@gendigital/sage 0.4.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/index.cjs +13526 -0
- package/dist/index.cjs.map +7 -0
- package/openclaw.plugin.json +14 -0
- package/package.json +40 -0
- package/resources/allowlists/trusted-installer-domains.yaml +55 -0
- package/resources/skills/security-awareness/SKILL.md +59 -0
- package/resources/threats/LICENSE +45 -0
- package/resources/threats/commands.yaml +257 -0
- package/resources/threats/credentials.yaml +75 -0
- package/resources/threats/files.yaml +112 -0
- package/resources/threats/mitre.yaml +810 -0
- package/resources/threats/obfuscation.yaml +86 -0
- package/resources/threats/persistence.yaml +87 -0
- package/resources/threats/self-defense.yaml +55 -0
- package/resources/threats/supply_chain.yaml +15 -0
- package/resources/threats/urls.yaml +63 -0
- package/resources/threats/win-commands.yaml +785 -0
- package/resources/threats/win-credentials.yaml +112 -0
- package/resources/threats/win-files.yaml +124 -0
- package/resources/threats/win-obfuscation.yaml +205 -0
- package/resources/threats/win-persistence.yaml +100 -0
- package/resources/threats/win-supply-chain.yaml +15 -0
|
@@ -0,0 +1,810 @@
|
|
|
1
|
+
# MITRE ATT&CK threat detection patterns for Sage
|
|
2
|
+
# Author: Gen Digital Inc.
|
|
3
|
+
# License: DRL-1.1 (see threats/LICENSE)
|
|
4
|
+
# Schema: id, category, severity, confidence, action, pattern, match_on, title, expires_at, revoked
|
|
5
|
+
|
|
6
|
+
# --- T1003.001: LSASS Memory ---
|
|
7
|
+
- id: "CLT-MITRE-001"
|
|
8
|
+
category: credential_access
|
|
9
|
+
severity: critical
|
|
10
|
+
confidence: 0.90
|
|
11
|
+
action: block
|
|
12
|
+
pattern: "(rundll32(\\.exe)?.*comsvcs\\.dll,MiniDump.*|procdump.*-ma.*lsass\\.exe.*lsass_dump|sekurlsa::Minidump.*lsassdump\\.dmp|sekurlsa::logonPasswords)"
|
|
13
|
+
case_insensitive: true
|
|
14
|
+
match_on: command
|
|
15
|
+
title: "MITRE ATT&CK T1003.001 - LSASS Memory"
|
|
16
|
+
expires_at: null
|
|
17
|
+
revoked: false
|
|
18
|
+
|
|
19
|
+
# --- T1003.002: Security Account Manager ---
|
|
20
|
+
- id: "CLT-MITRE-002"
|
|
21
|
+
category: credential_access
|
|
22
|
+
severity: critical
|
|
23
|
+
confidence: 0.90
|
|
24
|
+
action: block
|
|
25
|
+
pattern: "(reg.*save.*HKLM.*sam.*sam|reg.*save.*HKLM.*system.*system)"
|
|
26
|
+
case_insensitive: true
|
|
27
|
+
match_on: command
|
|
28
|
+
title: "MITRE ATT&CK T1003.002 - Security Account Manager"
|
|
29
|
+
expires_at: null
|
|
30
|
+
revoked: false
|
|
31
|
+
|
|
32
|
+
# --- T1003.003: NTDS ---
|
|
33
|
+
- id: "CLT-MITRE-003"
|
|
34
|
+
category: credential_access
|
|
35
|
+
severity: critical
|
|
36
|
+
confidence: 0.90
|
|
37
|
+
action: block
|
|
38
|
+
pattern: "ntdsutil(\\.exe)?"
|
|
39
|
+
case_insensitive: true
|
|
40
|
+
match_on: command
|
|
41
|
+
title: "MITRE ATT&CK T1003.003 - NTDS"
|
|
42
|
+
expires_at: null
|
|
43
|
+
revoked: false
|
|
44
|
+
|
|
45
|
+
# --- T1003.004: LSA Secrets ---
|
|
46
|
+
- id: "CLT-MITRE-004"
|
|
47
|
+
category: credential_access
|
|
48
|
+
severity: critical
|
|
49
|
+
confidence: 0.90
|
|
50
|
+
action: block
|
|
51
|
+
pattern: "Get-LSASecret\\.ps1"
|
|
52
|
+
case_insensitive: true
|
|
53
|
+
match_on: command
|
|
54
|
+
title: "MITRE ATT&CK T1003.004 - LSA Secrets"
|
|
55
|
+
expires_at: null
|
|
56
|
+
revoked: false
|
|
57
|
+
|
|
58
|
+
# --- T1003.005: Cached Domain Credentials ---
|
|
59
|
+
- id: "CLT-MITRE-005"
|
|
60
|
+
category: credential_access
|
|
61
|
+
severity: critical
|
|
62
|
+
confidence: 0.90
|
|
63
|
+
action: block
|
|
64
|
+
pattern: "cmdkey(\\.exe)?.*/list"
|
|
65
|
+
case_insensitive: true
|
|
66
|
+
match_on: command
|
|
67
|
+
title: "MITRE ATT&CK T1003.005 - Cached Domain Credentials"
|
|
68
|
+
expires_at: null
|
|
69
|
+
revoked: false
|
|
70
|
+
|
|
71
|
+
# --- T1003.006: DC Sync ---
|
|
72
|
+
- id: "CLT-MITRE-006"
|
|
73
|
+
category: credential_access
|
|
74
|
+
severity: critical
|
|
75
|
+
confidence: 0.90
|
|
76
|
+
action: block
|
|
77
|
+
pattern: "Invoke-Mimikatz.*-Command.*lsadump::dcsync.*/user:"
|
|
78
|
+
case_insensitive: true
|
|
79
|
+
