Feature/rm submodule (#312)

* rm: submodule

* Add: rules

* Fix: hayabusa-rules to c9c10a
This commit is contained in:
itiB
2021-12-20 21:14:32 +09:00
committed by GitHub
parent 1aebdca160
commit 83d891b2fa
1196 changed files with 46186 additions and 4 deletions
@@ -0,0 +1,49 @@
title: PsExec Tool Execution
ruletype: Sigma
author: Thomas Patzke
date: 2017/06/12
description: Detects PsExec service installation and execution events (service and
Sysmon)
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
PipeName: \PSEXESVC
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3)
falsepositives:
- unknown
fields:
- EventID
- CommandLine
- ParentCommandLine
- ServiceName
- ServiceFileName
- TargetFilename
- PipeName
id: f3f3a972-f982-40ad-b63c-bca6afdfad7c
level: low
logsource:
category: pipe_created
definition: Note that you have to configure logging for Named Pipe Events in Sysmon
config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon
configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth
verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config,
https://github.com/olafhartong/sysmon-modular. How to test detection? You can
check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
product: windows
modified: 2021/09/21
references:
- https://www.jpcert.or.jp/english/pub/sr/ir_research.html
- https://jpcertcc.github.io/ToolAnalysisResultSheet
related:
- id: 42c575ea-e41e-41f1-b248-8093c3e82a28
type: derived
status: experimental
tags:
- attack.execution
- attack.t1035
- attack.t1569.002
- attack.s0029
@@ -0,0 +1,41 @@
title: Alternate PowerShell Hosts Pipe
ruletype: Sigma
author: Roberto Rodriguez @Cyb3rWard0g
date: 2019/09/12
description: Detects alternate PowerShell hosts potentially bypassing detections looking
for powershell.exe
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
PipeName: \PSHost*
SELECTION_4:
Image:
- '*\powershell.exe'
- '*\powershell_ise.exe'
- '*\WINDOWS\System32\sdiagnhost.exe'
- '*\WINDOWS\System32\wsmprovhost.exe'
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3 and not (SELECTION_4))
falsepositives:
- Programs using PowerShell directly without invocation of a dedicated interpreter.
fields:
- ComputerName
- User
- Image
- PipeName
id: 58cb02d5-78ce-4692-b3e1-dce850aae41a
level: medium
logsource:
category: pipe_created
product: windows
modified: 2021/12/09
references:
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190815181010.html
status: test
tags:
- attack.execution
- attack.t1086
- attack.t1059.001
@@ -0,0 +1,41 @@
title: Turla Group Named Pipes
ruletype: Sigma
author: Markus Neis
date: 2017/11/06
description: Detects a named pipe used by Turla group samples
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
PipeName:
- \atctl
- \userpipe
- \iehelper
- \sdlrpc
- \comnap
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3)
falsepositives:
- Unknown
id: 739915e4-1e70-4778-8b8a-17db02f66db1
level: critical
logsource:
category: pipe_created
definition: Note that you have to configure logging for Named Pipe Events in Sysmon
config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon
configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth
verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config,
https://github.com/olafhartong/sysmon-modular. How to test detection? You can
check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
product: windows
modified: 2021/11/27
references:
- Internal Research
- https://attack.mitre.org/groups/G0010/
status: test
tags:
- attack.g0010
- attack.execution
- attack.t1106
@@ -0,0 +1,42 @@
title: Cred Dump-Tools Named Pipes
ruletype: Sigma
author: Teymur Kheirkhabarov, oscd.community
date: 2019/11/01
description: Detects well-known credential dumping tools execution via specific named
pipes
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
PipeName:
- '*\lsadump*'
- '*\cachedump*'
- '*\wceservicepipe*'
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3)
falsepositives:
- Legitimate Administrator using tool for password recovery
id: 961d0ba2-3eea-4303-a930-2cf78bbfcc5e
level: critical
logsource:
category: pipe_created
definition: Note that you have to configure logging for Named Pipe Events in Sysmon
config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon
configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth
verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config,
https://github.com/olafhartong/sysmon-modular. How to test detection? You can
check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
product: windows
modified: 2021/11/27
references:
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
status: test
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.001
- attack.t1003.002
- attack.t1003.004
- attack.t1003.005
@@ -0,0 +1,37 @@
