Compare commits

..

1517 Commits

Author SHA1 Message Date
Thomas Patzke bae09e9447 Sigmatools release 0.18.1 2020-08-26 00:06:25 +02:00
Thomas Patzke b742e4ef08 Merge pull request #990 from neu5ron/es_backend
ES and Readme from SOC Prime
2020-08-25 21:34:55 +02:00
Nate Guagenti f21b3c50c6 control whether to use an analyzed field or different type if a query/value contains a wildcard.
Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com>
2020-08-25 13:13:18 -04:00
Nate Guagenti a7ffb96b6b elasticsearch regex escape of '.' for case insensitivity backend options
Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com>
2020-08-25 13:10:25 -04:00
Nate Guagenti 474e04dfe3 add new options to readme for elasticbackend
Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com>
2020-08-25 13:00:22 -04:00
Nate Guagenti 76910eaee4 fix sub field name usage if there are 3 or more fields..
Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com>
2020-08-25 12:56:57 -04:00
Nate Guagenti 0d713e4544 control whether to use an analyzed field or different type if a query/value contains a wildcard.
Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com>
2020-08-25 12:56:33 -04:00
Florian Roth 5a9ed1da15 Merge pull request #988 from defensivedepth/master
Zeek RDP rule
2020-08-24 12:39:49 +02:00
Josh Brower 4c4b8db7cf Zeek RDP rule 2020-08-23 13:16:42 -04:00
Florian Roth 437a807a1d Merge pull request #985 from architect00/master
added troubleshooting links to root README.md
2020-08-20 14:56:27 +02:00
David Straßegger 1e8a5b64d9 added troubleshooting links to root README.md 2020-08-20 14:02:26 +02:00
Florian Roth 79adaceffa Merge pull request #979 from barvhaim/patch-3
Update win_susp_rasdial_activity.yml to use `contains` instead of `equal`
2020-08-18 15:08:15 +02:00
Florian Roth bc74ac1f8a Update win_susp_rasdial_activity.yml 2020-08-18 14:40:37 +02:00
Florian Roth fd23a18241 Merge pull request #982 from tungn12/master
Carbon black mapping wrong and fix wild card
2020-08-18 14:33:22 +02:00
Florian Roth 0ba9383774 Merge pull request #984 from EccoTheFlintstone/fix_fp3
SIGMA ASEP: remove some false positives
2020-08-18 14:29:35 +02:00
ecco de4810233c remove false positives in Windows being too broad and add specific keys looked at + add keys from wow64 2020-08-18 05:28:37 -04:00
tung12 1921e9dd89 Fix wild card and some escaped characters 2020-08-18 15:57:13 +07:00
tung12 172f7b371e Change mapped Image to path 2020-08-17 15:05:44 +07:00
Bar Haim bd96b1c5ad Update win_susp_rasdial_activity.yml
`rasdial` is an `exe`, and probably appear as `rasdial.exe`
`LIKE` is more fit in this case
2020-08-16 16:17:49 +03:00
Thomas Patzke 3d9855dd06 Merge pull request #975 from scottdermott/master
+ Adding Mitre Sub-Techniques and python update script to fetch latest from Mitre CTI
2020-08-13 13:18:57 +02:00
Dermott, Scott J 7e6828dd40 + Adding Mitre Sub-Techniques and python update script to fetch latest Pre, Enterprise & Mobile Tactics and Techniques from Mitre CTI 2020-08-13 10:24:44 +01:00
Florian Roth 2e29c07e83 Merge pull request #928 from duzvik/master
Create sysmon_abusing_azure_browser_sso.yml
2020-08-12 17:15:27 +02:00
Florian Roth 61a05ee054 reordered fields, changed indentation 2020-08-12 16:44:37 +02:00
Thomas Patzke 01125ffd3b Fixed: Elastalert backend handling of conditional field mappings 2020-08-11 23:29:18 +02:00
Thomas Patzke d73447c111 Merge pull request #939 from ktecv2000/master
add wmi persistence script event consumer false positive
2020-08-05 23:28:26 +02:00
Thomas Patzke f827a557f2 Merge pull request #936 from rtkmokuka/typo_wmiprvse_spawning_process
Change fitler typo from 'Username' to 'User' for Wmiprvse Spawning Process rule
2020-08-05 23:26:14 +02:00
Thomas Patzke 9b2f8ce1f9 Merge pull request #953 from barvhaim/master
STIX Backend added and updated fields mapping
2020-08-05 23:25:17 +02:00
Florian Roth 98ca8b4ce9 Merge pull request #968 from zinint/master
ATT&CK mapping update suggestions for \linux\
2020-08-05 00:37:36 +02:00
Timur Zinniatullin 72fdf0da45 Update lnx_auditd_susp_cmds.yml 2020-08-04 20:00:30 +03:00
Timur Zinniatullin 4e688233d7 ATT&CK mapping update suggestions for \linux\ 2020-08-04 19:48:18 +03:00
Florian Roth 4529e4cd52 Merge pull request #966 from Neo23x0/rule-devel
rule: TAIDOOR malware load
2020-08-04 14:54:24 +02:00
Florian Roth 052379a512 fix: tightened TAIDOOR rule 2020-08-04 14:37:18 +02:00
Florian Roth c4953409aa rule: TAIDOOR malware load
https://us-cert.cisa.gov/ncas/analysis-reports/ar20-216a
2020-08-04 14:31:29 +02:00
Florian Roth fa36adfe6d Merge pull request #965 from IPv777/patch-2
.002 	= 	SMB/Windows Admin Shares
2020-08-03 18:05:12 +02:00
IPv777 a52583dc68 .002 = SMB/Windows Admin Shares 2020-08-03 17:43:14 +02:00
Florian Roth 732c1fa356 Merge pull request #964 from Neo23x0/rule-devel
New rules
2020-08-03 15:28:45 +02:00
Florian Roth 5625f471d7 Merge pull request #963 from diskurse/rule-devel
win_webshell_regeorg.yml
2020-08-03 13:51:16 +02:00
Florian Roth 3abc3d0a76 docs: add FP condition 2020-08-03 13:50:47 +02:00
Florian Roth 6f7aecbe06 fix: preventive change to avoid FPs 2020-08-03 13:49:52 +02:00
Cian Heasley de33b953ba Add files via upload
Webshell ReGeorg Detection Via Web Logs
2020-08-03 12:20:04 +01:00
Florian Roth df3bfb1b37 rule: Winnti Pipemon 2020-07-30 18:55:47 +02:00
bar 8352eefe22 STIX Support keywords (value without field) 2020-07-28 18:52:02 +03:00
bar 53f36d2ab6 Merge remote-tracking branch 'upstream/master' 2020-07-28 16:24:51 +03:00
Florian Roth 5abf101c0b Merge pull request #954 from Neo23x0/rule-devel
Rule devel
2020-07-28 10:22:52 +02:00
Florian Roth 8970d03f6f Merge pull request #952 from Neo23x0/devel
feat: Detect duplicate rule tags
2020-07-28 10:21:59 +02:00
bar 565f77c199 Added STIX target to README.md 2020-07-27 15:35:30 +03:00
bar de475bb500 updated STIX mapping for more rule fields 2020-07-27 14:36:30 +03:00
Florian Roth 80f4b4ec71 fix: rules with duplicate tags 2020-07-27 11:44:47 +02:00
Florian Roth 051e2ce905 feat: detect duplicate tags 2020-07-27 11:37:58 +02:00
Thomas Patzke 481b695eff Merge pull request #950 from barvhaim/master
STIX Backend bug-fix and mapping updates
2020-07-26 18:33:35 +02:00
bar 32cf352236 Merge remote-tracking branch 'upstream/master' 2020-07-26 14:56:06 +03:00
bar 9643e01b54 extension should use '..' 2020-07-26 12:16:48 +03:00
Thomas Patzke dcb07bab2f Merge pull request #949 from 0xballistics/powershell_backend_fix
partial(?) fix of #762
2020-07-25 10:18:05 +02:00
Florian Roth a0ac6c46c7 Merge pull request #948 from IPv777/patch-1
remove duplicate tag
2020-07-24 20:32:40 +02:00
Simran Kaur Soin b8b1f83ae6 Merge pull request #3 from simrankaursoin/master
Fix bug with NOT handling
2020-07-24 11:55:17 -04:00
IPv777 77a8ac59ef remove duplicate 2020-07-24 16:38:08 +02:00
Florian Roth a55630f02c Merge pull request #947 from ryanplasma/master
Minor fixes to two rules
2020-07-24 09:25:55 +02:00
Ryan Plas aa548ba1a9 Add quotes due to a colon in the falsepositives string 2020-07-23 23:33:36 -04:00
Ryan Plas e52489aaf6 Change production status to stable 2020-07-23 23:33:36 -04:00
Simran Soin c329f6412d Fix bug with NOT handling 2020-07-23 11:47:55 -04:00
Simran Kaur Soin 7e32557ffc Merge pull request #2 from simrankaursoin/master
Update base.py and qradar.py
2020-07-23 11:12:17 -04:00
Florian Roth 8a4b53eb3a fix: rule leads to FPs on systems that don't log the cmdline parameters 2020-07-23 17:04:16 +02:00
Simran Soin 6c7b4cf408 Revert additional change in base.py 2020-07-23 10:47:22 -04:00
Simran Soin ef9af3730a Remove unnecessary edits from qradar.py 2020-07-23 10:34:29 -04:00
Simran Soin 0e49a6acdf Default NOT to false for all functions 2020-07-23 10:18:16 -04:00
Simran Soin 0fac21f4a3 Remove modifications from base file and override in stix.py 2020-07-23 10:13:30 -04:00
Simran Kaur Soin a03d1b091e Merge pull request #1 from simrankaursoin/master
Fix NOT bug
2020-07-23 09:50:18 -04:00
Simran Soin 30ff22776a Fix NOT bug 2020-07-23 09:41:33 -04:00
Florian Roth 951c6fee8b Update sysmon_password_dumper_lsass.yml 2020-07-23 14:31:21 +02:00
bar 5019f2f160 added mapping for stix web, cloud, linux 2020-07-22 21:41:46 +03:00
Florian Roth 02a6b20f5f Merge pull request #944 from rtkdmasse/update-rule-selections
Add 'contains' for the ps encoded chars rule
2020-07-22 17:48:18 +02:00
Daniel Masse 13cf0488ae Add 'contains' for the ps encoded chars rule 2020-07-22 10:49:22 -04:00
Florian Roth db98fe79b0 Revert "rule: update - MATA framework UserAgent"
This reverts commit 81ef0137c5.
2020-07-22 14:02:51 +02:00
Florian Roth 81ef0137c5 rule: update - MATA framework UserAgent 2020-07-22 14:02:13 +02:00
Florian Roth 9682d37ead Merge pull request #941 from architect00/master
fixed wrong function call for elastalert aggregation. fixes #940
2020-07-22 13:13:18 +02:00
Florian Roth 769a9212a5 Merge pull request #943 from diskurse/rule-devel
Webshell Recon Detection Via CommandLine & ProcessesAdd files via upload
2020-07-22 13:02:44 +02:00
Cian Heasley 023bf76363 Add files via upload
Looking for processes spawned by web server components that indicate reconnaissance by popular public domain webshells for whether perl, python or wget are installed.
2020-07-22 09:05:50 +01:00
bar 0543ec1ae3 mapping update, removed unused fields 2020-07-21 19:49:26 +03:00
bar 83623f396c Merge remote-tracking branch 'upstream/master' 2020-07-21 17:22:06 +03:00
bar da30266c60 ImageLoaded mapping added 2020-07-21 17:21:14 +03:00
David Straßegger 875360f373 fixed wrong function call for elastalert aggregation. fixes #940 2020-07-20 14:32:30 +02:00
Poming huang 2b2bf34a64 add wmi persistence script event consumer false positive 2020-07-20 12:27:16 +08:00
Florian Roth 71aa8ad3ba Merge pull request #937 from brachera/master
Updates to rules and tags
2020-07-18 08:19:48 +02:00
Aidan Bracher ff3f9fe9b3 Updated tags 2020-07-18 03:02:43 +01:00
Aidan Bracher 1fd73a23b2 Updated tags with sub-techniques 2020-07-18 03:01:34 +01:00
Aidan Bracher 4ac1058ab5 Updated tags 2020-07-18 03:01:11 +01:00
Aidan Bracher 4ffe9cb042 Updated tags with sub-techniques 2020-07-18 02:53:46 +01:00
Aidan Bracher 3bd768e49b Updated tags with sub-techniques 2020-07-18 02:52:15 +01:00
Aidan Bracher dcf20e580d Updated tags to include sub-techniques 2020-07-18 02:50:57 +01:00
Aidan Bracher 1442812681 Updated tags 2020-07-18 02:44:53 +01:00
Aidan Bracher b61527d0b2 Added ATT&CK tactic 2020-07-18 02:42:10 +01:00
Aidan Bracher 161829a4c0 Added ATT&CK tactic 2020-07-18 02:41:48 +01:00
Aidan Bracher 147fd46157 Added ATT&CK tactic 2020-07-18 02:41:10 +01:00
Aidan Bracher 2d227a08c5 Updated suspicious service with sub-techniques 2020-07-18 02:40:22 +01:00
Aidan Bracher 97452a9df3 Update to include sub-technique mapping 2020-07-18 02:38:47 +01:00
Aidan Bracher 30bd591c96 Update win_apt_ke3chang to include sub-techniques 2020-07-18 02:37:56 +01:00
Aidan Bracher ad9a8ff956 Updated to include extra registry key 2020-07-18 02:37:11 +01:00
Aidan Bracher ea1b2ae59f Updated invoke_phantom with sub-technique mapping 2020-07-18 02:32:42 +01:00
Aidan Bracher 23dd2e3cac Updated to include sub-technique mapping 2020-07-18 02:29:58 +01:00
Aidan Bracher 2006aa8f5e Inclusion of registry keys for WinDefender disabling 2020-07-18 02:23:30 +01:00
Marko Okuka 1d39b40fd1 Fixing typo in rule: Username to User 2020-07-16 10:09:29 -04:00
Florian Roth ae05e8eb11 Merge pull request #935 from SanWieb/933-EventID-process_creation
Revert "Ref #933 - Added windows Process Creation to config"
2020-07-16 14:32:19 +02:00
Sander 94272c7770 Revert "Ref #933 - Added windows Process Creation to config"
This reverts commit 6c35a7afa0.
2020-07-16 14:30:17 +02:00
Florian Roth 80e6e933a9 Merge pull request #934 from SanWieb/933-EventID-process_creation
Proposed fix for #933
2020-07-16 13:38:12 +02:00
Sander 6c35a7afa0 Ref #933 - Added windows Process Creation to config 2020-07-16 13:16:57 +02:00
Florian Roth 3025d6850c Merge pull request #932 from rtkdmasse/rule-selection-typos
Change the selection from Command to CommandLine in a couple of rules
2020-07-16 09:10:15 +02:00
Florian Roth 992bf676f9 Update sysmon_apt_pandemic.yml 2020-07-16 08:48:32 +02:00
Florian Roth b1de627e94 Update win_apt_zxshell.yml 2020-07-16 08:47:24 +02:00
Florian Roth 4b9b57330a Merge pull request #931 from brachera/master
Fix for indentation issue
2020-07-16 08:46:42 +02:00
Daniel Masse 0489a50bd0 Change the selection from Command to CommandLine in a couple of rules 2020-07-15 15:55:26 -04:00
Florian Roth f8e10273ef Merge pull request #929 from Neo23x0/pr/919
Pr/919
2020-07-15 21:30:57 +02:00
Florian Roth b50d234cb5 Merge pull request #913 from ryanplasma/master
Update logsources description->definition
2020-07-15 21:30:33 +02:00
Sander Wiebing 254942e4c3 Merge pull request #4 from Neo23x0/master
Update repository
2020-07-15 17:58:01 +02:00
Aidan Bracher e0476d5ce6 Merge branch 'master' of git://github.com/Neo23x0/sigma 2020-07-15 16:35:29 +01:00
Aidan Bracher 1e5ee5823c Fix for indentation issue
Wrong indentation of line 182 meant that even where config options
were given, the default per backend was being used, rendering
custom config useless.
2020-07-15 16:29:27 +01:00
Florian Roth d0c09f10a9 changed newline character to LF 2020-07-15 16:46:44 +02:00
Ryan Plas de53a08746 Merge branch 'master' of github.com:Neo23x0/sigma 2020-07-15 10:27:33 -04:00
duzvik a9b860d749 Update sysmon_abusing_azure_browser_sso.yml 2020-07-15 14:24:49 +03:00
duzvik d24e15cc27 Update sysmon_abusing_azure_browser_sso.yml 2020-07-15 14:12:58 +03:00
duzvik c5dfffdac0 Create sysmon_abusing_azure_browser_sso.yml 2020-07-15 14:02:34 +03:00
Florian Roth 8f66803ddf Merge pull request #927 from Neo23x0/rule-devel
improved CVE-2020-1350 rule
2020-07-15 12:06:31 +02:00
Florian Roth 1c103a749f fix: more FPs based on feedback
https://twitter.com/GossiTheDog/status/1283341486680166400
2020-07-15 12:05:50 +02:00
Florian Roth c2eb110fca fix: more exact patterns 2020-07-15 11:56:11 +02:00
Florian Roth ae7fbb9245 fix: false positive filters based on SOC Prime's rule 2020-07-15 11:49:20 +02:00
Florian Roth e5a34a965c Merge pull request #926 from Neo23x0/rule-devel
rule: CVE-2020-1350
2020-07-15 11:19:07 +02:00
Florian Roth 80639afd43 rule: CVE-2020-1350 2020-07-15 11:03:31 +02:00
Florian Roth c7e412788a Merge pull request #924 from Neo23x0/devel
Live MITRE ATT&CK data from TAXI service in Test Scripts
2020-07-14 18:15:29 +02:00
Florian Roth 38c29977ff Merge pull request #925 from Neo23x0/rule-devel
fix: issue reported as https://github.com/Neo23x0/sigma/issues/923
2020-07-14 18:14:51 +02:00
Florian Roth 1928b3dc06 Merge pull request #920 from qwerty1q2w/feature
Added AppLocker log source and new rule
2020-07-14 18:03:17 +02:00
Florian Roth 741d42ce88 fix: issue reported as https://github.com/Neo23x0/sigma/issues/923 2020-07-14 17:59:59 +02:00
Florian Roth 71e66ea9ba refactor: tests use live data from MITRE's TAXI service 2020-07-14 17:54:02 +02:00
Florian Roth 58b68758b4 fix: wrong MITRE ATT&CK ids used in the beta version 2020-07-14 17:53:32 +02:00
Florian Roth 43fb39a0b4 Merge pull request #922 from Neo23x0/devel
refactor: ignore sub techniques as long as we do not have a complete …
2020-07-14 12:50:35 +02:00
Florian Roth cf25b9c509 feat: filename test 2020-07-14 12:33:16 +02:00
Florian Roth 495376df77 refactor: references test without warnings for missing refs 2020-07-14 12:33:02 +02:00
Florian Roth bae979f5c7 refactor: ignore sub techniques as long as we do not have a complete list 2020-07-14 11:56:28 +02:00
Florian Roth 44381610ea Merge pull request #918 from Neo23x0/devel
References Test
2020-07-14 09:28:44 +02:00
Florian Roth 781667ef22 fix: zeek rule references isn't a list 2020-07-14 00:33:47 +02:00
Ryan Plas 9eb5d8da4d Add logsource attribute rule test 2020-07-13 17:02:28 -04:00
Ryan Plas 04fd598bcf Update additional rules to have correct logsource attributes 2020-07-13 17:02:17 -04:00
Pushkarev Dmitry efe720d44e Added new rule. AppLocker 2020-07-13 20:51:48 +00:00
Pushkarev Dmitry 6c999df3b7 Added AppLocker log source 2020-07-13 20:48:06 +00:00
Pushkarev Dmitry 8e3f973e69 Added AppLocker log source 2020-07-13 20:46:49 +00:00
Pushkarev Dmitry bdfb646228 Added AppLocker log source 2020-07-13 20:45:30 +00:00
Pushkarev Dmitry 364af53902 Added AppLocker log source 2020-07-13 20:44:03 +00:00
Pushkarev Dmitry 326cf05a74 Added AppLocker log source 2020-07-13 20:41:54 +00:00
Pushkarev Dmitry 46a6183745 Added AppLocker log source 2020-07-13 20:32:03 +00:00
Pushkarev Dmitry a58e037509 Added AppLocker log source 2020-07-13 20:30:02 +00:00
Pushkarev Dmitry 7fb2e2b845 Added AppLocker log source 2020-07-13 20:29:13 +00:00
Pushkarev Dmitry e376948258 Added AppLocker log source 2020-07-13 20:27:52 +00:00
Pushkarev Dmitry 0d925896b9 Added AppLocker log source 2020-07-13 20:23:42 +00:00
Pushkarev Dmitry c30a256030 Added AppLocker log source 2020-07-13 20:21:46 +00:00
Pushkarev Dmitry 1da229e3a9 Added AppLocker log source 2020-07-13 20:20:28 +00:00
Pushkarev Dmitry 3a19e3cf23 Added AppLocker log source 2020-07-13 20:18:01 +00:00
Bart 308420bf7f Update sysmon_dllhost_net_connections.yml
Fix @
2020-07-13 21:20:55 +02:00
Bart 007f62ba01 Add Dllhost WAN access 2020-07-13 21:12:37 +02:00
Florian Roth b3e15eea68 fix: nested check 2020-07-13 18:49:00 +02:00
Florian Roth 91c0bea570 fix: typo and reordered 2020-07-13 18:22:47 +02:00
Florian Roth 758f5039b5 fix: no error on rules without references 2020-07-13 18:16:32 +02:00
Florian Roth 8d91659c2a fix: typo in field value 2020-07-13 18:08:00 +02:00
Florian Roth 4c610ec693 feat: test references is list 2020-07-13 18:07:19 +02:00
Florian Roth f12cb7309b fix: references is not a list 2020-07-13 17:37:03 +02:00
Florian Roth 437a567e4f Merge pull request #917 from Neo23x0/rule-devel
New Empire Rules and Updates
2020-07-13 16:37:59 +02:00
Florian Roth 1c63a93643 fix: wrong casing in tag 2020-07-13 16:20:51 +02:00
Florian Roth 87ce5e5745 fix: missing MITRE ATT&CK IDs in test 2020-07-13 16:02:22 +02:00
Florian Roth 1b75a3a96b Merge pull request #916 from viniciusvec/patch-2
Update lnx_shell_clear_cmd_history.yml
2020-07-13 15:54:11 +02:00
Florian Roth 557e8b0faf rule: improved Empire detection 2020-07-13 15:47:53 +02:00
viniciusvec 26f0d49772 Update lnx_shell_clear_cmd_history.yml
Renamed tags to match production MITRE: https://attack.mitre.org/techniques/T1070/003/
2020-07-13 14:06:14 +01:00
Florian Roth 7e8aa7b12b Merge pull request #915 from Neo23x0/rule-devel
rule: regsvr32 flags anomaly
2020-07-13 12:16:05 +02:00
Florian Roth 7a63fd56da rule: regsvr32 flags anomaly 2020-07-13 11:59:44 +02:00
Ryan Plas 25d978d9bd Update powershell_shellcode_b64.yml logsource to use the correct Sigma schema values 2020-07-11 22:17:06 -04:00
Ryan Plas 3bb45f00af Update web_citrix_cve_2019_19781_exploit.yml logsource to use the correct Sigma schema values 2020-07-11 00:00:21 -04:00
Florian Roth 1a87492bd4 Merge pull request #912 from Neo23x0/rule-devel
rule: improved Citrix rule
2020-07-10 19:46:09 +02:00
Florian Roth 129925ce0b rule: improved Citrix rule 2020-07-10 18:15:35 +02:00
Florian Roth 17dedddbdd Merge pull request #911 from Neo23x0/rule-devel
rule: Citrix Netscaler Attack CVE-2020-8193 CVE-2020-8195
2020-07-10 18:09:19 +02:00
Florian Roth 383953c74e rule: better rule name and descriptions, plus MITRE ATT&CK tags 2020-07-10 17:55:13 +02:00
Florian Roth 0d89208242 rule: updated Citrix rule 2020-07-10 17:49:18 +02:00
Florian Roth eda08e3a89 rule: Citrix Netscaler Attack CVE-2020-8193 CVE-2020-8195 2020-07-10 17:45:11 +02:00
Florian Roth 3ab5eb97d8 Merge pull request #901 from brachera/master
rule: Leviathan registry key
2020-07-10 16:42:02 +02:00
Florian Roth 49aa0b4621 Merge pull request #909 from EccoTheFlintstone/fp2
add WMI module load false positive
2020-07-10 15:45:53 +02:00
Florian Roth 5de82628fa Update sysmon_apt_leviathan.yml 2020-07-10 15:41:55 +02:00
Florian Roth 168952840b Merge pull request #910 from Neo23x0/rule-devel
Rule devel
2020-07-10 14:17:22 +02:00
Florian Roth 268a28daed rule: Evilnum Golden Chicken rule OCX 2020-07-10 13:02:52 +02:00
ecco e30eaa0202 be more specific about file location 2020-07-09 13:33:59 -04:00
ecco 94e3bd9e6b add WMI module load false positive 2020-07-09 13:32:21 -04:00
Florian Roth 6ad2f07193 Merge pull request #907 from EccoTheFlintstone/fix_fp
add WMI and powershell false positives
2020-07-09 17:42:53 +02:00
ecco 905f1b3823 add WMI and powershell false positives 2020-07-09 10:26:54 -04:00
Florian Roth 7949729fa4 rule: PowerShell encoded character syntax 2020-07-09 08:52:32 +02:00
Florian Roth 5200f1f85d Merge pull request #905 from barvhaim/stix-mapping
Incorrect mapping fixes [stix backend]
2020-07-08 19:22:23 +02:00
bar ca7cf8478d - IntegrityLevel mapping to integritylevel 2020-07-08 19:37:24 +03:00
Florian Roth 14210aba16 Merge pull request #906 from GelosSnake/patch-1
adding google chrome to FP list
2020-07-08 16:57:29 +02:00
bar 8855a87dbf - TargetProcessAddress mapping should be as startaddress mapping
- remove extra '-'
2020-07-08 17:35:57 +03:00
Florian Roth e3734aaa27 fix: missing upper tick 2020-07-08 15:53:04 +02:00
GelosSnake efae210556 adding google chrome to FP list
legitimate errors generated by Google Chrome are reported often.

Official google standpoint on this:
https://support.google.com/chrome/a/thread/15440066?hl=en
2020-07-08 16:44:41 +03:00
bar 8889ae21ca DestinationPort to network-traffic:dst_port mapping fix 2020-07-08 14:31:04 +03:00
bar 50ef79b398 Custom STIX object "x-sigma" for fields that missing mapping, so the pattern is STIX valid 2020-07-08 14:09:26 +03:00
Thomas Patzke 8cec884d96 Merge branch 'pr-709' 2020-07-08 08:00:03 +02:00
Thomas Patzke bd9410fe06 Added CI test 2020-07-07 23:46:49 +02:00
Thomas Patzke 205b584e80 Merge branch 'pr-829' 2020-07-07 23:42:57 +02:00
Thomas Patzke 3e17cc1900 Merge pull request #894 from caliskanfurkan/master
ditsnap, a credential access tool used in ransomware attacks
2020-07-07 23:21:36 +02:00
Thomas Patzke 28013a15e1 Improved rule 2020-07-07 23:18:07 +02:00
Thomas Patzke 90f09f7b12 Merge branch 'devel' of https://github.com/diskurse/sigma into pr-829 2020-07-07 23:15:39 +02:00
Thomas Patzke 3c760fabc1 Merge pull request #745 from Rettila/master
Added new rules
2020-07-07 23:14:19 +02:00
Thomas Patzke 9bcff522b6 Merge branch 'master' of https://github.com/rashimo/sigma into pr-709 2020-07-07 23:12:03 +02:00
Thomas Patzke 7eb499ad85 Added rule id 2020-07-07 22:54:55 +02:00
Thomas Patzke 360b5714a8 Splitted and improved new rule 2020-07-07 22:47:14 +02:00
Thomas Patzke 0ce5f2cc75 Merge branch 'patch-2' of https://github.com/4A616D6573/sigma into pr-483 2020-07-07 22:37:11 +02:00
Thomas Patzke 4762a59b89 Merge pull request #891 from rtkbkish/image-load-fixes
Fix typo for rule in image_load category
2020-07-07 22:31:32 +02:00
Thomas Patzke 2032a1e7fd Merge pull request #898 from rtkbkish/fix-uac-registry
Proposed fix for sysmon_uac_bypass_eventvwr
2020-07-07 22:29:39 +02:00
Thomas Patzke 9e85731253 Merge pull request #899 from rtkbkish/refix-rules
Re-fix sysmon rules that lost changes with category refactoring.
2020-07-07 22:28:37 +02:00
Thomas Patzke a11bc000fd Merge pull request #900 from barvhaim/stix
STIX backend added including mapping configurations for windows logs and QRadar
2020-07-07 22:26:51 +02:00
Florian Roth b0e59bdb40 Merge pull request #903 from Neo23x0/rule-devel
rule: extended F5 BIG-IP exploitation detection rule
2020-07-07 22:06:00 +02:00
Florian Roth acfe20aa34 rule: extended F5 BIG-IP exploitation detection rule 2020-07-07 21:45:08 +02:00
bar 35bb8df0b5 updated makefile with stix coverage cmd 2020-07-07 16:39:59 +03:00
Aidan Bracher 90983dcc4b add level field to rule 2020-07-07 14:28:18 +01:00
Aidan Bracher f549a14d9a rule: Leviathan registry key 2020-07-07 13:27:57 +01:00
bar acbab2db4b stix backend + mapping configurations for windows logs and qradar 2020-07-07 15:04:16 +03:00
Florian Roth 99ac4f1f3d fix: FPs with RedMimicry rule 2020-07-07 10:11:58 +02:00
Florian Roth c8ca55b3e4 fix: duplicate wrong old key 2020-07-06 17:14:59 +02:00
Florian Roth cc31ed8b84 fix: missing NTLM log source in THOR 2020-07-06 17:07:06 +02:00
Brad Kish c758ca0eb9 Re-fix sysmon rules that are lost changes with category refactoring.
Several fixes for sysmon rules got lost when the rules were refactored to use
categories.

Re-add the fixes.

https://github.com/Neo23x0/sigma/commit/38afd8b5def24191616ff0f0c0324cfbb7f0d6d0

https://github.com/Neo23x0/sigma/commit/422b2bffd77b217e6cec9a67c496b0aa44711ece

https://github.com/Neo23x0/sigma/commit/dfae2a6df6f5bbc90a7b476c22fc9c8fedab47e9
2020-07-06 10:55:42 -04:00
Brad Kish 7e06fd80fd Proposed fix for sysmon_uac_bypass_eventvwr
Issue: https://github.com/Neo23x0/sigma/issues/888

The rules were not merged correctly with the transition to sysmon categories.

Split the rule into separate documents: one for the registry_event and one for
the process_creation
2020-07-06 09:20:34 -04:00
Thomas Patzke 939156fa6d Introduced dns_query log source category 2020-07-05 23:29:51 +02:00
Thomas Patzke 0df21289a0 Merge branch 'dns-fixes' of https://github.com/rtkbkish/sigma into pr-893 2020-07-05 23:24:56 +02:00
Thomas Patzke 57cb255208 Merge pull request #864 from cclauss/patch-3
Fix undefined names in sigma2misp.py
2020-07-05 23:16:22 +02:00
Florian Roth 4aae3a6aa5 Merge pull request #897 from Neo23x0/rule-devel
improved F5 BIG-IP rule based on private feedback
2020-07-05 16:38:20 +02:00
Florian Roth 13ab00f744 improved F5 BIG-IP rule based on private feedback 2020-07-05 16:21:48 +02:00
Florian Roth ab9a988682 Merge pull request #896 from Neo23x0/rule-devel
rule: CVE-2020-5902 F5 BIG-IP Exploitation Attempt
2020-07-05 13:44:36 +02:00
Florian Roth fbe6c0e7d9 improved F5 BIG-IP rule 2020-07-05 13:29:30 +02:00
Florian Roth f079d0f915 rule: CVE-2020-5902 F5 BIG-IP Exploitation Attempt
https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/
2020-07-05 13:18:53 +02:00
Florian Roth c51b4d0524 Merge pull request #890 from rtkbkish/file-event-fixes
Fixes for rules in the sysmon file_event category
2020-07-05 13:13:24 +02:00
Florian Roth 4a810dd136 Merge pull request #886 from Neo23x0/rule-devel
Windows Curl Rules
2020-07-05 13:12:41 +02:00
Florian Roth facd578324 Merge pull request #892 from rtkbkish/registry-event-fixes
Fixes for rules in new sysmon registry_event category
2020-07-05 13:12:04 +02:00
Furkan CALISKAN 8ef82e48eb ditsnap 2020-07-04 23:21:52 +03:00
Brad Kish 8b3b312c4e Proposed fix for https://github.com/Neo23x0/sigma/issues/889
This change removes dns events from the network connection category. The
one change is that sysmon_regsvr32_network_activity.yml needs to test
the network connection category separately from the DNS event id.
2020-07-03 16:28:19 -04:00
Brad Kish 7031d9e2b8 Fix typo for rule in image_load category
image_load not image_loaded.
2020-07-03 16:23:17 -04:00
Brad Kish 1e9d0e9653 Fixes for rules in the sysmon file_event category
Fix a couple of typos

For sysmon_hack_dumpert:
Make sure the logsource is category file_event and not sysmon. Don't set
the category at the global level. Instead set in the individual document.
2020-07-03 16:22:29 -04:00
Brad Kish 4b31633355 Fixes for rules in new sysmon registry_event category
To be consistent with the behaviour of the other rules, the eventID should not
be specified as part of the rule. The category defines the eventID.
2020-07-03 16:20:37 -04:00
Florian Roth 11517edbd7 rule: suspicious curl usage 2020-07-03 18:55:44 +02:00
Florian Roth c4267a4614 rule: suspicious curl file upload 2020-07-03 18:20:44 +02:00
Florian Roth 80f15a1e50 Merge pull request #885 from Neo23x0/rule-devel
fix: trailing whitespace
2020-07-03 18:00:19 +02:00
Florian Roth 4d9e2e8c16 fix: trailing white space 2020-07-03 17:59:50 +02:00
Florian Roth 26d8810efb Merge pull request #882 from Neo23x0/rule-devel
Rule devel
2020-07-03 15:33:55 +02:00
Florian Roth 8a0262d1a2 fix: in linux keyword expression 2020-07-03 15:08:20 +02:00
Florian Roth 4dc818aafd fix: rar flags rule caused too many FPs 2020-07-03 13:20:24 +02:00
Florian Roth 5dd5b87f43 rule: guacamole exploitation detection 2020-07-03 13:20:03 +02:00
Florian Roth abf5f799d6 docs: more references 2020-07-03 13:19:44 +02:00
Florian Roth fa452bf3e5 Merge pull request #849 from omergunal/ogunal-1
Rules for detecting suspicious remote file copy
2020-07-03 11:59:45 +02:00
Florian Roth b9966a173c Update lnx_file_copy.yml 2020-07-03 11:32:49 +02:00
Florian Roth 6420820eb2 Merge pull request #871 from Christopolos94/master
Update to mdatp backend
2020-07-03 11:29:01 +02:00
Florian Roth 5f04fcccf5 fix: broken links 2020-07-03 11:22:06 +02:00
Florian Roth 3111ab8396 refactor: new way to write that rule 2020-07-03 11:20:36 +02:00
Florian Roth d12b8347dc fix: bug in cmstp rule
https://github.com/Neo23x0/sigma/issues/876
2020-07-03 11:19:11 +02:00
Florian Roth 0bbf40fb14 refactor: include xcopy 2020-07-03 11:03:45 +02:00
Florian Roth 3bea08edfc refactor: copy from/to system32 rule 2020-07-03 10:56:26 +02:00
Florian Roth 02dee36f4c Merge pull request #880 from Neo23x0/rule-devel
fix: typo in systemroot
2020-07-03 10:25:31 +02:00
Florian Roth 34ea706e4f fix: typo in systemroot 2020-07-03 10:24:58 +02:00
Florian Roth 53620a0d2f Merge pull request #879 from Neo23x0/rule-devel
fix: missing copy command
2020-07-03 10:18:21 +02:00
Florian Roth 0fa1c1525b fix: missing copy command 2020-07-03 10:17:34 +02:00
Florian Roth 248506be93 Merge pull request #878 from Neo23x0/rule-devel
DesktopImgDownLdr Rules and extra rule
2020-07-03 10:14:58 +02:00
Florian Roth 1f0b1e58a9 fix: bugs in rule and title 2020-07-03 09:54:10 +02:00
Florian Roth 01ed87186f Copy From System Root rule 2020-07-03 09:45:58 +02:00
Florian Roth 33fef8bcf5 DesktopImgDownLdr rules 2020-07-03 09:45:48 +02:00
Thomas Patzke 43e5ae5d24 Added Windows NTLM log source + fixes 2020-07-02 23:20:36 +02:00
Thomas Patzke de0bb36c51 Merge branch 'master' of https://github.com/4A616D6573/sigma into pr-785 2020-07-02 23:04:59 +02:00
Florian Roth bb86d9c125 Merge pull request #875 from Neo23x0/rule-devel
fix: duplicate IDs and rule titles
2020-07-01 16:58:06 +02:00
Florian Roth 4c4ed1a4a2 fix: duplicate IDs and rule titles 2020-07-01 16:37:27 +02:00
Florian Roth 61c3b2e0d6 Merge pull request #873 from Neo23x0/rule-devel
fix: remove duplicate rules in sysmon (generic rule cleanup)
2020-07-01 11:29:04 +02:00
Florian Roth 9c0f9f398f refactor: sysmon rule cleanup > generlization 2020-07-01 10:58:39 +02:00
Florian Roth 4231fe2efc fix: remove duplicate rules in sysmon (generic rule cleanup) 2020-07-01 10:23:30 +02:00
Florian Roth bc71ee5614 Merge pull request #872 from Neo23x0/rule-devel
Rule devel
2020-07-01 10:16:57 +02:00
Florian Roth ab40cdbbd7 fix: missing ATT&CK id 2020-07-01 09:57:35 +02:00
Florian Roth 154181c6c8 fix: renamed files and lien break change 2020-07-01 09:48:48 +02:00
Florian Roth d70b63b78c rule: RedMimicry rules (modified) 2020-07-01 09:17:31 +02:00
Florian Roth fe71d21d97 style: removed new lines 2020-07-01 09:11:00 +02:00
Florian Roth b7ac36e6ab Merge branch 'master' into rule-devel 2020-07-01 09:04:46 +02:00
Florian Roth f2587791f2 rule: suspicious rar flags 2020-07-01 09:04:26 +02:00
Chris Brake 6ed1ea6509 Updating the mdatp backend file as it is currently impossible to set an ActionType as there is no mapping to EventType 2020-06-30 14:49:29 +01:00
Florian Roth ba682c5de6 Merge pull request #863 from qwerty1q2w/feature
add win_not_allowed_rdp_access.yml rule
2020-06-30 10:03:11 +02:00
Florian Roth 77553e11e8 Update win_not_allowed_rdp_access.yml 2020-06-30 10:03:00 +02:00
Florian Roth 2e3669a5a4 Merge pull request #865 from j91321/defender-rules
Windows Defender logsource and rules
2020-06-30 10:01:17 +02:00
Florian Roth eb3a6e86af Merge pull request #867 from HarishHary/suspicious_powershell_parent_process
New Rule: Suspicious powershell parent process
2020-06-30 10:00:28 +02:00
Florian Roth 2c3f98dc83 Merge pull request #868 from HarishHary/pwsh_xor_commandline
New Rule: PowerShell xor commandline
2020-06-30 10:00:07 +02:00
Harish SEGAR 9c74018e12 Added new rule for pwsh_xor_cmd (sysmon) 2020-06-29 22:18:25 +02:00
Harish SEGAR 5e740fd7b2 Added new rule for pwsh_xor_cmd (sysmon) 2020-06-29 22:13:49 +02:00
Harish SEGAR 649e4eaa63 Added new rule for pwsh_xor_cmd 2020-06-29 22:09:58 +02:00
Florian Roth 5a11ef90d0 rule reorganized 2020-06-29 21:24:47 +02:00
Harish SEGAR 1a088425f9 Fix rules. 2020-06-29 20:42:35 +02:00
Ömer Günal 0c3ce445da Delete remote_copy.yml 2020-06-29 18:51:18 +03:00
Florian Roth bb214f5832 rule: Explorer Root Flag Process Tree Break 2020-06-29 12:07:15 +02:00
j91321 24029d998a FIX: lint error for title 2020-06-28 11:05:19 +02:00
j91321 ae842a65cb Windows Defender rules and logsource 2020-06-28 10:55:32 +02:00
Christian Clauss 9dc3940c07 Fix undefined names in sigma2misp.py
create_new_event() -> create_new_event(args, misp) to fix:

flake8 testing of https://github.com/Neo23x0/sigma on Python 3.8.3

% _flake8 . --count --select=E9,F63,F7,F82 --show-source --statistics_
```
./tools/sigma/sigma2misp.py:11:16: F821 undefined name 'misp'
    if hasattr(misp, "new_event"):
               ^
./tools/sigma/sigma2misp.py:12:16: F821 undefined name 'misp'
        return misp.new_event(info=args.info)["Event"]["id"]
               ^
./tools/sigma/sigma2misp.py:12:36: F821 undefined name 'args'
        return misp.new_event(info=args.info)["Event"]["id"]
                                   ^
./tools/sigma/sigma2misp.py:14:13: F821 undefined name 'misp'
    event = misp.MISPEvent()
            ^
./tools/sigma/sigma2misp.py:15:18: F821 undefined name 'args'
    event.info = args.info
                 ^
./tools/sigma/sigma2misp.py:16:12: F821 undefined name 'misp'
    return misp.add_event(event)["Event"]["id"]
           ^
6     F821 undefined name 'misp'
6
```
2020-06-28 07:02:41 +02:00
Thomas Patzke 0ee47e118c Merge branch 'pr-848' 2020-06-28 01:04:30 +02:00
Thomas Patzke 89ed9f3763 Merge pull request #819 from cclauss/patch-2
Undefined name: from .exceptions import SigmaCollectionParseError
2020-06-28 00:37:09 +02:00
Thomas Patzke 4309082d6b Merge pull request #818 from cclauss/patch-1
Undefined name: parser_print_help() --> parser.print_help()
2020-06-28 00:34:27 +02:00
Thomas Patzke 09378b5ebf Fixed unsupported attempt to index a set 2020-06-28 00:27:33 +02:00
Thomas Patzke 415f826ece Merge branch 'default-pop' of https://github.com/rtkbkish/sigma into rtkbkish-default-pop 2020-06-28 00:09:39 +02:00
Thomas Patzke b1e4f44c21 Merge pull request #823 from Kuermel/master
Add more Options for XPackWatcherBackend (Elasticsearch)
2020-06-28 00:03:04 +02:00
Thomas Patzke d1f37bdbd4 Merge pull request #828 from stevengoossensB/master
Split rules based on Sysmon event ID
2020-06-28 00:00:32 +02:00
Thomas Patzke de5e453e19 Merge pull request #831 from 404d/cbr-backend-tweaks
Add parentheses around field list groups in CB
2020-06-27 23:39:57 +02:00
Pushkarev Dmitry 502ec4b417 add win_not_allowed_rdp_access.yml rule 2020-06-26 22:15:53 +00:00
Florian Roth 555c94bd7e Merge pull request #861 from jaegeral/patch-4
s/straight forward/straightforward
2020-06-26 15:40:09 +02:00
Alexander J 839e06e37a s/straight forward/straightforward
Fix a typo.
2020-06-26 12:40:06 +02:00
Florian Roth da46ff6e93 docs: descriptions for source configs 2020-06-25 13:59:51 +02:00
Florian Roth 825bda397d desc: better descriptions in help for backends and configurations 2020-06-25 13:21:43 +02:00
Florian Roth 3decee07ba fix: bugfix and cosmetics 2020-06-24 18:10:58 +02:00
Florian Roth 07c0a6558e fix: wording on sysmon mapping file 2020-06-24 17:49:42 +02:00
Florian Roth f3fedef8f5 Changed category names and remove sysmon log source 2020-06-24 17:41:21 +02:00
Florian Roth 4224a6517d Merge pull request #859 from Neo23x0/rule-devel
fix: duplicate IDs
2020-06-24 17:23:13 +02:00
Florian Roth 6d7f991424 Merge pull request #853 from rtkbkish/fix-win_ad_object_writedac_access
Fix quoting for AD Object WriteDAC Access
2020-06-24 17:06:15 +02:00
Florian Roth c3ffa0b9d3 fix: duplicate IDs 2020-06-24 17:04:04 +02:00
Brad Kish d385cbfa69 Fix quoting for AD Object WriteDAC Access
The AccessMask field needs to be quoted so that it is compared correctly.
2020-06-22 15:31:03 -04:00
Ömer Günal 4eb97ec43d Update lnx_file_copy.yml 2020-06-22 21:35:50 +03:00
Florian Roth e2a16087c9 Merge pull request #851 from ozirus/master
Update for new method
2020-06-22 20:11:39 +02:00
Furkan ÇALIŞKAN b091e3b1c4 Update for new method
Update for method mentioned in https://ired.team/offensive-security/code-execution/code-execution-through-control-panel-add-ins
2020-06-22 01:06:34 +03:00
Ömer Günal d17e0ae6eb typo 2020-06-20 23:04:52 +03:00
Florian Roth 1ef81a36af Merge pull request #850 from Neo23x0/rule-devel
K3chang and IE Registry Mods
2020-06-19 11:25:43 +02:00
Florian Roth 912ad94771 fix: missing ATT&CK id in tests 2020-06-19 10:00:44 +02:00
Florian Roth e1225784f7 fix: fixed indentation 2020-06-19 09:54:08 +02:00
Florian Roth 62632db818 refactor: added variant to IE rule 2020-06-19 09:53:35 +02:00
Florian Roth 5cb6f5da9d fix: title adjusted 2020-06-19 09:39:11 +02:00
Florian Roth b8a5cd4787 Disabled IE Security Features 2020-06-19 09:37:10 +02:00
Florian Roth da060bfb90 Ke3chang rule 2020-06-19 09:36:54 +02:00
Florian Roth b675c4c706 Merge branch 'master' into rule-devel 2020-06-19 09:24:26 +02:00
Ömer Günal 93719d8a01 Merge pull request #1 from omergunal/omergunal-patch-1
Remote file copy
2020-06-18 23:56:29 +03:00
Ömer Günal 40a07a2d4f Delete lnx_sudo_enumeration.yml 2020-06-18 23:55:24 +03:00
Ömer Günal d87b0c95a4 Delete lnx_trap.yml 2020-06-18 23:55:16 +03:00
Ömer Günal 8db7c3207a Delete lnx_sudo_caching.yml 2020-06-18 23:54:43 +03:00
Ömer Günal 5bc72b6cba Delete lnx_space_after_filename.yml 2020-06-18 23:54:28 +03:00
Ömer Günal f10440b9fa Delete lnx_setuid_setgid.yml 2020-06-18 23:54:20 +03:00
Ömer Günal 6c8d104e7d Delete lnx_disabling_security_tools.yml 2020-06-18 23:54:06 +03:00
Ömer Günal 84c4683607 Delete lnx_connection_proxy.yml 2020-06-18 23:53:43 +03:00
Ömer Günal c4a1e853bc Remote file copy 2020-06-18 23:47:53 +03:00
Ömer Günal c6c455a3ec Remote file copy 2020-06-18 23:37:49 +03:00
Brad Kish 203aa192c7 Fix multiple references to default field mapping in same rule
If there is a default mapping specified for a fieldmapping and that field is
referenced multiple times in the rule, the default mapping will be "pop"ped
and return the unmapped key on subsequent uses.

