Merge pull request #3908 from nasbench/nasbench-rule-devel
feat: new rules and updates
This commit is contained in:
@@ -0,0 +1,25 @@
|
||||
title: Malicious AppX Package Installed
|
||||
id: 09d3b48b-be17-47f5-bf4e-94e7e75d09ce
|
||||
status: experimental
|
||||
description: Detects installation of known malicious appx packages
|
||||
references:
|
||||
- https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/
|
||||
- https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
|
||||
- https://forensicitguy.github.io/analyzing-magnitude-magniber-appx/
|
||||
author: Nasreddine Bencherchali
|
||||
date: 2023/01/11
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
detection:
|
||||
selection:
|
||||
EventID: 401
|
||||
# Add more malicious package names
|
||||
# TODO: Investigate the packages here https://github.com/sophoslabs/IoCs/blob/master/Troj-BazarBackdoor.csv based on this report https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
|
||||
PackageFullName|contains: '3669e262-ec02-4e9d-bcb4-3d008b4afac9'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Rare occasions where a malicious package uses the exact same name and version as a legtimate application
|
||||
level: medium
|
||||
+24
@@ -0,0 +1,24 @@
|
||||
title: Suspicious AppX Package Installation Attempt
|
||||
id: 898d5fc9-fbc3-43de-93ad-38e97237c344
|
||||
status: experimental
|
||||
description: Detects an appx package installation with the error code "0x80073cff". Whihc indicates that the package didn't meet the sgining requirements and could be suspicious
|
||||
references:
|
||||
- Internal Research
|
||||
- https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/
|
||||
- https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting
|
||||
- https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
|
||||
author: Nasreddine Bencherchali
|
||||
date: 2023/01/11
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
detection:
|
||||
selection:
|
||||
EventID: 401
|
||||
ErrorCode: '0x80073cff' # Check ref section to learn more about this error code
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Legitimate AppX packages not signed by MS used part of an enterprise
|
||||
level: medium
|
||||
@@ -0,0 +1,42 @@
|
||||
title: Suspicious Remote AppX Package Locations
|
||||
id: 8b48ad89-10d8-4382-a546-50588c410f0d
|
||||
status: experimental
|
||||
description: Detects an appx package added the pipeline of the "to be processed" packages which is downloaded from a suspicious domain
|
||||
references:
|
||||
- Internal Research
|
||||
- https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/
|
||||
- https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting
|
||||
- https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
|
||||
author: Nasreddine Bencherchali
|
||||
date: 2023/01/11
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
detection:
|
||||
selection:
|
||||
EventID: 854
|
||||
Path|contains:
|
||||
- 'transfer.sh'
|
||||
- 'raw.githubusercontent.com'
|
||||
- 'gist.githubusercontent.com'
|
||||
- 'pastebin.com'
|
||||
- 'cdn.discordapp.com/attachments/'
|
||||
- 'mediafire.com'
|
||||
- 'mega.nz'
|
||||
- 'ddns.net'
|
||||
- '.paste.ee'
|
||||
- '.hastebin.com'
|
||||
- '.ghostbin.co/'
|
||||
- 'ufile.io'
|
||||
- 'storage.googleapis.com'
