2022-09-20 18:31:15 +08:00
rule = [
2022-09-21 15:28:07 +08:00
{
' rules ' : [
' action == " registryvalueset " and targetobject =~ " .*proxyenable " ' ,
] ,
' attck_hit ' : [ ' T1562.001 ' ] ,
' name ' : ' Impair Defenses: Disable or Modify Tools '
} ,
2022-09-20 18:31:15 +08:00
{
' rules ' : [
' action == " processaccess " and calltrace =~ " .*unknown.* " and not calltrace =~ " .*conpty \ .node.* " and not calltrace =~ " .*java \ .dll.* " and not calltrace =~ " .*appvisvsubsystems64 \ .dll.* " and not calltrace =~ " .*twinui \ .dll.* " and not calltrace =~ " .*nativeimages.* " and not targetimage == " c: \\ windows \\ system32 \\ cmd.exe " ' ,
] ,
' attck_hit ' : [ ' T1620 ' ] ,
' name ' : ' Reflective Code Loading '
} ,
{
' rules ' : [
' action == " processaccess " and calltrace =~ " .*wshom \ .ocx.* " ' ,
' action == " processaccess " and calltrace =~ " .*shell32 \ .dll.* " ' ,
' action == " processaccess " and calltrace =~ " .*dbgcore \ .dll.* " ' ,
' action == " processaccess " and calltrace =~ " .*kernelbase \ .dll \ +de67e.* " ' ,
' action == " processaccess " and calltrace =~ " .*framedynos \ .dll.* " ' ,
] ,
' attck_hit ' : [ ' T1559.001 ' ] ,
' name ' : ' Inter-Process Communication: Component Object Model '
} ,
# todo 懒得做详细的规则了.加油完善规则吧
{
' rules ' : [
' action == " createremotethread " ' ,
] ,
' attck_hit ' : [ ' T1055 ' ] ,
' name ' : ' Process Injection '
} ,
{
' rules ' : [
' action == " filecreatestreamhash " ' ,
] ,
' attck_hit ' : [ ' T1564.004 ' ] ,
' name ' : ' Hide Artifacts: NTFS File Attributes '
} ,
{
' rules ' : [
' action == " dnsquery " ' ,
] ,
' attck_hit ' : [ ' T1071.004 ' ] ,
' name ' : ' Application Layer Protocol: DNS '
} ,
2022-09-21 15:28:07 +08:00
{
' rules ' : [
' action == " filecreatetimechange " ' ,
] ,
' attck_hit ' : [ ' T1070.006 ' ] ,
' name ' : ' Indicator Removal on Host: Timestomp '
} ,
2022-09-20 18:31:15 +08:00
{
' rules ' : [
' action == " networkconnect " ' ,
] ,
' attck_hit ' : [ ' T1071 ' ] ,
' name ' : ' Application Layer Protocol '
} ,
{
' rules ' : [
' action == " clipboardchange " ' ,
] ,
' attck_hit ' : [ ' T1115 ' ] ,
' name ' : ' Clipboard Data Monitor API '
} ,
{
' rules ' : [
' action == " processtampering " ' ,
] ,
' attck_hit ' : [ ' T1574 ' ] ,
' name ' : ' Hijack Execution Flow '
} ,
{
' rules ' : [
' action == " filecreate " and targetfilename =~ " c: \\ \\ \\ \\ windows \\ \\ \\ \\ .* " ' ,
' action == " filecreate " and targetfilename =~ " .* \ .exe " ' ,
' action == " filecreate " and targetfilename =~ " .* \ .cmd " ' ,
' action == " filecreate " and targetfilename =~ " .* \ .bat " ' ,
' action == " filecreate " and targetfilename =~ " .* \ .dll " ' ,
] ,
' attck_hit ' : [ ' T1036.005 ' ] ,
' name ' : ' Masquerading: Match Legitimate Name or Location '
} ,
{
' rules ' : [
' action == " filecreate " and targetfilename =~ " c: \\ \\ \\ \\ windows \\ \\ \\ \\ .* " ' ,
] ,
' attck_hit ' : [ ' T1036.005 ' ] ,
' name ' : ' Masquerading: Match Legitimate Name or Location '
} ,
{
' rules ' : [
' action == " filecreate " and targetfilename =~ " c: \\ \\ \\ \\ users \\ \\ \\ \\ .* " ' ,
' action == " filecreate " and targetfilename =~ " .* \ .exe " ' ,
' action == " filecreate " and targetfilename =~ " .* \ .cmd " ' ,
' action == " filecreate " and targetfilename =~ " .* \ .bat " ' ,
' action == " filecreate " and targetfilename =~ " .* \ .dll " ' ,
] ,
' attck_hit ' : [ ' T1036.005 ' ] ,
' name ' : ' Masquerading: Match Legitimate Name or Location '
} ,
{
' rules ' : [
' action == " imageload " and imageloaded == " c: \\ windows \\ system32 \\ samlib.dll " ' ,
] ,
' attck_hit ' : [ ' T1003.002 ' ] ,
' name ' : ' OS Credential Dumping: Security Account Manager '
2022-09-21 15:28:07 +08:00
} ,
{
' rules ' : [
' action == " imageload " and imageloaded =~ " .*credui.dll " ' ,
] ,
' attck_hit ' : [ ' T1047 ' ] ,
' name ' : ' Windows Management Instrumentation '
} ,
{
' rules ' : [
' action == " imageload " and imageloaded =~ " .*dbghelp.dll " ' ,
] ,
' attck_hit ' : [ ' T1622 ' ] ,
' name ' : ' Debugger Evasion '
} ,
{
' rules ' : [
' action == " imageload " and imageloaded =~ " .*winhttp.dll " ' ,
' action == " imageload " and imageloaded =~ " .*urlmon.dll " ' ,
] ,
' attck_hit ' : [ ' T1071.001 ' ] ,
' name ' : ' Application Layer Protocol: Web Protocols '
} ,
{
' rules ' : [
' action == " imageload " and imageloaded =~ " .*dnsapi.dll " ' ,
] ,
' attck_hit ' : [ ' T1071.004 ' ] ,
' name ' : ' Application Layer Protocol: DNS '
} ,
# 不应该用dll来当T的,这里应该是api的hook.但是sysmon没这些ds,只能凑合.这非常不专业
{
' rules ' : [
' action == " imageload " and imageloaded =~ " .*rtutils.dll " ' ,
] ,
' attck_hit ' : [ ' CMT0001 ' ] ,
' name ' : ' Event trace manipulation '
} ,
{
' rules ' : [
' action == " imageload " and imageloaded =~ " .*rasapi32.dll " ' ,
] ,
' attck_hit ' : [ ' CMT0002 ' ] ,
' name ' : ' rasapi32 manipulation '
} ,
{
' rules ' : [
' action == " imageload " and imageloaded =~ " .*napinsp.dll " ' ,
] ,
' attck_hit ' : [ ' CMT0003 ' ] ,
' name ' : ' napinsp manipulation '
2022-09-20 18:31:15 +08:00
}
]