LOLBAS/YML-Template.yml

43 lines
1.3 KiB
YAML
Raw Normal View History

2018-09-18 16:32:50 +02:00
---
2018-09-18 16:31:27 +02:00
Name: Binary.exe
Description: Something general about the binary
2021-11-05 19:58:26 +01:00
Author: The name of the person that created this file
Created: YYYY-MM-DD (date the person created this file)
2018-09-18 16:31:27 +02:00
Commands:
- Command: The command
Description: Description of the command
Usecase: A description of the usecase
Category: Execute
2018-09-18 16:31:27 +02:00
Privileges: Required privs
MitreID: T1055
OperatingSystem: Windows 10 1803, Windows 10 1703
- Command: The second command
Description: Description of the second command
Usecase: A description of the usecase
Category: AWL Bypass
2018-09-18 16:31:27 +02:00
Privileges: Required privs
MitreID: T1033
OperatingSystem: Windows 10 All
Full_Path:
2019-06-27 17:02:21 +02:00
- Path: c:\windows\system32\bin.exe
- Path: c:\windows\syswow64\bin.exe
2021-11-05 19:58:26 +01:00
Code_Sample:
2019-06-27 17:02:21 +02:00
- Code: http://url.com/git.txt
2021-11-05 19:58:26 +01:00
Detection:
2019-06-27 17:02:21 +02:00
- IOC: Event ID 10
- IOC: binary.exe spawned
- Analysis: https://link/to/blog/gist/writeup/if/applicable
- Sigma: https://link/to/sigma/rule/if/applicable
- Elastic: https://link/to/elastic/rule/if/applicable
- Splunk: https://link/to/splunk/rule/if/applicable
- BlockRule: https://link/to/microsoft/block/rules/if/applicable
2018-09-18 16:31:27 +02:00
Resources:
2019-06-27 17:02:21 +02:00
- Link: http://blogpost.com
- Link: http://twitter.com/something
- Link: Threatintelreport...
Acknowledgement:
2018-09-18 16:31:27 +02:00
- Person: John Doe
Handle: '@johndoe'
2018-09-18 16:31:27 +02:00
- Person: Ola Norman
2021-11-05 19:58:26 +01:00
Handle: '@olaNor'