@gendigital/sage 0.4.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,810 @@
1
+ # MITRE ATT&CK threat detection patterns for Sage
2
+ # Author: Gen Digital Inc.
3
+ # License: DRL-1.1 (see threats/LICENSE)
4
+ # Schema: id, category, severity, confidence, action, pattern, match_on, title, expires_at, revoked
5
+
6
+ # --- T1003.001: LSASS Memory ---
7
+ - id: "CLT-MITRE-001"
8
+ category: credential_access
9
+ severity: critical
10
+ confidence: 0.90
11
+ action: block
12
+ pattern: "(rundll32(\\.exe)?.*comsvcs\\.dll,MiniDump.*|procdump.*-ma.*lsass\\.exe.*lsass_dump|sekurlsa::Minidump.*lsassdump\\.dmp|sekurlsa::logonPasswords)"
13
+ case_insensitive: true
14
+ match_on: command
15
+ title: "MITRE ATT&CK T1003.001 - LSASS Memory"
16
+ expires_at: null
17
+ revoked: false
18
+
19
+ # --- T1003.002: Security Account Manager ---
20
+ - id: "CLT-MITRE-002"
21
+ category: credential_access
22
+ severity: critical
23
+ confidence: 0.90
24
+ action: block
25
+ pattern: "(reg.*save.*HKLM.*sam.*sam|reg.*save.*HKLM.*system.*system)"
26
+ case_insensitive: true
27
+ match_on: command
28
+ title: "MITRE ATT&CK T1003.002 - Security Account Manager"
29
+ expires_at: null
30
+ revoked: false
31
+
32
+ # --- T1003.003: NTDS ---
33
+ - id: "CLT-MITRE-003"
34
+ category: credential_access
35
+ severity: critical
36
+ confidence: 0.90
37
+ action: block
38
+ pattern: "ntdsutil(\\.exe)?"
39
+ case_insensitive: true
40
+ match_on: command
41
+ title: "MITRE ATT&CK T1003.003 - NTDS"
42
+ expires_at: null
43
+ revoked: false
44
+
45
+ # --- T1003.004: LSA Secrets ---
46
+ - id: "CLT-MITRE-004"
47
+ category: credential_access
48
+ severity: critical
49
+ confidence: 0.90
50
+ action: block
51
+ pattern: "Get-LSASecret\\.ps1"
52
+ case_insensitive: true
53
+ match_on: command
54
+ title: "MITRE ATT&CK T1003.004 - LSA Secrets"
55
+ expires_at: null
56
+ revoked: false
57
+
58
+ # --- T1003.005: Cached Domain Credentials ---
59
+ - id: "CLT-MITRE-005"
60
+ category: credential_access
61
+ severity: critical
62
+ confidence: 0.90
63
+ action: block
64
+ pattern: "cmdkey(\\.exe)?.*/list"
65
+ case_insensitive: true
66
+ match_on: command
67
+ title: "MITRE ATT&CK T1003.005 - Cached Domain Credentials"
68
+ expires_at: null
69
+ revoked: false
70
+
71
+ # --- T1003.006: DC Sync ---
72
+ - id: "CLT-MITRE-006"
73
+ category: credential_access
74
+ severity: critical
75
+ confidence: 0.90
76
+ action: block
77
+ pattern: "Invoke-Mimikatz.*-Command.*lsadump::dcsync.*/user:"
78
+ case_insensitive: true
79
+ match_on: command
80
+ title: "MITRE ATT&CK T1003.006 - DC Sync"
81
+ expires_at: null
82
+ revoked: false
83
+
84
+ # --- T1003: OS Credential Dumping ---
85
+ - id: "CLT-MITRE-007"
86
+ category: credential_access
87
+ severity: critical
88
+ confidence: 0.90
89
+ action: block
90
+ pattern: "(reg(\\.exe)? (save|export).*SAM|(PasswordDump|CreateMiniDump)|Invoke-PowerDump\\.ps1|Get-PassHashes\\.ps1|Get-RegAutoLogon\\.ps1)"
91
+ case_insensitive: true
92
+ match_on: command
93
+ title: "MITRE ATT&CK T1003 - OS Credential Dumping"
94
+ expires_at: null
95
+ revoked: false
96
+
97
+ # --- T1020: Automated Exfiltration ---
98
+ - id: "CLT-MITRE-012"
99
+ category: exfiltration
100
+ severity: high
101
+ confidence: 0.80
102
+ action: require_approval
103