match_on: command
|
|
80
|
+
title: "MITRE ATT&CK T1003.006 - DC Sync"
|
|
81
|
+
expires_at: null
|
|
82
|
+
revoked: false
|
|
83
|
+
|
|
84
|
+
# --- T1003: OS Credential Dumping ---
|
|
85
|
+
- id: "CLT-MITRE-007"
|
|
86
|
+
category: credential_access
|
|
87
|
+
severity: critical
|
|
88
|
+
confidence: 0.90
|
|
89
|
+
action: block
|
|
90
|
+
pattern: "(reg(\\.exe)? (save|export).*SAM|(PasswordDump|CreateMiniDump)|Invoke-PowerDump\\.ps1|Get-PassHashes\\.ps1|Get-RegAutoLogon\\.ps1)"
|
|
91
|
+
case_insensitive: true
|
|
92
|
+
match_on: command
|
|
93
|
+
title: "MITRE ATT&CK T1003 - OS Credential Dumping"
|
|
94
|
+
expires_at: null
|
|
95
|
+
revoked: false
|
|
96
|
+
|
|
97
|
+
# --- T1020: Automated Exfiltration ---
|
|
98
|
+
- id: "CLT-MITRE-012"
|
|
99
|
+
category: exfiltration
|
|
100
|
+
severity: high
|
|
101
|
+
confidence: 0.80
|
|
102
|
+
action: require_approval
|
|
103
|
+
pattern: "(rar(\\.exe)?.*[afu].*(-dw|-tb|-ta)|7z(\\.exe)?.*[au].*-sdel|Add-Exfiltration\\.ps1|Do-Exfiltration\\.ps1|Invoke-PostExfil\\.ps1)"
|
|
104
|
+
case_insensitive: true
|
|
105
|
+
match_on: command
|
|
106
|
+
title: "MITRE ATT&CK T1020 - Automated Exfiltration"
|
|
107
|
+
expires_at: null
|
|
108
|
+
revoked: false
|
|
109
|
+
|
|
110
|
+
# --- T1021.003: Distributed Component Object Model ---
|
|
111
|
+
- id: "CLT-MITRE-014"
|
|
112
|
+
category: lateral_movement
|
|
113
|
+
severity: high
|
|
114
|
+
confidence: 0.80
|
|
115
|
+
action: require_approval
|
|
116
|
+
pattern: "Invoke-DCOM.*\\-ComputerName"
|
|
117
|
+
case_insensitive: true
|
|
118
|
+
match_on: command
|
|
119
|
+
title: "MITRE ATT&CK T1021.003 - Distributed Component Object Model"
|
|
120
|
+
expires_at: null
|
|
121
|
+
revoked: false
|
|
122
|
+
|
|
123
|
+
# --- T1027.003: Steganography ---
|
|
124
|
+
- id: "CLT-MITRE-016"
|
|
125
|
+
category: defense_evasion
|
|
126
|
+
severity: high
|
|
127
|
+
confidence: 0.80
|
|
128
|
+
action: require_approval
|
|
129
|
+
pattern: "(Invoke-PSImage.*-Script|Invoke-PSImage)"
|
|
130
|
+
case_insensitive: true
|
|
131
|
+
match_on: command
|
|
132
|
+
title: "MITRE ATT&CK T1027.003 - Steganography"
|
|
133
|
+
expires_at: null
|
|
134
|
+
revoked: false
|
|
135
|
+
|
|
136
|
+
# --- T1027.005: Indicator Removalfrom Tools ---
|
|
137
|
+
- id: "CLT-MITRE-017"
|
|
138
|
+
category: defense_evasion
|
|
139
|
+
severity: high
|
|
140
|
+
confidence: 0.80
|
|
141
|
+
action: require_approval
|
|
142
|
+
pattern: "Find-AVSignature.*-Startbyte"
|
|
143
|
+
case_insensitive: true
|
|
144
|
+
match_on: command
|
|
145
|
+
title: "MITRE ATT&CK T1027.005 - Indicator Removalfrom Tools"
|
|
146
|
+
expires_at: null
|
|
147
|
+
revoked: false
|
|
148
|
+
|
|
149
|
+
# --- T1040: Network Sniffing ---
|
|
150
|
+
- id: "CLT-MITRE-020"
|
|
151
|
+
category: credential_access
|
|
152
|
+
severity: high
|
|
153
|
+
confidence: 0.80
|
|
154
|
+
action: require_approval
|
|
155
|
+
pattern: "netsh(\\.exe)?.*start.*trace"
|
|
156
|
+
case_insensitive: true
|
|
157
|
+
match_on: command
|
|
158
|
+
title: "MITRE ATT&CK T1040 - Network Sniffing"
|
|
159
|
+
expires_at: null
|
|
160
|
+
revoked: false
|
|
161
|
+
|
|
162
|
+
# --- T1046: Network Service Scanning ---
|
|
163
|
+
- id: "CLT-MITRE-022"
|
|
164
|
+
category: discovery
|
|
165
|
+
severity: high
|
|
166
|
+
confidence: 0.80
|
|
167
|
+
action: require_approval
|
|
168
|
+
pattern: "(telnet(\\.exe)?|nmap(\\.exe)?|Invoke-ARPScan\\.ps1|Invoke-PortScan\\.ps1|Invoke-SMBScanner\\.ps1|Port-Scan\\.ps1)"
|
|
169
|
+
case_insensitive: true
|
|
170
|
+
match_on: command
|
|
171
|
+
title: "MITRE ATT&CK T1046 - Network Service Scanning"
|
|
172
|
+
expires_at: null
|
|
173
|
+
revoked: false
|
|
174
|
+
|
|
175
|
+
# --- T1048: Exfiltration Over Alternative Protocol ---
|
|
176
|
+
- id: "CLT-MITRE-023"
|
|
177
|
+
category: exfiltration
|
|
178
|
+
severity: critical
|
|
179
|
+
confidence: 0.90
|
|
180
|
+
action: block
|
|
181
|
+
pattern: "(dnscat2|iodine)"
|
|
182
|
+
case_insensitive: true
|
|
183
|
+
match_on: command
|
|
184
|
+
title: "MITRE ATT&CK T1048 - Exfiltration Over Alternative Protocol"