|
||||
- 'anonfiles.com'
|
||||
- 'send.exploit.in'
|
||||
- 'privatlab.net'
|
||||
- 'privatlab.com'
|
||||
- 'sendspace.com'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
+37
@@ -0,0 +1,37 @@
|
||||
title: Suspicious AppX Package Locations
|
||||
id: 5cdeaf3d-1489-477c-95ab-c318559fc051
|
||||
status: experimental
|
||||
description: Detects an appx package added the pipeline of the "to be processed" packages which is located in suspicious locations
|
||||
references:
|
||||
- Internal Research
|
||||
- https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/
|
||||
- https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting
|
||||
- https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
|
||||
author: Nasreddine Bencherchali
|
||||
date: 2023/01/11
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
detection:
|
||||
selection:
|
||||
EventID: 854
|
||||
Path|contains:
|
||||
# Paths can be written using forward slash if the "file://" protocol is used
|
||||
- 'C:\Users\Public\'
|
||||
- '/users/public/'
|
||||
- 'C:\PerfLogs\'
|
||||
- 'C:/perflogs/'
|
||||
- '\Desktop\'
|
||||
- '/desktop/'
|
||||
- '\Downloads\'
|
||||
- '/Downloads/'
|
||||
- 'C:\Windows\Temp\'
|
||||
- 'C:/Windows/Temp/'
|
||||
- '\AppdData\Local\Temp\'
|
||||
- '/AppdData/Local/Temp/'
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
+37
@@ -0,0 +1,37 @@
|
||||
title: Uncommon AppX Package Locations
|
||||
id: c977cb50-3dff-4a9f-b873-9290f56132f1
|
||||
status: experimental
|
||||
description: Detects an appx package added the pipeline of the "to be processed" packages which is located in uncommon locations
|
||||
references:
|
||||
- Internal Research
|
||||
- https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/
|
||||
- https://learn.microsoft.com/en-us/windows/win32/appxpkg/troubleshooting
|
||||
- https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
|
||||
author: Nasreddine Bencherchali
|
||||
date: 2023/01/11
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
detection:
|
||||
selection:
|
||||
EventID: 854
|
||||
filter_generic:
|
||||
Path|contains:
|
||||
# Paths can be written using forward slash if the "file://" protocol is used
|
||||
- 'C:\Program Files\WindowsApps\'
|
||||
- 'C:\Program Files (x86)\'
|
||||
- 'C:\Windows\SystemApps\'
|
||||
- 'C:\Windows\PrintDialog\'
|
||||
- 'C:\Windows\ImmersiveControlPanel\'
|
||||
- 'x-windowsupdate://'
|
||||
- 'file:///C:/Program%20Files' # Also covers 'file:///C:/Program%20Files%20(x86)/'
|
||||
filter_specific:
|
||||
Path|contains:
|
||||
- 'https://statics.teams.cdn.office.net/'
|
||||
- 'microsoft.com' # Example: https://go.microsoft.com/fwlink/?linkid=2160968
|
||||
condition: selection and not 1 of filter_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: medium
|
||||
+3
-3
@@ -1,13 +1,13 @@
|
||||
title: AppInstaller Attempts From URL by DNS
|
||||
title: AppX Package Installation Attempts Via AppInstaller
|
||||
id: 7cff77e1-9663-46a3-8260-17f2e1aa9d0a
|
||||
status: test
|
||||
description: AppInstaller.exe is spawned by the default handler for the URI, it attempts to load/install a package from the URL
|
||||
description: AppInstaller.exe is spawned by the default handler for the "ms-appinstaller" URI. It attempts to load/install a package from the referenced URL
