Skip to content

Latest commit

 

History

History
15 lines (13 loc) · 16.8 KB

r_m_github_github_Privilege_Escalation.md

File metadata and controls

15 lines (13 loc) · 16.8 KB

Rules by Product and UseCase

Vendor: GitHub

Product: GitHub

Rules Models MITRE ATT&CK® TTPs Activity Types Parsers
47 7 57 2 56
Event Type Rules Models
app-activity T1098 - Account Manipulation
EM-InB-Ex: A user has been given mailbox permissions for an executive user
EM-InB-Perm-N-F: First time a user has given mailbox permissions on another mailbox that is not their own
EM-InB-Perm-N-A: Abnormal for user to give mailbox permissions

T1098.002 - Account Manipulation: Exchange Email Delegate Permissions
EM-InB-Ex: A user has been given mailbox permissions for an executive user
EM-InB-Perm-N-F: First time a user has given mailbox permissions on another mailbox that is not their own
EM-InB-Perm-N-A: Abnormal for user to give mailbox permissions
EM-InB-Perm-N: Models users who give mailbox permissions
process-created T1012 - Query Registry
ATP-REG-Password: Scanning registry hives via Reg Utility
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments
A-EPA-REG-Query-F: First execution of process with req query arguments for windows policies on this asset
A-EPA-REG-Query-A: Abnormal execution of process with req query arguments for windows policies on this asset

T1059 - Command and Scripting Interperter
WINCMD-WmiObject: Powershell WMI object to enumerate network adapter was used
A-SETUPCOMPLETE-PRIV-ESC: Privilege escalation attempt using the SetupComplete.cmd object on this asset
A-Powershell-Exec-DLL: PowerShell Strings applied to rundllas.exe seen in PowerShdll.dll on this asset.
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments
A-EPA-DLL: Dll loaded from a temp folder via PowerShell on this asset

T1059.001 - Command and Scripting Interperter: PowerShell
WINCMD-WmiObject: Powershell WMI object to enumerate network adapter was used
A-Powershell-Exec-DLL: PowerShell Strings applied to rundllas.exe seen in PowerShdll.dll on this asset.
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments
A-EPA-DLL: Dll loaded from a temp folder via PowerShell on this asset

T1218 - Signed Binary Proxy Execution
A-UAC-Bypass-COM-OBJECT: Windows UAC bypass using COM object access on this asset
A-DLL-AppData: DLL loaded from 'AppData(slash)Local' path on this asset
A-RunDll32-ControlPanel: RunDll32.exe run from the control panel on this asset
A-Powershell-Exec-DLL: PowerShell Strings applied to rundllas.exe seen in PowerShdll.dll on this asset.
A-Bypass-UAC-CMSTP: Child process of automatically elevated instance of Microsoft Connection Manager Profile Installer (cmstp.exe) was created via command line on this asset.
A-EPA-DLL: Dll loaded from a temp folder via PowerShell on this asset

T1218.011 - Signed Binary Proxy Execution: Rundll32
A-RunDll32-ControlPanel: RunDll32.exe run from the control panel on this asset
A-Powershell-Exec-DLL: PowerShell Strings applied to rundllas.exe seen in PowerShdll.dll on this asset.
A-EPA-DLL: Dll loaded from a temp folder via PowerShell on this asset

T1218.003 - Signed Binary Proxy Execution: CMSTP
A-UAC-Bypass-COM-OBJECT: Windows UAC bypass using COM object access on this asset
A-Bypass-UAC-CMSTP: Child process of automatically elevated instance of Microsoft Connection Manager Profile Installer (cmstp.exe) was created via command line on this asset.

T1548 - Abuse Elevation Control Mechanism
A-UAC-Bypass-COM-OBJECT: Windows UAC bypass using COM object access on this asset
A-UAC-Bypass-Fodhelper: UAC Bypass using fodhelper.exe on this asset
A-UAC-Bypass-Wsreset: UAC Bypass using wsreset.exe on this asset
A-Bypass-UAC-CMSTP: Child process of automatically elevated instance of Microsoft Connection Manager Profile Installer (cmstp.exe) was created via command line on this asset.

T1548.002 - Abuse Elevation Control Mechanism: Bypass User Account Control
A-UAC-Bypass-COM-OBJECT: Windows UAC bypass using COM object access on this asset
A-UAC-Bypass-Fodhelper: UAC Bypass using fodhelper.exe on this asset
A-UAC-Bypass-Wsreset: UAC Bypass using wsreset.exe on this asset
A-Bypass-UAC-CMSTP: Child process of automatically elevated instance of Microsoft Connection Manager Profile Installer (cmstp.exe) was created via command line on this asset.

