Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Rule Tuning] Missing MITRE ATT&CK Mappings #2073

Merged
merged 24 commits into from
Jul 22, 2022
Merged
Show file tree
Hide file tree
Changes from 22 commits
Commits
Show all changes
24 commits
Select commit Hold shift + click to select a range
14ae38e
initial commit with eggshell mitre mapping added
terrancedejesus Jul 5, 2022
46e86a2
adding updated rules
terrancedejesus Jul 6, 2022
1c750f9
[Rule Tuning] MITRE for GCP rules
imays11 Jul 13, 2022
c26c57c
[Rule Tuning] Endgame Rule name updates for Mitre
imays11 Jul 13, 2022
a4aa076
Update rules/integrations/aws/persistence_redshift_instance_creation.…
terrancedejesus Jul 18, 2022
d4b03b5
Update rules/integrations/aws/exfiltration_rds_snapshot_restored.toml
terrancedejesus Jul 18, 2022
4655b62
Merge branch 'main' into 1987-rule-tuning-missing-mitre-attck-mappings
terrancedejesus Jul 18, 2022
c96bca5
adding 10 updated rules for google_workspace, ml and o365
terrancedejesus Jul 18, 2022
78a2f00
adding 22 rule updates for mitre att&ck mappings
terrancedejesus Jul 18, 2022
a752e7e
adding 24 rule updates related mainly to ML rules
terrancedejesus Jul 18, 2022
421c57b
adding 3 rules related to detection via ML
terrancedejesus Jul 18, 2022
755b49e
adding adjustments
terrancedejesus Jul 20, 2022
c196249
adding adjustments with solutions to recent pytest errors
terrancedejesus Jul 20, 2022
1f93f81
Merge branch 'main' into 1987-rule-tuning-missing-mitre-attck-mappings
terrancedejesus Jul 20, 2022
a942998
removed tabs from tags
terrancedejesus Jul 21, 2022
571c51b
adjusted mappings and added techniques
terrancedejesus Jul 21, 2022
9d07ff4
adjusted endgame rule mappings per review
terrancedejesus Jul 21, 2022
51acada
adjusted names to match different tactics
terrancedejesus Jul 21, 2022
c0d0451
added execution and defense evasion tag
terrancedejesus Jul 21, 2022
d56df62
Merge branch 'main' into 1987-rule-tuning-missing-mitre-attck-mappings
terrancedejesus Jul 21, 2022
f35fe00
adjustments to address errors from merging with main
terrancedejesus Jul 21, 2022
f87e936
added newlines to rules missing them at the end of the file
terrancedejesus Jul 21, 2022
23ee564
addressing file conflicts
terrancedejesus Jul 22, 2022
6677924
Merge branch 'main' into 1987-rule-tuning-missing-mitre-attck-mappings
terrancedejesus Jul 22, 2022
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Binary file removed detection_rules/etc/attack-v10.1.json.gz
Binary file not shown.
Binary file added detection_rules/etc/attack-v11.3.json.gz
Binary file not shown.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2021/01/12"
maturity = "production"
updated_date = "2021/03/03"
updated_date = "2022/07/05"

[rule]
author = ["Elastic"]
Expand All @@ -23,3 +23,21 @@ query = '''
event.category:process and event.type:(start or process_started) and process.name:espl and process.args:eyJkZWJ1ZyI6*
'''

[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
name = "Command and Scripting Interpreter"
reference = "https://attack.mitre.org/techniques/T1059/"
id = "T1059"
[[rule.threat.technique.subtechnique]]
id = "T1059.006"
name = "Python"
reference = "https://attack.mitre.org/techniques/T1059/006/"


[rule.threat.tactic]
name = "Execution"
reference = "https://attack.mitre.org/tactics/TA0002/"
id = "TA0002"


Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2020/06/04"
maturity = "production"
updated_date = "2021/07/20"
updated_date = "2022/07/05"
integration = "aws"

