Commit Graph

379 Commits

Author SHA1 Message Date
github-actions[bot] df556b9675 Merge PR #5480 from @phantinuss - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2025-06-16 12:55:39 +02:00
Ariel Otilibili a1c9827a35 Merge PR #5402 from @ariel-anieli - feat: add JSON output format for deprecated rule summary
chore: tests/deprecated_rules.py - add json output format
chore: add deprecated/deprecated.json
chore: update README and workflow job accordingly

---------

Signed-off-by: Ariel Otilibili <otilibil@eurecom.fr>
Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2025-06-13 10:59:34 +02:00
Swachchhanda Shrawan Poudel 73ce21b574 Merge PR #5416 from @swachchhanda000 - Detection of SAP NetViewer CVE-2025-31324 exploitation via webserver logs
new: Potential SAP NetViewer Webshell Command Execution
new: Potential Java WebShell Upload in SAP NetViewer Server
chore: unpin pySigma validator version

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-06-11 11:28:24 +02:00
github-actions[bot] f3948c7bdf Merge PR #5449 from @nasbench - Archive new rule references and update cache file
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-06-02 13:29:26 +02:00
Swachchhanda Shrawan Poudel 5f894dfa0b Merge PR #5431 from swachchhanda000 - chore: fix broken links
chore: fix broken links
2025-05-26 10:21:19 +02:00
github-actions[bot] e9aa3eb2b3 Merge PR #5398 from @nasbench - Archive new rule references and update cache file
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-05-20 23:03:44 +02:00
phantinuss e58ebd048f chore: sort each block 2025-05-05 10:17:12 +02:00
phantinuss 9aeb2bab8a chore: whitelist new test issues
the rules are all valid and have a sound detection logic
2025-05-05 10:17:02 +02:00
phantinuss f47604b735 chore: update pySigma validators 2025-04-30 11:31:22 +02:00
github-actions[bot] 36394d43a0 Merge PR #5250 from @nasbench - Archive new rule references and update cache file
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-04-17 00:41:06 +02:00
github-actions[bot] 4a3cb8b774 Merge PR #5230 from @nasbench - Archive new rule references and update cache file
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-03-16 03:08:28 +01:00
frack113 3ce034bb20 Merge PR #4858 from @frack113 - Add summary csv file, workflow and generation script for deprecated rules
chore: add summary csv file, workflow and generation script for deprecated rules

---------

Co-authored-by: Nasreddine Bencherchali <monsteroffire2@gmail.com>
2025-03-05 00:59:36 +01:00
github-actions[bot] 2b421e3fd7 Merge PR #5217 from @nasbench - Archive new rule references and update cache file
Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-03-05 00:23:03 +01:00
github-actions[bot] c0aa75845b Merge PR #5194 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-02-17 12:04:58 +01:00
github-actions[bot] 1d8c84387f Merge PR #5178 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-02-03 18:22:38 +01:00
github-actions[bot] f3a3392bd2 Merge PR #5161 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-01-19 21:43:16 +01:00
github-actions[bot] 952d518f66 Merge PR #5150 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2025-01-06 15:35:53 +01:00
github-actions[bot] 0cb8e32d26 Merge PR #5130 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-12-16 13:42:23 +01:00
github-actions[bot] 4075c508d1 Merge PR #5101 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-12-01 13:39:50 +01:00
frack113 d804e9cba1 Merge PR #5088 from @frack113 - Remove custom dedicated hash fields from sigmac
update: GALLIUM IOCs - remove custom dedicated hash fields
update: Malicious DLL Load By Compromised 3CXDesktopApp - remove custom dedicated hash fields
update: Potential Compromised 3CXDesktopApp Execution - remove custom dedicated hash fields
update: HackTool Named File Stream Created - remove custom dedicated hash fields
update: PUA - Process Hacker Driver Load - remove custom dedicated hash fields
update: PUA - System Informer Driver Load - remove custom dedicated hash fields
update: Vulnerable HackSys Extreme Vulnerable Driver Load - remove custom dedicated hash fields
update: Vulnerable WinRing0 Driver Load - remove custom dedicated hash fields
update: WinDivert Driver Load - remove custom dedicated hash fields
update: HackTool - SharpEvtMute DLL Load - remove custom dedicated hash fields
update: HackTool - CoercedPotato Execution - remove custom dedicated hash fields
update: HackTool - CreateMiniDump Execution - remove custom dedicated hash fields
update: Hacktool Execution - Imphash - remove custom dedicated hash fields
update: HackTool - GMER Rootkit Detector and Remover Execution - remove custom dedicated hash fields
update: HackTool - HandleKatz LSASS Dumper Execution - remove custom dedicated hash fields
update: HackTool - Impersonate Execution - remove custom dedicated hash fields
update: HackTool - LocalPotato Execution - remove custom dedicated hash fields
update: HackTool - PCHunter Execution - remove custom dedicated hash fields
update: HackTool - PPID Spoofing SelectMyParent Tool Execution - remove custom dedicated hash fields
update: HackTool - Stracciatella Execution - remove custom dedicated hash fields
update: HackTool - SysmonEOP Execution - remove custom dedicated hash fields
update: HackTool - UACMe Akagi Execution - remove custom dedicated hash fields
update: HackTool - Windows Credential Editor (WCE) Execution - remove custom dedicated hash fields
update: MpiExec Lolbin - remove custom dedicated hash fields
update: PUA - Fast Reverse Proxy (FRP) Execution - remove custom dedicated hash fields
update: PUA- IOX Tunneling Tool Execution - remove custom dedicated hash fields
update: PUA - Nimgrab Execution - remove custom dedicated hash fields
update: PUA - NPS Tunneling Tool Execution - remove custom dedicated hash fields
update: PUA - Process Hacker Execution - remove custom dedicated hash fields
update: PUA - System Informer Execution - remove custom dedicated hash fields
update: Remote Access Tool - NetSupport Execution From Unusual Location - remove custom dedicated hash fields
update: Renamed AdFind Execution - remove custom dedicated hash fields
update: Renamed AutoIt Execution - remove custom dedicated hash fields
update: Renamed NetSupport RAT Execution - remove custom dedicated hash fields
update: Renamed PAExec Execution - remove custom dedicated hash fields
update: Potential SquiblyTwo Technique Execution - remove custom dedicated hash fields