T1027 - Obfuscated Files or Information
CSC-Suspicious-Folder: Csc.exe spawned from suspicious folder
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments

T1036 - Masquerading
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments

T1036.004 - T1036.004
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments

T1059.003 - T1059.003
A-SETUPCOMPLETE-PRIV-ESC: Privilege escalation attempt using the SetupComplete.cmd object on this asset
A-Operation-Wocao-Activity: Possible Operation-Wocao APT activity on this asset, suspicious command line arguments

T1033 - System Owner/User Discovery
A-WHOAMI-SYSTEM: Whoami commanded executed by LOCAL SYSTEM
A-AccountDiscovery: Local accounts were enumerated on this asset

T1087 - Account Discovery
EPA-OU-CENUM-F: First user running credential enumeration tool
EPA-OU-CENUM-A: Abnormal for this user to run credential enumeration tool
A-EPA-OH-CENUM-F: Asset running credential enumeration tool for the first time
A-EPA-OH-CENUM-A: Abnormal for this asset to run credential enumeration tool
A-NET-EXE-Recon: Enumeration and reconnaissance activities were performed on this asset
A-AccountDiscovery: Local accounts were enumerated on this asset

T1087.001 - Account Discovery: Local Account
EPA-OU-CENUM-F: First user running credential enumeration tool
EPA-OU-CENUM-A: Abnormal for this user to run credential enumeration tool
A-EPA-OH-CENUM-F: Asset running credential enumeration tool for the first time
A-EPA-OH-CENUM-A: Abnormal for this asset to run credential enumeration tool
A-AccountDiscovery: Local accounts were enumerated on this asset

T1082 - System Information Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool
A-NET-EXE-Recon: Enumeration and reconnaissance activities were performed on this asset

T1482 - Domain Trust Discovery
A-DomainTrust-Discovery: Enumeration of Windows Domain Trusts identified on this asset

T1222 - File and Directory Permissions Modification
A-File-Folder-Perm-Mod: The permissions of a file or folder were modified on this asset.

T1222.001 - File and Directory Permissions Modification: Windows File and Directory Permissions Modification
A-File-Folder-Perm-Mod: The permissions of a file or folder were modified on this asset.

T1574 - Hijack Execution Flow
PlugX-DLL-Sideloading: DLL loaded from suspicous location typically seen by the PlugX malware family
DLL-SideLoading: DLL sideloading malware used, known artifact of APT27
A-SETUPCOMPLETE-PRIV-ESC: Privilege escalation attempt using the SetupComplete.cmd object on this asset
A-Possible-PrivEsc-SvcPerms: Possible privilege escalation using weak service permissions on this asset
A-Sus-GUP-Usage: Execution of the Notepad++ updater in a suspicious directory on this asset.

T1574.002 - Hijack Execution Flow: DLL Side-Loading
PlugX-DLL-Sideloading: DLL loaded from suspicous location typically seen by the PlugX malware family
A-Sus-GUP-Usage: Execution of the Notepad++ updater in a suspicious directory on this asset.

T1218.002 - Signed Binary Proxy Execution: Control Panel
A-RunDll32-ControlPanel: RunDll32.exe run from the control panel on this asset

T1218.010 - Signed Binary Proxy Execution: Regsvr32
A-DLL-AppData: DLL loaded from 'AppData(slash)Local' path on this asset

T1558 - Steal or Forge Kerberos Tickets
A-POSS-SPN-ENUMERATION: Possible SPN Enumeration on this asset

T1558.003 - Steal or Forge Kerberos Tickets: Kerberoasting
A-POSS-SPN-ENUMERATION: Possible SPN Enumeration on this asset

T1003 - OS Credential Dumping
A-ShadowCP-SymLink: Shadow Copies Access via Symlink on this asset

T1543 - Create or Modify System Process
A-New-Service: New windows service created using sc.exe on this asset

T1543.003 - Create or Modify System Process: Windows Service
A-New-Service: New windows service created using sc.exe on this asset

T1053 - Scheduled Task/Job
A-INTERACTIVE-JOB: Interactive job from the 'at' program seen on this asset
A-PrivEsc-SchedTask-LegacyDACL: Possible privilege escalation using a legacy task file on this asset

T1053.005 - Scheduled Task/Job: Scheduled Task
A-PrivEsc-SchedTask-LegacyDACL: Possible privilege escalation using a legacy task file on this asset

T1574.011 - T1574.011
A-Possible-PrivEsc-SvcPerms: Possible privilege escalation using weak service permissions on this asset