+ pattern: "(rar(\\.exe)?.*[afu].*(-dw|-tb|-ta)|7z(\\.exe)?.*[au].*-sdel|Add-Exfiltration\\.ps1|Do-Exfiltration\\.ps1|Invoke-PostExfil\\.ps1)"
104
+ case_insensitive: true
105
+ match_on: command
106
+ title: "MITRE ATT&CK T1020 - Automated Exfiltration"
107
+ expires_at: null
108
+ revoked: false
109
+
110
+ # --- T1021.003: Distributed Component Object Model ---
111
+ - id: "CLT-MITRE-014"
112
+ category: lateral_movement
113
+ severity: high
114
+ confidence: 0.80
115
+ action: require_approval
116
+ pattern: "Invoke-DCOM.*\\-ComputerName"
117
+ case_insensitive: true
118
+ match_on: command
119
+ title: "MITRE ATT&CK T1021.003 - Distributed Component Object Model"
120
+ expires_at: null
121
+ revoked: false
122
+
123
+ # --- T1027.003: Steganography ---
124
+ - id: "CLT-MITRE-016"
125
+ category: defense_evasion
126
+ severity: high
127
+ confidence: 0.80
128
+ action: require_approval
129
+ pattern: "(Invoke-PSImage.*-Script|Invoke-PSImage)"
130
+ case_insensitive: true
131
+ match_on: command
132
+ title: "MITRE ATT&CK T1027.003 - Steganography"
133
+ expires_at: null
134
+ revoked: false
135
+
136
+ # --- T1027.005: Indicator Removalfrom Tools ---
137
+ - id: "CLT-MITRE-017"
138
+ category: defense_evasion
139
+ severity: high
140
+ confidence: 0.80
141
+ action: require_approval
142
+ pattern: "Find-AVSignature.*-Startbyte"
143
+ case_insensitive: true
144
+ match_on: command
145
+ title: "MITRE ATT&CK T1027.005 - Indicator Removalfrom Tools"
146
+ expires_at: null
147
+ revoked: false
148
+
149
+ # --- T1040: Network Sniffing ---
150
+ - id: "CLT-MITRE-020"
151
+ category: credential_access
152
+ severity: high
153
+ confidence: 0.80
154
+ action: require_approval
155
+ pattern: "netsh(\\.exe)?.*start.*trace"
156
+ case_insensitive: true
157
+ match_on: command
158
+ title: "MITRE ATT&CK T1040 - Network Sniffing"
159
+ expires_at: null
160
+ revoked: false
161
+
162
+ # --- T1046: Network Service Scanning ---
163
+ - id: "CLT-MITRE-022"
164
+ category: discovery
165
+ severity: high
166
+ confidence: 0.80
167
+ action: require_approval
168
+ pattern: "(telnet(\\.exe)?|nmap(\\.exe)?|Invoke-ARPScan\\.ps1|Invoke-PortScan\\.ps1|Invoke-SMBScanner\\.ps1|Port-Scan\\.ps1)"
169
+ case_insensitive: true
170
+ match_on: command
171
+ title: "MITRE ATT&CK T1046 - Network Service Scanning"
172
+ expires_at: null
173
+ revoked: false
174
+
175
+ # --- T1048: Exfiltration Over Alternative Protocol ---
176
+ - id: "CLT-MITRE-023"
177
+ category: exfiltration
178
+ severity: critical
179
+ confidence: 0.90
180
+ action: block
181
+ pattern: "(dnscat2|iodine)"
182
+ case_insensitive: true
183
+ match_on: command
184
+ title: "MITRE ATT&CK T1048 - Exfiltration Over Alternative Protocol"
185
+ expires_at: null
186
+ revoked: false
187
+
188
+ # --- T1053.005: Scheduled Task ---
189
+ - id: "CLT-MITRE-026"
190
+ category: persistence
191
+ severity: high
192
+ confidence: 0.80
193
+ action: require_approval
194
+ pattern: "(schtasks(\\.exe)?\\s+/create|schtasks(\\.exe)?\\s+/%windir:~0,1%reate|at\\.exe)"
195
+ case_insensitive: true
196
+ match_on: command
197
+ title: "MITRE ATT&CK T1053.005 - Scheduled Task"
198
+ expires_at: null
199
+ revoked: false
200
+
201
+ # --- T1055.001: Dynamiclink Library Injection ---
202
+ - id: "CLT-MITRE-027"
203
+ category: defense_evasion
204
+ severity: critical
205
+ confidence: 0.90
206
+ action: block
207
+ pattern: "Invoke-DllInjection\\.ps1"
