899 Commits

Author SHA1 Message Date
Nasreddine Bencherchali 34c5d66c22 Merge PR #5966 from @nasbench - Update mitre tags to use attack v19
chore: update mitre tags to use attack v19
2026-04-29 01:20:23 +02:00
Tom Kluter c8f207d390 Merge PR #5409 from @Luke57 - Add New Google Workspace Related Rules
new: Google Workspace Government Attack Warning
new: Google Workspace Out Of Domain Email Forwarding
new: Suspicious Login Activity Classified By Google

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2026-04-28 02:48:14 +02:00
Marco Pedrinazzi 96c0fa6176 Merge PR #5846 from @marcopedrinazzi - Add Suspicious Email Delivered In Microsoft 365
new: Suspicious Email Delivered In Microsoft 365

---------

Co-authored-by: Swachchhanda Shrawan Poudel <87493836+swachchhanda000@users.noreply.github.com>
Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2026-04-28 00:33:23 +02:00
Nasreddine Bencherchali cf3cbf8089 Merge PR #5799 from @nasbench - Update logic to use errorCode instead for better mapping and accuracy
update: Potential Malicious Usage of CloudTrail System Manager - Update logic to use errorCode instead for better mapping and accuracy
2025-12-09 10:17:50 +01:00
suKTech24 3565dee3eb Merge PR #5536 from @suKTech24 - Add AWS GuardDuty Detector Deleted Or Updated
Goodlog Tests / check-baseline-win7 (push) Has been cancelled
Goodlog Tests / check-baseline-win10 (push) Has been cancelled
Goodlog Tests / check-baseline-win11 (push) Has been cancelled
Goodlog Tests / check-baseline-win11-2023 (push) Has been cancelled
Goodlog Tests / check-baseline-win2022 (push) Has been cancelled
Goodlog Tests / check-baseline-win2022-domain-controller (push) Has been cancelled
Goodlog Tests / check-baseline-win2022-0-20348-azure (push) Has been cancelled
Regression Tests / true-positive-tests (push) Has been cancelled
Create Release / Create Release (push) Has been cancelled
Sigma Rule Tests / yamllint (push) Has been cancelled
Validate Sigma rules / sigma-rules-validator (push) Has been cancelled
Sigma Rule Tests / test-sigma-logsource (push) Has been cancelled
Sigma Rule Tests / test-sigma-legacy (push) Has been cancelled
Sigma Rule Tests / sigma-check (push) Has been cancelled
Sigma Rule Tests / duplicate-id-check (push) Has been cancelled
new: AWS GuardDuty Detector Deleted Or Updated

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2025-11-28 10:33:03 +01:00
Nasreddine Bencherchali 9d58e38bbc Merge PR #5769 from @nasbench - fix keywords rule and remove the fields field
remove: Space After Filename - Logic was incorrect and untested
update: Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection - Update selection
update: JexBoss Command Sequence - Update the selection to use the |all modifier.
chore: remove any usage of the fields field to prepare for deprecation in the spec.
2025-11-24 09:54:29 +01:00
Nasreddine Bencherchali 3a20687cad Merge PR #5738 from @nasbench - rename folders and update readme
chore: rename folders and update readme
2025-11-03 10:35:44 +01:00
Swachchhanda Shrawan Poudel 6560a6cc20 Merge PR #5711 from @swachchhanda000 - Add PUA - AWS TruffleHog Execution
Co-authored-by: Nasreddine Bencherchali <nasreddineb@splunk.com>
2025-10-29 11:40:20 +01:00
Jonathan Price 0738e34329 Merge PR #5193 from @toopricey - Add AWS KMS Imported Key Material Usage
new: AWS KMS Imported Key Material Usage

---------

Co-authored-by: Nasreddine Bencherchali
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
2025-10-28 22:13:17 +01:00
Ivan S 8c79d0a77b Merge PR #5018 from @saakovv - Add 2 New GitHub Rules
new: GitHub Repository Pages Site Changed to Public
new: GitHub Repository Archive Status Changed

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: Swachchhanda Shrawan Poudel <87493836+swachchhanda000@users.noreply.github.com>
2025-10-28 01:03:23 +01:00
phantinuss c8075cab6b chore: ci: bump validator version (#5722)
chore: ci: bump validator version
chore: add missing tags