T1053.002 - Scheduled Task/Job: At (Windows)
A-INTERACTIVE-JOB: Interactive job from the 'at' program seen on this asset

T1068 - Exploitation for Privilege Escalation
A-UAC-IE-INVOKE: Windows UAC consent dialogue was used to invoke an Internet Explorer process running as Local SYSTEM
A-APT-Hurricane-Panda: Artifacts used by the APT group 'Hurricane Panda' have been observed on this asset
A-SETUPCOMPLETE-PRIV-ESC: Privilege escalation attempt using the SetupComplete.cmd object on this asset

T1087.002 - Account Discovery: Domain Account
EPA-OU-CENUM-F: First user running credential enumeration tool
EPA-OU-CENUM-A: Abnormal for this user to run credential enumeration tool
A-EPA-OH-CENUM-F: Asset running credential enumeration tool for the first time
A-EPA-OH-CENUM-A: Abnormal for this asset to run credential enumeration tool

T1007 - System Service Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool

T1018 - Remote System Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool

T1049 - System Network Connections Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool

T1057 - Process Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool

T1135 - Network Share Discovery
EPA-OU-HENUM-F: First user running host enumeration tool
EPA-OU-HENUM-A: Abnormal for this user to run host enumeration tool
A-EPA-OH-HENUM-F: Asset running host enumeration tool for the first time
A-EPA-OH-HENUM-A: Abnormal for this asset to run host enumeration tool

T1047 - Windows Management Instrumentation
WINCMD-WmiObject: Powershell WMI object to enumerate network adapter was used
ATP-WMIC-Antivirus: Antivirus detection using windows utility msbuild.

T1127 - Trusted Developer Utilities Proxy Execution
ATP-WMIC-Antivirus: Antivirus detection using windows utility msbuild.

T1127.001 - Trusted Developer Utilities Proxy Execution: MSBuild
ATP-WMIC-Antivirus: Antivirus detection using windows utility msbuild.

T1518 - Software Discovery
ATP-WMIC-Antivirus: Antivirus detection using windows utility msbuild.

T1518.001 - T1518.001
ATP-WMIC-Antivirus: Antivirus detection using windows utility msbuild.

T1547 - Boot or Logon Autostart Execution
DLL-SideLoading: DLL sideloading malware used, known artifact of APT27

T1547.002 - T1547.002
DLL-SideLoading: DLL sideloading malware used, known artifact of APT27

T1027.004 - Obfuscated Files or Information: Compile After Delivery
CSC-Suspicious-Folder: Csc.exe spawned from suspicious folder

T1484 - Group Policy Modification
OG-SYSVOL-F: Suspicious SYSVOL Domain Group Policy Access for the first time for this peer group
OG-SYSVOL-A: Abnormal SYSVOL Domain Group Policy Access for thjis peer group

T1484.001 - T1484.001
OG-SYSVOL-F: Suspicious SYSVOL Domain Group Policy Access for the first time for this peer group
OG-SYSVOL-A: Abnormal SYSVOL Domain Group Policy Access for thjis peer group

T1552 - Unsecured Credentials
OG-SYSVOL-F: Suspicious SYSVOL Domain Group Policy Access for the first time for this peer group
OG-SYSVOL-A: Abnormal SYSVOL Domain Group Policy Access for thjis peer group

T1552.006 - T1552.006
OG-SYSVOL-F: Suspicious SYSVOL Domain Group Policy Access for the first time for this peer group
OG-SYSVOL-A: Abnormal SYSVOL Domain Group Policy Access for thjis peer group

T1134 - Access Token Manipulation
Suspicious-GetSystem-Usage: Possible Meterpeter/Cobalt Strike usage of GetSystem

T1134.001 - Access Token Manipulation: Token Impersonation/Theft
Suspicious-GetSystem-Usage: Possible Meterpeter/Cobalt Strike usage of GetSystem

T1134.002 - T1134.002
Suspicious-GetSystem-Usage: Possible Meterpeter/Cobalt Strike usage of GetSystem

T1016 - System Network Configuration Discovery
WINCMD-Arp: 'Arp' program used
WINCMD-WmiObject: Powershell WMI object to enumerate network adapter was used
A-EPA-REG-WU: Models reg query activity for windows update on the assets.
A-EPA-OH-CENUM: Assets on which credential enumeration tools are run
A-EPA-OH-HENUM: Assets on which host enumeration tools are run
EPA-OG-SYSVOL: SYSVOL domain group policy access by group in the organization
EPA-OU-CENUM: Users running credential enumeration tools
EPA-OU-HENUM: Users running host enumeration tools