208
+ case_insensitive: true
209
+ match_on: command
210
+ title: "MITRE ATT&CK T1055.001 - Dynamiclink Library Injection"
211
+ expires_at: null
212
+ revoked: false
213
+
214
+ # --- T1069: Permission Groups Discovery ---
215
+ - id: "CLT-MITRE-032"
216
+ category: discovery
217
+ severity: medium
218
+ confidence: 0.70
219
+ action: require_approval
220
+ pattern: "Get-ManagementRoleAssignment"
221
+ case_insensitive: true
222
+ match_on: command
223
+ title: "MITRE ATT&CK T1069 - Permission Groups Discovery"
224
+ expires_at: null
225
+ revoked: false
226
+
227
+ # --- T1070.004: File Deletion ---
228
+ - id: "CLT-MITRE-033"
229
+ category: defense_evasion
230
+ severity: high
231
+ confidence: 0.80
232
+ action: require_approval
233
+ pattern: "(cmd(\\.exe)?\\s+/c\\s+del\\s+/[sqf]|fsutil(\\.exe)?.*usn.*deleteJournal)"
234
+ case_insensitive: true
235
+ match_on: command
236
+ title: "MITRE ATT&CK T1070.004 - File Deletion"
237
+ expires_at: null
238
+ revoked: false
239
+
240
+ # --- T1070.005: Network Share Connection Removal ---
241
+ - id: "CLT-MITRE-034"
242
+ category: defense_evasion
243
+ severity: high
244
+ confidence: 0.80
245
+ action: require_approval
246
+ pattern: "net(1)?(\\.exe)?.*use.*\\\\\\\\.*\\\\.*/delete$"
247
+ case_insensitive: true
248
+ match_on: command
249
+ title: "MITRE ATT&CK T1070.005 - Network Share Connection Removal"
250
+ expires_at: null
251
+ revoked: false
252
+
253
+ # --- T1087.002: Domain Account ---
254
+ - id: "CLT-MITRE-037"
255
+ category: discovery
256
+ severity: medium
257
+ confidence: 0.70
258
+ action: require_approval
259
+ pattern: "(net1.*user.*/dom|net(\\.exe)?.*user.*/dom|net1.*group.*/dom|net(\\.exe)?.*group.*/dom)"
260
+ case_insensitive: true
261
+ match_on: command
262
+ title: "MITRE ATT&CK T1087.002 - Domain Account"
263
+ expires_at: null
264
+ revoked: false
265
+
266
+ # --- T1087.003: Email Account ---
267
+ - id: "CLT-MITRE-038"
268
+ category: discovery
269
+ severity: medium
270
+ confidence: 0.70
271
+ action: require_approval
272
+ pattern: "Get-.*GlobalAddressList"
273
+ case_insensitive: true
274
+ match_on: command
275
+ title: "MITRE ATT&CK T1087.003 - Email Account"
276
+ expires_at: null
277
+ revoked: false
278
+
279
+ # --- T1098.002: Exchange Email Delegate Permissions ---
280
+ - id: "CLT-MITRE-039"
281
+ category: persistence
282
+ severity: high
283
+ confidence: 0.80
284
+ action: require_approval
285
+ pattern: "Add-MailboxPermission"
286
+ case_insensitive: true
287
+ match_on: command
288
+ title: "MITRE ATT&CK T1098.002 - Exchange Email Delegate Permissions"
289
+ expires_at: null
290
+ revoked: false
291
+
292
+ # --- T1098: Account Manipulation ---
293
+ - id: "CLT-MITRE-040"
294
+ category: persistence
295
+ severity: high
296
+ confidence: 0.80
297
+ action: require_approval
298
+ pattern: "(net(1|\\.exe)?.*user.*\\w+.*/add|net(1|\\.exe)?.*group.*Administrators.*\\w+ /add|net(1|\\.exe)?.*localgroup.*Administrators.*\\w+ /add)"
299
+ case_insensitive: true
300
+ match_on: command
301
+ title: "MITRE ATT&CK T1098 - Account Manipulation"
302
+ expires_at: null
303
+ revoked: false
304
+
305
+ # --- T1105: Ingress Tool Transfer ---
306
+ - id: "CLT-MITRE-041"
307
+ category: command_and_control
308
+ severity: high
309
+ confidence: 0.80
310
+ action: require_approval
311
