This repository has been archived by the owner on Mar 7, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 46
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Showing
101 changed files
with
61 additions
and
0 deletions.
There are no files selected for viewing
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,49 @@ | ||
// title: Suspicious Outbound RDP Connections | ||
// description: Detects Non-Standard Tools Connecting to TCP port 3389 indicating possible lateral movement | ||
// | ||
// reference: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0708 | ||
// | ||
// original author: Markus Neis (Swisscom) | ||
// KQL author: Maarten Goet (condicio) | ||
// | ||
// MITRE ATT&CK: lateral_movement, t1210 | ||
|
||
Event | ||
| parse EventData with | ||
* 'Data Name="RuleName">' RuleName '<' | ||
* 'Data Name="UtcTime">' UtcTime '<' | ||
* 'Data Name="ProcessGuid">' ProcessGuid '<' | ||
* 'Data Name="ProcessId">' ProcessId '<' | ||
* 'Data Name="Image">' Image '<' | ||
* 'Data Name="User">' User '<' | ||
* 'Data Name="Protocol">' Protocol '<' | ||
* 'Data Name="Initiated">' Initiated '<' | ||
* 'Data Name="SourceIsIpv6">' SourceIsIpv6 '<' | ||
* 'Data Name="SourceIp">' SourceIp '<' | ||
* 'Data Name="SourceHostname">' SourceHostname '<' | ||
* 'Data Name="SourcePort">' SourcePort '<' | ||
* 'Data Name="SourcePortName">' SourcePortName '<' | ||
* 'Data Name="DestinationIsIpv6">' DestinationIsIpv6 '<' | ||
* 'Data Name="DestinationIp">' DestinationIp '<' | ||
* 'Data Name="DestinationHostname">' DestinationHostname '<' | ||
* 'Data Name="DestinationPort">' DestinationPort '<' | ||
* 'Data Name="DestinationPortName">' DestinationPortName '<' | ||
* | ||
| where ((EventID == "3" and DestinationPort == "3389") and not | ||
(Image endswith "\\mstsc.exe" | ||
or Image endswith "\\RTSApp.exe" | ||
or Image endswith "\\RTS2App.exe" | ||
or Image endswith "\\RDCMan.exe" | ||
or Image endswith "\\ws_TunnelService.exe" | ||
or Image endswith "\\RSSensor.exe" | ||
or Image endswith "\\RemoteDesktopManagerFree.exe" | ||
or Image endswith "\\RemoteDesktopManager.exe" | ||
or Image endswith "\\RemoteDesktopManager64.exe" | ||
or Image endswith "\\mRemoteNG.exe" | ||
or Image endswith "\\mRemote.exe" | ||
or Image endswith "\\Terminals.exe" | ||
or Image endswith "\\spiceworks-finder.exe" | ||
or Image endswith "\\FSDiscovery.exe" | ||
or Image endswith "\\FSAssessment.exe" | ||
or Image endswith "\\MobaRTE.exe" | ||
or Image endswith "\\chrome.exe")) |
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
// title: Scanner PoC for CVE-2019-0708 RDP RCE vuln | ||
// description: Detects the use of a scanner by zerosum0x0 that discovers targets vulnerable to CVE-2019-0708 RDP RCE aka BlueKeep | ||
// | ||
// references: https://twitter.com/AdamTheAnalyst/status/1134394070045003776 & https://github.com/zerosum0x0/CVE-2019-0708 | ||
// | ||
// original authors: Florian Roth (sigma rule), Adam Bradbury (idea) | ||
// KQL author: Maarten Goet (condicio) | ||
// | ||
// MITRE ATT&CK: lateral_movement, t1210 | ||
|
||
SecurityEvent | ||
| where (EventID == "4625" and AccountName == "AAAAAAA") |
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.