|
||||
references:
|
||||
- https://twitter.com/notwhickey/status/1333900137232523264
|
||||
- https://lolbas-project.github.io/lolbas/Binaries/AppInstaller/
|
||||
author: frack113
|
||||
date: 2021/11/24
|
||||
modified: 2022/12/25
|
||||
modified: 2023/01/12
|
||||
tags:
|
||||
- attack.command_and_control
|
||||
- attack.t1105
|
||||
@@ -1,5 +1,12 @@
|
||||
title: Change PowerShell Policies to an Insecure Level - PowerShell
|
||||
id: 61d0475c-173f-4844-86f7-f3eebae1c66b
|
||||
related:
|
||||
- id: cf2e938e-9a3e-4fe8-a347-411642b28a9f # ProcCreation Registry
|
||||
type: similar
|
||||
- id: 87e3c4e8-a6a8-4ad9-bb4f-46e7ff99a180 # ProcCreation Cmdlet
|
||||
type: similar
|
||||
- id: fad91067-08c5-4d1a-8d8c-d96a21b37814 # Registry
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects use of Set-ExecutionPolicy to set insecure policies
|
||||
references:
|
||||
|
||||
@@ -7,7 +7,7 @@ references:
|
||||
- https://twitter.com/D1rkMtr/status/1611471891193298944?s=20
|
||||
author: frack113
|
||||
date: 2023/01/07
|
||||
modified: 2023/01/09
|
||||
modified: 2023/01/11
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
- attack.t1562.002
|
||||
@@ -20,12 +20,20 @@ detection:
|
||||
CallTrace|startswith: 'C:\Windows\SYSTEM32\ntdll.dll+'
|
||||
CallTrace|contains: '|UNKNOWN('
|
||||
CallTrace|endswith: ')'
|
||||
filter_msbuild:
|
||||
SourceImage|startswith: 'C:\Program Files\Microsoft Visual Studio\'
|
||||
SourceImage|endswith:
|
||||
- '\MSBuild\Current\Bin\amd64\MSBuild.exe'
|
||||
- '\MSBuild\Current\Bin\MSBuild.exe'
|
||||
TargetImage|startswith: 'C:\Program Files\Microsoft Visual Studio\'
|
||||
filter_generic:
|
||||
SourceImage|startswith:
|
||||
- 'C:\Program Files\'
|
||||
- 'C:\Program Files (x86)\'
|
||||
- 'C:\Windows\System32\'
|
||||
- 'C:\Windows\SysWOW64\'
|
||||
TargetImage|startswith:
|
||||
- 'C:\Program Files\'
|
||||
- 'C:\Program Files (x86)\'
|
||||
- 'C:\Windows\System32\'
|
||||
- 'C:\Windows\SysWOW64\'
|
||||
filter_thor:
|
||||
SourceImage|startswith: 'C:\Windows\Temp\asgard2-agent\'
|
||||
SourceImage|endswith: '\thor\thor64.exe'
|
||||
condition: selection and not 1 of filter_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
@@ -1,5 +1,12 @@
|
||||
title: Change PowerShell Policies to an Insecure Level
|
||||
id: 87e3c4e8-a6a8-4ad9-bb4f-46e7ff99a180
|
||||
related:
|
||||
- id: cf2e938e-9a3e-4fe8-a347-411642b28a9f # ProcCreation Registry
|
||||
type: similar
|
||||
- id: 61d0475c-173f-4844-86f7-f3eebae1c66b # ScriptBlock
|
||||
type: similar
|
||||
- id: fad91067-08c5-4d1a-8d8c-d96a21b37814 # Registry
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects use of executionpolicy option to set insecure policies
|
||||
references:
|
||||
|
||||
@@ -0,0 +1,34 @@
|
||||
title: Potential PowerShell Execution Policy Tampering - ProcCreation
|
||||
id: cf2e938e-9a3e-4fe8-a347-411642b28a9f
|
||||
related:
|
||||
- id: fad91067-08c5-4d1a-8d8c-d96a21b37814 # ProcCreation Registry
|
||||
type: similar
|
||||
- id: 87e3c4e8-a6a8-4ad9-bb4f-46e7ff99a180 # ProcCreation Cmdlet
|
||||
type: similar
|
||||
- id: 61d0475c-173f-4844-86f7-f3eebae1c66b # PowerShell ScriptBlock
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects changes to the PowerShell execution policy registry key in order to bypass signing requirements for script execution from the CommandLine
