-
Notifications
You must be signed in to change notification settings - Fork 518
/
Copy pathcollection_common_compressed_archived_file.toml
133 lines (117 loc) · 4.92 KB
/
collection_common_compressed_archived_file.toml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
[metadata]
bypass_bbr_timing = true
creation_date = "2023/10/11"
integration = "endpoint"
maturity = "production"
updated_date = "2025/01/09"
[rule]
author = ["Elastic"]
building_block_type = "default"
description = """
Detects files being compressed or archived into common formats by unsigned processes. This is a common technique used to
obfuscate files to evade detection or to staging data for exfiltration.
"""
from = "now-9m"
index = ["logs-endpoint.events.file-*"]
language = "eql"
license = "Elastic License v2"
name = "File Compressed or Archived into Common Format by Unsigned Process"
references = ["https://en.wikipedia.org/wiki/List_of_file_signatures"]
risk_score = 21
rule_id = "79124edf-30a8-4d48-95c4-11522cad94b1"
severity = "low"
tags = [
"Data Source: Elastic Defend",
"Domain: Endpoint",
"OS: macOS",
"OS: Windows",
"Tactic: Collection",
"Rule Type: BBR",
]
timestamp_override = "event.ingested"
type = "eql"
query = '''
file where host.os.type == "windows" and event.type in ("creation", "change") and
process.executable != null and process.code_signature.trusted != true and
file.Ext.header_bytes : (
/* compression formats */
"1F9D*", /* tar zip, tar.z (Lempel-Ziv-Welch algorithm) */
"1FA0*", /* tar zip, tar.z (LZH algorithm) */
"425A68*", /* Bzip2 */
"524E4301*", /* Rob Northen Compression */
"524E4302*", /* Rob Northen Compression */
"4C5A4950*", /* LZIP */
"504B0*", /* ZIP */
"526172211A07*", /* RAR compressed */
"44434D0150413330*", /* Windows Update Binary Delta Compression file */
"50413330*", /* Windows Update Binary Delta Compression file */
"377ABCAF271C*", /* 7-Zip */
"1F8B*", /* GZIP */
"FD377A585A00*", /* XZ, tar.xz */
"7801*", /* zlib: No Compression (no preset dictionary) */
"785E*", /* zlib: Best speed (no preset dictionary) */
"789C*", /* zlib: Default Compression (no preset dictionary) */
"78DA*", /* zlib: Best Compression (no preset dictionary) */
"7820*", /* zlib: No Compression (with preset dictionary) */
"787D*", /* zlib: Best speed (with preset dictionary) */
"78BB*", /* zlib: Default Compression (with preset dictionary) */
"78F9*", /* zlib: Best Compression (with preset dictionary) */
"62767832*", /* LZFSE */
"28B52FFD*", /* Zstandard, zst */
"5253564B44415441*", /* QuickZip rs compressed archive */
"2A2A4143452A2A*", /* ACE */
/* archive formats */
"2D686C302D*", /* lzh */
"2D686C352D*", /* lzh */
"303730373037*", /* cpio */
"78617221*", /* xar */
"4F4152*", /* oar */
"49536328*" /* cab archive */
)
'''
[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1074"
name = "Data Staged"
reference = "https://attack.mitre.org/techniques/T1074/"
[[rule.threat.technique.subtechnique]]
id = "T1074.001"
name = "Local Data Staging"
reference = "https://attack.mitre.org/techniques/T1074/001/"
[[rule.threat.technique]]
id = "T1560"
name = "Archive Collected Data"
reference = "https://attack.mitre.org/techniques/T1560/"
[[rule.threat.technique.subtechnique]]
id = "T1560.001"
name = "Archive via Utility"
reference = "https://attack.mitre.org/techniques/T1560/001/"
[rule.threat.tactic]
id = "TA0009"
name = "Collection"
reference = "https://attack.mitre.org/tactics/TA0009/"
[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1132"
name = "Data Encoding"
reference = "https://attack.mitre.org/techniques/T1132/"
[[rule.threat.technique.subtechnique]]
id = "T1132.001"
name = "Standard Encoding"
reference = "https://attack.mitre.org/techniques/T1132/001/"
[rule.threat.tactic]
id = "TA0011"
name = "Command and Control"
reference = "https://attack.mitre.org/tactics/TA0011/"
[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1027"
name = "Obfuscated Files or Information"
reference = "https://attack.mitre.org/techniques/T1027/"
[rule.threat.tactic]
id = "TA0005"
name = "Defense Evasion"
reference = "https://attack.mitre.org/tactics/TA0005/"