This repository has been archived by the owner on Nov 19, 2024. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 22
/
0808-defense_evasion_rules.xml
57 lines (48 loc) · 1.83 KB
/
0808-defense_evasion_rules.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
<group name="Defense Evasion,">
<rule id="255800" level="10">
<if_group>sysmon_event1</if_group>
<field name="win.eventdata.image">\\mshta.exe</field>
<regex>browser_broker.exe</regex>
<description>ATT&CK T1170: MSHTA execution demiguise techniques</description>
<group>MITRE,attack.t1170</group>
</rule>
<rule id="255801" level="10">
<if_group>sysmon_event1</if_group>
<field name="win.eventdata.image">\\mshta.exe</field>
<regex>chrome.exe</regex>
<description>ATT&CK T1170: MSHTA execution demiguise techniques</description>
<group>MITRE,attack.t1170</group>
</rule>
<rule id="255802" level="10">
<if_group>sysmon_event1</if_group>
<regex>firewall set opmode mode=disable</regex>
<description>ATT&CK T1089: Disabling the Windows Firewall</description>
<group>MITRE,attack.t1089</group>
</rule>
<rule id="255803" level="10">
<if_group>sysmon_event1</if_group>
<regex>advfirewall set currentprofile state off</regex>
<description>ATT&CK T1089: Disabling the Windows Firewall</description>
<group>MITRE,attack.t1089</group>
</rule>
<rule id="255804" level="10">
<if_group>sysmon_event_11</if_group>
<field name="win.eventdata.targetFilename">\\.arj</field>
<description>ATT&CK T1406: Filetype anomaly, unusual file type .arj</description>
<group>MITRE,attack.t1406</group>
</rule>
<rule id="255805" level="12">
<if_sid>255531</if_sid>
<field name="win.eventdata.image">sysmon64.exe</field>
<field name="win.eventdata.commandline">-u</field>
<description>Sysmon has been uninstalled</description>
<group>MITRE,attack.t1089</group>
</rule>
<rule id="255806" level="12">
<if_sid>255531</if_sid>
<field name="win.eventdata.image">fltmc.exe</field>
<field name="win.eventdata.commandline">unload</field>
<description>Unload Filter Driver, possibly sysmon</description>
<group>MITRE,attack.t1089,sysmon</group>
</rule>
</group>