Elastic security

Description

This is a collection of SIEM detection rules in Elastic Security for Windows based on the Sigma project. This rule collection checks about sysmon events to find common threats. Sysmon is an enhanced event collection for Windows systems and offers better visibility into what is happening on windows systems.

SIEM detection rules

CMSTP Execution Process Access
Detects various indicators of Microsoft Connection Manager Profile Installer execution

Credentials Dumping Tools Accessing LSASS Memory
Detects process access LSASS memory which is typical for credentials dumping tools

Suspect Svchost Memory Asccess
Detects suspect access to svchost process memory such as that used by Invoke-Phantom to kill the winRM windows event logging service.

Credential Dumping by LaZagne
Detects LSASS process access by LaZagne for credential dumping.

LSASS Memory Dump
Detects process LSASS memory dump using procdump or taskmgr based on the CallTrace pointing to dbghelp.dll or dbgcore.dll for win10

Malware Shellcode in Verclsid Target Process
Detects a process access to verclsid.exe that injects shellcode from a Microsoft Office application / VBA macro

Mimikatz through Windows Remote Management
Detects usage of mimikatz through WinRM protocol by monitoring access to lsass process by wsmprovhost.exe.

Dllhost Internet Connection
Detects Dllhost that communicates with public IP addresses

Suspicious Typical Malware Back Connect Ports
Detects programs that connect to typical malware back connect ports based on statistical analysis from two different sandbox system databases

Notepad Making Network Connection
Detects suspicious network connection by Notepad

RDP Over Reverse SSH Tunnel
Detects svchost hosting RDP termsvcs communicating with the loopback address and on TCP port 3389

Remote PowerShell Session
Detects remote PowerShell connections by monitoring network outbount connections to ports 5985 or 5986 from not network service account

Rundll32 Internet Connection
Detects a rundll32 that communicates with public IP addresses

Suspicious Outbound Kerberos Connection
Detects suspicious outbound network activity via kerberos default port indicating possible lateral movement or first stage PrivEsc via delegation.

Suspicious Program Location with Network Connections
Detects programs with network connections running in suspicious files system locations

Suspicious Outbound RDP Connections
Detects Non-Standard Tools Connecting to TCP port 3389 indicating possible lateral movement

Microsoft Binary Github Communication
Detects an executable in the Windows folder accessing github.com

Microsoft Binary Suspicious Communication Endpoint
Detects an executable in the Windows folder accessing suspicious domains

Abusing Azure Browser SSO
Detects abusing Azure Browser SSO by requesting OAuth 2.0 refresh tokens for an Azure-AD-authenticated Windows user (i.e. the machine is joined to Azure AD and a user logs in with their Azure AD account) wanting to perform SSO authentication in the browser. An attacker can use this to authenticate to Azure AD in a browser as that user.

PowerShell Execution
Detects execution of PowerShell

Fax Service DLL Search Order Hijack
The Fax service attempts to load ualapi.dll, which is non-existent. An attacker can then (side)load their own malicious DLL using this service.

Possible Process Hollowing Image Loading
Detects Loading of samlib.dll, WinSCard.dll from untypical process e.g. through process hollowing by Mimikatz

dotNET DLL Loaded Via Office Applications
Detects any assembly DLL being loaded by an Office Product

CLR DLL Loaded Via Office Applications
Detects CLR DLL being loaded by an Office Product

GAC DLL Loaded Via Office Applications
Detects any GAC DLL being loaded by an Office Product

Active Directory Parsing DLL Loaded Via Office Applications
Detects DSParse DLL being loaded by an Office Product

Active Directory Kerberos DLL Loaded Via Office Applications
Detects Kerberos DLL being loaded by an Office Product

Unsigned Image Loaded Into LSASS Process
Loading unsigned image (DLL, EXE) into LSASS process

WMI Modules Loaded
Detects non wmiprvse loading WMI modules

WMI Persistence – Command Line Event Consumer
Detects WMI command line event consumers

File Created with System Process Name
Detects the creation of a executable with a system process name in a suspicious folder

Cred Dump Tools Dropped Files
Files with well-known filenames (parts of credential dump software or files produced by them) creation

Detection of SafetyKatz
Detects possible SafetyKatz Behaviour

LSASS Memory Dump File Creation
LSASS memory dump creation using operating systems utilities. Procdump will use process name in output file if no name is specified

Microsoft Office Add-In Loading
Detects add-ins that load when Microsoft Word or Excel starts (.wll/.xll are simply .dll fit for Word or Excel).

Malicious PowerShell Commandlet Names
Detects the creation of known powershell scripts for exploitation

QuarksPwDump Dump File
Detects a dump file written by QuarksPwDump password dumper

RedMimicry Winnti Playbook Dropped File
Detects actions caused by the RedMimicry Winnti playbook

Suspicious ADSI-Cache Usage By Unknown Tool
Detects the usage of ADSI (LDAP) operations by tools. This may also detect tools like LDAPFragger.

Windows Webshell Creation
Possible webshell file creation on a static web site

WMI Persistence – Script Event Consumer File Write
Detects file writes of WMI script event consumer

Suspicious Desktopimgdownldr Target File
Detects a suspicious Microsoft desktopimgdownldr file creation that stores a file to a suspicious location or contains a file with a suspicious extension

Suspicious Driver Load from Temp
Detects a driver load from a temporary directory

Source

These rules are made by the Sigma Project. This is a collection of rules for several different attack tactics. The rules are created by the Sigma community and translated into the format for the Elastic Security Detection engine.

The translation was made with SIEGMA 

Tested versions 7.12
ECS compliant

You must log in to submit a review.

Related downloads

Filebeat Suricata Canvas dashboard

A Kibana Canvas dashboard example that visualizes suricata logs collected with Filebeat.

Cloudflare Kibana dashboards

Cloudflare dashboards and ingest pipelines to visualize cloudflare logs

Office 365 dashboards

A collection of Kibana dashboards to provide a holistic view of Microsoft Office 365 environments

Threat detection Kibana dashboard

Kibana dashboard example visualizing the results of the Elastic SIEM detection engine

Sigma detection rules for proxy server logs

A collection of rules based on the Sigma detection rules for proxy server and web server looks, e.g. zeek or suricata.

Sigma Windows Process Creation detection rules

A collection of rules based on the Sigma rules for Windows (process creation folder) based on Winlogbeat data .

These downloads could be also interesting for you

osquery performance dashboard

Kibana Dashboard example to visualize osquery performance

Cloudflare Kibana dashboards

Cloudflare dashboards and ingest pipelines to visualize cloudflare logs

Kibana Maps with Open Weather Map

This is the default basemap of Kibana incl. the Open Weather Map tile for temperature, wind and pressure

Coffee Canvas Example

Kibana Canvas example infographic to show coffee consumption on a wallboard

Playable Pacman

This is a playable version of pacman made with Vega.