Commit Graph

146 Commits

Author SHA1 Message Date
norbert791 b2acd80098 Merge PR #5483 from @norbert791 - Add AlphaSOC to the list of products that use or integrate sigma rules
chore: README.md - add 'AlphaSOC' to the 'Projects or Products that use or integrate Sigma rules'
2025-06-16 13:47:13 +02:00
Alex 6fad19ba7b Adds Detection Studio to README.md page 2025-04-23 14:57:37 +01:00
Burak Karaduman bd2a4c37ef Merge PR #5153 from @krdmnbrk - Add AttackRuleMap to README.md
chore: add `AttackRuleMap` project to README.md
2025-01-07 19:00:37 +01:00
Josh Brower f4e563ae8f Merge PR #5062 from @defensivedepth - Update README.md
chore: update README.md - Add a link to `Security Onion` sigma integration
2024-10-28 11:57:02 +01:00
David G c4c836aa33 Merge PR #4870 from @himynamesdave - Fix broken link in README.md
chore: fixing broken link in README.md
2024-06-03 10:32:29 +02:00
Nasreddine Bencherchali 8894f912b8 Merge PR #4779 from @nasbench - Update README.md
chore: update README.md
2024-03-21 16:39:14 +01:00
Stephen Lincoln e2f0a3fa88 Merge PR #4689 from @slincoln-aiq - Update README.md to add AttackIQ to the projects and products section
chore: add AttackIQ to the projects and products section
2024-01-23 11:45:13 +01:00
Nasreddine Bencherchali 9988614b1c Merge PR #4658 from @nasbench - Update Products Sigma List In README.md
chore: update README.md to add LimaCharlie and Impede
2024-01-03 01:25:04 +01:00
David G 0a951370f7 Merge PR #4590 from @himynamesdave - Update README
chore: update the README file to include an additional project to the section Projects or Products that use or integrate Sigma rules 

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
2023-11-27 00:59:17 +01:00
phantinuss c125ae7e7d Merge PR #4564 from @nasbench - Fix Further FPs Found In Testing
remove: Abusing Findstr for Defense Evasion - Deprecate in favour of 2 splitted rules. 587254ee-a24b-4335-b3cd-065c0f1f4baa and 04936b66-3915-43ad-a8e5-809eadfd1141
remove: Windows Update Client LOLBIN - Deprecate in favour of 52d097e2-063e-4c9c-8fbb-855c8948d135
fix: Remote Thread Creation By Uncommon Source Image - Enhance filters to avoid false positives
fix: Suspicious Shim Database Installation via Sdbinst.EXE - Add "null" and "empty" filters to account for cases where the CLI is null or empty
new: Insenstive Subfolder Search Via Findstr.EXE
new: Remote File Download Via Findstr.EXE
new: Windows Defender Exclusion Deleted
new: Windows Defender Exclusion List Modified
new: Windows Defender Exclusion Reigstry Key - Write Access Requested
update: Renamed Office Binary Execution - Add new binaries and filters to increase coverage and tune FPs
update: EVTX Created In Uncommon Location - Enhance filters to cover other drives other than "C:"
update: Findstr GPP Passwords - Add "find.exe" binary to increase coverage
update: Findstr Launching .lnk File - Add "find.exe" binary to increase coverage
update: LSASS Process Reconnaissance Via Findstr.EXE - Add "find.exe" binary to increase coverage
update: Non-DLL Extension File Renamed With DLL Extension - Update title and logic
update: Permission Misconfiguration Reconnaissance Via Findstr.EXE - Add "find.exe" binary to increase coverage
update: Potentially Suspicious Wuauclt Network Connection - Change the logic to use the "CommandLine" field in order to avoid false positives
update: Proxy Execution Via Wuauclt.EXE - Update title and enhance filters
update: Recon Command Output Piped To Findstr.EXE - Add "find.exe" binary to increase coverage
update: Security Tools Keyword Lookup Via Findstr.EXE - Add "find.exe" binary to increase coverage
update: Suspicious Appended Extension - Enhance list of extension
update: Sysmon Discovery Via Default Driver Altitude Using Findstr.EXE - Add "find.exe" binary to increase coverage
fix: Uncommon Userinit Child Process - Add the citrix process cmstart to the filtered processes and make it more strict to avoid abuse. Also enhances the other filters by removing the C: notation.
fix: Bad Opsec Defaults Sacrificial Processes With Improper Arguments - Add FP filter for chrome installer spawning rundll32 without arguments

