Commit Graph

10511 Commits

Author SHA1 Message Date
Ömer Günal 1e7a47440f Install Root Certificate 2020-10-05 20:21:20 +03:00
S.kiran kumar 364ef1e61f [OSCD] Security Eventlog Cleared
Adding new changes to main
2020-10-05 22:30:09 +05:30
Nikita P. Nazarov f455146a29 Detecting use PsExec via Pipe Creation/Access to pipes RULE (#29 #30) 2020-10-05 18:08:20 +03:00
Ryan Plas 53f0261a62 Add Stored Credentials in Fake Files rule 2020-10-05 10:39:21 -04:00
Yuliya Fomina 815aa3c719 Edited win_susp_pcwutl 2020-10-05 14:00:21 +03:00
Furkan ÇALIŞKAN b147fc3296 Update win_susp_explorer.yml
Added known-fp
2020-10-05 13:22:43 +03:00
Yuliya Fomina 39f955d24d Revert "Create win_susp_pester.yml"
This reverts commit 577daa378a.
2020-10-05 13:14:35 +03:00
Yuliya Fomina 577daa378a Create win_susp_pester.yml 2020-10-05 12:22:50 +03:00
Yuliya Fomina ffc768e262 Create win_susp_pcwutl.yml 2020-10-05 11:30:24 +03:00
Furkan ÇALIŞKAN 85962665fd Update win_susp_explorer.yml 2020-10-05 10:49:54 +03:00
svch0stz a02f4840e5 Update win_susp_logon_explicit_credentials.yml 2020-10-05 15:31:30 +11:00
svch0stz 0249d330f5 Update win_susp_logon_explicit_credentials.yml 2020-10-05 15:23:23 +11:00
svch0stz c34cde7938 Create win_susp_logon_explicit_credentials.yml
❯ python .\sigmac -t splunk -c .\config\splunk-windows.yml ..\rules\windows\builtin\win_susp_logon_explicit_credentials.yml
(source="WinEventLog:Security" (EventCode="4648" (Image="*\\cmd.exe" OR Image="*\\powershell.exe" OR Image="*\\pwsh.exe" OR Image="*\\winrs.exe" OR Image="*\\wmic.exe" OR Image="*\\net.exe" OR Image="*\\net1.exe" OR Image="*\\reg.exe" OR Image="*\\winrs.exe")) NOT (Target_Server_Name="localhost"))
2020-10-05 15:17:39 +11:00
svch0stz c82d5ac08e Create win_net_use_admin_share.yml 2020-10-05 14:43:45 +11:00
svch0stz 60bd6a3692 Update win_susp_copy_lateral_movement.yml 2020-10-05 14:35:20 +11:00
svch0stz dd2ab4082d Update win_susp_copy_lateral_movement.yml 2020-10-05 14:33:00 +11:00
svch0stz 641f3031bd Update win_susp_copy_lateral_movement.yml 2020-10-05 14:27:39 +11:00
JPMinty 6fc476b2a2 Delete win_remote_schtask.yml 2020-10-05 13:40:57 +10:30
JPMinty 99e52a6f7a Create win_remote_service.yml 2020-10-05 13:37:55 +10:30
svch0stz 3516819bf8 Delete win_net_use_admin_share.yml 2020-10-05 14:00:36 +11:00
svch0stz c675be41e2 Create win_net_use_admin_share.yml 2020-10-05 13:57:50 +11:00
JPMinty ad5b128d0d Delete win_remote_service.yml 2020-10-05 13:26:12 +10:30
JPMinty 79d9cbe2c7 Create win_remote_service.yml 2020-10-05 13:23:00 +10:30
JPMinty 03b350ff0b Create win_remote_schtask.yml 2020-10-05 13:15:48 +10:30
svch0stz bc947fefc1 Create win_susp_wsl_lolbin.yml 2020-10-05 13:36:40 +11:00
Furkan CALISKAN 00cf61cc5b Added explorer.exe LOLbin, OSCD 2020-10-04 23:47:16 +03:00
Abhijit Khinvasara 1fc4a97ded Update target list in readme page 2020-10-02 17:18:06 -07:00
Steven 77cb49d057 Keep empty sysmon directory so tests will still run 2020-10-02 11:25:30 +02:00
Steven 18e0af986a - Fix for sysmon_ads_executable.yml 2020-10-02 10:54:15 +02:00
Steven 05d2de4c26 - Cleaned up some more rules where 'service: sysmon' was combined with category
- Replaced 'service: sysmon' with category: ... for some more events to make the rules more product independent