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-11-25 09:30:14 +01:00
github-actions[bot] 4ec3e69de0 Merge PR #5080 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-11-17 23:44:45 +01:00
github-actions[bot] 04df2e483a Merge PR #5051 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-11-01 10:49:49 +01:00
frack113 c70fff4b8b Merge PR #4935 from @frack113 - Add new IIS logsource and related rules
chore: add "Microsoft-IIS-Configuration/Operational" support to the tests and thor.yml
new: ETW Logging/Processing Option Disabled On IIS Server
new: HTTP Logging Disabled On IIS Server
new: New Module Module Added To IIS Server
new: Previously Installed IIS Module Was Removed 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-10-06 22:44:05 +02:00
github-actions[bot] 8ebc58cf42 Merge PR #5028 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-10-01 14:55:39 +02:00
github-actions[bot] 23c4c0b90c Merge PR #5009 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-09-18 23:55:08 +02:00
github-actions[bot] 9eb4dea0a6 Merge PR #4992 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-09-02 10:01:12 +02:00
Kostas 2851ef5d16 Merge PR #4961 from @tsale - Add multiples rules and updates
fix: Potential Privilege Escalation via Local Kerberos Relay over LDAP - Add new exclusion
fix: Sdiagnhost Calling Suspicious Child Process - Add new filters
new: Antivirus Filter Driver Disallowed On Dev Drive - Registry
new: ChromeLoader Malware Execution
new: Emotet Loader Execution Via .LNK File
new: Exploitation Attempt Of CVE-2020-1472 - Execution of ZeroLogon PoC
new: FakeUpdates/SocGholish Activity
new: File Explorer Folder Opened Using Explorer Folder Shortcut Via Shell
new: HackTool - SharpWSUS/WSUSpendu Execution
new: HackTool - SOAPHound Execution
new: Hiding User Account Via SpecialAccounts Registry Key - CommandLine
new: Injected Browser Process Spawning Rundll32 - GuLoader Activity
new: Kerberoasting Activity - Initial Query
new: Manual Execution of Script Inside of a Compressed File
new: Obfuscated PowerShell OneLiner Execution
new: OneNote.EXE Execution of Malicious Embedded Scripts
new: Potential CVE-2021-44228 Exploitation Attempt - VMware Horizon
new: Potential CVE-2022-22954 Exploitation Attempt - VMware Workspace ONE Access Remote Code Execution
new: Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 1
new: Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 2
new: Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 3
new: Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 4
new: Potential MOVEit Transfer CVE-2023-34362 Exploitation - Dynamic Compilation Via Csc.EXE
new: Python Function Execution Security Warning Disabled In Excel
new: Python Function Execution Security Warning Disabled In Excel - Registry
new: Raspberry Robin Initial Execution From External Drive
new: Raspberry Robin Subsequent Execution of Commands
new: Remote Access Tool - Action1 Arbitrary Code Execution and Remote Sessions
new: Remote Access Tool - Ammy Admin Agent Execution
new: Remote Access Tool - Cmd.EXE Execution via AnyViewer
new: Serpent Backdoor Payload Execution Via Scheduled Task
new: Uncommon Connection to Active Directory Web Services
new: Ursnif Redirection Of Discovery Commands
update: Potential CVE-2022-29072 Exploitation Attempt - Add additional shells and flags 
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-08-29 19:21:47 +02:00
github-actions[bot] 8bf0ef1253 Merge PR #4970 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-08-15 11:13:47 +02:00
frack113 760597da11 Merge PR #4923 from frack113 - Update test_rules.py to remove the tests covered by pySigma-validators-sigmahq v0.7.0
chore: Update `test_rules.py` to remove the tests covered by `pySigma-validators-sigmahq` v0.7.0
2024-08-12 12:09:18 +02:00
frack113 4c017020dd Merge PR #4956 from @frack113 - Update promote_rules_status script to use the native datetime.date
chore: workflow - update `promote_rules_status` script to use the native `datetime.date`
2024-08-12 12:04:30 +02:00
Nasreddine Bencherchali 598d29f811 Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
chore: change tags, date, modified fields to comply with v2 of the Sigma spec.
chore: update the related type from `obsoletes` to `obsolete`.
chore: update local json schema to the latest version.
2024-08-12 12:02:50 +02:00
github-actions[bot] b8e67f13d5 Merge PR #4943 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-08-01 10:26:40 +02:00
Nasreddine Bencherchali 313578eeaa Merge PR #4888 from @nasbench - Add multiple new rules, updates and fixes
fix: Dllhost.EXE Initiated Network Connection To Non-Local IP Address - Filter out additional Microsoft IP block and moved to the threat hunting folder due to large amount of matches based on VT data
fix: Forest Blizzard APT - File Creation Activity - Fix typo in filename
