Skip to content

Commit 567a41d

Browse files
update readme and specification
1 parent eb3d86c commit 567a41d

File tree

2 files changed

+211
-172
lines changed

2 files changed

+211
-172
lines changed

README.md

Lines changed: 27 additions & 39 deletions
Original file line numberDiff line numberDiff line change
@@ -52,65 +52,53 @@ You can get started by using one of the available rule templates, including full
5252
#### Minimal RootA rule example:
5353
```
5454
name: Possible Credential Dumping Using Comsvcs.dll (via cmdline)
55-
detection:
56-
language: splunk
57-
body: index=* ((((process="*comsvcs*") AND (process="*MiniDump*")) OR ((process="*comsvcs*") AND (process="*#24*"))) OR ((process="*comsvcs*") AND (process="*full*")))
58-
```
59-
#### Short RootA rule example:
60-
```
61-
name: Possible Credential Dumping Using Comsvcs.dll (via cmdline)
6255
details: Adversaries can use built-in library comsvcs.dll to dump credentials on a compromised host.
6356
author: SOC Prime Team
6457
severity: high
65-
references:
66-
- https://badoption.eu/blog/2023/06/21/dumpit.html
67-
- https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/
68-
- https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/
69-
- https://cert.gov.ua/article/39518
70-
logsource:
71-
vendor: microsoft
72-
product: windows
73-
category: process_creation
58+
date: 2020-05-24
59+
mitre-attack: t1003.001
7460
detection:
75-
language: splunk
76-
schema: cim
61+
language: splunk-spl-query # elastic-lucene-query, logscale-lql-query, mde-kql-query
7762
body: index=* ((((process="*comsvcs*") AND (process="*MiniDump*")) OR ((process="*comsvcs*") AND (process="*#24*"))) OR ((process="*comsvcs*") AND (process="*full*")))
63+
references:
64+
- https://badoption.eu/blog/2023/06/21/dumpit.html
65+
license: DRL 1.1
7866
```
67+
7968
#### Full RootA rule example:
8069
```
8170
name: Possible Credential Dumping Using Comsvcs.dll (via cmdline)
82-
uuid: 151fbb45-0048-497a-95ec-2fa733bb15dc
8371
details: Adversaries can use built-in library comsvcs.dll to dump credentials on a compromised host.
8472
author: SOC Prime Team
85-
version: 1
86-
license: DRL 1.1
87-
type: query
88-
class: behaviour
8973
severity: high
74+
type: query
75+
class: behaviour
9076
date: 2020-05-24
77+
mitre-attack: t1003.001
9178
timeline:
9279
2022-04-01 - 2022-08-08: Bumblebee
9380
2022-07-27: KNOTWEED
9481
2022-12-04: UAC-0082, CERT-UA#4435
95-
mitre-attack: t1003.001
96-
tags: Bumblebee, UAC-0082, CERT-UA#4435, KNOTWEED, Comsvcs, cir_ttps, ContentlistEndpoint
97-
references:
98-
- https://badoption.eu/blog/2023/06/21/dumpit.html
99-
- https://thedfirreport.com/2022/08/08/bumblebee-roasts-its-way-to-domain-admin/
100-
- https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/
101-
- https://cert.gov.ua/article/39518
10282
logsource:
103-
layer: host
104-
vendor: microsoft
105-
product: windows
106-
category: process_creation
107-
source: Windows Security Event Log
108-
enable: Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Detailed Tracking -> Audit Process
83+
product: Windows # Sigma or OCSF products
84+
log_name: Security # OCSF log names
85+
class_name: Process Activity # OCSF classes
86+
#category: # Sigma categories
87+
#service: # Sigma services
88+
audit:
89+
source: Windows Security Event Log
90+
enable: Computer Configuration -> Windows Settings -> Security Settings -> Advanced Audit Policy Configuration -> System Audit Policies -> Detailed Tracking -> Audit Process
10991
detection:
110-
language: splunk
111-
schema: cim
92+
language: splunk-spl-query # elastic-lucene-query, logscale-lql-query, mde-kql-query
11293
body: index=* ((((process="*comsvcs*") AND (process="*MiniDump*")) OR ((process="*comsvcs*") AND (process="*#24*"))) OR ((process="*comsvcs*") AND (process="*full*")))
113-
response: []
94+
references:
95+
- https://badoption.eu/blog/2023/06/21/dumpit.html
96+
tags: Bumblebee, UAC-0082, CERT-UA#4435, KNOTWEED, Comsvcs, cir_ttps, ContentlistEndpoint
97+
license: DRL 1.1
98+
version: 1
99+
uuid: 151fbb45-0048-497a-95ec-2fa733bb15dc
100+
#correlation: [] # extended format
101+
#response: [] # extended format
114102
```
115103

116104
### Fields

0 commit comments

Comments
 (0)