Don't pop the value. Just return the first entry.
2020-06-18 13:01:31 -04:00
Florian Roth 4b0c80885f Merge pull request #810 from EccoTheFlintstone/fp
add WMI module load false positives
2020-06-18 12:50:40 +02:00
Florian Roth 32ecb81630 Merge pull request #845 from ikiril01/att&ck_subtechniques_v2
ATT&CK subtechniques v2
2020-06-18 09:10:09 +02:00
Ivan Kirillov 69760f6446 Added subtechniques to MITRE_TECHNIQUES 2020-06-17 11:51:48 -06:00
Ivan Kirillov b343df2225 Further subtechnique updates 2020-06-17 11:31:40 -06:00
Ömer Günal 3a607abe33 Update lnx_trap.yml 2020-06-17 19:51:53 +03:00
ecco 99bfa14ae0 add 1 more FP 2020-06-17 12:49:27 -04:00
Ömer Günal 7b86f4aefb Update lnx_trap.yml 2020-06-17 19:47:31 +03:00
Ömer Günal ebbd32d2e1 file extension 2020-06-17 19:43:57 +03:00
Ömer Günal f989f7e155 file extension 2020-06-17 19:43:49 +03:00
Ömer Günal 772c03c49a Connection Proxy 2020-06-17 19:39:55 +03:00
Ömer Günal 9d285ecf74 Trap 2020-06-17 19:39:00 +03:00
Ömer Günal d0b66ab828 Space After Filename 2020-06-17 19:38:38 +03:00
Ömer Günal 3b8fb9e3d8 Disabling Security Tools 2020-06-17 19:38:10 +03:00
Florian Roth 0022705373 fix: filter not functional
since `UsrLogon.cmd` does appear only in `C:\Windows\system32\cmd.exe /c UsrLogon.cmd` command line
2020-06-17 16:09:44 +02:00
Ivan Kirillov 5c0bb0e94f Fixed indentation 2020-06-16 15:01:13 -06:00
Ivan Kirillov 0fbfcc6ba9 Initial round of subtechnique updates 2020-06-16 14:46:08 -06:00
Florian Roth fd2429bd34 Update lnx_setuid_setgid.yml 2020-06-16 19:46:50 +02:00
Florian Roth 06fe720165 Update lnx_sudo_enumeration.yml 2020-06-16 19:33:39 +02:00
Florian Roth 545c05d4d3 Update lnx_setuid_setgid.yml 2020-06-16 19:31:34 +02:00
Ömer Günal 0027415fa2 Update lnx_setuid_setgid.yml 2020-06-16 20:26:50 +03:00
Ömer Günal 41b2309418 file type changed 2020-06-16 20:24:09 +03:00
Ömer Günal 0d0058da43 added id 2020-06-16 20:21:07 +03:00
Ömer Günal bbcd506fb1 added id 2020-06-16 20:21:02 +03:00
Ömer Günal ace575aaa6 added id 2020-06-16 20:20:42 +03:00
Ömer Günal 4b1557a587 Setuid and Setgid
Detects suspicious change of file privileges with chown and chmod commands
2020-06-16 20:12:24 +03:00
Ömer Günal b7e1c6750c sudo caching
attack.t1206
2020-06-16 19:31:02 +03:00
Ömer Günal e43f13ed67 Update lnx_sudo_enumeration.yml
attack.t1169
2020-06-16 19:20:42 +03:00
Ömer Günal 52487159c5 Detect Sudo enumeration commands 2020-06-16 19:17:00 +03:00
Florian Roth d24ec665fd Merge pull request #838 from rtkbkish/fix-identifier
Identifiers shared between global document and rule gets overwritten
2020-06-15 20:20:23 +02:00
Florian Roth 87053502a3 Merge pull request #839 from rtkbkish/fix-double-backslash
Fix match for double-backslash
2020-06-15 20:19:56 +02:00
Florian Roth 869162a5da Merge pull request #840 from rtkbkish/remove-wrong-sysmon-id
Rule lists extra Sysmon ID (11). Should just match registry events (1…
2020-06-15 20:19:27 +02:00
Florian Roth 3482e048fb Merge pull request #841 from rtkbkish/fix-rule-match
Rule needs endwith, not exact match.
2020-06-15 20:19:12 +02:00
Florian Roth 46bd56a708 Merge pull request #837 from rtkbkish/fix-win-invoke-obfuscation
Fix logsource field name from service->category
2020-06-15 20:18:53 +02:00
Florian Roth 3d962bdb47 Merge pull request #836 from rtkbkish/fix-escaping
Fix rules with incorrect escaping of wildcars
2020-06-15 20:18:34 +02:00
Brad Kish dfae2a6df6 Rule needs endwith, not exact match.
Fix ImageLoaded filter to match with endswith, rather than exact match.
2020-06-15 13:54:02 -04:00
Brad Kish a9c6fa904f Rule lists extra Sysmon ID (11). Should just match registry events (12-14)
Remove extraneous event ID 11. It will never match.
2020-06-15 13:52:12 -04:00
Brad Kish f196046b3d Fix match for double-backslash
To match a double-backslash you actually need three backslashes, since two
backslashes gets reduced to one.
2020-06-15 13:39:50 -04:00
Brad Kish 422b2bffd7 Fix rules with incorrect escaping of wildcars
A backslash before a wildcard needs to be escaped with another backslash.
2020-06-15 13:38:18 -04:00
Brad Kish 8d58c8f5c8 Fix logsource field name from service->category
The rule win_invoke_obfuscation_obfuscated_iex_commandline has the
wrong field name for the "process_creation" tag. Rename from "service"
to "category"
2020-06-15 13:18:05 -04:00
Brad Kish f5aa871e5d Identifiers shared between global document and rule gets overwritten
The global document defines a "selection" identifier which is also defined the
individual rules. The rule identifier is getting overwritten by the global identifier.
Fix by giving unique names to the global identifier.
2020-06-15 13:14:31 -04:00
Florian Roth d371fd864c Merge pull request #834 from ebeahan/elastic-updates
Elastic section updates
2020-06-13 10:04:49 +02:00
Thomas Patzke f907c49ab5 Improved test coverage
* Added test case
* Removed unused code
2020-06-13 01:11:08 +02:00
Thomas Patzke 05ced1a3d5 Exclude heatmap.json from versioning 2020-06-13 00:05:57 +02:00
Thomas Patzke b129556388 Automatic inclusion of all configuration files 2020-06-13 00:04:45 +02:00
Thomas Patzke 80e8f0e5fa Release 0.17.0 2020-06-12 23:52:06 +02:00
Thomas Patzke 24d83b80cd Merge branch 'script_entry_points' 2020-06-12 23:13:11 +02:00
Eric Beahan bba0b2d851 Elastic documentation improvements 2020-06-12 13:40:39 -05:00
Florian Roth b48e7d8d71 Merge pull request #833 from neu5ron/sigmacs
typo and another example
2020-06-12 17:39:14 +02:00
Nate Guagenti db6c9dc721 Merge remote-tracking branch 'neu5ron-sigma/sigmacs' into sigmacs
# Conflicts:
#	tools/README.md
2020-06-12 11:37:39 -04:00
Nate Guagenti aac1af1832 typo, was missing the = and *.
also, show option when using case insensitive for everything, how to "exclude" a field from that regex.

Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com>
2020-06-12 11:37:32 -04:00
Nate Guagenti db0292afd2 typo, was missing the = and *.
also, show option when using case insensitive for everything, how to "exclude" a field from that regex.
2020-06-12 11:36:19 -04:00
Florian Roth 52ff2e12ab Merge pull request #832 from Iveco/master
Cmd.exe Path Traversal Detection / Argument Spoofing
2020-06-12 10:33:15 +02:00
Iveco 40f0fd989d - moved to "process_creation" folder instead of "sysmon"
- renamed .yml file
2020-06-11 19:21:17 +02:00
Iveco 34d7ea2974 removed one field 2020-06-11 16:23:15 +02:00
Iveco 2081baafe5 updated to process_creation 2020-06-11 15:58:05 +02:00
Iveco f56e2599b1 Cmd.exe Path Traversal Detection 2020-06-11 15:48:48 +02:00
Simen Lybekk bbcbed4742 Add parentheses about field list groups in CB
This should address the grouping issue from #660.
The grouping issue was solved by just slamming some parentheses around the fields in the listExpression field.
2020-06-11 15:33:02 +02:00
Florian Roth a7136481f1 Update win_pcap_drivers.yml 2020-06-11 11:14:43 +02:00
Florian Roth 97c45f9d46 Merge pull request #812 from tliffick/master
added new rules for malware
2020-06-10 17:37:19 +02:00
Cian Heasley 9835c6d67d add win_pcap_drivers.yml 2020-06-10 15:53:22 +01:00
Florian Roth 96309d247b fix: cosmetic fault 2020-06-10 16:41:03 +02:00
Florian Roth 6e4aa01baa Cosmetics 2020-06-10 16:36:17 +02:00
Florian Roth 13c7d40a22 Cosmetics 2020-06-10 16:35:41 +02:00
Florian Roth f553fb2e33 Cosmetics 2020-06-10 16:35:14 +02:00
Florian Roth 48e4e31713 Merge pull request #826 from NVISO-BE/sysmon_susp_fax_dll
Fax Service DLL search order hijacking detection
2020-06-10 16:33:12 +02:00
Florian Roth 1a9da23611 Merge pull request #825 from NVISO-BE/sysmon_office_persistence
Office persistence by addin detection
2020-06-10 16:32:50 +02:00
Steven Goossens e5f36dd146 Added rules files split into folders 2020-06-10 16:32:30 +02:00
Remco Hofman 8adaa2d672 Fixed bad indentation 2020-06-10 15:02:41 +02:00
Steven Goossens 423baafa2a Added rules for different sysmon categories and added the category definition 2020-06-10 15:02:15 +02:00
Remco Hofman 83a6e25bcb Fax Service DLL search order hijacking 2020-06-10 15:01:07 +02:00
Remco Hofman cb8e478ac1 Sigma rule to detect Office persistence via addin. 2020-06-10 14:52:13 +02:00
Thomas Patzke 915ea1cc67 Merge branch 'script_entry_points' into master 2020-06-10 00:51:47 +02:00
Florian Roth 565febd39d README updated 2020-06-09 23:25:09 +02:00
Florian Roth 51f28271a5 Merge pull request #824 from neu5ron/sigmacs
Sigmacs
2020-06-09 23:15:50 +02:00
Nate Guagenti 2b735494cd Merge branch 'master' of https://github.com/Neo23x0/sigma into sigmacs 2020-06-09 16:54:02 -04:00
Nate Guagenti f4fe425fa7 update readme for some analyzed field and keyword field examples 2020-06-09 16:53:50 -04:00
Thomas G 8c61dc9248 Add more Options for XPackWatcherBackend (Elasticsearch)
Add action_throttle_period, mail_from adn mail_profile to the XPackWatcherBackend (Elasticsearch)
2020-06-09 20:57:26 +02:00
Florian Roth 5c835cf1f2 Merge pull request #813 from ozirus/patch-1
Create sysmon_apt_muddywater_dnstunnel.yml
2020-06-09 18:44:45 +02:00
Florian Roth 7a334a8d8a fix: missed line 2020-06-09 17:30:54 +02:00
Florian Roth 04913a4b95 Aligned indentation 2020-06-09 17:20:25 +02:00
Florian Roth 9b8f8b7e09 Merge pull request #822 from NVISO-BE/win_mal_flowcloud
TA410 FlowCloud malware detection
2020-06-09 17:18:39 +02:00
Florian Roth ad5c0a6cf3 Merge pull request #821 from NVISO-BE/win_mal_octopus_scanner
Octopus Scanner malware rule
2020-06-09 17:18:04 +02:00
Remco Hofman a9bf22750a Fixed bad indentation 2020-06-09 16:30:17 +02:00
Remco Hofman 4ce3ea735e TA410 FlowCloud malware detection 2020-06-09 16:21:46 +02:00
Remco Hofman d14d391761 Octopus Scanner malware rule 2020-06-09 16:12:05 +02:00
Nate Guagenti 117ceac492 moved file to ecs-zeek-elastic-beats-implementation.yml 2020-06-09 08:56:01 -04:00
Christian Clauss dff7efc173 Update collection.py 2020-06-08 13:55:52 +02:00
Christian Clauss 55c0a03564 Undefined name: from .exceptions import SigmaCollectionParseError
Discovered in #378.  `SigmaCollectionParseError()` is called on line 55 but it is never defined or imported which means that NameError will be raised instead of SigmaCollectionParseError.
2020-06-08 13:55:16 +02:00
Christian Clauss 3fdb355f2b Undefined name: parser_print_help() --> parser.print_help()
Discovered in #378 
https://docs.python.org/3.8/library/argparse.html#argparse.ArgumentParser.print_help
2020-06-08 13:49:44 +02:00
Florian Roth 6e349030d9 rule: suspicious camera and mic access 2020-06-08 10:18:44 +02:00
Nate Guagenti ad9ada7a44 Merge branch 'master' of https://github.com/Neo23x0/sigma into sigmacs
 Conflicts:
	tools/sigma/backends/mdatp.py
2020-06-07 11:51:17 -04:00
Florian Roth 94b90adf10 docs: move Sigmac help from Wiki to repo 2020-06-07 12:18:37 +02:00
Thomas Patzke 36a7077648 Moved tool executables to new location 2020-06-07 01:14:04 +02:00
Thomas Patzke a7d18c7ed9 Converted sigma2attack and added to entry points 2020-06-07 01:03:09 +02:00
Thomas Patzke 8688e8a2a1 Script entrypoint stubs 2020-06-07 00:22:59 +02:00
Florian Roth 0c2f2fe6df Merge pull request #816 from Neo23x0/rule-devel
merged Cyb3rWarD0g's rules
2020-06-06 16:27:59 +02:00
Florian Roth d3e261862d merged Cyb3rWarD0g's rules 2020-06-06 15:42:22 +02:00
Florian Roth 72deaa98f5 Merge pull request #815 from Neo23x0/rule-devel
Rule devel
2020-06-06 14:19:37 +02:00
Florian Roth 3697186281 fix: fixed title 2020-06-06 14:04:40 +02:00
Florian Roth 246a95557b fix: description over multiple lines 2020-06-06 13:56:48 +02:00
Florian Roth d54209dcc5 rule: ETW disabled 2020-06-06 13:56:19 +02:00
Thomas Patzke 7d70cd95a4 Deduplicated backend list 2020-06-06 01:03:02 +02:00
Thomas Patzke fb9855bd3b Added description to es-rule backend 2020-06-06 01:02:44 +02:00
Thomas Patzke 1d211565fc Moved backend options list to --backend-help 2020-06-06 00:56:00 +02:00
Thomas Patzke c992dc5215 Improved test coverage 2020-06-05 23:33:51 +02:00
Thomas Patzke 5d88d97c73 Merge branch 'improvements/improved_mdatp_mappings' of https://github.com/wietze/sigma into wietze-improvements/improved_mdatp_mappings 2020-06-05 23:03:52 +02:00
Nate Guagenti 55beecac28 Squashed commit of the following:
commit d97d2ced82
Merge: 022d73f8 84dd8c39
Author: Florian Roth <venom14@gmail.com>
Date:   Wed Jun 3 15:53:55 2020 +0200

    Merge pull request #725 from WilliamBruneau/fix_null_list

    Move null values out from list in rules

commit 84dd8c39c4
Author: William Bruneau <william.bruneau@epfedu.fr>
Date:   Tue May 5 09:04:47 2020 +0200

    Move null values out from list in rules

commit 022d73f842
Merge: 0cbc099d 4ed51201
Author: Florian Roth <venom14@gmail.com>
Date:   Wed Jun 3 10:48:05 2020 +0200

    Merge pull request #811 from svnscha/fix/field-TargetFileName-to-TargetFilename

    All Rules use 'TargetFilename' instead of 'TargetFileName'.

commit 4ed512011a
Author: Sven Scharmentke <sven@vastlimits.com>
Date:   Wed Jun 3 09:00:59 2020 +0200

    All Rules use 'TargetFilename' instead of 'TargetFileName'.

    This commit fixes the incorrect spelling.

commit 0cbc099def
Merge: 74e16fdc 3a6ac5bd
Author: Florian Roth <venom14@gmail.com>
Date:   Sat May 30 09:31:45 2020 +0200

    Merge pull request #807 from forensicanalysis/master

    Add sqlite backend

commit 3a6ac5bd5c
Author: Jonas Plum <git@cugu.eu>
Date:   Sat May 30 01:57:06 2020 +0200

    Remove unused function

commit 5cc82d0f05
Author: Jonas Plum <git@cugu.eu>
Date:   Sat May 30 00:56:06 2020 +0200

    Move testcase

commit 4a8ab88ade
Author: Jonas Plum <git@cugu.eu>
Date:   Sat May 30 00:15:38 2020 +0200

    Fix test path

commit 70935d26ce
Author: Jonas Plum <git@cugu.eu>
Date:   Fri May 29 23:56:05 2020 +0200

    Add license header

commit 74e16fdccd
Merge: e20b58c4 537bda44
Author: Florian Roth <venom14@gmail.com>
Date:   Fri May 29 17:32:43 2020 +0200

    Merge pull request #803 from gamma37/clear_cmd_history

    Edit Clear Command History

commit e20b58c421
Merge: 7f2fa05e a00f7f19
Author: Florian Roth <venom14@gmail.com>
Date:   Fri May 29 17:32:27 2020 +0200

    Merge pull request #806 from SanWieb/sysmon_creation_system_file

    Fixed wrong field & Improve rule

commit a00f7f19a1
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Fri May 29 16:25:54 2020 +0200

    Add tagg Endswith

    Prevent the trigger of {}.exe.log

commit 38afd8b5de
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Thu May 28 21:52:17 2020 +0200

    Fixed wrong field

commit 7f2fa05ed3
Merge: ec313b6c 39b41b55
Author: Florian Roth <venom14@gmail.com>
Date:   Thu May 28 11:16:44 2020 +0200

    Merge pull request #802 from Neo23x0/rule-devel

    ComRAT and KazuarRAT

commit 537bda4417
Author: gamma37 <marie.euler@polytechnique.edu>
Date:   Thu May 28 10:56:35 2020 +0200

    Update lnx_shell_clear_cmd_history.yml

commit 5a48934822
Author: gamma37 <marie.euler@polytechnique.edu>
Date:   Thu May 28 10:52:17 2020 +0200

    Edit Clear Command History

    I suggest a new point of view to detect that bash_history has been cleared : Instead of trying to detect all the commands that can do that, we could monitor the size of the file and log whenever it has less than 1 line.

commit 39b41b5582
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Thu May 28 10:13:38 2020 +0200

    rule: moved DebugView rule to process creation category

commit 76dcc1a16f
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Thu May 28 09:22:25 2020 +0200

    rule: renamed debugview

commit ec313b6c8a
Merge: 5bb6770f d44fc43c
Author: Florian Roth <venom14@gmail.com>
Date:   Wed May 27 08:49:20 2020 +0200

    Merge pull request #801 from SanWieb/sysmon_creation_system_file

    Rule: sysmon_creation_system_file

commit d44fc43c54
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Tue May 26 19:10:11 2020 +0200

    Add extension

commit f6ec724d51
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Tue May 26 18:53:54 2020 +0200

    Rule: sysmon_creation_system_file

commit 5bb6770f53
Merge: 0b398c5b 3681b8cb
Author: Florian Roth <venom14@gmail.com>
Date:   Tue May 26 14:28:47 2020 +0200

    Merge pull request #800 from SanWieb/win_system_exe_anomaly

    Extended Windows processes: win_system_exe_anomaly

commit 4ca81b896d
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Tue May 26 14:19:22 2020 +0200

    rule: Turla ComRAT report

commit 3681b8cb56
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Tue May 26 13:56:51 2020 +0200

    Extended Windows processes

commit 0b398c5bf0
Merge: c1f47875 b648998f
Author: Florian Roth <venom14@gmail.com>
Date:   Tue May 26 13:31:57 2020 +0200

    Merge pull request #798 from Neo23x0/rule-devel

    rule: confluence exploit CVE-2019-3398 & Turla ComRAT

commit c1f4787566
Merge: ce1f4634 48c5f2ed
Author: Florian Roth <venom14@gmail.com>
Date:   Tue May 26 13:21:04 2020 +0200

    Merge pull request #797 from NVISO-BE/sysmon_cve-2020-1048

    Changes to sysmon_cve-2020-1048

commit ce1f46346f
Merge: e131f347 1a598282
Author: Florian Roth <venom14@gmail.com>
Date:   Tue May 26 13:20:40 2020 +0200

    Merge pull request #751 from zaphodef/fix/powershell_ntfs_ads_access

    Add 'Add-Content' to powershell_ntfs_ads_access

commit e131f3476e
Merge: 30861b55 7037e775
Author: Florian Roth <venom14@gmail.com>
Date:   Tue May 26 13:20:23 2020 +0200

    Merge pull request #796 from EccoTheFlintstone/fp

    add more false positives

commit 30861b558c
Merge: a962bd1b f9f814f3
Author: Florian Roth <venom14@gmail.com>
Date:   Tue May 26 13:20:07 2020 +0200

    Merge pull request #799 from SanWieb/susp_file_characteristics

    Susp file characteristics: Reduce FP of legitime processes

commit b648998fd0
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Tue May 26 13:18:50 2020 +0200

    rule: Turla ComRAT

commit f9f814f3b3
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Tue May 26 13:06:27 2020 +0200

    Shortened title

commit a241792e10
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Tue May 26 12:58:15 2020 +0200

    Reduce FP of legitime processes

    A lot of Windows apps does not have any file characteristics. Some examples:
    - Gamebar: C:\\Program Files\\WindowsApps\\Microsoft.XboxGamingOverlay_3.38.25003.0_x64__8wekyb3d8bbwe\\GameBarFT.exe
    - YourPhone: C:\\Program Files\\WindowsApps\\Microsoft.YourPhone_1.20022.82.0_x64__8wekyb3d8bbwe\\YourPhoneServer/YourPhoneServer.exe

    All C:\Windows\System32\OpenSSH (scp, sftp, ssh etc) does not have a description and company.

    Python 2.7, 3.3 and 3.7 does not have any file characteristics.

    So I don't think it is possible to whitelist all options, maybe it is worthwhile to check the \Downloads\ folder otherwise it would be better to just delete the rule. All other suspicious folders are covered by /rules/windows/process_creation/win_susp_exec_folder.yml

commit cdf1ade625
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Tue May 26 12:27:16 2020 +0200

    fix: typo in selection

commit 91b4ee8d56
Merge: 4cd7c39e a962bd1b
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Tue May 26 12:24:21 2020 +0200

    Merge pull request #2 from Neo23x0/master

    Update repository

commit 828484d7c6
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Tue May 26 12:09:41 2020 +0200

    rule: confluence exploit CVE-2019-3398

commit 48c5f2ed09
Author: Remco Hofman <rhofman@nviso.be>
Date:   Tue May 26 11:20:21 2020 +0200

    Update to  sysmon_cve-2020-1048
    Added .com executables to detection
    Second TargetObject should have been Details

commit abf1a2c6d7
Author: Jonas Hagg <joy.hagg@web.de>
Date:   Mon May 25 10:54:16 2020 +0200

    Adjusted Makefile

commit dedfb65d63
Author: Jonas Hagg <joy.hagg@web.de>
Date:   Mon May 25 10:44:14 2020 +0200

    Implemented Aggregation for SQL, Added SQLite FullTextSearch

commit 7037e77569
Author: ecco <none@none.com>
Date:   Mon May 25 04:50:22 2020 -0400

    add more FP

commit a962bd1bc1
Merge: 0afe0623 d510e1aa
Author: Florian Roth <venom14@gmail.com>
Date:   Mon May 25 10:48:36 2020 +0200

    Merge pull request #747 from zaphodef/fix/win_susp_backup_delete_source

    Fix 'source' value for win_susp_backup_delete

commit 0afe0623af
Merge: 92d0aa86 beb62dc1
Author: Florian Roth <venom14@gmail.com>
Date:   Mon May 25 10:47:23 2020 +0200

    Merge pull request #757 from tliffick/master

    added rule for Blue Mockingbird (cryptominer)

commit 92d0aa8654
Merge: 0dda757c 6fcf3f9e
Author: Florian Roth <venom14@gmail.com>
Date:   Mon May 25 10:46:39 2020 +0200

    Merge pull request #795 from SanWieb/Rule-improvement-Netsh-program-allowed

    Rule improvement: netsh Application or Port allowed

commit 6fcf3f9ebf
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Mon May 25 10:13:26 2020 +0200

    Update win_netsh_fw_add.yml

commit 28652e4648
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Mon May 25 10:02:13 2020 +0200

    Add Windows Server 2008 and Windows Vista support

    It did not support the command `netsh advfirewall firewall add`

commit 2678cd1d3e
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Mon May 25 09:50:47 2020 +0200

    Create win_netsh_fw_add_susp_image.yml

    More critical version of the rule windows/process_creation/win_netsh_fw_add.yml with the suspicious image location check.

    Combined the following rules for the suspicious locations:
    https://github.com/Neo23x0/sigma//blob/master/rules/windows/sysmon/sysmon_susp_download_run_key.yml
    https://github.com/Neo23x0/sigma/blob/master/rules/windows/sysmon/sysmon_susp_run_key_img_folder.yml
    https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_susp_run_locations.yml

commit 4cd7c39e9d
Merge: 6fbfa9df 0dda757c
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Mon May 25 08:48:16 2020 +0200

    Merge pull request #1 from Neo23x0/master

    Update repository

commit 0dda757ca5
Merge: 40f0beb5 daf7ab5f
Author: Thomas Patzke <thomas@patzke.org>
Date:   Sun May 24 22:58:58 2020 +0200

    Merge branch 'socprime-master'

commit daf7ab5ff7
Author: Thomas Patzke <thomas@patzke.org>
Date:   Sun May 24 22:41:38 2020 +0200

    Cleanup: removal of corelight_* backends

commit d45f8e19fe
Author: Thomas Patzke <thomas@patzke.org>
Date:   Sun May 24 21:46:55 2020 +0200

    Fixes

commit 32e4998c49
Author: Thomas Patzke <thomas@patzke.org>
Date:   Sun May 24 21:45:37 2020 +0200

    Removed dead code from ALA backend.

commit 24b08bbf30
Merge: 96fae4be e8b956f5
Author: Thomas Patzke <thomas@patzke.org>
Date:   Sun May 24 17:06:32 2020 +0200

    Merge branch 'master' of https://github.com/socprime/sigma into socprime-master

commit 40f0beb58d
Merge: 6fbfa9df b8ee736f
Author: Florian Roth <venom14@gmail.com>
Date:   Sun May 24 16:30:10 2020 +0200

    Merge pull request #794 from SanWieb/update_susp_run_key

    Remove AppData folder as suspicious folder

commit b8ee736f44
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Sun May 24 15:16:07 2020 +0200

    Remove AppData folder as suspicious folder

    A lot of software is using the AppData folder for startup keys. Some examples:
    - Microsoft Teams (\AppData\Local\Microsoft\Teams)
    - Resilio (\AppData\Roaming\Resilio Sync\)
    - Discord ( (\AppData\Local\Discord\)
    - Spotify ( (\AppData\Roaming\Spotify\)

    Too many to whitelist them all

commit 6fbfa9dfdd
Merge: d0da2810 3028a270
Author: Florian Roth <venom14@gmail.com>
Date:   Sat May 23 23:47:12 2020 +0200

    Merge pull request #793 from Neo23x0/rule-devel

    Esentutl rule and StrongPity Loader UA

commit f970d28f10
Author: ecco <none@none.com>
Date:   Sat May 23 15:06:15 2020 -0400

    add more false positives

commit 3028a27055
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Sat May 23 18:32:02 2020 +0200

    fix: buggy rule

commit df715386b6
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Sat May 23 18:27:36 2020 +0200

    rule: suspicious esentutl use

commit d0da2810c1
Merge: 8321cc7e 67faf4bd
Author: Florian Roth <venom14@gmail.com>
Date:   Sat May 23 18:13:16 2020 +0200

    Merge pull request #792 from EccoTheFlintstone/fff

    fix FP + remove powershell rule redundant with sysmon_in_memory_power…

commit 8321cc7ee1
Merge: 9cd9a301 e1a05dfc
Author: Florian Roth <venom14@gmail.com>
Date:   Sat May 23 18:11:32 2020 +0200

    Merge pull request #772 from gamma37/suspicious_activities

    Create a rule for "suspicious activities"

commit d1a5471d21
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Sat May 23 17:38:10 2020 +0200

    rule: Strong Pity loader UA

commit 67faf4bd41
Author: ecco <none@none.com>
Date:   Sat May 23 10:56:23 2020 -0400

    fix FP + remove powershell rule redundant with sysmon_in_memory_powershell.yml

commit 9cd9a301c2
Merge: ee1ca77f d310805e
Author: Florian Roth <venom14@gmail.com>
Date:   Sat May 23 16:50:31 2020 +0200

    Merge pull request #791 from SanWieb/master

    added rule for Netsh RDP port opening

commit e1a05dfc1c
Author: Florian Roth <venom14@gmail.com>
Date:   Sat May 23 16:49:03 2020 +0200

    Update lnx_auditd_susp_C2_commands.yml

commit ee1ca77fad
Merge: 895c8470 cbf06b1e
Author: Florian Roth <venom14@gmail.com>
Date:   Sat May 23 16:47:46 2020 +0200

    Merge pull request #771 from gamma37/new_rules

    Create a new rule to detect "Create Account"

commit 895c84703f
Merge: 12e1aeaf 327a53c1
Author: Florian Roth <venom14@gmail.com>
Date:   Sat May 23 16:47:01 2020 +0200

    Merge pull request #790 from EccoTheFlintstone/fp_fix

    fix false positive matching on every powershell process not run by SY…

commit 327a53c120
Author: ecco <none@none.com>
Date:   Sat May 23 10:25:37 2020 -0400

    add new test for sysmon rules without eventid

commit 10ca3006f5
Author: ecco <none@none.com>
Date:   Sat May 23 10:07:55 2020 -0400

    move rule where needed

commit 2b89e56054
Author: ecco <none@none.com>
Date:   Sat May 23 10:03:13 2020 -0400

    fix test

commit d9bc09c38c
Author: ecco <none@none.com>
Date:   Sat May 23 10:02:58 2020 -0400

    fix test

commit 78a7852a43
Author: ecco <none@none.com>
Date:   Sat May 23 09:16:40 2020 -0400

    renamed dbghelp rule with new ID and comment and removed a false positive

commit d310805ed9
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com>
Date:   Sat May 23 14:19:52 2020 +0200

    rule: Netsh RDP port opening

commit 75ba5f989c
Author: ecco <none@none.com>
Date:   Sat May 23 07:44:45 2020 -0400

    add 1 more FP to wmi load

commit 9a7f462d79
Author: ecco <none@none.com>
Date:   Sat May 23 07:17:56 2020 -0400

    move renamed bnaries rule to process creation (they made a lot of false positives in sysmon as there was no event id specified in the rule)

commit cfde0625f5
Author: ecco <none@none.com>
Date:   Sat May 23 07:05:09 2020 -0400

    fix false positive matching on every powershell process not run by SYSTEM account

commit 12e1aeaf9f
Merge: 46f3a70a 34006d07
Author: Florian Roth <venom14@gmail.com>
Date:   Sat May 23 09:54:43 2020 +0200

    Merge pull request #788 from Neo23x0/rule-devel

    refactor: split up rule for CVE-2020-1048 into 2 rules

commit 46f3a70a7d
Merge: 96fae4be ec17c2ab
Author: Florian Roth <venom14@gmail.com>
Date:   Sat May 23 09:54:28 2020 +0200

    Merge pull request #786 from EccoTheFlintstone/perf_fix

    various rules cleaning (slight perf improvements)

commit 34006d0794
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Sat May 23 09:16:19 2020 +0200

    refactor: simplified and extended expression in CVE-2020-1048 rule

commit 57c8e63acd
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Sat May 23 09:09:58 2020 +0200

    refactore: split up rule for CVE-2020-1048 into 2 rules

commit ec17c2ab56
Author: ecco <none@none.com>
Date:   Fri May 22 10:37:00 2020 -0400

    filter on createkey only when needed

commit 96fae4be68
Author: Thomas Patzke <thomas@patzke.org>
Date:   Fri May 22 00:50:37 2020 +0200

    Added CrachMapExec rules

commit 64e0e7ca72
Merge: bbf78374 91c4c4ec
Author: Florian Roth <venom14@gmail.com>
Date:   Thu May 21 14:19:09 2020 +0200

    Merge pull request #784 from Neo23x0/rule-devel

    refactor: slightly improved Greenbug rule

commit 91c4c4ecc5
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Thu May 21 13:38:11 2020 +0200

    refactor: slightly improved Greenbug rule

commit bbf78374b6
Merge: 8d9b706d 9a3b6c1c
Author: Florian Roth <venom14@gmail.com>
Date:   Thu May 21 09:55:46 2020 +0200

    Merge pull request #783 from Neo23x0/rule-devel

    Greenbug Rule

commit 9a3b6c1c77
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Thu May 21 09:44:11 2020 +0200

    docs: added MITRE ATT&CK group tag

commit 344eb713c5
Author: Florian Roth <florian.roth@nextron-systems.com>
Date:   Thu May 21 09:39:57 2020 +0200

    rule: Greenbug campaign

commit 8d9b706d6a
Merge: e7980bb4 06abd6e7
Author: Thomas Patzke <thomas@patzke.org>
Date:   Wed May 20 19:11:56 2020 +0200

    Merge pull request #727 from 3CORESec/master

    Override Features

commit e7980bb434
Merge: af92a5bd 8963c0a6
Author: Florian Roth <venom14@gmail.com>
Date:   Wed May 20 12:55:41 2020 +0200

    Merge pull request #782 from ZikyHD/patch-1

    Remove duplicate 'CommandLine' in fields

commit af92a5bd2c
Merge: 04dfe6c5 9ab65cd1
Author: Florian Roth <venom14@gmail.com>
Date:   Wed May 20 12:55:29 2020 +0200

    Merge pull request #780 from tatsu-i/master

    Null field check to eliminate false positives

commit 8963c0a65e
Author: ZikyHD <ZikyHD@users.noreply.github.com>
Date:   Wed May 20 11:54:47 2020 +0200

    Remove duplicate 'CommandLine' in fields

commit e8b956f575
Author: vh <vh@socprime.com>
Date:   Wed May 20 12:35:00 2020 +0300

    Updated config

commit 9ab65cd1c7
Author: Florian Roth <venom14@gmail.com>
Date:   Tue May 19 14:50:22 2020 +0200

    Update win_alert_ad_user_backdoors.yml

commit 04dfe6c5fc
Merge: df75bdd3 9e272d37
Author: Thomas Patzke <thomas@patzke.org>
Date:   Tue May 19 13:18:40 2020 +0200

    Merge pull request #778 from neu5ron/sigmacs

    SIGMACs: Winlogbeat & Zeek

commit df75bdd3b6
Merge: 4446c4cd 7c3dea22
Author: Florian Roth <venom14@gmail.com>
Date:   Tue May 19 13:10:56 2020 +0200

    Merge pull request #779 from neu5ron/rules

    Rules: Zeek

commit 7c3dea22b8
Author: neu5ron <>
Date:   Tue May 19 05:13:48 2020 -0400

    small T, big T

commit dd382848b4
Merge: 602c8917 e975d3fd
Author: neu5ron <>
Date:   Tue May 19 05:09:05 2020 -0400

    Merge remote-tracking branch 'neu5ron-sigma/rules' into rules

commit 602c8917ef
Author: neu5ron <>
Date:   Tue May 19 04:41:08 2020 -0400

    domain user enumeration via zeek rpc (dce_rpc) log.

commit c815773b1a
Author: Tatsuya Ito <t_ito@cyberdefense.jp>
Date:   Tue May 19 18:05:51 2020 +0900

    enhancement rule

commit 49f68a327a
Author: Tatsuya Ito <t_ito@cyberdefense.jp>
Date:   Tue May 19 18:00:50 2020 +0900

    enhancement rule

commit e975d3fd14
Author: neu5ron <>
Date:   Tue May 19 04:41:08 2020 -0400

    domain user enumeration via zeek rpc (dce_rpc) log.

commit effb2a8337
Author: neu5ron <>
Date:   Tue May 19 04:41:00 2020 -0400

    add exe webdav download

commit 858ebcd3d3
Author: neu5ron <>
Date:   Tue May 19 04:35:47 2020 -0400

    author typo update

commit 2fc8d513d6
Author: neu5ron <>
Date:   Tue May 19 04:35:30 2020 -0400

    zeek, swap `path` and `name`

commit 0dd089db47
Author: ecco <none@none.com>
Date:   Mon May 18 20:29:53 2020 -0400

    various rules cleaning

commit 71c507d8a9
Author: gamma37 <marie.euler@polytechnique.edu>
Date:   Mon May 18 11:34:53 2020 +0200

    remove space bedore colon

commit 55eec46932
Author: gamma37 <marie.euler@polytechnique.edu>
Date:   Mon May 18 11:25:18 2020 +0200

    Create a rule for "suspicious activities"

commit cbf06b1e43
Author: gamma37 <marie.euler@polytechnique.edu>
Date:   Mon May 18 10:11:32 2020 +0200

    lowercased tag

commit 904716771a
Author: gamma37 <marie.euler@polytechnique.edu>
Date:   Mon May 18 10:03:34 2020 +0200

    Create a new rule to detect "Create Account"

commit beb62dc163
Author: Florian Roth <venom14@gmail.com>
Date:   Fri May 15 12:06:34 2020 +0200

    fix: condition location

commit 28dc2a2267
Author: Florian Roth <venom14@gmail.com>
Date:   Fri May 15 11:33:36 2020 +0200

    Minor changes

    hints:
    - contains doesn't require wildcards in the strings
    - we can use 'endswith' instead of wildcard at the beginning of the string (it's the new way to describe it, we have to change all old rules that contain these wildcards some day)
    - we can use "1 of them" to say that 1 of the conditions has to match

commit 40ab1b7247
Author: Trent Liffick <trent.liffick@outlook.com>
Date:   Thu May 14 23:33:08 2020 -0400

    added 'action: global'

commit 56a2747a70
Author: Trent Liffick <trent.liffick@outlook.com>
Date:   Thu May 14 23:18:33 2020 -0400

    Corrected missing condition

    learning! fail fast & forward

commit fb1d8d7a76
Author: Trent Liffick <trent.liffick@outlook.com>
Date:   Thu May 14 23:04:14 2020 -0400

    Corrected typo

commit 8aff6b412e
Author: Trent Liffick <trent.liffick@outlook.com>
Date:   Thu May 14 22:58:23 2020 -0400

    added rule for Blue Mockingbird (cryptominer)

commit 06abd6e76a
Author: Tiago Faria <tiago.faria.backups@gmail.com>
Date:   Thu May 14 14:03:23 2020 +0100

    added ci tests for ecs-cloudtrail

commit 2893becf8c
Merge: 31ad8187 133319c4
Author: Tiago Faria <tiago.faria.backups@gmail.com>
Date:   Thu May 14 14:02:20 2020 +0100

    Merge remote-tracking branch 'upstream/master'

commit 1a598282f4
Author: zaphod <18658828+zaphodef@users.noreply.github.com>
Date:   Wed May 13 11:57:10 2020 +0200

    Add 'Add-Content' to powershell_ntfs_ads_access

commit d510e1aad4
Author: zaphod <18658828+zaphodef@users.noreply.github.com>
Date:   Mon May 11 18:31:59 2020 +0200

    Fix 'source' value for win_susp_backup_delete

commit fb9c5841f4
Author: vh <vh@socprime.com>
Date:   Fri May 8 13:41:52 2020 +0300

    Added Humio, Crowdstrike, Corelight

commit 31ad81874f
Author: pdr9rc <pedro.gracio@3coresec.com>
Date:   Tue May 5 11:32:18 2020 +0100

    capitalized titles

    corrected capitalization of titles and removed literals from config

commit aa175a7d5b
Author: pdr9rc <pedro.gracio@3coresec.com>
Date:   Mon May 4 18:02:27 2020 +0100

    wip

    wip

commit dd9e128a15
Author: pdr9rc <pedro.gracio@3coresec.com>
Date:   Mon May 4 17:35:12 2020 +0100

    kibana target update

    kibana target now compatible with overrides

commit b32093e734
Merge: b3194e66 d298bb57
Author: pdr9rc <pedro.gracio@3coresec.com>
Date:   Mon May 4 17:26:51 2020 +0100

    Merge remote-tracking branch 'upstream/master'
    Keeping up with the sigmas.

commit b3194e66c4
Author: pdr9rc <pedro.gracio@3coresec.com>
Date:   Mon May 4 16:37:36 2020 +0100

    Update base.py

commit dd85467a27
Author: Tiago Faria <tiago.faria.backups@gmail.com>
Date:   Sat May 2 00:13:55 2020 +0100

    Update aws_ec2_vm_export_failure.yml

commit bc0a2c7ab9
Author: pdr9rc <pedro.gracio@3coresec.com>
Date:   Fri May 1 19:20:05 2020 +0100

    wip

    wip

commit 98391f985a
Author: pdr9rc <pedro.gracio@3coresec.com>
Date:   Thu Apr 30 15:19:38 2020 +0100

    wip

    wip

commit adcc3766e3
Merge: 81422444 dfdb5b95
Author: pdr9rc <pedro.gracio@3coresec.com>
Date:   Thu Apr 30 15:08:25 2020 +0100

    Merge branch 'master' of https://github.com/3CORESec/sigma

commit 8142244449
Author: pdr9rc <pedro.gracio@3coresec.com>
Date:   Thu Apr 30 15:08:20 2020 +0100

    wip

    wip

commit dfdb5b9550
Author: Tiago Faria <tiago.faria.backups@gmail.com>
Date:   Wed Apr 29 23:59:26 2020 +0100

    better description and event.outcome

commit ac4a2b1f26
Author: pdr9rc <pedro.gracio@3coresec.com>
Date:   Wed Apr 29 22:55:46 2020 +0100

    wip

    wip

commit 9ce84a38e5
Author: pdr9rc <pedro.gracio@3coresec.com>
Date:   Wed Apr 29 20:36:45 2020 +0100

    overrides section support + one example rule + cloudtrail config

    ditto
2020-06-05 13:18:03 -04:00
Florian Roth 2e77e65285 rule: Covenant launchers 2020-06-05 11:03:28 +02:00
Furkan ÇALIŞKAN 082696ee84 Added UUID 2020-06-04 18:38:42 +03:00
Furkan ÇALIŞKAN e958a6a939 Date added 2020-06-04 18:34:44 +03:00
Furkan ÇALIŞKAN 5e373153eb Title fix 2020-06-04 18:28:37 +03:00
Furkan ÇALIŞKAN 0744107fbb Deleted EventID part 2020-06-04 18:19:08 +03:00
Furkan ÇALIŞKAN 1c677aa172 Fix title as in guideline
Fix title error as in guideline and other cosmetic changes
2020-06-04 18:13:32 +03:00
Furkan ÇALIŞKAN bafd6bde5f Convert to process_creation
Convert to process_creation
2020-06-04 14:45:10 +03:00
Furkan ÇALIŞKAN 09afae1e66 Create sysmon_apt_muddywater_dnstunnel.yml
Detecting DNS tunnel activity from MuddyWater as in https://www.virustotal.com/gui/file/5ad401c3a568bd87dd13f8a9ddc4e450ece61cd9ce4d1b23f68ce0b1f3c190b7/
2020-06-04 14:27:19 +03:00
Trent Liffick 6c8c0cd85d Removed incorrect technique 2020-06-03 17:51:57 -04:00
Trent Liffick 3c89f46899 removed unwanted file 2020-06-03 17:43:12 -04:00
Trent Liffick 2af501c9f5 added rule for zLoader & Office
detects changes to Office macro settings & ZLoader malware
2020-06-03 17:40:05 -04:00
Trent Liffick a2ca199e7d added rules for Lazaurs and hhsgov 2020-06-03 17:38:03 -04:00
Florian Roth d97d2ced82 Merge pull request #725 from WilliamBruneau/fix_null_list
Move null values out from list in rules
2020-06-03 15:53:55 +02:00
William Bruneau 84dd8c39c4 Move null values out from list in rules 2020-06-03 13:57:22 +02:00
Florian Roth 022d73f842 Merge pull request #811 from svnscha/fix/field-TargetFileName-to-TargetFilename
All Rules use 'TargetFilename' instead of 'TargetFileName'.
2020-06-03 10:48:05 +02:00
Sven Scharmentke 4ed512011a All Rules use 'TargetFilename' instead of 'TargetFileName'.
This commit fixes the incorrect spelling.
2020-06-03 09:00:59 +02:00
ecco b1c11cc345 add WMI module load false positive 2020-06-01 03:30:27 -04:00
Florian Roth 0cbc099def Merge pull request #807 from forensicanalysis/master
Add sqlite backend
2020-05-30 09:31:45 +02:00
Jonas Plum 3a6ac5bd5c Remove unused function 2020-05-30 01:57:06 +02:00
Jonas Plum 5cc82d0f05 Move testcase 2020-05-30 00:56:06 +02:00
Jonas Plum 4a8ab88ade Fix test path 2020-05-30 00:15:38 +02:00
Jonas Plum 70935d26ce Add license header 2020-05-29 23:56:05 +02:00
Florian Roth 74e16fdccd Merge pull request #803 from gamma37/clear_cmd_history
Edit Clear Command History
2020-05-29 17:32:43 +02:00
Florian Roth e20b58c421 Merge pull request #806 from SanWieb/sysmon_creation_system_file
Fixed wrong field & Improve rule
2020-05-29 17:32:27 +02:00
Sander Wiebing a00f7f19a1 Add tagg Endswith
Prevent the trigger of {}.exe.log
2020-05-29 16:25:54 +02:00
Sander Wiebing 38afd8b5de Fixed wrong field 2020-05-28 21:52:17 +02:00
Florian Roth 7f2fa05ed3 Merge pull request #802 from Neo23x0/rule-devel
ComRAT and KazuarRAT
2020-05-28 11:16:44 +02:00
gamma37 537bda4417 Update lnx_shell_clear_cmd_history.yml 2020-05-28 10:56:35 +02:00
gamma37 5a48934822 Edit Clear Command History
I suggest a new point of view to detect that bash_history has been cleared : Instead of trying to detect all the commands that can do that, we could monitor the size of the file and log whenever it has less than 1 line.
2020-05-28 10:52:17 +02:00
Florian Roth 39b41b5582 rule: moved DebugView rule to process creation category 2020-05-28 10:13:38 +02:00
Florian Roth 76dcc1a16f rule: renamed debugview 2020-05-28 09:22:25 +02:00
Florian Roth ec313b6c8a Merge pull request #801 from SanWieb/sysmon_creation_system_file
Rule: sysmon_creation_system_file
2020-05-27 08:49:20 +02:00
Sander Wiebing d44fc43c54 Add extension 2020-05-26 19:10:11 +02:00
Sander Wiebing f6ec724d51 Rule: sysmon_creation_system_file 2020-05-26 18:53:54 +02:00
Florian Roth 5bb6770f53 Merge pull request #800 from SanWieb/win_system_exe_anomaly
Extended Windows processes: win_system_exe_anomaly
2020-05-26 14:28:47 +02:00
Florian Roth 4ca81b896d rule: Turla ComRAT report 2020-05-26 14:19:22 +02:00
Sander Wiebing 3681b8cb56 Extended Windows processes 2020-05-26 13:56:51 +02:00
Florian Roth 0b398c5bf0 Merge pull request #798 from Neo23x0/rule-devel
rule: confluence exploit CVE-2019-3398 & Turla ComRAT
2020-05-26 13:31:57 +02:00
Florian Roth c1f4787566 Merge pull request #797 from NVISO-BE/sysmon_cve-2020-1048
Changes to sysmon_cve-2020-1048
2020-05-26 13:21:04 +02:00
Florian Roth ce1f46346f Merge pull request #751 from zaphodef/fix/powershell_ntfs_ads_access
Add 'Add-Content' to powershell_ntfs_ads_access
2020-05-26 13:20:40 +02:00
Florian Roth e131f3476e Merge pull request #796 from EccoTheFlintstone/fp
add more false positives
2020-05-26 13:20:23 +02:00
Florian Roth 30861b558c Merge pull request #799 from SanWieb/susp_file_characteristics
Susp file characteristics: Reduce FP of legitime processes
2020-05-26 13:20:07 +02:00
Florian Roth b648998fd0 rule: Turla ComRAT 2020-05-26 13:18:50 +02:00
Sander Wiebing f9f814f3b3 Shortened title 2020-05-26 13:06:27 +02:00
Sander Wiebing a241792e10 Reduce FP of legitime processes
A lot of Windows apps does not have any file characteristics. Some examples:
- Gamebar: C:\\Program Files\\WindowsApps\\Microsoft.XboxGamingOverlay_3.38.25003.0_x64__8wekyb3d8bbwe\\GameBarFT.exe
- YourPhone: C:\\Program Files\\WindowsApps\\Microsoft.YourPhone_1.20022.82.0_x64__8wekyb3d8bbwe\\YourPhoneServer/YourPhoneServer.exe

All C:\Windows\System32\OpenSSH (scp, sftp, ssh etc) does not have a description and company.