title: EfsPotato Named Pipe
ruletype: Sigma
author: Florian Roth
date: 2021/08/23
description: Detects the pattern of a pipe name as used by the tool EfsPotato
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
PipeName:
- '*\pipe\\*'
- '*\pipe\srvsvc*'
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3)
falsepositives:
- Unknown
id: 637f689e-b4a5-4a86-be0e-0100a0a33ba2
level: critical
logsource:
category: pipe_created
definition: Note that you have to configure logging for Named Pipe Events in Sysmon
config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon
configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth
verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config,
https://github.com/olafhartong/sysmon-modular. How to test detection? You can
check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
product: windows
references:
- https://twitter.com/SBousseaden/status/1429530155291193354?s=20
- https://github.com/zcgonvh/EfsPotato
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1055
@@ -0,0 +1,49 @@
title: CobaltStrike Named Pipe
ruletype: Sigma
author: Florian Roth, Wojciech Lesicki
date: 2021/05/25
description: Detects the creation of a named pipe as used by CobaltStrike
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
PipeName: '*\MSSE-*'
SELECTION_4:
PipeName: '*-server*'
SELECTION_5:
PipeName: \postex_*
SELECTION_6:
PipeName: \postex_ssh_*
SELECTION_7:
PipeName: \status_*
SELECTION_8:
PipeName: \msagent_*
condition: ((SELECTION_1 or SELECTION_2) and ((SELECTION_3 and SELECTION_4) or SELECTION_5
or SELECTION_6 or SELECTION_7 or SELECTION_8))
falsepositives:
- Unknown
id: d5601f8c-b26f-4ab0-9035-69e11a8d4ad2
level: critical
logsource:
category: pipe_created
definition: Note that you have to configure logging for Named Pipe Events in Sysmon
config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon
configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth
verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config,
https://github.com/olafhartong/sysmon-modular. How to test detection? You can
always use Cobalt Strike, but also you can check powershell script from this site
https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
product: windows
references:
- https://twitter.com/d4rksystem/status/1357010969264873472
- https://labs.f-secure.com/blog/detecting-cobalt-strike-default-modules-via-named-pipe-analysis/
- https://github.com/Neo23x0/sigma/issues/253
- https://blog.cobaltstrike.com/2021/02/09/learn-pipe-fitting-for-all-of-your-offense-projects/
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1055
@@ -0,0 +1,79 @@
title: CobaltStrike Named Pipe Pattern Regex
ruletype: Sigma
author: Florian Roth
date: 2021/07/30
description: Detects the creation of a named pipe matching a pattern used by CobaltStrike
Malleable C2 profiles
detection:
SELECTION_1:
EventID: 17
SELECTION_10:
PipeName|re: \\\\ntsvcs_[0-9a-f]{2}
SELECTION_11:
PipeName|re: \\\\scerpc_?[0-9a-f]{2}
SELECTION_12:
PipeName|re: \\\\PGMessagePipe[0-9a-f]{2}
SELECTION_13:
PipeName|re: \\\\MsFteWds[0-9a-f]{2}
SELECTION_14:
PipeName|re: \\\\f4c3[0-9a-f]{2}
SELECTION_15:
PipeName|re: \\\\fullduplex_[0-9a-f]{2}
SELECTION_16:
PipeName|re: \\\\msrpc_[0-9a-f]{4}
SELECTION_17:
PipeName|re: \\\\win\\\\msrpc_[0-9a-f]{2}
SELECTION_18:
PipeName|re: \\\\f53f[0-9a-f]{2}
SELECTION_19:
PipeName|re: \\\\rpc_[0-9a-f]{2}
SELECTION_2:
EventID: 18
SELECTION_20:
PipeName|re: \\\\spoolss_[0-9a-f]{2}
SELECTION_21:
PipeName|re: \\\\Winsock2\\\\CatalogChangeListener-[0-9a-f]{3}-0,
SELECTION_3:
PipeName|re: \\\\mojo\.5688\.8052\.(?:183894939787088877|35780273329370473)[0-9a-f]{2}
SELECTION_4:
PipeName|re: \\\\wkssvc_?[0-9a-f]{2}
SELECTION_5:
PipeName|re: \\\\ntsvcs[0-9a-f]{2}
SELECTION_6:
PipeName|re: \\\\DserNamePipe[0-9a-f]{2}
SELECTION_7:
PipeName|re: \\\\SearchTextHarvester[0-9a-f]{2}
SELECTION_8:
PipeName|re: \\\\mypipe\-(?:f|h)[0-9a-f]{2}
SELECTION_9:
PipeName|re: \\\\windows\.update\.manager[0-9a-f]{2,3}
condition: ((SELECTION_1 or SELECTION_2) and (SELECTION_3 or SELECTION_4 or SELECTION_5
or SELECTION_6 or SELECTION_7 or SELECTION_8 or SELECTION_9 or SELECTION_10 or
SELECTION_11 or SELECTION_12 or SELECTION_13 or SELECTION_14 or SELECTION_15 or
SELECTION_16 or SELECTION_17 or SELECTION_18 or SELECTION_19 or SELECTION_20 or
SELECTION_21))
falsepositives:
- Unknown
id: 0e7163d4-9e19-4fa7-9be6-000c61aad77a
level: critical
logsource:
category: pipe_created
definition: Note that you have to configure logging for Named Pipe Events in Sysmon
config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon
configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth
verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config,
https://github.com/olafhartong/sysmon-modular You can also use other repo, e.g.