---------

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-10-23 15:43:47 +02:00
Adan Álvarez 5929e67ed9 Merge PR #5688 from @adanalvarez - AWS STS GetCallerIdentity Enumeration Via TruffleHog
new: AWS STS GetCallerIdentity Enumeration Via TruffleHog

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2025-10-23 13:48:06 +02:00
Ivan S 3ae99cfc57 Merge PR #5021 from @saakovv - New rules for AWS
new: AWS Console Login Monitoring
new: AWS Bucket Deleted
new: AWS ConsoleLogin Failed Authentication
new: AWS EnableRegion Command Monitoring
new: AWS VPC Flow Logs Deleted
update: AWS Successful Console Login Without MFA - only alert on successful logins

---------

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
Co-authored-by: swachchhanda000 <swachchhandashrawan@gmail.com>
2025-10-22 14:36:42 +02:00
Swachchhanda Shrawan Poudel de97c83224 Merge PR #5533 from @swachchhanda000 - fix: github reported issues
new: AWS IAM user with Console Access Login Without MFA (#5074)
new: Suspicious BitLocker Access Agent Update Utility Execution (#5502)
new: BaaUpdate.exe Suspicious DLL Load
update: Suspicious C2 Activities - update definition (#5142)
fix: Firewall Configuration Discovery Via Netsh.EXE - fix logic (#5171)
fix: WannaCry Ransomware Activity - remove generic indicators (#5131)
fix: Rare Remote Thread Creation By Uncommon Source Image - filter office FPs (#5529)
---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2025-10-18 07:07:22 +05:45
peterydzynski 8b41e6bfdf Merge PR #5542 from @peterydzynski - remove Azure Application Credential Modified
remove: Azure Application Credential Modified - superseeded by cbb67ecc-fb70-4467-9350-c910bdf7c628

---------

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2025-10-17 12:14:11 +02:00
Liran Ravich c71512aa86 Merge PR #5579 from @Liran017 - Update MITRE ATT&CK tags for multiple rules
chore: update MITRE ATT&CK tags for multiple rules
2025-08-14 14:08:21 +02:00
peterydzynski c7998c92b3 Merge PR #5530 from @peterydzynski - fix: use correct dash type and add spaces
fix: Added Credentials to Existing Application - fix filter dash type, capitalization and spaces to match Azure log format

---------

Co-authored-by: Nasreddine Bencherchali <nasreddineb@splunk.com>
2025-07-18 10:51:11 +02:00
Grégory Wychowaniec 0597250ee1 Merge PR #5511 from @gregorywychowaniec-zt - add null condition in addition to empty string
update: Suspicious SignIns From A Non Registered Device - add null value in addition to empty string
---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2025-07-03 11:58:57 +02:00
github-actions[bot] 4316ad64da Merge PR #5506 from @nasbench -promote older rules status from experimental to test
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-07-01 10:34:38 +02:00
david-syk 3eaaa050b7 Merge PR #5452 from @david-syk - Update the MITRE ATT&CK tags for multiple rules
chore: update the MITRE ATT&CK tags for multiple rules
2025-06-04 14:39:25 +02:00
frack113 74fc1c74ec Merge PR #5451 from @frack113 - chore: cleanup metadata
chore: 🧹 Remove redundant modified field
chore: 🧹 Use Mitre tags instead of url
chore: 🧹 Use permalink for github file reference
chore: 🧹 Order emerging-threats Exploits rules
2025-06-04 13:33:36 +02:00
github-actions[bot] ec827cccb6 Merge PR #5448 from @nasbench - Promote older rules status from experimental to test
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-06-02 13:29:48 +02:00
phantinuss 6896d69d3e Merge PR #5424 from @phantinuss - Some housekeeping
chore: deprecate rule in favour of c1337eb8-921a-4b59-855b-4ba188ddcc42
chore: update the ref of some rules