|
|
185
|
+
expires_at: null
|
|
186
|
+
revoked: false
|
|
187
|
+
|
|
188
|
+
# --- T1053.005: Scheduled Task ---
|
|
189
|
+
- id: "CLT-MITRE-026"
|
|
190
|
+
category: persistence
|
|
191
|
+
severity: high
|
|
192
|
+
confidence: 0.80
|
|
193
|
+
action: require_approval
|
|
194
|
+
pattern: "(schtasks(\\.exe)?\\s+/create|schtasks(\\.exe)?\\s+/%windir:~0,1%reate|at\\.exe)"
|
|
195
|
+
case_insensitive: true
|
|
196
|
+
match_on: command
|
|
197
|
+
title: "MITRE ATT&CK T1053.005 - Scheduled Task"
|
|
198
|
+
expires_at: null
|
|
199
|
+
revoked: false
|
|
200
|
+
|
|
201
|
+
# --- T1055.001: Dynamiclink Library Injection ---
|
|
202
|
+
- id: "CLT-MITRE-027"
|
|
203
|
+
category: defense_evasion
|
|
204
|
+
severity: critical
|
|
205
|
+
confidence: 0.90
|
|
206
|
+
action: block
|
|
207
|
+
pattern: "Invoke-DllInjection\\.ps1"
|
|
208
|
+
case_insensitive: true
|
|
209
|
+
match_on: command
|
|
210
|
+
title: "MITRE ATT&CK T1055.001 - Dynamiclink Library Injection"
|
|
211
|
+
expires_at: null
|
|
212
|
+
revoked: false
|
|
213
|
+
|
|
214
|
+
# --- T1069: Permission Groups Discovery ---
|
|
215
|
+
- id: "CLT-MITRE-032"
|
|
216
|
+
category: discovery
|
|
217
|
+
severity: medium
|
|
218
|
+
confidence: 0.70
|
|
219
|
+
action: require_approval
|
|
220
|
+
pattern: "Get-ManagementRoleAssignment"
|
|
221
|
+
case_insensitive: true
|
|
222
|
+
match_on: command
|
|
223
|
+
title: "MITRE ATT&CK T1069 - Permission Groups Discovery"
|
|
224
|
+
expires_at: null
|
|
225
|
+
revoked: false
|
|
226
|
+
|
|
227
|
+
# --- T1070.004: File Deletion ---
|
|
228
|
+
- id: "CLT-MITRE-033"
|
|
229
|
+
category: defense_evasion
|
|
230
|
+
severity: high
|
|
231
|
+
confidence: 0.80
|
|
232
|
+
action: require_approval
|
|
233
|
+
pattern: "(cmd(\\.exe)?\\s+/c\\s+del\\s+/[sqf]|fsutil(\\.exe)?.*usn.*deleteJournal)"
|
|
234
|
+
case_insensitive: true
|
|
235
|
+
match_on: command
|
|
236
|
+
title: "MITRE ATT&CK T1070.004 - File Deletion"
|
|
237
|
+
expires_at: null
|
|
238
|
+
revoked: false
|
|
239
|
+
|
|
240
|
+
# --- T1070.005: Network Share Connection Removal ---
|
|
241
|
+
- id: "CLT-MITRE-034"
|
|
242
|
+
category: defense_evasion
|
|
243
|
+
severity: high
|
|
244
|
+
confidence: 0.80
|
|
245
|
+
action: require_approval
|
|
246
|
+
pattern: "net(1)?(\\.exe)?.*use.*\\\\\\\\.*\\\\.*/delete$"
|
|
247
|
+
case_insensitive: true
|
|
248
|
+
match_on: command
|
|
249
|
+
title: "MITRE ATT&CK T1070.005 - Network Share Connection Removal"
|
|
250
|
+
expires_at: null
|
|
251
|
+
revoked: false
|
|
252
|
+
|
|
253
|
+
# --- T1087.002: Domain Account ---
|
|
254
|
+
- id: "CLT-MITRE-037"
|
|
255
|
+
category: discovery
|
|
256
|
+
severity: medium
|
|
257
|
+
confidence: 0.70
|
|
258
|
+
action: require_approval
|
|
259
|
+
pattern: "(net1.*user.*/dom|net(\\.exe)?.*user.*/dom|net1.*group.*/dom|net(\\.exe)?.*group.*/dom)"
|
|
260
|
+
case_insensitive: true
|
|
261
|
+
match_on: command
|
|
262
|
+
title: "MITRE ATT&CK T1087.002 - Domain Account"
|
|
263
|
+
expires_at: null
|
|
264
|
+
revoked: false
|
|
265
|
+
|
|
266
|
+
# --- T1087.003: Email Account ---
|
|
267
|
+
- id: "CLT-MITRE-038"
|
|
268
|
+
category: discovery
|
|
269
|
+
severity: medium
|
|
270
|
+
confidence: 0.70
|
|
271
|
+
action: require_approval
|
|
272
|
+
pattern: "Get-.*GlobalAddressList"
|
|
273
|
+
case_insensitive: true
|
|
274
|
+
match_on: command
|
|
275
|
+
title: "MITRE ATT&CK T1087.003 - Email Account"
|
|
276
|
+
expires_at: null
|
|
277
|
+
revoked: false
|
|
278
|
+
|
|
279
|
+
# --- T1098.002: Exchange Email Delegate Permissions ---
|
|
280
|
+
- id: "CLT-MITRE-039"
|
|
281
|
+
category: persistence
|
|
282
|
+
severity: high
|
|
283
|
+
confidence: 0.80
|
|
284
|
+
action: require_approval
|
|
285
|
+
pattern: "Add-MailboxPermission"
|
|
286
|
+
case_insensitive: true
|
|
287
|
+
match_on: command
|
|
288
|
+
title: "MITRE ATT&CK T1098.002 - Exchange Email Delegate Permissions"
|
|
289
|
+
expires_at: null
|
|
290
|
+
revoked: false
|
|
291
|
+
|
|
292
|
+
# --- T1098: Account Manipulation ---
|
|
293
|
+
- id: "CLT-MITRE-040"
|
|
294