       modified:   rules/windows/builtin/win_invoke_obfuscation_obfuscated_iex_services.yml
       modified:   rules/windows/malware/mal_azorult_reg.yml
       modified:   rules/windows/powershell/powershell_suspicious_profile_create.yml
       modified:   rules/windows/process_creation/sysmon_cmstp_execution.yml
       modified:   rules/windows/process_creation/win_apt_chafer_mar18.yml
       modified:   rules/windows/process_creation/win_apt_unidentified_nov_18.yml
       modified:   rules/windows/process_creation/win_hktl_createminidump.yml
       modified:   rules/windows/process_creation/win_mal_adwind.yml
       modified:   rules/windows/process_creation/win_silenttrinity_stage_use.yml
2020-10-02 10:45:29 +02:00
Steven 0c9a82af89 - Remove 'service: sysmon' since defining the categories made the rules generic 2020-10-02 09:37:52 +02:00
Steven Goossens 8fabffee56 Merge pull request #2 from Neo23x0/master
Added new rule
2020-10-02 09:37:31 +02:00
Florian Roth c56cd2dfff Merge pull request #1024 from omkar72/master
Com hijack shell folder
2020-10-02 09:24:16 +02:00
omkargudhate22 4487d9cc7e added event type & changed technique 2020-10-02 09:22:14 +05:30
Steven 495b05572f Remove old file 2020-09-30 20:49:05 +02:00
Steven 8b74abe0bc - Created new categories for sysmon events
- Replaced the explicit EventIDs with the reference to the category
- Moved the rules to the corresponding directories
2020-09-30 20:44:14 +02:00
Steven Goossens 18e0510e90 Merge pull request #1 from Neo23x0/master
Update repo
2020-09-30 17:27:40 +02:00
Florian Roth d3ee1aba66 docs: MITRE ATT&CK(R) trademark references removed or adjusted
https://github.com/Neo23x0/sigma/issues/1028
2020-09-30 08:53:52 +02:00
Ryan Plas cdbee4b531 Fix error with pymisp in sigma2misp 2020-09-29 12:01:33 -04:00
Florian Roth c17ca6d5fe Merge pull request #1018 from savvyspoon/wcry-dns
WannaCry Killswitch domain DNS query
2020-09-29 09:27:21 +02:00
omkargudhate22 68a992d903 updated name 2020-09-27 21:57:19 +05:30
omkargudhate22 e7c8197e34 Updated fields & renamed 2020-09-27 21:52:59 +05:30
omkargudhate22 ebe3dce1d7 Update sysmon_comhijack_uac_bypass.yml 2020-09-27 21:44:41 +05:30
omkar72 3f148e6c7c COM hijack of shell folder to execute arbitrary application & UAC bypass using sdclt. 2020-09-27 21:19:04 +05:30
omkargudhate22 15c8721e7b Merge pull request #1 from Neo23x0/master
Updating my fork
2020-09-27 19:12:36 +05:30
Florian Roth d7d9c0e772 Merge pull request #1021 from hieuttmmo/master
Sigma rule to detect AdFind.exe execution
2020-09-27 09:50:41 +02:00
Florian Roth 8020fe3c40 false positive condition 2020-09-26 17:03:29 +02:00
Florian Roth 60795f7050 Update win_susp_adfind.yml
Fear that a simple adfind.exe causes too many false positives
2020-09-26 17:02:39 +02:00
Florian Roth dbdd758365 Duplicate Rule
we already have a rule for that
2020-09-26 17:01:32 +02:00
Tran Trung Hieu d4dd0600ad Fix logsource service to process_creation 2020-09-26 21:45:23 +07:00