yugoslavskiy
|
d5722979ea
|
add rules by Daniel Bohannon
|
2019-11-27 00:02:45 +01:00 |
|
yugoslavskiy
|
efc404fbae
|
resolve conflicts with rule IDs; restored and deprecated sysmon_mimikatz_detection_lsass.yml
|
2019-11-19 02:11:19 +01:00 |
|
yugoslavskiy
|
cd69111522
|
Merge branch 'oscd' into master
|
2019-11-14 00:36:34 +03:00 |
|
yugoslavskiy
|
c8ee6e9631
|
Merge pull request #504 from yugoslavskiy/oscd_ilyas_ochkov
[OSCD] Ilyas Ochkov contribution
|
2019-11-14 00:22:48 +03:00 |
|
Thomas Patzke
|
0592cbb67a
|
Added UUIDs to rules
|
2019-11-12 23:12:27 +01:00 |
|
Thomas Patzke
|
5f6a4225ec
|
Unified line terminators of rules to Unix
|
2019-11-12 23:05:36 +01:00 |
|
Florian Roth
|
b7c3f8da91
|
refactor: cleanup, single element lists, renamed files, level adjustments
|
2019-11-12 12:55:05 +01:00 |
|
yugoslavskiy
|
0db5436778
|
add tieto dns exfil rules
|
2019-11-10 20:27:21 +03:00 |
|
yugoslavskiy
|
bdac415fea
|
Merge pull request #486 from yugoslavskiy/tieto_oscd
[OSCD] Tieto DNS exfiltration rules
|
2019-11-10 19:36:02 +03:00 |
|
yugoslavskiy
|
4fa928866f
|
oscd task #6 done.
add 25 new rules:
- win_ad_replication_non_machine_account.yml
- win_dpapi_domain_backupkey_extraction.yml
- win_protected_storage_service_access.yml
- win_dpapi_domain_masterkey_backup_attempt.yml
- win_sam_registry_hive_handle_request.yml
- win_sam_registry_hive_dump_via_reg_utility.yml
- win_lsass_access_non_system_account.yml
- win_ad_object_writedac_access.yml
- powershell_alternate_powershell_hosts.yml
- sysmon_remote_powershell_session_network.yml
- win_remote_powershell_session.yml
- win_scm_database_handle_failure.yml
- win_scm_database_privileged_operation.yml
- sysmon_wmi_module_load.yml
- sysmon_remote_powershell_session_process.yml
- sysmon_rdp_registry_modification.yml
- sysmon_powershell_execution_pipe.yml
- sysmon_alternate_powershell_hosts_pipe.yml
- sysmon_powershell_execution_moduleload.yml
- sysmon_createremotethread_loadlibrary.yml
- sysmon_alternate_powershell_hosts_moduleload.yml
- powershell_remote_powershell_session.yml
- win_non_interactive_powershell.yml
- win_syskey_registry_access.yml
- win_wmiprvse_spawning_process.yml
improve 1 rule:
- rules/windows/builtin/win_account_backdoor_dcsync_rights.yml
|
2019-11-10 18:43:41 +03:00 |
|
yugoslavskiy
|
127335a0ec
|
Merge pull request #482 from yugoslavskiy/master
[OSCD][The ThreatHunter-Playbook] Task 6: DONE
|
2019-11-10 17:27:54 +03:00 |
|
yugoslavskiy
|
82f23c5f63
|
Merge pull request #477 from zinint/oscd
add 13 new rules:
- rules/linux/auditd/lnx_auditd_masquerading_crond.yml
- rules/linux/auditd/lnx_auditd_user_discovery.yml
- rules/linux/auditd/lnx_data_compressed.yml
- rules/linux/auditd/lnx_network_sniffing.yml
- rules/windows/powershell/powershell_data_compressed.yml
- rules/windows/powershell/powershell_winlogon_helper_dll.yml
- rules/windows/process_creation/win_change_default_file_association.yml