+ pattern: "(certutil(\\.exe)?.*-(decode|decodehex|encode|ping|url|urlcache|verifyctl)|MpCmdRun(\\.exe)?.*-DownloadFile.*-url.*http|\\(new-object System\\.Net\\.WebClient\\)\\.DownloadFile|bitsadmin(\\.exe)?.*/(transfer|download|create|addfile|setnotifycmdline|resume|complete)|Start-BitsTransfer)"
312
+ case_insensitive: true
313
+ match_on: command
314
+ title: "MITRE ATT&CK T1105 - Ingress Tool Transfer"
315
+ expires_at: null
316
+ revoked: false
317
+
318
+ # --- T1110.004: Credential Stuffing ---
319
+ - id: "CLT-MITRE-042"
320
+ category: credential_access
321
+ severity: high
322
+ confidence: 0.80
323
+ action: require_approval
324
+ pattern: "Invoke-CredentialInjection\\.ps1"
325
+ case_insensitive: true
326
+ match_on: command
327
+ title: "MITRE ATT&CK T1110.004 - Credential Stuffing"
328
+ expires_at: null
329
+ revoked: false
330
+
331
+ # --- T1120: Peripheral Device Discovery ---
332
+ - id: "CLT-MITRE-043"
333
+ category: discovery
334
+ severity: medium
335
+ confidence: 0.70
336
+ action: require_approval
337
+ pattern: "(Get-WMIObject.*Win32_PnPEntity|pnputil(\\.exe)?.*/enum-devices)"
338
+ case_insensitive: true
339
+ match_on: command
340
+ title: "MITRE ATT&CK T1120 - Peripheral Device Discovery"
341
+ expires_at: null
342
+ revoked: false
343
+
344
+ # --- T1136.001: Local Account ---
345
+ - id: "CLT-MITRE-048"
346
+ category: persistence
347
+ severity: high
348
+ confidence: 0.80
349
+ action: require_approval
350
+ pattern: "net(1)?(\\.exe)?.*user.*/add"
351
+ case_insensitive: true
352
+ match_on: command
353
+ title: "MITRE ATT&CK T1136.001 - Local Account"
354
+ expires_at: null
355
+ revoked: false
356
+
357
+ # --- T1136.002: Domain Account ---
358
+ - id: "CLT-MITRE-049"
359
+ category: persistence
360
+ severity: high
361
+ confidence: 0.80
362
+ action: require_approval
363
+ pattern: "net(1)?(\\.exe)?.*user.*/add.*/domain"
364
+ case_insensitive: true
365
+ match_on: command
366
+ title: "MITRE ATT&CK T1136.002 - Domain Account"
367
+ expires_at: null
368
+ revoked: false
369
+
370
+ # --- T1201: Password Policy Discovery ---
371
+ - id: "CLT-MITRE-050"
372
+ category: discovery
373
+ severity: medium
374
+ confidence: 0.70
375
+ action: require_approval
376
+ pattern: "(net.*accounts|Get-ADDefaultDomainPasswordPolicy|Get-PassPol)"
377
+ case_insensitive: true
378
+ match_on: command
379
+ title: "MITRE ATT&CK T1201 - Password Policy Discovery"
380
+ expires_at: null
381
+ revoked: false
382
+
383
+ # --- T1202: Indirect Command Execution ---
384
+ - id: "CLT-MITRE-051"
385
+ category: defense_evasion
386
+ severity: high
387
+ confidence: 0.80
388
+ action: require_approval
389
+ pattern: "(regsvr32(\\.exe)?.*/i:http(s)?://.+.*scrobj\\.dll|rundll32(\\.exe)?.*pcwutl\\.dll,LaunchApplication|rundll32(\\.exe)?.*shell32\\.dll,ShellExec_RunDLL|rundll32(\\.exe)?.*url\\.dll,OpenURL|msiexec(\\.exe)?.*-(Y|Z)|regasm(\\.exe)?.*/u.*\\\\)"
390
+ case_insensitive: true
391
+ match_on: command
392
+ title: "MITRE ATT&CK T1202 - Indirect Command Execution"
393
+ expires_at: null
394
+ revoked: false
395
+
396
+ # --- T1203: Exploitationfor Client Execution ---
397
+ - id: "CLT-MITRE-052"
398
+ category: execution
399
+ severity: critical
400
+ confidence: 0.90
401
+ action: block
402
+ pattern: "(p\\^+o\\^+w\\^+e\\^+r\\^+s\\^+h\\^+e\\^+l\\^+l|w\\^+s\\^+c\\^+r\\^+i\\^+p\\^+t|c\\^+e\\^+r\\^+t\\^+u\\^+t\\^+i\\^+l|m\\^+s\\^+h\\^+t\\^+a|explorer\\.exe .*\\.vbs$)"
