yugoslavskiy
|
bdac415fea
|
Merge pull request #486 from yugoslavskiy/tieto_oscd
[OSCD] Tieto DNS exfiltration rules
|
2019-11-10 19:36:02 +03:00 |
|
yugoslavskiy
|
4fa928866f
|
oscd task #6 done.
add 25 new rules:
- win_ad_replication_non_machine_account.yml
- win_dpapi_domain_backupkey_extraction.yml
- win_protected_storage_service_access.yml
- win_dpapi_domain_masterkey_backup_attempt.yml
- win_sam_registry_hive_handle_request.yml
- win_sam_registry_hive_dump_via_reg_utility.yml
- win_lsass_access_non_system_account.yml
- win_ad_object_writedac_access.yml
- powershell_alternate_powershell_hosts.yml
- sysmon_remote_powershell_session_network.yml
- win_remote_powershell_session.yml
- win_scm_database_handle_failure.yml
- win_scm_database_privileged_operation.yml
- sysmon_wmi_module_load.yml
- sysmon_remote_powershell_session_process.yml
- sysmon_rdp_registry_modification.yml
- sysmon_powershell_execution_pipe.yml
- sysmon_alternate_powershell_hosts_pipe.yml
- sysmon_powershell_execution_moduleload.yml
- sysmon_createremotethread_loadlibrary.yml
- sysmon_alternate_powershell_hosts_moduleload.yml
- powershell_remote_powershell_session.yml
- win_non_interactive_powershell.yml
- win_syskey_registry_access.yml
- win_wmiprvse_spawning_process.yml
improve 1 rule:
- rules/windows/builtin/win_account_backdoor_dcsync_rights.yml
|
2019-11-10 18:43:41 +03:00 |
|
yugoslavskiy
|
c0ac9b8fb9
|
fix conflict
|
2019-11-10 17:31:33 +03:00 |
|
yugoslavskiy
|
127335a0ec
|
Merge pull request #482 from yugoslavskiy/master
[OSCD][The ThreatHunter-Playbook] Task 6: DONE
|
2019-11-10 17:27:54 +03:00 |
|
yugoslavskiy
|
a59d4fdd33
|
Merge branch 'master' of https://github.com/Neo23x0/sigma into oscd
|
2019-11-10 14:47:27 +03:00 |
|
Florian Roth
|
8cc16d252a
|
fix: more FP reductions
|
2019-11-09 23:36:29 +01:00 |
|
Florian Roth
|
038f205f0f
|
fix: FPs with UserInitMprLogonScript rule
|
2019-11-09 23:32:53 +01:00 |
|
Florian Roth
|
fbe138ed90
|
rule: reduced level of rule to medium due to FPs
|
2019-11-09 23:24:31 +01:00 |
|
Florian Roth
|
9835950f04
|
rule: SID to AD object rule level adjusted
|
2019-11-09 12:49:54 +01:00 |
|
Florian Roth
|
be62fad5cc
|
fix: fixed false positive in suspicious shell spawn rule
|
2019-11-09 10:45:46 +01:00 |
|
Thomas Patzke
|
8ae824f09f
|
Improved rules
Reduced false positives
|
2019-11-08 23:56:14 +01:00 |
|
Thomas Patzke
|
6e2fe09d24
|
Removed invalid tags
|
2019-11-08 22:02:12 +01:00 |
|
yugoslavskiy
|
5861664d0f
|
Update win_dsquery_domain_trust_discovery.yml
|
2019-11-08 02:58:32 +03:00 |
|
yugoslavskiy
|
3624a7d5da
|
Update win_file_permission_modifications.yml
|
2019-11-08 02:51:42 +03:00 |
|
yugoslavskiy
|
7d3c9e129d
|
Update win_service_stop.yml
|
2019-11-08 02:40:37 +03:00 |
|
yugoslavskiy
|
b176339da8
|
Merge pull request #479 from alexpetrov12/master
add rule
|
2019-11-08 02:16:22 +03:00 |
|
yugoslavskiy
|
00fc6c62b4
|
Delete renamed_binary_description.yml
agreed on improvements. will be added later
|
2019-11-08 02:16:01 +03:00 |
|
yugoslavskiy
|
98f32e9098
|
Delete sysmon_mimikatz_сreds_dump.yml
merged with rules/windows/sysmon/sysmon_cred_dump_lsass_access.yml
|
2019-11-08 02:06:31 +03:00 |
|
yugoslavskiy
|
6d61401b12
|
Delete sysmon_сreds_dump.yml
merged with rules/windows/sysmon/sysmon_cred_dump_lsass_access.yml
|
2019-11-08 02:06:20 +03:00 |
|
yugoslavskiy
|
6b98c37910
|
Update and rename sysmon_mimikatz_detection_lsass.yml to sysmon_cred_dump_lsass_access.yml
|
2019-11-08 02:05:34 +03:00 |
|
yugoslavskiy
|
562e07de38
|
Delete cobalt_execute_assembly.yml
merged with existing [sysmon_cobaltstrike_process_injection.yml](https://github.com/Neo23x0/sigma/blob/oscd/rules/windows/sysmon/sysmon_cobaltstrike_process_injection.yml)
|
2019-11-08 01:42:42 +03:00 |
|
yugoslavskiy
|
52d099a6e3
|
improve sysmon_cobaltstrike_process_injection.yml
|
2019-11-08 01:41:26 +03:00 |
|
yugoslavskiy
|
4443870577
|
Delete win_odbcconf_execution.yml
merged with rules/windows/process_creation/win_odbcconf_execution.yml
|
2019-11-08 01:36:03 +03:00 |
|
yugoslavskiy
|