|
+
category: persistence
|
|
295
|
+
severity: high
|
|
296
|
+
confidence: 0.80
|
|
297
|
+
action: require_approval
|
|
298
|
+
pattern: "(net(1|\\.exe)?.*user.*\\w+.*/add|net(1|\\.exe)?.*group.*Administrators.*\\w+ /add|net(1|\\.exe)?.*localgroup.*Administrators.*\\w+ /add)"
|
|
299
|
+
case_insensitive: true
|
|
300
|
+
match_on: command
|
|
301
|
+
title: "MITRE ATT&CK T1098 - Account Manipulation"
|
|
302
|
+
expires_at: null
|
|
303
|
+
revoked: false
|
|
304
|
+
|
|
305
|
+
# --- T1105: Ingress Tool Transfer ---
|
|
306
|
+
- id: "CLT-MITRE-041"
|
|
307
|
+
category: command_and_control
|
|
308
|
+
severity: high
|
|
309
|
+
confidence: 0.80
|
|
310
|
+
action: require_approval
|
|
311
|
+
pattern: "(certutil(\\.exe)?.*-(decode|decodehex|encode|ping|url|urlcache|verifyctl)|MpCmdRun(\\.exe)?.*-DownloadFile.*-url.*http|\\(new-object System\\.Net\\.WebClient\\)\\.DownloadFile|bitsadmin(\\.exe)?.*/(transfer|download|create|addfile|setnotifycmdline|resume|complete)|Start-BitsTransfer)"
|
|
312
|
+
case_insensitive: true
|
|
313
|
+
match_on: command
|
|
314
|
+
title: "MITRE ATT&CK T1105 - Ingress Tool Transfer"
|
|
315
|
+
expires_at: null
|
|
316
|
+
revoked: false
|
|
317
|
+
|
|
318
|
+
# --- T1110.004: Credential Stuffing ---
|
|
319
|
+
- id: "CLT-MITRE-042"
|
|
320
|
+
category: credential_access
|
|
321
|
+
severity: high
|
|
322
|
+
confidence: 0.80
|
|
323
|
+
action: require_approval
|
|
324
|
+
pattern: "Invoke-CredentialInjection\\.ps1"
|
|
325
|
+
case_insensitive: true
|
|
326
|
+
match_on: command
|
|
327
|
+
title: "MITRE ATT&CK T1110.004 - Credential Stuffing"
|
|
328
|
+
expires_at: null
|
|
329
|
+
revoked: false
|
|
330
|
+
|
|
331
|
+
# --- T1120: Peripheral Device Discovery ---
|
|
332
|
+
- id: "CLT-MITRE-043"
|
|
333
|
+
category: discovery
|
|
334
|
+
severity: medium
|
|
335
|
+
confidence: 0.70
|
|
336
|
+
action: require_approval
|
|
337
|
+
pattern: "(Get-WMIObject.*Win32_PnPEntity|pnputil(\\.exe)?.*/enum-devices)"
|
|
338
|
+
case_insensitive: true
|
|
339
|
+
match_on: command
|
|
340
|
+
title: "MITRE ATT&CK T1120 - Peripheral Device Discovery"
|
|
341
|
+
expires_at: null
|
|
342
|
+
revoked: false
|
|
343
|
+
|
|
344
|
+
# --- T1136.001: Local Account ---
|
|
345
|
+
- id: "CLT-MITRE-048"
|
|
346
|
+
category: persistence
|
|
347
|
+
severity: high
|
|
348
|
+
confidence: 0.80
|
|
349
|
+
action: require_approval
|
|
350
|
+
pattern: "net(1)?(\\.exe)?.*user.*/add"
|
|
351
|
+
case_insensitive: true
|
|
352
|
+
match_on: command
|
|
353
|
+
title: "MITRE ATT&CK T1136.001 - Local Account"
|
|
354
|
+
expires_at: null
|
|
355
|
+
revoked: false
|
|
356
|
+
|
|
357
|
+
# --- T1136.002: Domain Account ---
|
|
358
|
+
- id: "CLT-MITRE-049"
|
|
359
|
+
category: persistence
|
|
360
|
+
severity: high
|
|
361
|
+
confidence: 0.80
|
|
362
|
+
action: require_approval
|
|
363
|
+
pattern: "net(1)?(\\.exe)?.*user.*/add.*/domain"
|
|
364
|
+
case_insensitive: true
|
|
365
|
+
match_on: command
|
|
366
|
+
title: "MITRE ATT&CK T1136.002 - Domain Account"
|
|
367
|
+
expires_at: null
|
|
368
|
+
revoked: false
|
|
369
|
+
|
|
370
|
+
# --- T1201: Password Policy Discovery ---
|
|
371
|
+
- id: "CLT-MITRE-050"
|
|
372
|
+
category: discovery
|
|
373
|
+
severity: medium
|
|
374
|
+
confidence: 0.70
|
|
375
|
+
action: require_approval
|
|
376
|
+
pattern: "(net.*accounts|Get-ADDefaultDomainPasswordPolicy|Get-PassPol)"
|
|
377
|
+
case_insensitive: true
|
|
378
|
+
match_on: command
|
|
379
|
+
title: "MITRE ATT&CK T1201 - Password Policy Discovery"
|
|
380
|
+
expires_at: null
|
|
381
|
+
revoked: false
|
|
382
|
+
|
|
383
|
+
# --- T1202: Indirect Command Execution ---
|
|
384
|
+
- id: "CLT-MITRE-051"
|
|
385
|
+
category: defense_evasion
|
|
386
|
+
severity: high
|
|
387
|
+
confidence: 0.80
|
|
388
|
+
action: require_approval
|
|
389
|
+
pattern: "(regsvr32(\\.exe)?.*/i:http(s)?://.+.*scrobj\\.dll|rundll32(\\.exe)?.*pcwutl\\.dll,LaunchApplication|rundll32(\\.exe)?.*shell32\\.dll,ShellExec_RunDLL|rundll32(\\.exe)?.*url\\.dll,OpenURL|msiexec(\\.exe)?.*-(Y|Z)|regasm(\\.exe)?.*/u.*\\\\)"
|
|
390
|