[rule]
Expand All @@ -28,7 +28,7 @@ references = ["https://docs.aws.amazon.com/IAM/latest/APIReference/API_AddUserTo
risk_score = 21
rule_id = "333de828-8190-4cf5-8d7c-7575846f6fe0"
severity = "low"
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Identity and Access"]
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Identity and Access", "Credential Access", "Persistence"]
timestamp_override = "event.ingested"
type = "query"

Expand Down
4 changes: 2 additions & 2 deletions rules/integrations/aws/exfiltration_rds_snapshot_export.toml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2021/06/06"
maturity = "production"
updated_date = "2021/09/30"
updated_date = "2022/07/05"
integration = "aws"

[rule]
Expand All @@ -27,7 +27,7 @@ references = ["https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_Sta
risk_score = 21
rule_id = "119c8877-8613-416d-a98a-96b6664ee73a"
severity = "low"
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Asset Visibility"]
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Asset Visibility", "Exfiltration"]
timestamp_override = "event.ingested"
type = "query"

Expand Down
23 changes: 15 additions & 8 deletions rules/integrations/aws/exfiltration_rds_snapshot_restored.toml
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
[metadata]
creation_date = "2021/06/29"
maturity = "production"
updated_date = "2021/10/15"
updated_date = "2022/07/05"
integration = "aws"

[rule]
author = ["Austin Songer"]
description = """
Identifies when an attempt was made to restore an RDS Snapshot. Snapshots are sometimes shared by threat actors in order to
exfiltrate bulk data. If the permissions were modified, verify if the snapshot was shared with an
exfiltrate bulk data or evade detection after performing malicious activities. If the permissions were modified, verify if the snapshot was shared with an
unauthorized or unexpected AWS account.
"""
false_positives = [
Expand All @@ -32,7 +32,7 @@ references = [
risk_score = 47
rule_id = "bf1073bf-ce26-4607-b405-ba1ed8e9e204"
severity = "medium"
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Asset Visibility"]
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Asset Visibility", "Defense Evasion"]
timestamp_override = "event.ingested"
type = "query"

Expand All @@ -41,12 +41,19 @@ event.dataset:aws.cloudtrail and event.provider:rds.amazonaws.com and event.acti
event.outcome:success
'''


[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
name = "Modify Cloud Compute Infrastructure"
reference = "https://attack.mitre.org/techniques/T1578/"
id = "T1578"
[[rule.threat.technique.subtechnique]]
id = "T1578.004"
name = "Revert Cloud Instance"
reference = "https://attack.mitre.org/techniques/T1578/004/"

[rule.threat.tactic]
id = "TA0010"
name = "Exfiltration"
reference = "https://attack.mitre.org/tactics/TA0010/"

[rule.threat.tactic]
name = "Defense Evasion"
reference = "https://attack.mitre.org/tactics/TA0005/"
id = "TA0005"
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2021/10/17"
maturity = "production"
updated_date = "2021/10/17"
updated_date = "2022/07/05"
integration = "aws"

[rule]
Expand Down Expand Up @@ -32,7 +32,7 @@ references = [
risk_score = 21
rule_id = "87594192-4539-4bc4-8543-23bc3d5bd2b4"
severity = "low"
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Monitoring"]
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Monitoring", "Impact"]
timestamp_override = "event.ingested"
type = "query"

Expand All @@ -45,7 +45,15 @@ event.outcome:success

[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
name = "Service Stop"
reference = "https://attack.mitre.org/techniques/T1489/"
id = "T1489"

[rule.threat.tactic]
id = "TA0040"
name = "Impact"
reference = "https://attack.mitre.org/tactics/TA0040/"



4 changes: 2 additions & 2 deletions rules/integrations/aws/persistence_rds_instance_creation.toml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2021/06/06"
maturity = "production"
updated_date = "2021/09/30"
updated_date = "2022/07/05"
integration = "aws"

[rule]
Expand All @@ -27,7 +27,7 @@ references = ["https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_Cre
risk_score = 21
rule_id = "f30f3443-4fbb-4c27-ab89-c3ad49d62315"
severity = "low"
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Asset Visibility"]
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Asset Visibility", "Persistence"]
timestamp_override = "event.ingested"
type = "query"

Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2022/04/12"
maturity = "production"
updated_date = "2022/04/12"
updated_date = "2022/07/05"
integration = "aws"

[rule]
Expand Down Expand Up @@ -32,7 +32,7 @@ risk_score = 21
rule_id = "015cca13-8832-49ac-a01b-a396114809f6"
severity = "low"
timestamp_override = "event.ingested"
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Asset Visibility"]
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Asset Visibility", "Persistence"]
type = "query"

query = '''
Expand Down
4 changes: 2 additions & 2 deletions rules/integrations/aws/persistence_route_table_created.toml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2021/06/05"
maturity = "production"
updated_date = "2022/04/20"
updated_date = "2022/07/05"
integration = "aws"

[rule]
Expand Down Expand Up @@ -32,7 +32,7 @@ references = [
risk_score = 21
rule_id = "e12c0318-99b1-44f2-830c-3a38a43207ca"
severity = "low"
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Network Security"]
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Network Security", "Persistence"]
timestamp_override = "event.ingested"
type = "query"

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ references = [
risk_score = 21
rule_id = "e7cd5982-17c8-4959-874c-633acde7d426"
severity = "low"
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Network Security"]
tags = ["Elastic", "Cloud", "AWS", "Continuous Monitoring", "SecOps", "Network Security", "Persistence"]
timestamp_override = "event.ingested"
type = "query"

Expand Down
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
[metadata]
creation_date = "2020/09/01"
maturity = "production"
updated_date = "2021/07/20"
updated_date = "2022/07/13"
integration = "azure"

[rule]
author = ["Elastic"]
description = """
Identifies when an Azure Automation runbook is deleted. An adversary may delete an Azure Automation runbook in order to
disrupt their target's automated business operations or to remove a malicious runbook that was used for persistence.
disrupt their target's automated business operations or to remove a malicious runbook for defense evasion.
"""
from = "now-25m"
index = ["filebeat-*", "logs-azure*"]
Expand All @@ -27,11 +27,20 @@ references = [
risk_score = 21
rule_id = "8ddab73b-3d15-4e5d-9413-47f05553c1d7"
severity = "low"
tags = ["Elastic", "Cloud", "Azure", "Continuous Monitoring", "SecOps", "Configuration Audit"]
tags = ["Elastic", "Cloud", "Azure", "Continuous Monitoring", "SecOps", "Configuration Audit", "Defense Evasion"]
timestamp_override = "event.ingested"
type = "query"

query = '''
event.dataset:azure.activitylogs and azure.activitylogs.operation_name:"MICROSOFT.AUTOMATION/AUTOMATIONACCOUNTS/RUNBOOKS/DELETE" and event.outcome:(Success or success)
event.dataset:azure.activitylogs and
azure.activitylogs.operation_name:"MICROSOFT.AUTOMATION/AUTOMATIONACCOUNTS/RUNBOOKS/DELETE" and
event.outcome:(Success or success)
'''

[[rule.threat]]
framework = "MITRE ATT&CK"

[rule.threat.tactic]
reference = "https://attack.mitre.org/tactics/TA0005/"
name = "Defense Evasion"
id = "TA0005"
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
[metadata]
creation_date = "2020/08/12"
maturity = "production"
updated_date = "2021/12/30"
updated_date = "2022/07/05"
integration = "azure"

[rule]
Expand Down Expand Up @@ -30,7 +30,7 @@ references = ["https://docs.microsoft.com/en-us/azure/role-based-access-control/
risk_score = 21
rule_id = "573f6e7a-7acf-4bcd-ad42-c4969124d3c0"
severity = "low"
tags = ["Elastic", "Cloud", "Azure", "Continuous Monitoring", "SecOps", "Network Security"]
tags = ["Elastic", "Cloud", "Azure", "Continuous Monitoring", "SecOps", "Network Security", "Impact"]
timestamp_override = "event.ingested"
type = "query"

