Skip to content

Commit

Permalink
feat(rules): adding new rules for rdp detections in evtx
Browse files Browse the repository at this point in the history
  • Loading branch information
eliza-louise authored and alexkornitzer committed May 24, 2023
1 parent bd709c1 commit 3b2d45b
Show file tree
Hide file tree
Showing 4 changed files with 136 additions and 0 deletions.
33 changes: 33 additions & 0 deletions rules/rdp_attacks/event_id_1149.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
title: User Authentication Succeeded
group: rdp_attacks
description: User has successfully authenticated an rdp logon
authors:
- ElizaBolton


kind: evtx
level: critical
status: stable
timestamp: Event.System.TimeCreated


fields:
- name: event id
to: Event.System.EventID
- name: record id
to: Event.System.EventRecordID
- name: computer
to: Event.System.Computer
- name: username
to: Event.UserData.EventXML.Param1
- name: domain
to: Event.UserData.EventXML.Param2
- name: ip address
to: Event.UserData.EventXML.Param3
- name: provider
to: Event.System.Provider


filter:
Event.System.EventID: 1149
Event.System.Provider: Microsoft-Windows-TerminalServices-RemoteConnectionManager
35 changes: 35 additions & 0 deletions rules/rdp_attacks/event_id_24.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
title: RDP Session Disconnected
group: rdp_attacks
description: User has disconnected from an RDP session
authors:
- ElizaBolton


kind: evtx
level: critical
status: stable
timestamp: Event.System.TimeCreated


fields:
- name: event id
to: Event.System.EventID
- name: computer
to: Event.System.Computer
- name: ip address
to: Event.UserData.EventXML.Address
- name: username
to: Event.UserData.EventXML.User
- name: provider
to: Event.System.Provider


filter:
condition: RDP_RELATED and not LOCAL


RDP_RELATED:
Event.System.EventID: 24
Event.System.Provider: Microsoft-Windows-TerminalServices-LocalSessionManager
LOCAL:
Event.UserData.EventXML.Address: "LOCAL"
36 changes: 36 additions & 0 deletions rules/rdp_attacks/event_id_25.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
title: RDP Session Connected
group: rdp_attacks
description: User has connected to an RDP session
authors:
- ElizaBolton


kind: evtx
level: critical
status: stable
timestamp: Event.System.TimeCreated


fields:
- name: event id
to: Event.System.EventID
- name: computer
to: Event.System.Computer
- name: ip address
to: Event.UserData.EventXML.Address
- name: username
to: Event.UserData.EventXML.User
- name: provider
to: Event.System.Provider


filter:
condition: RDP_RELATED and not LOCAL


RDP_RELATED:
Event.System.EventID: 25
Event.System.Provider: Microsoft-Windows-TerminalServices-LocalSessionManager
LOCAL:
Event.UserData.EventXML.Address: "LOCAL"

32 changes: 32 additions & 0 deletions rules/rdp_attacks/event_id_4624_logontype_10.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
title: RDP logon
group: rdp_attacks
description: An account was successfully logged onto via RDP
authors:
- ElizaBolton


kind: evtx
level: critical
status: stable
timestamp: Event.System.TimeCreated


fields:
- name: event id
to: Event.System.EventID
- name: logon type
to: Event.EventData.LogonType
- name: username
to: Event.EventData.TargetUserName
- name: computer
to: Event.System.Computer
- name: ip address
to: Event.EventData.IpAddress
- name: record id
to: Event.System.EventRecordID



filter:
Event.System.EventID: 4624
Event.EventData.LogonType: 10

0 comments on commit 3b2d45b

Please sign in to comment.