fix: New RUN Key Pointing to Suspicious Folder - Enhance filter to fix new false positive found in testing
new: COM Object Hijacking Via Modification Of Default System CLSID Default Value
new: CVE-2023-1389 Potential Exploitation Attempt - Unauthenticated Command Injection In TP-Link Archer AX21
new: DPAPI Backup Keys And Certificate Export Activity IOC
new: DSInternals Suspicious PowerShell Cmdlets
new: DSInternals Suspicious PowerShell Cmdlets - ScriptBlock
new: HackTool - RemoteKrbRelay Execution
new: HackTool - RemoteKrbRelay SMB Relay Secrets Dump Module Indicators
new: HackTool - SharpDPAPI Execution
new: Hypervisor Enforced Paging Translation Disabled
new: PDF File Created By RegEdit.EXE
new: Periodic Backup For System Registry Hives Enabled
new: Renamed Microsoft Teams Execution
new: Windows LAPS Credential Dump From Entra ID
remove: Potential Persistence Via COM Hijacking From Suspicious Locations - Deprecated because of incorrect logic, replaced by "790317c0-0a36-4a6a-a105-6e576bf99a14"
update: DLL Call by Ordinal Via Rundll32.EXE - Reduced level to "medium" and moved to the threat hunting folder due to the fact that calling by ordinal can be seen by many legitimate utilities. An initial baseline needs to be set for the rule to be promoted.
update: Msiexec.EXE Initiated Network Connection Over HTTP - Reduced level to low and moved to the threat hunting folder due to large amount of matches based on VT data
update: MSSQL Add Account To Sysadmin Role - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Disable Audit Settings - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL Server Failed Logon From External Network - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL SPProcoption Set - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Option Change - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: MSSQL XPCmdshell Suspicious Execution - Update the "Provider_Name" to use a contains in order to account for other third party providers.
update: Network Connection Initiated By AddinUtil.EXE - increase level to "high" and promote the status to "test" based on VT data
update: Network Connection Initiated To AzureWebsites.NET By Non-Browser Process - Reduced the level to "medium" and added filters for "null" and empty values based on VT data
update: Office Application Initiated Network Connection Over Uncommon Ports - Add port "143" based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Office Application Initiated Network Connection To Non-Local IP - Add "outlook.exe" to the list of processes and filter multiple IP ranges based on Microsoft "Microsoft 365 URLs and IP address ranges" document
update: Password Protected Compressed File Extraction Via 7Zip - Reduced level to "low" and moved to the threat hunting folder due to large amount of matches based on VT data
update: Potential Dead Drop Resolvers - Add filters for "null" and empty values based on VT data
update: Potential Privilege Escalation via Local Kerberos Relay over LDAP - Update metadata information
update: Potential Shellcode Injection - Reduced level to "medium" and moved to the threat hunting folder due multiple FP with third party softwares
update: Potential Suspicious Execution From GUID Like Folder Names - Reduced level to "low" and moved to the threat hunting folder
update: Potentially Suspicious EventLog Recon Activity Using Log Query Utilities - Add additional EventLog and ETW providers to increase coverage
update: Potentially Suspicious Execution From Parent Process In Public Folder - Update logic to add Image names in addition to the previous CommandLines
update: Potentially Suspicious PowerShell Child Processes - Reduced level to "medium" and moved to the threat hunting folder due to large amount of matches based on VT data. As well as the logic doesn't look for anything suspicious but "child processes" that might be "uncommon".
update: Process Execution From A Potentially Suspicious Folder - Update metadata and remove "\Users\Public" to avoid false positives
update: Recon Command Output Piped To Findstr.EXE - Update the logic to user "wildcards" instead of spaces to cover different variants and increase the coverage.
update: Suspicious Electron Application Child Processes - Remove unnecessary filters
update: Suspicious Non-Browser Network Communication With Google API - Add filters for "null" and empty values based on VT data
update: System File Execution Location Anomaly - Enhance filters
update: Uncommon Child Process Of Setres.EXE - Update logic and metadata
update: Uncommon Link.EXE Parent Process - Enhance the filters and metadata
update: Windows Defender Threat Detection Service Disabled - Add french keyword for "stopped" to increase coverage for windows os that uses the french language

