Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ingesting AlientVault OTX TI feeds to HELK #305

Open
wants to merge 48 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
48 commits
Select commit Hold shift + click to select a range
e04e0cc
Create HuntingQuery.md
Jul 26, 2019
7dc1b9c
Update HuntingQuery.md
Jul 26, 2019
da8dc27
Update HuntingQuery.md
Jul 26, 2019
f061c8b
Create readme.md
Jul 26, 2019
8014ecf
Add files via upload
Jul 26, 2019
9c63afb
Add files via upload
Jul 26, 2019
f4adc72
Update readme.md
Jul 26, 2019
c0acef0
Update readme.md
Jul 26, 2019
7c0f234
Update readme.md
Jul 26, 2019
a9bc593
Update readme.md
Jul 28, 2019
f5629d4
Update readme.md
Jul 28, 2019
58c8695
Update readme.md
Jul 31, 2019
b735f4e
Create images.md
Jul 31, 2019
6e95f1d
Add files via upload
Jul 31, 2019
027eebd
Update readme.md
Jul 31, 2019
e22fad0
Update readme.md
Jul 31, 2019
e5fbf87
Update readme.md
Jul 31, 2019
b92e06a
Update readme.md
Jul 31, 2019
93bb13b
Update readme.md
Jul 31, 2019
48f1a1a
Add files via upload
Jul 31, 2019
06ab435
Update readme.md
Jul 31, 2019
46f1a08
Update readme.md
Jul 31, 2019
4813152
Update readme.md
Jul 31, 2019
c65b52c
Update 1531-winevent-sysmon-filter.conf
Jul 31, 2019
dc1df23
Update readme.md
Jul 31, 2019
93f98e8
Update HuntingQuery.md
Aug 5, 2019
0a28227
Update HuntingQuery.md
Aug 5, 2019
93c4624
Update HuntingQuery.md
Aug 5, 2019
5c1a523
Update HuntingQuery.md
Aug 5, 2019
83debc0
Update HuntingQuery.md
Aug 5, 2019
3659264
Create readme.md
Aug 5, 2019
0efa8dd
Create mitre-ref.conf
Aug 5, 2019
8ae8fcd
Update HuntingQuery.md
Aug 8, 2019
e32e3a1
added MSHTA
Aug 8, 2019
ebeefa5
Update HuntingQuery.md
Aug 9, 2019
81ce4ab
Update mitre-ref.conf
Aug 15, 2019
3176d8d
Create test
Aug 15, 2019
6d5cc9e
Add files via upload
Aug 15, 2019
b84ff65
Delete Screenshot (34).png
Aug 15, 2019
5236447
Add files via upload
Aug 15, 2019
d49077d
Update readme.md
Aug 15, 2019
9a9ff1a
Update mitre-ref.conf
Aug 15, 2019
c5f88e0
Update readme.md
Aug 15, 2019
d9e1dd4
Add files via upload
Aug 15, 2019
831dcd3
Update mitre-ref.conf
Aug 22, 2019
9f0dc11
Update mitre-ref.conf
Aug 23, 2019
67a8ed3
Delete ATT&CK_windows_execution_matrix.xlsx
Aug 23, 2019
87a2e22
Add files via upload
Aug 23, 2019
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
106 changes: 106 additions & 0 deletions HuntingQuery.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,106 @@
# Reference

@HeirhabarovT
https://speakerdeck.com/heirhabarov/phdays-2018-threat-hunting-hands-on-lab

## MSHTA Remote Download and Execute
` process_name: "mshta.exe" and (process_command_line: "http" or "https") `

## MSHTA Execute local or remote
` process_name: "mshta.exe" `

## Using MSI exec to execute msi by url
` process_command_line:"msiexec" AND process_command_line:"http" `

## Suspicious Processes Spawned From ms office
` event_id:("1" OR "4688") AND process_parent_path:(" \\\\excel.exe" or " \\\\winword.exe" or " \\\\powepnt.exe" or " \\\\msaccess.exe" or " \\\\mspub.exe" or " \\\\outook.exe") AND process_path:(" \\\\cmd.exe" or " \\\\powershell.exe" or " \\\\wscript.exe" or " \\\\cscript.exe" or " \\\\bitsadmin.exe" or " \\\\certutil.exe" or " \\\\schtasks.exe" or " \\\\rundll32.exe" or " \\\\regsvr32.exe" or " \\\\wmic.exe" or " \\\\mshta.exe" or " \\\\msiexec.exe" or " \\\\schtasks.exe" or " \\\\msbuild.exe" or "\\\\control.exe") `

