ScienceSoftLinuxMITREFreePack UserGuide
ScienceSoftLinuxMITREFreePack UserGuide
www.scnsoft.com
QRadar SIEM: Admin Guide
ADMIN GUIDE
Table of Contents
Overview.....................................................................................................................................3
Supported Versions ...................................................................................................................4
Extension Installation ................................................................................................................5
Downloading Extension ............................................................................................................... 5
Installing Extension ..................................................................................................................... 5
Overview.....................................................................................................................................6
Rules overview........................................................................................................................... 6
Rules structure ........................................................................................................................... 7
Prerequisites ..............................................................................................................................9
Configuring rsyslog ................................................................................................................... 10
Configuring auditd..................................................................................................................... 11
Usage........................................................................................................................................12
Enable rules ............................................................................................................................. 12
Add legitimate Linux users ......................................................................................................... 12
Troubleshooting .......................................................................................................................14
Appendix A: Release notes......................................................................................................15
1.0.0 ................................................................................................................................... 15
Appendix B: Custom Properties ..............................................................................................16
Appendix C: Custom Rules......................................................................................................17
Overview
Linux MITRE ATT&CK tactics f rom ScienceSoft are based on auditd logs provided by properly configured
auditing component.
Auditd is a userspace component to the UNIX Auditing System (Audit Daemon) that provides a user with a
security auditing aspect in various Linux distributives. The set of the rules developed by ScienceSoft includes
auditd configuration steps that are to be performed in order f or those rules to work. The rules logic is simple
and straight forward, and relies mostly on the auditd configuration.
While massively tested and tuned, Linux MITRE ATT&CK rules are disabled by default in order to prevent
potential f alse-positives on production SIEM environment, so make sure to enable them af ter the auditd
conf iguration is done.
IMPORTANT: This complimentary content pack is a part of thea f ull set of Linux MITRE rules developed by
ScienceSoft. You can request the full set of the rules as a commercial product including professional services
support for auditd configuration and troubleshooting at [email protected].
Supported Versions
Supported QRadar versions are:
• 7.3.0 GA and higher
NOTE: this content pack is developed by ScienceSoft Inc. and is not supported by IBM. You can request your
own QRadar content pack to be developed via the following email address: [email protected].
Extension Installation
This rules content pack is distributed as a QRadar extension. In order to install this extension please follow
the steps below.
Downloading Extension
• Go to https://exchange.xforce.ibmcloud.com/hub
• Login using your IBMid
• Filter by Type: Custom Rule
• Select MITRE ATT&CK for Linux Platforms extension
• Click Download button at the top right corner
• Save the extension zip file
Installing Extension
• Login to QRadar UI
• Go to Admin tab
• Open Extensions Management
• Click Add button
• Select Install immediately checkbox, click Browse button, locate the extension file downloaded
f rom IBM App Exchange and click Add button
• Conf irm all the steps and wait for installation to finish. This may take a while.
• Close Extensions Management window, press Ctrl+F5 to fully reload QRadar UI.
• Deploy changes if asked by QRadar
Overview
Rules overview
To get the list of MITRE rules please follow the steps below.
• Go to Offense tab
• Click Rules link
Rules structure
Click any MITRE group rule for more details.
IMPORTANT: In order to make MITRE rules to trigger you must configure auditd for every rule you are
interested in. The Notes section of every rule contains a detailed auditd configuration to be performed.
IMPORTANT: please scroll down the Notes section to review the whole configuration guide for the rule.
This wizard page shows you the CRE event that will be generated when the rule triggers. Event Name field
contains the unique id and the name of MITRE tactic. Event Description field contains a short description
and a link to this particular tactic at mitre.org
Prerequisites
Following software versions are required for proper configuration of audit settings and forwarding to QRadar:
• audit-1.8.x or higher
• rsyslog5-5.8.x or higher
c) For Debian/Ubuntu:
# apt install rsyslog
# apt install audispd-plugins
Configuring rsyslog
Linux Audit Framework (LAF) produces a massive amount of audit events and might greatly affect QRadar
EPS license. Advanced LAF audit events f iltering allows you to skip the messages that are not involved in
QRadar correlation rules.