403
+ case_insensitive: true
404
+ match_on: command
405
+ title: "MITRE ATT&CK T1203 - Exploitationfor Client Execution"
406
+ expires_at: null
407
+ revoked: false
408
+
409
+ # --- T1216.001: Pub Prn ---
410
+ - id: "CLT-MITRE-053"
411
+ category: defense_evasion
412
+ severity: high
413
+ confidence: 0.80
414
+ action: require_approval
415
+ pattern: "pubprn\\.vbs"
416
+ case_insensitive: true
417
+ match_on: command
418
+ title: "MITRE ATT&CK T1216.001 - Pub Prn"
419
+ expires_at: null
420
+ revoked: false
421
+
422
+ # --- T1218.012: Verclsid ---
423
+ - id: "CLT-MITRE-064"
424
+ category: defense_evasion
425
+ severity: high
426
+ confidence: 0.80
427
+ action: require_approval
428
+ pattern: "verclsid(\\.exe)?.*/S.*/C.*\\{[0-9a-fA-F]{8}"
429
+ case_insensitive: true
430
+ match_on: command
431
+ title: "MITRE ATT&CK T1218.012 - Verclsid"
432
+ expires_at: null
433
+ revoked: false
434
+
435
+ # --- T1220: XSL Script Processing ---
436
+ - id: "CLT-MITRE-065"
437
+ category: defense_evasion
438
+ severity: high
439
+ confidence: 0.80
440
+ action: require_approval
441
+ pattern: "(msxsl(\\.exe)?.+\\.xsl|wmic(\\.exe)?.*process.*list.*/FORMAT:.+\\.xsl|wmic(\\.exe)?.*os.*get.*/FORMAT:.+\\.xsl|wmic.*process.*list.*/FORMAT:evil\\[\\.\\]xsl|wmic.*os.*get.*/FORMAT:https\\[:\\]//example\\[\\.\\]com/evil\\[\\.\\]xsl)"
442
+ case_insensitive: true
443
+ match_on: command
444
+ title: "MITRE ATT&CK T1220 - XSL Script Processing"
445
+ expires_at: null
446
+ revoked: false
447
+
448
+ # --- T1482: Domain Trust Discovery ---
449
+ - id: "CLT-MITRE-066"
450
+ category: discovery
451
+ severity: medium
452
+ confidence: 0.70
453
+ action: require_approval
454
+ pattern: "(nltest(\\.exe)?.*/domain_trusts|dsquery(\\.exe)?.*/trustedDomain|Get-NetDomainTrust|Get-NetForestTrust|Get-ADDomain)"
455
+ case_insensitive: true
456
+ match_on: command
457
+ title: "MITRE ATT&CK T1482 - Domain Trust Discovery"
458
+ expires_at: null
459
+ revoked: false
460
+
461
+ # --- T1484.001: Group Policy Modification ---
462
+ - id: "CLT-MITRE-067"
463
+ category: defense_evasion
464
+ severity: high
465
+ confidence: 0.80
466
+ action: require_approval
467
+ pattern: "(New-GPOImmediateTask|New-.*GPOImmediateTask)"
468
+ case_insensitive: true
469
+ match_on: command
470
+ title: "MITRE ATT&CK T1484.001 - Group Policy Modification"
471
+ expires_at: null
472
+ revoked: false
473
+
474
+ # --- T1518.001: Security Software Discovery ---
475
+ - id: "CLT-MITRE-071"
476
+ category: discovery
477
+ severity: medium
478
+ confidence: 0.70
479
+ action: require_approval
480
+ pattern: "(tasklist(\\.exe)?.+(virus|defender|cylance)|wmic(\\.exe)?.+Path.*AntiVirusProduct)"
481
+ case_insensitive: true
482
+ match_on: command
483
+ title: "MITRE ATT&CK T1518.001 - Security Software Discovery"
484
+ expires_at: null
485
+ revoked: false
486
+
487
+ # --- T1518: Software Discovery ---
488
+ - id: "CLT-MITRE-072"
489
+ category: discovery
490
+ severity: medium
491
+ confidence: 0.70
492
+ action: require_approval
493
+ pattern: "wmic(\\.exe)? product get name"
494
+ case_insensitive: true
495
+ match_on: command
496
+ title: "MITRE ATT&CK T1518 - Software Discovery"
497
+ expires_at: null
498
+ revoked: false
499
+
500
+ # --- T1546.001: Change Default File Association ---