+
case_insensitive: true
|
|
391
|
+
match_on: command
|
|
392
|
+
title: "MITRE ATT&CK T1202 - Indirect Command Execution"
|
|
393
|
+
expires_at: null
|
|
394
|
+
revoked: false
|
|
395
|
+
|
|
396
|
+
# --- T1203: Exploitationfor Client Execution ---
|
|
397
|
+
- id: "CLT-MITRE-052"
|
|
398
|
+
category: execution
|
|
399
|
+
severity: critical
|
|
400
|
+
confidence: 0.90
|
|
401
|
+
action: block
|
|
402
|
+
pattern: "(p\\^+o\\^+w\\^+e\\^+r\\^+s\\^+h\\^+e\\^+l\\^+l|w\\^+s\\^+c\\^+r\\^+i\\^+p\\^+t|c\\^+e\\^+r\\^+t\\^+u\\^+t\\^+i\\^+l|m\\^+s\\^+h\\^+t\\^+a|explorer\\.exe .*\\.vbs$)"
|
|
403
|
+
case_insensitive: true
|
|
404
|
+
match_on: command
|
|
405
|
+
title: "MITRE ATT&CK T1203 - Exploitationfor Client Execution"
|
|
406
|
+
expires_at: null
|
|
407
|
+
revoked: false
|
|
408
|
+
|
|
409
|
+
# --- T1216.001: Pub Prn ---
|
|
410
|
+
- id: "CLT-MITRE-053"
|
|
411
|
+
category: defense_evasion
|
|
412
|
+
severity: high
|
|
413
|
+
confidence: 0.80
|
|
414
|
+
action: require_approval
|
|
415
|
+
pattern: "pubprn\\.vbs"
|
|
416
|
+
case_insensitive: true
|
|
417
|
+
match_on: command
|
|
418
|
+
title: "MITRE ATT&CK T1216.001 - Pub Prn"
|
|
419
|
+
expires_at: null
|
|
420
|
+
revoked: false
|
|
421
|
+
|
|
422
|
+
# --- T1218.012: Verclsid ---
|
|
423
|
+
- id: "CLT-MITRE-064"
|
|
424
|
+
category: defense_evasion
|
|
425
|
+
severity: high
|
|
426
|
+
confidence: 0.80
|
|
427
|
+
action: require_approval
|
|
428
|
+
pattern: "verclsid(\\.exe)?.*/S.*/C.*\\{[0-9a-fA-F]{8}"
|
|
429
|
+
case_insensitive: true
|
|
430
|
+
match_on: command
|
|
431
|
+
title: "MITRE ATT&CK T1218.012 - Verclsid"
|
|
432
|
+
expires_at: null
|
|
433
|
+
revoked: false
|
|
434
|
+
|
|
435
|
+
# --- T1220: XSL Script Processing ---
|
|
436
|
+
- id: "CLT-MITRE-065"
|
|
437
|
+
category: defense_evasion
|
|
438
|
+
severity: high
|
|
439
|
+
confidence: 0.80
|
|
440
|
+
action: require_approval
|
|
441
|
+
pattern: "(msxsl(\\.exe)?.+\\.xsl|wmic(\\.exe)?.*process.*list.*/FORMAT:.+\\.xsl|wmic(\\.exe)?.*os.*get.*/FORMAT:.+\\.xsl|wmic.*process.*list.*/FORMAT:evil\\[\\.\\]xsl|wmic.*os.*get.*/FORMAT:https\\[:\\]//example\\[\\.\\]com/evil\\[\\.\\]xsl)"
|
|
442
|
+
case_insensitive: true
|
|
443
|
+
match_on: command
|
|
444
|
+
title: "MITRE ATT&CK T1220 - XSL Script Processing"
|
|
445
|
+
expires_at: null
|
|
446
|
+
revoked: false
|
|
447
|
+
|
|
448
|
+
# --- T1482: Domain Trust Discovery ---
|
|
449
|
+
- id: "CLT-MITRE-066"
|
|
450
|
+
category: discovery
|
|
451
|
+
severity: medium
|
|
452
|
+
confidence: 0.70
|
|
453
|
+
action: require_approval
|
|
454
|
+
pattern: "(nltest(\\.exe)?.*/domain_trusts|dsquery(\\.exe)?.*/trustedDomain|Get-NetDomainTrust|Get-NetForestTrust|Get-ADDomain)"
|
|
455
|
+
case_insensitive: true
|
|
456
|
+
match_on: command
|
|
457
|
+
title: "MITRE ATT&CK T1482 - Domain Trust Discovery"
|
|
458
|
+
expires_at: null
|
|
459
|
+
revoked: false
|
|
460
|
+
|
|
461
|
+
# --- T1484.001: Group Policy Modification ---
|
|
462
|
+
- id: "CLT-MITRE-067"
|
|
463
|
+
category: defense_evasion
|
|
464
|
+
severity: high
|
|
465
|
+
confidence: 0.80
|
|
466
|
+
action: require_approval
|
|
467
|
+
pattern: "(New-GPOImmediateTask|New-.*GPOImmediateTask)"
|
|
468
|
+
case_insensitive: true
|
|
469
|
+
match_on: command
|
|
470
|
+
title: "MITRE ATT&CK T1484.001 - Group Policy Modification"
|
|
471
|
+
expires_at: null
|
|
472
|
+
revoked: false
|
|
473
|
+
|
|
474
|
+
# --- T1518.001: Security Software Discovery ---
|
|
475
|
+
- id: "CLT-MITRE-071"
|
|
476
|
+
category: discovery
|
|
477
|
+
severity: medium
|
|
478
|
+
confidence: 0.70
|
|
479
|
+
action: require_approval
|
|
480
|
+
pattern: "(tasklist(\\.exe)?.+(virus|defender|cylance)|wmic(\\.exe)?.+Path.*AntiVirusProduct)"
|
|
481
|
+
case_insensitive: true
|
|
482
|
+
match_on: command
|
|
483
|
+
title: "MITRE ATT&CK T1518.001 - Security Software Discovery"
|
|
484
|
+
expires_at: null
|
|
485
|
+
revoked: false
|
|
486
|
+
|
|
487
|
+
# --- T1518: Software Discovery ---
|
|
488
|
+
- id: "CLT-MITRE-072"
|
|
489
|
+
category: discovery
|
|
490
|
+
severity: medium
|
|
491