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
thanks: @vj-codes for #4554
thanks: @mezzofix for #4520
thanks: @rkmbaxed for #4566 and #4569
thanks: @celalettin-turgut for #4570
2023-11-15 15:35:43 +01:00
phantinuss 8dbf7b9094 Revert "Merge PR #4564 from @nasbench - Fix Further FPs Found In Testing"
This reverts commit dddd7cd7fb.
2023-11-15 15:34:51 +01:00
phantinuss dddd7cd7fb Merge PR #4564 from @nasbench - Fix Further FPs Found In Testing
This reverts commit 2967675884.
2023-11-15 14:59:42 +01:00
phantinuss 2967675884 Revert "Fix Further FPs Found In Testing (#4564)"
This reverts commit b77a3fa9c3.
2023-11-15 14:59:17 +01:00
Nasreddine Bencherchali b77a3fa9c3 Fix Further FPs Found In Testing (#4564)
remove: Abusing Findstr for Defense Evasion - Deprecate in favour of 2 splitted rules. 587254ee-a24b-4335-b3cd-065c0f1f4baa and 04936b66-3915-43ad-a8e5-809eadfd1141
remove: Windows Update Client LOLBIN - Deprecate in favour of 52d097e2-063e-4c9c-8fbb-855c8948d135
fix: Remote Thread Creation By Uncommon Source Image - Enhance filters to avoid false positives
fix: Suspicious Shim Database Installation via Sdbinst.EXE - Add "null" and "empty" filters to account for cases where the CLI is null or empty
new: Insenstive Subfolder Search Via Findstr.EXE
new: Remote File Download Via Findstr.EXE
new: Windows Defender Exclusion Deleted
new: Windows Defender Exclusion List Modified
new: Windows Defender Exclusion Reigstry Key - Write Access Requested
update: Renamed Office Binary Execution - Add new binaries and filters to increase coverage and tune FPs
update: EVTX Created In Uncommon Location - Enhance filters to cover other drives other than "C:"
update: Findstr GPP Passwords - Add "find.exe" binary to increase coverage
update: Findstr Launching .lnk File - Add "find.exe" binary to increase coverage
update: LSASS Process Reconnaissance Via Findstr.EXE - Add "find.exe" binary to increase coverage
update: Non-DLL Extension File Renamed With DLL Extension - Update title and logic
update: Permission Misconfiguration Reconnaissance Via Findstr.EXE - Add "find.exe" binary to increase coverage
update: Potentially Suspicious Wuauclt Network Connection - Change the logic to use the "CommandLine" field in order to avoid false positives
update: Proxy Execution Via Wuauclt.EXE - Update title and enhance filters
update: Recon Command Output Piped To Findstr.EXE - Add "find.exe" binary to increase coverage
update: Security Tools Keyword Lookup Via Findstr.EXE - Add "find.exe" binary to increase coverage
update: Suspicious Appended Extension - Enhance list of extension
update: Sysmon Discovery Via Default Driver Altitude Using Findstr.EXE - Add "find.exe" binary to increase coverage
fix: Uncommon Userinit Child Process - Add the citrix process cmstart to the filtered processes and make it more strict to avoid abuse. Also enhances the other filters by removing the C: notation.
fix: Bad Opsec Defaults Sacrificial Processes With Improper Arguments - Add FP filter for chrome installer spawning rundll32 without arguments