501
+ - id: "CLT-MITRE-075"
502
+ category: persistence
503
+ severity: high
504
+ confidence: 0.80
505
+ action: require_approval
506
+ pattern: "cmd(\\.exe)?.*/c.+assoc"
507
+ case_insensitive: true
508
+ match_on: command
509
+ title: "MITRE ATT&CK T1546.001 - Change Default File Association"
510
+ expires_at: null
511
+ revoked: false
512
+
513
+ # --- T1546.003: Windows Management Instrumentation Event Subscription ---
514
+ - id: "CLT-MITRE-076"
515
+ category: persistence
516
+ severity: high
517
+ confidence: 0.80
518
+ action: require_approval
519
+ pattern: "scrcons\\.exe"
520
+ case_insensitive: true
521
+ match_on: command
522
+ title: "MITRE ATT&CK T1546.003 - Windows Management Instrumentation Event Subscription"
523
+ expires_at: null
524
+ revoked: false
525
+
526
+ # --- T1546.007: Netsh Helper DLL ---
527
+ - id: "CLT-MITRE-077"
528
+ category: persistence
529
+ severity: high
530
+ confidence: 0.80
531
+ action: require_approval
532
+ pattern: "netsh\\.exe add helper"
533
+ case_insensitive: true
534
+ match_on: command
535
+ title: "MITRE ATT&CK T1546.007 - Netsh Helper DLL"
536
+ expires_at: null
537
+ revoked: false
538
+
539
+ # --- T1546.012: Image File Execution Options Injection ---
540
+ - id: "CLT-MITRE-078"
541
+ category: persistence
542
+ severity: high
543
+ confidence: 0.80
544
+ action: require_approval
545
+ pattern: "(Add-ScrnSaveBackdoor\\.ps1|Add-RegBackdoor\\.ps1)"
546
+ case_insensitive: true
547
+ match_on: command
548
+ title: "MITRE ATT&CK T1546.012 - Image File Execution Options Injection"
549
+ expires_at: null
550
+ revoked: false
551
+
552
+ # --- T1547: Bootor Logon Autostart Execution ---
553
+ - id: "CLT-MITRE-081"
554
+ category: persistence
555
+ severity: high
556
+ confidence: 0.80
557
+ action: require_approval
558
+ pattern: "Add-Persistence\\.ps1"
559
+ case_insensitive: true
560
+ match_on: command
561
+ title: "MITRE ATT&CK T1547 - Bootor Logon Autostart Execution"
562
+ expires_at: null
563
+ revoked: false
564
+
565
+ # --- T1548.002: Bypass User Account Control ---
566
+ - id: "CLT-MITRE-082"
567
+ category: privilege_escalation
568
+ severity: high
569
+ confidence: 0.80
570
+ action: require_approval
571
+ pattern: "(Invoke-BypassUAC\\.ps1|Invoke-WScriptBypassUAC\\.ps1|Add-MpPreference\\.ps1)"
572
+ case_insensitive: true
573
+ match_on: command
574
+ title: "MITRE ATT&CK T1548.002 - Bypass User Account Control"
575
+ expires_at: null
576
+ revoked: false
577
+
578
+ # --- T1552.002: Credentialsin Registry ---
579
+ - id: "CLT-MITRE-083"
580
+ category: credential_access
581
+ severity: high
582
+ confidence: 0.80
583
+ action: require_approval
584
+ pattern: "reg(\\.exe)? query (HKLM|HKCU) /f password /t REG_SZ /s"
585
+ case_insensitive: true
586
+ match_on: command
587
+ title: "MITRE ATT&CK T1552.002 - Credentialsin Registry"
588
+ expires_at: null
589
+ revoked: false
590
+
591
+ # --- T1553.004: Install Root Certificate ---
592
+ - id: "CLT-MITRE-085"
593
+ category: defense_evasion
594
+ severity: high
595
+ confidence: 0.80
596
+ action: require_approval
597
+ pattern: "(certutil(\\.exe)? -addstore|certmgr(\\.exe)? -add)"
598
+ case_insensitive: true
599
+ match_on: command
600
+ title: "MITRE ATT&CK T1553.004 - Install Root Certificate"
601
+ expires_at: null
602
+ revoked: false
603
+
604
+ # --- T1555.003: Credentialsfrom Web Browsers ---
