Commit Graph

2410 Commits

Author SHA1 Message Date
Florian Roth a0bad54dbd Merge pull request #592 from 2d4d/fix_web_citrix_cve_2019_19781_exploit.yml
add newbm.pl
2020-01-13 14:48:38 +01:00
Thomas Patzke 7216fe400f Merge branch 'ala-rule' 2020-01-13 13:49:53 +01:00
Thomas Patzke d95a2606f0 Merge branch 'socprime-master' into ala-rule 2020-01-13 13:48:19 +01:00
Thomas Patzke 638d461b16 Added ala-rule backend to CI testing 2020-01-13 13:47:11 +01:00
Thomas Patzke 7b62b931ce Moved ala-rule backend code into ala backend module 2020-01-13 11:24:46 +01:00
Florian Roth e89b4b1c1f Merge pull request #595 from sbousseaden/patch-1
Update win_lm_namedpipe.yml
2020-01-13 11:21:24 +01:00
Thomas Patzke de690cbfbf Merge branch 'master' of https://github.com/socprime/sigma into socprime-master 2020-01-13 11:19:39 +01:00
sbousseaden b60671397d Update win_lm_namedpipe.yml 2020-01-13 10:50:35 +01:00
Florian Roth 53d76a69c1 Merge pull request #593 from neu5ron/updates_to_sigma_master
HELK SIGMAC fix name of network_initiated
2020-01-13 09:51:13 +01:00
neu5ron d8b703462d fix name of network_initiated 2020-01-13 00:12:04 -05:00
2d4d 364e859a6b add newbm.pl 2020-01-12 00:29:10 +01:00
Florian Roth a29c832b6a rule: updated netscaler rule 2020-01-07 14:42:16 +01:00
Florian Roth c9a75a8371 fix: shortened path in Citrix Netscaler rule 2020-01-07 13:00:28 +01:00
Florian Roth b03a43ca1b Merge pull request #589 from 2d4d/add_cve_2019-19781
add rule for Citrix Netscaler CVE-2019-19781
2020-01-06 14:15:46 +01:00
2d4d 35fbdd1248 add rule for Citrix Netscaler CVE-2019-19781 2020-01-03 01:48:29 +01:00
2d4d b98e57603e add rule for Citrix Netscaler CVE-2019-19781 2020-01-03 00:34:52 +01:00
Florian Roth ed5c77e1be Merge pull request #587 from refractionPOINT/internal-name
Adding LimaCharlie support for OriginalFileName field.
2019-12-31 08:32:51 +01:00
Maxime Lamothe-Brassard a3ad7cb1c5 Fixed actual event tag 2019-12-30 18:15:12 -08:00
Maxime Lamothe-Brassard 9b32086d92 Mapping OriginalFileName to event/INTERNAL_NAME now that it's available. 2019-12-30 15:58:18 -08:00
SOC Prime 92bc96a308 Update ala-rule.py 2019-12-30 16:26:30 +02:00
SOC Prime f015c97dff Update ala-rule.py 2019-12-30 16:13:27 +02:00
vh d42409372c Azure Sentinel backend (ala) - Fixed path in query
Added new backend Azure Sentinel Rule (ala-rule)
2019-12-30 16:09:19 +02:00
Florian Roth c007ecf90c Merge pull request #585 from Neo23x0/devel
Devel
2019-12-30 15:08:43 +01:00
SOC Prime 9c18f20e7b Merge pull request #3 from Neo23x0/master
latest sigmac
2019-12-30 16:02:46 +02:00
Florian Roth 5980cb8d0c rule: copy from admin share - lateral movement 2019-12-30 14:25:43 +01:00
Florian Roth 86e6b92903 rule: SecurityXploded tool 2019-12-30 14:25:29 +01:00
Florian Roth 5ad793e04a Merge pull request #582 from tvjust/patch-1
Added new sticky key attack binary
2019-12-30 14:14:20 +01:00
Florian Roth 948af2993b Merge pull request #583 from msec1203/msec1203-submit-rule1
MS Office Doc Load WMI DLL Rule
2019-12-30 14:13:58 +01:00
msec1203 dbdf6680e0 Update win_susp_winword_wmidll_load.yml
Update x2
2019-12-30 18:49:39 +09:00
msec1203 a45f877712 Update win_susp_winword_wmidll_load.yml
Fix to error on incorrect mitre tags used.
2019-12-30 18:41:16 +09:00
Florian Roth e043bc2193 Merge pull request #584 from GelosSnake/master
FP in win_system_exe_anomaly.yml
2019-12-29 18:52:43 +01:00
GelosSnake f574c20432 Update win_system_exe_anomaly.yml
fixing to much original fork.
2019-12-29 18:02:49 +02:00
GelosSnake 7e7f6d1182 Update win_system_exe_anomaly.yml
Following sigma event I've noticed my twitter account was referenced:
https://twitter.com/GelosSnake/status/934900723426439170