Python 2.7, 3.3 and 3.7 does not have any file characteristics.

So I don't think it is possible to whitelist all options, maybe it is worthwhile to check the \Downloads\ folder otherwise it would be better to just delete the rule. All other suspicious folders are covered by /rules/windows/process_creation/win_susp_exec_folder.yml
2020-05-26 12:58:15 +02:00
Florian Roth cdf1ade625 fix: typo in selection 2020-05-26 12:27:16 +02:00
Sander Wiebing 91b4ee8d56 Merge pull request #2 from Neo23x0/master
Update repository
2020-05-26 12:24:21 +02:00
Florian Roth 828484d7c6 rule: confluence exploit CVE-2019-3398 2020-05-26 12:09:41 +02:00
Remco Hofman 48c5f2ed09 Update to sysmon_cve-2020-1048
Added .com executables to detection
Second TargetObject should have been Details
2020-05-26 11:20:21 +02:00
Jonas Hagg abf1a2c6d7 Adjusted Makefile 2020-05-25 11:58:55 +02:00
Jonas Hagg dedfb65d63 Implemented Aggregation for SQL, Added SQLite FullTextSearch 2020-05-25 11:58:55 +02:00
ecco 7037e77569 add more FP 2020-05-25 04:50:22 -04:00
Florian Roth a962bd1bc1 Merge pull request #747 from zaphodef/fix/win_susp_backup_delete_source
Fix 'source' value for win_susp_backup_delete
2020-05-25 10:48:36 +02:00
Florian Roth 0afe0623af Merge pull request #757 from tliffick/master
added rule for Blue Mockingbird (cryptominer)
2020-05-25 10:47:23 +02:00
Florian Roth 92d0aa8654 Merge pull request #795 from SanWieb/Rule-improvement-Netsh-program-allowed
Rule improvement: netsh Application or Port allowed
2020-05-25 10:46:39 +02:00
Sander Wiebing 6fcf3f9ebf Update win_netsh_fw_add.yml 2020-05-25 10:13:26 +02:00
Sander Wiebing 28652e4648 Add Windows Server 2008 and Windows Vista support
It did not support the command `netsh advfirewall firewall add`
2020-05-25 10:02:13 +02:00
Sander Wiebing 2678cd1d3e Create win_netsh_fw_add_susp_image.yml
More critical version of the rule windows/process_creation/win_netsh_fw_add.yml with the suspicious image location check. 

Combined the following rules for the suspicious locations:
https://github.com/Neo23x0/sigma//blob/master/rules/windows/sysmon/sysmon_susp_download_run_key.yml
https://github.com/Neo23x0/sigma/blob/master/rules/windows/sysmon/sysmon_susp_run_key_img_folder.yml
https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_susp_run_locations.yml
2020-05-25 09:50:47 +02:00
Sander Wiebing 4cd7c39e9d Merge pull request #1 from Neo23x0/master
Update repository
2020-05-25 08:48:16 +02:00
Thomas Patzke 0dda757ca5 Merge branch 'socprime-master' 2020-05-24 22:58:58 +02:00
Thomas Patzke daf7ab5ff7 Cleanup: removal of corelight_* backends 2020-05-24 22:41:38 +02:00
Thomas Patzke d45f8e19fe Fixes 2020-05-24 21:46:55 +02:00
Thomas Patzke 32e4998c49 Removed dead code from ALA backend. 2020-05-24 21:45:37 +02:00
Thomas Patzke 24b08bbf30 Merge branch 'master' of https://github.com/socprime/sigma into socprime-master 2020-05-24 17:06:32 +02:00
Florian Roth 40f0beb58d Merge pull request #794 from SanWieb/update_susp_run_key
Remove AppData folder as suspicious folder
2020-05-24 16:30:10 +02:00
Sander Wiebing b8ee736f44 Remove AppData folder as suspicious folder
A lot of software is using the AppData folder for startup keys. Some examples:
- Microsoft Teams (\AppData\Local\Microsoft\Teams)
- Resilio (\AppData\Roaming\Resilio Sync\)
- Discord ( (\AppData\Local\Discord\)
- Spotify ( (\AppData\Roaming\Spotify\)

Too many to whitelist them all
2020-05-24 15:16:07 +02:00
Florian Roth 6fbfa9dfdd Merge pull request #793 from Neo23x0/rule-devel
Esentutl rule and StrongPity Loader UA
2020-05-23 23:47:12 +02:00
ecco f970d28f10 add more false positives 2020-05-23 15:06:15 -04:00
Florian Roth 3028a27055 fix: buggy rule 2020-05-23 18:32:02 +02:00
Florian Roth df715386b6 rule: suspicious esentutl use 2020-05-23 18:27:36 +02:00
Florian Roth d0da2810c1 Merge pull request #792 from EccoTheFlintstone/fff
fix FP + remove powershell rule redundant with sysmon_in_memory_power…
2020-05-23 18:13:16 +02:00
Florian Roth 8321cc7ee1 Merge pull request #772 from gamma37/suspicious_activities
Create a rule for "suspicious activities"
2020-05-23 18:11:32 +02:00
Florian Roth d1a5471d21 rule: Strong Pity loader UA 2020-05-23 17:38:10 +02:00
ecco 67faf4bd41 fix FP + remove powershell rule redundant with sysmon_in_memory_powershell.yml 2020-05-23 10:56:23 -04:00
Florian Roth 9cd9a301c2 Merge pull request #791 from SanWieb/master
added rule for Netsh RDP port opening
2020-05-23 16:50:31 +02:00
Florian Roth e1a05dfc1c Update lnx_auditd_susp_C2_commands.yml 2020-05-23 16:49:03 +02:00
Florian Roth ee1ca77fad Merge pull request #771 from gamma37/new_rules
Create a new rule to detect "Create Account"
2020-05-23 16:47:46 +02:00
Florian Roth 895c84703f Merge pull request #790 from EccoTheFlintstone/fp_fix
fix false positive matching on every powershell process not run by SY…
2020-05-23 16:47:01 +02:00
ecco 327a53c120 add new test for sysmon rules without eventid 2020-05-23 10:25:37 -04:00
ecco 10ca3006f5 move rule where needed 2020-05-23 10:07:55 -04:00
ecco 2b89e56054 fix test 2020-05-23 10:03:13 -04:00
ecco d9bc09c38c fix test 2020-05-23 10:02:58 -04:00
ecco 78a7852a43 renamed dbghelp rule with new ID and comment and removed a false positive 2020-05-23 09:16:40 -04:00
Sander Wiebing d310805ed9 rule: Netsh RDP port opening 2020-05-23 14:19:52 +02:00
ecco 75ba5f989c add 1 more FP to wmi load 2020-05-23 07:44:45 -04:00
ecco 9a7f462d79 move renamed bnaries rule to process creation (they made a lot of false positives in sysmon as there was no event id specified in the rule) 2020-05-23 07:17:56 -04:00
ecco cfde0625f5 fix false positive matching on every powershell process not run by SYSTEM account 2020-05-23 07:05:09 -04:00
Florian Roth 12e1aeaf9f Merge pull request #788 from Neo23x0/rule-devel
refactor: split up rule for CVE-2020-1048 into 2 rules
2020-05-23 09:54:43 +02:00
Florian Roth 46f3a70a7d Merge pull request #786 from EccoTheFlintstone/perf_fix
various rules cleaning (slight perf improvements)
2020-05-23 09:54:28 +02:00
Florian Roth 34006d0794 refactor: simplified and extended expression in CVE-2020-1048 rule 2020-05-23 09:16:19 +02:00
Florian Roth 57c8e63acd refactore: split up rule for CVE-2020-1048 into 2 rules 2020-05-23 09:09:58 +02:00
ecco ec17c2ab56 filter on createkey only when needed 2020-05-22 10:37:00 -04:00
4A616D6573 879ad6f206 Update win_susp_ntlm_rdp.yml 2020-05-22 13:32:02 +10:00
4A616D6573 daa3c5e053 Update win_susp_ntlm_rdp.yml 2020-05-22 13:28:56 +10:00
4A616D6573 0f8f5fb29c Create win_susp_ntlm_rdp.yml 2020-05-22 13:24:27 +10:00
Thomas Patzke 96fae4be68 Added CrachMapExec rules 2020-05-22 00:50:37 +02:00
Florian Roth 64e0e7ca72 Merge pull request #784 from Neo23x0/rule-devel
refactor: slightly improved Greenbug rule
2020-05-21 14:19:09 +02:00
Florian Roth 91c4c4ecc5 refactor: slightly improved Greenbug rule 2020-05-21 13:38:11 +02:00
Florian Roth bbf78374b6 Merge pull request #783 from Neo23x0/rule-devel
Greenbug Rule
2020-05-21 09:55:46 +02:00
Florian Roth 9a3b6c1c77 docs: added MITRE ATT&CK group tag 2020-05-21 09:44:11 +02:00
Florian Roth 344eb713c5 rule: Greenbug campaign 2020-05-21 09:39:57 +02:00
Thomas Patzke 8d9b706d6a Merge pull request #727 from 3CORESec/master
Override Features
2020-05-20 19:11:56 +02:00
Florian Roth e7980bb434 Merge pull request #782 from ZikyHD/patch-1
Remove duplicate 'CommandLine' in fields
2020-05-20 12:55:41 +02:00
Florian Roth af92a5bd2c Merge pull request #780 from tatsu-i/master
Null field check to eliminate false positives
2020-05-20 12:55:29 +02:00
ZikyHD 8963c0a65e Remove duplicate 'CommandLine' in fields 2020-05-20 11:54:47 +02:00
vh e8b956f575 Updated config 2020-05-20 12:35:00 +03:00
Florian Roth 9ab65cd1c7 Update win_alert_ad_user_backdoors.yml 2020-05-19 14:50:22 +02:00
Thomas Patzke 04dfe6c5fc Merge pull request #778 from neu5ron/sigmacs
SIGMACs: Winlogbeat & Zeek
2020-05-19 13:18:40 +02:00
Florian Roth df75bdd3b6 Merge pull request #779 from neu5ron/rules
Rules: Zeek
2020-05-19 13:10:56 +02:00
neu5ron 7c3dea22b8 small T, big T 2020-05-19 05:13:48 -04:00
neu5ron dd382848b4 Merge remote-tracking branch 'neu5ron-sigma/rules' into rules 2020-05-19 05:09:05 -04:00
neu5ron 602c8917ef domain user enumeration via zeek rpc (dce_rpc) log. 2020-05-19 05:08:26 -04:00
Tatsuya Ito c815773b1a enhancement rule 2020-05-19 18:05:51 +09:00
neu5ron 9e272d37b7 zeek category update and minor field updates 2020-05-19 05:02:45 -04:00
Tatsuya Ito 49f68a327a enhancement rule 2020-05-19 18:00:50 +09:00
neu5ron 177f0a783b winlogbeat forward (at a snails pace) ECS field names 2020-05-19 04:58:51 -04:00
neu5ron e975d3fd14 domain user enumeration via zeek rpc (dce_rpc) log. 2020-05-19 04:41:08 -04:00
neu5ron effb2a8337 add exe webdav download 2020-05-19 04:41:00 -04:00
neu5ron 858ebcd3d3 author typo update 2020-05-19 04:35:47 -04:00
neu5ron 2fc8d513d6 zeek, swap path and name 2020-05-19 04:35:30 -04:00
ecco 0dd089db47 various rules cleaning 2020-05-18 20:29:53 -04:00
Florian Roth 4446c4cd4e Merge pull request #773 from EccoTheFlintstone/fix_fp
add some false positives checks
2020-05-18 21:33:48 +02:00
Florian Roth 4bb44f02e1 Merge pull request #776 from Neo23x0/rule-devel
docs: missed the reference
2020-05-18 18:35:30 +02:00
Florian Roth 63238fd661 docs: missed the reference 2020-05-18 18:34:30 +02:00
Florian Roth 482c9e5449 Merge pull request #775 from Neo23x0/rule-devel
Godmode Sigma Rule
2020-05-18 17:21:34 +02:00
Florian Roth 8819da51c5 Merge branch 'master' into rule-devel 2020-05-18 17:05:25 +02:00
Florian Roth 08c32c9dfc rule: godmode rule v0.3 2020-05-18 17:04:59 +02:00
ecco 1aa97fe577 flake 8 2020-05-18 10:03:18 -04:00
ecco 088800cd18 fix rule due to sigmac bug? 2020-05-18 09:39:48 -04:00
ecco e89613aee0 add some false positives checks 2020-05-18 07:19:06 -04:00
Florian Roth 8154ca355a Merge pull request #768 from maximelb/master
Remove "condition" from global rule in CVE-2020-1048.
2020-05-18 12:52:49 +02:00
Florian Roth ad50b5f3bb Merge pull request #769 from jaegeral/patch-2
replace --target-list with --lists
2020-05-18 12:50:07 +02:00
Florian Roth f7ef96c077 Merge pull request #770 from EccoTheFlintstone/various_fix
standardize rules with Image and CommandLine instead of NewProcessNam…
2020-05-18 12:49:22 +02:00
gamma37 71c507d8a9 remove space bedore colon 2020-05-18 11:34:53 +02:00
gamma37 55eec46932 Create a rule for "suspicious activities" 2020-05-18 11:25:18 +02:00
gamma37 cbf06b1e43 lowercased tag 2020-05-18 10:11:32 +02:00
gamma37 904716771a Create a new rule to detect "Create Account" 2020-05-18 10:03:34 +02:00
Alexander J a7176d4811 replace --target-list with --lists
The description in the readme is outdated

````
sigmac --target-list
usage: sigmac [-h] [--recurse] [--filter FILTER]
              [--target {kibana,ala-rule,splunk,ala,splunkxml,fieldlist,graylog,es-rule,qualys,arcsight-esm,mdatp,netwitness,arcsight,elastalert-dsl,sql,carbonblack,xpack-watcher,limacharlie,qradar,logiq,powershell,grep,ee-outliers,elastalert,es-qs,es-dsl,logpoint,sumologic}]
              [--lists] [--config CONFIG] [--output OUTPUT]
              [--backend-option BACKEND_OPTION]
              [--backend-config BACKEND_CONFIG] [--defer-abort]
              [--ignore-backend-errors] [--verbose] [--debug]
              [inputs [inputs ...]]
sigmac: error: unrecognized arguments: --target-list

````
2020-05-18 08:11:16 +02:00
Maxime Lamothe-Brassard 25d3a5a893 Remove "condition" from global rule.
The condition field in this rule was in the global section which overwrote the condition in sub-rules and generated FPs. For example, once Sigma read the rule, the bottom sub-rule's "condition" was overwritten with "1 of them".
2020-05-17 12:44:57 -07:00
~noyan 2b72ee7b84 partial(?) fix of #762 2020-05-16 14:51:58 +03:00
Florian Roth 5d1605bba2 Merge pull request #765 from Neo23x0/rule-devel
Rule devel
2020-05-16 09:16:19 +02:00
Florian Roth a46e357874 Merge branch 'master' into rule-devel 2020-05-16 08:59:34 +02:00
Florian Roth d5e7d4e302 fix: missing condition in CVE-2020-1048 rule 2020-05-16 08:59:05 +02:00
Florian Roth 4e1991cfee Merge pull request #761 from EccoTheFlintstone/cve-2020-1048-fix
fix CVE 2020-1048 rule
2020-05-16 08:58:31 +02:00
ecco fd386fe8eb standardize rules with Image and CommandLine instead of NewProcessName and ProcessCommandLine 2020-05-15 12:35:32 -04:00
Florian Roth 7b713fbe7f rule: OpenSSHd rule adjusted 2020-05-15 17:19:32 +02:00
ecco 0575fa8d81 fix CVE 2020-1048 rule 2020-05-15 07:25:05 -04:00
Florian Roth b672d7aeb4 Merge pull request #759 from Neo23x0/rule-devel
Rule devel
2020-05-15 12:25:46 +02:00
Florian Roth cc26b26377 Merge branch 'master' into rule-devel
# Conflicts:
#	rules/windows/sysmon/sysmon_cve-2020-1048.yml
2020-05-15 12:09:47 +02:00
Florian Roth 8e7caf0e4d rule: CVE-2020-1048 2020-05-15 12:08:31 +02:00
Florian Roth 8e082283f0 Merge pull request #754 from Neo23x0/rule-devel
Rule devel
2020-05-15 12:07:04 +02:00
Florian Roth beb62dc163 fix: condition location 2020-05-15 12:06:34 +02:00
Florian Roth 5854cc4677 fix: small bug in new CVE-2020-1048 rule 2020-05-15 11:37:46 +02:00
Florian Roth 2282432b6f Merge pull request #753 from hieuttmmo/master
New Sigma rule to detect possible CVE-2020-1048 exploitation and Suspicious network connection from Notepad
2020-05-15 11:35:12 +02:00
Florian Roth 28dc2a2267 Minor changes
hints: 
- contains doesn't require wildcards in the strings
- we can use 'endswith' instead of wildcard at the beginning of the string (it's the new way to describe it, we have to change all old rules that contain these wildcards some day)
- we can use "1 of them" to say that 1 of the conditions has to match
2020-05-15 11:33:36 +02:00
Florian Roth d8cd396697 Merge pull request #758 from EccoTheFlintstone/fix_fp
remove false positives with cmd as child of services.exe (not specifi…
2020-05-15 11:28:05 +02:00
ecco 54cf535dbc remove false positives with cmd as child of services.exe (not specifically related to meterpreter/cobaltstrike) 2020-05-15 04:45:25 -04:00
Trent Liffick 40ab1b7247 added 'action: global' 2020-05-14 23:33:08 -04:00
Trent Liffick 56a2747a70 Corrected missing condition
learning! fail fast & forward
2020-05-14 23:18:33 -04:00
Trent Liffick fb1d8d7a76 Corrected typo 2020-05-14 23:04:14 -04:00
Trent Liffick 8aff6b412e added rule for Blue Mockingbird (cryptominer) 2020-05-14 22:58:23 -04:00
Florian Roth d25b8a0492 docs: remove GPL reference, DRL in README 2020-05-14 15:56:39 +02:00
Florian Roth ab950fb89d fix: removed rules missing in master 2020-05-14 15:53:09 +02:00
Tiago Faria 06abd6e76a added ci tests for ecs-cloudtrail 2020-05-14 14:03:23 +01:00
Tiago Faria 2893becf8c Merge remote-tracking branch 'upstream/master' 2020-05-14 14:02:20 +01:00
Tran Trung Hieu e53a97fa2f Update condition to filter out printer port 2020-05-14 18:22:49 +07:00
Tran Trung Hieu 443bf09d27 Add author 2020-05-14 18:10:16 +07:00
Tran Trung Hieu e74970cea0 Suspicious network connection from notepad.exe 2020-05-14 18:08:30 +07:00
Tran Trung Hieu 97b690d340 Change level from Critical to High 2020-05-14 09:02:54 +07:00
Thomas Patzke 133319c417 Merge pull request #737 from NVISO-BE/backend-ee-outliers
ee-outliers backend
2020-05-13 22:38:02 +02:00
Florian Roth 7652813c2c Merge pull request #752 from zaphodef/fix/win_susp_script_execution_false_negatives
Widen the search as it gives too many false negatives
2020-05-13 21:02:12 +02:00
Tran Trung Hieu d0b1c98d5a Reformat rule 2020-05-14 00:39:41 +07:00
Tran Trung Hieu 3e5b33388b New rule to detect possible CVE-2020-1048 exploitation 2020-05-14 00:24:36 +07:00
zaphod 78a5c743f2 Widen the search as it gives too many false negatives 2020-05-13 16:20:23 +02:00
Florian Roth 78a8266a1b Merge pull request #749 from teddy-ROxPin/patch-6
Create win_advanced_ip_scanner.yml
2020-05-13 14:09:12 +02:00
hieuttmmo 9ad3427d68 Merge pull request #1 from Neo23x0/master
Update
2020-05-13 18:36:52 +07:00
Florian Roth 220a14f31c fix: typo in contains 2020-05-13 12:38:54 +02:00
zaphod 1a598282f4 Add 'Add-Content' to powershell_ntfs_ads_access 2020-05-13 11:57:10 +02:00
Florian Roth a1856c5743 Update win_advanced_ip_scanner.yml 2020-05-13 11:56:25 +02:00
Florian Roth 904a31103d Merge pull request #750 from zaphodef/fix/win_bootconf_mod_bad_commandline
Fix a bad CommandLine search
2020-05-13 11:55:16 +02:00
zaphod a9ef7ef382 Fix a bad CommandLine search 2020-05-13 11:32:05 +02:00
teddy_ROxPin bb17fd74ee Create win_advanced_ip_scanner.yml
Detects the use of Advanced IP Scanner. Seems to be a popular tool for ransomware groups.
2020-05-12 21:43:01 -06:00
Florian Roth e01734fda1 rule: proxy UA hidden cobra 2020-05-12 17:43:54 +02:00
zaphod d510e1aad4 Fix 'source' value for win_susp_backup_delete 2020-05-11 18:31:59 +02:00
Rettila 6ec74364f2 Create win_global_catalog_enumeration.yml 2020-05-11 17:40:47 +02:00
Rettila ccacedf621 Merge pull request #3 from Neo23x0/master
merge
2020-05-11 17:38:27 +02:00
Florian Roth 37c33cb6d9 Merge pull request #743 from tliffick/master
Registry entry for Azorult malware
2020-05-11 16:37:15 +02:00
Remco Hofman 37b08543ac Updated author reference in license 2020-05-11 11:47:56 +02:00
Florian Roth 1104044f53 fix: delete duplicate rules 2020-05-11 10:55:02 +02:00
Florian Roth 2b18b66c16 Merge branch 'master' into rule-devel 2020-05-11 10:50:10 +02:00
Florian Roth 4366a95024 rule: Maze ransomware 2020-05-11 10:46:26 +02:00
Florian Roth f96c3a5fd4 Merge branch 'master' into rule-devel
# Conflicts:
#	rules/proxy/proxy_ua_suspicious.yml
#	rules/windows/process_creation/win_install_reg_debugger_backdoor.yml
#	rules/windows/process_creation/win_susp_csc_folder.yml
2020-05-11 10:44:19 +02:00
Florian Roth 09d1b00459 Changed level to ciritcal 2020-05-11 10:40:23 +02:00
tliffick c98be55d21 Update mal_azorult_reg.yml 2020-05-08 21:31:33 -04:00
tliffick 61f061333b Registry entry for Azorult malware
Detects registry keys used by Azorult malware
2020-05-08 21:26:24 -04:00
Remco Hofman c5c5e1b79b Added ee-outliers test to Makefile 2020-05-08 17:51:35 +02:00
Florian Roth fd7968d4f8 Merge pull request #734 from NVISO-BE/win_susp_failed_logon_source
New rule: Failed Logon From Public IP
2020-05-08 16:24:12 +02:00
vh fb9c5841f4 Added Humio, Crowdstrike, Corelight 2020-05-08 13:41:52 +03:00
Florian Roth 64a5ad0d07 Merge pull request #735 from nl5887/master
fix incorrect use of action global
2020-05-08 12:20:33 +02:00
Florian Roth 24c0765694 Merge branch 'master' into devel 2020-05-08 12:17:14 +02:00
Florian Roth 7cc1b300d2 rule: maze ransomware patterns 2020-05-08 11:42:06 +02:00
Remco Hofman dc96b7ffb3 Removed dependency on slugify 2020-05-08 11:40:16 +02:00
Remco Hofman 2d3ee85c46 README updates 2020-05-08 10:40:41 +02:00
Remco Hofman c5be83eb01 Added ee-outliers backend 2020-05-08 10:18:35 +02:00
Rettila 07a50edf89 Update win_metasploit_authentication.yml 2020-05-07 14:42:00 +02:00
Thomas Patzke 3b96b5e497 Merge pull request #723 from neu5ron/socprime_add_zeek_and_corelight
sigmacs for Zeek and Corelight(Zeek)
2020-05-06 23:22:14 +02:00
Remco Verhoef 2d38cb7b52 fix incorrect use of global 2020-05-06 23:00:45 +02:00
Remco Verhoef 40539a0c0e fix incorrect use of action global 2020-05-06 22:53:02 +02:00
Remco Hofman 123a23adae win_susp_failed_logon_source rule 2020-05-06 22:24:02 +02:00
Thomas Patzke 1797a1e56b Merge pull request #733 from NVISO-BE/fix-732
Fix for broken endswith modifier
2020-05-06 22:17:08 +02:00
Remco Hofman 24029a8f27 Fix for broken endswith modifier 2020-05-06 17:10:54 +02:00
Rettila 6aed82a039 Update win_metasploit_authentication.yml 2020-05-06 17:04:47 +02:00
Rettila 2beb65076c Update win_metasploit_authentication.yml 2020-05-06 16:44:19 +02:00
Rettila 7371ce234b Create win_metasploit_authentication.yml 2020-05-06 16:42:27 +02:00
Rettila ddb02c6820 Merge pull request #1 from Neo23x0/master 2020-05-06 11:24:26 +02:00
Florian Roth 1ce527c9be Merge pull request #729 from Rettila/master
Rule correction and enhancement
2020-05-05 19:25:49 +02:00
Florian Roth 473c31232e add additional reference 2020-05-05 19:25:33 +02:00
Rettila 0e1fa5c135 Update win_possible_dc_shadow.yml 2020-05-05 18:14:32 +02:00
Rettila 55d018255c Update win_possible_dc_shadow.yml 2020-05-05 16:52:08 +02:00
Rettila 3302c63e0c Update and rename win_possible_dc_sync.yml to win_possible_dc_shadow.yml 2020-05-05 16:51:35 +02:00
Rettila f27aa4bfee Update win_possible_dc_sync.yml 2020-05-05 16:50:13 +02:00
Rettila db810b342f Delete win_possible_dc_shadow.yml 2020-05-05 16:48:39 +02:00
Rettila e3f21805f3 Update win_possible_dc_shadow.yml 2020-05-05 16:43:56 +02:00
Rettila 0f4cc9d365 Create win_possible_dc_shadow.yml 2020-05-05 16:40:52 +02:00
pdr9rc 31ad81874f capitalized titles
corrected capitalization of titles and removed literals from config
2020-05-05 11:32:18 +01:00
neu5ron a01a85cf9b CI/CD check fixes (missing ID's) 2020-05-04 15:22:18 -04:00
neu5ron 90730508f0 Merge remote-tracking branch 'neu5ron-sigma/socprime_add_zeek_and_corelight' into socprime_add_zeek_and_corelight 2020-05-04 15:17:54 -04:00
neu5ron a61b1da47a fixed yaml space causing condition to not be found 2020-05-04 15:17:43 -04:00
neu5ron 98f163e752 fixed yaml space causing condition to not be found 2020-05-04 15:10:48 -04:00
pdr9rc aa175a7d5b wip
wip
2020-05-04 18:02:27 +01:00
pdr9rc dd9e128a15 kibana target update
kibana target now compatible with overrides
2020-05-04 17:35:12 +01:00
pdr9rc b32093e734 Merge remote-tracking branch 'upstream/master'
Keeping up with the sigmas.
2020-05-04 17:26:51 +01:00
pdr9rc b3194e66c4 Update base.py 2020-05-04 16:37:36 +01:00
Florian Roth d298bb5714 Merge pull request #480 from hillu/override-coverage
Make coverage binary overridable
2020-05-02 18:50:58 +02:00
Wietze 2b3828730c Reversed disabling FileDelete 2020-05-02 17:31:50 +01:00
Wietze e5574e07f2 Disabled FileDelete event (Sysmon 11 - no rules available yet) 2020-05-02 16:21:56 +01:00
Wietze 5abf4cbea9 Reordered fields 2020-05-02 14:46:55 +01:00
Wietze 661108903b Minor consistency fix 2020-05-02 14:37:37 +01:00
Wietze 46737cbfd3 Improved Microsoft ATP mapping, using Advanced Hunting Schema
See https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference
2020-05-02 14:31:02 +01:00
Florian Roth 030898ba9c Merge branch 'master' into override-coverage 2020-05-02 14:22:03 +02:00
Florian Roth c71e10a7f3 Merge pull request #717 from Karneades/renamedbinary
Add netsh to renamed binary rule
2020-05-02 14:12:34 +02:00
Florian Roth b4b9b0155f Merge pull request #716 from Karneades/patch-1
Add rule to detect wifi creds harvesting using netsh
2020-05-02 14:12:10 +02:00
Florian Roth 7f8baee10d Merge pull request #720 from 0xThiebaut/specification
Update rules to follow the Sigma state specification
2020-05-02 14:11:45 +02:00
neu5ron d300027848 on behalf of @socprime [SOC Prime Inc.](https://my.socprime.com/en/tdm/)
add rules for Zeek. This includes Windows Event Channel Security EventID:5145 that have same fields as Zeek SMB
Also, converted some of (MITRE ATT&CK BZAR)[https://github.com/mitre-attack/bzar] which are Zeek (sensor) scripts.
2020-05-02 07:27:51 -04:00
neu5ron c66540c029 on behalf of @socprime [SOC Prime Inc.](https://my.socprime.com/en/tdm/)
create `zeek` folder to store Zeek rules
2020-05-02 07:25:21 -04:00
neu5ron cbe5af01a1 on behalf of @socprime [SOC Prime Inc.](https://my.socprime.com/en/tdm/)
add a total of 5 sigmac's (sigma configs) for 3 different backends. full git message to follow in PR.
2020-05-02 07:23:11 -04:00
Tiago Faria dd85467a27 Update aws_ec2_vm_export_failure.yml 2020-05-02 00:13:55 +01:00
Thomas Patzke 2fafff3278 Fixed: escaping of backslashes before added *
Fixes issue #722.
2020-05-02 00:13:15 +02:00
pdr9rc bc0a2c7ab9 wip
wip
2020-05-01 19:20:05 +01:00
pdr9rc 98391f985a wip
wip
2020-04-30 15:19:38 +01:00
pdr9rc adcc3766e3 Merge branch 'master' of https://github.com/3CORESec/sigma 2020-04-30 15:08:25 +01:00
pdr9rc 8142244449 wip
wip
2020-04-30 15:08:20 +01:00
Tiago Faria dfdb5b9550 better description and event.outcome 2020-04-29 23:59:26 +01:00
pdr9rc ac4a2b1f26 wip
wip
2020-04-29 22:55:46 +01:00
pdr9rc 9ce84a38e5 overrides section support + one example rule + cloudtrail config
ditto
2020-04-29 20:36:45 +01:00
Maxime Thiebaut 4600bf73dc Update rules to follow the Sigma state specification
The [Sigma specification's status component](https://github.com/Neo23x0/sigma/wiki/Specification#status-optional) states the following:

> Declares the status of the rule:
>  - stable: the rule is considered as stable and may be used in production systems or dashboards.
>  - test: an almost stable rule that possibly could require some fine tuning.
>  - experimental: an experimental rule that could lead to false results or be noisy, but could also identify interesting events.

However the Sigma Rx YAML specification states the following:

> ```yaml
> status:
>     type: //any
>     of:
>         - type: //str
>           value: stable
>         - type: //str
>           value: testing
>         - type: //str
>           value: experimental
> ```

The specification confuses the `test` and `testing` state. This commit changes the `test` state into the `testing` state which is already used in the code-base:
 - [`sigma/sigma-schema.rx.yml`](https://github.com/Neo23x0/sigma/blob/a805d18bbae60d3e4f291c8a18304104ed2e71c7/sigma-schema.rx.yml#L49)
 - [`sigma/tools/sigma/filter.py`](https://github.com/Neo23x0/sigma/blob/f3c60a63099f80296c8750aaba667e98ac71a4f7/tools/sigma/filter.py#L26)
 - [`sigma/tools/sigmac`](https://github.com/Neo23x0/sigma/blob/4e42bebb3480720966a59528cd8482c6271e603c/tools/sigmac#L98)

Although not modifyable through a PR, the specification should furthermore be updated to use the `testing` state.
2020-04-24 20:50:31 +02:00
Andreas Hunkeler 7d437c2969 Add netsh to renamed binary rule 2020-04-20 17:12:25 +02:00
Andreas Hunkeler d4e9606266 Improve netsh wifi rule another time due to arg shortcut 2020-04-20 16:40:03 +02:00
Andreas Hunkeler af498d8a8c Improve rule to detect argument shortcut in netsh wlan rule 2020-04-20 16:32:25 +02:00
Andreas Hunkeler ba541c3952 Fix title for new netsh wifi rule 2020-04-20 16:20:45 +02:00
Andreas Hunkeler d9e5274c9e Add rule to detect wifi creds harvesting using netsh 2020-04-20 16:14:44 +02:00
Florian Roth e67dddcc35 rule: PwnDrp access 2020-04-17 08:55:54 +02:00
Florian Roth 514bd8657b Merge pull request #704 from Iveco/master
Detect Ghost-In-The-Logs (disabling/bypassing ETW)
2020-04-14 14:11:27 +02:00
Florian Roth 2e0e170058 Merge pull request #708 from teddy-ROxPin/patch-4
Create powershell_create_local_user.yml
2020-04-14 14:11:15 +02:00
Florian Roth 3175a48bdc Casing 2020-04-14 13:40:34 +02:00
Florian Roth ecdec93800 Casing 2020-04-14 13:39:58 +02:00
Florian Roth 5cbe008350 Casing 2020-04-14 13:39:22 +02:00
Florian Roth 5ee0808619 Merge pull request #706 from vesche/update_win_susp_netsh_dll_persistence
Update win_susp_netsh_dll_persistence.yml
2020-04-14 13:37:53 +02:00
Florian Roth 4f469c0e39 Adjusted level 2020-04-14 13:37:10 +02:00
Florian Roth 8f40c0a1c8 Merge pull request #710 from vesche/update_win_GPO_scheduledtasks
Update win_GPO_scheduledtasks.yml
2020-04-14 13:36:17 +02:00
Florian Roth b2754af46b Merge pull request #711 from 0xThiebaut/sysmon_registry_persistence_search_order
Add Windows Registry Persistence COM Search Order Hijacking
2020-04-14 13:35:56 +02:00
Maxime Thiebaut 86c6891427 Add Windows Registry Persistence COM Search Order Hijacking 2020-04-14 12:59:29 +02:00
vesche 1f918253e8 Add additional reference 2020-04-13 11:09:36 -05:00
vesche 9cdb3a4a64 Fix typo 2020-04-13 11:09:00 -05:00
alm8i 7ac685882c comments for usage 2020-04-11 15:47:23 +02:00
teddy-ROxPin 1501331f77 Create powershell_create_local_user.yml
Adds coverage for creating a local account via PowerShell from https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1136/T1136.md#atomic-test-4---create-a-new-user-in-powershell
2020-04-11 02:51:05 -06:00
Danijel Grah 6312f381bf C# backend
Converts Sigma rule into C# Regex in LINQ query
2020-04-10 16:12:05 +02:00
vesche 3889be6255 Replace reference link for win_susp_netsh_dll_persistence 2020-04-10 01:05:10 -05:00
vesche 82db80bee6 Remove wrong mitre technique 2020-04-10 01:02:43 -05:00
vesche 72b821e046 Update win_susp_netsh_dll_persistence.yml 2020-04-09 11:16:18 -05:00
Iveco 61b9234d7f Update win_user_driver_loaded.yml
removed internal field
2020-04-09 11:28:19 +02:00
Thomas Patzke 1c5c8047fd Fixes
* Removed commented debug print statements
* Defined nullExpression
* Removed unneeded generateMapItemNode method
* Value cleaning bug on matching of wildcard at first character
2020-04-08 23:43:46 +02:00
Thomas Patzke 72c2241bb4 Cleanup
* Added CI test
* Added changelog entry
2020-04-08 23:39:38 +02:00
Thomas Patzke 3277cec7aa Reverted list sorting
This was already implemented meanwhile in a previous commit.
2020-04-08 23:23:44 +02:00
Thomas Patzke cf896c3093 Merge branch 'master' of https://github.com/abhikhnvasara/sigma into pr-630 2020-04-08 23:16:39 +02:00
Thomas Patzke 551a94af04 Merge branch 'master' of https://github.com/tileo/sigma into pr-658 2020-04-08 22:43:48 +02:00
Thomas Patzke 7224af54b2 Merge pull request #664 from j91321/es-rule-options
es-rule backend options for index-patterns and time interval
2020-04-08 22:39:45 +02:00
Thomas Patzke 1b7f33f5e2 Fixed undefined value in exception handling
Fixes issue #702.
2020-04-08 22:28:47 +02:00
Iveco e913db0dca Update win_user_driver_loaded.yml
CI
2020-04-08 18:54:59 +02:00
Iveco c5211eb94a Update sysmon_susp_service_installed.yml
CI
2020-04-08 18:54:46 +02:00
Iveco 4520082ef7 Update sysmon_susp_procexplorer_driver_created_in_tmp_folder.yml
CI
2020-04-08 18:54:37 +02:00
Iveco 6d85650390 Update sysmon_susp_procexplorer_driver_created_in_tmp_folder.yml
Fixed Author
2020-04-08 18:41:33 +02:00
Iveco fc1febdebe Update sysmon_susp_service_installed.yml
Fixed Author
2020-04-08 18:41:25 +02:00
Iveco d0746b50f4 Update win_user_driver_loaded.yml
Fixed author
2020-04-08 18:41:16 +02:00
Iveco 3280a1dfb0 Update sysmon_susp_procexplorer_driver_created_in_tmp_folder.yml
Fixed CI
2020-04-08 18:23:29 +02:00
Iveco 5e724a0a54 Update sysmon_susp_service_installed.yml
Fixed CI
2020-04-08 18:22:51 +02:00
Iveco d1b9c0c34a Update win_user_driver_loaded.yml
Fixed CI
2020-04-08 18:21:59 +02:00
iveco e87f2705a7 Detect Ghost-In-The-Logs (disabling/bypassing ETW) 2020-04-08 18:01:04 +02:00
Florian Roth f50767c400 Merge pull request #703 from 0xThiebaut/downgrade
Update the NTLM downgrade registry paths
2020-04-07 18:13:29 +02:00
Maxime Thiebaut 73a6428345 Update the NTLM downgrade registry paths
Recent windows versions rely on the ["MSV1_0" authentication package](https://docs.microsoft.com/en-us/windows/win32/secauthn/msv1-0-authentication-package). Production environment tests have shown that NTLM downgrade attacks can be performed as detected by this rule although some of the registry keys are located in an "Lsa" subkey ("MSV1_0"). This commit introduces additionnal wildcards to handle these cases to ensure the previous detection rules are still included.
2020-04-07 17:14:45 +02:00
j91321 3470011ac3 Revert time interval, use index values provided by sigmaparser 2020-04-05 20:30:57 +02:00
Thomas Patzke 693830fa83 Merge pull request 659 2020-04-03 23:46:53 +02:00
Florian Roth 2a579a0a1b Merge pull request #699 from mpavlunin/patch-2
Create new rule T1223
2020-04-03 19:32:50 +02:00
Florian Roth 4e3985866b Update and rename sysmon_win_chm.yml to win_html_help_spawn.yml 2020-04-03 16:50:48 +02:00
mpavlunin 81d0f82272 Create new rule T1223
Suspicious Compiled HTML File
2020-04-03 16:56:26 +03:00
Florian Roth 0ea2db8b9e Merge pull request #484 from hieuttmmo/master
New sigma rules to detect new MITRE technique in last update (T1502)
2020-04-03 09:59:36 +02:00
Florian Roth f4928e95bc Update powershell_suspicious_profile_create.yml 2020-04-03 09:36:17 +02:00
Florian Roth c0ab9c5745 Merge pull request #671 from HarishHary/powershell_downgrade_attack
Powershell downgrade attack (small improvements)
2020-04-03 09:31:33 +02:00
Florian Roth 6cf0edc076 Merge pull request #685 from teddy-ROxPin/patch-1
Typo fix for powershell_suspicious_invocation_generic.yml
2020-04-03 09:30:32 +02:00
Florian Roth aa73c39a35 Merge pull request #692 from Neo23x0/ci-deploy
PyPI deployment via GitHub Actions
2020-04-03 09:29:49 +02:00
Florian Roth eef8531a72 Merge pull request #697 from refractionPOINT/lc-remove-timeframe
Remove generation of LC rules with timeframe.
2020-04-03 09:29:12 +02:00
Maxime Lamothe-Brassard f92c5e9b18 Remove generation of LC rules with timeframe. 2020-04-02 15:25:30 -07:00
Florian Roth ee7babd8cb fix: security vulnerability with pyyaml < 4.2b1 2020-04-02 12:27:53 +02:00
Florian Roth dec0c108f9 Merge pull request #683 from NVISO-BE/powershell_wmimplant
WMImplant detection rule
2020-04-02 11:54:09 +02:00
Florian Roth 1196f8d60f Merge pull request #695 from cobsec/master
Date typos
2020-04-02 10:20:18 +02:00
Chris O'Brien fe5dbece3d Date typos...more than I thought... 2020-04-02 10:00:00 +02:00
Chris O'Brien 97c0872c81 Date typo. 2020-04-02 09:53:09 +02:00
Thomas Patzke 0db3bbb097 Merge pull request #693 from Neo23x0/dependabot/pip/pyyaml-5.1
Bump pyyaml from 3.13 to 5.1
2020-04-01 23:25:57 +02:00
Florian Roth af49c24419 Merge pull request #694 from cobsec/master
Fixed date typo - by the looks of the commit date the month/date were…
2020-04-01 18:28:14 +02:00
Chris O'Brien 95e0b12d88 Fixed date typo - by the looks of the commit date the month/date were swapped. 2020-04-01 18:18:13 +02:00
Thomas Patzke 13dbb4cdbd Moved tools into sigma namespace 2020-03-31 23:46:58 +02:00
dependabot[bot] c9c73bec3f Bump pyyaml from 3.13 to 5.1
Bumps [pyyaml](https://github.com/yaml/pyyaml) from 3.13 to 5.1.
- [Release notes](https://github.com/yaml/pyyaml/releases)
- [Changelog](https://github.com/yaml/pyyaml/blob/master/CHANGES)
- [Commits](https://github.com/yaml/pyyaml/compare/3.13...5.1)

Signed-off-by: dependabot[bot] <support@github.com>
2020-03-31 20:40:52 +00:00
Thomas Patzke 2bda0e097f Merge pull request #691 from Neo23x0/cleanup
Cleanup
2020-03-31 22:37:04 +02:00
Thomas Patzke 8c69c7bb02 PyPI deployment via GitHub Actions 2020-03-31 22:36:16 +02:00
Florian Roth 6aba430de6 fix: sigma_uuid occurances 2020-03-31 16:29:58 +02:00
Florian Roth 8e39b09ba5 Merge pull request #690 from cnotin/patch-1
Small typo
2020-03-31 16:27:21 +02:00
Clément Notin 18cdddb09e Small typo 2020-03-31 15:22:00 +02:00
Florian Roth 4d67dff89a fix: renamed tools to allow for console_scripts list entries 2020-03-31 14:07:34 +02:00
Florian Roth 18e505c458 fix: list_configurations default values 2020-03-31 12:42:02 +02:00
Florian Roth c82156a3c9 fix: second list_configurations function params 2020-03-31 11:46:05 +02:00
Florian Roth 23ce69eaae fix: functions parameters outside of main 2020-03-31 11:42:16 +02:00
Florian Roth bb50571b13 fix: print_verbose scope 2020-03-31 11:35:21 +02:00
Florian Roth c83b4fd37c fix: fixing script install for Windows end systems 2020-03-31 11:30:47 +02:00
Florian Roth 536ad78fc2 refactor: following best practices reg main functions in Python
https://realpython.com/python-main-function/
2020-03-31 11:30:14 +02:00
Florian Roth 6a70bdb126 Merge pull request #689 from 0xThiebaut/win_ad_enumeration
Add AD User Enumeration
2020-03-31 10:56:48 +02:00
Maxime Thiebaut 8dcbfd9aca Add AD User Enumeration
When the "Read all properties" permission of a user object is set to be
audited in the AD, an event of ID 4662 (An operation was performed on an
object) is triggered whenever a property is accessed.

