool
ExpertContext:
Created: 14.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-133323320
ObjectId: SEC-CR-133323320
ContentAutoName: Phishing_windows_credentials_powershell_scriptblock
ExpertContext:
Created: 17.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-131630298
ObjectId: SEC-CR-131630298
ContentAutoName: Remote_registry_access
ExpertContext:
Created: 13.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-469916719
ObjectId: SEC-CR-469916719
ContentAutoName: Change_powershell_policy_registry
ExpertContext:
Created: 10.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Name: Tasks_actions
ObjectId: LOC-CR-284318162
ObjectId: SEC-CR-284318162
ContentAutoName: Tasks_actions
ExpertContext:
Created: 01.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-202536688
ObjectId: SEC-CR-202536688
ContentAutoName: DCShadow_Attack
ExpertContext:
Created: 01.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-277281147
ObjectId: SEC-CR-277281147
ContentAutoName: Detect_Fake_ComputerAccount
ExpertContext:
Created: 04.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-100869373
ObjectId: SEC-CR-100869373
ContentAutoName: Detect_hiding_files_via_attrib_cmdlet
ExpertContext:
Created: 16.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-450661205
ObjectId: SEC-CR-450661205
ContentAutoName: Detect_lolbin_pcalua_exec
ExpertContext:
Created: 18.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-120990365
ObjectId: SEC-CR-120990365
ContentAutoName: ImageLoad_from_Network_Share_to_LSASS
ExpertContext:
Created: 12.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: ESC-CR-706374286
ObjectId: SEC-CR-706374286
ContentAutoName: ParentPid_Spoofing
ExpertContext:
Created: 05.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-913584083
ObjectId: SEC-CR-913584083
ContentAutoName: Portforward_netsh
ExpertContext:
Created: 03.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-496129294
ObjectId: SEC-CR-496129294
ContentAutoName: RDP_settings_tampering
ExpertContext:
Created: 09.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-420817287
ObjectId: SEC-CR-420817287
ContentAutoName: ReverseShell_created_via_PEInjection
ExpertContext:
Created: 06.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: ESC-CR-195011447
ObjectId: SEC-CR-195011447
ContentAutoName: Subrule_ParentPid_Spoofing
ExpertContext:
Created: 05.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-162042829
ObjectId: SEC-CR-162042829
ContentAutoName: Suspend_prpcess
ExpertContext:
Created: 09.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: ESC-CR-205336157
ObjectId: SEC-CR-205336157
ContentAutoName: Suspicious_Explorer_Injection
ExpertContext:
Created: 05.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-224304134
ObjectId: SEC-CR-224304134
ContentAutoName: Bloodhound
ExpertContext:
Created: 02.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-125559457
ObjectId: SEC-CR-125559457
ContentAutoName: Enumeration_Users_In_Groups
ExpertContext:
Created: 12.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-949509640
ObjectId: SEC-CR-949509640
ContentAutoName: Local_Groups_Enumeration_Discovery
ExpertContext:
Created: 03.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-192895047
ObjectId: SEC-CR-192895047
ContentAutoName: Detect_execution_imageload_wuauclt_lolbas
ExpertContext:
Created: 07.06.2023
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ ExpertContext:
EventID:
- 4103
- 4104
ObjectId: LOC-CR-152436010
ObjectId: SEC-CR-152436010
EventDescriptions:
- Criteria: correlation_name = "Schtasks_Commandline"
LocalizationId: corrname_Schtasks_Commandline
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ ExpertContext:
- 4657
Usecases:
- Атакующие могут модифицировать путь к исполняемому файлу существующей службы Windows для запуска ВПО (например с помощью SharpNoPSExec)
ObjectId: LOC-CR-249739163
ObjectId: SEC-CR-249739163
ContentRelations:
Implements:
ATTACK:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-109694263
ObjectId: SEC-CR-109694263
ContentAutoName: Start_process_as_vshadow_child
ExpertContext:
Created: 05.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-109592014
ObjectId: SEC-CR-109592014
ContentAutoName: VSSVC_service_state_changed
ExpertContext:
Created: 05.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: ESC-CR-205452331
ObjectId: SEC-CR-205452331
ContentAutoName: XP_Cmdshell_Usage
ExpertContext:
Created: 05.06.2023
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ ExpertContext:
- Provider: Microsoft-Windows-Sysmon
EventID:
- 1
ObjectId: LOC-CR-655783268
ObjectId: SEC-CR-655783268
EventDescriptions:
- Criteria: correlation_name = "ProxyNotShell" and src.ip = src.host
LocalizationId: corrname_ProxyNotShell
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-485903980
ObjectId: SEC-CR-485903980
ContentAutoName: Detect_MSHTA_LethalHTA
ExpertContext:
Created: 10.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-173716752
ObjectId: SEC-CR-173716752
ContentAutoName: Impacket_WMIExec_Command_Executed
ExpertContext:
Created: 14.06.2023
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ ExpertContext:
- 5145
Usecases:
- Атакующие могут использовать инструменты удаленного администрирования для выполнения горизонтального перемещения по сети жертвы
ObjectId: LOC-CR-186456257
ObjectId: SEC-CR-186456257
ContentRelations:
Implements:
ATTACK:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-128702970
ObjectId: SEC-CR-128702970
ContentAutoName: Change_wmi_subscription
ExpertContext:
Created: 03.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-176508511
ObjectId: SEC-CR-176508511
ContentAutoName: Create_hidden_local_account
ExpertContext:
Created: 08.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-157328435
ObjectId: SEC-CR-157328435
ContentAutoName: Create_persist_via_Hidden_Run_key_value
ExpertContext:
Created: 12.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-58748064
ObjectId: SEC-CR-58748064
ContentAutoName: Create_persist_via_WinlogonShell
ExpertContext:
Created: 02.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-384735839
ObjectId: SEC-CR-384735839
ContentAutoName: DCSync_prepare_Add_replicatation_rights_to_Account
ExpertContext:
Created: 08.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
Updated: 26.12.2022
ObjectId: LOC-CR-142614850
ObjectId: SEC-CR-142614850
ContentAutoName: DSRM_Password_Changed
ExpertContext:
Created: 11.06.2023
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
ObjectId: LOC-CR-823326244
ObjectId: SEC-CR-823326244
ContentAutoName: Use_persist_Start_process_via_WinlogonShell
ExpertContext:
Created: 02.06.2023
Expand Down
Loading

0 comments on commit 2958a6f

Please sign in to comment.