Rule:
https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_system_exe_anomaly.yml

Seems like - '\SystemRoot\System32\\*' is missing and hence triggering an FP.
2019-12-29 18:01:19 +02:00
msec1203 845d67f1f3 Initial Upload
Submit Sigma Rule For Detecting Word Loading WMI DLL's.
2019-12-29 23:14:29 +09:00
Justin Schoenfeld a1f07cdb4b Added new sticky key attack binary 2019-12-29 08:32:23 -05:00
Florian Roth 042c58dfc1 Merge pull request #581 from david-burkett/master
Trickbot behavioral recon activity / svchost spawned without CLI
2019-12-28 18:11:34 +01:00
david-burkett 4a65a25070 svchost spawned without cli 2019-12-28 10:28:08 -05:00
Florian Roth 5e59bbb3c3 Added MITRE ATT&CK Technique T1482
https://attack.mitre.org/techniques/T1482/
2019-12-28 16:02:26 +01:00
david-burkett 35b4806104 corrected logic 2019-12-28 09:55:39 -05:00
David Burkett 474a8617e5 Trickbot behavioral recon activity 2019-12-27 21:25:53 -05:00
Florian Roth 62bd2cc3ab Merge pull request #572 from alessiodallapiazza/master
Add the ability to detect PowerUp - Invoke-AllChecks
2019-12-23 12:57:55 +01:00
Alessio Dalla Piazza 0ff81cc693 Merge pull request #1 from alessiodallapiazza/alessiodallapiazza-patch-1
Add the ability to detect PowerUp - Invoke-AllChecks
2019-12-23 11:51:34 +01:00
Alessio Dalla Piazza f45587074b Add the ability to detect PowerUp - Invoke-AllChecks
PowerUp allow attackers to check if is possible to have a local privilege escalation attacks against Windows systems. The main function is called "Invoke-AllChecks" and check possible path of escalation.
2019-12-23 11:50:57 +01:00
Florian Roth 04afcccd2c Merge pull request #571 from Neo23x0/devel
rule: whoami as local system
2019-12-22 19:23:50 +01:00
Florian Roth fc8607bbea rule: whoami as local system 2019-12-22 18:50:26 +01:00
Florian Roth a7ca386a1b Merge pull request #570 from Neo23x0/devel
CreateMiniDump
2019-12-22 08:40:45 +01:00
Florian Roth fb76f2b9ac rule: CreateMiniDump 2019-12-22 08:29:12 +01:00
Florian Roth 511229c0b6 rule: modified Bloodhound rule 2019-12-21 21:22:13 +01:00
Thomas Patzke 530ac854df Added sigma2attack to CI testing 2019-12-20 22:53:22 +01:00
Thomas Patzke 781f53332b Merge pull request #566 from christophetd/sigma2attack
Add sigma2attack
2019-12-20 21:57:02 +01:00