This rule detects these events by flagging any non-machine
`SubjectUserName` (i.e. another user) which accesses an object of the
`User` AD schema class.

Advantages of this rule include the detection of insider-enumeration
through automated tools such as BloodHound or manually through the usage
of the PowerShell ActiveDirectory module. Although this rule qualifies
as a medium severity one, this event could be qualified as high/critical
one if flagged on non-used canary user-accounts.

False positives may include administrators performing the initial
configuration of new users.
2020-03-31 09:40:07 +02:00
Remco Hofman b791d599ee Disabled keywords that could cause FPs 2020-03-30 08:53:52 +02:00
Thomas Patzke d33f4b290d Dependency cleanup
* Consolidated dependencies into main and development (MISP and test
  intergrated).
* Splitted Pipfile dependencies into main and development
* Specified compatible dependencies
2020-03-29 22:55:09 +02:00
Thomas Patzke 38a5fe3a29 Removed Travis CI configuration 2020-03-29 22:20:04 +02:00
Florian Roth f2a2420e24 Merge pull request #687 from Neo23x0/ci-testing
Ci testing
2020-03-29 17:25:28 +02:00
Thomas Patzke 4dbe5e2f17 Moved Elasticsearch dependencies to generic dependencies
Omitting waiting for Elasticsearch as it should be started at this time.
2020-03-29 15:19:13 +02:00
Thomas Patzke 5e258efbe7 Improved Elasticsearch waiting process 2020-03-29 14:57:34 +02:00
Thomas Patzke d68b900077 Wait for Elasticsearch before running tests 2020-03-29 14:37:27 +02:00
Thomas Patzke 821a631325 Run Elasticsearch installation as root 2020-03-29 14:00:15 +02:00
Thomas Patzke fbe40bd1e8 Fixed Elasticsearch test
* Splitted into separate action
* Install dependencies
2020-03-29 13:41:03 +02:00
Thomas Patzke d24c1e2800 CI testing with GitHub Actions 2020-03-29 13:25:04 +02:00
teddy-ROxPin 1a3731f7ae Typo fix for powershell_suspicious_invocation_generic.yml
' - windowstyle hidden ' changed to ' -windowstyle hidden '
2020-03-29 04:16:15 -06:00
Florian Roth 8ea6b12eed Merge pull request #670 from 0xThiebaut/sysmon_susp_desktop_ini
Add "Suspicious desktop.ini Action" rule
2020-03-28 13:34:01 +01:00
Florian Roth fe5b5a7782 Merge pull request #673 from j91321/rules-minor-fixes
Minor fixes to several rules
2020-03-28 13:27:05 +01:00
Florian Roth 5f0250bff5 Merge pull request #669 from 0xThiebaut/winlogbeat-rulename
Add Winlogbeat's RuleName field to mapping
2020-03-28 13:20:08 +01:00
Florian Roth e2b90220a2 Update sysmon_susp_desktop_ini.yml 2020-03-28 13:19:10 +01:00
Florian Roth bbb10a51f4 Update win_powershell_downgrade_attack.yml 2020-03-28 13:17:58 +01:00
Florian Roth 0e94eb9e86 Update win_powershell_downgrade_attack.yml 2020-03-28 13:12:07 +01:00
Florian Roth 2426b39d83 Merge pull request #678 from justintime/title_collision
Eliminate title collision
2020-03-28 12:57:55 +01:00
Florian Roth 597d914b71 Merge pull request #679 from Iveco/master
add LDAPFragger detections
2020-03-28 12:57:33 +01:00
Remco Hofman f52ed4150d WMImplant parameter detection 2020-03-27 15:08:35 +01:00
Iveco 55258e1799 Title capitalized 2020-03-26 17:04:08 +01:00
Iveco 3f577c98e7 Title capalized 2020-03-26 17:03:33 +01:00
Iveco 68c20dca20 Fixed title length 2020-03-26 16:56:46 +01:00
Iveco 39a3af04ce Fixed title length 2020-03-26 16:56:06 +01:00
Justin Ellison dabc759136 Eliminate title collision
Fixing the problem described in HELK here: https://github.com/Cyb3rWard0g/HELK/issues/442 where when running sigmac to generate elastalert rules, this rule has a title collision with another rule in the same directory and causes elastalert to fail to start.
2020-03-26 09:13:52 -05:00
iveco ddacde9e6b add LDAPFragger detections 2020-03-26 15:13:36 +01:00
Florian Roth 0e973d1454 Merge pull request #677 from Neo23x0/devel
Devel
2020-03-25 19:14:03 +01:00
Florian Roth 28953a2942 fix: MITRE tags in rule 2020-03-25 18:11:04 +01:00
Florian Roth 6584729a0d rule: powershell downloadfile 2020-03-25 14:58:14 +01:00
Florian Roth e206cbda7f Merge pull request #676 from Neo23x0/devel
Devel
2020-03-25 14:54:56 +01:00
Florian Roth 35e43db7a7 fix: converted CRLF line break to LF 2020-03-25 14:36:34 +01:00
Florian Roth 17297193c7 Merge branch 'master' into devel 2020-03-25 14:18:11 +01:00
Florian Roth 0e1ff440db fix: updated MITRE tags in test 2020-03-25 14:04:22 +01:00
Florian Roth 50b0d04ee8 rule: Exploited CVE-2020-10189 Zoho ManageEngine 2020-03-25 14:02:53 +01:00
Florian Roth 28d8b87a0f rule: extended web shell spawn rule 2020-03-25 14:02:39 +01:00
Thomas Patzke 004eaf0615 Revert "do not escape u"
This reverts commit aa112cbd44.

This was a fix for a previous bug.
2020-03-24 23:36:12 +01:00
j91321 1d86e0b4a5 Change falsepositives to array 2020-03-24 19:59:54 +01:00
j91321 c784adb10b Wrong indentation falsepositives 2020-03-24 19:55:41 +01:00
j91321 98a633e54c Add missing status and falsepositives 2020-03-24 19:53:41 +01:00
j91321 3c74d8b87d Add correct Source to detection to avoid FP 2020-03-24 19:49:24 +01:00
j91321 bc442d3021 Add path with lowercase system32 2020-03-24 19:48:24 +01:00
j91321 78bfa950d7 Add WinPrvSE.exe to detection 2020-03-24 19:47:10 +01:00
Thomas Patzke 5ea623506f Merge pull request #667 from opflep/master
Upgrade CarbonBlack backend
2020-03-22 00:24:57 +01:00
Thomas Patzke c10332b06c Merge pull request #663 from neu5ron/updates_sigmac_and_rules
Updates sigmac and rules
2020-03-22 00:22:31 +01:00
Harish SEGAR ba3994f319 Fix of '1 of x' condition 2020-03-21 12:19:01 +01:00
Harish SEGAR 81b277ba1a suspicious powershell parent process... 2020-03-21 00:26:30 +01:00
Harish SEGAR a88b22a1bd Fix namefield. 2020-03-20 23:34:15 +01:00
Harish SEGAR 67694e4ba7 Restructure new improvement to process_creation folder. 2020-03-20 23:29:32 +01:00
Harish SEGAR b9a916ceb4 Removed useless condition. 2020-03-20 22:50:26 +01:00
Harish SEGAR 30fac9545a Fixed author field. 2020-03-20 22:49:07 +01:00
Harish SEGAR 1f251cec07 Added missing action field 2020-03-20 22:46:19 +01:00
Harish SEGAR 293018a9e7 Added conditions... 2020-03-20 22:33:14 +01:00
Harish SEGAR 74b81120e4 Usage of value modifiers... 2020-03-20 22:03:48 +01:00
Harish SEGAR b129f09fee Improvement detection on downgrade of powershell 2020-03-20 21:48:19 +01:00
Maxime Thiebaut dce18b23b7 Add "Suspicious desktop.ini Action" rule 2020-03-19 21:43:03 +01:00
Maxime Thiebaut c5bdd18d8d Add Winlogbeat's RuleName field to mapping
When Sysmon logs a "RegistryEvent" event of ID 13, the event might contain a field named "RuleName" as shown in the following excerpt.

```xml
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<Events>
	<Event
		xmlns='http://schemas.microsoft.com/win/2004/08/events/event'>
		<System>
			<Provider Name='Microsoft-Windows-Sysmon' Guid='{5770385f-c22a-43e0-bf4c-06f5698ffbd9}'/>
			<EventID>13</EventID>
			<Version>2</Version>
			<Level>4</Level>
			<Task>13</Task>
			<Opcode>0</Opcode>
			<Keywords>0x8000000000000000</Keywords>
			<TimeCreated SystemTime='2020-03-18T03:52:07.173448000Z'/>
			<EventRecordID>160631</EventRecordID>
			<Correlation/>
			<Execution ProcessID='2156' ThreadID='3628'/>
			<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
			<Computer>win10.sec699-40.lab</Computer>
			<Security UserID='S-1-5-18'/>
		</System>
		<EventData>
			<Data Name='RuleName'>Context,ProtectedModeExitOrMacrosUsed</Data>
			<Data Name='EventType'>SetValue</Data>
			<Data Name='UtcTime'>2020-03-18 03:52:07.129</Data>
			<Data Name='ProcessGuid'>{36aa6401-9acb-5e71-0000-0010e3ed6803}</Data>
			<Data Name='ProcessId'>5064</Data>
			<Data Name='Image'>C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE</Data>
			<Data Name='TargetObject'>HKU\S-1-5-21-1850752718-2055233276-2633568556-1126\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents\TrustRecords\%USERPROFILE%/Documents/sec699.docm</Data>
			<Data Name='Details'>Binary Data</Data>
		</EventData>
	</Event>
</Events>
```

When used in combination with Elastic's Winlogbeat, the resulting field is named `winlog.event_data.RuleName`.
This commit introduces a mapping between the Sigma `RuleName` field (pre-existing in the `arcsight.yml` config) and Elastic's `winlog.event_data.RuleName`.

The presence of this field could be leveraged to build Sigma rules detecting events such as the above where a malicious macro was executed.
2020-03-19 19:40:18 +01:00
Florian Roth 6040b1f1f8 Merge pull request #668 from Neo23x0/devel
Devel
2020-03-19 18:36:31 +01:00
vunx2 be6519e35d merge 2020-03-19 11:07:39 +07:00
vunx2 1025930e04 merge 2020-03-19 11:05:52 +07:00
vunx2 c627f6b381 merge 2020-03-19 11:02:10 +07:00
vunx2 2107d86900 merge 2020-03-19 10:58:30 +07:00
vunx2 f3e642f340 merge 2020-03-19 10:54:48 +07:00
vunx2 b9e9408d34 Merge branch 'master' of https://github.com/Neo23x0/sigma 2020-03-19 10:51:37 +07:00
vunx2 0356178c50 eventdict 2020-03-19 10:49:40 +07:00
vunx2 1b12a6b261 modified: tools/sigma/backends/carbonblack.py 2020-03-19 09:00:24 +07:00
neu5ron aa112cbd44 do not escape u 2020-03-18 08:51:38 -04:00
neu5ron 17318b48bf - fix agg_option keyword
- remove (now) unnecessary other hardcoded `.keyword` locations
2020-03-18 08:50:37 -04:00
vunx2 e228d42b97 clean IP subnet 2020-03-18 16:49:44 +07:00
vunx2 1df5620a14 fix cleanValue + leading wildcard + EventID Intergration 2020-03-18 16:02:44 +07:00
Florian Roth 8454f60a8e fix: reduced level due to false positives 2020-03-17 20:40:28 +01:00
Florian Roth 4fb42ffaf7 docs: changed wording in license 2020-03-17 20:38:42 +01:00
j91321 f0c83ae3b4 Added es-rule backend options 2020-03-15 13:03:20 +01:00
neu5ron b575df8cd7 use the taxonomy for http response which is sc-status 2020-03-14 15:02:33 -04:00
neu5ron 4cd99e71bf use the taxonomy which states to use c-uri instead of c-uri-path 2020-03-14 15:02:06 -04:00
neu5ron 4c94906d53 rule should be wildcard AND had a prepended ^ in one of the CommandLine conditions that would have caused to not trigger 2020-03-14 15:00:42 -04:00
neu5ron 4b572f3ccb newline in description - typo 2020-03-14 14:58:58 -04:00
neu5ron d212d43acf spelling 2020-03-14 14:58:25 -04:00
neu5ron 58ac26e531 more ECS to sigmac taxonomy for web/proxy 2020-03-14 14:57:38 -04:00
neu5ron 213cf895b9 Merge remote-tracking branch 'neu5ron-sigma/elastic-keyword_and_analyzed' into elastic-keyword_and_analyzed 2020-03-11 11:40:17 -04:00
neu5ron 55bf39a2ac keyword, analyzed field, case insensitivity 2020-03-11 11:38:56 -04:00
neu5ron 398e4527ea keyword, analyzed field, case insensitivity 2020-03-11 11:29:05 -04:00
Florian Roth cbf0f43934 Merge pull request #655 from msec1203/msec1203-patch-1
add rule for suspicious use of csharp console by scripting utility
2020-03-09 18:01:12 +01:00
Florian Roth 6845fa21b3 fix: fixed several issues 2020-03-09 17:43:16 +01:00
Florian Roth 8a2033aaf9 Merge pull request #657 from EccoTheFlintstone/fix_registry
sysmon registry events fix
2020-03-09 17:38:58 +01:00
David Szili 0947538228 MDATP schema changes
WDATP was renamed to MDATP (Microsoft Defendre ATP).
MDATP also had schema changes recently: https://techcommunity.microsoft.com/t5/microsoft-defender-atp/advanced-hunting-data-schema-changes/ba-p/1043914
The updates reflect these changes
2020-03-09 17:12:41 +01:00
ecco 2489b8534c sysmon registry events fix 2020-03-09 12:02:04 -04:00
Florian Roth c4671f2225 docs: coverage illustration 2020-03-08 13:06:35 +01:00
msec1203 f833407265 Initial upload 2020-03-08 19:06:10 +09:00
Florian Roth 3c3917c1d5 Merge pull request #654 from Neo23x0/devel
Minor changes
2020-03-07 11:20:45 +01:00
Florian Roth ddefb3bc58 Merge branch 'master' into devel 2020-03-07 11:06:25 +01:00
Florian Roth 54d3706a7f docs: removed outdated section from info graphic 2020-03-07 11:05:53 +01:00
Florian Roth 07914c2783 Merge pull request #652 from 2XXE-SRA/patch-1
MMC Lateral Movement Rule 1
2020-03-07 11:02:16 +01:00
Florian Roth 2e184382f5 fix: eventid in process_creation rules 2020-03-07 10:43:47 +01:00
Florian Roth 60279c7501 Merge pull request #610 from axi0m/patch-1
Update proxy_raw_paste_service_access.yml
2020-03-07 10:39:56 +01:00
Florian Roth 7e8b59abe6 Merge pull request #643 from grumo35/patch-2
Update sysmon_cred_dump_tools_dropped_files.yml
2020-03-07 10:39:35 +01:00
Florian Roth c609de4f27 Merge pull request #648 from NVISO-BE/patch-azure-ad-replication
Exclude Azure AD sync accounts from AD Replication rule
2020-03-07 10:39:04 +01:00
Florian Roth b040c129be fix: author field starting with an '@' symbol 2020-03-07 10:38:02 +01:00
Abhijit Khinvasara 07b553daa1 Merge branch 'master' of github.com:abhikhnvasara/sigma 2020-03-04 15:22:17 -08:00
Abhijit Khinvasara 46bc843e51 sort the list of backends presented in sigmac help 2020-03-04 15:21:28 -08:00
Abhijit Khinvasara 6a1f97b69e Merge branch 'master' of github.com:abhikhnvasara/sigma 2020-03-04 15:11:18 -08:00
Abhijit Khinvasara 9cb395823c Rework according to review comments. 2020-03-04 14:54:49 -08:00
2XXE (SRA) ae56db97ff mmc lateral movement detection 1
see https://github.com/Neo23x0/sigma/issues/576
2020-03-04 14:57:41 -05:00
Florian Roth 02d256b3b6 Merge pull request #651 from EccoTheFlintstone/fix_sysmon_registry
fix sysmon registry rules with HKLM/HKU format as used since 02/2017 in sysmon
2020-03-04 20:25:11 +01:00
ecco b9e4734087 fix sysmon registry rules with HKLM/HKU format as used since 02/2017 in sysmon 2020-03-04 12:47:42 -05:00
Florian Roth 6bbb166f3d rule: extended webshell rule with tomcat.exe 2020-03-04 14:25:57 +01:00
Florian Roth 53278c2a46 Merge pull request #649 from Neo23x0/devel
fix: avoiding FPs with Citrix software
2020-03-03 11:35:02 +01:00
Florian Roth f98ad7a8df fix: wrong identifier 2020-03-03 11:25:02 +01:00
Florian Roth be4242aca8 fix avoiding FPs with MpCmdRun
ParentImage: C:\Windows\System32\services.exe
CommandLine: C:\Program Files\Microsoft Security Client\\MpCmdRun.exe
2020-03-03 11:16:59 +01:00
Florian Roth 7139bfb0cb fix: avoiding FPs with Citrix software
writing C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_r23phtye.jsp.ps1
2020-03-03 11:01:42 +01:00
vunx2 b070ffab74 Merge branch 'master' of https://github.com/Neo23x0/sigma 2020-03-03 10:08:31 +07:00
Remco Hofman d4b5dd5749 Exclude Azure AD sync accounts from AD Replication rule 2020-03-02 16:43:20 +01:00
Thomas Patzke b63889af75 Fixed rules that likely will cause false negatives by fix 2020-03-01 23:14:53 +01:00
Thomas Patzke 01bd5cf0e0 Merge branch 'issue-645' 2020-03-01 22:41:13 +01:00
Thomas Patzke 0a62b8747e Merge pull request #634 from EccoTheFlintstone/fp_fix3
Rule: restore initial behaviour matching single word with spaces on each side
2020-03-01 22:40:24 +01:00
Thomas Patzke a0f7da8c03 Splunk XML backend rule title
Fixes #645
2020-03-01 22:23:35 +01:00
Florian Roth a557c727dd Merge pull request #644 from Neo23x0/devel
Devel
2020-02-29 16:17:12 +01:00
Florian Roth 19d383989c fix: keyword expression in rule 2020-02-29 16:03:31 +01:00
Florian Roth 15a400ac51 fix: fixing bug in rule 2020-02-29 15:51:00 +01:00
Florian Roth fa6458b70f rule: two rules to detect CVE-2020-0688 exploitation 2020-02-29 15:45:45 +01:00
Florian Roth fdcba84fc8 fix: escaped backslash 2020-02-29 10:12:59 +01:00
grumo35 0d932810b5 Update sysmon_cred_dump_tools_dropped_files.yml
Adding sysinternal's procdump utility more about this on : https://en.hackndo.com/remote-lsass-dump-passwords/
2020-02-28 15:16:18 +01:00
vunx2 58f5fa1b8e change to github 2020-02-28 16:56:48 +07:00
vunx2 139600009b conflict 2020-02-28 16:50:30 +07:00
Florian Roth 9e86170d79 Merge pull request #641 from NVISO-BE/web_exchange_cve_2020_0688_exploit
CVE 2020-0688 Exploit attempt rule
2020-02-27 13:34:05 +01:00
Remco Hofman 4f45e14a56 Match on c-uri instead of c-uri-path 2020-02-27 13:23:25 +01:00
Remco Hofman ff35eb0052 Title capitalization 2020-02-27 12:56:56 +01:00
Remco Hofman 72e34d2aa5 CVE 2020-0688 Exploit attempt rule 2020-02-27 12:51:10 +01:00
Florian Roth f88225dd2a Merge pull request #640 from Neo23x0/devel
fix: broader exclusion for rule - OneDrive false positives
2020-02-26 18:41:52 +01:00
Florian Roth 6bbd80a8ee fix: broader exclusion for rule - OneDrive false positives 2020-02-26 18:31:58 +01:00
Florian Roth ada0edb822 Merge pull request #621 from wagga40/new_koadic_rule
New Koadic detection rule
2020-02-26 13:25:03 +01:00
Florian Roth 0ba6874645 Merge pull request #638 from Neo23x0/devel
Several false positives with new rules
2020-02-26 09:46:02 +01:00
Florian Roth ca2cc87f0c fixed regex syntax to wildcard syntax 2020-02-26 09:43:29 +01:00
Florian Roth 1c90d6badd level increased 2020-02-26 09:42:31 +01:00
Florian Roth c8afd4a16b Merge pull request #637 from tjgeorgen/patch-1
fix missing status & description in status field
2020-02-26 09:40:55 +01:00
Florian Roth 031e6d3ee6 Merge pull request #635 from EccoTheFlintstone/fix_fp4
wmiprvse subprocess: add fallback check on username instead of only l…
2020-02-26 09:40:34 +01:00
Florian Roth 4f3e3166d3 fixing false positives 2020-02-26 09:33:55 +01:00
Florian Roth 82d2b1e6f0 Merge branch 'master' into devel
# Conflicts:
#	rules/windows/process_creation/win_susp_squirrel_lolbin.yml
2020-02-26 09:27:48 +01:00
Florian Roth e7aff17e72 FP: OneDrive setup 2020-02-26 09:26:19 +01:00
Tom Georgen 74f3fe70cc fix missing status & description in status field 2020-02-25 16:30:41 -05:00
Thomas Patzke 65444f7a77 Release 0.16.0 2020-02-25 22:19:52 +01:00
Thomas Patzke 4e42bebb34 Merge branch 'socprime-master' 2020-02-25 21:32:59 +01:00
Florian Roth a152853ac3 Merge pull request #624 from Antonlovesdnb/master
New rules for Macro Detections
2020-02-25 15:44:31 +01:00
Antonlovesdnb e8b861bff4 Update sysmon_susp_winword_vbadll_load.yml 2020-02-25 09:24:29 -05:00
Antonlovesdnb 4c5d489428 Update sysmon_susp_office_kerberos_dll_load.yml 2020-02-25 09:23:52 -05:00
Antonlovesdnb f92e2f2b18 Update sysmon_susp_office_dotnet_assembly_dll_load.yml 2020-02-25 09:23:22 -05:00
Antonlovesdnb 8141b1ae90 Update sysmon_susp_office_dsparse_dll_load.yml 2020-02-25 09:22:56 -05:00
Antonlovesdnb 45e4a585bf Update sysmon_susp_office_dotnet_gac_dll_load.yml 2020-02-25 09:22:37 -05:00
Antonlovesdnb c5b42aeaed Update sysmon_susp_office_dotnet_clr_dll_load.yml 2020-02-25 09:19:03 -05:00
Antonlovesdnb bb1eecfe14 Update sysmon_susp_office_dotnet_assembly_dll_load.yml 2020-02-25 09:17:33 -05:00
Florian Roth dd1a0e764c docs: more false positive conditions 2020-02-25 11:13:58 +01:00
Florian Roth 950fa18418 fix: changed titles to avoid duplicates 2020-02-25 11:12:47 +01:00
Florian Roth 5d96f81a84 fix: lowered level due to false positives 2020-02-25 11:12:11 +01:00
Florian Roth 8f7ee21d5c docs: detection rule license 2020-02-25 11:09:10 +01:00
Thomas Patzke 5a2ccbd040 Fixed ArcSight backend visibility 2020-02-24 23:27:22 +01:00
Thomas Patzke 6236429f3d Added/changed CI tests 2020-02-24 23:21:11 +01:00
Thomas Patzke 5b42135935 Added es-rule backend to all ES configurations 2020-02-24 23:20:48 +01:00
Thomas Patzke d9b48ea747 Fixes in es-rule backend 2020-02-24 23:20:19 +01:00
Thomas Patzke 4ee2c2762e Sorting of backend and configuration lists 2020-02-24 22:59:59 +01:00
Thomas Patzke 4ac6ddc8ef Merge branch 'changelog' 2020-02-24 22:35:41 +01:00
Thomas Patzke fa717233a9 Updated changelog 2020-02-24 22:30:36 +01:00
vh 5dc30bd388 Carbonblack, Arcsight ESM, Elastic Rule 2020-02-24 19:29:45 +02:00
vh 516e61fdb0 t 2020-02-24 19:23:11 +02:00
ecco 3247d5692a wmiprvse subprocess: add fallback check on username instead of only logonid 2020-02-24 09:25:20 -05:00
ecco df7356e829 Rule: restore initial behaviour matching single word with spaces on each side 2020-02-24 08:00:06 -05:00
Florian Roth 91d1586b97 Merge pull request #633 from EccoTheFlintstone/fix_fp
rule local account discovery: fix FP on rmdir matching dir
2020-02-24 13:41:39 +01:00
ecco aa1eff5419 fix FP on rmdir matching dir 2020-02-24 05:23:23 -05:00
Florian Roth bfab143c7c Merge pull request #632 from EccoTheFlintstone/fp_fix
fix false positive on taskkill.exe not related to service stop at all
2020-02-24 09:58:33 +01:00
Florian Roth 53ca71e7ae Merge pull request #631 from EccoTheFlintstone/ascii_fix
fix non ascii character in rule (probably a typo)
2020-02-24 09:58:13 +01:00
ecco f807dae69a fix false positive on taskkill.exe not related to service stop at all 2020-02-24 03:03:46 -05:00
ecco 1703b725d3 fix non ascii character in rule 2020-02-24 02:58:34 -05:00
Abhijit Khinvasara 8ad346362c remove print statements. 2020-02-22 20:59:56 -08:00
Abhijit Khinvasara 612df1666b add LOGIQ backend. 2020-02-22 20:50:30 -08:00
Thomas Patzke 12be884aa5 Merge branch 'sql-backend' 2020-02-21 22:41:53 +01:00
Thomas Patzke 776b58b594 Improved Splunk Zeek configuration 2020-02-21 22:31:14 +01:00
Thomas Patzke fa4c76871f Added CI test for sql backend 2020-02-21 22:27:55 +01:00
Thomas Patzke 746f957a63 Merge branch 'patch-1' of https://github.com/fuseyjz/sigma into fuseyjz-patch-1 2020-02-21 22:24:44 +01:00
Thomas Patzke 3047571132 Merge pull request #625 from ninoseki/fix-sigma2misp
Update sigma2misp
2020-02-21 22:22:54 +01:00
Florian Roth ab1dda7685 fix: non-ascii rule 2020-02-21 16:21:39 +01:00
Thomas Patzke 61d31c3f3a Fixed tagging 2020-02-20 23:51:12 +01:00
Thomas Patzke 48d95f027c Merge branch 'oscd' 2020-02-20 23:11:57 +01:00
Thomas Patzke 373424f145 Rule fixes
Made tests pass the new CI tests. Added further allowed lower case words
in rule test.
2020-02-20 23:00:16 +01:00
Manabu Niseki c6eb3bfbf2 Update sigma2misp
Make enable to use with modern PyMISP
2020-02-20 18:55:10 +09:00
Antonlovesdnb 9625a94d0b Update sysmon_susp_office_dotnet_assembly_dll_load.yml 2020-02-19 14:52:31 -05:00
Antonlovesdnb 6234f72a6c Update sysmon_susp_office_dotnet_clr_dll_load.yml 2020-02-19 14:52:09 -05:00
Antonlovesdnb 328858279f Update sysmon_susp_office_kerberos_dll_load.yml 2020-02-19 14:51:50 -05:00
Antonlovesdnb 1f01fe446f Update sysmon_susp_office_dsparse_dll_load.yml 2020-02-19 14:51:22 -05:00
Antonlovesdnb 6d0805ac13 Update sysmon_susp_winword_vbadll_load.yml 2020-02-19 14:51:00 -05:00
Antonlovesdnb 1e461cb2d1 Update sysmon_susp_office_dotnet_gac_dll_load.yml 2020-02-19 14:50:31 -05:00
Antonlovesdnb 56ffa9ec0e Update sysmon_registry_trust_record_modification.yml 2020-02-19 14:50:09 -05:00
Antonlovesdnb 397cdecb94 5 Rules covering various macro techniques
- Rule to look for GAC DLL loaded by an Office Product
- Rule to look for any DLL in C:\Windows\assembly loaded by an Office Product
- Rule to look for clr.dll loaded by an Office Product
- Rule to look for directory services parsing dll loaded by an Office Product
- Rule to look for kerberos dll loaded by an Office Product
2020-02-19 14:43:13 -05:00
Antonlovesdnb f8be92dae0 Add files via upload 2020-02-19 10:13:44 -05:00
Florian Roth a9403b70d5 Merge pull request #623 from Neo23x0/devel
fix: fixing too restrictive rule
2020-02-18 11:14:51 +01:00
Florian Roth 6413730810 fix: fixing too restrictive rule
https://twitter.com/Hexacorn/status/1229702521679118336
2020-02-18 10:43:22 +01:00
Florian Roth f7a6ffa121 Merge pull request #622 from Neo23x0/devel
Minor changes, process dump via rundll32 comsvcs.dll
2020-02-18 10:26:28 +01:00
Florian Roth 04b97bd84c fix: character in filename 2020-02-18 10:19:48 +01:00
Florian Roth 5a4095f13f fix: restored GPL 2020-02-18 10:06:00 +01:00
Florian Roth cd607d4fed rule: process dump via rundll32 and comsvcs.dll's MiniDumpW 2020-02-18 10:04:55 +01:00
Florian Roth 73dfc847fc rule: changed lsass process dump to level high 2020-02-18 10:03:25 +01:00
yugoslavskiy 7f3f1944d9 fix redundancy 2020-02-18 01:10:56 +03:00
Florian Roth 2363213fc9 add TimeSketch to list of products that use Sigma 2020-02-17 08:41:23 +01:00
Thomas Patzke 01d6c3b58d Fixes 2020-02-16 23:24:00 +01:00
Wagga b9c745a1b2 New Koadic detection rule 2020-02-16 16:48:49 +01:00
yugoslavskiy d0e284ae18 fix typo (duplicates) 2020-02-16 18:19:25 +03:00
yugoslavskiy 168ab7c620 Merge branch 'oscd' of https://github.com/Neo23x0/sigma into oscd 2020-02-16 17:57:48 +03:00
Thomas Patzke f118839664 Further fixes and deduplications
From suggestions of @yugoslavskiy in issue #554.
2020-02-16 14:03:07 +01:00
Thomas Patzke 77c927bc14 Revert "Moved rules with enrichments into unsupported"
This reverts commit ba83b8862a.
2020-02-15 22:52:06 +01:00
Florian Roth eb36150e6b rule: UserAgent used by PowerTon malware 2020-02-15 19:06:49 +01:00
Florian Roth d909fefa82 Merge pull request #620 from james0d0a/master
rule: Zeek Suspicious kerberos network traffic RC4
2020-02-13 09:34:06 +01:00
Florian Roth 94bb7dd77f fix: issues 2020-02-13 09:17:21 +01:00
Florian Roth 983f7fcd39 Merge pull request #618 from faloker/master
More rules for AWS events
2020-02-13 09:15:04 +01:00
james dickenson 21e4aa33dc rule modification: fixed filter condition on zeek suspicious rc4 traffic 2020-02-12 21:27:36 -08:00
james dickenson 1347e5060f logsource config for zeek events in splunk 2020-02-12 21:24:03 -08:00
james dickenson 93367d725d rule: zeek suspicious kerberos RC4 traffic 2020-02-12 21:21:46 -08:00
faloker 6d9c8e44d7 Update rules titles 2020-02-12 23:09:16 +02:00
faloker 1b15dba712 Correct the indentation 2020-02-12 22:48:46 +02:00
faloker f387cf0c37 Add the rule to detect changes to startup scripts 2020-02-12 22:23:18 +02:00
faloker 01d2f9f99d Add the rule to detect backdooring of users keys 2020-02-12 22:22:38 +02:00
faloker b26c5d8c51 Add rules to detect AWS RDS exfiltration 2020-02-12 22:21:52 +02:00
faloker ddf5f8ec23 Update conditions 2020-02-12 22:20:15 +02:00
faloker aacab37f84 Add a rule for guardduty trusted IPs manipulation 2020-02-11 23:28:23 +02:00
faloker b6c834195e Add a rule for ec2 userdata exfil 2020-02-11 23:25:54 +02:00
Florian Roth 7a5587f14d Merge pull request #616 from Neo23x0/devel
rule: remove keywords in powershell rule prone to FPs
2020-02-11 16:43:01 +01:00
Florian Roth a4c210ed16 rule: remove keywords in powershell rule prone to FPs 2020-02-11 16:26:17 +01:00
Florian Roth bf98d286f9 Merge pull request #615 from Neo23x0/devel
fix: dumpert rule with wrong sysmon event id
2020-02-08 20:03:28 +01:00
Florian Roth d9645af840 rule: added Emotet UA
https://twitter.com/webbthewombat/status/1225827092132179968
2020-02-08 10:37:56 +01:00
Florian Roth 880a0b5593 Merge pull request #614 from timbMSFT/gallium_vpn
additional gallium ttp
2020-02-07 17:56:09 +01:00
Florian Roth 080532d20c logsource change
I've swapped the lines in the logsource section to make it clearer that the category "process_creation" covers all sources that generate process creation logs on the windows platform.
2020-02-07 15:47:27 +01:00
Tim Burrell (MSTIC) f70f847524 additional gallium ttp
sha1 process creation only makes sense for sysmon
2020-02-07 14:08:40 +00:00
Florian Roth be9b80d6ab fix: dumpert rule with wrong sysmon event id 2020-02-07 13:14:18 +01:00
Thomas Patzke 7fdd6f7bce Swapped accidental deletion of older rule duplicate 2020-02-06 23:41:05 +01:00
vunx2 d0e9af171f cleanIPRange 2020-02-06 17:20:52 +07:00
vunx2 627f46abc2 backslash fix 2020-02-06 16:28:27 +07:00
vunx2 bc4c6ce8db cleanValue 2020-02-06 11:02:22 +07:00
vunx2 19d9e4856e clean Value + config 2020-02-05 17:47:35 +07:00
Florian Roth 1a80b180fd Merge pull request #613 from Neo23x0/devel
rule: dumpert process dump tool
2020-02-04 23:07:07 +01:00
Florian Roth 10490a6cee rule: reworked dumpert rule 2020-02-04 22:56:04 +01:00
Florian Roth 1f44969afd rule: avoiding build issues with sysmon event id 1 2020-02-04 22:50:46 +01:00
Florian Roth 535e2d149b rule: improved dumpert rule 2020-02-04 22:46:16 +01:00
Florian Roth 8f8b977c85 rule: dumpert process dump tool 2020-02-04 22:38:06 +01:00
vunx2 579e7481c7 cleanValue + eventID list 2020-02-04 18:14:40 +07:00
Thomas Patzke d7bd90cb24 Merge branch 'master' into oscd 2020-02-03 23:13:16 +01:00
Thomas Patzke f7394d09e0 Deduplication 2020-02-03 22:41:55 +01:00
Thomas Patzke 1bc2c0b930 Deduplication of backend list
Fixes issue #609. Added backend list debug output (class name).
2020-02-03 22:16:00 +01:00
Thomas Patzke 666542ae7f Added colorama to Pipfile 2020-02-03 22:15:27 +01:00
Kevin Dienst 98471bc53c Update proxy_raw_paste_service_access.yml
Add another paste provider website, ghostbin.co to the list. Note that saved pastes generate pseudo random 5 character strings before being suffixed with `/raw` at the end of the URL. e.g. `https://ghostbin.co/paste/y4e9a/raw`