605
+ - id: "CLT-MITRE-086"
606
+ category: credential_access
607
+ severity: high
608
+ confidence: 0.80
609
+ action: require_approval
610
+ pattern: "(Get-ChromeDump\\.ps1|Get-FoxDump\\.ps1)"
611
+ case_insensitive: true
612
+ match_on: command
613
+ title: "MITRE ATT&CK T1555.003 - Credentialsfrom Web Browsers"
614
+ expires_at: null
615
+ revoked: false
616
+
617
+ # --- T1555: Credentialsfrom Password Stores ---
618
+ - id: "CLT-MITRE-087"
619
+ category: credential_access
620
+ severity: high
621
+ confidence: 0.80
622
+ action: require_approval
623
+ pattern: "Get-VaultCredential\\.ps1"
624
+ case_insensitive: true
625
+ match_on: command
626
+ title: "MITRE ATT&CK T1555 - Credentialsfrom Password Stores"
627
+ expires_at: null
628
+ revoked: false
629
+
630
+ # --- T1558.001: Golden Ticket ---
631
+ - id: "CLT-MITRE-088"
632
+ category: credential_access
633
+ severity: high
634
+ confidence: 0.80
635
+ action: require_approval
636
+ pattern: "(net(1)?(\\.exe)?.*group.*(domain admins|enterprise admins|organization management).*/domain$|Invoke-Mimikatz.*Golden.*Ticket)"
637
+ case_insensitive: true
638
+ match_on: command
639
+ title: "MITRE ATT&CK T1558.001 - Golden Ticket"
640
+ expires_at: null
641
+ revoked: false
642
+
643
+ # --- T1558.002: Silver Ticket ---
644
+ - id: "CLT-MITRE-089"
645
+ category: credential_access
646
+ severity: high
647
+ confidence: 0.80
648
+ action: require_approval
649
+ pattern: "Invoke-Mimikatz.*Silver.*Ticket"
650
+ case_insensitive: true
651
+ match_on: command
652
+ title: "MITRE ATT&CK T1558.002 - Silver Ticket"
653
+ expires_at: null
654
+ revoked: false
655
+
656
+ # --- T1558.003: Kerberoasting ---
657
+ - id: "CLT-MITRE-090"
658
+ category: credential_access
659
+ severity: high
660
+ confidence: 0.80
661
+ action: require_approval
662
+ pattern: "Invoke-Kerberoast"
663
+ case_insensitive: true
664
+ match_on: command
665
+ title: "MITRE ATT&CK T1558.003 - Kerberoasting"
666
+ expires_at: null
667
+ revoked: false
668
+
669
+ # --- T1558.004: ASREP Roasting ---
670
+ - id: "CLT-MITRE-091"
671
+ category: credential_access
672
+ severity: high
673
+ confidence: 0.80
674
+ action: require_approval
675
+ pattern: "Get-ASREPHash"
676
+ case_insensitive: true
677
+ match_on: command
678
+ title: "MITRE ATT&CK T1558.004 - ASREP Roasting"
679
+ expires_at: null
680
+ revoked: false
681
+
682
+ # --- T1560.001: Archive Via Utility ---
683
+ - id: "CLT-MITRE-092"
684
+ category: collection
685
+ severity: high
686
+ confidence: 0.80
687
+ action: require_approval
688
+ pattern: "(\\brar(\\.exe)?\\s+.*\\b[afu]\\b|\\bWinRAR(\\.exe)?\\s|\\b7z(\\.exe)?\\s+.*\\ba\\b|\\bzip(\\.exe)?\\s+.*-u|\\bWinZip32(\\.exe)?\\s)"
689
+ case_insensitive: true
690
+ match_on: command
691
+ title: "MITRE ATT&CK T1560.001 - Archive Via Utility"
692
+ expires_at: null
693
+ revoked: false
694
+
695
+ # --- T1562.002: Disable Windows Event Logging ---
696
+ - id: "CLT-MITRE-093"
697
+ category: defense_evasion
698
+ severity: high
699
+ confidence: 0.80
700
+ action: require_approval
701
+ pattern: "AUDITPOL(\\.exe)?.*/set.*/category:Detailed Tracking"
702
+ case_insensitive: true
703
+ match_on: command
704
+ title: "MITRE ATT&CK T1562.002 - Disable Windows Event Logging"
705
+ expires_at: null
706
+ revoked: false
707
+
708
+ # --- T1562.003: Impair Command History Logging ---