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2025-05-20 23:12:55 +02:00
david-syk a869abc3cc Merge PR #5395 from @david-syk - Update MITRE ATT&CK tags
chore: update the tags of multiple rules
2025-05-20 23:05:21 +02:00
github-actions[bot] 350fec2f51 Merge PR #5397 from @nasbench - Promote older rules status from experimental to test
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-05-20 22:58:46 +02:00
david-syk 95b6dd8573 Merge PR #5381 from @david-syk - Update MITRE ATT&CK tags
chore: update multiple mitre att&ck tags
2025-04-25 20:55:51 +02:00
Nick Lupien e874eaf58e Merge PR #5236 from @nickatrecon - Update AWS New Lambda Layer Attached
update: AWS New Lambda Layer Attached - Enhance metadata and logic

---------

Thanks: imall4n
Co-authored-by: Nasreddine Bencherchali <nasreddineb@splunk.com>
2025-04-07 11:07:50 +02:00
github-actions[bot] 64852d95a9 Merge PR #5216 from @nasbench - Promote older rules status from experimental to test
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-03-05 00:23:27 +01:00
Josh 083eb54e30 Merge PR #5157 from @joshnck - Add Azure Login Bypassing Conditional Access Policies
new: Azure Login Bypassing Conditional Access Policies
---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <nasreddineb@splunk.com>
2025-01-19 22:00:59 +01:00
github-actions[bot] 8734022722 Merge PR #5149 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-01-06 15:36:19 +01:00
Ivan S aec72e101d Merge PR #5016 from @saakovv - Add New AWS Lambda Function URL Configuration Created
new: New AWS Lambda Function URL Configuration Created

---------

Co-authored-by: Ivan.Saakov <ivan.saakov@indriver.com>
Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: Nasreddine Bencherchali <nasreddineb@splunk.com>
2024-12-19 20:30:58 +01:00
Ivan S a8d8dcff8f Merge PR #5015 from @saakovv - Add AWS SAML Provider Deletion Activity
new: AWS SAML Provider Deletion Activity

---------

Co-authored-by: Ivan.Saakov <ivan.saakov@indriver.com>
Co-authored-by: Nasreddine Bencherchali <nasreddineb@splunk.com>
2024-12-19 20:30:41 +01:00
Ivan S 2c13dba9f3 Merge PR #5023 from @saakovv - Add AWS Key Pair Import Activity
new: AWS Key Pair Import Activity

---------

Co-authored-by: Ivan.Saakov <ivan.saakov@indriver.com>
Co-authored-by: Nasreddine Bencherchali <nasreddineb@splunk.com>
2024-12-19 18:35:28 +01:00
Ivan S 58017b6b3f Merge PR #5017 from @saakovv - Add Modification or Deletion of an AWS RDS Cluster
new: Modification or Deletion of an AWS RDS Cluster
---------

Co-authored-by: Ivan.Saakov <ivan.saakov@indriver.com>
Co-authored-by: nasbench <nasreddineb@splunk.com>
Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2024-12-07 00:19:18 +01:00
github-actions[bot] 9367349016 Merge PR #5101 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-12-01 13:40:32 +01:00
Grégory Wychowaniec 6f4c6d7031 Merge PR #5054 from @gregorywychowaniec-zt - Update App Assigned To Azure RBAC/Microsoft Entra Role
update: App Assigned To Azure RBAC/Microsoft Entra Role - Add a constraint to limit the detection to service principal only 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-11-20 20:43:21 +01:00
github-actions[bot] 839f5636f5 Merge PR #4991 from @nasbench - Promote older rules status from experimental to test
chore: promote older rules status from `experimental` to `test`

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-09-02 10:01:36 +02:00
cyb3rjy0t 78abfd5700 Merge PR #4977 from @cyb3rjy0t - Add User Risk and MFA Registration Policy Updated
new: User Risk and MFA Registration Policy Updated