Thus, I've added a regex match between /paste and /raw. I'm unsure if this is supported, I skimmed the Sigma specification wiki but didn't see anything other than that contains adds '*' to end and beginning of each selection. If this regex isn't going to work then I'd imagine we just have to remove the `.+/raw/` from the URI.
2020-02-03 07:29:42 -06:00
vunx2 2930df17d6 update sigma 2020-02-03 09:47:06 +07:00
Thomas Patzke 815c562a17 Merge branch 'master' into oscd 2020-02-02 13:40:08 +01:00
Thomas Patzke f59b36d891 Fixed rule 2020-02-02 12:54:56 +01:00
Thomas Patzke ba83b8862a Moved rules with enrichments into unsupported 2020-02-02 12:46:03 +01:00
Thomas Patzke 593abb1cce OSCD QA wave 3 2020-02-02 12:41:12 +01:00
Florian Roth 016d726d4e fix: bug in formatting 2020-02-02 11:31:39 +01:00
Florian Roth dcc7d03c37 docs: better description 2020-02-02 11:31:22 +01:00
Florian Roth 296cf6aa08 fix: fixed examples and added a new one 2020-02-02 09:27:56 +01:00
Florian Roth 68b34467a8 Merge pull request #608 from yt0ng/development
additional execution observed
2020-02-02 08:37:59 +01:00
Neis Markus 0d7f55948c additional execution observed 2020-02-02 08:07:00 +01:00
Florian Roth aa8a0f5e1f Merge pull request #606 from Neo23x0/devel
refactor: moved rues from 'apt' folder in respective folders
2020-02-01 18:25:19 +01:00
Florian Roth 03ecb3b8dc refactor: moved rues from 'apt' folder in respective folders 2020-02-01 17:59:26 +01:00
Florian Roth 6ea861da53 Merge pull request #605 from Neo23x0/devel
Winnti rule and helpful message in test script
2020-02-01 15:51:16 +01:00
Florian Roth a752e6c95f rule: winnti group campaign against HK universities 2020-02-01 15:43:30 +01:00
Florian Roth 9876623710 doc: helpful link in error message 2020-02-01 15:43:11 +01:00
vh dc5a31aebc Updated Azure Sentinel backend 2020-01-31 17:17:24 +02:00
Florian Roth 5b157efd7e Merge pull request #340 from virtuallaik/master
Create powershell_nishang_malicious_commandlets.yml + edits
2020-01-31 15:37:59 +01:00
Florian Roth 7a222920df added 'date' 2020-01-31 15:27:30 +01:00
Florian Roth 913c839780 added 'id' 2020-01-31 15:26:43 +01:00
Florian Roth 848e0c90e4 Merge branch 'master' into master 2020-01-31 14:45:29 +01:00
Florian Roth aba4f37517 Merge pull request #366 from dvas0004/patch-1
Update win_alert_ad_user_backdoors.yml
2020-01-31 14:41:50 +01:00
Florian Roth 1213712978 Merge branch 'master' into patch-1 2020-01-31 14:32:27 +01:00
Florian Roth afecca3c13 Merge pull request #511 from 4A616D6573/patch-3
Created win_susp_local_anon_logon_created.yml
2020-01-31 14:30:54 +01:00
Florian Roth 70034bd793 Merge pull request #388 from yt0ng/Renamed_Files
Renamed Jusched
2020-01-31 14:18:28 +01:00
Florian Roth 8c4aadb423 Merge branch 'master' into Renamed_Files 2020-01-31 08:49:10 +01:00
Florian Roth 190afcac88 Missing ID, wrong tag 2020-01-31 07:32:28 +01:00
Florian Roth e3d61d5579 Missing ID 2020-01-31 07:31:56 +01:00
Florian Roth 033ab26d5e Added date 2020-01-31 07:21:02 +01:00
Florian Roth 82cae6d63c Merge pull request #604 from Neo23x0/devel
New tests, colorized test output and rule cleanup
2020-01-31 07:07:13 +01:00
Florian Roth ae2c186872 rule: wsreset.exe UAC bypass 2020-01-30 18:05:47 +01:00
Florian Roth 1735614747 feat: rule title tests 2020-01-30 17:26:21 +01:00
Florian Roth d42e87edd7 fix: fixed casing and long rule titles 2020-01-30 17:26:09 +01:00
Florian Roth 43af93a678 feat: detect missing date 2020-01-30 16:08:34 +01:00
Florian Roth 14e7b17eb9 feat: detect missing id 2020-01-30 16:08:24 +01:00
Florian Roth 93e1299010 style: PEP8 in test_rules.py 2020-01-30 16:08:10 +01:00
Florian Roth e79e99c4aa fix: fixed missing date fields in remaining files 2020-01-30 16:07:37 +01:00
Thomas Patzke 4fa0ae7259 Merge branch 'ruleid' 2020-01-30 16:03:10 +01:00
Florian Roth efd3af0812 fix: fixed missing date fields in other files 2020-01-30 15:32:39 +01:00
Florian Roth 617ece1aa2 fix: fixed missing date fields in proxy rules 2020-01-30 15:20:52 +01:00
Florian Roth 4ad71c44bc chore: moved network device rules to the 'network' folder 2020-01-30 14:30:26 +01:00
Florian Roth 5130072b04 Merge pull request #529 from c2defense/master
Network Device Analytics
2020-01-30 14:28:44 +01:00
Florian Roth 30d872f98f Merge pull request #492 from booberry46/master
Bypass Windows Defender
2020-01-30 14:27:30 +01:00
Thomas Patzke 7b4ec734a8 Using rule ids as Kibana object id 2020-01-30 11:30:01 +01:00
Florian Roth 598b750f48 Minor change 2020-01-30 10:31:16 +01:00
Florian Roth 8cef4b2941 fix: missing id 2020-01-30 10:14:18 +01:00
Florian Roth bf81ff90a8 fix: using a specific field 2020-01-30 10:13:33 +01:00
Florian Roth 0207eeece4 fix: hyphen 2020-01-30 10:10:03 +01:00
Florian Roth 2f1890b5e8 Update win_rdp_reverse_tunnel.yml 2020-01-30 10:09:41 +01:00
Florian Roth 8ec0060938 fix: fixing bug 2020-01-30 10:09:22 +01:00
Florian Roth 6ca100cabf reverted changes 2020-01-30 10:08:25 +01:00
Florian Roth 0a4d32c7c7 fix: fixing issues 2020-01-30 10:07:24 +01:00
Florian Roth 9828d7f81d re-added old reference 2020-01-30 10:03:09 +01:00
Florian Roth d90ea6d267 improved rule 2020-01-30 09:58:32 +01:00
Florian Roth f8e022a709 Fixed indentation 2020-01-30 09:54:41 +01:00
Florian Roth d2122b6b83 Merge pull request #594 from sreemanshanker/master
Sigma rule to Monitor for writing of malicious files to system32 and syswow64 folders
2020-01-30 09:14:58 +01:00
Florian Roth 6adc732d79 Merge pull request #603 from Neo23x0/devel
Colorized Testing
2020-01-30 09:14:25 +01:00
Florian Roth f84b3abf2d fix: missing commas in list 2020-01-30 08:56:13 +01:00
Florian Roth aa5ce18abc feat: support of new MITRE ATT&CK tags 2020-01-30 08:55:44 +01:00
Florian Roth 2c38c53829 fix: removed test rule 2020-01-30 08:52:33 +01:00
Florian Roth 7bf472834b feat: colorized error messages 2020-01-30 08:50:22 +01:00
Florian Roth 9d96b7c1a3 fix: print_error function not global 2020-01-30 08:39:58 +01:00
Florian Roth fe6c30fa59 feat: colorized output in test 2020-01-30 08:37:47 +01:00
Florian Roth a01773681a fix: filename 2020-01-30 08:18:29 +01:00
Florian Roth 529e95e3a5 Fixed everything
This rule had a lot of errors and problems. 
- title
- file name 
- status stable > experimental
- field order
- indentation
- unnecessary use of regular expressions
- interesting fields incomplete
- missing date
- missing id
- reference not as list
2020-01-30 08:17:46 +01:00
Florian Roth 4c90e636b1 changed file name 2020-01-30 08:07:56 +01:00
Florian Roth a935cea665 fix: condition 2020-01-30 08:06:53 +01:00
sreemanshanker d5c7b4795d Add files via upload 2020-01-30 11:29:01 +08:00
Florian Roth 647d98ac71 Merge pull request #599 from vitaliy0x1/master
Detection Rules for AWS events
2020-01-29 21:01:20 +01:00
Florian Roth 376092cfd3 Merge pull request #565 from RiccardoAncarani/master
Add Covenant default named pipe
2020-01-29 20:28:00 +01:00
Florian Roth 05d7448a9a Minor Changes 2020-01-29 20:25:46 +01:00
Florian Roth d1357ddc50 Minor changes 2020-01-29 20:25:14 +01:00
Florian Roth 8a4f9ad7f8 Minor changes 2020-01-29 20:24:31 +01:00
Florian Roth a6d7af270d Added date 2020-01-29 20:23:40 +01:00
Florian Roth 56e1e6b13d Lower case service name 2020-01-29 20:23:12 +01:00
Florian Roth f1ce6ba6ad Lowering level
Lowering level to medium for events that can have a legitimate cause
2020-01-29 20:22:34 +01:00
Florian Roth eac484092c fix: changed hashes field to sha1 for better consistency 2020-01-29 19:52:24 +01:00
Florian Roth 56576b539f Merge pull request #602 from Neo23x0/devel
rule: FromBase64String command line
2020-01-29 16:12:29 +01:00
Florian Roth a816f4775f rule: FromBase64String command line 2020-01-29 16:05:12 +01:00
Florian Roth 1948fd94bd Merge pull request #601 from Neo23x0/devel
Devel
2020-01-28 11:35:57 +01:00
Florian Roth 7786edac29 rule: dctask64.exe evasion techniques
https://twitter.com/gN3mes1s/status/1222088214581825540
2020-01-28 11:29:24 +01:00
Florian Roth d48fc9d1ff fix: multiple false positive conditions 2020-01-28 10:11:09 +01:00
Florian Roth 240b764660 rule: reduced level of system time mod rule 2020-01-27 14:30:09 +01:00
Florian Roth 60f55cbd2b Merge pull request #590 from Neo23x0/devel
Devel
2020-01-24 16:29:19 +01:00
Florian Roth df324a59c5 Merge branch 'master' into devel 2020-01-24 16:21:53 +01:00
Florian Roth 5f0589b787 rule: mstsc shadowing 2020-01-24 16:18:19 +01:00
Florian Roth e24ea159f3 rule: split up renamed binary rule 2020-01-24 15:31:07 +01:00
2d4d bace799f07 complete_cve_2019-19781 2020-01-24 15:31:06 +01:00
Florian Roth 4066ae6371 rule: added a reference 2020-01-24 15:31:06 +01:00
Florian Roth 11607a8621 rule: windows audit cve 2020-01-24 15:31:06 +01:00
Florian Roth f40a7aab3d rule: changes at Shitrix rule 2020-01-24 15:31:06 +01:00
Thomas Patzke d408c0fd34 Added ala-rule backend to CI testing 2020-01-24 15:31:06 +01:00
Thomas Patzke 8525e9e961 Moved ala-rule backend code into ala backend module 2020-01-24 15:31:06 +01:00
sbousseaden a4e62fcb1b Update win_lm_namedpipe.yml 2020-01-24 15:31:06 +01:00
neu5ron ee1ae805d3 fix name of network_initiated 2020-01-24 15:31:06 +01:00
2d4d 341ed340a3 add newbm.pl 2020-01-24 15:31:06 +01:00
Florian Roth 4e07a786a7 rule: updated netscaler rule 2020-01-24 15:31:06 +01:00
Florian Roth c22f7b0b65 fix: shortened path in Citrix Netscaler rule 2020-01-24 15:31:06 +01:00
2d4d d0230f0024 add rule for Citrix Netscaler CVE-2019-19781 2020-01-24 15:31:06 +01:00
2d4d 0bde8b5f00 add rule for Citrix Netscaler CVE-2019-19781 2020-01-24 15:31:06 +01:00
Tim Burrell (MSTIC) a371cf1057 fixup - unique rule id; use process_creation instead of sysmon EventID:1 2020-01-24 15:31:06 +01:00
Tim Burrell (MSTIC) c24bbdcf81 Sigma queries for
-- terminating threads in a svchost process (InvokePhantom uses this technique to disable windows event logging)
-- GALLIUM threat intel IOCs in recent MSTIC blog/release.
2020-01-24 15:31:06 +01:00
Maxime Lamothe-Brassard d1774f7735 Fixed actual event tag 2020-01-24 15:31:06 +01:00
Maxime Lamothe-Brassard 1bfb809b6f Mapping OriginalFileName to event/INTERNAL_NAME now that it's available. 2020-01-24 15:31:06 +01:00
SOC Prime 2aae27f0a4 Update ala-rule.py 2020-01-24 15:31:06 +01:00
SOC Prime 85f09419fb Update ala-rule.py 2020-01-24 15:31:06 +01:00
vh 8d30459532 Azure Sentinel backend (ala) - Fixed path in query
Added new backend Azure Sentinel Rule (ala-rule)
2020-01-24 15:31:06 +01:00
msec1203 4f29556a01 Update win_susp_winword_wmidll_load.yml
Update x2
2020-01-24 15:31:06 +01:00
msec1203 48a071ad4e Update win_susp_winword_wmidll_load.yml
Fix to error on incorrect mitre tags used.
2020-01-24 15:31:06 +01:00
GelosSnake 8fbe08d5fa Update win_system_exe_anomaly.yml
fixing to much original fork.
2020-01-24 15:31:06 +01:00
GelosSnake 9f3672fdc0 Update win_system_exe_anomaly.yml
Following sigma event I've noticed my twitter account was referenced:
https://twitter.com/GelosSnake/status/934900723426439170

Rule:
https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_system_exe_anomaly.yml

Seems like - '\SystemRoot\System32\\*' is missing and hence triggering an FP.
2020-01-24 15:31:06 +01:00
msec1203 4260d01ff0 Initial Upload
Submit Sigma Rule For Detecting Word Loading WMI DLL's.
2020-01-24 15:31:06 +01:00
Justin Schoenfeld 5f8b152166 Added new sticky key attack binary 2020-01-24 15:31:06 +01:00
david-burkett 5d04c76f68 svchost spawned without cli 2020-01-24 15:31:06 +01:00
Florian Roth 72341f08c5 Added MITRE ATT&CK Technique T1482
https://attack.mitre.org/techniques/T1482/
2020-01-24 15:31:06 +01:00
david-burkett 032c382184 corrected logic 2020-01-24 15:31:06 +01:00
David Burkett 991e3b8a51 Trickbot behavioral recon activity 2020-01-24 15:31:06 +01:00
Alessio Dalla Piazza 9f7eee8bb1 Add the ability to detect PowerUp - Invoke-AllChecks
PowerUp allow attackers to check if is possible to have a local privilege escalation attacks against Windows systems. The main function is called "Invoke-AllChecks" and check possible path of escalation.
2020-01-24 15:31:06 +01:00
Thomas Patzke 0f4aef1000 Added sigma2attack to CI testing 2020-01-24 15:31:06 +01:00
vitaliy0x1 5aa75a90fd added aws_root_account_usage.yml 2020-01-21 15:07:32 +02:00
vitaliy0x1 0d6642abd6 added aws_config_disable_recording.yml 2020-01-21 15:07:10 +02:00
vitaliy0x1 17c00d8a11 added aws_cloudtrail_disable_logging.yml 2020-01-21 15:06:44 +02:00
Vitaliy ffcc2dc049 Merge pull request #1 from Neo23x0/master (fetch upstream)
fetch upstream
2020-01-20 14:18:48 +02:00
Thomas Patzke 5f1e933b93 Merge pull request #588 from timbMSFT/timb
Sigma queries - defense evasion by tampering with svchost; recently released GALLIUM activity group IOCs
2020-01-20 10:06:06 +01:00
Thomas Patzke 9bb50f3d60 OSCD QA wave 2
* Improved rules
* Added filtering
* Adjusted severity
2020-01-17 15:46:28 +01:00
Florian Roth e9012d57f7 Merge pull request #596 from 2d4d/master
complete_cve_2019-19781
2020-01-16 12:46:25 +01:00
2d4d e35ebcc185 complete_cve_2019-19781 2020-01-15 21:59:33 +01:00
Florian Roth 41c4a499b4 rule: added a reference 2020-01-15 21:27:40 +01:00
Florian Roth 6db20d4bad rule: windows audit cve 2020-01-15 21:23:32 +01:00
Florian Roth 5ef64e4e99 rule: changes at Shitrix rule 2020-01-13 20:15:08 +01:00
Florian Roth a0bad54dbd Merge pull request #592 from 2d4d/fix_web_citrix_cve_2019_19781_exploit.yml
add newbm.pl
2020-01-13 14:48:38 +01:00
Thomas Patzke 7216fe400f Merge branch 'ala-rule' 2020-01-13 13:49:53 +01:00
Thomas Patzke d95a2606f0 Merge branch 'socprime-master' into ala-rule 2020-01-13 13:48:19 +01:00
Thomas Patzke 638d461b16 Added ala-rule backend to CI testing 2020-01-13 13:47:11 +01:00
Thomas Patzke 7b62b931ce Moved ala-rule backend code into ala backend module 2020-01-13 11:24:46 +01:00
Florian Roth e89b4b1c1f Merge pull request #595 from sbousseaden/patch-1
Update win_lm_namedpipe.yml
2020-01-13 11:21:24 +01:00
Thomas Patzke de690cbfbf Merge branch 'master' of https://github.com/socprime/sigma into socprime-master 2020-01-13 11:19:39 +01:00
sbousseaden b60671397d Update win_lm_namedpipe.yml 2020-01-13 10:50:35 +01:00
Florian Roth ba7c634f1a More changes 2020-01-13 09:59:14 +01:00
Florian Roth 7bd820c151 Changes 2020-01-13 09:56:49 +01:00
Florian Roth 53d76a69c1 Merge pull request #593 from neu5ron/updates_to_sigma_master
HELK SIGMAC fix name of network_initiated
2020-01-13 09:51:13 +01:00
sreemanshanker 8833b43cea Merge pull request #1 from sreemanshanker/sreemanshanker-patch-1
Add files via upload
2020-01-13 13:21:29 +08:00
sreemanshanker ffcfcb70ad Add files via upload 2020-01-13 13:21:06 +08:00
neu5ron d8b703462d fix name of network_initiated 2020-01-13 00:12:04 -05:00
2d4d 364e859a6b add newbm.pl 2020-01-12 00:29:10 +01:00
Thomas Patzke ae6fcefbcd Removed ATT&CK technique ids from titles and added tags 2020-01-11 00:33:50 +01:00
Thomas Patzke 8d6a507ec4 OSCD QA wave 1
* Checked all rules against Mordor and EVTX samples datasets
* Added field names
* Some severity adjustments
* Fixes
2020-01-11 00:11:27 +01:00
Thomas Patzke b34bf98c61 Fixed rule: added condition 2020-01-07 15:20:16 +01:00
Florian Roth a29c832b6a rule: updated netscaler rule 2020-01-07 14:42:16 +01:00
Florian Roth c9a75a8371 fix: shortened path in Citrix Netscaler rule 2020-01-07 13:00:28 +01:00
Florian Roth 48f5f480fd fix: SCCM false positives with whoami.exe rule 2020-01-07 12:13:47 +01:00
Florian Roth b03a43ca1b Merge pull request #589 from 2d4d/add_cve_2019-19781
add rule for Citrix Netscaler CVE-2019-19781
2020-01-06 14:15:46 +01:00
2d4d 35fbdd1248 add rule for Citrix Netscaler CVE-2019-19781 2020-01-03 01:48:29 +01:00
2d4d b98e57603e add rule for Citrix Netscaler CVE-2019-19781 2020-01-03 00:34:52 +01:00
Tim Burrell (MSTIC) 9bd0402681 fixup - unique rule id; use process_creation instead of sysmon EventID:1 2020-01-02 20:05:28 +00:00
Tim Burrell (MSTIC) 5051334e85 Sigma queries for
-- terminating threads in a svchost process (InvokePhantom uses this technique to disable windows event logging)
-- GALLIUM threat intel IOCs in recent MSTIC blog/release.
2020-01-02 14:47:55 +00:00
Florian Roth fd28a64591 rule: WCE 2019-12-31 09:27:38 +01:00
Florian Roth ed5c77e1be Merge pull request #587 from refractionPOINT/internal-name
Adding LimaCharlie support for OriginalFileName field.
2019-12-31 08:32:51 +01:00
Maxime Lamothe-Brassard a3ad7cb1c5 Fixed actual event tag 2019-12-30 18:15:12 -08:00
Maxime Lamothe-Brassard 9b32086d92 Mapping OriginalFileName to event/INTERNAL_NAME now that it's available. 2019-12-30 15:58:18 -08:00
SOC Prime 92bc96a308 Update ala-rule.py 2019-12-30 16:26:30 +02:00
vh f2117f798a Fix ala-rule 2019-12-30 16:24:08 +02:00
SOC Prime f015c97dff Update ala-rule.py 2019-12-30 16:13:27 +02:00
vh f9570a48cb Azure Sentinel backend (ala) - Fixed path in query
Added new backend Azure Sentinel Rule (ala-rule)
2019-12-30 16:11:53 +02:00
vh d42409372c Azure Sentinel backend (ala) - Fixed path in query
Added new backend Azure Sentinel Rule (ala-rule)
2019-12-30 16:09:19 +02:00
Florian Roth c007ecf90c Merge pull request #585 from Neo23x0/devel
Devel
2019-12-30 15:08:43 +01:00
SOC Prime 9c18f20e7b Merge pull request #3 from Neo23x0/master
latest sigmac
2019-12-30 16:02:46 +02:00
Florian Roth 5980cb8d0c rule: copy from admin share - lateral movement 2019-12-30 14:25:43 +01:00
Florian Roth 86e6b92903 rule: SecurityXploded tool 2019-12-30 14:25:29 +01:00
Florian Roth 5ad793e04a Merge pull request #582 from tvjust/patch-1
Added new sticky key attack binary
2019-12-30 14:14:20 +01:00
Florian Roth 948af2993b Merge pull request #583 from msec1203/msec1203-submit-rule1
MS Office Doc Load WMI DLL Rule
2019-12-30 14:13:58 +01:00
msec1203 dbdf6680e0 Update win_susp_winword_wmidll_load.yml
Update x2
2019-12-30 18:49:39 +09:00
msec1203 a45f877712 Update win_susp_winword_wmidll_load.yml
Fix to error on incorrect mitre tags used.
2019-12-30 18:41:16 +09:00
Florian Roth e043bc2193 Merge pull request #584 from GelosSnake/master
FP in win_system_exe_anomaly.yml
2019-12-29 18:52:43 +01:00
GelosSnake f574c20432 Update win_system_exe_anomaly.yml
fixing to much original fork.
2019-12-29 18:02:49 +02:00
GelosSnake 7e7f6d1182 Update win_system_exe_anomaly.yml
Following sigma event I've noticed my twitter account was referenced:
https://twitter.com/GelosSnake/status/934900723426439170

Rule:
https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_system_exe_anomaly.yml

Seems like - '\SystemRoot\System32\\*' is missing and hence triggering an FP.
2019-12-29 18:01:19 +02:00
msec1203 845d67f1f3 Initial Upload
Submit Sigma Rule For Detecting Word Loading WMI DLL's.
2019-12-29 23:14:29 +09:00
Justin Schoenfeld a1f07cdb4b Added new sticky key attack binary 2019-12-29 08:32:23 -05:00
Florian Roth 042c58dfc1 Merge pull request #581 from david-burkett/master
Trickbot behavioral recon activity / svchost spawned without CLI
2019-12-28 18:11:34 +01:00
david-burkett 4a65a25070 svchost spawned without cli 2019-12-28 10:28:08 -05:00
Florian Roth 5e59bbb3c3 Added MITRE ATT&CK Technique T1482
https://attack.mitre.org/techniques/T1482/
2019-12-28 16:02:26 +01:00
david-burkett 35b4806104 corrected logic 2019-12-28 09:55:39 -05:00
David Burkett 474a8617e5 Trickbot behavioral recon activity 2019-12-27 21:25:53 -05:00
Yugoslavskiy Daniil 3a3cd5a830 Merge branch 'master' into oscd 2019-12-28 03:27:13 +03:00
fuseyjz 0b2f88d5df Sigma converter for SQL format
Get the converted SQL query after the WHERE statement for any filtering on SQL platform.

Example:
https://github.com/fuseyjz/sigma-sql/blob/master/README.md
2019-12-24 10:42:25 +08:00
Florian Roth 62bd2cc3ab Merge pull request #572 from alessiodallapiazza/master
Add the ability to detect PowerUp - Invoke-AllChecks
2019-12-23 12:57:55 +01:00
Alessio Dalla Piazza 0ff81cc693 Merge pull request #1 from alessiodallapiazza/alessiodallapiazza-patch-1
Add the ability to detect PowerUp - Invoke-AllChecks
2019-12-23 11:51:34 +01:00
Alessio Dalla Piazza f45587074b Add the ability to detect PowerUp - Invoke-AllChecks
PowerUp allow attackers to check if is possible to have a local privilege escalation attacks against Windows systems. The main function is called "Invoke-AllChecks" and check possible path of escalation.
2019-12-23 11:50:57 +01:00
Florian Roth 04afcccd2c Merge pull request #571 from Neo23x0/devel
rule: whoami as local system
2019-12-22 19:23:50 +01:00
Florian Roth fc8607bbea rule: whoami as local system 2019-12-22 18:50:26 +01:00
Florian Roth a7ca386a1b Merge pull request #570 from Neo23x0/devel
CreateMiniDump
2019-12-22 08:40:45 +01:00
Florian Roth fb76f2b9ac rule: CreateMiniDump 2019-12-22 08:29:12 +01:00
Florian Roth 511229c0b6 rule: modified Bloodhound rule 2019-12-21 21:22:13 +01:00
Thomas Patzke 530ac854df Added sigma2attack to CI testing 2019-12-20 22:53:22 +01:00
Thomas Patzke 781f53332b Merge pull request #566 from christophetd/sigma2attack
Add sigma2attack
2019-12-20 21:57:02 +01:00
Florian Roth 1fd4c26005 Merge pull request #569 from Neo23x0/devel
rule: improved bloodhound rule
2019-12-20 17:32:21 +01:00
Florian Roth 0fa5ba925e rule :improved bloodhound rule 2019-12-20 17:23:40 +01:00
Florian Roth cbebaf637f Merge pull request #568 from Neo23x0/devel
Devel
2019-12-20 16:22:29 +01:00
Florian Roth 0e82dce2a0 fix: fixed wrong condition 2019-12-20 16:11:39 +01:00
Florian Roth 0000257371 rule: improved bloodhound rule 2019-12-20 16:08:26 +01:00
Florian Roth 3a933c38f2 rule: changed level of BloodHound rule 2019-12-20 15:37:58 +01:00
Florian Roth 68efeb909d rule: false positive condition for BloodHound rule 2019-12-20 15:35:13 +01:00
Florian Roth 825b1edb0f Merge pull request #567 from Neo23x0/devel
Devel
2019-12-20 15:32:56 +01:00
Florian Roth 5f061c15d0 fix: fixed missing condition 2019-12-20 15:18:05 +01:00
Florian Roth bb466407ee rule: operation Wocao activity 2019-12-20 15:00:07 +01:00
Florian Roth 708c17e2bc rule: Bloodhound 2019-12-20 14:59:36 +01:00
Florian Roth ab038d1ac7 style: minor changes 2019-12-20 14:59:26 +01:00
Thomas Patzke 9ca52259dd Fixed identifier 2019-12-20 00:11:34 +01:00
Thomas Patzke 924e1feb54 UUIDs + moved unsupported logic
* Added UUIDs to all contributed rules
* Moved unsupported logic directory out of rules/ because this breaks CI
  testing.
2019-12-19 23:56:36 +01:00
Thomas Patzke 694d666539 Merge branch 'master' into oscd 2019-12-19 23:15:15 +01:00
christophetd e99b0fe2d7 Add sigma2attack 2019-12-19 00:00:13 +01:00
Riccardo Ancarani 8b70cb6761 Add Covenant default named pipe
Covenant (https://github.com/cobbr/Covenant) can use named pipes for peer to peer communication.
The default named pipe name is "\gruntsvc".
References: https://posts.specterops.io/designing-peer-to-peer-command-and-control-ad2c61740456
2019-12-18 15:19:47 +00:00
Florian Roth 0a26184286 Merge pull request #563 from Neo23x0/devel
Devel
2019-12-17 14:48:07 +01:00
Florian Roth c8b6b5c556 rule: updating csc.exe rule 2019-12-17 13:45:40 +01:00
Florian Roth 7a3041c593 rule: improved csc.exe rule 2019-12-17 11:05:43 +01:00
Thomas Patzke 397b3b8cc6 Updated rule test MITRE ATT&CK identifiers 2019-12-17 01:13:06 +01:00
Florian Roth e8d92fab0c rule: ryuk ransomware 2019-12-16 20:33:12 +01:00
Florian Roth da06e5bc1c Merge pull request #562 from Neo23x0/devel
Improved PowerShell Encoded Command Rule
2019-12-16 19:31:15 +01:00
Florian Roth bbaa9df217 rule: better JAB rule 2019-12-16 19:08:51 +01:00
Florian Roth f83eb2268e rule: improved JAB expression 2019-12-16 19:04:05 +01:00
Florian Roth bd7c996588 rule: suspicious PS rule modified to cover newest malware campaigns 2019-12-16 19:02:57 +01:00
Thomas Patzke ef63a65efe Converted to Unix line end 2019-12-15 23:30:42 +01:00
Yugoslavskiy Daniil d19df2e4f7 fix issues with wrong tagging 2019-12-15 00:17:22 +01:00
Yugoslavskiy Daniil 9a511e5e62 fix issue with doubled detection section in apt_silence_downloader_v3.yml 2019-12-15 00:06:28 +01:00
Florian Roth 7acfecbe66 Merge pull request #530 from bartblaze/master
Add scriptlets
2019-12-14 11:24:51 +01:00
Thomas Patzke d2a940a0a6 Merge branch 'devel' of https://github.com/Neo23x0/sigma 2019-12-13 22:01:40 +01:00
Thomas Patzke 5930c1c290 Updated changelog 2019-12-13 22:00:40 +01:00
Thomas Patzke ee4138c48e Merge pull request #526 from zouzias/hotfix_aggregate_count_distinct_groupby
[feature] extend es-dsl to support nested aggregations
2019-12-13 21:55:47 +01:00
Thomas Patzke a25b2ec361 Merge pull request #523 from refractionPOINT/lc-added-mtd
LC added FP metadata
2019-12-13 21:50:52 +01:00
Thomas Patzke 1369b3a2dc Merge pull request #537 from webhead404/webhead404-contrib-sigma
Added sigma rule to detect external devices or USB drive
2019-12-13 21:50:01 +01:00
Thomas Patzke 38b3ace461 Merge pull request #556 from Karneades/fixChangelog
Add release date for each version in changelog
2019-12-13 21:47:58 +01:00
Thomas Patzke 7a280ae092 Merge pull request #557 from robrankin/fix_dupe_rule_name
Elastalert error, duplicate rule titles
2019-12-13 21:46:58 +01:00
Florian Roth 1b42f2a0e2 Merge pull request #561 from Neo23x0/devel
Devel
2019-12-12 13:34:58 +01:00
Florian Roth 67dfd729fd rule: extended Proxy UA suspicious rule 2019-12-12 10:42:23 +01:00
Florian Roth 9c59e3cf13 Merge branch 'master' into devel 2019-12-12 09:40:02 +01:00
Florian Roth 065df363dc rule: added Empire UA 2019-12-12 09:39:28 +01:00
Florian Roth c25b902add Merge pull request #558 from vburov/patch-7
Added svchost.exe as a parent image
2019-12-10 20:17:22 +01:00
Florian Roth 611b72dba5 Merge pull request #559 from vburov/patch-8
Added some suspicious locations
2019-12-10 20:15:16 +01:00
Vasiliy Burov 977551c69d Added some suspicious locations
Added 'C:\Windows\Tasks' and 'C:\Windows\System32\Tasks' as suspicious locations accordingly article: https://github.com/ThreatHuntingProject/ThreatHunting/blob/master/hunts/suspicious_process_creation_via_windows_event_logs.md
2019-12-10 20:17:40 +03:00
Vasiliy Burov 0dd4324aba Added svchost.exe as a parent image
Added svchost.exe as a parent image accordingly this article (https://www.carbonblack.com/2014/06/10/screenshot-demo-hunt-evil-faster-than-ever-with-carbon-black/) and my investigations.
2019-12-10 19:31:12 +03:00
Karneades fd4536afb5 Resolve PR #556 merge conflict 2019-12-09 21:23:00 +01:00
Rob Rankin e251568760 Data Compressed duplciate titles 2019-12-09 16:24:10 +00:00
Rob Rankin b771dd3d3b Rule name conflicts in Elastalert output 2019-12-09 16:14:28 +00:00
Thomas Patzke b701e9be50 Added ECS proxy configuration 2019-12-09 16:34:07 +01:00
Karneades 1c05b858fd Add release date for each version in changelog 2019-12-09 16:18:58 +01:00
Thomas Patzke a9d6158dde Merge branch 'rules' 2019-12-09 16:17:39 +01:00
Thomas Patzke 2ea87f187c Added Ursnif proxy detections 2019-12-09 16:02:10 +01:00
Yugoslavskiy Daniil 185a634bd9 update authors for 2 rules 2019-12-07 02:10:06 +01:00
Yugoslavskiy Daniil 4789b15fd5 add rules by Sergey Soldatov, Kaspersky Lab 2019-12-07 01:45:55 +01:00
Thomas Patzke 991108e64d Further proxy field name fixes (config + rules) 2019-12-07 00:23:30 +01:00
Thomas Patzke dd8442590f Fixed proxy rule field names 2019-12-07 00:11:33 +01:00
Florian Roth e1244acf49 rule: fixed and extended bitsadmin rule 2019-12-06 13:39:04 +01:00
Florian Roth c1647ca4b7 Merge branch 'master' into devel 2019-12-06 13:38:29 +01:00
Thomas Patzke ad7d5d2a39 Added WMI login rule 2019-12-04 11:13:04 +01:00
yugoslavskiy 15cb1c42a9 Merge branch 'mrblacyk-oscd' into oscd 2019-12-02 02:57:07 +01:00
yugoslavskiy edad1695f6 Merge branch 'oscd' of https://github.com/mrblacyk/sigma into mrblacyk-oscd 2019-12-02 02:56:53 +01:00
yugoslavskiy 48a94d1609 Update lnx_dd_delete_file.yml 2019-12-02 02:54:48 +01:00
yugoslavskiy ca1c2f4436 Update lnx_chattr_immutable_removal.yml 2019-12-02 02:54:32 +01:00
yugoslavskiy 9e90335a5a Update lnx_pers_systemd_reload.yml 2019-12-02 02:54:13 +01:00
yugoslavskiy 46ca68436e Update lnx_file_or_folder_permissions.yml 2019-12-02 02:53:35 +01:00
yugoslavskiy 1273a10dcb add win_new_service_creation.yml 2019-12-02 01:19:54 +01:00
yugoslavskiy 9fba097421 add sysmon_in_memory_powershell.yml by Tom Kern 2019-12-01 23:26:00 +01:00
booberry46 df162b232f Update win_malware_emotet.yml 2019-11-30 13:17:44 +08:00
mrblacyk 9d0889def4 Adding auditd compatibility 2019-11-29 09:34:08 +01:00
mrblacyk cafbb25d2e Update lnx_file_or_folder_permissions.yml 2019-11-29 09:33:04 +01:00
mrblacyk bf5e6cc56b Adding auditd compatibility 2019-11-29 09:32:05 +01:00
mrblacyk a15c84eb80 Adding auditd compatibility 2019-11-29 09:27:31 +01:00
Yugoslavskiy Daniil 71e588cae1 add apt silence rules by Group-IB 2019-11-28 21:15:55 +01:00
Lep 60997b47b2 moreEventID 2019-11-28 21:34:52 +07:00
Lep 412dfc4f05 Merge branch 'master' of http://git.security.fis.vn/VuNX2/sigma 2019-11-28 17:38:57 +07:00
Lep 738008b52b requiment 2019-11-28 17:38:05 +07:00
Nguyen Xuan Vu 042d078ee1 Update requirements.txt 2019-11-28 05:26:09 -05:00
Lep 158ffd2f0c requiment 2019-11-28 17:23:05 +07:00
Nguyen Xuan Vu f1ae6fa1ed Update README.md 2019-11-28 04:56:05 -05:00
Nguyen Xuan Vu 6ce5a2554f Update README.md 2019-11-28 04:41:58 -05:00
Nguyen Xuan Vu 1fcdf6e5d0 Update README.md 2019-11-28 04:40:52 -05:00
Nguyen Xuan Vu cd1866b30f Update README.md 2019-11-28 04:38:03 -05:00
Nguyen Xuan Vu 6fa6cba16d Update README.md 2019-11-28 04:32:34 -05:00
Nguyen Xuan Vu 31cf40e0e8 Update README.md 2019-11-28 04:31:52 -05:00
Nguyen Xuan Vu 2da7f36e48 Update README.md 2019-11-28 04:31:04 -05:00
Lep 37257170dd postAPI 2019-11-28 16:01:24 +07:00
Lep d08ff35222 postAPI 2019-11-28 11:45:49 +07:00
yugoslavskiy d5722979ea add rules by Daniel Bohannon 2019-11-27 00:02:45 +01:00
yugoslavskiy 41a09cde34 updated filenames 2019-11-26 23:31:18 +01:00
webhead404 21ef152e3a Update win_external_device.yml 2019-11-20 16:19:45 -06:00
webhead404 2bfd4ea654 Added MITRE tags 2019-11-20 16:18:03 -06:00
webhead404 b96ad8ccd7 Merge pull request #2 from webhead404/webhead404-contrib
Create win_external_device
2019-11-20 16:09:15 -06:00
webhead404 5c5d28acdc Create win_external_device 2019-11-20 16:07:29 -06:00
Florian Roth 39293d5f2b rule: another reference for CVE-2019-1388 rule 2019-11-20 15:09:30 +01:00
yugoslavskiy 1b591ee598 add JET CSIRT team sysmon_process_reimaging.yml with unsupported logic 2019-11-19 02:17:07 +01:00
yugoslavskiy 2a33e6fed9 unify location of rules with unsupported logic 2019-11-19 02:12:22 +01:00
yugoslavskiy efc404fbae resolve conflicts with rule IDs; restored and deprecated sysmon_mimikatz_detection_lsass.yml 2019-11-19 02:11:19 +01:00
Maxime Lamothe-Brassard 61bcc46394 Prettier formatting of YAML. 2019-11-18 14:50:41 -05:00
Austin Clark ad1a6a2bd3 Update cisco_cli_net_sniff.yml 2019-11-15 19:32:53 +01:00
Austin Clark 441a302623 Update cisco_cli_moving_data.yml 2019-11-15 19:31:41 +01:00
Austin Clark 93a40b3b97 Update cisco_cli_modify_config.yml 2019-11-15 19:31:07 +01:00
Austin Clark 9cd6670501 Update cisco_cli_local_accounts.yml 2019-11-15 19:30:33 +01:00
Austin Clark ed85f1e612 Update cisco_cli_input_capture.yml 2019-11-15 19:11:03 +01:00
Austin Clark d8e0cfb64c Update cisco_cli_file_deletion.yml 2019-11-15 19:10:19 +01:00
Austin Clark af1cf4615f Update cisco_cli_dos.yml 2019-11-15 19:09:38 +01:00
Austin Clark 46c63094de Update cisco_cli_discovery.yml 2019-11-15 19:08:53 +01:00
Austin Clark ac07b00497 Update cisco_cli_disable_logging.yml 2019-11-15 19:08:08 +01:00
Austin Clark 6448631005 Update cisco_cli_crypto_actions.yml 2019-11-15 19:07:09 +01:00
Austin Clark 82237fa347 Update cisco_cli_collect_data.yml 2019-11-15 19:05:55 +01:00
Austin Clark 55f467eae2 Update cisco_cli_clear_logs.yml 2019-11-15 19:05:02 +01:00
Maxime Lamothe-Brassard 9eed57ee1d Adding the "falsepositives" field to the LC metadata. 2019-11-15 08:30:41 -05:00
Bart a5b4b276d4 Add scriptlets
Adds .sct and .vbe.
2019-11-14 22:26:22 +01:00
Austin Clark 4ec6babdff Delete test 2019-11-14 20:56:21 +01:00
Austin Clark 85403d353c Add files via upload 2019-11-14 20:55:28 +01:00
Austin Clark 2c8f6b5020 Create test 2019-11-14 20:53:56 +01:00
Anastasios Zouzias 3c7f522017 add .keyword on aggs; add extra unit test 2019-11-14 14:34:50 +01:00
yugoslavskiy ac21810d7a Merge pull request #516 from yugoslavskiy/oscd_task_#2_credentials_dumping
oscd task #2 completed
2019-11-14 01:03:27 +03:00
yugoslavskiy 1cc9ddc8b8 Update win_dumping_ntdsdit_via_netsync.yml 2019-11-14 01:00:28 +03:00
yugoslavskiy d29941b414 Update win_dumping_ntdsdit_via_dcsync.yml 2019-11-14 00:59:38 +03:00
yugoslavskiy 01ed5a7135 Update sysmon_unsigned_image_loaded_into_lsass.yml 2019-11-14 00:58:39 +03:00
yugoslavskiy 20a5c9498c Update sysmon_raw_disk_access_using_illegitimate_tools.yml 2019-11-14 00:58:00 +03:00
yugoslavskiy 4b8873b706 Update sysmon_lsass_memory_dump_file_creation.yml 2019-11-14 00:55:20 +03:00
yugoslavskiy f0cce60a2c Update sysmon_cred_dump_tools_dropped_files.yml 2019-11-14 00:53:25 +03:00
yugoslavskiy 9b9f37715f Update process_creation_shadow_copies_deletion.yml 2019-11-14 00:50:10 +03:00
yugoslavskiy a1831bb503 Update process_creation_shadow_copies_creation.yml 2019-11-14 00:48:50 +03:00
yugoslavskiy 1445589839 Update process_creation_copying_sensitive_files_with_credential_data.yml 2019-11-14 00:47:14 +03:00
yugoslavskiy c7c29a39b6 Update win_susp_lsass_dump_generic.yml 2019-11-14 00:45:47 +03:00
yugoslavskiy 633c6db254 Update win_remote_registry_management_using_reg_utility.yml 2019-11-14 00:44:47 +03:00
yugoslavskiy cd31354df2 Update win_quarkspwdump_clearing_hive_access_history.yml 2019-11-14 00:43:56 +03:00
yugoslavskiy 334626168c Update win_mal_service_installs.yml 2019-11-14 00:43:03 +03:00
yugoslavskiy fecaddcd47 Merge pull request #505 from darkquasar/master
Adding rule Suspicious In-Memory Module Execution
2019-11-14 00:36:53 +03:00
yugoslavskiy cd69111522 Merge branch 'oscd' into master 2019-11-14 00:36:34 +03:00
yugoslavskiy 3cd1abd0a1 Update sysmon_suspicious_remote_thread.yml 2019-11-14 00:34:09 +03:00
yugoslavskiy 1e75979a2a Update sysmon_minidumwritedump_lsass.yml 2019-11-14 00:32:06 +03:00
yugoslavskiy f2caf366cb moved net_possible_dns_rebinding.yml to unsupported logic directory; renamed win_powershell_bitsjob.yaml -> win_powershell_bitsjob.yml 2019-11-14 00:24:53 +03:00
yugoslavskiy 94caaff4fa Merge branch 'oscd' of https://github.com/Neo23x0/sigma into oscd 2019-11-14 00:23:22 +03:00
yugoslavskiy cb29628ceb modify rules based on BSI contribution 2019-11-14 00:23:16 +03:00
yugoslavskiy c8ee6e9631 Merge pull request #504 from yugoslavskiy/oscd_ilyas_ochkov
[OSCD] Ilyas Ochkov contribution
2019-11-14 00:22:48 +03:00
yugoslavskiy b47748399d Update sysmon_new_dll_added_to_appcertdlls_registry_key.yml 2019-11-14 00:19:30 +03:00
yugoslavskiy 1fe7f55d47 Update sysmon_suspicious_outbound_kerberos_connection.yml 2019-11-14 00:10:05 +03:00
yugoslavskiy 07ad11f3ae Update sysmon_possible_dns_rebinding.yml 2019-11-14 00:08:50 +03:00
yugoslavskiy ded75d033a Update sysmon_new_dll_added_to_appinit_dlls_registry_key.yml 2019-11-13 23:47:24 +03:00
yugoslavskiy 0cb1d4fdbd Update sysmon_new_dll_added_to_appcertdlls_registry_key.yml 2019-11-13 23:44:03 +03:00
yugoslavskiy bba360212a Update sysmon_new_dll_added_to_appcertdlls_registry_key.yml 2019-11-13 23:43:45 +03:00
yugoslavskiy e6e308ef51 Update sysmon_disable_security_events_logging_adding_reg_key_minint.yml 2019-11-13 23:40:29 +03:00
yugoslavskiy d8447946d6 Update win_suspicious_outbound_kerberos_connection.yml 2019-11-13 23:37:25 +03:00
yugoslavskiy 7f01a5b1bb Update win_new_or_renamed_user_account_with_dollar_sign.yml 2019-11-13 23:35:59 +03:00
yugoslavskiy 26479485e6 Update win_new_or_renamed_user_account_with_dollar_sign.yml 2019-11-13 23:34:46 +03:00
Anastasios Zouzias e7ed0fa9ea added unit test 2019-11-12 14:06:10 +01:00
Anastasios Zouzias 324005a126 [feature] extend es-dsl to support nested aggregations 2019-11-12 11:46:43 +01:00
yugoslavskiy a4331b0eec Merge pull request #498 from theRabbitCode/oscd
[OSCD] Added Atomic Blue Detections Repo
2019-11-11 23:22:57 +03:00
yugoslavskiy 1f142f6613 Delete win_reg_sam_dumping.yml
redundant with https://github.com/Neo23x0/sigma/pull/516/files#diff-2f8d87b345d7d8c228d22b7a3b83c6ee
authorship has been updated
2019-11-11 23:22:47 +03:00
yugoslavskiy cad0e30933 Update process_creation_grabbing_sensitive_hives_via_reg.yml 2019-11-11 23:22:25 +03:00
yugoslavskiy 38d0f832a4 Update win_uac_wsreset.yml 2019-11-11 23:13:28 +03:00
yugoslavskiy 49fb6bdf8f Update win_uac_fodhelper.yml 2019-11-11 23:10:49 +03:00
yugoslavskiy f991bf20b0 Update win_uac_cmstp.yml 2019-11-11 23:05:43 +03:00
yugoslavskiy 7f975f5878 Update win_trust_discovery.yml 2019-11-11 23:02:13 +03:00
yugoslavskiy 4c10a36e94 Update win_remote_time_discovery.yml 2019-11-11 22:51:35 +03:00
yugoslavskiy ef55a580cf Update win_net_enum.yml 2019-11-11 22:36:00 +03:00
yugoslavskiy 4635c5b1f9 Update win_net_user_add.yml 2019-11-11 22:35:43 +03:00
yugoslavskiy bf4c2a508d Update win_powershell_bitsjob.yaml 2019-11-11 22:06:57 +03:00
yugoslavskiy 90bf1c4187 Update win_powershell_audio_capture.yml 2019-11-11 22:03:49 +03:00
yugoslavskiy 8d9e293143 Update win_net_user_add.yml 2019-11-11 22:00:46 +03:00
yugoslavskiy 81b373cea7 Update win_net_enum.yml 2019-11-11 21:54:23 +03:00
yugoslavskiy b181f09339 Update win_net_enum.yml 2019-11-11 21:53:18 +03:00
yugoslavskiy f169163d3e Update win_mshta_javascript.yml 2019-11-11 21:49:46 +03:00
yugoslavskiy 20a116cde5 Update win_lsass_dump.yml 2019-11-11 21:46:54 +03:00
yugoslavskiy 119a3417c6 Update win_interactive_at.yml 2019-11-11 04:06:37 +03:00
yugoslavskiy e18ff0b9f9 Update win_interactive_at.yml 2019-11-11 04:05:21 +03:00
yugoslavskiy c584b67095 Update win_indirect_cmd.yml 2019-11-11 03:20:09 +03:00
yugoslavskiy f585c556a4 Update win_hh_chm.yml 2019-11-11 03:04:54 +03:00
yugoslavskiy 7e170900ba Merge pull request #485 from 4A616D6573/patch-1
Update win_susp_net_execution.yml
2019-11-11 02:58:31 +03:00
yugoslavskiy 24ea49a2a1 Update win_susp_net_execution.yml 2019-11-11 02:57:59 +03:00
yugoslavskiy 03d08067b5 Delete win_fsutil_usn_delete.yml
redundant with ./rules/windows/process_creation/win_susp_fsutil_usage.yml.
authorship has been updated
2019-11-11 02:11:28 +03:00
yugoslavskiy e7e9185f99 Delete win_eventlog_cleared.yml
redundant with ./rules/windows/process_creation/win_susp_eventlog_clear.yml
2019-11-11 01:59:29 +03:00
yugoslavskiy 521d9311c7 Delete win_cmd_rar.yml
redundant with  ./rules/windows/process_creation/win_data_compressed_with_rar.yml
authorship was updated
2019-11-11 01:58:22 +03:00
yugoslavskiy afb17d0e0e Update win_bootconf_mod.yml 2019-11-11 01:53:46 +03:00
yugoslavskiy fc8901fa1a Update win_soundrec_audio_capture.yml 2019-11-11 01:45:39 +03:00
yugoslavskiy bdff2c312b Update lnx_auditd_ld_so_preload_mod.yml 2019-11-11 01:44:53 +03:00
yugoslavskiy 570f5b238e Update win_soundrec_audio_capture.yml 2019-11-11 01:40:45 +03:00
yugoslavskiy 37098be291 Update win_net_user_add.yml 2019-11-11 01:35:51 +03:00
yugoslavskiy 385ebac502 Merge pull request #497 from Heirhabarov/master
OSCD Task 1 - Privilege Escalation
2019-11-11 01:33:28 +03:00
yugoslavskiy 8adc51d4aa Update sysmon_possible_privilege_escalation_via_service_registry_permissions_weakness.yml 2019-11-11 01:30:19 +03:00
yugoslavskiy 20c87ae83c Update win_whoami_as_system.yml 2019-11-11 01:18:45 +03:00
yugoslavskiy 0e6d4f7d76 Update win_using_sc_to_change_sevice_image_path_by_non_admin.yml 2019-11-11 01:17:47 +03:00
yugoslavskiy 454701cbee Update win_possible_privilege_escalation_using_rotten_potato.yml 2019-11-11 01:10:18 +03:00
yugoslavskiy 24e17a9c50 Update win_meterpreter_or_cobaltstrike_getsystem_service_start.yml 2019-11-11 01:08:35 +03:00
yugoslavskiy a69d9d9980 Update win_meterpreter_or_cobaltstrike_getsystem_service_installation.yml 2019-11-11 01:04:01 +03:00
yugoslavskiy 69a99bc2c3 Merge pull request #493 from alx1m1k/oscd
[OSCD] rules from Jet CSIRT team
2019-11-10 23:11:24 +03:00
yugoslavskiy 1f5a31f0e7 fix logsource for remote_powershell_session_process.yml 2019-11-10 23:10:24 +03:00
yugoslavskiy fcde35d6ab Update sysmon_regsvr32_network_activity.yml 2019-11-10 22:51:53 +03:00
yugoslavskiy 0beeaadb6f Update sysmon_narrator_feedback_persistance.yml 2019-11-10 22:47:48 +03:00
yugoslavskiy 5756df1922 rename file 2019-11-10 21:56:34 +03:00
yugoslavskiy 86d315598b Merge branch 'oscd' of https://github.com/Neo23x0/sigma into oscd 2019-11-10 21:40:15 +03:00
yugoslavskiy 6f2243efc4 fix reg rule 2019-11-10 21:40:08 +03:00
yugoslavskiy e5e44e2ade Merge pull request #488 from stvetro/oscd
[OSCD][ART] Task 7: T1060, T1031
2019-11-10 21:39:32 +03:00
yugoslavskiy f2f1628506 Update and rename sysmon_runkey_from_powershell.yml to sysmon_asep_regirstry_modification.yml 2019-11-10 21:36:21 +03:00
yugoslavskiy 0d00b643cd Update win_susp_service_path_modification.yml 2019-11-10 21:25:26 +03:00
yugoslavskiy b9991bb2ec Update win_susp_netsh_dll_persistence.yml 2019-11-10 21:21:42 +03:00
yugoslavskiy b665b1b990 Update and rename win_susp_direct_run_key_modification.yml to win_susp_direct_asep_reg_keys_modification.yml 2019-11-10 21:19:06 +03:00
yugoslavskiy 0db5436778 add tieto dns exfil rules 2019-11-10 20:27:21 +03:00
yugoslavskiy bdac415fea Merge pull request #486 from yugoslavskiy/tieto_oscd
[OSCD] Tieto DNS exfiltration rules
2019-11-10 19:36:02 +03:00
yugoslavskiy 4fa928866f oscd task #6 done.
add 25 new rules:

- win_ad_replication_non_machine_account.yml
- win_dpapi_domain_backupkey_extraction.yml
- win_protected_storage_service_access.yml
- win_dpapi_domain_masterkey_backup_attempt.yml
- win_sam_registry_hive_handle_request.yml
- win_sam_registry_hive_dump_via_reg_utility.yml
- win_lsass_access_non_system_account.yml
- win_ad_object_writedac_access.yml
- powershell_alternate_powershell_hosts.yml
- sysmon_remote_powershell_session_network.yml
- win_remote_powershell_session.yml
- win_scm_database_handle_failure.yml
- win_scm_database_privileged_operation.yml
- sysmon_wmi_module_load.yml
- sysmon_remote_powershell_session_process.yml
- sysmon_rdp_registry_modification.yml
- sysmon_powershell_execution_pipe.yml
- sysmon_alternate_powershell_hosts_pipe.yml
- sysmon_powershell_execution_moduleload.yml
- sysmon_createremotethread_loadlibrary.yml
- sysmon_alternate_powershell_hosts_moduleload.yml
- powershell_remote_powershell_session.yml
- win_non_interactive_powershell.yml
- win_syskey_registry_access.yml
- win_wmiprvse_spawning_process.yml

improve 1 rule:

- rules/windows/builtin/win_account_backdoor_dcsync_rights.yml
2019-11-10 18:43:41 +03:00
yugoslavskiy c0ac9b8fb9 fix conflict 2019-11-10 17:31:33 +03:00
yugoslavskiy 127335a0ec Merge pull request #482 from yugoslavskiy/master
[OSCD][The ThreatHunter-Playbook] Task 6: DONE
2019-11-10 17:27:54 +03:00
yugoslavskiy a59d4fdd33 Merge branch 'master' of https://github.com/Neo23x0/sigma into oscd 2019-11-10 14:47:27 +03:00
yugoslavskiy 5861664d0f Update win_dsquery_domain_trust_discovery.yml 2019-11-08 02:58:32 +03:00
yugoslavskiy 3624a7d5da Update win_file_permission_modifications.yml 2019-11-08 02:51:42 +03:00
yugoslavskiy 7d3c9e129d Update win_service_stop.yml 2019-11-08 02:40:37 +03:00
yugoslavskiy 6b98c37910 Update and rename sysmon_mimikatz_detection_lsass.yml to sysmon_cred_dump_lsass_access.yml 2019-11-08 02:05:34 +03:00
yugoslavskiy 8164e1e096 Update sysmon_mimikatz_detection_lsass.yml 2019-11-07 04:50:22 +03:00
yugoslavskiy 7affc09c19 Update sysmon_mimikatz_detection_lsass.yml 2019-11-07 04:33:40 +03:00
yugoslavskiy 92e09db9ab Update win_susp_lsass_dump_generic.yml 2019-11-07 04:27:53 +03:00
webhead404 a704256632 Merge pull request #1 from webhead404/webhead404-patch-1
Update and add another selection for regsvr32
2019-11-06 15:51:30 -06:00
webhead404 f7a968e3d2 Update and add another selection for regsvr32
Added cmd.exe to the detection after observing Atomic Red Team test 

https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1117/T1117.md#atomic-test-2---regsvr32-remote-com-scriptlet-execution
2019-11-06 15:49:53 -06:00
booberry46 cfe7ddbe5b Update av_exploiting.yml
Not sure if the '' affects.
2019-11-06 16:16:49 +08:00
yugoslavskiy 2697b829b0 fix logic 2019-11-04 14:57:58 +03:00
darkquasar 5f027e97c2 fixing as as per comment on rule
https://github.com/Neo23x0/sigma/pull/505#discussion_r340790327
2019-11-03 20:35:58 -08:00
yugoslavskiy becb80f609 add rules/windows/builtin/win_quarkspwdump_clearing_hive_access_history.yml 2019-11-04 05:38:49 +03:00
yugoslavskiy 1f7b3bc9a2 add rules/windows/builtin/win_quarkspwdump_clearing_hive_access_history.yml 2019-11-04 05:05:57 +03:00
yugoslavskiy 701e7f7cc6 oscd task #2 completed
- new rules:

	+ rules/windows/builtin/win_susp_lsass_dump_generic.yml
	+
rules/windows/builtin/win_transferring_files_with_credential_data_via_ne
twork_shares.yml
	+
rules/windows/builtin/win_remote_registry_management_using_reg_utility.y
ml
	+ rules/windows/sysmon/sysmon_unsigned_image_loaded_into_lsass.yml
	+ rules/windows/sysmon/sysmon_lsass_memory_dump_file_creation.yml
	+
rules/windows/sysmon/sysmon_raw_disk_access_using_illegitimate_tools.yml
	+ rules/windows/sysmon/sysmon_cred_dump_tools_dropped_files.yml
	+ rules/windows/sysmon/sysmon_cred_dump_tools_named_pipes.yml
	+
rules/windows/process_creation/process_creation_shadow_copies_creation.y
ml
	+
rules/windows/process_creation/process_creation_shadow_copies_deletion.y
ml
	+
rules/windows/process_creation/process_creation_copying_sensitive_files_
with_credential_data.yml
	+
rules/windows/process_creation/process_creation_shadow_copies_access_sym
link.yml
	+
rules/windows/process_creation/process_creation_grabbing_sensitive_hives
_via_reg.yml
	+
rules/windows/process_creation/process_creation_mimikatz_command_line.ym
l
	+
rules/windows/unsupported_logic/builtin/dumping_ntds.dit_via_dcsync.yml
	+
rules/windows/unsupported_logic/builtin/dumping_ntds.dit_via_netsync.yml
.yml

- updated rules:

	+ rules/windows/builtin/win_susp_raccess_sensitive_fext.yml
	+ rules/windows/builtin/win_mal_creddumper.yml
	+ rules/windows/builtin/win_mal_service_installs.yml
	+ rules/windows/process_creation/win_susp_process_creations.yml
	+ rules/windows/sysmon/sysmon_powershell_exploit_scripts.yml
	+ rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml

- deprecated rules:

	+ rules/windows/process_creation/win_susp_vssadmin_ntds_activity.yml
2019-11-04 04:26:34 +03:00
4A616D6573 013d862afd Create win_susp_local_anon_logon_created.yml 2019-10-31 21:56:30 +11:00
4A616D6573 c8e5fc4e6d Revert "Create win_susp_local_anon_logon_created.yml"
This reverts commit d174e172b0.
2019-10-31 21:49:57 +11:00
4A616D6573 d174e172b0 Create win_susp_local_anon_logon_created.yml 2019-10-31 21:44:47 +11:00
booberry46 36fe748c2e Update win_rdp_reverse_tunnel.yml
With the recent example for the evtx. RDP Tunneling can happen not only from port 3389. So I tune it to fit in general.

Changed the obsolete twitter status with linkage to the evtx from Samir Bousseaden
2019-10-29 17:25:37 +08:00
darkquasar cb6eb35913 adding some more suspicious PS keywords
found in multiple internally analyzed malicious scripts (in the wild and as result of engagements)
2019-10-28 22:14:14 -07:00
darkquasar 96643b5446 New rule Suspicious Remote Thread Created 2019-10-28 22:12:57 -07:00
darkquasar 551d3d653c Dumping Lsass.exe memory with MiniDumpWriteDump API 2019-10-28 22:11:55 -07:00
darkquasar a6b24da6dd Adding rule Suspicious In-Memory Module Execution 2019-10-28 22:07:26 -07:00
alx1m1k 116d17c9b1 Merge pull request #1 from yugoslavskiy/oscd
fix some typos and remove redundant references
2019-10-29 08:04:04 +03:00
Yugoslavskiy Daniil fd606cb376 spaces fix 2019-10-29 03:59:07 +03:00
Yugoslavskiy Daniil 4251d9f490 ilyas ochkov contribution 2019-10-29 03:44:22 +03:00
Yugoslavskiy Daniil 3376cf4dd8 fix some typos and remove redundand references 2019-10-29 01:40:06 +03:00
RRRabbit becfca6b41 Added Atomic Blue Detections Repo 2019-10-28 11:59:49 +01:00
Teimur Kheirkhabarov 59c6250282 Delete rules/windows/.DS_Store 2019-10-28 09:38:17 +03:00
Teimur Kheirkhabarov 2fb40acfe6 Fix mistake in possible_privilege_escalation_via_service_registry_permissions_weakness 2019-10-28 09:30:26 +03:00
Teimur Kheirkhabarov 32b0a3987e Several mistakes were fixed 2019-10-28 08:43:58 +03:00
Teimur Kheirkhabarov 3125b39239 Change incorrect MITRE Tags for some rules 2019-10-28 07:56:15 +03:00
Teimur Kheirkhabarov fde949174d OSCD Task 1 - Privilege Escalation 2019-10-27 20:54:07 +03:00
Mikhail Larin 1f6aec8060 removed unsupported rule from oscd branch 2019-10-27 15:33:38 +03:00
4A616D6573 ca819d8707 Update win_susp_net_execution.yml
Updated tags to pass Travis CI checks.
2019-10-27 14:06:52 +11:00
booberry46 b7fe52133d Update win_defender_bypass.yml 2019-10-27 00:07:56 +08:00
booberry46 3f1fc9a507 Add files via upload 2019-10-27 00:06:49 +08:00
Mikhail Larin 334301c185 OSCD event rules from Jet CSIRT team 2019-10-25 17:57:56 +03:00
stvetro dcaacd07bf 4 rules to cover ART 2019-10-25 15:38:47 +04:00
hieuttmmo 0c07c5ea16 convention 2019-10-25 11:00:05 +07:00
hieuttmmo e86ab608f2 Update powershell_suspicious_profile_create.yml 2019-10-25 10:53:21 +07:00
yugoslavskiy 5eb484a062 add tieto dns exfiltration rules 2019-10-25 04:30:55 +02:00
4A616D6573 5678357f4e Update win_susp_net_execution.yml
Added tag for:

References:

https://attack.mitre.org/techniques/T1077/
https://eqllib.readthedocs.io/en/latest/analytics/9b3dd402-891c-4c4d-a662-28947168ce61.html
2019-10-25 12:20:47 +11:00
4A616D6573 a7a753862c Update win_susp_net_execution.yml
Added:

1. Additional tags for techniques as defined by Atomic Blue.
2. Detection for OriginalFileName as net.exe can easily be renamed.

Part of oscd.community effort.
2019-10-25 12:06:32 +11:00
4A616D6573 c248842995 Revert "Update win_susp_net_execution.yml"
This reverts commit f7e26b1e0b.
2019-10-25 12:03:23 +11:00
4A616D6573 f7e26b1e0b Update win_susp_net_execution.yml
Added:

1. Additional tags for techniques as defined by Atomic Blue.
2. Detection for OriginalFileName as net.exe can easily be renamed.

Part of oscd.community effort.
2019-10-25 11:53:56 +11:00
hieuttmmo edb698c7f7 Update powershell_suspicious_profile_create.yml 2019-10-25 00:28:11 +07:00
hieuttmmo 73b10807d8 Rename powershell_susp_profile_create.yml to powershell_suspicious_profile_create.yml 2019-10-25 00:14:39 +07:00
hieuttmmo 0e4cd397ef Create new rules for T1502 2019-10-25 00:14:21 +07:00
yugoslavskiy 4fb9821b49 added:
win_non_interactive_powershell.yml
	win_remote_powershell_session.yml
	win_wmiprvse_spawning_process.yml
	powershell_alternate_powershell_hosts.yml
	powershell_remote_powershell_session.yml
	sysmon_alternate_powershell_hosts_moduleload.yml
	sysmon_alternate_powershell_hosts_pipe.yml
	sysmon_non_interactive_powershell_execution.yml
	sysmon_powershell_execution_moduleload.yml
	sysmon_powershell_execution_pipe.yml
	sysmon_remote_powershell_session_network.yml
	sysmon_remote_powershell_session_process.yml
	sysmon_wmi_module_load.yml
	sysmon_wmiprvse_spawning_process.yml
2019-10-24 15:48:38 +02:00
yugoslavskiy 3934f6c756 add win_ad_object_writedac_access.yml, sysmon_createremotethread_loadlibrary.yml, sysmon_rdp_registry_modification.yml; modified win_account_backdoor_dcsync_rights.yml 2019-10-24 14:34:16 +02:00
4A616D6573 fdbdca003b Create win_powershell_web_request.yml
Broader rule for detecting web requests via various methods using Windows PowerShell, slightly crosses over the below rules but caters for different methods:

https://github.com/Neo23x0/sigma/blob/99b15edf8add183543ca5738ec93f87416c34bd9/rules/windows/process_creation/win_powershell_download.yml
https://github.com/Neo23x0/sigma/blob/0fa914139ca85966b49f0a8eda40a3f26608e86b/rules/windows/powershell/powershell_suspicious_download.yml
2019-10-24 11:57:37 +11:00
Yugoslavskiy Daniil 7cfd47be7c add win_scm_database_handle_failure.yml, win_scm_database_privileged_operation.yml, win_syskey_registry_access.yml 2019-10-24 02:40:11 +02:00
mrblacyk 499627edf3 File permissions modification (T1222) 2019-10-23 11:24:13 -07:00
mrblacyk 4979b56296 Domain Trust Discovery rule (T1482) 2019-10-23 11:23:12 -07:00
mrblacyk c2d906c15f DD overwrite with zero/null (T1485) 2019-10-23 11:22:33 -07:00
mrblacyk 262514c782 Windows Service stop rule (T1489) 2019-10-23 11:22:09 -07:00
mrblacyk 5ae267e326 Linux systemd reload or start rule (T1501) 2019-10-23 11:21:19 -07:00
Hilko Bengen d759896e07 Make coverage binary overridable
This makes it possible to pass a different coverage program to make
test, e.g.:

    make test COVERAGE=python3-coverage
2019-10-23 15:42:25 +02:00
gsanm 150afd816d IP Clean 2019-10-22 17:49:50 +07:00
lep 1c5816b214 update carbonblack module 2019-10-18 17:51:31 +07:00
lep 7219e0b0f1 module carbonblack 2019-10-18 14:04:38 +07:00
Florian Roth afcbf4226d fix: duplicate rule - issue #441 2019-09-06 10:22:27 +02:00
Florian Roth e85c204404 fix: removed event id 2019-09-06 10:20:36 +02:00
Florian Roth 01d5e3882f fix: log source category 2019-09-06 10:17:32 +02:00
Florian Roth e9fc8d3d09 rule: split up registry debugger registration rule into two 2019-09-06 10:13:21 +02:00
Florian Roth 27f875755f rule: debugger registration 2019-09-06 10:08:09 +02:00
Florian Roth c81d3bf56c rule: emissary panda activity 2019-09-03 15:31:25 +02:00
Florian Roth d9606067a6 rule: MuddyWater script execution 2019-08-31 08:50:59 +02:00
Florian Roth a3349823e5 rule: implant teardown 2019-08-30 11:48:51 +02:00
Florian Roth 8a078b6c86 rule: APT28 UA 2019-08-30 11:48:38 +02:00
Lep dfe6b968c0 addins 2019-08-29 15:48:42 +07:00
Lep af264c049b end space 2019-08-29 15:43:36 +07:00
Lep c95a17b061 process_creation 2019-08-28 17:30:13 +07:00
Lep ba30b4929c process_creation update 2019-08-28 17:13:54 +07:00
Florian Roth f2c44c80b6 Merge branch 'master' into rule-devel
# Conflicts:
#	rules/windows/process_creation/win_encoded_frombase64string.yml
#	rules/windows/process_creation/win_susp_csc_folder.yml
2019-08-28 09:21:25 +02:00
Florian Roth f71dc41531 rule: extended csc rule 2019-08-28 09:00:43 +02:00
Florian Roth 406b40af11 rule: suspicious msbuild folder 2019-08-28 09:00:35 +02:00
Lep 8b6bd45b0b rules for APT32 2019-08-28 10:12:01 +07:00
Florian Roth 1dfd560299 rule: csc.exe suspicious source folder 2019-08-24 13:49:40 +02:00
Florian Roth a137a1380b rules: encoded FromBase64String keyword 2019-08-24 12:38:51 +02:00
Florian Roth c9a4e6fe8a rule: process creations in env var folders 2019-08-24 08:26:37 +02:00
Florian Roth a47ec859a8 List for field 'AllowedToDelegateTo' 2019-06-19 08:20:41 +02:00
David Vassallo 41f5ebc403 Update win_alert_ad_user_backdoors.yml
the original rule generates false positives if the "AllowedToDelegateTo" is set to "-". This seems to be a common occurrence, hence my proposed addition
2019-06-07 13:29:45 +03:00
Unknown 7b0ecde334 Renamed jusched
https://www.bitdefender.com/files/News/CaseStudies/study/262/Bitdefender-WhitePaper-An-APT-Blueprint-Gaining-New-Visibility-into-Financial-Threats-interactive.pdf
2019-06-06 14:03:02 +02:00
Unknown 5037f7bf54 Merge remote-tracking branch 'sigma/development' into development 2019-06-06 13:45:25 +02:00
t0x1c-1 7b9a73fb1f Improved Rule
Removed complex CommandLine
2019-06-06 13:45:21 +02:00
t0x1c-1 701801796c Improved Rule
Removed complex CommandLine
2019-05-18 17:43:31 +02:00
Alec Costello 886de39814 Small edits
Got trigger happy, first time doing this, please dont cruicify me.
2019-05-17 17:40:32 +03:00
Alec Costello 34d9b4b365 Update win_susp_process_creations.yml
Tested the type method redirecting to a file and dumping the hashes out with pwdump.

