Florian Roth
|
0fa5ba925e
|
rule :improved bloodhound rule
|
2019-12-20 17:23:40 +01:00 |
|
Florian Roth
|
cbebaf637f
|
Merge pull request #568 from Neo23x0/devel
Devel
|
2019-12-20 16:22:29 +01:00 |
|
Florian Roth
|
0e82dce2a0
|
fix: fixed wrong condition
|
2019-12-20 16:11:39 +01:00 |
|
Florian Roth
|
0000257371
|
rule: improved bloodhound rule
|
2019-12-20 16:08:26 +01:00 |
|
Florian Roth
|
3a933c38f2
|
rule: changed level of BloodHound rule
|
2019-12-20 15:37:58 +01:00 |
|
Florian Roth
|
68efeb909d
|
rule: false positive condition for BloodHound rule
|
2019-12-20 15:35:13 +01:00 |
|
Florian Roth
|
825b1edb0f
|
Merge pull request #567 from Neo23x0/devel
Devel
|
2019-12-20 15:32:56 +01:00 |
|
Florian Roth
|
708c17e2bc
|
rule: Bloodhound
|
2019-12-20 14:59:36 +01:00 |
|
Florian Roth
|
ab038d1ac7
|
style: minor changes
|
2019-12-20 14:59:26 +01:00 |
|
Thomas Patzke
|
9ca52259dd
|
Fixed identifier
|
2019-12-20 00:11:34 +01:00 |
|
Thomas Patzke
|
924e1feb54
|
UUIDs + moved unsupported logic
* Added UUIDs to all contributed rules
* Moved unsupported logic directory out of rules/ because this breaks CI
testing.
|
2019-12-19 23:56:36 +01:00 |
|
Thomas Patzke
|
694d666539
|
Merge branch 'master' into oscd
|
2019-12-19 23:15:15 +01:00 |
|
Riccardo Ancarani
|
8b70cb6761
|
Add Covenant default named pipe
Covenant (https://github.com/cobbr/Covenant) can use named pipes for peer to peer communication.
The default named pipe name is "\gruntsvc".
References: https://posts.specterops.io/designing-peer-to-peer-command-and-control-ad2c61740456
|
2019-12-18 15:19:47 +00:00 |
|
Florian Roth
|
0a26184286
|
Merge pull request #563 from Neo23x0/devel
Devel
|
2019-12-17 14:48:07 +01:00 |
|
Florian Roth
|
c8b6b5c556
|
rule: updating csc.exe rule
|
2019-12-17 13:45:40 +01:00 |
|
Florian Roth
|
7a3041c593
|
rule: improved csc.exe rule
|
2019-12-17 11:05:43 +01:00 |
|
Florian Roth
|
e8d92fab0c
|
rule: ryuk ransomware
|
2019-12-16 20:33:12 +01:00 |
|
Florian Roth
|
da06e5bc1c
|
Merge pull request #562 from Neo23x0/devel
Improved PowerShell Encoded Command Rule
|
2019-12-16 19:31:15 +01:00 |
|
Florian Roth
|
bbaa9df217
|
rule: better JAB rule
|
2019-12-16 19:08:51 +01:00 |
|
Florian Roth
|
f83eb2268e
|
rule: improved JAB expression
|
2019-12-16 19:04:05 +01:00 |
|
Florian Roth
|
bd7c996588
|
rule: suspicious PS rule modified to cover newest malware campaigns
|
2019-12-16 19:02:57 +01:00 |
|
Thomas Patzke
|
ef63a65efe
|
Converted to Unix line end
|
2019-12-15 23:30:42 +01:00 |
|
Yugoslavskiy Daniil
|
d19df2e4f7
|
fix issues with wrong tagging
|
2019-12-15 00:17:22 +01:00 |
|
Florian Roth
|
7acfecbe66
|
Merge pull request #530 from bartblaze/master
Add scriptlets
|
2019-12-14 11:24:51 +01:00 |
|
Thomas Patzke
|
1369b3a2dc
|
Merge pull request #537 from webhead404/webhead404-contrib-sigma
Added sigma rule to detect external devices or USB drive
|
2019-12-13 21:50:01 +01:00 |
|
Thomas Patzke
|
7a280ae092
|
Merge pull request #557 from robrankin/fix_dupe_rule_name
Elastalert error, duplicate rule titles
|
2019-12-13 21:46:58 +01:00 |
|
Florian Roth
|
9c59e3cf13
|
Merge branch 'master' into devel
|
2019-12-12 09:40:02 +01:00 |
|
Florian Roth
|
c25b902add
|
Merge pull request #558 from vburov/patch-7
Added svchost.exe as a parent image
|
2019-12-10 20:17:22 +01:00 |
|
Vasiliy Burov
|
977551c69d
|
Added some suspicious locations
Added 'C:\Windows\Tasks' and 'C:\Windows\System32\Tasks' as suspicious locations accordingly article: https://github.com/ThreatHuntingProject/ThreatHunting/blob/master/hunts/suspicious_process_creation_via_windows_event_logs.md
|
2019-12-10 20:17:40 +03:00 |
|
Vasiliy Burov
|
0dd4324aba
|
Added svchost.exe as a parent image
Added svchost.exe as a parent image accordingly this article (https://www.carbonblack.com/2014/06/10/screenshot-demo-hunt-evil-faster-than-ever-with-carbon-black/) and my investigations.