|
||||
references:
|
||||
- https://learn.microsoft.com/de-de/powershell/module/microsoft.powershell.security/set-executionpolicy?view=powershell-7.3
|
||||
author: Nasreddine Bencherchali
|
||||
date: 2023/01/11
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
product: windows
|
||||
category: process_creation
|
||||
detection:
|
||||
selection_path:
|
||||
CommandLine|contains:
|
||||
- '\ShellIds\Microsoft.PowerShell\ExecutionPolicy'
|
||||
- '\Policies\Microsoft\Windows\PowerShell\ExecutionPolicy'
|
||||
selection_values:
|
||||
CommandLine|contains:
|
||||
- 'Bypass'
|
||||
- 'RemoteSigned'
|
||||
- 'Unrestricted'
|
||||
condition: all of selection_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -0,0 +1,38 @@
|
||||
title: Suspicious Windows App Activity
|
||||
id: f91ed517-a6ba-471d-9910-b3b4a398c0f3
|
||||
status: experimental
|
||||
description: Detects suspicious children of application launched from inside the WindowsApps directory. This could be a sign of a rogue ".appx" package installation/execution
|
||||
references:
|
||||
- https://news.sophos.com/en-us/2021/11/11/bazarloader-call-me-back-attack-abuses-windows-10-apps-mechanism/
|
||||
- https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/
|
||||
author: Nasreddine Bencherchali
|
||||
date: 2023/01/12
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
product: windows
|
||||
category: process_creation
|
||||
detection:
|
||||
selection_parent:
|
||||
#GrandParentImage|endswith: '\sihost.exe'
|
||||
ParentImage|contains: 'C:\Program Files\WindowsApps\'
|
||||
selection_susp_img:
|
||||
Image|endswith:
|
||||
# You can add more LOLBINs
|
||||
- '\poweshell.exe'
|
||||
- '\pwsh.exe'
|
||||
- '\rundll32.exe'
|
||||
- '\regsvr32.exe'
|
||||
- '\mshta.exe'
|
||||
- '\cscript.exe'
|
||||
- '\wscript.exe'
|
||||
selection_susp_cli:
|
||||
# You can add more suspicious keywords
|
||||
CommandLine|contains:
|
||||
- 'cmd /c'
|
||||
- 'Invoke-'
|
||||
- 'Base64'
|
||||
condition: selection_parent and 1 of selection_susp_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -6,7 +6,7 @@ references:
|
||||
- https://github.com/Wh04m1001/SysmonEoP
|
||||
author: frack113, Tim Shelton (update fp)
|
||||
date: 2022/12/05
|
||||
modified: 2023/01/10
|
||||
modified: 2023/01/11
|
||||
tags:
|
||||
- attack.privilege_escalation
|
||||
- attack.defense_evasion
|
||||
@@ -53,6 +53,10 @@ detection:
|
||||
ParentImage|startswith: 'C:\Windows\SysWOW64\config\systemprofile\Citrix\UpdaterBinaries\'
|
||||
ParentImage|endswith: '\CitrixReceiverUpdater.exe'
|
||||
Image|endswith: '\cmd.exe'
|
||||
filter_thor:
|
||||
ParentImage|endswith: '\python.exe'
|
||||
CommandLine: 'C:\WINDOWS\system32\cmd.exe /c "ver"'
|
||||
CurrentDirectory|contains: 'C:\WINDOWS\Temp\asgard2-agent\'
|
||||
condition: all of selection_* and not 1 of filter_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
|
||||
@@ -0,0 +1,28 @@
|
||||
title: Potential Signing Bypass Via Windows Developer Features
|
||||
id: a383dec4-deec-4e6e-913b-ed9249670848
|
||||
status: experimental
|
||||
description: Detects when a user enable developer features such as "Developer Mode" or "Application Sideloading". Which allows the user to install untrusted packages.