---------

Thanks: cY83rR0H1t
Thanks: CTI-Driven
Thanks: BIitzkrieg
Thanks: DFIR-jwedd
Thanks: Snp3r
2024-07-17 11:04:05 +02:00
github-actions[bot] 73f0078e92 Merge PR #4915 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-07-15 13:31:18 +02:00
Nasreddine Bencherchali c2915a678b Merge PR #4912 from @nasbench - update pySigma-validators-sigmahq to version 0.7.0 and sigma_cli_conf.yml
chore: update `pySigma-validators-sigmahq` to version 0.7.0 and `sigma_cli_conf.yml`

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
2024-07-11 11:24:01 +02:00
dr0pd34d 5f9d70c0ef Merge PR #4910 from @dr0pd34d - Add Microsoft Word Add-In Loaded
new: Microsoft Word Add-In Loaded 

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-07-11 02:31:31 +02:00
Nasreddine Bencherchali 9c59a06874 Merge PR #4911 from @nas_bench - Update sigma_cli_conf.yml
chore: update `sigma_cli_conf.yml`
2024-07-11 00:16:05 +02:00
github-actions[bot] 7682688ca9 Merge PR #4892 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-07-01 10:51:28 +02:00
github-actions[bot] 5a05ffc541 Merge PR #4879 from @nasbench - archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-20 11:44:19 +02:00
github-actions[bot] 3be29eb79e Merge PR #4868 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-06-03 10:28:40 +02:00
github-actions[bot] e9cb6fc400 Merge PR #4855 from @nasbench - Update rule ref archive cache
chore: archive new rule references and update cache file

Co-authored-by: nasbench <nasbench@users.noreply.github.com>
2024-05-27 12:53:54 +02:00
Josh 0192a5207e Merge PR #4839 from @joshnck - Add New RDP Connection Initiated From Domain Controller
new: New RDP Connection Initiated From Domain Controller 

---------

Co-authored-by: frack113 <62423083+frack113@users.noreply.github.com>
Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-05-10 16:32:09 +02:00
frack113 2cfa9a2d1f Merge PR #4847 from @frack113 - Update test Workflow to use pySigma-validators-sigmahq
chore: update workflow to use "pySigma-validators-sigmahq"
2024-05-10 10:32:54 +02:00
github-actions[bot] 45b93fcfab Merge PR #4842 from @nasbench - Archive new rule references and update cache file
chore: archive new rule references and update cache file
2024-05-02 10:33:45 +02:00
Andreas Braathen 2ef1a3b096 Merge PR #4825 from @netgrain - New analytic for CVE-2024-3400
new: Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection - File Creation
---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-25 14:46:07 +02:00
Nasreddine Bencherchali b349447e7d Merge PR #4826 from @nasbench - Add coverage for CVE-2024-3400
new: Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection

---------

Co-authored-by: phantinuss <79651203+phantinuss@users.noreply.github.com>
2024-04-24 14:59:24 +02:00
nikitah4x 5b4bfd6ffd Merge PR #4814 from @nikitah4x - Add new rule to detect MFA bypass in Cisco Duo
new: Cisco Duo Successful MFA Authentication Via Bypass Code

---------

Co-authored-by: nasbench <8741929+nasbench@users.noreply.github.com>
2024-04-17 12:28:38 +02:00
Hongbo ae49e3a465 Merge PR #4787 from @ya0guang - Fix typo in test_logsource.py
chore: fix typo in `test_logsource.py`
2024-04-15 17:00:21 +02:00
Hongbo 9e6952ec6a Merge PR #4789 from @ya0guang - Fix typo in test_rules.py
chore: fix typo in `test_rules.py` condition
2024-04-15 16:58:02 +02:00
Hongbo a235795ddd Merge PR #4790 from @ya0guang - Update test_rules.py
chore: fix typo in `test_rules.py`
2024-04-15 16:56:41 +02:00