Commit Graph

10511 Commits

Author SHA1 Message Date
Florian Roth 28953a2942 fix: MITRE tags in rule 2020-03-25 18:11:04 +01:00
Florian Roth 6584729a0d rule: powershell downloadfile 2020-03-25 14:58:14 +01:00
Florian Roth e206cbda7f Merge pull request #676 from Neo23x0/devel
Devel
2020-03-25 14:54:56 +01:00
Florian Roth 35e43db7a7 fix: converted CRLF line break to LF 2020-03-25 14:36:34 +01:00
Florian Roth 17297193c7 Merge branch 'master' into devel 2020-03-25 14:18:11 +01:00
Florian Roth 0e1ff440db fix: updated MITRE tags in test 2020-03-25 14:04:22 +01:00
Florian Roth 50b0d04ee8 rule: Exploited CVE-2020-10189 Zoho ManageEngine 2020-03-25 14:02:53 +01:00
Florian Roth 28d8b87a0f rule: extended web shell spawn rule 2020-03-25 14:02:39 +01:00
Thomas Patzke 004eaf0615 Revert "do not escape u"
This reverts commit aa112cbd44.

This was a fix for a previous bug.
2020-03-24 23:36:12 +01:00
j91321 1d86e0b4a5 Change falsepositives to array 2020-03-24 19:59:54 +01:00
j91321 c784adb10b Wrong indentation falsepositives 2020-03-24 19:55:41 +01:00
j91321 98a633e54c Add missing status and falsepositives 2020-03-24 19:53:41 +01:00
j91321 3c74d8b87d Add correct Source to detection to avoid FP 2020-03-24 19:49:24 +01:00
j91321 bc442d3021 Add path with lowercase system32 2020-03-24 19:48:24 +01:00
j91321 78bfa950d7 Add WinPrvSE.exe to detection 2020-03-24 19:47:10 +01:00
Thomas Patzke 5ea623506f Merge pull request #667 from opflep/master
Upgrade CarbonBlack backend
2020-03-22 00:24:57 +01:00
Thomas Patzke c10332b06c Merge pull request #663 from neu5ron/updates_sigmac_and_rules
Updates sigmac and rules
2020-03-22 00:22:31 +01:00
Harish SEGAR ba3994f319 Fix of '1 of x' condition 2020-03-21 12:19:01 +01:00
Harish SEGAR 81b277ba1a suspicious powershell parent process... 2020-03-21 00:26:30 +01:00
Harish SEGAR a88b22a1bd Fix namefield. 2020-03-20 23:34:15 +01:00
Harish SEGAR 67694e4ba7 Restructure new improvement to process_creation folder. 2020-03-20 23:29:32 +01:00
Harish SEGAR b9a916ceb4 Removed useless condition. 2020-03-20 22:50:26 +01:00
Harish SEGAR 30fac9545a Fixed author field. 2020-03-20 22:49:07 +01:00
Harish SEGAR 1f251cec07 Added missing action field 2020-03-20 22:46:19 +01:00
Harish SEGAR 293018a9e7 Added conditions... 2020-03-20 22:33:14 +01:00
Harish SEGAR 74b81120e4 Usage of value modifiers... 2020-03-20 22:03:48 +01:00
Harish SEGAR b129f09fee Improvement detection on downgrade of powershell 2020-03-20 21:48:19 +01:00
Maxime Thiebaut dce18b23b7 Add "Suspicious desktop.ini Action" rule 2020-03-19 21:43:03 +01:00
Maxime Thiebaut c5bdd18d8d Add Winlogbeat's RuleName field to mapping
When Sysmon logs a "RegistryEvent" event of ID 13, the event might contain a field named "RuleName" as shown in the following excerpt.

```xml
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<Events>
	<Event
		xmlns='http://schemas.microsoft.com/win/2004/08/events/event'>
		<System>
			<Provider Name='Microsoft-Windows-Sysmon' Guid='{5770385f-c22a-43e0-bf4c-06f5698ffbd9}'/>
			<EventID>13</EventID>
			<Version>2</Version>
			<Level>4</Level>
			<Task>13</Task>
			<Opcode>0</Opcode>
			<Keywords>0x8000000000000000</Keywords>
			<TimeCreated SystemTime='2020-03-18T03:52:07.173448000Z'/>
			<EventRecordID>160631</EventRecordID>
			<Correlation/>
			<Execution ProcessID='2156' ThreadID='3628'/>
			<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
			<Computer>win10.sec699-40.lab</Computer>
			<Security UserID='S-1-5-18'/>
		</System>
		<EventData>
			<Data Name='RuleName'>Context,ProtectedModeExitOrMacrosUsed</Data>
			<Data Name='EventType'>SetValue</Data>
			<Data Name='UtcTime'>2020-03-18 03:52:07.129</Data>
			<Data Name='ProcessGuid'>{36aa6401-9acb-5e71-0000-0010e3ed6803}</Data>
			<Data Name='ProcessId'>5064</Data>
			<Data Name='Image'>C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE</Data>
			<Data Name='TargetObject'>HKU\S-1-5-21-1850752718-2055233276-2633568556-1126\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents\TrustRecords\%USERPROFILE%/Documents/sec699.docm</Data>
			<Data Name='Details'>Binary Data</Data>
		</EventData>
	</Event>
</Events>
```