For Redhat/Debian based distros:
Add the following lines to /etc/rsyslog.d/audit.conf
################### BEGIN ##################
# Advanced Rsyslog audit template for SIEM #
############################################
# This template is used for filtering LAF messages to SIEM solution
$EscapeControlCharactersOnReceive off
Configuring auditd
Most of the rules provided with this content pack require auditd daemon configuration.
This will provide more details for various audit log fields including usernames, groups and syscalls.
Please f ollow the instructions in Notes section for every particular rule.
Audit rules can be configured via command line with the auditctl utility or written in the audit.rules file.
Note that rules defined with the help of auditctl command are not persistent across reboots.
To def ine Audit rules that are persistent across reboots, you must include them in the following file:
/etc/audit/rules.d/audit.rules
Usage
Enable rules
Once you are done with auditd configuration for your Linux system, enable the related rule(s) in order to
make it work.
Add legitimate user names to the MITRE: Linux Users reference set in order to avoid false-positive offenses.
NOTE: Please refer to Appendix C f or complete list of rules available in this package.
Click on upload icon and select map file with json extension, then click Import.
You can download a mapping json file from following link https://qlean.io/files/linux_mapping.json
or request it via email [email protected].
Troubleshooting
This content package is provided “as-is”. You can provide any suggestions how to make it better and request
prof essional services support for auditd configuration and troubleshooting at [email protected].
https://www.scnsoft.com/services/secu
rity/siem/linux-mitre-attack-rules
MITRE.LIN.T1016.RULE when the event(s) were detected by Following auditd rules should be
System Network one or more of Linux OS enabled:
Configuration Discovery AND when the event matches
MITRE-Linux: Auditd Key (custom) -w /etc/hosts -p r -k siem-network-
is any of siem-network-discovery discovery
AND NOT when any of MITRE- -w /etc/sysconfig/network -p r -k siem-
Linux: UID (custom) are contained in network-discovery
any of MITRE: Linux Users - -w /etc/network/ -p r -k siem-network-
AlphaNumeric (Ignore Case) discovery
-a always,exit -F
dir=/etc/NetworkManager/ -F perm=r -k
siem-network-discovery
-w /etc/sysconfig/network -p r -k siem-
network-discovery
-w /etc/netplan/ -p r -k siem-network-
discovery
-w /usr/bin/ip -p x -k siem-network-
discovery
-w /usr/sbin/ifconfig -p x -k siem-
network-discovery
-w /usr/bin/nmcli -p x -k siem-network-
discovery
-w /usr/sbin/route -p x -k siem-network-
discovery
-w /usr/sbin/arp -p x -k siem-network-
discovery
MITRE.LIN.T1052.RULE when the event(s) were detected by Following auditd rules should be
Exfiltration Over one or more of Linux OS enabled:
Physical Medium AND when the event matches
MITRE-Linux: Auditd Key (custom) auditctl -a exit,always -F arch=b64 -S
is any of siem-mount mount -S umount2 -k siem-mount
AND NOT when any of MITRE-
Linux: UID (custom) are contained in Get more Linux MITRE rules:
any of MITRE: Linux Users - https://www.scnsoft.com/services/secu
AlphaNumeric (Ignore Case) rity/siem/linux-mitre-attack-rules
MITRE.LIN.T1055.RULE when the event(s) were detected by Following auditd rules should be
Process Injection one or more of Linux OS enabled:
AND when the event matches
MITRE-Linux: Auditd Key (custom) -a always,exit -F arch=b64 -S ptrace -k
is any of siem-process-injection siem-process-injection
AND NOT when any of MITRE- -a always,exit -F arch=b64 -S ptrace -
Linux: UID (custom) are contained in F a0=0x4 -k siem-process-injection
any of MITRE: Linux Users - -a always,exit -F arch=b64 -S ptrace -
AlphaNumeric (Ignore Case) F a0=0x5 -k siem-process-injection
-a always,exit -F arch=b64 -S ptrace -
F a0=0x6 -k siem-process-injection
-w /usr/bin/apt-get -p x -k siem-
package-manager
-w /usr/bin/aptitude -p x -k siem-
package-manager
-w /etc/crontab -p wa -k siem-
scheduling
-w /var/spool/cron/crontabs/ -k siem-
scheduling
-w /etc/inittab -p wa -k siem-scheduling
-w /etc/init.d/ -p wa -k siem-scheduling
-w /etc/init/ -p wa -k siem-scheduling
-w /etc/anacrontab -p wa -k siem-
scheduling
-w /etc/at.allow -p wa -k siem-
scheduling
-w /etc/at.deny/ -p wa -k siem-
scheduling
-w /var/spool/at/ -p wa -k siem-
scheduling
https://www.scnsoft.com/services/secu
rity/siem/linux-mitre-attack-rules
MITRE.LIN.T1483.DUMM when the event(s) were detected by Domain Generation Algorithms
Y Domain Generation one or more log source types covered by default IBM applications.