|
||||
references:
|
||||
- Internal Research
|
||||
- https://www.sentinelone.com/labs/inside-malicious-windows-apps-for-malware-deployment/
|
||||
author: Nasreddine Bencherchali
|
||||
date: 2023/01/11
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
detection:
|
||||
selection_img:
|
||||
- Image|endswith: '\SystemSettingsAdminFlows.exe'
|
||||
- OriginalFileName: 'SystemSettingsAdminFlows.EXE'
|
||||
selection_flag:
|
||||
CommandLine|contains: 'TurnOnDeveloperFeatures'
|
||||
selection_options:
|
||||
CommandLine|contains:
|
||||
- 'DeveloperUnlock'
|
||||
- 'EnableSideloading'
|
||||
condition: all of selection_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: high
|
||||
@@ -0,0 +1,41 @@
|
||||
title: Potential PowerShell Execution Policy Tampering
|
||||
id: fad91067-08c5-4d1a-8d8c-d96a21b37814
|
||||
related:
|
||||
- id: cf2e938e-9a3e-4fe8-a347-411642b28a9f # Registry
|
||||
type: similar
|
||||
- id: 87e3c4e8-a6a8-4ad9-bb4f-46e7ff99a180 # ProcCreation Cmdlet
|
||||
type: similar
|
||||
- id: 61d0475c-173f-4844-86f7-f3eebae1c66b # PowerShell ScriptBlock
|
||||
type: similar
|
||||
status: experimental
|
||||
description: Detects changes to the PowerShell execution policy in order to bypass signing requirements for script execution
|
||||
references:
|
||||
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.security/set-executionpolicy?view=powershell-7.3
|
||||
author: Nasreddine Bencherchali
|
||||
date: 2023/01/11
|
||||
tags:
|
||||
- attack.defense_evasion
|
||||
logsource:
|
||||
category: registry_set
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
EventType: SetValue
|
||||
TargetObject|endswith:
|
||||
# Note for future readers: For PowerShell 7+ the ExecutionPolicy is handled via a setting file due to the fact that PWSH7 is available for mac and linux
|
||||
# Attackers can create a per-user setting file (powershell.config.json) and set the execution policy there
|
||||
# Learn more here: https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.core/about/about_powershell_config?view=powershell-7.3
|
||||
- '\ShellIds\Microsoft.PowerShell\ExecutionPolicy'
|
||||
- '\Policies\Microsoft\Windows\PowerShell\ExecutionPolicy'
|
||||
Details|contains:
|
||||
- 'Bypass'
|
||||
- 'RemoteSigned'
|
||||
- 'Unrestricted'
|
||||
filter_svchost:
|
||||
Image|startswith:
|
||||
- 'C:\Windows\System32\'
|
||||
- 'C:\Windows\SysWOW64\'
|
||||
condition: selection and not 1 of filter_*
|
||||
falsepositives:
|
||||
- Unknown
|
||||
level: medium
|
||||
@@ -87,7 +87,8 @@
|
||||
"printservice-admin":[],
|
||||
"msexchange-management":[],
|
||||
"applocker":[],
|
||||
"vhdmp":[]
|
||||
"vhdmp":[],
|
||||
"appxdeployment-server":["Path", "AppId", "FilePath", "ErrorCode", "DeploymentOperation", "PackageFullName", "PackageSourceUri", "PackageDisplayName", "CallingProcess"]
|
||||
}
|
||||
},
|
||||
"linux":{
|
||||
|
||||
@@ -118,5 +118,10 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
EventLog: 'Microsoft-Windows-VHDMP-Operational'
|
||||
EventLog: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
EventLog: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
defaultindex: logstash-*
|
||||
|
||||
@@ -118,7 +118,12 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
log_name: 'Microsoft-Windows-VHDMP-Operational'
|
||||
log_name: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
log_name: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
defaultindex: <winlogbeat-{now/d}>
|
||||
# Extract all field names with yq:
|
||||
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: event_data.\1/g'
|
||||
|
||||
@@ -118,7 +118,12 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
logname: 'Microsoft-Windows-VHDMP-Operational'
|
||||
logname: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
logname: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
defaultindex: winlogbeat-*
|
||||
# Extract all field names with yq:
|
||||
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: event_data.\1/g'
|
||||
|
||||
@@ -146,7 +146,12 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
channel: 'Microsoft-Windows-VHDMP-Operational'
|
||||
channel: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
channel: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
linux:
|
||||
product: linux
|
||||
index: posix
|
||||
|
||||
@@ -197,5 +197,9 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