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-08-21 14:46:20 +02:00
cyb3rjy0t d1143955c7 Merge PR #4978 from @cyb3rjy0t - Add Multi Factor Authentication Disabled For User Account
new: Multi Factor Authentication Disabled For User Account 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-08-21 13:11:57 +02:00
Nasreddine Bencherchali 598d29f811 Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
chore: change tags, date, modified fields to comply with v2 of the Sigma spec.
chore: update the related type from `obsoletes` to `obsolete`.
chore: update local json schema to the latest version.
2024-08-12 12:02:50 +02:00
Fukusuke Takahashi 8ff9cd8d20 Merge PR #4958 from @fukusuket - Update unreachable/broken references
chore: Credential Dumping Tools Accessing LSASS Memory
chore: Potential MFA Bypass Using Legacy Client Authentication
chore: Possible DC Shadow Attack
chore: Potential Privileged System Service Operation - SeLoadDriverPrivilege
chore: Remote Thread Creation In Uncommon Target Image
chore: RDP File Creation From Suspicious Application
chore: Suspicious PROCEXP152.sys File Created In TMP
chore: Outbound Network Connection Initiated By Microsoft Dialer
chore: NTFS Alternate Data Stream
chore: PowerShell Get-Process LSASS in ScriptBlock
chore: Windows Firewall Profile Disabled
chore: Potentially Suspicious GrantedAccess Flags On LSASS
chore: HackTool - PCHunter Execution
chore: Mstsc.EXE Execution With Local RDP File
chore: Suspicious Mstsc.EXE Execution With Local RDP File
chore: Mstsc.EXE Execution From Uncommon Parent
chore: PowerShell Get-Process LSASS
chore: LSASS Access From Program In Potentially Suspicious Folder
chore: Uncommon GrantedAccess Flags On LSASS 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Thanks: @fukusuket
2024-08-10 01:23:58 +02:00
github-actions[bot] 6b78144668 Merge PR #4942 from @nasbench - promote older rules status from experimental to test
chore: promote older rules status from experimental to test