Used the wmic method to create the shadow copy.
2019-05-17 16:10:43 +03:00
Alec Costello 3c8be3d48b Update win_susp_vssadmin_ntds_activity.yml 2019-05-17 15:19:03 +03:00
Alec Costello 8b14a5673d Update win_susp_vssadmin_ntds_activity.yml
Updated with SAM and SYSTEM for esentutl
2019-05-17 15:18:01 +03:00
Alec Costello d90c0ea990 Create powershell_nishang_malicious_commandlets.yml 2019-05-16 17:51:45 +03:00
733 changed files with 28541 additions and 3617 deletions
+27
View File
@@ -0,0 +1,27 @@
# This workflows will upload a Python Package using Twine when a release is created
# For more information see: https://help.github.com/en/actions/language-and-framework-guides/using-python-with-github-actions#publishing-to-package-registries
name: Upload Sigmatools Package to PyPI
on:
release:
types: [created]
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: Set up Python
uses: actions/setup-python@v1
with:
python-version: '3.x'
- name: Install dependencies
run: |
python -m pip install --upgrade pip
pip install setuptools wheel twine
- name: Build and publish
env:
TWINE_USERNAME: ${{ secrets.PYPI_USERNAME }}
TWINE_PASSWORD: ${{ secrets.PYPI_PASSWORD }}
run: |
make upload
+40
View File
@@ -0,0 +1,40 @@
# This workflow will install Python dependencies, run tests and lint with a single version of Python
# For more information see: https://help.github.com/actions/language-and-framework-guides/using-python-with-github-actions
name: Sigma Tools and Rule Tests
on:
push:
branches:
- "*"
pull_request:
branches: [ master ]
jobs:
test-sigma:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: Set up Python 3.8
uses: actions/setup-python@v1
with:
python-version: 3.8
- name: Install dependencies
run: |
python -m pip install --upgrade pip
pip install -r tools/requirements.txt -r tools/requirements-devel.txt
wget -qO - https://artifacts.elastic.co/GPG-KEY-elasticsearch | sudo apt-key add -
sudo apt install -y apt-transport-https
echo "deb https://artifacts.elastic.co/packages/7.x/apt stable main" | sudo tee -a /etc/apt/sources.list.d/elastic.list
sudo apt update
sudo apt install -y elasticsearch
sudo systemctl start elasticsearch
- name: Test Sigma Tools and Rules
run: |
make test
- name: Test Generated Elasticsearch Query Strings
run: |
make test-backend-es-qs
- name: Test SQL(ite) Backend
run: |
make test-backend-sql
+7
View File
@@ -91,3 +91,10 @@ ENV/
# vi(m)
*.swp
settings.json
# VisualStudio
.vs/
.vscode/launch.json
# sigma2attack
heatmap.json
-24
View File
@@ -1,24 +0,0 @@
language: python
dist: xenial
python:
# - 3.5 # Deactivated because Travis CI tests failed randomly (Travis's problem)
- 3.6
- 3.7
sudo: true
services:
- elasticsearch
cache: pip
before_install:
- curl -O https://artifacts.elastic.co/downloads/elasticsearch/elasticsearch-6.2.4.deb && sudo dpkg -i --force-confnew elasticsearch-6.2.4.deb && sudo service elasticsearch restart
install:
- pip install -r tools/requirements-devel.txt
script:
- make test
- make test-backend-es-qs
notifications:
email:
recipients:
- venom14@gmail.com
- thomas@patzke.org
on_success: change
on_failure: always
+101 -6
View File
@@ -6,7 +6,102 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)
from version 0.14.0.
## 0.15.0
## 0.18.1 - 2020-08-25
Release created for technical reasons (issues with extended README and PyPI), no real changes done.
## 0.18.0 - 2020-08-25
### Added
* C# backend
* STIX backend
* Options to xpack-watcher backend (action_throttle_period, mail_from acaw, mail_profile and other)
* More generic log sources
* Windows Defender log sources
* Generic DNS query log source
* AppLocker log source
### Changed
* Improved backend and configuration descriptions
* Microsoft Defender ATP mapping updated
* Improved handling of wildcards in Elastic backends
### Fixed
* Powershell backend: key name was incorrectly added into regular expression
* Grouping issue in Carbon Black backend
* Handling of default field mapping in case field is referenced multiple from a rule
* Code cleanup and various fixes
* Log source mappings in configurations
* Handling of conditional field mappings by Elastic backends
## 0.17.0 - 2020-06-12
### Added
* LOGIQ Backend (logiq)
* CarbonBlack backend (carbonblack) and field mappings
* Elasticsearch detection rule backend (es-rule)
* ee-outliers backend
* CrowdStrike backend (crowdstrike)
* Humio backend (humio)
* Aggregations in SQL backend
* SQLite backend (sqlite)
* AWS Cloudtrail ECS mappings
* Overrides
* Zeek configurations for various backends
* Case-insensitive matching for Elasticsearch
* ECS proxy mappings
* RuleName field mapping for Winlogbeat
* sigma2attack tool
### Changed
* Improved usage of keyword fields for Elasticsearch-based backends
* Splunk XML backend rule titles from sigma rule instead of file name
* Moved backend option list to --help-backend
* Microsoft Defender ATP schema improvements
### Fixed
* Splunx XML rule name is now set to rule title
* Backend list deduplicated
* Wrong escaping of wildcard at end of value when startswith modifier is used.
* Direct execution of tools on Windows systems by addition of script entry points
## 0.16.0 - 2020-02-25
### Added
* Proxy field names to ECS mapping (ecs-proxy) configuration
* False positives metadata to LimaCharlie backend
* Additional aggregation capabilitied for es-dsl backend.
* Azure log analytics rule backend (ala-rule)
* SQL backend
* Splunk Zeek sourcetype mapping config
* sigma2attack script
* Carbon Black backend and configuration
* ArcSight ESM backend
* Elasticsearch detection rule backend
### Changed
* Kibana object id is now Sigma rule id if available. Else
the old naming scheme is used.
* sigma2misp: replacement of deprecated method usage.
* Various configuration updates
* Extended ArcSight mapping
### Fixed
* Fixed aggregation queries for Elastalert backend
* Fixed aggregation queries for es-dsl backend
* Backend and configuration lists are sorted.
* Escaping in ala backend
## 0.15.0 - 2019-12-06
### Added
@@ -25,7 +120,7 @@ from version 0.14.0.
* Removed wrong mapping of CommandLine field mapping in THOR config
## 0.14
## 0.14 - 2019-11-10
### Added
@@ -48,12 +143,12 @@ from version 0.14.0.
* Removed ProcessCommandLine mapping for Windows Security EventID 4688 in generic
process creation log source configuration.
## 0.13
## 0.13 - 2019-10-21
### Added
* Index mappings for Sumologic
* Malicious cmdlets in wdatp
* Malicious cmdlets in mdatp
* QRadar support for keyword searches
* QRadar mapping improvements
* QRadar field selection
@@ -81,13 +176,13 @@ from version 0.14.0.
* Elasticsearch wildcard detection pattern
* Aggregation on keyword field in es-dsl backend
## 0.12.1
## 0.12.1 - 2019-08-05
### Fixed
* Missing build dependency
## 0.12
## 0.12 - 2019-08-01
### Added
+13
View File
@@ -0,0 +1,13 @@
# Detection Rule License (DRL) 1.0
Permission is hereby granted, free of charge, to any person obtaining a copy of this rule set and associated documentation files (the "Rules"), to deal in the Rules without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Rules, and to permit persons to whom the Rules are furnished to do so, subject to the following conditions:
If you share the Rules (including in modified form), you must retain the following if it is supplied within the Rules:
1. identification of the authors(s) ("author" field) of the Rule and any others designated to receive attribution, in any reasonable manner requested by the Rule author (including by pseudonym if designated).
2. a URI or hyperlink to the Rule set or explicit Rule to the extent reasonably practicable
3. indicate the Rules are licensed under this Detection Rule License, and include the text of, or the URI or hyperlink to, this Detection Rule License to the extent reasonably practicable
THE RULES ARE PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE RULES OR THE USE OR OTHER DEALINGS IN THE RULES.
-674
View File
@@ -1,674 +0,0 @@
GNU GENERAL PUBLIC LICENSE
Version 3, 29 June 2007
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
Everyone is permitted to copy and distribute verbatim copies
of this license document, but changing it is not allowed.
Preamble
The GNU General Public License is a free, copyleft license for
software and other kinds of works.
The licenses for most software and other practical works are designed
to take away your freedom to share and change the works. By contrast,
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program--to make sure it remains free
software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors. You can apply it to
your programs, too.
When we speak of free software, we are referring to freedom, not
price. Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs, and that you know you can do these things.
To protect your rights, we need to prevent others from denying you
these rights or asking you to surrender the rights. Therefore, you have
certain responsibilities if you distribute copies of the software, or if
you modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether
gratis or for a fee, you must pass on to the recipients the same
freedoms that you received. You must make sure that they, too, receive
or can get the source code. And you must show them these terms so they
know their rights.
Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains
that there is no warranty for this free software. For both users' and
authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.
Some devices are designed to deny users access to install or run
modified versions of the software inside them, although the manufacturer
can do so. This is fundamentally incompatible with the aim of
protecting users' freedom to change the software. The systematic
pattern of such abuse occurs in the area of products for individuals to
use, which is precisely where it is most unacceptable. Therefore, we
have designed this version of the GPL to prohibit the practice for those
products. If such problems arise substantially in other domains, we
stand ready to extend this provision to those domains in future versions
of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could
make it effectively proprietary. To prevent this, the GPL assures that
patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and
modification follow.
TERMS AND CONDITIONS
0. Definitions.
"This License" refers to version 3 of the GNU General Public License.
"Copyright" also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks.
"The Program" refers to any copyrightable work licensed under this
License. Each licensee is addressed as "you". "Licensees" and
"recipients" may be individuals or organizations.
To "modify" a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy. The resulting work is called a "modified version" of the
earlier work or a work "based on" the earlier work.
A "covered work" means either the unmodified Program or a work based
on the Program.
To "propagate" a work means to do anything with it that, without
permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a
computer or modifying a private copy. Propagation includes copying,
distribution (with or without modification), making available to the
public, and in some countries other activities as well.
To "convey" a work means any kind of propagation that enables other
parties to make or receive copies. Mere interaction with a user through
a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays "Appropriate Legal Notices"
to the extent that it includes a convenient and prominently visible
feature that (1) displays an appropriate copyright notice, and (2)
tells the user that there is no warranty for the work (except to the
extent that warranties are provided), that licensees may convey the
work under this License, and how to view a copy of this License. If
the interface presents a list of user commands or options, such as a
menu, a prominent item in the list meets this criterion.
1. Source Code.
The "source code" for a work means the preferred form of the work
for making modifications to it. "Object code" means any non-source
form of a work.
A "Standard Interface" means an interface that either is an official
standard defined by a recognized standards body, or, in the case of
interfaces specified for a particular programming language, one that
is widely used among developers working in that language.
The "System Libraries" of an executable work include anything, other
than the work as a whole, that (a) is included in the normal form of
packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that
Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form. A
"Major Component", in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system
(if any) on which the executable work runs, or a compiler used to
produce the work, or an object code interpreter used to run it.
The "Corresponding Source" for a work in object code form means all
the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities. However, it does not include the work's
System Libraries, or general-purpose tools or generally available free
programs which are used unmodified in performing those activities but
which are not part of the work. For example, Corresponding Source
includes interface definition files associated with source files for
the work, and the source code for shared libraries and dynamically
linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those
subprograms and other parts of the work.
The Corresponding Source need not include anything that users
can regenerate automatically from other parts of the Corresponding
Source.
The Corresponding Source for a work in source code form is that
same work.
2. Basic Permissions.
All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the stated
conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not
convey, without conditions so long as your license otherwise remains
in force. You may convey covered works to others for the sole purpose
of having them make modifications exclusively for you, or provide you
with facilities for running those works, provided that you comply with
the terms of this License in conveying all material for which you do
not control copyright. Those thus making or running the covered works
for you must do so exclusively on your behalf, under your direction
and control, on terms that prohibit them from making any copies of
your copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under
the conditions stated below. Sublicensing is not allowed; section 10
makes it unnecessary.
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an effective technological
measure under any applicable law fulfilling obligations under article
11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such
measures.
When you convey a covered work, you waive any legal power to forbid
circumvention of technological measures to the extent such circumvention
is effected by exercising rights under this License with respect to
the covered work, and you disclaim any intention to limit operation or
modification of the work as a means of enforcing, against the work's
users, your or third parties' legal rights to forbid circumvention of
technological measures.
4. Conveying Verbatim Copies.
You may convey verbatim copies of the Program's source code as you
receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code;
keep intact all notices of the absence of any warranty; and give all
recipients a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey,
and you may offer support or warranty protection for a fee.
5. Conveying Modified Source Versions.
You may convey a work based on the Program, or the modifications to
produce it from the Program, in the form of source code under the
terms of section 4, provided that you also meet all of these conditions:
a) The work must carry prominent notices stating that you modified
it, and giving a relevant date.
b) The work must carry prominent notices stating that it is
released under this License and any conditions added under section
7. This requirement modifies the requirement in section 4 to
"keep intact all notices".
c) You must license the entire work, as a whole, under this
License to anyone who comes into possession of a copy. This
License will therefore apply, along with any applicable section 7
additional terms, to the whole of the work, and all its parts,
regardless of how they are packaged. This License gives no
permission to license the work in any other way, but it does not
invalidate such permission if you have separately received it.
d) If the work has interactive user interfaces, each must display
Appropriate Legal Notices; however, if the Program has interactive
interfaces that do not display Appropriate Legal Notices, your
work need not make them do so.
A compilation of a covered work with other separate and independent
works, which are not by their nature extensions of the covered work,
and which are not combined with it such as to form a larger program,
in or on a volume of a storage or distribution medium, is called an
"aggregate" if the compilation and its resulting copyright are not
used to limit the access or legal rights of the compilation's users
beyond what the individual works permit. Inclusion of a covered work
in an aggregate does not cause this License to apply to the other
parts of the aggregate.
6. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms
of sections 4 and 5, provided that you also convey the
machine-readable Corresponding Source under the terms of this License,
in one of these ways:
a) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by the
Corresponding Source fixed on a durable physical medium
customarily used for software interchange.
b) Convey the object code in, or embodied in, a physical product
(including a physical distribution medium), accompanied by a
written offer, valid for at least three years and valid for as
long as you offer spare parts or customer support for that product
model, to give anyone who possesses the object code either (1) a
copy of the Corresponding Source for all the software in the
product that is covered by this License, on a durable physical
medium customarily used for software interchange, for a price no
more than your reasonable cost of physically performing this
conveying of source, or (2) access to copy the
Corresponding Source from a network server at no charge.
c) Convey individual copies of the object code with a copy of the
written offer to provide the Corresponding Source. This
alternative is allowed only occasionally and noncommercially, and
only if you received the object code with such an offer, in accord
with subsection 6b.
d) Convey the object code by offering access from a designated
place (gratis or for a charge), and offer equivalent access to the
Corresponding Source in the same way through the same place at no
further charge. You need not require recipients to copy the
Corresponding Source along with the object code. If the place to
copy the object code is a network server, the Corresponding Source
may be on a different server (operated by you or a third party)
that supports equivalent copying facilities, provided you maintain
clear directions next to the object code saying where to find the
Corresponding Source. Regardless of what server hosts the
Corresponding Source, you remain obligated to ensure that it is
available for as long as needed to satisfy these requirements.
e) Convey the object code using peer-to-peer transmission, provided
you inform other peers where the object code and Corresponding
Source of the work are being offered to the general public at no
charge under subsection 6d.
A separable portion of the object code, whose source code is excluded
from the Corresponding Source as a System Library, need not be
included in conveying the object code work.
A "User Product" is either (1) a "consumer product", which means any
tangible personal property which is normally used for personal, family,
or household purposes, or (2) anything designed or sold for incorporation
into a dwelling. In determining whether a product is a consumer product,
doubtful cases shall be resolved in favor of coverage. For a particular
product received by a particular user, "normally used" refers to a
typical or common use of that class of product, regardless of the status
of the particular user or of the way in which the particular user
actually uses, or expects or is expected to use, the product. A product
is a consumer product regardless of whether the product has substantial
commercial, industrial or non-consumer uses, unless such uses represent
the only significant mode of use of the product.
"Installation Information" for a User Product means any methods,
procedures, authorization keys, or other information required to install
and execute modified versions of a covered work in that User Product from
a modified version of its Corresponding Source. The information must
suffice to ensure that the continued functioning of the modified object
code is in no case prevented or interfered with solely because
modification has been made.
If you convey an object code work under this section in, or with, or
specifically for use in, a User Product, and the conveying occurs as
part of a transaction in which the right of possession and use of the
User Product is transferred to the recipient in perpetuity or for a
fixed term (regardless of how the transaction is characterized), the
Corresponding Source conveyed under this section must be accompanied
by the Installation Information. But this requirement does not apply
if neither you nor any third party retains the ability to install
modified object code on the User Product (for example, the work has
been installed in ROM).
The requirement to provide Installation Information does not include a
requirement to continue to provide support service, warranty, or updates
for a work that has been modified or installed by the recipient, or for
the User Product in which it has been modified or installed. Access to a
network may be denied when the modification itself materially and
adversely affects the operation of the network or violates the rules and
protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.
7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this
License by making exceptions from one or more of its conditions.
Additional permissions that are applicable to the entire Program shall
be treated as though they were included in this License, to the extent
that they are valid under applicable law. If additional permissions
apply only to part of the Program, that part may be used separately
under those permissions, but the entire Program remains governed by
this License without regard to the additional permissions.
When you convey a copy of a covered work, you may at your option
remove any additional permissions from that copy, or from any part of
it. (Additional permissions may be written to require their own
removal in certain cases when you modify the work.) You may place
additional permissions on material, added by you to a covered work,
for which you have or can give appropriate copyright permission.
Notwithstanding any other provision of this License, for material you
add to a covered work, you may (if authorized by the copyright holders of
that material) supplement the terms of this License with terms:
a) Disclaiming warranty or limiting liability differently from the
terms of sections 15 and 16 of this License; or
b) Requiring preservation of specified reasonable legal notices or
author attributions in that material or in the Appropriate Legal
Notices displayed by works containing it; or
c) Prohibiting misrepresentation of the origin of that material, or
requiring that modified versions of such material be marked in
reasonable ways as different from the original version; or
d) Limiting the use for publicity purposes of names of licensors or
authors of the material; or
e) Declining to grant rights under trademark law for use of some
trade names, trademarks, or service marks; or
f) Requiring indemnification of licensors and authors of that
material by anyone who conveys the material (or modified versions of
it) with contractual assumptions of liability to the recipient, for
any liability that these contractual assumptions directly impose on
those licensors and authors.
All other non-permissive additional terms are considered "further
restrictions" within the meaning of section 10. If the Program as you
received it, or any part of it, contains a notice stating that it is
governed by this License along with a term that is a further
restriction, you may remove that term. If a license document contains
a further restriction but permits relicensing or conveying under this
License, you may add to a covered work material governed by the terms
of that license document, provided that the further restriction does
not survive such relicensing or conveying.
If you add terms to a covered work in accord with this section, you
must place, in the relevant source files, a statement of the
additional terms that apply to those files, or a notice indicating
where to find the applicable terms.
Additional terms, permissive or non-permissive, may be stated in the
form of a separately written license, or stated as exceptions;
the above requirements apply either way.
8. Termination.
You may not propagate or modify a covered work except as expressly
provided under this License. Any attempt otherwise to propagate or
modify it is void, and will automatically terminate your rights under
this License (including any patent licenses granted under the third
paragraph of section 11).
However, if you cease all violation of this License, then your
license from a particular copyright holder is reinstated (a)
provisionally, unless and until the copyright holder explicitly and
finally terminates your license, and (b) permanently, if the copyright
holder fails to notify you of the violation by some reasonable means
prior to 60 days after the cessation.
Moreover, your license from a particular copyright holder is
reinstated permanently if the copyright holder notifies you of the
violation by some reasonable means, this is the first time you have
received notice of violation of this License (for any work) from that
copyright holder, and you cure the violation prior to 30 days after
your receipt of the notice.
Termination of your rights under this section does not terminate the
licenses of parties who have received copies or rights from you under
this License. If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same
material under section 10.
9. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or
run a copy of the Program. Ancillary propagation of a covered work
occurring solely as a consequence of using peer-to-peer transmission
to receive a copy likewise does not require acceptance. However,
nothing other than this License grants you permission to propagate or
modify any covered work. These actions infringe copyright if you do
not accept this License. Therefore, by modifying or propagating a
covered work, you indicate your acceptance of this License to do so.
10. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically
receives a license from the original licensors, to run, modify and
propagate that work, subject to this License. You are not responsible
for enforcing compliance by third parties with this License.
An "entity transaction" is a transaction transferring control of an
organization, or substantially all assets of one, or subdividing an
organization, or merging organizations. If propagation of a covered
work results from an entity transaction, each party to that
transaction who receives a copy of the work also receives whatever
licenses to the work the party's predecessor in interest had or could
give under the previous paragraph, plus a right to possession of the
Corresponding Source of the work from the predecessor in interest, if
the predecessor has it or can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the
rights granted or affirmed under this License. For example, you may
not impose a license fee, royalty, or other charge for exercise of
rights granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that
any patent claim is infringed by making, using, selling, offering for
sale, or importing the Program or any portion of it.
11. Patents.
A "contributor" is a copyright holder who authorizes use under this
License of the Program or a work on which the Program is based. The
work thus licensed is called the contributor's "contributor version".
A contributor's "essential patent claims" are all patent claims
owned or controlled by the contributor, whether already acquired or
hereafter acquired, that would be infringed by some manner, permitted
by this License, of making, using, or selling its contributor version,
but do not include claims that would be infringed only as a
consequence of further modification of the contributor version. For
purposes of this definition, "control" includes the right to grant
patent sublicenses in a manner consistent with the requirements of
this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free
patent license under the contributor's essential patent claims, to
make, use, sell, offer for sale, import and otherwise run, modify and
propagate the contents of its contributor version.
In the following three paragraphs, a "patent license" is any express
agreement or commitment, however denominated, not to enforce a patent
(such as an express permission to practice a patent or covenant not to
sue for patent infringement). To "grant" such a patent license to a
party means to make such an agreement or commitment not to enforce a
patent against the party.
If you convey a covered work, knowingly relying on a patent license,
and the Corresponding Source of the work is not available for anyone
to copy, free of charge and under the terms of this License, through a
publicly available network server or other readily accessible means,
then you must either (1) cause the Corresponding Source to be so
available, or (2) arrange to deprive yourself of the benefit of the
patent license for this particular work, or (3) arrange, in a manner
consistent with the requirements of this License, to extend the patent
license to downstream recipients. "Knowingly relying" means you have
actual knowledge that, but for the patent license, your conveying the
covered work in a country, or your recipient's use of the covered work
in a country, would infringe one or more identifiable patents in that
country that you have reason to believe are valid.
If, pursuant to or in connection with a single transaction or
arrangement, you convey, or propagate by procuring conveyance of, a
covered work, and grant a patent license to some of the parties
receiving the covered work authorizing them to use, propagate, modify
or convey a specific copy of the covered work, then the patent license
you grant is automatically extended to all recipients of the covered
work and works based on it.
A patent license is "discriminatory" if it does not include within
the scope of its coverage, prohibits the exercise of, or is
conditioned on the non-exercise of one or more of the rights that are
specifically granted under this License. You may not convey a covered
work if you are a party to an arrangement with a third party that is
in the business of distributing software, under which you make payment
to the third party based on the extent of your activity of conveying
the work, and under which the third party grants, to any of the
parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work
conveyed by you (or copies made from those copies), or (b) primarily
for and in connection with specific products or compilations that
contain the covered work, unless you entered into that arrangement,
or that patent license was granted, prior to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting
any implied license or other defenses to infringement that may
otherwise be available to you under applicable patent law.
12. No Surrender of Others' Freedom.
If conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License. If you cannot convey a
covered work so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you may
not convey it at all. For example, if you agree to terms that obligate you
to collect a royalty for further conveying from those to whom you convey
the Program, the only way you could satisfy both those terms and this
License would be to refrain entirely from conveying the Program.
13. Use with the GNU Affero General Public License.
Notwithstanding any other provision of this License, you have
permission to link or combine any covered work with a work licensed
under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work. The terms of this
License will continue to apply to the part which is the covered work,
but the special requirements of the GNU Affero General Public License,
section 13, concerning interaction through a network will apply to the
combination as such.
14. Revised Versions of this License.
The Free Software Foundation may publish revised and/or new versions of
the GNU General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.
Each version is given a distinguishing version number. If the
Program specifies that a certain numbered version of the GNU General
Public License "or any later version" applies to it, you have the
option of following the terms and conditions either of that numbered
version or of any later version published by the Free Software
Foundation. If the Program does not specify a version number of the
GNU General Public License, you may choose any version ever published
by the Free Software Foundation.
If the Program specifies that a proxy can decide which future
versions of the GNU General Public License can be used, that proxy's
public statement of acceptance of a version permanently authorizes you
to choose that version for the Program.
Later license versions may give you additional or different
permissions. However, no additional obligations are imposed on any
author or copyright holder as a result of your choosing to follow a
later version.
15. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.
17. Interpretation of Sections 15 and 16.
If the disclaimer of warranty and limitation of liability provided
above cannot be given local legal effect according to their terms,
reviewing courts shall apply local law that most closely approximates
an absolute waiver of all civil liability in connection with the
Program, unless a warranty or assumption of liability accompanies a
copy of the Program in return for a fee.
END OF TERMS AND CONDITIONS
How to Apply These Terms to Your New Programs
If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.
To do so, attach the following notices to the program. It is safest
to attach them to the start of each source file to most effectively
state the exclusion of warranty; and each file should have at least
the "copyright" line and a pointer to where the full notice is found.
{one line to give the program's name and a brief idea of what it does.}
Copyright (C) {year} {name of author}
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
Also add information on how to contact you by electronic and paper mail.
If the program does terminal interaction, make it output a short
notice like this when it starts in an interactive mode:
{project} Copyright (C) {year} {fullname}
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
This is free software, and you are welcome to redistribute it
under certain conditions; type `show c' for details.
The hypothetical commands `show w' and `show c' should show the appropriate
parts of the General Public License. Of course, your program's commands
might be different; for a GUI interface, you would use an "about box".
You should also get your employer (if you work as a programmer) or school,
if any, to sign a "copyright disclaimer" for the program, if necessary.
For more information on this, and how to apply and follow the GNU GPL, see
<http://www.gnu.org/licenses/>.
The GNU General Public License does not permit incorporating your program
into proprietary programs. If your program is a subroutine library, you
may consider it more useful to permit linking proprietary applications with
the library. If this is what you want to do, use the GNU Lesser General
Public License instead of this License. But first, please read
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
+102 -74
View File
@@ -1,97 +1,125 @@
.PHONY: test test-rules test-sigmac
.PHONY: test test-rules test-sigmac test-sigma2attack
TMPOUT = $(shell tempfile||mktemp)
COVSCOPE = tools/sigma/*.py,tools/sigma/backends/*.py,tools/sigmac,tools/merge_sigma
test: clearcov test-rules test-sigmac test-merge build finish
COVSCOPE = tools/sigma/*.py,tools/sigma/backends/*.py,tools/sigmac,tools/merge_sigma,tools/sigma2attack
export COVERAGE = coverage
test: clearcov test-rules test-sigmac test-merge test-sigma2attack build finish
clearcov:
rm -f .coverage
finish:
coverage report --fail-under=90
$(COVERAGE) report --fail-under=90
rm -f $(TMPOUT)
test-rules:
yamllint rules
tests/test_rules.py
tools/sigma-uuid -Ver rules/
tools/sigma_uuid -Ver rules/
test-sigmac:
coverage run -a --include=$(COVSCOPE) tools/sigmac
coverage run -a --include=$(COVSCOPE) tools/sigmac -h
coverage run -a --include=$(COVSCOPE) tools/sigmac -l
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvd -t es-qs rules/ > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs --shoot-yourself-in-the-foot rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c winlogbeat tests/test-modifiers.yml > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -O rulecomment -rvdI -c tools/config/winlogbeat.yml -t es-qs rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t kibana -c tools/config/winlogbeat.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t graylog rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t xpack-watcher -O email,index,webhook -c tools/config/winlogbeat.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t elastalert -c tools/config/winlogbeat.yml -O alert_methods=http_post,email -O emails=test@test.invalid -O http_post_url=http://test.invalid rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t elastalert-dsl -c tools/config/winlogbeat.yml -O alert_methods=http_post,email -O emails=test@test.invalid -O http_post_url=http://test.invalid rules/ > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunkxml -c tools/config/splunk-windows.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t logpoint -c tools/config/logpoint-windows.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t wdatp rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t ala rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t ala --backend-config tests/backend_config.yml rules/windows/process_creation/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-dsl -c tools/config/winlogbeat.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t powershell -c tools/config/powershell.yml -Ocsv rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t arcsight -c tools/config/arcsight.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qradar -c tools/config/qradar.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t limacharlie -c tools/config/limacharlie.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qualys -c tools/config/qualys.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t netwitness -c tools/config/netwitness.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t sumologic -O rulecomment -c tools/config/sumologic.yml rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level>=high,level<=critical,status=stable,logsource=windows,tag=attack.execution' rules/ > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level>=high,level<=critical,status=xstable,logsource=windows' rules/ > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level>=high,level<=xcritical,status=stable,logsource=windows' rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level=critical' rules/ > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level=xcritical' rules/ > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'foo=bar' rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -t es-qs rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c sysmon -c logstash-windows -t es-qs rules/ > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c sysmon -c logstash-windows -t splunk rules/ > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -c tools/config/generic/sysmon.yml -t es-qs rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -t es-qs rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -t kibana rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -Ooutput=curl -t kibana rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -t kibana rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -Ooutput=curl -t kibana rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -t xpack-watcher rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -t xpack-watcher rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/filebeat-defaultindex.yml -t xpack-watcher rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/splunk-windows.yml -t splunk rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/generic/sysmon.yml -c tools/config/splunk-windows.yml -t splunk rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t grep rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t fieldlist rules/ > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/winlogbeat.yml -O output=plain -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -t kibana -c tests/config-multiple_mapping.yml -c tests/config-multiple_mapping-2.yml tests/mapping-conditional-multi.yml > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/winlogbeat.yml -O output=json -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml -o $(TMPOUT) - < tests/collection_repeat.yml > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/winlogbeat.yml -O output=foobar -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/not_existing.yml > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_yaml.yml > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-no_identifiers.yml > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-no_condition.yml > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-invalid_identifier_reference.yml > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-invalid_aggregation.yml > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-wrong_identifier_definition.yml > /dev/null
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml rules/windows/builtin/win_susp_failed_logons_single_source.yml
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml -o /not_possible rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c not_existing rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tests/invalid_yaml.yml rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
! coverage run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tests/invalid_config.yml rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -h
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -l
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac --backend-help es-qs
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvd -t es-qs rules/ > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs --shoot-yourself-in-the-foot rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c winlogbeat tests/test-modifiers.yml > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -O rulecomment -rvdI -c tools/config/winlogbeat.yml -t es-qs rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t kibana -c tools/config/winlogbeat.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t graylog rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t xpack-watcher -O email,index,webhook -c tools/config/winlogbeat.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t elastalert -c tools/config/winlogbeat.yml -O alert_methods=http_post,email -O emails=test@test.invalid -O http_post_url=http://test.invalid rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t elastalert-dsl -c tools/config/winlogbeat.yml -O alert_methods=http_post,email -O emails=test@test.invalid -O http_post_url=http://test.invalid rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t ee-outliers -c tools/config/winlogbeat.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs -c sysmon -c winlogbeat -O case_insensitive_whitelist=* rules/windows/process_creation > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-qs -c tools/config/ecs-cloudtrail.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-rule -c tools/config/ecs-cloudtrail.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t kibana -c tools/config/ecs-cloudtrail.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t xpack-watcher -c tools/config/ecs-cloudtrail.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t elastalert -c tools/config/ecs-cloudtrail.yml rules/ > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunkxml -c tools/config/splunk-windows.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t logpoint -c tools/config/logpoint-windows.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t mdatp rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t ala rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t ala-rule rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t ala --backend-config tests/backend_config.yml rules/windows/process_creation/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-dsl -c tools/config/winlogbeat.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t es-rule -c tools/config/winlogbeat.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t powershell -c tools/config/powershell.yml -Ocsv rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t arcsight -c tools/config/arcsight.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t arcsight-esm -c tools/config/arcsight.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qradar -c tools/config/qradar.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t stix -c tools/config/stix.yml -c tools/config/stix-qradar.yml -c tools/config/stix-windows.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t limacharlie -c tools/config/limacharlie.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t carbonblack -c tools/config/carbon-black.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qualys -c tools/config/qualys.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t netwitness -c tools/config/netwitness.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t sumologic -O rulecomment -c tools/config/sumologic.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t humio -O rulecomment -c tools/config/humio.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t crowdstrike -O rulecomment -c tools/config/crowdstrike.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t sql -c sysmon rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t sqlite -c sysmon rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t csharp -c sysmon rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t logiq -c sysmon rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level>=high,level<=critical,status=stable,logsource=windows,tag=attack.execution' rules/ > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level>=high,level<=critical,status=xstable,logsource=windows' rules/ > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level>=high,level<=xcritical,status=stable,logsource=windows' rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level=critical' rules/ > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level=xcritical' rules/ > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'foo=bar' rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -t es-qs rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c ecs-proxy -t es-qs rules/proxy > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c sysmon -c logstash-windows -t es-qs rules/ > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c sysmon -c logstash-windows -t splunk rules/ > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -c tools/config/generic/sysmon.yml -t es-qs rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -t es-qs rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -t kibana rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -Ooutput=curl -t kibana rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -t kibana rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -Ooutput=curl -t kibana rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-windows.yml -t xpack-watcher rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/logstash-linux.yml -t xpack-watcher rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/filebeat-defaultindex.yml -t xpack-watcher rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/splunk-windows.yml -t splunk rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -c tools/config/generic/sysmon.yml -c tools/config/splunk-windows.yml -t splunk rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t grep rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t fieldlist rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/winlogbeat.yml -O output=plain -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t kibana -c tests/config-multiple_mapping.yml -c tests/config-multiple_mapping-2.yml tests/mapping-conditional-multi.yml > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/winlogbeat.yml -O output=json -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml -o $(TMPOUT) - < tests/collection_repeat.yml > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/winlogbeat.yml -O output=foobar -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/not_existing.yml > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_yaml.yml > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-no_identifiers.yml > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-no_condition.yml > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-invalid_identifier_reference.yml > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-invalid_aggregation.yml > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-wrong_identifier_definition.yml > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml rules/windows/builtin/win_susp_failed_logons_single_source.yml
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml -o /not_possible rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c not_existing rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tests/invalid_yaml.yml rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tests/invalid_config.yml rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
test-merge:
tests/test-merge.sh
! coverage run -a --include=$(COVSCOPE) tools/merge_sigma tests/not_existing.yml > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/merge_sigma tests/not_existing.yml > /dev/null
test-backend-es-qs:
tests/test-backend-es-qs.py
build: tools/sigmac tools/merge_sigma tools/sigma/*.py tools/setup.py tools/setup.cfg
test-backend-sql:
cd tools && python3 setup.py install
cd tools && $(COVERAGE) run -m pytest tests/test_backend_sql.py tests/test_backend_sqlite.py
test-sigma2attack:
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigma2attack
build: tools/sigma/*.py tools/setup.py tools/setup.cfg
cd tools && python3 setup.py bdist_wheel sdist
upload-test: build
+11 -7
View File
@@ -4,15 +4,19 @@ url = "https://pypi.org/simple"
verify_ssl = true
[dev-packages]
coverage = "~=5.0"
yamllint = "~=1.21"
elasticsearch = "~=7.6"
elasticsearch-async = "~=6.2"
pytest = "~=5.4"
colorama = "*"
[packages]
coverage = ">=4.4.1"
yamllint = ">=1.10.0"
elasticsearch = "*"
elasticsearch-async = "*"
pymisp = "*"
PyYAML = ">=3.11"
progressbar2 = "*"
requests = "~=2.23"
urllib3 = "~=1.25"
progressbar2 = "~=3.47"
pymisp = "~=2.4.123"
PyYAML = "~=5.1"
[requires]
python_version = "3.6"
Generated
+294 -180
View File
@@ -1,7 +1,7 @@
{
"_meta": {
"hash": {
"sha256": "f3f1c14d8b9cfcd5608e018017012b8712a94fb7a56f633ae179bd3451d636fb"
"sha256": "588c969e3c9cf945190a258f9607bbcc53ee9715d34e538b130a852459e4848a"
},
"pipfile-spec": 6,
"requires": {
@@ -16,6 +16,147 @@
]
},
"default": {
"attrs": {
"hashes": [
"sha256:08a96c641c3a74e44eb59afb61a24f2cb9f4d7188748e76ba4bb5edfa3cb7d1c",
"sha256:f7b7ce16570fe9965acd6d30101a28f62fb4a7f9e926b3bbc9b61f8b04247e72"
],
"version": "==19.3.0"
},
"certifi": {
"hashes": [
"sha256:017c25db2a153ce562900032d5bc68e9f191e44e9a0f762f373977de9df1fbb3",
"sha256:25b64c7da4cd7479594d035c08c2d809eb4aab3a26e5a990ea98cc450c320f1f"
],
"version": "==2019.11.28"
},
"chardet": {
"hashes": [
"sha256:84ab92ed1c4d4f16916e05906b6b75a6c0fb5db821cc65e70cbd64a3e2a5eaae",
"sha256:fc323ffcaeaed0e0a02bf4d117757b98aed530d9ed4531e3e15460124c106691"
],
"version": "==3.0.4"
},
"deprecated": {
"hashes": [
"sha256:408038ab5fdeca67554e8f6742d1521cd3cd0ee0ff9d47f29318a4f4da31c308",
"sha256:8b6a5aa50e482d8244a62e5582b96c372e87e3a28e8b49c316e46b95c76a611d"
],
"version": "==1.2.7"
},
"idna": {
"hashes": [
"sha256:7588d1c14ae4c77d74036e8c22ff447b26d0fde8f007354fd48a7814db15b7cb",
"sha256:a068a21ceac8a4d63dbfd964670474107f541babbd2250d61922f029858365fa"
],
"version": "==2.9"
},
"importlib-metadata": {
"hashes": [
"sha256:2a688cbaa90e0cc587f1df48bdc97a6eadccdcd9c35fb3f976a09e3b5016d90f",
"sha256:34513a8a0c4962bc66d35b359558fd8a5e10cd472d37aec5f66858addef32c1e"
],
"markers": "python_version < '3.8'",
"version": "==1.6.0"
},
"jsonschema": {
"hashes": [
"sha256:4e5b3cf8216f577bee9ce139cbe72eca3ea4f292ec60928ff24758ce626cd163",
"sha256:c8a85b28d377cc7737e46e2d9f2b4f44ee3c0e1deac6bf46ddefc7187d30797a"
],
"version": "==3.2.0"
},
"progressbar2": {
"hashes": [
"sha256:2c21c14482016162852c8265da03886c2b4dea6f84e5a817ad9b39f6bd82a772",
"sha256:7849b84c01a39e4eddd2b369a129fed5e24dfb78d484ae63f9e08e58277a2928"
],
"index": "pypi",
"version": "==3.50.1"
},
"pymisp": {
"hashes": [
"sha256:1d27bc81ed492b5e6e216d099dcadf943d5c0c09457d6464ed33db8da39d0fdd",
"sha256:318cb9cee371ce3918b3216e2c1a61938747203f89f9d42d4e4a51b40066f9b3"
],
"index": "pypi",
"version": "==2.4.123"
},
"pyrsistent": {
"hashes": [
"sha256:28669905fe725965daa16184933676547c5bb40a5153055a8dee2a4bd7933ad3"
],
"version": "==0.16.0"
},
"python-dateutil": {
"hashes": [
"sha256:73ebfe9dbf22e832286dafa60473e4cd239f8592f699aa5adaf10050e6e1823c",
"sha256:75bb3f31ea686f1197762692a9ee6a7550b59fc6ca3a1f4b5d7e32fb98e2da2a"
],
"version": "==2.8.1"
},
"python-utils": {
"hashes": [
"sha256:ebaadab29d0cb9dca0a82eab9c405f5be5125dbbff35b8f32cc433fa498dbaa7",
"sha256:f21fc09ff58ea5ebd1fd2e8ef7f63e39d456336900f26bdc9334a03a3f7d8089"
],
"version": "==2.4.0"
},
"pyyaml": {
"hashes": [
"sha256:1adecc22f88d38052fb787d959f003811ca858b799590a5eaa70e63dca50308c",
"sha256:436bc774ecf7c103814098159fbb84c2715d25980175292c648f2da143909f95",
"sha256:460a5a4248763f6f37ea225d19d5c205677d8d525f6a83357ca622ed541830c2",
"sha256:5a22a9c84653debfbf198d02fe592c176ea548cccce47553f35f466e15cf2fd4",
"sha256:7a5d3f26b89d688db27822343dfa25c599627bc92093e788956372285c6298ad",
"sha256:9372b04a02080752d9e6f990179a4ab840227c6e2ce15b95e1278456664cf2ba",
"sha256:a5dcbebee834eaddf3fa7366316b880ff4062e4bcc9787b78c7fbb4a26ff2dd1",
"sha256:aee5bab92a176e7cd034e57f46e9df9a9862a71f8f37cad167c6fc74c65f5b4e",
"sha256:c51f642898c0bacd335fc119da60baae0824f2cde95b0330b56c0553439f0673",
"sha256:c68ea4d3ba1705da1e0d85da6684ac657912679a649e8868bd850d2c299cce13",
"sha256:e23d0cc5299223dcc37885dae624f382297717e459ea24053709675a976a3e19"
],
"index": "pypi",
"version": "==5.1"
},
"requests": {
"hashes": [
"sha256:43999036bfa82904b6af1d99e4882b560e5e2c68e5c4b0aa03b655f3d7d73fee",
"sha256:b3f43d496c6daba4493e7c431722aeb7dbc6288f52a6e04e7b6023b0247817e6"
],
"index": "pypi",
"version": "==2.23.0"
},
"six": {
"hashes": [
"sha256:236bdbdce46e6e6a3d61a337c0f8b763ca1e8717c03b369e87a7ec7ce1319c0a",
"sha256:8f3cd2e254d8f793e7f3d6d9df77b92252b52637291d0f0da013c76ea2724b6c"
],
"version": "==1.14.0"
},
"urllib3": {
"hashes": [
"sha256:2f3db8b19923a873b3e5256dc9c2dedfa883e33d87c690d9c7913e1f40673cdc",
"sha256:87716c2d2a7121198ebcb7ce7cccf6ce5e9ba539041cfbaeecfb641dc0bf6acc"
],
"index": "pypi",
"version": "==1.25.8"
},
"wrapt": {
"hashes": [
"sha256:b62ffa81fb85f4332a4f609cab4ac40709470da05643a082ec1eb88e6d9b97d7"
],
"version": "==1.12.1"
},
"zipp": {
"hashes": [
"sha256:aa36550ff0c0b7ef7fa639055d797116ee891440eac1a56f378e2d3179e0320b",
"sha256:c599e4d75c98f6798c509911d08a22e6c021d074469042177c8c86fb92eefd96"
],
"version": "==3.1.0"
}
},
"develop": {
"aiohttp": {
"hashes": [
"sha256:1e984191d1ec186881ffaed4581092ba04f7c61582a177b187d3a2f07ed9719e",
@@ -47,13 +188,6 @@
],
"version": "==19.3.0"
},
"certifi": {
"hashes": [
"sha256:e4f3620cfea4f83eedc95b24abd9cd56f3c4b146dd0177e83a21b4eb49e21e50",
"sha256:fd7c7c74727ddcf00e9acd26bba8da604ffec95bf1c2144e67aff7a8b50e6cef"
],
"version": "==2019.9.11"
},
"chardet": {
"hashes": [
"sha256:84ab92ed1c4d4f16916e05906b6b75a6c0fb5db821cc65e70cbd64a3e2a5eaae",
@@ -61,58 +195,58 @@
],
"version": "==3.0.4"
},
"coverage": {
"colorama": {
"hashes": [
"sha256:08907593569fe59baca0bf152c43f3863201efb6113ecb38ce7e97ce339805a6",
"sha256:0be0f1ed45fc0c185cfd4ecc19a1d6532d72f86a2bac9de7e24541febad72650",
"sha256:141f08ed3c4b1847015e2cd62ec06d35e67a3ac185c26f7635f4406b90afa9c5",
"sha256:19e4df788a0581238e9390c85a7a09af39c7b539b29f25c89209e6c3e371270d",
"sha256:23cc09ed395b03424d1ae30dcc292615c1372bfba7141eb85e11e50efaa6b351",
"sha256:245388cda02af78276b479f299bbf3783ef0a6a6273037d7c60dc73b8d8d7755",
"sha256:331cb5115673a20fb131dadd22f5bcaf7677ef758741312bee4937d71a14b2ef",
"sha256:386e2e4090f0bc5df274e720105c342263423e77ee8826002dcffe0c9533dbca",
"sha256:3a794ce50daee01c74a494919d5ebdc23d58873747fa0e288318728533a3e1ca",
"sha256:60851187677b24c6085248f0a0b9b98d49cba7ecc7ec60ba6b9d2e5574ac1ee9",
"sha256:63a9a5fc43b58735f65ed63d2cf43508f462dc49857da70b8980ad78d41d52fc",
"sha256:6b62544bb68106e3f00b21c8930e83e584fdca005d4fffd29bb39fb3ffa03cb5",
"sha256:6ba744056423ef8d450cf627289166da65903885272055fb4b5e113137cfa14f",
"sha256:7494b0b0274c5072bddbfd5b4a6c6f18fbbe1ab1d22a41e99cd2d00c8f96ecfe",
"sha256:826f32b9547c8091679ff292a82aca9c7b9650f9fda3e2ca6bf2ac905b7ce888",
"sha256:93715dffbcd0678057f947f496484e906bf9509f5c1c38fc9ba3922893cda5f5",
"sha256:9a334d6c83dfeadae576b4d633a71620d40d1c379129d587faa42ee3e2a85cce",
"sha256:af7ed8a8aa6957aac47b4268631fa1df984643f07ef00acd374e456364b373f5",
"sha256:bf0a7aed7f5521c7ca67febd57db473af4762b9622254291fbcbb8cd0ba5e33e",
"sha256:bf1ef9eb901113a9805287e090452c05547578eaab1b62e4ad456fcc049a9b7e",
"sha256:c0afd27bc0e307a1ffc04ca5ec010a290e49e3afbe841c5cafc5c5a80ecd81c9",
"sha256:dd579709a87092c6dbee09d1b7cfa81831040705ffa12a1b248935274aee0437",
"sha256:df6712284b2e44a065097846488f66840445eb987eb81b3cc6e4149e7b6982e1",
"sha256:e07d9f1a23e9e93ab5c62902833bf3e4b1f65502927379148b6622686223125c",
"sha256:e2ede7c1d45e65e209d6093b762e98e8318ddeff95317d07a27a2140b80cfd24",
"sha256:e4ef9c164eb55123c62411f5936b5c2e521b12356037b6e1c2617cef45523d47",
"sha256:eca2b7343524e7ba246cab8ff00cab47a2d6d54ada3b02772e908a45675722e2",
"sha256:eee64c616adeff7db37cc37da4180a3a5b6177f5c46b187894e633f088fb5b28",
"sha256:ef824cad1f980d27f26166f86856efe11eff9912c4fed97d3804820d43fa550c",
"sha256:efc89291bd5a08855829a3c522df16d856455297cf35ae827a37edac45f466a7",
"sha256:fa964bae817babece5aa2e8c1af841bebb6d0b9add8e637548809d040443fee0",
"sha256:ff37757e068ae606659c28c3bd0d923f9d29a85de79bf25b2b34b148473b5025"
"sha256:7d73d2a99753107a36ac6b455ee49046802e59d9d076ef8e47b61499fa29afff",
"sha256:e96da0d330793e2cb9485e9ddfd918d456036c7149416295932478192f4436a1"
],
"index": "pypi",
"version": "==4.5.4"
"version": "==0.4.3"
},
"deprecated": {
"coverage": {
"hashes": [
"sha256:a515c4cf75061552e0284d123c3066fbbe398952c87333a92b8fc3dd8e4f9cc1",
"sha256:b07b414c8aac88f60c1d837d21def7e83ba711052e03b3cbaff27972567a8f8d"
"sha256:03f630aba2b9b0d69871c2e8d23a69b7fe94a1e2f5f10df5049c0df99db639a0",
"sha256:046a1a742e66d065d16fb564a26c2a15867f17695e7f3d358d7b1ad8a61bca30",
"sha256:0a907199566269e1cfa304325cc3b45c72ae341fbb3253ddde19fa820ded7a8b",
"sha256:165a48268bfb5a77e2d9dbb80de7ea917332a79c7adb747bd005b3a07ff8caf0",
"sha256:1b60a95fc995649464e0cd48cecc8288bac5f4198f21d04b8229dc4097d76823",
"sha256:1f66cf263ec77af5b8fe14ef14c5e46e2eb4a795ac495ad7c03adc72ae43fafe",
"sha256:2e08c32cbede4a29e2a701822291ae2bc9b5220a971bba9d1e7615312efd3037",
"sha256:3844c3dab800ca8536f75ae89f3cf566848a3eb2af4d9f7b1103b4f4f7a5dad6",
"sha256:408ce64078398b2ee2ec08199ea3fcf382828d2f8a19c5a5ba2946fe5ddc6c31",
"sha256:443be7602c790960b9514567917af538cac7807a7c0c0727c4d2bbd4014920fd",
"sha256:4482f69e0701139d0f2c44f3c395d1d1d37abd81bfafbf9b6efbe2542679d892",
"sha256:4a8a259bf990044351baf69d3b23e575699dd60b18460c71e81dc565f5819ac1",
"sha256:513e6526e0082c59a984448f4104c9bf346c2da9961779ede1fc458e8e8a1f78",
"sha256:5f587dfd83cb669933186661a351ad6fc7166273bc3e3a1531ec5c783d997aac",
"sha256:62061e87071497951155cbccee487980524d7abea647a1b2a6eb6b9647df9006",
"sha256:641e329e7f2c01531c45c687efcec8aeca2a78a4ff26d49184dce3d53fc35014",
"sha256:65a7e00c00472cd0f59ae09d2fb8a8aaae7f4a0cf54b2b74f3138d9f9ceb9cb2",
"sha256:6ad6ca45e9e92c05295f638e78cd42bfaaf8ee07878c9ed73e93190b26c125f7",
"sha256:73aa6e86034dad9f00f4bbf5a666a889d17d79db73bc5af04abd6c20a014d9c8",
"sha256:7c9762f80a25d8d0e4ab3cb1af5d9dffbddb3ee5d21c43e3474c84bf5ff941f7",
"sha256:85596aa5d9aac1bf39fe39d9fa1051b0f00823982a1de5766e35d495b4a36ca9",
"sha256:86a0ea78fd851b313b2e712266f663e13b6bc78c2fb260b079e8b67d970474b1",
"sha256:8a620767b8209f3446197c0e29ba895d75a1e272a36af0786ec70fe7834e4307",
"sha256:922fb9ef2c67c3ab20e22948dcfd783397e4c043a5c5fa5ff5e9df5529074b0a",
"sha256:9fad78c13e71546a76c2f8789623eec8e499f8d2d799f4b4547162ce0a4df435",
"sha256:a37c6233b28e5bc340054cf6170e7090a4e85069513320275a4dc929144dccf0",
"sha256:c3fc325ce4cbf902d05a80daa47b645d07e796a80682c1c5800d6ac5045193e5",
"sha256:cda33311cb9fb9323958a69499a667bd728a39a7aa4718d7622597a44c4f1441",
"sha256:db1d4e38c9b15be1521722e946ee24f6db95b189d1447fa9ff18dd16ba89f732",
"sha256:eda55e6e9ea258f5e4add23bcf33dc53b2c319e70806e180aecbff8d90ea24de",
"sha256:f372cdbb240e09ee855735b9d85e7f50730dcfb6296b74b95a3e5dea0615c4c1"
],
"version": "==1.2.6"
"index": "pypi",
"version": "==5.0.4"
},
"elasticsearch": {
"hashes": [
"sha256:693935914d59a517dfffdaab547ff906712a386d9e25027517464960221cbd4c",
"sha256:7644fa0a9ae524344185bda561826a781a5c6bd4d3eb98a24515c567aab88327"
"sha256:d228b2d37ac0865f7631335268172dbdaa426adec1da3ed006dddf05134f89c8",
"sha256:f4bb05cfe55cf369bdcb4d86d0129d39d66a91fd9517b13cd4e4231fbfcf5c81"
],
"index": "pypi",
"version": "==7.0.5"
"version": "==7.6.0"
},
"elasticsearch-async": {
"hashes": [
@@ -124,10 +258,10 @@
},
"idna": {
"hashes": [
"sha256:c357b3f628cf53ae2c4c05627ecc484553142ca23264e593d327bcde5e9c3407",
"sha256:ea8b7f6188e6fa117537c3df7da9fc686d485087abf6ac197f9c46432f7e4a3c"
"sha256:7588d1c14ae4c77d74036e8c22ff447b26d0fde8f007354fd48a7814db15b7cb",
"sha256:a068a21ceac8a4d63dbfd964670474107f541babbd2250d61922f029858365fa"
],
"version": "==2.8"
"version": "==2.9"
},
"idna-ssl": {
"hashes": [
@@ -138,134 +272,107 @@
},
"importlib-metadata": {
"hashes": [
"sha256:aa18d7378b00b40847790e7c27e11673d7fed219354109d0e7b9e5b25dc3ad26",
"sha256:d5f18a79777f3aa179c145737780282e27b508fc8fd688cb17c7a813e8bd39af"
"sha256:2a688cbaa90e0cc587f1df48bdc97a6eadccdcd9c35fb3f976a09e3b5016d90f",
"sha256:34513a8a0c4962bc66d35b359558fd8a5e10cd472d37aec5f66858addef32c1e"
],
"version": "==0.23"
},
"jsonschema": {
"hashes": [
"sha256:2fa0684276b6333ff3c0b1b27081f4b2305f0a36cf702a23db50edb141893c3f",
"sha256:94c0a13b4a0616458b42529091624e66700a17f847453e52279e35509a5b7631"
],
"version": "==3.1.1"
"markers": "python_version < '3.8'",
"version": "==1.6.0"
},
"more-itertools": {
"hashes": [
"sha256:409cd48d4db7052af495b09dec721011634af3753ae1ef92d2b32f73a745f832",
"sha256:92b8c4b06dac4f0611c0729b2f2ede52b2e1bac1ab48f089c7ddc12e26bb60c4"
"sha256:5dd8bcf33e5f9513ffa06d5ad33d78f31e1931ac9a18f33d37e77a180d393a7c",
"sha256:b1ddb932186d8a6ac451e1d95844b382f55e12686d51ca0c68b6f61f2ab7a507"
],
"version": "==7.2.0"
"version": "==8.2.0"
},
"multidict": {
"hashes": [
"sha256:024b8129695a952ebd93373e45b5d341dbb87c17ce49637b34000093f243dd4f",
"sha256:041e9442b11409be5e4fc8b6a97e4bcead758ab1e11768d1e69160bdde18acc3",
"sha256:045b4dd0e5f6121e6f314d81759abd2c257db4634260abcfe0d3f7083c4908ef",
"sha256:047c0a04e382ef8bd74b0de01407e8d8632d7d1b4db6f2561106af812a68741b",
"sha256:068167c2d7bbeebd359665ac4fff756be5ffac9cda02375b5c5a7c4777038e73",
"sha256:148ff60e0fffa2f5fad2eb25aae7bef23d8f3b8bdaf947a65cdbe84a978092bc",
"sha256:1d1c77013a259971a72ddaa83b9f42c80a93ff12df6a4723be99d858fa30bee3",
"sha256:1d48bc124a6b7a55006d97917f695effa9725d05abe8ee78fd60d6588b8344cd",
"sha256:31dfa2fc323097f8ad7acd41aa38d7c614dd1960ac6681745b6da124093dc351",
"sha256:34f82db7f80c49f38b032c5abb605c458bac997a6c3142e0d6c130be6fb2b941",
"sha256:3d5dd8e5998fb4ace04789d1d008e2bb532de501218519d70bb672c4c5a2fc5d",
"sha256:4a6ae52bd3ee41ee0f3acf4c60ceb3f44e0e3bc52ab7da1c2b2aa6703363a3d1",
"sha256:4b02a3b2a2f01d0490dd39321c74273fed0568568ea0e7ea23e02bd1fb10a10b",
"sha256:4b843f8e1dd6a3195679d9838eb4670222e8b8d01bc36c9894d6c3538316fa0a",
"sha256:5de53a28f40ef3c4fd57aeab6b590c2c663de87a5af76136ced519923d3efbb3",
"sha256:61b2b33ede821b94fa99ce0b09c9ece049c7067a33b279f343adfe35108a4ea7",
"sha256:6a3a9b0f45fd75dc05d8e93dc21b18fc1670135ec9544d1ad4acbcf6b86781d0",
"sha256:76ad8e4c69dadbb31bad17c16baee61c0d1a4a73bed2590b741b2e1a46d3edd0",
"sha256:7ba19b777dc00194d1b473180d4ca89a054dd18de27d0ee2e42a103ec9b7d014",
"sha256:7c1b7eab7a49aa96f3db1f716f0113a8a2e93c7375dd3d5d21c4941f1405c9c5",
"sha256:7fc0eee3046041387cbace9314926aa48b681202f8897f8bff3809967a049036",
"sha256:8ccd1c5fff1aa1427100ce188557fc31f1e0a383ad8ec42c559aabd4ff08802d",
"sha256:8e08dd76de80539d613654915a2f5196dbccc67448df291e69a88712ea21e24a",
"sha256:c18498c50c59263841862ea0501da9f2b3659c00db54abfbf823a80787fde8ce",
"sha256:c49db89d602c24928e68c0d510f4fcf8989d77defd01c973d6cbe27e684833b1",
"sha256:ce20044d0317649ddbb4e54dab3c1bcc7483c78c27d3f58ab3d0c7e6bc60d26a",
"sha256:d1071414dd06ca2eafa90c85a079169bfeb0e5f57fd0b45d44c092546fcd6fd9",
"sha256:d3be11ac43ab1a3e979dac80843b42226d5d3cccd3986f2e03152720a4297cd7",
"sha256:db603a1c235d110c860d5f39988ebc8218ee028f07a7cbc056ba6424372ca31b"
"sha256:317f96bc0950d249e96d8d29ab556d01dd38888fbe68324f46fd834b430169f1",
"sha256:42f56542166040b4474c0c608ed051732033cd821126493cf25b6c276df7dd35",
"sha256:4b7df040fb5fe826d689204f9b544af469593fb3ff3a069a6ad3409f742f5928",
"sha256:544fae9261232a97102e27a926019100a9db75bec7b37feedd74b3aa82f29969",
"sha256:620b37c3fea181dab09267cd5a84b0f23fa043beb8bc50d8474dd9694de1fa6e",
"sha256:6e6fef114741c4d7ca46da8449038ec8b1e880bbe68674c01ceeb1ac8a648e78",
"sha256:7774e9f6c9af3f12f296131453f7b81dabb7ebdb948483362f5afcaac8a826f1",
"sha256:85cb26c38c96f76b7ff38b86c9d560dea10cf3459bb5f4caf72fc1bb932c7136",
"sha256:a326f4240123a2ac66bb163eeba99578e9d63a8654a59f4688a79198f9aa10f8",
"sha256:ae402f43604e3b2bc41e8ea8b8526c7fa7139ed76b0d64fc48e28125925275b2",
"sha256:aee283c49601fa4c13adc64c09c978838a7e812f85377ae130a24d7198c0331e",
"sha256:b51249fdd2923739cd3efc95a3d6c363b67bbf779208e9f37fd5e68540d1a4d4",
"sha256:bb519becc46275c594410c6c28a8a0adc66fe24fef154a9addea54c1adb006f5",
"sha256:c2c37185fb0af79d5c117b8d2764f4321eeb12ba8c141a95d0aa8c2c1d0a11dd",
"sha256:dc561313279f9d05a3d0ffa89cd15ae477528ea37aa9795c4654588a3287a9ab",
"sha256:e439c9a10a95cb32abd708bb8be83b2134fa93790a4fb0535ca36db3dda94d20",
"sha256:fc3b4adc2ee8474cb3cd2a155305d5f8eda0a9c91320f83e55748e1fcb68f8e3"
],
"version": "==4.5.2"
"version": "==4.7.5"
},
"packaging": {
"hashes": [
"sha256:3c292b474fda1671ec57d46d739d072bfd495a4f51ad01a055121d81e952b7a3",
"sha256:82f77b9bee21c1bafbf35a84905d604d5d1223801d639cf3ed140bd651c08752"
],
"version": "==20.3"
},
"pathspec": {
"hashes": [
"sha256:e285ccc8b0785beadd4c18e5708b12bb8fcf529a1e61215b3feff1d1e559ea5c"
"sha256:163b0632d4e31cef212976cf57b43d9fd6b0bac6e67c26015d611a647d5e7424",
"sha256:562aa70af2e0d434367d9790ad37aed893de47f1693e4201fd1d3dca15d19b96"
],
"version": "==0.6.0"
"version": "==0.7.0"
},
"progressbar2": {
"pluggy": {
"hashes": [
"sha256:7538d02045a1fd3aa2b2834bfda463da8755bd3ff050edc6c5ddff3bc616215f",
"sha256:eb774d1e0d03ea4730f381c13c2c6ae7abb5ddfb14d8321d7a58a61aa708f0d0"
"sha256:15b2acde666561e1298d71b523007ed7364de07029219b604cf808bfa1c765b0",
"sha256:966c145cd83c96502c3c3868f50408687b38434af77734af1e9ca461a4081d2d"
],
"version": "==0.13.1"
},
"py": {
"hashes": [
"sha256:5e27081401262157467ad6e7f851b7aa402c5852dbcb3dae06768434de5752aa",
"sha256:c20fdd83a5dbc0af9efd622bee9a5564e278f6380fffcacc43ba6f43db2813b0"
],
"version": "==1.8.1"
},
"pyparsing": {
"hashes": [
"sha256:4c830582a84fb022400b85429791bc551f1f4871c33f23e44f353119e92f969f",
"sha256:c342dccb5250c08d45fd6f8b4a559613ca603b57498511740e65cd11a2e7dcec"
],
"version": "==2.4.6"
},
"pytest": {
"hashes": [
"sha256:0e5b30f5cb04e887b91b1ee519fa3d89049595f428c1db76e73bd7f17b09b172",
"sha256:84dde37075b8805f3d1f392cc47e38a0e59518fb46a431cfdaf7cf1ce805f970"
],
"index": "pypi",
"version": "==3.47.0"
},
"pymisp": {
"hashes": [
"sha256:17b145dbc39a1ba4ebce60e8b75a479d2c8fd3c2a239f32682f2e1a3636469ec",
"sha256:814023f346f9e1dcf6763d93450df44ff0157f2061c612a7eaf2020280f588a3",
"sha256:de67196f6a8916b9c52a84a1c45ea967c53fa9d2b3795b070ad2c1cbc28d79d7"
],
"index": "pypi",
"version": "==2.4.117.2"
},
"pyrsistent": {
"hashes": [
"sha256:eb6545dbeb1aa69ab1fb4809bfbf5a8705e44d92ef8fc7c2361682a47c46c778"
],
"version": "==0.15.5"
},
"python-dateutil": {
"hashes": [
"sha256:73ebfe9dbf22e832286dafa60473e4cd239f8592f699aa5adaf10050e6e1823c",
"sha256:75bb3f31ea686f1197762692a9ee6a7550b59fc6ca3a1f4b5d7e32fb98e2da2a"
],
"version": "==2.8.1"
},
"python-utils": {
"hashes": [
"sha256:34aaf26b39b0b86628008f2ae0ac001b30e7986a8d303b61e1357dfcdad4f6d3",
"sha256:e25f840564554eaded56eaa395bca507b0b9e9f0ae5ecb13a8cb785305c56d25"
],
"version": "==2.3.0"
"version": "==5.4.1"
},
"pyyaml": {
"hashes": [
"sha256:0113bc0ec2ad727182326b61326afa3d1d8280ae1122493553fd6f4397f33df9",
"sha256:01adf0b6c6f61bd11af6e10ca52b7d4057dd0be0343eb9283c878cf3af56aee4",
"sha256:5124373960b0b3f4aa7df1707e63e9f109b5263eca5976c66e08b1c552d4eaf8",
"sha256:5ca4f10adbddae56d824b2c09668e91219bb178a1eee1faa56af6f99f11bf696",
"sha256:7907be34ffa3c5a32b60b95f4d95ea25361c951383a894fec31be7252b2b6f34",
"sha256:7ec9b2a4ed5cad025c2278a1e6a19c011c80a3caaac804fd2d329e9cc2c287c9",
"sha256:87ae4c829bb25b9fe99cf71fbb2140c448f534e24c998cc60f39ae4f94396a73",
"sha256:9de9919becc9cc2ff03637872a440195ac4241c80536632fffeb6a1e25a74299",
"sha256:a5a85b10e450c66b49f98846937e8cfca1db3127a9d5d1e31ca45c3d0bef4c5b",
"sha256:b0997827b4f6a7c286c01c5f60384d218dca4ed7d9efa945c3e1aa623d5709ae",
"sha256:b631ef96d3222e62861443cc89d6563ba3eeb816eeb96b2629345ab795e53681",
"sha256:bf47c0607522fdbca6c9e817a6e81b08491de50f3766a7a0e6a5be7905961b41",
"sha256:f81025eddd0327c7d4cfe9b62cf33190e1e736cc6e97502b3ec425f574b3e7a8"
"sha256:1adecc22f88d38052fb787d959f003811ca858b799590a5eaa70e63dca50308c",
"sha256:436bc774ecf7c103814098159fbb84c2715d25980175292c648f2da143909f95",
"sha256:460a5a4248763f6f37ea225d19d5c205677d8d525f6a83357ca622ed541830c2",
"sha256:5a22a9c84653debfbf198d02fe592c176ea548cccce47553f35f466e15cf2fd4",
"sha256:7a5d3f26b89d688db27822343dfa25c599627bc92093e788956372285c6298ad",
"sha256:9372b04a02080752d9e6f990179a4ab840227c6e2ce15b95e1278456664cf2ba",
"sha256:a5dcbebee834eaddf3fa7366316b880ff4062e4bcc9787b78c7fbb4a26ff2dd1",
"sha256:aee5bab92a176e7cd034e57f46e9df9a9862a71f8f37cad167c6fc74c65f5b4e",
"sha256:c51f642898c0bacd335fc119da60baae0824f2cde95b0330b56c0553439f0673",
"sha256:c68ea4d3ba1705da1e0d85da6684ac657912679a649e8868bd850d2c299cce13",
"sha256:e23d0cc5299223dcc37885dae624f382297717e459ea24053709675a976a3e19"
],
"index": "pypi",
"version": "==5.1.2"
},
"requests": {
"hashes": [
"sha256:11e007a8a2aa0323f5a921e9e6a2d7e4e67d9877e85773fba9ba6419025cbeb4",
"sha256:9cf5292fcd0f598c671cfc1e0d7d1a7f13bb8085e9a590f48c010551dc6c4b31"
],
"version": "==2.22.0"
"version": "==5.1"
},
"six": {
"hashes": [
"sha256:1f1b7d42e254082a9db6279deae68afb421ceba6158efa6131de7b3003ee93fd",
"sha256:30f610279e8b2578cab6db20741130331735c781b56053c59c4076da27f06b66"
"sha256:236bdbdce46e6e6a3d61a337c0f8b763ca1e8717c03b369e87a7ec7ce1319c0a",
"sha256:8f3cd2e254d8f793e7f3d6d9df77b92252b52637291d0f0da013c76ea2724b6c"
],
"version": "==1.13.0"
"version": "==1.14.0"
},
"typing-extensions": {
"hashes": [
@@ -278,48 +385,55 @@
},
"urllib3": {
"hashes": [
"sha256:3de946ffbed6e6746608990594d08faac602528ac7015ac28d33cee6a45b7398",
"sha256:9a107b99a5393caf59c7aa3c1249c16e6879447533d0887f4336dde834c7be86"
"sha256:2f3db8b19923a873b3e5256dc9c2dedfa883e33d87c690d9c7913e1f40673cdc",
"sha256:87716c2d2a7121198ebcb7ce7cccf6ce5e9ba539041cfbaeecfb641dc0bf6acc"
],
"version": "==1.25.6"
"index": "pypi",
"version": "==1.25.8"
},
"wrapt": {
"wcwidth": {
"hashes": [
"sha256:565a021fd19419476b9362b05eeaa094178de64f8361e44468f9e9d7843901e1"
"sha256:cafe2186b3c009a04067022ce1dcd79cb38d8d65ee4f4791b8888d6599d1bbe1",
"sha256:ee73862862a156bf77ff92b09034fc4825dd3af9cf81bc5b360668d425f3c5f1"
],
"version": "==1.11.2"
"version": "==0.1.9"
},
"yamllint": {
"hashes": [
"sha256:24f05b7ff1a604120eeb5ff7afb7ed8792253bfa96ee83db9cec6d5c20feaf64",
"sha256:d42dbb35b3d28722a8c5c25de4593add0a6215b2732eb6932d89f38482c3d01c"
"sha256:09d554bafc57beb22b01619c94e1ba0e8fbb016fa9c1b35ddc68d7bfc16d177f",
"sha256:7e1e698b3d344b64bc46cbe8c4df7dfdfe7c00ed1a8d1c851ecd5b552d93d193"
],
"index": "pypi",
"version": "==1.18.0"
"version": "==1.21.0"
},
"yarl": {
"hashes": [
"sha256:024ecdc12bc02b321bc66b41327f930d1c2c543fa9a561b39861da9388ba7aa9",
"sha256:2f3010703295fbe1aec51023740871e64bb9664c789cba5a6bdf404e93f7568f",
"sha256:3890ab952d508523ef4881457c4099056546593fa05e93da84c7250516e632eb",
"sha256:3e2724eb9af5dc41648e5bb304fcf4891adc33258c6e14e2a7414ea32541e320",
"sha256:5badb97dd0abf26623a9982cd448ff12cb39b8e4c94032ccdedf22ce01a64842",
"sha256:73f447d11b530d860ca1e6b582f947688286ad16ca42256413083d13f260b7a0",
"sha256:7ab825726f2940c16d92aaec7d204cfc34ac26c0040da727cf8ba87255a33829",
"sha256:b25de84a8c20540531526dfbb0e2d2b648c13fd5dd126728c496d7c3fea33310",
"sha256:c6e341f5a6562af74ba55205dbd56d248daf1b5748ec48a0200ba227bb9e33f4",
"sha256:c9bb7c249c4432cd47e75af3864bc02d26c9594f49c82e2a28624417f0ae63b8",
"sha256:e060906c0c585565c718d1c3841747b61c5439af2211e185f6739a9412dfbde1"
"sha256:0c2ab325d33f1b824734b3ef51d4d54a54e0e7a23d13b86974507602334c2cce",
"sha256:0ca2f395591bbd85ddd50a82eb1fde9c1066fafe888c5c7cc1d810cf03fd3cc6",
"sha256:2098a4b4b9d75ee352807a95cdf5f10180db903bc5b7270715c6bbe2551f64ce",
"sha256:25e66e5e2007c7a39541ca13b559cd8ebc2ad8fe00ea94a2aad28a9b1e44e5ae",
"sha256:26d7c90cb04dee1665282a5d1a998defc1a9e012fdca0f33396f81508f49696d",
"sha256:308b98b0c8cd1dfef1a0311dc5e38ae8f9b58349226aa0533f15a16717ad702f",
"sha256:3ce3d4f7c6b69c4e4f0704b32eca8123b9c58ae91af740481aa57d7857b5e41b",
"sha256:58cd9c469eced558cd81aa3f484b2924e8897049e06889e8ff2510435b7ef74b",
"sha256:5b10eb0e7f044cf0b035112446b26a3a2946bca9d7d7edb5e54a2ad2f6652abb",
"sha256:6faa19d3824c21bcbfdfce5171e193c8b4ddafdf0ac3f129ccf0cdfcb083e462",
"sha256:944494be42fa630134bf907714d40207e646fd5a94423c90d5b514f7b0713fea",
"sha256:a161de7e50224e8e3de6e184707476b5a989037dcb24292b391a3d66ff158e70",
"sha256:a4844ebb2be14768f7994f2017f70aca39d658a96c786211be5ddbe1c68794c1",
"sha256:c2b509ac3d4b988ae8769901c66345425e361d518aecbe4acbfc2567e416626a",
"sha256:c9959d49a77b0e07559e579f38b2f3711c2b8716b8410b320bf9713013215a1b",
"sha256:d8cdee92bc930d8b09d8bd2043cedd544d9c8bd7436a77678dd602467a993080",
"sha256:e15199cdb423316e15f108f51249e44eb156ae5dba232cb73be555324a1d49c2"
],
"version": "==1.3.0"
"version": "==1.4.2"
},
"zipp": {
"hashes": [
"sha256:3718b1cbcd963c7d4c5511a8240812904164b7f381b647143a89d3b98f9bcd8e",
"sha256:f06903e9f1f43b12d371004b4ac7b06ab39a44adc747266928ae6debfa7b3335"
"sha256:aa36550ff0c0b7ef7fa639055d797116ee891440eac1a56f378e2d3179e0320b",
"sha256:c599e4d75c98f6798c509911d08a22e6c021d074469042177c8c86fb92eefd96"
],
"version": "==0.6.0"
"version": "==3.1.0"
}
},
"develop": {}
}
}
+54 -15
View File
@@ -8,15 +8,15 @@ Generic Signature Format for SIEM Systems
# What is Sigma
Sigma is a generic and open signature format that allows you to describe relevant log events in a straight forward manner. The rule format is very flexible, easy to write and applicable to any type of log file. The main purpose of this project is to provide a structured form in which researchers or analysts can describe their once developed detection methods and make them shareable with others.
Sigma is a generic and open signature format that allows you to describe relevant log events in a straightforward manner. The rule format is very flexible, easy to write and applicable to any type of log file. The main purpose of this project is to provide a structured form in which researchers or analysts can describe their once developed detection methods and make them shareable with others.
Sigma is for log files what [Snort](https://www.snort.org/) is for network traffic and [YARA](https://github.com/VirusTotal/yara) is for files.
This repository contains:
* Sigma rule specification in the [Wiki](https://github.com/Neo23x0/sigma/wiki/Specification)
* Open repository for sigma signatures in the `./rules`subfolder
* A converter that generate searches/queries for different SIEM systems [work in progress]
1. Sigma rule specification in the [Wiki](https://github.com/Neo23x0/sigma/wiki/Specification)
2. Open repository for sigma signatures in the `./rules` subfolder
3. A converter named `sigmac` located in the `./tools/` sub folder that generates search queries for different SIEM systems from Sigma rules
![sigma_description](./images/Sigma-description.png)
@@ -33,7 +33,7 @@ The SANS webcast on Sigma contains a very good 20 min introduction to the projec
# Use Cases
* Describe your detection method in Sigma to make it sharable
* Write and your SIEM searches in Sigma to avoid a vendor lock-in
* Write your SIEM searches in Sigma to avoid a vendor lock-in
* Share the signature in the appendix of your analysis along with IOCs and YARA rules
* Share the signature in threat intel communities - e.g. via MISP
* Provide Sigma signatures for malicious behaviour in your own application
@@ -71,6 +71,12 @@ Florian wrote a short [rule creation tutorial](https://www.nextron-systems.com/2
5. Convert a whole rule directory with `python sigmac -t splunk -r ../rules/proxy/`
6. Check the `./tools/config` folder and the [wiki](https://github.com/Neo23x0/sigma/wiki/Converter-Tool-Sigmac) if you need custom field or log source mappings in your environment
## Troubles / Troubleshooting / Help
If you need help for a specific supported backend you can use e.g. `sigmac --backend-help elastalert-dsl`. More details on the usage of `sigmac` can be found in the dedicated [README.md](https://github.com/Neo23x0/sigma/blob/master/tools/README.md).
Be sure to checkout the [guidance on backend specific settings](https://github.com/Neo23x0/sigma/blob/master/tools/README.md#choosing-the-right-sigmac) for `sigmac`.
# Examples
Windows 'Security' Eventlog: Access to LSASS Process with Certain Access Mask / Object Type (experimental)
@@ -88,9 +94,9 @@ Sysmon: Web Shell Detection
Windows 'Security' Eventlog: Suspicious Number of Failed Logons from a Single Source Workstation
![sigma_rule example5](./images/Sigma_rule_example5.png)
# Sigma Tools
# Sigma Tools
## Sigmac
## Sigmac
Sigmac converts sigma rules into queries or inputs of the supported targets listed below. It acts as a frontend to the
Sigma library that may be used to integrate Sigma support in other projects. Further, there's `merge_sigma.py` which
@@ -98,9 +104,9 @@ merges multiple YAML documents of a Sigma rule collection into simple Sigma rule
### Usage
```
```bash
usage: sigmac [-h] [--recurse] [--filter FILTER]
[--target {arcsight,es-qs,es-dsl,kibana,xpack-watcher,elastalert,graylog,limacharlie,logpoint,grep,netwitness,powershell,qradar,qualys,splunk,splunkxml,sumologic,fieldlist,wdatp}]
[--target {arcsight,es-qs,es-dsl,kibana,xpack-watcher,elastalert,graylog,limacharlie,logpoint,grep,netwitness,powershell,qradar,qualys,splunk,splunkxml,sumologic,fieldlist,mdatp,ee-outliers}]
[--target-list] [--config CONFIG] [--output OUTPUT]
[--backend-option BACKEND_OPTION] [--defer-abort]
[--ignore-backend-errors] [--verbose] [--debug]
@@ -125,7 +131,7 @@ optional arguments:
tag that must appear in the rules tag list, case-
insensitive matching. Multiple log source
specifications are AND linked.
--target {arcsight,es-qs,es-dsl,kibana,xpack-watcher,elastalert,graylog,limacharlie,logpoint,grep,netwitness,powershell,qradar,qualys,splunk,splunkxml,sumologic,fieldlist,wdatp}, -t {arcsight,es-qs,es-dsl,kibana,xpack-watcher,elastalert,graylog,limacharlie,logpoint,grep,netwitness,powershell,qradar,qualys,splunk,splunkxml,sumologic,fieldlist,wdatp}
--target {arcsight,es-qs,es-dsl,kibana,xpack-watcher,elastalert,graylog,limacharlie,logpoint,grep,netwitness,powershell,qradar,qualys,splunk,splunkxml,sumologic,fieldlist,mdatp}, -t {arcsight,es-qs,es-dsl,kibana,xpack-watcher,elastalert,graylog,limacharlie,logpoint,grep,netwitness,powershell,qradar,qualys,splunk,splunkxml,sumologic,fieldlist,mdatp}
Output target format
--target-list, -l List available output target formats
--config CONFIG, -c CONFIG
@@ -154,12 +160,17 @@ optional arguments:
#### Single Rule Translation
Translate a single rule
```
tools/sigmac -t splunk rules/windows/sysmon/sysmon_susp_image_load.yml
tools/sigmac -t splunk -c splunk-windows rules/windows/sysmon/sysmon_susp_image_load.yml
```
#### Rule Set Translation
Translate a whole rule directory and ignore backend errors (`-I`) in rule conversion for the selected backend (`-t splunk`)
```
tools/sigmac -I -t splunk -r rules/windows/sysmon/
tools/sigmac -I -t splunk -c splunk-windows -r rules/windows/sysmon/
```
#### Translate Only Rules of Level High or Critical
Translate a whole rule directory and ignore backend errors (`-I`) in rule conversion for the selected backend (`-t splunk`) and select only rules of level `high` and `critical`
```
tools/sigmac -I -t splunk -c splunk-windows -f 'level>=high' -r rules/windows/sysmon/
```
#### Rule Set Translation with Custom Config
Apply your own config file (`-c ~/my-elk-winlogbeat.yml`) during conversion, which can contain you custom field and source mappings
@@ -186,7 +197,7 @@ tools/sigmac -t splunk -c ~/my-splunk-mapping.yml -c tools/config/generic/window
* [Kibana](https://www.elastic.co/de/products/kibana)
* [Elastic X-Pack Watcher](https://www.elastic.co/guide/en/x-pack/current/xpack-alerting.html)
* [Logpoint](https://www.logpoint.com)
* [Windows Defender Advanced Threat Protection (WDATP)](https://www.microsoft.com/en-us/windowsforbusiness/windows-atp)
* [Microsoft Defender Advanced Threat Protection (MDATP)](https://www.microsoft.com/en-us/microsoft-365/windows/microsoft-defender-atp)
* [Azure Sentinel / Azure Log Analytics](https://azure.microsoft.com/en-us/services/azure-sentinel/)
* [Sumologic](https://www.sumologic.com/)
* [ArcSight](https://software.microfocus.com/en-us/products/siem-security-information-event-management/overview)
@@ -196,11 +207,13 @@ tools/sigmac -t splunk -c ~/my-splunk-mapping.yml -c tools/config/generic/window
* [PowerShell](https://docs.microsoft.com/en-us/powershell/scripting/getting-started/getting-started-with-windows-powershell?view=powershell-6)
* [Grep](https://www.gnu.org/software/grep/manual/grep.html) with Perl-compatible regular expression support
* [LimaCharlie](https://limacharlie.io)
* [ee-outliers](https://github.com/NVISO-BE/ee-outliers)
* [Structured Threat Information Expression (STIX)](https://oasis-open.github.io/cti-documentation/stix/intro.html)
Current work-in-progress
* [Splunk Data Models](https://docs.splunk.com/Documentation/Splunk/7.1.0/Knowledge/Aboutdatamodels)
New targets are continuously developed. You can get a list of supported targets with `sigmac --target-list` or `sigmac -l`.
New targets are continuously developed. You can get a list of supported targets with `sigmac --lists` or `sigmac -l`.
### Requirements
@@ -254,6 +267,27 @@ sigma2misp @misp.conf --same-event --info "Test Event" -r sigma_rules/
[Evt2Sigma](https://github.com/Neo23x0/evt2sigma) helps you with the rule creation. It generates a Sigma rule from a log entry.
## Sigma2attack
Generates a [MITRE ATT&CK Navigator](https://github.com/mitre/attack-navigator/) heatmap from a directory containing sigma rules.
Requirements:
- Sigma rules tagged with a `attack.tXXXX` tag (e.g.: `attack.t1086`)
Usage samples:
```
# Use the default "rules" folder
./tools/sigma2attack
# ... or specify your own
./tools/sigma2attack --rules-directory ~/hunting/rules
```
Result once imported in the MITRE ATT&CK Navigator ([online version](https://mitre-attack.github.io/attack-navigator/enterprise/)):
![Sigma2attack result](./images/sigma2attack.png)
## Contributed Scripts
The directory `contrib` contains scripts that were contributed by the community:
@@ -279,6 +313,7 @@ These tools are not part of the main toolchain and maintained separately by thei
* [ypsilon](https://github.com/P4T12ICK/ypsilon) - Automated Use Case Testing
* [RANK VASA](https://globenewswire.com/news-release/2019/03/04/1745907/0/en/RANK-Software-to-Help-MSSPs-Scale-Cybersecurity-Offerings.html)
* [TA-Sigma-Searches](https://github.com/dstaulcu/TA-Sigma-Searches) (Splunk App)
* [TimeSketch](https://github.com/google/timesketch/commit/0c6c4b65a6c0f2051d074e87bbb2da2424fa6c35)
# Contribution
@@ -310,7 +345,7 @@ The content of this repository is released under the following licenses:
* The toolchain (everything under `tools/`) is licensed under the [GNU Lesser General Public License](https://www.gnu.org/licenses/lgpl-3.0.en.html).
* The [Sigma specification](https://github.com/Neo23x0/sigma/wiki) is public domain.
* Everything else, especially the rules contained in the `rules/` directory is released under the [GNU General Public License](https://www.gnu.org/licenses/gpl-3.0.en.html).
* Everything else, especially the rules contained in the `rules/` directory is released under the [Detection Rule License (DRL) 1.0](https://github.com/Neo23x0/sigma/blob/master/LICENSE.Detection.Rules.md).
# Credits
@@ -318,4 +353,8 @@ This is a private project mainly developed by Florian Roth and Thomas Patzke wit
# Info Graphic
## Overview
![sigmac_info_graphic](./images/sigma_infographic_lq.png)
## Coverage Illustration
![sigmac_coverage](./images/Sigma_Coverage.png)
+2 -2
View File
@@ -1,10 +1,10 @@
#!/usr/bin/env python3
# Remove all hunks from a patch that don't add the id attribute to minimize the impact (removed
# comments etc.) of sigma-uuid script.
# comments etc.) of sigma_uuid script.
#
# Usually used as follows:
# 1. Add UUIDs to rules:
# tools/sigma-uuid -er rules
# tools/sigma_uuid -er rules
# 2. Generate and filter patch
# git diff | contrib/filter-uuid-patch > rule-uuid.diff
# 3. Reset to previous state
+1 -1
View File
@@ -124,7 +124,7 @@ def get_rule_as_sumologic(file):
return "".join(output)
if args.help:
parser_print_help()
parser.print_help()
if args.conf:
with open(args.conf, 'r') as ymlfile:
Binary file not shown.

