Merge pull request #331 from Yamato-Security/newrules/add-count-rules
newrules/add-count-rules
This commit is contained in:
@@ -0,0 +1,30 @@
|
||||
author: Zach Mathis
|
||||
date: 2021/12/20
|
||||
modified: 2021/12/22
|
||||
|
||||
title: Password Guessing Attack
|
||||
title_jp: パスワード推測攻撃
|
||||
output: '' #Cannot be used because this is a count rule
|
||||
output_jp: ''
|
||||
description: Search for many 4625 wrong password failed logon attempts in a short period of time.
|
||||
description_jp:
|
||||
|
||||
id: 35e8a0fc-60c2-46d7-ba39-aafb15b9854e
|
||||
level: medium
|
||||
status: stable
|
||||
detection:
|
||||
selection:
|
||||
Channel: Security
|
||||
EventID: 4625
|
||||
SubStatus: "0xc000006a" #Wrong password
|
||||
condition: selection | count() by IpAddress >= 5
|
||||
timeframe: 5m
|
||||
falsepositives:
|
||||
- User mistyping password
|
||||
tags:
|
||||
- attack.t1110.003
|
||||
- attack.credential_access
|
||||
references: https://attack.mitre.org/techniques/T1110/003/
|
||||
sample-evtx: ./hayabusa-sample-evtx/DeepBlueCLI/smb-password-guessing-security.evtx
|
||||
logsource: default
|
||||
ruletype: Hayabusa
|
||||
@@ -0,0 +1,29 @@
|
||||
author: Zach Mathis
|
||||
date: 2021/12/20
|
||||
modified: 2021/12/22
|
||||
|
||||
title: User Guessing Attempt
|
||||
title_jp: ユーザ名推測の試行
|
||||
output: '' #Cannot be used because this is a count rule
|
||||
output_jp: ''
|
||||
description: Search for many 4625 failed logon attempts due to wrong usernames in a short period of time.
|
||||
description_jp:
|
||||
|
||||
id: 4574194d-e7ca-4356-a95c-21b753a1787e
|
||||
level: medium
|
||||
status: stable
|
||||
detection:
|
||||
selection:
|
||||
Channel: Security
|
||||
EventID: 4625
|
||||
SubStatus: "0xc0000064" #Username does not exist
|
||||
condition: selection | count() by IpAddress >= 5
|
||||
timeframe: 5m
|
||||
falsepositives:
|
||||
tags:
|
||||
- attack.t1110.003
|
||||
- attack.credential_access
|
||||
references: https://attack.mitre.org/techniques/T1110/003/
|
||||
sample-evtx: ./hayabusa-sample-evtx/EVTX-to-MITRE-Attack/TA0006-Credential Access/T1110.xxx-Bruteforce/ID4625-OpenSSH brutforce with non existing user.evtx
|
||||
logsource: default
|
||||
ruletype: Hayabusa
|
||||
@@ -0,0 +1,28 @@
|
||||
author: Zach Mathis
|
||||
date: 2021/12/20
|
||||
modified: 2021/12/20
|
||||
|
||||
title: Password Spray
|
||||
title_jp: パスワードスプレー攻撃
|
||||
output: '' #Cannot be used because this is a count rule
|
||||
output_jp: ''
|
||||
description: Search for many 4648 explicit credential logon attempts in a short period of time.
|
||||
description_jp:
|
||||
|
||||
id: ffd622af-d049-449f-af5a-0492fdcc3a58
|
||||
level: medium
|
||||
status: stable
|
||||
detection:
|
||||
selection:
|
||||
Channel: Security
|
||||
EventID: 4648
|
||||
condition: selection | count(TargetUserName) by IpAddress >= 5
|
||||
timeframe: 5m
|
||||
falsepositives:
|
||||
tags:
|
||||
- attack.t1110.003
|
||||
- attack.credential_access
|
||||
references: https://attack.mitre.org/techniques/T1110/003/
|
||||
sample-evtx: ./hayabusa-sample-evtx/DeepBlueCLI/password-spray.evtx
|
||||
logsource: default
|
||||
ruletype: Hayabusa
|
||||
Reference in New Issue
Block a user