https://github.com/Neo23x0/sysmon-config, https://github.com/olafhartong/sysmon-modular.
How to test detection? You can always use Cobalt Strike, but also you can check
powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
product: windows
modified: 2021/09/02
references:
- https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
- https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1055
@@ -0,0 +1,71 @@
title: Malicious Named Pipe
ruletype: Sigma
author: Florian Roth, blueteam0ps, elhoim
date: 2017/11/06
description: Detects the creation of a named pipe used by known APT malware
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
PipeName:
- \isapi_http
- \isapi_dg
- \isapi_dg2
- \sdlrpc
- \ahexec
- \winsession
- \lsassw
- \46a676ab7f179e511e30dd2dc41bd388
- \9f81f59bc58452127884ce513865ed20
- \e710f28d59aa529d6792ca6ff0ca1b34
- \rpchlp_3
- \NamePipe_MoreWindows
- \pcheap_reuse
- \gruntsvc
- \583da945-62af-10e8-4902-a8f205c72b2e
- \bizkaz
- \svcctl
- \Posh*
- \jaccdpqnvbrrxlaf
- \csexecsvc
- \6e7645c4-32c5-4fe3-aabf-e94c2f4370e7
- \adschemerpc
- \AnonymousPipe
- \bc367
- \bc31a7
- \testPipe
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3)
falsepositives:
- Unknown
id: fe3ac066-98bb-432a-b1e7-a5229cb39d4a
level: critical
logsource:
category: pipe_created
definition: Note that you have to configure logging for Named Pipe Events in Sysmon
config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon
configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth
verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config,
https://github.com/olafhartong/sysmon-modular. How to test detection? You can
check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
product: windows
modified: 2021/10/30
references:
- https://securelist.com/wild-neutron-economic-espionage-threat-actor-returns-with-new-tricks/71275/
- https://securelist.com/faq-the-projectsauron-apt/75533/
- https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
- https://www.us-cert.gov/ncas/alerts/TA17-117A
- https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html
- https://thedfirreport.com/2020/06/21/snatch-ransomware/
- https://github.com/RiccardoAncarani/LiquidSnake
- https://www.accenture.com/us-en/blogs/cyber-defense/turla-belugasturgeon-compromises-government-entity
- https://us-cert.cisa.gov/ncas/analysis-reports/ar19-304a
- https://download.bitdefender.com/resources/files/News/CaseStudies/study/115/Bitdefender-Whitepaper-PAC-A4-en-EN1.pdf
- https://unit42.paloaltonetworks.com/emissary-panda-attacks-middle-east-government-sharepoint-servers/
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1055
@@ -0,0 +1,28 @@
title: T1086 PowerShell Execution
ruletype: Sigma
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2019/09/12
description: Detects execution of PowerShell
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
PipeName: \PSHost*
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3)
falsepositives:
- Unknown
id: ac7102b4-9e1e-4802-9b4f-17c5524c015c
level: informational
logsource:
category: pipe_created
product: windows
modified: 2021/11/27
references:
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190410151110.html
status: test
tags:
- attack.execution
- attack.t1059.001
@@ -0,0 +1,38 @@
title: PsExec Pipes Artifacts
ruletype: Sigma
author: Nikita Nazarov, oscd.community
date: 2020/05/10
description: Detecting use PsExec via Pipe Creation/Access to pipes
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
PipeName:
- psexec*
- paexec*
- remcom*
- csexec*
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3)
falsepositives:
- Legitimate Administrator activity
id: 9e77ed63-2ecf-4c7b-b09d-640834882028
level: medium
logsource:
category: pipe_created
definition: Note that you have to configure logging for Named Pipe Events in Sysmon
config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon
configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth
verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config,
https://github.com/olafhartong/sysmon-modular. How to test detection? You can
check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
product: windows
modified: 2021/11/27
references:
- https://drive.google.com/file/d/1lKya3_mLnR3UQuCoiYruO3qgu052_iS_/view
status: test
tags:
- attack.lateral_movement
- attack.t1021.002
@@ -0,0 +1,42 @@
title: ADFS Database Named Pipe Connection
ruletype: Sigma
author: Roberto Rodriguez @Cyb3rWard0g
date: 2021/10/08
description: Detects suspicious local connections via a named pipe to the AD FS configuration
database (Windows Internal Database). Used to access information such as the AD
FS configuration settings which contains sensitive information used to sign SAML
tokens.