## WMI Squid By Two Attack
` process_command_line:"wmic" AND process_command_line:"format" and process_command_line: ("http" or "https" or "ftp" or "xsl") `

## CMSTP Execution
` process_command_line: cmstp AND process_command_line: inf `

## Control Panel Items
` process_command_line: "cpl" and not process_path: "\\\\system32\\\\" `

## Regsvr32 squiblydoo attack
` process_command_line: regsvr32 AND process_command_line: scrobj `

## Suspicious Code Injection
` event_id:8 AND log_name:"Microsoft-Windows-Sysmon/Operational" AND not process_path:" \\\\VBoxTray.exe" AND process_target_path:" \\\\csrss.exe" AND not thread_start_function:EtwpNotificationThread AND process_path:" \\\\rundll32.exe" `

## Suspicious Powershell cmdline downloading
` process_command_line:(" powershell " or " pwsh " or " SyncAppvPublishingServer ") AND process_command_line:(" BitsTransfer " or " webclient " or " DownloadFile " or " downloadstring " or " wget " or " curl " or " WebRequest " or " WinHttpRequest " or " iwr " or " irm " or " internetExplorer.Application " or " Msxml2.XMLHTTP " or " MsXml2.ServerXmlHttp ") `

## Possible privilege escalation via weak service permissions
` process_path:" \\\\sc.exe" AND process_command_line:" config " AND process_command_line:" binPath " AND process_integrity_level: "Medium" `

## Using Certutil For Downloading
` process_command_line:" certutil " AND process_command_line:(" urlcach " or " url " or " ping ") AND process_command_line:(" http " or " ftp ") `

## Using certutil for file decoding
` process_command_line:" certutil " AND process_command_line:" decode " `

## Files named like system processes but in the wrong place
` (process_path:(" \\\\rundll32.exe" or " \\\\svchost.exe" or " \\\\wmiprvse.exe" or " \\\\wmiadap.exe" or " \\\\smss.exe" or " \\\\wininit.exe" or " \\\\taskhost.exe" or " \\\\lsass.exe" or " \\\\winlogon.exe" or " \\\\csrss.exe" or " \\\\services.exe" or " \\\\svchost.exe" or " \\\\lsm.exe" or " \\\\conhost.exe" or " \\\\dllhost.exe" or " \\\\dwm.exe" or " \\\\spoolsv.exe" or " \\\\wuauclt.exe" or " \\\\taskhost.exe" or " \\\\taskhostw.exe" or " \\\\fontdrvhost.exe" or " \\\\searchindexer.exe" or " \\\\searchprotocolhost.exe" or " \\\\searchfilterhost.exe" or " \\\\sihost.exe") AND not process_path:(" \\\\system32\\\\ " or " \\\\syswow64\\\\ " or " \\\\winsxs\\\\ ")) OR (file_name:(" \\\\rundll32.exe" or " \\\\svchost.exe" or " \\\\wmiprvse.exe" or " \\\\wmiadap.exe" or " \\\\smss.exe" or " \\\\wininit.exe" or " \\\\taskhost.exe" or " \\\\lsass.exe" or " \\\\winlogon.exe" or " \\\\csrss.exe" or " \\\\services.exe" or " \\\\svchost.exe" or " \\\\lsm.exe" or " \\\\conhost.exe" or " \\\\dllhost.exe" or " \\\\dwm.exe" or " \\\\spoolsv.exe" or " \\\\wuauclt.exe" or " \\\\taskhost.exe" or " \\\\taskhostw.exe" or " \\\\fontdrvhost.exe" or " \\\\searchindexer.exe" or " \\\\searchprotocolhost.exe" or " \\\\searchfilterhost.exe" or " \\\\sihost.exe")) `

## Mimikatz Commands Patterns
` process_command_line:(" mimikatz " or " mimidrv " or " mimilib " or " DumpCerts " or " DumpCreds ") OR (process_command_line:(" kerberos " or " sekurlsa " or " lsadump " or " dpapi " or " logonpasswords " or " privilege " or " rpc\\:\\:server " or " service\\:\\:me " or " token " or " vault ") AND process_command_line:" \\:\\: ") `

## Mimikatz Commands Metadata
` file_description:(" mimidrv " or " mimikatz " or " mimilib ") OR file_product:(" mimidrv " or " mimikatz " or " mimilib ") OR file_company:(" gentilkiwi " or " Benjamin DELPY ") OR signature:"Benjamin Delpy" `