|
2019-12-10 19:31:12 +03:00 |
|
Rob Rankin
|
e251568760
|
Data Compressed duplciate titles
|
2019-12-09 16:24:10 +00:00 |
|
Rob Rankin
|
b771dd3d3b
|
Rule name conflicts in Elastalert output
|
2019-12-09 16:14:28 +00:00 |
|
Yugoslavskiy Daniil
|
185a634bd9
|
update authors for 2 rules
|
2019-12-07 02:10:06 +01:00 |
|
Yugoslavskiy Daniil
|
4789b15fd5
|
add rules by Sergey Soldatov, Kaspersky Lab
|
2019-12-07 01:45:55 +01:00 |
|
Florian Roth
|
e1244acf49
|
rule: fixed and extended bitsadmin rule
|
2019-12-06 13:39:04 +01:00 |
|
Florian Roth
|
c1647ca4b7
|
Merge branch 'master' into devel
|
2019-12-06 13:38:29 +01:00 |
|
Thomas Patzke
|
ad7d5d2a39
|
Added WMI login rule
|
2019-12-04 11:13:04 +01:00 |
|
Thomas Patzke
|
e8c1c97f3e
|
Added rule for failed code integrity checks
|
2019-12-03 15:08:26 +01:00 |
|
Thomas Patzke
|
c47af5169c
|
Increased SID history rule severity
|
2019-12-03 14:28:46 +01:00 |
|
Thomas Patzke
|
76578927e8
|
Added domain trust rule
|
2019-12-03 14:28:20 +01:00 |
|
Florian Roth
|
c8e29da7ec
|
fix: simplified rule with RE
|
2019-12-03 11:24:06 +01:00 |
|
Florian Roth
|
fc09533f56
|
style: fixed title
|
2019-12-03 11:24:06 +01:00 |
|
yugoslavskiy
|
edad1695f6
|
Merge branch 'oscd' of https://github.com/mrblacyk/sigma into mrblacyk-oscd
|
2019-12-02 02:56:53 +01:00 |
|
yugoslavskiy
|
1273a10dcb
|
add win_new_service_creation.yml
|
2019-12-02 01:19:54 +01:00 |
|
yugoslavskiy
|
9fba097421
|
add sysmon_in_memory_powershell.yml by Tom Kern
|
2019-12-01 23:26:00 +01:00 |
|
booberry46
|
df162b232f
|
Update win_malware_emotet.yml
|
2019-11-30 13:17:44 +08:00 |
|
yugoslavskiy
|
d5722979ea
|
add rules by Daniel Bohannon
|
2019-11-27 00:02:45 +01:00 |
|
yugoslavskiy
|
41a09cde34
|
updated filenames
|
2019-11-26 23:31:18 +01:00 |
|
webhead404
|
21ef152e3a
|
Update win_external_device.yml
|
2019-11-20 16:19:45 -06:00 |
|
webhead404
|
2bfd4ea654
|
Added MITRE tags
|
2019-11-20 16:18:03 -06:00 |
|