|
+
confidence: 0.70
|
|
492
|
+
action: require_approval
|
|
493
|
+
pattern: "wmic(\\.exe)? product get name"
|
|
494
|
+
case_insensitive: true
|
|
495
|
+
match_on: command
|
|
496
|
+
title: "MITRE ATT&CK T1518 - Software Discovery"
|
|
497
|
+
expires_at: null
|
|
498
|
+
revoked: false
|
|
499
|
+
|
|
500
|
+
# --- T1546.001: Change Default File Association ---
|
|
501
|
+
- id: "CLT-MITRE-075"
|
|
502
|
+
category: persistence
|
|
503
|
+
severity: high
|
|
504
|
+
confidence: 0.80
|
|
505
|
+
action: require_approval
|
|
506
|
+
pattern: "cmd(\\.exe)?.*/c.+assoc"
|
|
507
|
+
case_insensitive: true
|
|
508
|
+
match_on: command
|
|
509
|
+
title: "MITRE ATT&CK T1546.001 - Change Default File Association"
|
|
510
|
+
expires_at: null
|
|
511
|
+
revoked: false
|
|
512
|
+
|
|
513
|
+
# --- T1546.003: Windows Management Instrumentation Event Subscription ---
|
|
514
|
+
- id: "CLT-MITRE-076"
|
|
515
|
+
category: persistence
|
|
516
|
+
severity: high
|
|
517
|
+
confidence: 0.80
|
|
518
|
+
action: require_approval
|
|
519
|
+
pattern: "scrcons\\.exe"
|
|
520
|
+
case_insensitive: true
|
|
521
|
+
match_on: command
|
|
522
|
+
title: "MITRE ATT&CK T1546.003 - Windows Management Instrumentation Event Subscription"
|
|
523
|
+
expires_at: null
|
|
524
|
+
revoked: false
|
|
525
|
+
|
|
526
|
+
# --- T1546.007: Netsh Helper DLL ---
|
|
527
|
+
- id: "CLT-MITRE-077"
|
|
528
|
+
category: persistence
|
|
529
|
+
severity: high
|
|
530
|
+
confidence: 0.80
|
|
531
|
+
action: require_approval
|
|
532
|
+
pattern: "netsh\\.exe add helper"
|
|
533
|
+
case_insensitive: true
|
|
534
|
+
match_on: command
|
|
535
|
+
title: "MITRE ATT&CK T1546.007 - Netsh Helper DLL"
|
|
536
|
+
expires_at: null
|
|
537
|
+
revoked: false
|
|
538
|
+
|
|
539
|
+
# --- T1546.012: Image File Execution Options Injection ---
|
|
540
|
+
- id: "CLT-MITRE-078"
|
|
541
|
+
category: persistence
|
|
542
|
+
severity: high
|
|
543
|
+
confidence: 0.80
|
|
544
|
+
action: require_approval
|
|
545
|
+
pattern: "(Add-ScrnSaveBackdoor\\.ps1|Add-RegBackdoor\\.ps1)"
|
|
546
|
+
case_insensitive: true
|
|
547
|
+
match_on: command
|
|
548
|
+
title: "MITRE ATT&CK T1546.012 - Image File Execution Options Injection"
|
|
549
|
+
expires_at: null
|
|
550
|
+
revoked: false
|
|
551
|
+
|
|
552
|
+
# --- T1547: Bootor Logon Autostart Execution ---
|
|
553
|
+
- id: "CLT-MITRE-081"
|
|
554
|
+
category: persistence
|
|
555
|
+
severity: high
|
|
556
|
+
confidence: 0.80
|
|
557
|
+
action: require_approval
|
|
558
|
+
pattern: "Add-Persistence\\.ps1"
|
|
559
|
+
case_insensitive: true
|
|
560
|
+
match_on: command
|
|
561
|
+
title: "MITRE ATT&CK T1547 - Bootor Logon Autostart Execution"
|
|
562
|
+
expires_at: null
|
|
563
|
+
revoked: false
|
|
564
|
+
|
|
565
|
+
# --- T1548.002: Bypass User Account Control ---
|
|
566
|
+
- id: "CLT-MITRE-082"
|
|
567
|
+
category: privilege_escalation
|
|
568
|
+
severity: high
|
|
569
|
+
confidence: 0.80
|
|
570
|
+
action: require_approval
|
|
571
|
+
pattern: "(Invoke-BypassUAC\\.ps1|Invoke-WScriptBypassUAC\\.ps1|Add-MpPreference\\.ps1)"
|
|
572
|
+
case_insensitive: true
|
|
573
|
+
match_on: command
|
|
574
|
+
title: "MITRE ATT&CK T1548.002 - Bypass User Account Control"
|
|
575
|
+
expires_at: null
|
|
576
|
+
revoked: false
|
|
577
|
+
|
|
578
|
+
# --- T1552.002: Credentialsin Registry ---
|
|
579
|
+
- id: "CLT-MITRE-083"
|
|
580
|
+
category: credential_access
|
|
581
|
+
severity: high
|
|
582
|
+
confidence: 0.80
|
|
583
|
+
action: require_approval
|
|
584
|
+
pattern: "reg(\\.exe)? query (HKLM|HKCU) /f password /t REG_SZ /s"
|
|
585
|
+
case_insensitive: true
|
|
586
|
+
match_on: command
|
|
587
|
+
title: "MITRE ATT&CK T1552.002 - Credentialsin Registry"
|
|
588
|
+
expires_at: null
|
|
589
|
+
revoked: false
|
|
590
|
+
|
|
591
|
+
# --- T1553.004: Install Root Certificate ---
|
|
592
|
+
- id: "CLT-MITRE-085"
|
|
593
|
+
category: defense_evasion
|
|
594
|
+
severity: high
|
|
595
|
+
confidence: 0.80
|
|
596
|
+
action: require_approval
|
|
597
|
+
pattern: "(certutil(\\.exe)? -addstore|certmgr(\\.exe)? -add)"