Provider_Name: 'Microsoft-Windows-VHDMP-Operational'
|
||||
|
||||
Provider_Name: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
Provider_Name: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
|
||||
@@ -132,7 +132,12 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
event_channel: 'Microsoft-Windows-VHDMP-Operational'
|
||||
event_channel: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
event_channel: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
windows-network-connection:
|
||||
product: windows
|
||||
category: network_connection
|
||||
|
||||
@@ -118,7 +118,12 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
event_source: 'Microsoft-Windows-VHDMP-Operational'
|
||||
event_source: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
event_source: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
fieldmappings:
|
||||
EventID: event_id
|
||||
FailureCode: result_code
|
||||
|
||||
@@ -139,5 +139,10 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
Channel: 'Microsoft-Windows-VHDMP-Operational'
|
||||
Channel: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
Channel: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
defaultindex: logstash-*
|
||||
|
||||
@@ -160,4 +160,9 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
LogName: 'Microsoft-Windows-VHDMP-Operational'
|
||||
LogName: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
LogName: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
|
||||
@@ -180,6 +180,11 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
source: 'Microsoft-Windows-VHDMP-Operational'
|
||||
source: 'WinEventLog:Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
source: 'WinEventLog:Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
fieldmappings:
|
||||
EventID: EventCode
|
||||
|
||||
@@ -149,7 +149,12 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
source: 'Microsoft-Windows-VHDMP-Operational'
|
||||
source: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
source: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
apache:
|
||||
service: apache
|
||||
index: WEBSERVER
|
||||
|
||||
@@ -424,6 +424,11 @@ logsources:
|
||||
service: vhdmp
|
||||
sources:
|
||||
- 'WinEventLog:Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
sources:
|
||||
- 'WinEventLog:Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
apache:
|
||||
category: webserver
|
||||
sources:
|
||||
|
||||
@@ -163,7 +163,12 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
winlog_channel: 'Microsoft-Windows-VHDMP-Operational'
|
||||
winlog_channel: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
winlog_channel: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
defaultindex: winlogbeat-*
|
||||
# Extract all field names with yq:
|
||||
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: winlog.event_data.\1/g'
|
||||
|
||||
@@ -126,7 +126,12 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
log_name: 'Microsoft-Windows-VHDMP-Operational'
|
||||
log_name: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
log_name: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
defaultindex: winlogbeat-*
|
||||
# Extract all field names with yq:
|
||||
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: event_data.\1/g'
|
||||
|
||||
@@ -152,7 +152,12 @@ logsources:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
winlog_channel: 'Microsoft-Windows-VHDMP-Operational'
|
||||
winlog_channel: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
winlog_channel: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
defaultindex: winlogbeat-*
|
||||
# Extract all field names with yq:
|
||||
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: winlog.event_data.\1/g'
|
||||
|
||||
@@ -113,9 +113,14 @@ logsources:
|
||||
product: windows
|
||||
service: bits-client
|
||||
conditions:
|
||||
Channel: 'Microsoft-Windows-Bits-Client/Operational'
|
||||
Channel: 'Microsoft-Windows-Bits-Client/Operational'
|
||||
windows-vhdmp-Operational:
|
||||
product: windows
|
||||
service: vhdmp
|
||||
conditions:
|
||||
Channel: 'Microsoft-Windows-VHDMP-Operational'
|
||||
Channel: 'Microsoft-Windows-VHDMP/Operational'
|
||||
windows-appxdeployment-server:
|
||||
product: windows
|
||||
service: appxdeployment-server
|
||||
conditions:
|
||||
Channel: 'Microsoft-Windows-AppXDeploymentServer/Operational'
|
||||
|
||||
Reference in New Issue
Block a user