- rules/windows/process_creation/win_data_compressed_with_rar.yml
- rules/windows/process_creation/win_local_system_owner_account_discovery.yml
- rules/windows/process_creation/win_network_sniffing.yml
- rules/windows/process_creation/win_query_registry.yml
- rules/windows/process_creation/win_service_execution.yml
- rules/windows/process_creation/win_xsl_script_processing.yml
modify 1 rule:
- rules/windows/process_creation/win_possible_applocker_bypass.yml
|
2019-11-05 04:55:29 +03:00 |
|
yugoslavskiy
|
ac95d840b4
|
Update powershell_winlogon_helper_dll.yml
|
2019-11-05 04:33:07 +03:00 |
|
yugoslavskiy
|
c147863eb3
|
Update powershell_data_compressed.yml
|
2019-11-05 02:38:36 +03:00 |
|
zinint
|
2679baddcd
|
Delete powershell_network_sniffing.yml
|
2019-11-04 23:46:43 +03:00 |
|
zinint
|
12ef86fcbe
|
t1040
|
2019-10-30 23:18:37 +03:00 |
|
Thomas Patzke
|
f4e9690d6b
|
Merge pull request #508 from Karneades/fixRule3
fix: bound keywords to field in multiple PS rules
|
2019-10-29 22:34:08 +01:00 |
|
Thomas Patzke
|
78d8ca2b41
|
Merge pull request #507 from Karneades/fixRule2
fix: bound keywords to field in PS cred prompt rule
|
2019-10-29 22:31:01 +01:00 |
|
Karneades
|
ab5556ae8c
|
fix: change keyword and bound it to a field
|
2019-10-29 19:59:43 +01:00 |
|
Karneades
|
aafab2e936
|
fix: bound keywords to field in multiple PS rules
Rules changed:
- rules/windows/powershell/powershell_malicious_commandlets.yml
- rules/windows/powershell/powershell_malicious_keywords.yml
- rules/windows/powershell/powershell_suspicious_download.yml
- rules/windows/powershell/powershell_suspicious_invocation_specific.yml
|
2019-10-29 19:53:18 +01:00 |
|
Karneades
|
f31750e567
|
fix: bound keywords to field in PS cred prompt rule
|
2019-10-29 19:43:04 +01:00 |
|
darkquasar
|
cb6eb35913
|
adding some more suspicious PS keywords
found in multiple internally analyzed malicious scripts (in the wild and as result of engagements)
|
2019-10-28 22:14:14 -07:00 |
|
Yugoslavskiy Daniil
|
4251d9f490
|
ilyas ochkov contribution
|
2019-10-29 03:44:22 +03:00 |
|
yugoslavskiy
|
5eb484a062
|
add tieto dns exfiltration rules
|
2019-10-25 04:30:55 +02:00 |
|
yugoslavskiy
|
4fb9821b49
|
added:
win_non_interactive_powershell.yml
win_remote_powershell_session.yml
win_wmiprvse_spawning_process.yml
powershell_alternate_powershell_hosts.yml
powershell_remote_powershell_session.yml
sysmon_alternate_powershell_hosts_moduleload.yml
sysmon_alternate_powershell_hosts_pipe.yml
sysmon_non_interactive_powershell_execution.yml
sysmon_powershell_execution_moduleload.yml
sysmon_powershell_execution_pipe.yml
sysmon_remote_powershell_session_network.yml
sysmon_remote_powershell_session_process.yml
sysmon_wmi_module_load.yml
sysmon_wmiprvse_spawning_process.yml
|
2019-10-24 15:48:38 +02:00 |
|
zinint
|
aef5fa3c2b
|
Rename powershell_winlogon_helper_dll.yaml to powershell_winlogon_helper_dll.yml
|
2019-10-24 16:37:38 +03:00 |
|
zinint
|
5a98fdbbbd
|
ART t1004
|