When used in combination with Elastic's Winlogbeat, the resulting field is named `winlog.event_data.RuleName`.
This commit introduces a mapping between the Sigma `RuleName` field (pre-existing in the `arcsight.yml` config) and Elastic's `winlog.event_data.RuleName`.

The presence of this field could be leveraged to build Sigma rules detecting events such as the above where a malicious macro was executed.
2020-03-19 19:40:18 +01:00
Florian Roth 6040b1f1f8 Merge pull request #668 from Neo23x0/devel
Devel
2020-03-19 18:36:31 +01:00
vunx2 be6519e35d merge 2020-03-19 11:07:39 +07:00
vunx2 1025930e04 merge 2020-03-19 11:05:52 +07:00
vunx2 c627f6b381 merge 2020-03-19 11:02:10 +07:00
vunx2 2107d86900 merge 2020-03-19 10:58:30 +07:00
vunx2 f3e642f340 merge 2020-03-19 10:54:48 +07:00
vunx2 b9e9408d34 Merge branch 'master' of https://github.com/Neo23x0/sigma 2020-03-19 10:51:37 +07:00
vunx2 0356178c50 eventdict 2020-03-19 10:49:40 +07:00
vunx2 1b12a6b261 modified: tools/sigma/backends/carbonblack.py 2020-03-19 09:00:24 +07:00
neu5ron aa112cbd44 do not escape u 2020-03-18 08:51:38 -04:00
neu5ron 17318b48bf - fix agg_option keyword
- remove (now) unnecessary other hardcoded `.keyword` locations
2020-03-18 08:50:37 -04:00
vunx2 e228d42b97 clean IP subnet 2020-03-18 16:49:44 +07:00
vunx2 1df5620a14 fix cleanValue + leading wildcard + EventID Intergration 2020-03-18 16:02:44 +07:00
Florian Roth 8454f60a8e fix: reduced level due to false positives 2020-03-17 20:40:28 +01:00
Florian Roth 4fb42ffaf7 docs: changed wording in license 2020-03-17 20:38:42 +01:00
j91321 f0c83ae3b4 Added es-rule backend options 2020-03-15 13:03:20 +01:00
neu5ron b575df8cd7 use the taxonomy for http response which is sc-status 2020-03-14 15:02:33 -04:00
neu5ron 4cd99e71bf use the taxonomy which states to use c-uri instead of c-uri-path 2020-03-14 15:02:06 -04:00
neu5ron 4c94906d53 rule should be wildcard AND had a prepended ^ in one of the CommandLine conditions that would have caused to not trigger 2020-03-14 15:00:42 -04:00
neu5ron 4b572f3ccb newline in description - typo 2020-03-14 14:58:58 -04:00
neu5ron d212d43acf spelling 2020-03-14 14:58:25 -04:00