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-08-01 10:26:14 +02:00
Romain Gaillard e1803cbc8e Merge PR #4931 from @romain-gaillard - Add additional GitHub audit detection rules
new: Github SSH Certificate Configuration Changed
new: Github Fork Private Repositories Setting Enabled/Cleared
new: Github Repository/Organization Transferred 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-29 23:17:11 +02:00
Romain Gaillard 29d06798b3 Merge PR #4922 from @romain-gaillard - Update Github High Risk Configuration Disabled
update: Github High Risk Configuration Disabled - Add `business_advanced_security.disabled`, `business_advanced_security.disabled_for_new_repos`, `business_advanced_security.disabled_for_new_user_namespace_repos`, `business_advanced_security.user_namespace_repos_disabled`, `org.advanced_security_disabled_for_new_repos`, `org.advanced_security_disabled_on_all_repos` 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-22 10:43:48 +02:00
Romain Gaillard bcb5e6b218 Merge PR #4921 from @romain-gaillard - update Github Secret Scanning Feature Disabled
update: Github Secret Scanning Feature Disabled - Add `secret_scanning_new_repos.disable` 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-22 10:42:22 +02:00
Nasreddine Bencherchali 313578eeaa Merge PR #4888 from @nasbench - Add multiple new rules, updates and fixes
fix: Dllhost.EXE Initiated Network Connection To Non-Local IP Address - Filter out additional Microsoft IP block and moved to the threat hunting folder due to large amount of matches based on VT data
fix: Forest Blizzard APT - File Creation Activity - Fix typo in filename
fix: New RUN Key Pointing to Suspicious Folder - Enhance filter to fix new false positive found in testing
new: COM Object Hijacking Via Modification Of Default System CLSID Default Value
new: CVE-2023-1389 Potential Exploitation Attempt - Unauthenticated Command Injection In TP-Link Archer AX21
new: DPAPI Backup Keys And Certificate Export Activity IOC
new: DSInternals Suspicious PowerShell Cmdlets
new: DSInternals Suspicious PowerShell Cmdlets - ScriptBlock
new: HackTool - RemoteKrbRelay Execution
new: HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators
new: HackTool - SharpDPAPI Execution
new: Hypervisor Enforced Paging Translation Disabled
new: PDF File Created By RegEdit.EXE
new: Periodic Backup For System Registry Hives Enabled
new: Renamed Microsoft Teams Execution
new: Windows LAPS Credential Dump From Entra ID
remove: Potential Persistence Via COM Hijacking From Suspicious Locations - Deprecated because of incorrect logic, replaced by "790317c0-0a36-4a6a-a105-6e576bf99a14"
update: DLL Call by Ordinal Via Rundll32.EXE - Reduced level to "medium" and moved to the threat hunting folder due to the fact that calling by ordinal can be seen by many legitimate utilities. An initial baseline needs to be set for the rule to be promoted.
update: Msiexec.EXE Initiated Network Connection Over HTTP - Reduced level to low and moved to the threat hunting folder due to large amount of matches based on VT data
update: MSSQL Add Account To Sysadmin Role - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Disable Audit Settings - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon From External Network - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL SPProcoption Set - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Option Change - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Suspicious Execution - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: Network Connection Initiated By AddinUtil.EXE - increase level to "high" and promote the status to "test" based on VT data
update: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process - Reduced the level to "medium" and added filters for "null" and empty values based on VT data
update: Office Application Initiated Network Connection Over Uncommon Ports - Add port "143" based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Office Application Initiated Network Connection To Non-Local IP - Add "outlook.exe" to the list of processes and filter multiple IP ranges based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Password Protected Compressed File Extraction Via 7Zip - Reduced level to "low" and moved to the threat hunting folder due to large amount of matches based on VT data
update: Potential Dead Drop Resolvers - Add filters for "null" and empty values based on VT data
update: Potential Privilege Escalation via Local Kerberos Relay over LDAP - Update metadata information
update: Potential Shellcode Injection - Reduced level to "medium" and moved to the threat hunting folder due multiple FP with third party softwares
update: Potential Suspicious Execution From GUID Like Folder Names - Reduced level to "low" and moved to the threat hunting folder
update: Potentially Suspicious EventLog Recon Activity Using Log Query Utilities - Add additional EventLog and ETW providers to increase coverage
update: Potentially Suspicious Execution From Parent Process In Public Folder - Update logic to add Image names in addition to the previous CommandLines
update: Potentially Suspicious PowerShell Child Processes - Reduced level to "medium" and moved to the threat hunting folder due to large amount of matches based on VT data. As well as the logic doesn't look for anything suspicious but "child processes" that might be "uncommon".
update: Process Execution From A Potentially Suspicious Folder - Update metadata and remove "\Users\Public" to avoid false positives
update: Recon Command Output Piped To Findstr.EXE - Update the logic to user "wildcards" instead of spaces to cover different variants and increase the coverage.
update: Suspicious Electron Application Child Processes - Remove unnecessary filters
update: Suspicious Non-Browser Network Communication With Google API - Add filters for "null" and empty values based on VT data
update: System File Execution Location Anomaly - Enhance filters
update: Uncommon Child Process Of Setres.EXE - Update logic and metadata
update: Uncommon Link.EXE Parent Process - Enhance the filters and metadata
update: Windows Defender Threat Detection Service Disabled - Add french keyword for "stopped" to increase coverage for windows os that uses the french language

---------

Thanks: cY83rR0H1t
Thanks: CTI-Driven
Thanks: BIitzkrieg
Thanks: DFIR-jwedd
Thanks: Snp3r
2024-07-17 11:04:05 +02:00
James C f95d5397b5 Merge PR #4900 from @jamesc-grafana - Add new AWS cloudtrail rules
new: Ingress/Egress Security Group Modification
new: LoadBalancer Security Group Modification
new: Malicious Usage Of IMDS Credentials Outside Of AWS Infrastructure
new: New Network ACL Entry Added
new: New Network Route Added
new: Potential Malicious Usage of CloudTrail System Manager
new: RDS Database Security Group Modification 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 14:42:54 +02:00
Nick Moore b584e19978 Merge PR #4905 from @kelnage - Fix error in field name
fix: Potential Bucket Enumeration on AWS - Fix error in field name
2024-07-11 00:19:55 +02:00
Cygnetix dc35ae5600 Merge PR #4904 from @cygnetix - Fix typo in Suspicious SignIns From A Non Registered Device
chore: fix typo in `Suspicious SignIns From A Non Registered Device`

Thanks: cygnetix
2024-07-09 11:01:08 +02:00
Ryan Plas 1d40f1d20b Merge PR #4893 from @ryanplasma - Update Microsoft references URLS
chore: update Microsoft references link to use the "learn" subdomain instead of "docs". 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
Thanks: @ryanplasma
2024-07-02 12:00:11 +02:00