2019-10-24 16:33:29 +03:00 |
|
zinint
|
317e9d3df9
|
PS Data Compressed attack.t1002
PS Data Compressed attack.t1002
|
2019-10-24 15:43:46 +03:00 |
|
ecco
|
01956f1312
|
powershell false positives
|
2019-09-06 03:54:19 -04:00 |
|
Tareq AlKhatib
|
15e2f5df5f
|
fixed typos
|
2019-06-29 15:35:59 +03:00 |
|
mrblacyk
|
99595a7f89
|
Added missing tags and some minor improvements
|
2019-03-05 23:25:49 +01:00 |
|
Thomas Patzke
|
c922f7d73f
|
Merge branch 'master' into project-1
|
2019-02-26 00:24:46 +01:00 |
|
Florian Roth
|
74e3c79f40
|
Rule: Suspicious PowerShell keywords
|
2019-02-11 13:02:38 +01:00 |
|
Tareq AlKhatib
|
7e4bb1d21a
|
Removed duplicate filters
|
2019-01-25 12:21:57 +03:00 |
|
Florian Roth
|
90e8eba530
|
rule: false positive reduction in PowerShell rules
|
2019-01-22 16:37:36 +01:00 |
|
Thomas Patzke
|
96eb460944
|
Converted Sysmon/1 and Security/4688 to generic process creation rules
|
2019-01-16 23:36:31 +01:00 |
|
Roberto Rodriguez
|
328762ed67
|
Update powershell_xor_commandline.yml
Ducplicate names again for https://github.com/Neo23x0/sigma/search?q=Suspicious+Encoded+PowerShell+Command+Line&unscoped_q=Suspicious+Encoded+PowerShell+Command+Line . This brakes elastalert integration since each rule needs to have its own unique name.
|
2018-12-05 05:51:41 +03:00 |
|
Thomas Patzke
|
900db72557
|
Merge branch 'master' of https://github.com/SherifEldeeb/sigma into SherifEldeeb-master
|
2018-12-04 23:35:23 +01:00 |
|
Kyle Polley
|
60538e2e12
|
changed .yaml files to .yml for consistency
|
2018-11-20 21:07:36 -08:00 |
|
Florian Roth
|
fd06cde641
|
Rule: Detect base64 encoded PowerShell shellcode
https://twitter.com/cyb3rops/status/1063072865992523776
|
2018-11-17 09:10:09 +01:00 |
|
Sherif Eldeeb
|
23eddafb39
|
Replace "logsource: description" with "definition" to match the specs
|
2018-11-15 09:00:06 +03:00 |
|
Thomas Patzke
|
ff98991c80
|
Fixed rule
|
2018-10-18 16:20:51 +02:00 |
|
Thomas Patzke
|
a2da73053d
|
Merge branch 'patch-9' of https://github.com/samsson/sigma into samsson-patch-9
|
2018-10-18 16:16:57 +02:00 |
|
Florian Roth
|
a2c6f344ba
|
Lower case T
|
2018-09-26 11:44:12 +02:00 |
|
Braz
|
f35308a4d3
|
Missing Character
Parsed the MITRE ATT&CK informations from the rules. My script crashed because the identifier "T" was missing.
Thanks for your work Flo & Tom!
|
2018-09-26 11:40:24 +02:00 |
|
Thomas Patzke
|
81515b530c
|
ATT&CK tagging QA
|
2018-09-20 12:44:44 +02:00 |
|
Florian Roth
|
68896d9294
|
style: renamed rule files to all lower case
|
2018-09-08 10:25:20 +02:00 |
|
megan201296
|
3154be82f3
|
Added .yml extension and fix typo
|
2018-09-06 20:28:22 -05:00 |
|
Lurkkeli
|
30fc4bd030
|
powershell xor commandline
New rule to detect -bxor usage in a powershell commandline.
|
2018-09-05 09:21:15 +02:00 |
|
Florian Roth
|
016b15a2a9
|
Added quotation marks
I've added quotation marks to make it clearer (leading dash looks weird)
|
2018-07-26 18:10:21 +02:00 |
|