709
+ - id: "CLT-MITRE-094"
710
+ category: defense_evasion
711
+ severity: high
712
+ confidence: 0.80
713
+ action: require_approval
714
+ pattern: "(Set-.*PSReadLineOption.*-HistorySavePath.*\\{File.*Path\\}|Set-PSReadlineOption.*-HistorySaveStyle.*SaveNothing)"
715
+ case_insensitive: true
716
+ match_on: command
717
+ title: "MITRE ATT&CK T1562.003 - Impair Command History Logging"
718
+ expires_at: null
719
+ revoked: false
720
+
721
+ # --- T1562.006: Indicator Blocking ---
722
+ - id: "CLT-MITRE-095"
723
+ category: defense_evasion
724
+ severity: high
725
+ confidence: 0.80
726
+ action: require_approval
727
+ pattern: "(wevtutil(\\.exe)?.*(sl|set-log).+/e:false|wevtutil(\\.exe)?.*(cl|clear-log)|Set-.*EtwTraceProvider)"
728
+ case_insensitive: true
729
+ match_on: command
730
+ title: "MITRE ATT&CK T1562.006 - Indicator Blocking"
731
+ expires_at: null
732
+ revoked: false
733
+
734
+ # --- T1563.002: RDP Hijacking ---
735
+ - id: "CLT-MITRE-096"
736
+ category: lateral_movement
737
+ severity: high
738
+ confidence: 0.80
739
+ action: require_approval
740
+ pattern: "tscon(\\.exe)?.*$"
741
+ case_insensitive: true
742
+ match_on: command
743
+ title: "MITRE ATT&CK T1563.002 - RDP Hijacking"
744
+ expires_at: null
745
+ revoked: false
746
+
747
+ # --- T1567.001: Exfiltrationto Code Repository ---
748
+ - id: "CLT-MITRE-099"
749
+ category: exfiltration
750
+ severity: high
751
+ confidence: 0.80
752
+ action: require_approval
753
+ pattern: "Invoke-ExfilDataToGitHub"
754
+ case_insensitive: true
755
+ match_on: command
756
+ title: "MITRE ATT&CK T1567.001 - Exfiltrationto Code Repository"
757
+ expires_at: null
758
+ revoked: false
759
+
760
+ # --- T1567.002: Exfiltrationto Cloud Storage ---
761
+ - id: "CLT-MITRE-100"
762
+ category: exfiltration
763
+ severity: high
764
+ confidence: 0.80
765
+ action: require_approval
766
+ pattern: "Invoke-DropboxUpload"
767
+ case_insensitive: true
768
+ match_on: command
769
+ title: "MITRE ATT&CK T1567.002 - Exfiltrationto Cloud Storage"
770
+ expires_at: null
771
+ revoked: false
772
+
773
+ # --- T1569: System Services ---
774
+ - id: "CLT-MITRE-102"
775
+ category: execution
776
+ severity: high
777
+ confidence: 0.80
778
+ action: require_approval
779
+ pattern: "(subinacl(\\.exe) /service|sc(\\.exe)? sdset)"
780
+ case_insensitive: true
781
+ match_on: command
782
+ title: "MITRE ATT&CK T1569 - System Services"
783
+ expires_at: null
784
+ revoked: false
785
+
786
+ # --- T1592.002: Software ---
787
+ - id: "CLT-MITRE-104"
788
+ category: reconnaissance
789
+ severity: medium
790
+ confidence: 0.70
791
+ action: require_approval
792
+ pattern: "(powershell(\\.exe)?.*-Class.*AntiVirusProduct|powershell(\\.exe)?.*path.*AntiVirusProduct)"
793
+ case_insensitive: true
794
+ match_on: command
795
+ title: "MITRE ATT&CK T1592.002 - Software"
796
+ expires_at: null
797
+ revoked: false
798
+
799
+ # --- T1592.004: Client Configurations ---
800
+ - id: "CLT-MITRE-105"
801
+ category: reconnaissance
802
+ severity: medium
803
+ confidence: 0.70
804
+ action: require_approval
805
+ pattern: "(powershell(\\.exe)?.*-Class.*Win32_UserAccount|powershell(\\.exe)?.*Get-SmbShare)"
806
+ case_insensitive: true
807
+ match_on: command
808
+ title: "MITRE ATT&CK T1592.004 - Client Configurations"
809
+ expires_at: null
810
+ revoked: false