Linux support with automated detection validation#6
Open
Murat-Oruntak wants to merge 2 commits intokrdmnbrk:mainfrom
Open
Linux support with automated detection validation#6Murat-Oruntak wants to merge 2 commits intokrdmnbrk:mainfrom
Murat-Oruntak wants to merge 2 commits intokrdmnbrk:mainfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
This PR adds Linux platform support to AttackRuleMap's automated detection pipeline.
Using an Ubuntu VM on VirtualBox, 385 Atomic Red Team Linux tests were executed and
validated against Sigma and ESCU detection rules via Splunk.
Results
What changed
Code changes (7 files):
config.py-- Platform-aware configuration (PLATFORM, VM_SSH_PORT, USE_PROXMOX)execution_handler.py-- SSH/bash executor, sudo for Linux, prereq executor fix,bash multiline command fix
dynamic_generator.py-- Linux Sigma rule filtering, CIM mapping skip for auditdvm_handler.py-- VirtualBox (VBoxManage) support alongside Proxmoxreport_handler.py-- Platform-specific MITRE Navigator layerssigma_handler.py-- Linux-only Sigma rule filtering.env.example-- New environment variables documentedNew files:
dist/attack_rule_map_linux.json-- Linux detection mapping (25 techniques, 84 entries)dist/mitre_layer_*_linux.json-- MITRE ATT&CK Navigator layers for Linuxadd_splunk_macros.py-- Helper script to install ESCU filter macros in SplunkKey design decisions
config.PLATFORMchecks -- Windows pipeline is untouchedUSE_PROXMOXflag -- Proxmox pipeline is untouchedcould be added in the future for 119 additional Sigma rules)
Detected techniques
T1027.001, T1030, T1033, T1036.003, T1053.003, T1057, T1059.004,
T1070.003, T1070.006, T1082, T1105, T1113, T1136.001, T1201,
T1222.002, T1489, T1529, T1543.002, T1546.004, T1552.001,
T1552.003, T1560.001, T1562.001, T1562.006, T1564.001
VM setup required
Limitations & future work