3b34ed6150
|
add modifiers
|
2019-11-08 01:34:30 +03:00 |
|
yugoslavskiy
|
8164e1e096
|
Update sysmon_mimikatz_detection_lsass.yml
|
2019-11-07 04:50:22 +03:00 |
|
yugoslavskiy
|
7affc09c19
|
Update sysmon_mimikatz_detection_lsass.yml
|
2019-11-07 04:33:40 +03:00 |
|
yugoslavskiy
|
92e09db9ab
|
Update win_susp_lsass_dump_generic.yml
|
2019-11-07 04:27:53 +03:00 |
|
yugoslavskiy
|
6083d70975
|
Update sysmon_registry_persistence_key_linking.yml
|
2019-11-07 04:23:20 +03:00 |
|
yugoslavskiy
|
82b185db6a
|
Update win_sysmon_driver_unload.yml
|
2019-11-07 04:11:26 +03:00 |
|
yugoslavskiy
|
404a6d9915
|
Update win_netsh_packet_capture.yml
|
2019-11-07 03:37:41 +03:00 |
|
yugoslavskiy
|
ddf24819ed
|
Update silenttrinity_stage_use.yml
|
2019-11-07 03:33:12 +03:00 |
|
yugoslavskiy
|
0d8c64da86
|
duplicate rule deleted
this rule already present in Sigma repo — [./rules/windows/process_creation/win_susp_comsvcs_procdump.yml](https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_susp_comsvcs_procdump.yml)
|
2019-11-07 03:21:09 +03:00 |
|
yugoslavskiy
|
5513687e63
|
Merge branch 'master' of https://github.com/Neo23x0/sigma into oscd
|
2019-11-07 03:03:35 +03:00 |
|
webhead404
|
f7a968e3d2
|
Update and add another selection for regsvr32
Added cmd.exe to the detection after observing Atomic Red Team test
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1117/T1117.md#atomic-test-2---regsvr32-remote-com-scriptlet-execution
|
2019-11-06 15:49:53 -06:00 |
|
booberry46
|
cfe7ddbe5b
|
Update av_exploiting.yml
Not sure if the '' affects.
|
2019-11-06 16:16:49 +08:00 |
|
Florian Roth
|
c60563e546
|
rule: add modified rule date
|
2019-11-05 11:24:52 +01:00 |
|
yugoslavskiy
|
82f23c5f63
|
Merge pull request #477 from zinint/oscd
add 13 new rules:
- rules/linux/auditd/lnx_auditd_masquerading_crond.yml
- rules/linux/auditd/lnx_auditd_user_discovery.yml
- rules/linux/auditd/lnx_data_compressed.yml
- rules/linux/auditd/lnx_network_sniffing.yml
- rules/windows/powershell/powershell_data_compressed.yml
- rules/windows/powershell/powershell_winlogon_helper_dll.yml
- rules/windows/process_creation/win_change_default_file_association.yml
- rules/windows/process_creation/win_data_compressed_with_rar.yml
- rules/windows/process_creation/win_local_system_owner_account_discovery.yml
- rules/windows/process_creation/win_network_sniffing.yml
- rules/windows/process_creation/win_query_registry.yml
- rules/windows/process_creation/win_service_execution.yml
- rules/windows/process_creation/win_xsl_script_processing.yml
modify 1 rule:
- rules/windows/process_creation/win_possible_applocker_bypass.yml
|
2019-11-05 04:55:29 +03:00 |
|
yugoslavskiy
|
cc7aebe9b6
|
Update win_service_execution.yml
|
2019-11-05 04:42:53 +03:00 |
|
yugoslavskiy
|
534f5fc0e1
|
Update lnx_network_sniffing.yml
|
2019-11-05 04:40:40 +03:00 |
|
yugoslavskiy
|
70fdd9c7d7
|
Update lnx_data_compressed.yml
|
2019-11-05 04:38:27 +03:00 |
|
yugoslavskiy
|
ac95d840b4
|
Update powershell_winlogon_helper_dll.yml
|
2019-11-05 04:33:07 +03:00 |
|
yugoslavskiy
|
479aafe466
|
Update win_service_execution.yml
|
2019-11-05 04:26:19 +03:00 |
|
yugoslavskiy
|
37674b944f
|
Update win_query_registry.yml
|
2019-11-05 03:04:46 +03:00 |
|
yugoslavskiy
|
9d9de64387
|
Update win_query_registry.yml
|
2019-11-05 03:00:33 +03:00 |
|
yugoslavskiy
|
27e63abcc4
|
Update and rename win_custom_service_execution.yml to win_service_execution.yml
|
2019-11-05 02:57:15 +03:00 |
|
yugoslavskiy
|
3d5f5e2fe7
|
Update win_custom_service_execution.yml
|
2019-11-05 02:56:50 +03:00 |
|
yugoslavskiy
|
66bfbd0af9
|
Update and rename win_service_execution.yml to win_custom_service_execution.yml
|
2019-11-05 02:55:41 +03:00 |
|
yugoslavskiy
|
c147863eb3
|
Update powershell_data_compressed.yml
|
2019-11-05 02:38:36 +03:00 |
|
yugoslavskiy
|
b755d4fb68
|
Update and rename win_system_owner_user_discovery.yml to win_local_system_owner_account_discovery.yml
|
2019-11-05 02:31:20 +03:00 |
|
yugoslavskiy
|
9831897b6b
|
Update win_xsl_script_processing.yml
|
2019-11-05 01:32:29 +03:00 |
|