|
|
598
|
+
case_insensitive: true
|
|
599
|
+
match_on: command
|
|
600
|
+
title: "MITRE ATT&CK T1553.004 - Install Root Certificate"
|
|
601
|
+
expires_at: null
|
|
602
|
+
revoked: false
|
|
603
|
+
|
|
604
|
+
# --- T1555.003: Credentialsfrom Web Browsers ---
|
|
605
|
+
- id: "CLT-MITRE-086"
|
|
606
|
+
category: credential_access
|
|
607
|
+
severity: high
|
|
608
|
+
confidence: 0.80
|
|
609
|
+
action: require_approval
|
|
610
|
+
pattern: "(Get-ChromeDump\\.ps1|Get-FoxDump\\.ps1)"
|
|
611
|
+
case_insensitive: true
|
|
612
|
+
match_on: command
|
|
613
|
+
title: "MITRE ATT&CK T1555.003 - Credentialsfrom Web Browsers"
|
|
614
|
+
expires_at: null
|
|
615
|
+
revoked: false
|
|
616
|
+
|
|
617
|
+
# --- T1555: Credentialsfrom Password Stores ---
|
|
618
|
+
- id: "CLT-MITRE-087"
|
|
619
|
+
category: credential_access
|
|
620
|
+
severity: high
|
|
621
|
+
confidence: 0.80
|
|
622
|
+
action: require_approval
|
|
623
|
+
pattern: "Get-VaultCredential\\.ps1"
|
|
624
|
+
case_insensitive: true
|
|
625
|
+
match_on: command
|
|
626
|
+
title: "MITRE ATT&CK T1555 - Credentialsfrom Password Stores"
|
|
627
|
+
expires_at: null
|
|
628
|
+
revoked: false
|
|
629
|
+
|
|
630
|
+
# --- T1558.001: Golden Ticket ---
|
|
631
|
+
- id: "CLT-MITRE-088"
|
|
632
|
+
category: credential_access
|
|
633
|
+
severity: high
|
|
634
|
+
confidence: 0.80
|
|
635
|
+
action: require_approval
|
|
636
|
+
pattern: "(net(1)?(\\.exe)?.*group.*(domain admins|enterprise admins|organization management).*/domain$|Invoke-Mimikatz.*Golden.*Ticket)"
|
|
637
|
+
case_insensitive: true
|
|
638
|
+
match_on: command
|
|
639
|
+
title: "MITRE ATT&CK T1558.001 - Golden Ticket"
|
|
640
|
+
expires_at: null
|
|
641
|
+
revoked: false
|
|
642
|
+
|
|
643
|
+
# --- T1558.002: Silver Ticket ---
|
|
644
|
+
- id: "CLT-MITRE-089"
|
|
645
|
+
category: credential_access
|
|
646
|
+
severity: high
|
|
647
|
+
confidence: 0.80
|
|
648
|
+
action: require_approval
|
|
649
|
+
pattern: "Invoke-Mimikatz.*Silver.*Ticket"
|
|
650
|
+
case_insensitive: true
|
|
651
|
+
match_on: command
|
|
652
|
+
title: "MITRE ATT&CK T1558.002 - Silver Ticket"
|
|
653
|
+
expires_at: null
|
|
654
|
+
revoked: false
|
|
655
|
+
|
|
656
|
+
# --- T1558.003: Kerberoasting ---
|
|
657
|
+
- id: "CLT-MITRE-090"
|
|
658
|
+
category: credential_access
|
|
659
|
+
severity: high
|
|
660
|
+
confidence: 0.80
|
|
661
|
+
action: require_approval
|
|
662
|
+
pattern: "Invoke-Kerberoast"
|
|
663
|
+
case_insensitive: true
|
|
664
|
+
match_on: command
|
|
665
|
+
title: "MITRE ATT&CK T1558.003 - Kerberoasting"
|
|
666
|
+
expires_at: null
|
|
667
|
+
revoked: false
|
|
668
|
+
|
|
669
|
+
# --- T1558.004: ASREP Roasting ---
|
|
670
|
+
- id: "CLT-MITRE-091"
|
|
671
|
+
category: credential_access
|
|
672
|
+
severity: high
|
|
673
|
+
confidence: 0.80
|
|
674
|
+
action: require_approval
|
|
675
|
+
pattern: "Get-ASREPHash"
|
|
676
|
+
case_insensitive: true
|
|
677
|
+
match_on: command
|
|
678
|
+
title: "MITRE ATT&CK T1558.004 - ASREP Roasting"
|
|
679
|
+
expires_at: null
|
|
680
|
+
revoked: false
|
|
681
|
+
|
|
682
|
+
# --- T1560.001: Archive Via Utility ---
|
|
683
|
+
- id: "CLT-MITRE-092"
|
|
684
|
+
category: collection
|
|
685
|
+
severity: high
|
|
686
|
+
confidence: 0.80
|
|
687
|
+
action: require_approval
|
|
688
|
+
pattern: "(\\brar(\\.exe)?\\s+.*\\b[afu]\\b|\\bWinRAR(\\.exe)?\\s|\\b7z(\\.exe)?\\s+.*\\ba\\b|\\bzip(\\.exe)?\\s+.*-u|\\bWinZip32(\\.exe)?\\s)"
|
|
689
|
+
case_insensitive: true
|
|
690
|
+
match_on: command
|
|
691
|
+
title: "MITRE ATT&CK T1560.001 - Archive Via Utility"
|
|
692
|
+
expires_at: null
|
|
693
|
+
revoked: false
|
|
694
|
+
|
|
695
|
+
# --- T1562.002: Disable Windows Event Logging ---
|
|
696
|
+
- id: "CLT-MITRE-093"
|
|
697
|
+
category: defense_evasion
|
|
698
|
+
severity: high
|
|
699
|
+
confidence: 0.80
|
|
700
|
+
action: require_approval
|
|
701
|
+
pattern: "AUDITPOL(\\.exe)?.*/set.*/category:Detailed Tracking"
|
|
702
|
+
case_insensitive: true
|
|
703
|
+
match_on: command
|
|
704
|
+
title: "MITRE ATT&CK T1562.002 - Disable Windows Event Logging"