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
PipeName: \MICROSOFT##WID\tsql\query
SELECTION_4:
Image:
- '*Microsoft.IdentityServer.ServiceHost.exe'
- '*Microsoft.Identity.Health.Adfs.PshSurrogate.exe'
- '*AzureADConnect.exe'
- '*Microsoft.Tri.Sensor.exe'
- '*wsmprovhost.exe'
- '*mmc.exe'
- '*sqlservr.exe'
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3 and not (SELECTION_4))
falsepositives:
- Processes in the filter condition
id: 1ea13e8c-03ea-409b-877d-ce5c3d2c1cb3
level: critical
logsource:
category: pipe_created
product: windows
modified: 2021/11/07
references:
- https://github.com/Azure/Azure-Sentinel/blob/master/Detections/SecurityEvent/ADFSDBNamedPipeConnection.yaml
- https://o365blog.com/post/adfs/
- https://github.com/Azure/SimuLand
status: experimental
tags:
- attack.collection
- attack.t1005
@@ -0,0 +1,77 @@
title: CobaltStrike Named Pipe Patterns
ruletype: Sigma
author: Florian Roth, Christian Burkard
date: 2021/07/30
description: Detects the creation of a named pipe with a pattern found in CobaltStrike
malleable C2 profiles
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
PipeName:
- \mojo.5688.8052.183894939787088877*
- \mojo.5688.8052.35780273329370473*
- \mypipe-f*
- \mypipe-h*
- \ntsvcs*
- \scerpc*
- \win_svc*
- \spoolss*
- \msrpc_*
- \win\msrpc_*
- \wkssvc*
- \f53f*
- \windows.update.manager*
- \SearchTextHarvester*
- \DserNamePipe*
- \PGMessagePipe*
- \MsFteWds*
- \f4c3*
- \fullduplex_*
- \rpc_*
SELECTION_4:
PipeName:
- \demoagent_11
- \demoagent_22
SELECTION_5:
PipeName: \Winsock2\CatalogChangeListener-*
SELECTION_6:
PipeName: '*-0,'
SELECTION_7:
PipeName:
- \wkssvc
- \spoolss
- \scerpc
- \ntsvcs
- \SearchTextHarvester
- \PGMessagePipe
- \MsFteWds
condition: ((SELECTION_1 or SELECTION_2) and ((SELECTION_3 or SELECTION_4) or (SELECTION_5
and SELECTION_6)) and not (SELECTION_7))
falsepositives:
- Chrome instances using the exactly same name pipe named mojo.something
id: 85adeb13-4fc9-4e68-8a4a-c7cb2c336eb7
level: high
logsource:
category: pipe_created
definition: Note that you have to configure logging for Named Pipe Events in Sysmon
config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon
configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth
verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config,
https://github.com/olafhartong/sysmon-modular You can also use other repo, e.g.
https://github.com/Neo23x0/sysmon-config, https://github.com/olafhartong/sysmon-modular.
How to test detection? You can always use Cobalt Strike, but also you can check
powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
product: windows
modified: 2021/08/26
references:
- https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
- https://gist.github.com/MHaggis/6c600e524045a6d49c35291a21e10752
status: experimental
tags:
- attack.defense_evasion
- attack.privilege_escalation
- attack.t1055
@@ -0,0 +1,33 @@
title: WMI Event Consumer Created Named Pipe
ruletype: Sigma
author: Florian Roth
date: 2021/09/01
description: Detects the WMI Event Consumer service scrcons.exe creating a named pipe
detection:
SELECTION_1:
EventID: 17
SELECTION_2:
EventID: 18
SELECTION_3:
Image: '*\scrcons.exe'
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3)
falsepositives:
- Unknown
id: 493fb4ab-cdcc-4c4f-818c-0e363bd1e4bb
level: high
logsource:
category: pipe_created
definition: Note that you have to configure logging for Named Pipe Events in Sysmon
config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon
configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth
verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config,
https://github.com/olafhartong/sysmon-modular. How to test detection? You can
check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575
product: windows
references:
- https://github.com/RiccardoAncarani/LiquidSnake
status: experimental
tags:
- attack.t1047
- attack.execution