Algorithms Or you can use our free lightweight
application to detect DGA domains.
See more on
https://www.scnsoft.com/services/secu
rity/siem
MITRE.LIN.T1485.RULE when the event(s) were detected by Following auditd rules should be
Data Destruction one or more of Linux OS enabled:
AND when the event matches
MITRE-Linux: Auditd Key (custom) -a always,exit -F arch=b64 -S
is any of siem-destruction rename,rmdir,unlink,unlinkat,renameat
AND NOT when any of MITRE- -F auid!=-1 -F dir=/etc -k siem-
Linux: UID (custom) are contained in destruction
any of MITRE: Linux Users - -a always,exit -F arch=b64 -S
AlphaNumeric (Ignore Case) rename,rmdir,unlink,unlinkat,renameat
-F auid!=-1 -F dir=/bin -k siem-
destruction
-a always,exit -F arch=b64 -S
rename,rmdir,unlink,unlinkat,renameat
-F auid!=-1 -F dir=/sbin -k siem-
destruction
-a always,exit -F arch=b64 -S
rename,rmdir,unlink,unlinkat,renameat
-F auid!=-1 -F dir=/usr/bin -k siem-
destruction
-a always,exit -F arch=b64 -S
rename,rmdir,unlink,unlinkat,renameat
-F auid!=-1 -F dir=/usr/sbin -k siem-
destruction
-a always,exit -F arch=b64 -S
rename,rmdir,unlink,unlinkat,renameat
-F auid!=-1 -F dir=/var -k siem-
destruction
-a always,exit -F arch=b64 -S
rename,rmdir,unlink,unlinkat,renameat
-F auid!=-1 -F dir=/home -k siem-
destruction
-a always,exit -F arch=b64 -S
rename,rmdir,unlink,unlinkat,renameat
-F auid!=-1 -F dir=/srv -k siem-
destruction
#DEBIAN/UBUNTU
-a exit,always -F arch=b64 -S execve -
F path=/usr/sbin/reboot -k siem-reboot
-a exit,always -F arch=b64 -S execve -
F path=/usr/sbin/init -k siem-reboot
-a exit,always -F arch=b64 -S execve -
F path=/usr/sbin/poweroff -k siem-
reboot
-a exit,always -F arch=b64 -S execve -
F path=/usr/sbin/shutdow -k siem-
reboot
MITRE.LIN.T1531.RULE when the event(s) were detected by Following auditd rules should be
Account Access one or more of Linux OS enabled:
Removal AND when the event matches
MITRE-Linux: Auditd Key (custom) -a always,exit -S all -F
is any of siem-usr-access-rem path=/etc/passwd -F perm=w -F uid!=0
AND NOT when any of MITRE- -k siem-usr-access-rem
Linux: UID (custom) are contained in -a always,exit -S all -F
any of MITRE: Linux Users - path=/etc/shadow -F perm=w -F uid!=0
AlphaNumeric (Ignore Case) -k siem-usr-access-rem