|
|
705
|
+
expires_at: null
|
|
706
|
+
revoked: false
|
|
707
|
+
|
|
708
|
+
# --- T1562.003: Impair Command History Logging ---
|
|
709
|
+
- id: "CLT-MITRE-094"
|
|
710
|
+
category: defense_evasion
|
|
711
|
+
severity: high
|
|
712
|
+
confidence: 0.80
|
|
713
|
+
action: require_approval
|
|
714
|
+
pattern: "(Set-.*PSReadLineOption.*-HistorySavePath.*\\{File.*Path\\}|Set-PSReadlineOption.*-HistorySaveStyle.*SaveNothing)"
|
|
715
|
+
case_insensitive: true
|
|
716
|
+
match_on: command
|
|
717
|
+
title: "MITRE ATT&CK T1562.003 - Impair Command History Logging"
|
|
718
|
+
expires_at: null
|
|
719
|
+
revoked: false
|
|
720
|
+
|
|
721
|
+
# --- T1562.006: Indicator Blocking ---
|
|
722
|
+
- id: "CLT-MITRE-095"
|
|
723
|
+
category: defense_evasion
|
|
724
|
+
severity: high
|
|
725
|
+
confidence: 0.80
|
|
726
|
+
action: require_approval
|
|
727
|
+
pattern: "(wevtutil(\\.exe)?.*(sl|set-log).+/e:false|wevtutil(\\.exe)?.*(cl|clear-log)|Set-.*EtwTraceProvider)"
|
|
728
|
+
case_insensitive: true
|
|
729
|
+
match_on: command
|
|
730
|
+
title: "MITRE ATT&CK T1562.006 - Indicator Blocking"
|
|
731
|
+
expires_at: null
|
|
732
|
+
revoked: false
|
|
733
|
+
|
|
734
|
+
# --- T1563.002: RDP Hijacking ---
|
|
735
|
+
- id: "CLT-MITRE-096"
|
|
736
|
+
category: lateral_movement
|
|
737
|
+
severity: high
|
|
738
|
+
confidence: 0.80
|
|
739
|
+
action: require_approval
|
|
740
|
+
pattern: "tscon(\\.exe)?.*$"
|
|
741
|
+
case_insensitive: true
|
|
742
|
+
match_on: command
|
|
743
|
+
title: "MITRE ATT&CK T1563.002 - RDP Hijacking"
|
|
744
|
+
expires_at: null
|
|
745
|
+
revoked: false
|
|
746
|
+
|
|
747
|
+
# --- T1567.001: Exfiltrationto Code Repository ---
|
|
748
|
+
- id: "CLT-MITRE-099"
|
|
749
|
+
category: exfiltration
|
|
750
|
+
severity: high
|
|
751
|
+
confidence: 0.80
|
|
752
|
+
action: require_approval
|
|
753
|
+
pattern: "Invoke-ExfilDataToGitHub"
|
|
754
|
+
case_insensitive: true
|
|
755
|
+
match_on: command
|
|
756
|
+
title: "MITRE ATT&CK T1567.001 - Exfiltrationto Code Repository"
|
|
757
|
+
expires_at: null
|
|
758
|
+
revoked: false
|
|
759
|
+
|
|
760
|
+
# --- T1567.002: Exfiltrationto Cloud Storage ---
|
|
761
|
+
- id: "CLT-MITRE-100"
|
|
762
|
+
category: exfiltration
|
|
763
|
+
severity: high
|
|
764
|
+
confidence: 0.80
|
|
765
|
+
action: require_approval
|
|
766
|
+
pattern: "Invoke-DropboxUpload"
|
|
767
|
+
case_insensitive: true
|
|
768
|
+
match_on: command
|
|
769
|
+
title: "MITRE ATT&CK T1567.002 - Exfiltrationto Cloud Storage"
|
|
770
|
+
expires_at: null
|
|
771
|
+
revoked: false
|
|
772
|
+
|
|
773
|
+
# --- T1569: System Services ---
|
|
774
|
+
- id: "CLT-MITRE-102"
|
|
775
|
+
category: execution
|
|
776
|
+
severity: high
|
|
777
|
+
confidence: 0.80
|
|
778
|
+
action: require_approval
|
|
779
|
+
pattern: "(subinacl(\\.exe) /service|sc(\\.exe)? sdset)"
|
|
780
|
+
case_insensitive: true
|
|
781
|
+
match_on: command
|
|
782
|
+
title: "MITRE ATT&CK T1569 - System Services"
|
|
783
|
+
expires_at: null
|
|
784
|
+
revoked: false
|
|
785
|
+
|
|
786
|
+
# --- T1592.002: Software ---
|
|
787
|
+
- id: "CLT-MITRE-104"
|
|
788
|
+
category: reconnaissance
|
|
789
|
+
severity: medium
|
|
790
|
+
confidence: 0.70
|
|
791
|
+
action: require_approval
|
|
792
|
+
pattern: "(powershell(\\.exe)?.*-Class.*AntiVirusProduct|powershell(\\.exe)?.*path.*AntiVirusProduct)"
|
|
793
|
+
case_insensitive: true
|
|
794
|
+
match_on: command
|
|
795
|
+
title: "MITRE ATT&CK T1592.002 - Software"
|
|
796
|
+
expires_at: null
|
|
797
|
+
revoked: false
|
|
798
|
+
|
|
799
|
+
# --- T1592.004: Client Configurations ---
|
|
800
|
+
- id: "CLT-MITRE-105"
|
|
801
|
+
category: reconnaissance
|
|
802
|
+
severity: medium
|
|
803
|
+
confidence: 0.70
|
|
804
|
+
action: require_approval
|
|
805
|
+
pattern: "(powershell(\\.exe)?.*-Class.*Win32_UserAccount|powershell(\\.exe)?.*Get-SmbShare)"
|
|
806
|
+
case_insensitive: true
|
|
807
|
+
match_on: command
|
|
808
|
+
title: "MITRE ATT&CK T1592.004 - Client Configurations"
|
|
809
|
+
expires_at: null
|
|
810
|
+
revoked: false
|