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
thanks: @vj-codes for #4554
thanks: @mezzofix for #4520
thanks: @rkmbaxed for #4566 and #4569
thanks: @celalettin-turgut for #4570
2023-11-15 14:27:18 +01:00
Michael Peacock 6193ab71bd Merge PR #4556 from @michaelpeacock - Update README.md
chore: update README with link to the Confluent Sigma repo.
2023-11-09 11:20:55 +01:00
Metin Münüklü 65ceeeea6f Merge PR #4549 from @mtnmunuklu - Add alterix to the Projects or Products that use Sigma Rules section
chore: update README.md - Add new entry for `Projects or Products that use Sigma Rules`
2023-11-08 02:22:25 +01:00
Alex c919ff919c Merge PR #4527 from @sifex - Update README.md with a new description image
chore: Update README.md 

---------

Co-authored-by: Alex <github@sinn.io>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2023-10-29 12:34:51 +01:00
Nasreddine Bencherchali a51f60c887 Merge PR #4506 from @nasbench - Update README.md
chore: update README.md
2023-10-28 12:57:47 +02:00
Metin Münüklü 0964033c71 Merge pull request #4325 from @mtnmunuklu
chore: update readme.md to include alterix

---------

Co-authored-by: Nasreddine Bencherchali <8741929+nasbench@users.noreply.github.com>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2023-08-23 14:31:10 +02:00
Nasreddine Bencherchali 4e626ac9ba Update README.md 2023-07-17 14:25:37 +02:00
frack113 9ac75808b8 Update README.md
Signed-off-by: frack113 <62423083+frack113@users.noreply.github.com>
2023-07-14 11:17:37 +02:00
Thomas Patzke fb05fe3485 Removal of sigmatools 2023-04-02 01:15:46 +02:00
Georges Bossert 9fb8edac36 Reference SEKOIA.IO as a user of Sigma
SEKOIA.IO leverages Sigma language along with its new correlation extension
2023-03-20 13:39:33 +01:00
Florian Roth 3bdc80d28d docs: detection rule license info 2023-01-27 19:42:16 +01:00
Nasreddine Bencherchali a25027fef8 fix: rename links from old repo to SigmaHQ 2022-12-27 21:05:16 +01:00
Nasreddine Bencherchali 9238d20d65 feat: update readme for license and markdown warnings 2022-12-19 17:28:09 +01:00
Florian Roth 0612aec224 Update README.md 2022-10-01 20:10:41 +02:00
Aaron Herman 97fab49d09 Update README for rule usage section
Based on line 3 where it mentions being inside of `./tools` directory, updating line 4 to include working example that I used
2022-10-01 12:03:11 -05:00
Aaron Herman 3b6366b03d correct broken link and fix typo 2022-08-20 11:02:26 -05:00
Nasreddine Bencherchali d03f6df250 Reference Update [Batch 1] 2022-07-07 15:24:15 +01:00
Martin 86d11e62e8 Fix typo 2022-05-23 10:50:59 +02:00
Florian Roth 79c4e769d2 Update README.md 2022-05-19 07:54:04 +02:00
Florian Roth a21adf8904 Update README.md 2022-05-19 07:45:01 +02:00
Florian Roth 0d02ee3d22 docs: sigmac backend warning 2022-05-03 12:49:41 +02:00
Aegide 79fcc5e9a7 Update README.md
https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_susp_whoami.yml
2022-04-25 21:10:31 +02:00
Brasi Tech, LLC dcf8267552 Update README.md 2022-04-08 10:02:09 -04:00
Brasi Tech, LLC 7237e8ed7a add Confluent Kafka to use cases
Confluent has a SIGMA plugin.
https://github.com/confluentinc/cyber/tree/master/confluent-sigma
2022-04-08 10:01:08 -04:00
Florian Roth 05308eafc6 docs: readme update 2022-04-01 19:34:43 +02:00
SimSama c37ae60cff Merge branch 'master' into master 2022-03-16 16:29:34 -05:00
Tim Shelton eefd026037 Merging latest changes for HAWK.IO 2022-03-16 20:26:49 +00:00
Mei Liu cbda88fcbb Example:
-O:
attackMapFile: It's used to set subFunction in XML rule. It's a map of subFunction and tags.attack in YML file.
ruleIndex: It's used to set rule id in XML rule. The format of rule id is PH_Rule_{ruleType}_SIGMA_{ruleIndex}
ruleType: It's used to set rule id in XML rule.