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
creation_date = "2022/01/06"
integration = "azure"
maturity = "production"
updated_date = "2022/02/28"
updated_date = "2022/07/20"

[rule]
author = ["Elastic"]
Expand Down Expand Up @@ -48,7 +48,7 @@ id = "T1098"

[[rule.threat.technique.subtechnique]]
reference = "https://attack.mitre.org/techniques/T1098/003/"
name = "Add Office 365 Global Administrator Role"
name = "Additional Cloud Roles"
id = "T1098.003"

[rule.threat.tactic]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,11 +27,25 @@ references = ["https://cloud.google.com/storage/docs/key-terms#buckets"]
risk_score = 47
rule_id = "97359fd8-757d-4b1d-9af1-ef29e4a8680e"
severity = "medium"
tags = ["Elastic", "Cloud", "GCP", "Continuous Monitoring", "SecOps", "Identity and Access"]
tags = ["Elastic", "Cloud", "GCP", "Continuous Monitoring", "SecOps", "Identity and Access", "Defense Evasion"]
timestamp_override = "event.ingested"
type = "query"

query = '''
event.dataset:gcp.audit and event.action:"storage.buckets.update" and event.outcome:success
'''


[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1578"
name = "Modify Cloud Compute Infrastructure"
reference = "https://attack.mitre.org/techniques/T1578/"


[rule.threat.tactic]
id = "TA0005"
name = "Defense Evasion"
reference = "https://attack.mitre.org/tactics/TA0005/"

Original file line number Diff line number Diff line change
Expand Up @@ -29,11 +29,30 @@ references = ["https://cloud.google.com/vpc/docs/vpc"]
risk_score = 47
rule_id = "c58c3081-2e1d-4497-8491-e73a45d1a6d6"
severity = "medium"
tags = ["Elastic", "Cloud", "GCP", "Continuous Monitoring", "SecOps", "Configuration Audit"]
tags = ["Elastic", "Cloud", "GCP", "Continuous Monitoring", "SecOps", "Configuration Audit", "Defense Evasion"]
timestamp_override = "event.ingested"
type = "query"

query = '''
event.dataset:gcp.audit and event.action:v*.compute.networks.delete and event.outcome:success
'''


[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1562"
name = "Impair Defenses"
reference = "https://attack.mitre.org/techniques/T1562/"
[[rule.threat.technique.subtechnique]]
id = "T1562.007"
name = "Disable or Modify Cloud Firewall"
reference = "https://attack.mitre.org/techniques/T1562/007/"



[rule.threat.tactic]
id = "TA0005"
name = "Defense Evasion"
reference = "https://attack.mitre.org/tactics/TA0005/"

Original file line number Diff line number Diff line change
Expand Up @@ -29,11 +29,30 @@ references = ["https://cloud.google.com/vpc/docs/routes", "https://cloud.google.
risk_score = 21
rule_id = "9180ffdf-f3d0-4db3-bf66-7a14bcff71b8"
severity = "low"
tags = ["Elastic", "Cloud", "GCP", "Continuous Monitoring", "SecOps", "Configuration Audit"]
tags = ["Elastic", "Cloud", "GCP", "Continuous Monitoring", "SecOps", "Configuration Audit", "Defense Evasion"]
timestamp_override = "event.ingested"
type = "query"

query = '''
event.dataset:gcp.audit and event.action:(v*.compute.routes.insert or "beta.compute.routes.insert")
'''


[[rule.threat]]
framework = "MITRE ATT&CK"
[[rule.threat.technique]]
id = "T1562"
name = "Impair Defenses"
reference = "https://attack.mitre.org/techniques/T1562/"
[[rule.threat.technique.subtechnique]]
id = "T1562.007"
name = "Disable or Modify Cloud Firewall"
reference = "https://attack.mitre.org/techniques/T1562/007/"



[rule.threat.tactic]
id = "TA0005"
name = "Defense Evasion"
reference = "https://attack.mitre.org/tactics/TA0005/"

Loading