## Using bits for downloading or uploading
` (process_command_line:" bitsadmin " AND process_command_line:(" transfer " or " addfile " or " Add-BitsFile " or " Start-BitsTransfer ")) OR (process_command_line:" powershell " AND process_command_line:(" Add-BitsFile " or " Start-BitsTransfer ")) `

## Run whoami as system
` process_path:" \\whoami.exe" AND (reporter_logon_id: 0x3e7 OR SubjectLogonId: 0x3e7 OR user_account:"NT AUTHORITY\\SYSTEM") `

## Remotely created scheduled task
` event_id:("4698" or "4702") AND logon_type:3 `

## Process Creation in network logon session
` event_id:1 AND log_name: Sysmon AND logon_type:3 `

## Using Net tool for connection to admin share
` process_command_line:" net " AND process_command_line:" use " AND process_command_line.keyword:" $ " `

## Using Net tool for connection to share
` process_command_line:" net " AND process_command_line:" use " `

## Privileged network logon
` event_id:4672 AND logon_type:3 AND (src_ip_addr: OR user_domain: ) `

## Suspicious dll load by lsass
` event_id:7 AND process_path:" \\\\lsass.exe" AND not signature:" Microsoft " `

## Replaced accessability features binary execution
` event_id:1 AND process_name:(" sethc " or " utilman " or " osk " or " narrator " or " magnify " or " displayswitch ") AND not file_description:("Display Switch" or "Accessibility shortcut keys" or "Screen Reader" or " Magnifier " or " Keyboard " or "Utility Manager") `

## Accessibility features binary replacement
` log_name:" Sysmon" AND event_id:"11" AND file_name:(" \\\\displayswitch.exe" or " \\\\sethc.exe" or " \\\\magnify.exe" or " \\\\narrator.exe" or " \\\\osk.exe" or " utilman.exe") `

## Suspicious lsass password filter was loaded
` event_id:4614 AND not NotificationPackageName:("scecli" or "rassfm" or "WDIGEST" or "KDCPw") `

## Suspicious_lsass ssp was loaded
` event_id:4622 AND not SecurityPackageName:(" pku2u" or " TSSSP" or " NTLM" or " Negotiate" or " NegoExtender" or " Schannel" or " Kerberos" or " Wdigest" or " Microsoft Unified Security Protocol Provider" or "cloudap") `

## Suspicious service that start interesting system binary
` event_id:("4697" or "7045") AND process_command_line:(" rundll32 " or " regsvr32 " or " msbuild " or " installutil " or " odbcconf " or " wmic " or " msiexec " or " cscript " or " wscript " or " cmd " or " powershell " or " comspec ") `

## Suspicious services credential dumping tools
` event_id:("4697" or "7045") AND (process_command_line:(" rpc::server " or " service::me " or " fgexec " or " servpw " or " cachedump " or " dumpsvc " or " mimidrv " or " mimikatz " or " wceservice " or " wce service " or " pwdump " or " gsecdump " or " cachedump ") OR service_name:(" fgexec " or " servpw " or " cachedump " or " dumpsvc " or " mimidrv " or " mimikatz " or " wceservice " or " wce" or "service " or " pwdump " or " gsecdump " or " cachedump ")) `

## Suspicious services remote execution_tools
` (event_id:("4697" or "7045") OR (log_name:Autoruns AND Category:Services)) AND (process_command_line:(" psexe " or " winexe " or " paexe " or " remcom ") OR service_name:(" BTOBTO " or " psexe " or " winexe " or " paexe " or " remcom ")) `


## Suspicious powershell execution of encoded script
` process_command_line: powershell AND (process_command_line:(" -e " or " -en " or " -ec " or " -enc " or " -enco" or " -encod" or " -encode" or " -encoded" or " -encodedc" or " -encodedco" or " -encodedcom" or " -encodedcomm" or " -encodedcomma" or " -encodedcomman" or " -encodedcommand") OR process_command_line:(" StreamReader " or " GzipStream " or " Decompress " or " MemoryStream " or " FromBase64String ")) `

## UAC bypass via event viewer
` (event_id:("1" or "4688") AND process_parent_path:" \\\\eventvwr.exe" AND not process_name:" \\\\mmc.exe" ) OR (event_id:"13" AND registry_key_path:" mscfile" AND registry_key_path:" shell " AND registry_key_path:" open " AND registry_key_path:" command ") `


Binary file added mitre/ATT&CK_windows_execution_matrix.xlsx
Binary file not shown.
Binary file added mitre/images/output.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
1 change: 1 addition & 0 deletions mitre/images/test
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@

Loading