1. Generate rule for one YML file
    a. tools/sigmac -t fortisiem -c fortisiem-windows rules/windows/network_connection/win_net_python.yml
    b. tools/sigmac -t fortisiem -c fortisiem-windows -O attackMapFile=tools/config/fortisiem/MITRE-Attack-matrix.csv -O ruleIndex=0 -O ruleType=Windows rules/windows/network_connection/win_net_python.yml
   Output:
      <Rules>
      <Rule group="PH_SYS_RULE_THREAT_HUNTING" natural_id="PH_Rule_Windows_SIGMA_0"  phIncidentCategory="Server" function="Security" subFunction="Discovery" technique="T1046">
         <Name>Python Initiated Connection </Name>
         <IncidentTitle>Python Initiated Connection</IncidentTitle>
         <active>true</active>
         <Description> Adversaries may attempt to get a listing of services running on remote hosts, including those that may be vulnerable to remote software exploitation </Description>
         <SigmaFileName> rules/windows/network_connection/win_net_python.yml </SigmaFileName>
         <CustomerScope groupByEachCustomer="true">
            <Include all="true"/>
           <Exclude/>
         </CustomerScope>
         <IncidentDef eventType="PH_RULE_Python_Initiated_Connection" severity="7">
           <ArgList> compEventType = Filter.eventType,hostName = Filter.hostName,isInitialed = Filter.isInitialed,procName = Filter.procName </ArgList>
         </IncidentDef>
         <PatternClause window="300">
           <SubPattern displayName="Filter" name="Filter">
               <SingleEvtConstr> eventType REGEXP ( "Win-Sysmon-3-Network-Connect.*" ) AND isInitialed="true" AND procName REGEXP ( ".*python.*" ) </SingleEvtConstr>
               <GroupByAttr> eventType,hostName,isInitialed,procName </GroupByAttr>
               <GroupEvtConstr> COUNT(*) &gt;= 1 </GroupEvtConstr>
           </SubPattern>
         </PatternClause>
         <TriggerEventDisplay>
           <AttrList> phRecvTime,hostName,isInitialed,procName,rawEventMsg </AttrList>
         </TriggerEventDisplay>
       </Rule>
       </Rules>

2. Generate rules for YML files under rules/windows
   a. tools/sigmac -t fortisiem -c fortisiem-windows -r rules/windows -o rule.xml
   b. tools/sigmac -t fortisiem -c fortisiem-windows -r rules/windows -O attackMapFile=tools/config/fortisiem/MITRE-Attack-matrix.csv -O ruleIndex=0 -O ruleType=Windows -o rule.xml
   Generate rules for YML files under rules/windows

3. Find files that is modified after some date.
  a. tools/sigmac --lists-files-after-date 2020/06/04 rules/windows/wmi_event/sysmon_wmi_susp_scripting.yml
  b. tools/sigmac --lists-files-after-date 2020/06/04 -r rules/windows/
  Output:
     rules/windows/wmi_event/sysmon_wmi_susp_scripting.yml, Updated
     rules/windows/wmi_event/TestFile.yml, No date
2022-03-08 17:16:08 -08:00
Anna Pauxberger 8fa714ca26 Merge branch 'SigmaHQ:master' into master 2022-01-03 20:20:08 +01:00
Florian Roth f5f613f371 Update README.md 2021-12-30 16:53:04 +01:00
Anna Pauxberger 9cd6e4f3d7 Change README 2021-12-02 10:20:17 -05:00
Florian Roth 916172de53 Update README.md 2021-10-23 23:09:35 +02:00
Yugoslavskiy Daniil 9b30b487c3 add ATC to the Projects or Products that use Sigma section 2021-08-23 04:25:29 +02:00
Lei Chen 4c3a7007e6 Update README.md 2021-08-07 21:13:19 +08:00
Lei Chen 932fe14cf6 Update README.md 2021-08-06 16:51:19 +08:00
Lei Chen 0078ee795b chore: update sigma ci badge
Replace travis-ci tatus badge with github actions tatus badge
2021-08-06 16:47:35 +08:00
thegoatreich dff7ad653a Add LogRhythm to supported targets 2021-07-17 11:02:32 +01:00