After

Width:  |  Height:  |  Size: 212 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 344 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 1.8 MiB

After

Width:  |  Height:  |  Size: 1.2 MiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 870 KiB

After

Width:  |  Height:  |  Size: 547 KiB

+150
View File
@@ -0,0 +1,150 @@
# _____ __ __ ___ __
# / ___/__ ___/ / / |/ /__ ___/ /__
# / (_ / _ \/ _ / / /|_/ / _ \/ _ / -_)
# \___/\___/\_,_/ /_/ /_/\___/\_,_/\__/_
# / __(_)__ ___ _ ___ _ / _ \__ __/ /__
# _\ \/ / _ `/ ' \/ _ `/ / , _/ // / / -_)
# /___/_/\_, /_/_/_/\_,_/ /_/|_|\_,_/_/\__/
# /___/ IDDQD
#
# Florian Roth
# May 2020
# v0.3
#
# A Proof-of-Concept with the most effective search queries
title: Godmode Sigma Rule
id: def6caac-a999-4fc9-8800-cfeff700ba98
description: 'PoC rule to detect malicious activity - following the principle: if you had only one shot, what would you look for?'
status: experimental
author: Florian Roth
date: 2019/12/22
modified: 2020/05/18
level: high
action: global
---
logsource:
category: process_creation
product: windows
detection:
# Different suspicious or malicious command line parameters
selection_plain:
CommandLine|contains:
- ' -NoP ' # Often used in malicious PowerShell commands
- ' -W Hidden ' # Often used in malicious PowerShell commands
- ' -decode ' # Used with certutil
- ' /decode ' # Used with certutil
- ' -e* JAB' # PowerShell encoded commands
- ' -e* SUVYI' # PowerShell encoded commands
- ' -e* SQBFAFgA' # PowerShell encoded commands
- ' -e* aWV4I' # PowerShell encoded commands
- ' -e* IAB' # PowerShell encoded commands
- ' -e* PAA' # PowerShell encoded commands
- ' -e* aQBlAHgA' # PowerShell encoded commands
- 'vssadmin delete shadows' # Ransomware
- 'reg SAVE HKLM\SAM' # save registry SAM - syskey extraction
- ' -ma ' # ProcDump
- 'Microsoft\Windows\CurrentVersion\Run' # Run key in command line - often in combination with REG ADD
- '.downloadstring(' # PowerShell download command
- '.downloadfile(' # PowerShell download command
- ' /ticket:' # Rubeus
- ' sekurlsa' # Mimikatz
- ' p::d ' # Mimikatz
- ';iex(' # PowerShell IEX
- 'schtasks* /create *AppData' # Scheduled task creation pointing to AppData
- ' comsvcs.dll,MiniDump' # Process dumping method apart from procdump
- ' comsvcs.dll,#24' # Process dumping method apart from procdump
selection_parent_child:
ParentImage|contains:
# Office Dropper Detection
- '\WINWORD.EXE'
- '\EXCEL.EXE'
- '\POWERPNT.exe'
- '\MSPUB.exe'
- '\VISIO.exe'
- '\OUTLOOK.EXE'
Image|contains:
- '\cmd.exe'
- '\powershell.exe'
- '\wscript.exe'
- '\cscript.exe'
- '\schtasks.exe'
- '*\scrcons.exe'
- '\regsvr32.exe'
- '\hh.exe'
- '\wmic.exe'
- '\mshta.exe'
- '\msiexec.exe'
- '\forfiles.exe'
- '\AppData\'
selection_webshells:
Image|contains:
- '\apache*'
- '\tomcat*'
- '\w3wp.exe'
- '\php-cgi.exe'
- '\nginx.exe'
- '\httpd.exe'
CommandLine|contains:
- 'whoami'
- 'net user '
- 'ping -n '
- 'systeminfo'
- '&cd&echo'
- 'cd /d ' # https://www.computerhope.com/cdhlp.htm
# Running whoami as LOCAL_SYSTEM (usually after privilege escalation)
selection_whoami:
Image|contains: '\whoami.exe'
User: 'NT AUTHORITY\SYSTEM'
condition: 1 of them
---
logsource:
product: windows
service: sysmon
detection:
selection_file_creation:
EventID: 11
TargetFilename|contains:
- '.dmp' # dump process memory
- 'Desktop\how' # Ransomware
- 'Desktop\decrypt' # Ransomware
selection_registry_modifications:
EventID:
- 12
- 13
TargetObject|contains:
- 'UserInitMprLogonScript' # persistence
- '\CurrentVersion\Image File Execution Options\' # persistence
selection_registry_run:
EventID:
- 12
- 13
TargetObject|contains:
- '\Microsoft\Windows\CurrentVersion\Run\' # persistence
- '\Microsoft\Windows\CurrentVersion\RunOnce\' # persistence
Details|contains:
- 'AppData'
- '\Users\Public\'
- '\Temp\'
- 'powershell'
- 'wscript'
- 'cscript'
condition: 1 of them
---
logsource:
product: windows
service: system
detection:
# Malicious service installs
selection:
EventID: 7045
ServiceName|contains:
- 'WCESERVICE'
- 'WCE SERVICE'
- 'winexesvc'
- 'DumpSvc'
- 'pwdump'
- 'gsecdump'
- 'cachedump'
condition:
1 of them
@@ -0,0 +1,42 @@
title: High DNS subdomain requests rate per domain
id: 8198e9a8-e38f-4ba5-8f16-882b1c0f880e
description: High rate of unique Fully Qualified Domain Names (FQDN) requests per root domain (eTLD+1) in short period of time
author: Daniil Yugoslavskiy, oscd.community
date: 2019/10/21
modified: 2019/11/04
tags:
- attack.exfiltration
- attack.t1048
logsource:
category: dns
detection:
dns_question_name:
query: "*"
default_list_of_well_known_domains:
query_etld_plus_one:
- "akadns.net"
- "akamaiedge.net"
- "amazonaws.com"
- "apple.com"
- "apple-dns.net"
- "cloudfront.net"
- "icloud.com"
- "in-addr.arpa"
- "google.com"
- "yahoo.com"
- "dropbox.com"
- "windowsupdate.com"
- "microsoftonline.com"
- "s-microsoft.com"
- "office365.com"
- "linkedin.com"
timeframe: 15m
condition: count(subdomain) per query_etld_plus_one per computer_name > 200 and not default_list_of_well_known_domains
# for each host in timeframe
# for each dns_question_etld_plus_one
# if number of dns_question_name > 200
# dns_question_etld_plus_one is not in default_list_of_well_known_domains
falsepositives:
- Legitimate domain name requested, which should be added to whitelist
level: high
status: experimental
@@ -0,0 +1,37 @@
title: Large domain name request
id: 14aa0d9e-c70a-4a49-bdc1-e5cbc4fc6af7
description: Detects large DNS domain names
author: Daniil Yugoslavskiy, oscd.community
date: 2019/10/21
modified: 2019/11/04
tags:
- attack.exfiltration
- attack.t1048
logsource:
category: dns
detection:
selection:
query_length: "> 70" # IS MORE THAN 70 bytes
default_list_of_well_known_domains:
query_etld_plus_one:
- "akadns.net"
- "akamaiedge.net"
- "amazonaws.com"
- "apple.com"
- "apple-dns.net"
- "cloudfront.net"
- "icloud.com"
- "in-addr.arpa"
- "google.com"
- "yahoo.com"
- "dropbox.com"
- "windowsupdate.com"
- "microsoftonline.com"
- "s-microsoft.com"
- "office365.com"
- "linkedin.com"
condition: selection and not default_list_of_well_known_domains
falsepositives:
- Legitimate domain name requested, which should be added to whitelist
level: high
status: experimental
@@ -0,0 +1,23 @@
title: Possible DNS Rebinding
id: ec5b8711-b550-4879-9660-568aaae2c3ea
status: experimental
description: 'Detects DNS-answer with TTL <10.'
date: 2019/10/25
author: Ilyas Ochkov, oscd.community
references:
- https://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325
tags:
- attack.command_and_control
- attack.t1043
logsource:
product: dns
detection:
selection:
answer: '*'
filter1:
ttl: '>0'
filter2:
ttl: '<10'
timeframe: 30s
condition: selection and filter1 and filter2 | count(answer) by src_ip > 3
level: medium
@@ -0,0 +1,48 @@
action: global
title: Defense evasion via process reimaging
id: 7fa4f550-850e-4117-b543-428c86ebb849
description: Detects process reimaging defense evasion technique
# where
# selection1: ImageFileName != selection1: OriginalFileName
# selection1: ParentProcessGuid = selection2: ProcessGuid
# selection1: Image = selection2: TargetFilename
# and new field ImageFileName is coming from enrichment
# selection1: Image = ^.+\\<ImageFileName>$
# Rule must trigger if selection1 and selection2 both occurs in timeframe of 120 sec.
# Rule logic is currently not supported by SIGMA.
# Sysmon v.10.0 or newer is required for proper detection.
status: experimental
author: Alexey Balandin, oscd.community
references:
- https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/in-ntdll-i-trust-process-reimaging-and-endpoint-security-solution-bypass/
tags:
- attack.defense_evasion
date: 2019/10/25
detection:
condition: all of them
falsepositives:
- unknown
level: high
---
logsource:
product: windows
service: sysmon
detection:
selection1:
category: process_creation
fields:
- Image
- OriginalFileName
- ParentProcessGuid
new_fields:
- ImageFileName
---
logsource:
product: windows
service: sysmon
detection:
selection2:
EventID: 11
fields:
- ProcessGuid
- TargetFilename
@@ -0,0 +1,34 @@
title: Dumping ntds.dit remotely via DCSync
id: 51238c62-2b29-4539-ad75-e94575368a12
description: ntds.dit retrieving using synchronisation with legitimate domain controller using Directory Replication Service Remote Protocol
author: Teymur Kheirkhabarov, oscd.community
date: 2019/10/24
modified: 2019/11/13
references:
- https://twitter.com/gentilkiwi/status/1003236624925413376
- https://gist.github.com/gentilkiwi/dcc132457408cf11ad2061340dcb53c2
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
tags:
- attack.credential_access
- attack.t1003
logsource:
product: windows
service: security
detection:
selection1:
EventID: 4624
ComputerName: '%DomainControllersNamesList%'
selection2:
IpAddress: '%DomainControllersIpsList%'
selection3:
EventID: 4662
ComputerName: '%DomainControllersNamesList%'
SubjectLogonId: '%SuspiciousTargetLogonIdList%'
Properties|contains:
- '1131f6aa-9c07-11d1-f79f-00c04fc2dcd2'
- '1131f6ad-9c07-11d1-f79f-00c04fc2dcd2'
condition: write TargetLogonId from selection1 (if not selection2) to list %SuspiciousTargetLogonIdList%; then if selection3 -> alert
falsepositives:
- Legitimate administrator adding new domain controller to already existing domain
level: medium
status: experimental
@@ -0,0 +1,30 @@
title: Dumping ntds.dit remotely via NetSync
id: 757b2a11-73e7-411a-bd46-141d906e0167
description: ntds.dit retrieving (only computer accounts) using synchronisation with legit domain controller using Netlogon Remote Protocol
author: Teymur Kheirkhabarov, oscd.community
date: 2019/11/01
references:
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
tags:
- attack.credential_access
- attack.t1003
logsource:
product: windows
service: security
detection:
selection1:
EventID: 4624
ComputerName: '%DomainControllersNamesList%'
selection2:
IpAddress: '%DomainControllersIpsList%'
selection3:
EventID: 5145
ComputerName: '%DomainControllersNamesList%'
ShareName|contains: '\IPC$'
SubjectLogonId: '%SuspiciousTargetLogonIdList%'
RelativeTargetName: 'netlogon'
condition: write TargetLogonId from selection1 (if not selection2) to list %SuspiciousTargetLogonIdList%; then if selection3 -> alert
falsepositives:
- Legitimate administrator adding new domain controller to already existing domain
level: medium
status: experimental
@@ -2,6 +2,7 @@ title: Python SQL Exceptions
id: 19aefed0-ffd4-47dc-a7fc-f8b1425e84f9
description: Generic rule for SQL exceptions in Python according to PEP 249
author: Thomas Patzke
date: 2017/08/12
references:
- https://www.python.org/dev/peps/pep-0249/#exceptions
logsource:
@@ -18,4 +19,3 @@ falsepositives:
- Application bugs
- Penetration testing
level: medium
@@ -3,6 +3,7 @@ id: 8a670c6d-7189-4b1c-8017-a417ca84a086
status: experimental
description: Detects SQL error messages that indicate probing for an injection attack
author: Bjoern Kimminich
date: 2017/11/27
references:
- http://www.sqlinjection.net/errors
logsource:
@@ -1,7 +1,8 @@
title: Django framework exceptions
title: Django Framework Exceptions
id: fd435618-981e-4a7c-81f8-f78ce480d616
description: Detects suspicious Django web application framework exceptions that could indicate exploitation attempts
author: Thomas Patzke
date: 2017/08/05
references:
- https://docs.djangoproject.com/en/1.11/ref/exceptions/
- https://docs.djangoproject.com/en/1.11/topics/logging/#django-security
@@ -29,4 +30,3 @@ falsepositives:
- Application bugs
- Penetration testing
level: medium
@@ -1,7 +1,8 @@
title: Ruby on Rails framework exceptions
title: Ruby on Rails Framework Exceptions
id: 0d2c3d4c-4b48-4ac3-8f23-ea845746bb1a
description: Detects suspicious Ruby on Rails exceptions that could indicate exploitation attempts
author: Thomas Patzke
date: 2017/08/06
references:
- http://edgeguides.rubyonrails.org/security.html
- http://guides.rubyonrails.org/action_controller_overview.html
@@ -22,4 +23,3 @@ falsepositives:
- Application bugs
- Penetration testing
level: medium
@@ -1,7 +1,8 @@
title: Spring framework exceptions
title: Spring Framework Exceptions
id: ae48ab93-45f7-4051-9dfe-5d30a3f78e33
description: Detects suspicious Spring framework exceptions that could indicate exploitation attempts
author: Thomas Patzke
date: 2017/08/06
references:
- https://docs.spring.io/spring-security/site/docs/current/apidocs/overview-tree.html
logsource:
@@ -21,4 +22,3 @@ falsepositives:
- Application bugs
- Penetration testing
level: medium
+33
View File
@@ -0,0 +1,33 @@
title: Silence.Downloader V3
id: 170901d1-de11-4de7-bccb-8fa13678d857
status: experimental
description: Detects Silence downloader. These commands are hardcoded into the binary.
author: Alina Stepchenkova, Roman Rezvukhin, Group-IB, oscd.community
date: 2019/11/01
modified: 2019/11/22
tags:
- attack.persistence
- attack.g0091
logsource:
category: process_creation
product: windows
detection:
selection_recon:
Image|endswith:
- '\tasklist.exe'
- '\qwinsta.exe'
- '\ipconfig.exe'
- '\hostname.exe'
CommandLine|contains: '>>'
CommandLine|endswith: 'temps.dat'
selection_persistence:
CommandLine|contains: '/C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "WinNetworkSecurity" /t REG_SZ /d'
condition: selection_recon | near selection_persistence # requires both
fields:
- ComputerName
- User
- Image
- CommandLine
falsepositives:
- Unknown
level: high
+34
View File
@@ -0,0 +1,34 @@
title: Silence.EDA Detection
id: 3ceb2083-a27f-449a-be33-14ec1b7cc973
status: experimental
description: Detects Silence empireDNSagent
author: Alina Stepchenkova, Group-IB, oscd.community
date: 2019/11/01
modified: 2019/11/20
tags:
- attack.g0091
- attack.s0363
logsource:
product: windows
service: powershell
detection:
empire:
ScriptBlockText|contains|all: # better to randomise the order
- 'System.Diagnostics.Process'
- 'Stop-Computer'
- 'Restart-Computer'
- 'Exception in execution'
- '$cmdargs'
- 'Close-Dnscat2Tunnel'
dnscat:
ScriptBlockText|contains|all: # better to randomise the order
- 'set type=$LookupType`nserver'
- '$Command | nslookup 2>&1 | Out-String'
- 'New-RandomDNSField'
- '[Convert]::ToString($SYNOptions, 16)'
- '$Session.Dead = $True'
- '$Session["Driver"] -eq'
condition: empire and dnscat
falsepositives:
- Unknown
level: critical
@@ -0,0 +1,26 @@
title: AWS CloudTrail Important Change
id: 4db60cc0-36fb-42b7-9b58-a5b53019fb74
status: experimental
author: vitaliy0x1
date: 2020/01/21
description: Detects disabling, deleting and updating of a Trail
references:
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/best-practices-security.html
logsource:
service: cloudtrail
detection:
selection_source:
- eventSource: cloudtrail.amazonaws.com
events:
- eventName:
- StopLogging
- UpdateTrail
- DeleteTrail
condition: selection_source AND events
level: medium
falsepositives:
- Valid change in a Trail
tags:
- attack.defense_evasion
- attack.t1089
- attack.t1562.001
@@ -0,0 +1,23 @@
title: AWS Config Disabling Channel/Recorder
id: 07330162-dba1-4746-8121-a9647d49d297
status: experimental
author: vitaliy0x1
date: 2020/01/21
description: Detects AWS Config Service disabling
logsource:
service: cloudtrail
detection:
selection_source:
- eventSource: config.amazonaws.com
events:
- eventName:
- DeleteDeliveryChannel
- StopConfigurationRecorder
condition: selection_source AND events
level: high
falsepositives:
- Valid change in AWS Config Service
tags:
- attack.defense_evasion
- attack.t1089
- attack.t1562.001
+24
View File
@@ -0,0 +1,24 @@
title: AWS EC2 Download Userdata
id: 26ff4080-194e-47e7-9889-ef7602efed0c
status: experimental
author: faloker
date: 2020/02/11
description: Detects bulk downloading of User Data associated with AWS EC2 instances. Instance User Data may include installation scripts and hard-coded secrets for deployment.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/master/modules/ec2__download_userdata/main.py#L24
logsource:
service: cloudtrail
detection:
selection_source:
- eventSource: ec2.amazonaws.com
selection_requesttype:
- requestParameters.attribute: userData
selection_eventname:
- eventName: DescribeInstanceAttribute
timeframe: 30m
condition: all of them | count() > 10
level: medium
falsepositives:
- Assets management software like device42
tags:
- attack.t1020
@@ -0,0 +1,24 @@
title: AWS EC2 Startup Shell Script Change
id: 1ab3c5ed-5baf-417b-bb6b-78ca33f6c3df
status: experimental
author: faloker
date: 2020/02/12
description: Detects changes to the EC2 instance startup script. The shell script will be executed as root/SYSTEM everytime the specific instances are booted up.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/master/modules/ec2__startup_shell_script/main.py#L9
logsource:
service: cloudtrail
detection:
selection_source:
- eventSource: ec2.amazonaws.com
selection_userdata:
- requestParameters.userData: "*"
selection_eventname:
- eventName: ModifyInstanceAttribute
condition: all of them
level: high
falsepositives:
- Valid changes to the startup script
tags:
- attack.t1064
- attack.t1059
+28
View File
@@ -0,0 +1,28 @@
title: AWS EC2 VM Export Failure
id: 54b9a76a-3c71-4673-b4b3-2edb4566ea7b
status: experimental
description: An attempt to export an AWS EC2 instance has been detected. A VM Export might indicate an attempt to extract information from an instance.
references:
- https://docs.aws.amazon.com/vm-import/latest/userguide/vmexport.html#export-instance
author: Diogo Braz
date: 2020/04/16
tags:
- attack.collection
- attack.t1005
- attack.exfiltration
- attack.t1537
level: low
logsource:
service: cloudtrail
detection:
selection:
eventName: 'CreateInstanceExportTask'
eventSource: 'ec2.amazonaws.com'
filter1:
errorMessage: '*'
filter2:
errorCode: '*'
filter3:
eventName: 'ConsoleLogin'
responseElements: '*Failure*'
condition: selection and (filter1 or filter2 or filter3)
+23
View File
@@ -0,0 +1,23 @@
title: AWS GuardDuty Important Change
id: 6e61ee20-ce00-4f8d-8aee-bedd8216f7e3
status: experimental
author: faloker
date: 2020/02/11
description: Detects updates of the GuardDuty list of trusted IPs, perhaps to disable security alerts against malicious IPs.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/master/modules/guardduty__whitelist_ip/main.py#L9
logsource:
service: cloudtrail
detection:
selection_source:
- eventSource: guardduty.amazonaws.com
selection_eventName:
- eventName: CreateIPSet
condition: all of them
level: high
falsepositives:
- Valid change in the GuardDuty (e.g. to ignore internal scanners)
tags:
- attack.defense_evasion
- attack.t1089
- attack.t1562.001
@@ -0,0 +1,29 @@
title: AWS IAM Backdoor Users Keys
id: 0a5177f4-6ca9-44c2-aacf-d3f3d8b6e4d2
status: experimental
author: faloker
date: 2020/02/12
description: Detects AWS API key creation for a user by another user. Backdoored users can be used to obtain persistence in the AWS environment. Also with this alert, you can detect a flow of AWS keys in your org.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/master/modules/iam__backdoor_users_keys/main.py#L6
logsource:
service: cloudtrail
detection:
selection_source:
- eventSource: iam.amazonaws.com
selection_eventname:
- eventName: CreateAccessKey
filter:
userIdentity.arn|contains: responseElements.accessKey.userName
condition: all of selection* and not filter
fields:
- userIdentity.arn
- responseElements.accessKey.userName
- errorCode
- errorMessage
level: medium
falsepositives:
- Adding user keys to their own accounts (the filter cannot cover all possible variants of user naming)
- AWS API keys legitimate exchange workflows
tags:
- attack.t1098
@@ -0,0 +1,23 @@
title: AWS RDS Master Password Change
id: 8a63cdd4-6207-414a-85bc-7e032bd3c1a2
status: experimental
author: faloker
date: 2020/02/12
description: Detects the change of database master password. It may be a part of data exfiltration.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/master/modules/rds__explore_snapshots/main.py#L10
logsource:
service: cloudtrail
detection:
selection_source:
- eventSource: rds.amazonaws.com
selection_modified_values:
- responseElements.pendingModifiedValues.masterUserPassword: "*"
selection_eventname:
- eventName: ModifyDBInstance
condition: all of them
level: medium
falsepositives:
- Benign changes to a db instance
tags:
- attack.t1020
+23
View File
@@ -0,0 +1,23 @@
title: Restore Public AWS RDS Instance
id: c3f265c7-ff03-4056-8ab2-d486227b4599
status: experimental
author: faloker
date: 2020/02/12
description: Detects the recovery of a new public database instance from a snapshot. It may be a part of data exfiltration.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/master/modules/rds__explore_snapshots/main.py#L10
logsource:
service: cloudtrail
detection:
selection_source:
- eventSource: rds.amazonaws.com
selection_ispublic:
- responseElements.publiclyAccessible: "true"
selection_eventname:
- eventName: RestoreDBInstanceFromDBSnapshot
condition: all of them
level: high
falsepositives:
- unknown
tags:
- attack.t1020
+21
View File
@@ -0,0 +1,21 @@
title: AWS Root Credentials
id: 8ad1600d-e9dc-4251-b0ee-a65268f29add
status: experimental
author: vitaliy0x1
date: 2020/01/21
description: Detects AWS root account usage
references:
- https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html
logsource:
service: cloudtrail
detection:
selection_usertype:
- userIdentity.type: Root
selection_eventtype:
- eventType: AwsServiceEvent
condition: selection_usertype AND NOT selection_eventtype
level: medium
falsepositives:
- AWS Tasks That Require AWS Account Root User Credentials https://docs.aws.amazon.com/general/latest/gr/aws_tasks-that-require-root.html
tags:
- attack.t1078
-2
View File
@@ -30,8 +30,6 @@ tags:
- NIST CSF 1.1 PR.AC-7
- NIST CSF 1.1 PR.DS-1
- NIST CSF 1.1 PR.DS-2
- NIST CSF 1.1 PR.PT-3
- NIST CSF 1.1 PR.PT-3
- ISO 27002-2013 A.9.2.1
- ISO 27002-2013 A.9.2.2
- ISO 27002-2013 A.9.2.3
+25
View File
@@ -0,0 +1,25 @@
title: Brute Force
id: 53c7cca0-2901-493a-95db-d00d6fcf0a37
description: Detects many authentication failures from one source to one destination which is may indicate Brute Force activity
tags:
- attack.t1110
author: Aleksandr Akhremchik, oscd.community
date: 2019/10/25
status: experimental
logsource:
category: authentication
detection:
selection:
action: failure
timeframe: 600s
condition: selection | count(category) by dst_ip > 30
fields:
- src_ip
- dst_ip
- user
falsepositives:
- Inventarization
- Penetration testing
- Vulnerability scanner
- Legitimate application
level: medium
@@ -1,4 +1,4 @@
title: Detects Suspicious edit of .bash_profile and .bashrc on Linux systems
title: Edit of .bash_profile and .bashrc
id: e74e15cc-c4b6-4c80-b7eb-dfe49feb7fe9
status: experimental
description: Detects change of user environment. Adversaries can insert code into these files to gain persistence each time a user logs in or opens a new shell.
@@ -9,6 +9,7 @@ tags:
- attack.s0003
- attack.t1156
- attack.persistence
- attack.t1546.004
author: Peter Matkovski
logsource:
product: linux
@@ -18,7 +19,7 @@ detection:
type: 'PATH'
name:
- '/home/*/.bashrc'
- '/home/*/.bash_profile'
- '/home/*/.bash_profile'
- '/home/*/.profile'
- '/etc/profile'
- '/etc/shells'
@@ -0,0 +1,35 @@
title: Auditing Configuration Changes on Linux Host
id: 977ef627-4539-4875-adf4-ed8f780c4922
description: Detect changes in auditd configuration files
# Example config for this one (place it at the top of audit.rules)
# -w /etc/audit/ -p wa -k etc_modify_auditconfig
# -w /etc/libaudit.conf -p wa -k etc_modify_libauditconfig
# -w /etc/audisp/ -p wa -k etc_modify_audispconfig
references:
- https://github.com/Neo23x0/auditd/blob/master/audit.rules
- self experience
tags:
- attack.defense_evasion
- attack.t1054
- attack.t1562.006
author: Mikhail Larin, oscd.community
status: experimental
date: 2019/10/25
logsource:
product: linux
service: auditd
detection:
selection:
type: PATH
name:
- /etc/audit/*
- /etc/libaudit.conf
- /etc/audisp/*
condition: selection
fields:
- exe
- comm
- key
falsepositives:
- Legitimate administrative activity
level: high
@@ -0,0 +1,22 @@
title: Creation Of An User Account
id: 759d0d51-bc99-4b5e-9add-8f5b2c8e7512
status: experimental
description: Detects the creation of a new user account. According to MITRE ATT&CK, "such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system"
references:
- 'MITRE Attack technique T1136; Create Account '
date: 2020/05/18
tags:
- attack.t1136
- attack.persistence
author: Marie Euler
logsource:
product: linux
service: auditd
detection:
selection:
type: 'SYSCALL'
exe: '*/useradd'
condition: selection
falsepositives:
- Admin activity
level: medium
@@ -0,0 +1,24 @@
title: Modification of ld.so.preload
id: 4b3cb710-5e83-4715-8c45-8b2b5b3e5751
description: Identifies modification of ld.so.preload for shared object injection. This technique is used by attackers to load arbitrary code into processes.
status: experimental
author: E.M. Anhaus (orignally from Atomic Blue Detections, Tony Lambert), oscd.community
date: 2019/10/24
modified: 2019/11/11
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1574.006/T1574.006.yaml
- https://eqllib.readthedocs.io/en/latest/analytics/fd9b987a-1101-4ed3-bda6-a70300eaf57e.html
tags:
- attack.defense_evasion
- attack.t1574.006
logsource:
product: linux
service: auditd
detection:
selection:
type: 'PATH'
name: '/etc/ld.so.preload'
condition: selection
falsepositives:
- Unknown
level: high
@@ -0,0 +1,34 @@
title: Logging Configuration Changes on Linux Host
id: c830f15d-6f6e-430f-8074-6f73d6807841
description: Detect changes of syslog daemons configuration files
# Example config for this one (place it at the top of audit.rules)
# -w /etc/syslog.conf -p wa -k etc_modify_syslogconfig
# -w /etc/rsyslog.conf -p wa -k etc_modify_rsyslogconfig
# -w /etc/syslog-ng/syslog-ng.conf -p wa -k etc_modify_syslogngconfig
references:
- self experience
tags:
- attack.defense_evasion
- attack.t1054
- attack.t1562.006
author: Mikhail Larin, oscd.community
status: experimental
date: 2019/10/25
logsource:
product: linux
service: auditd
detection:
selection:
type: 'PATH'
name:
- /etc/syslog.conf
- /etc/rsyslog.conf
- /etc/syslog-ng/syslog-ng.conf
condition: selection
fields:
- exe
- comm
- key
falsepositives:
- Legitimate administrative activity
level: high
@@ -1,4 +1,4 @@
title: Masquerading as Linux crond process
title: Masquerading as Linux Crond Process
id: 9d4548fa-bba0-4e88-bd66-5d5bf516cda0
status: experimental
description: Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and
@@ -6,7 +6,10 @@ description: Masquerading occurs when the name or location of an executable, leg
author: Timur Zinniatullin, oscd.community
date: 2019/10/21
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1036/T1036.yaml
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1036.003/T1036.003.yaml
tags:
- attack.defense_evasion
- attack.t1036.003
logsource:
product: linux
service: auditd
@@ -19,6 +22,3 @@ detection:
a3: '*/crond'
condition: selection
level: medium
tags:
- attack.defense_evasion
- attack.t1036
@@ -0,0 +1,21 @@
title: Suspicious C2 Activities
id: f7158a64-6204-4d6d-868a-6e6378b467e0
status: experimental
description: Detects suspicious activities as declared by Florian Roth in its 'Best Practice Auditd Configuration'. This includes the detection of the following commands; wget, curl, base64, nc, netcat, ncat, ssh, socat, wireshark, rawshark, rdesktop, nmap. These commands match a few techniques from the tactics "Command and Control", including not exhaustively the following; Application Layer Protocol (T1071), Non-Application Layer Protocol (T1095), Data Encoding (T1132)
references:
- 'https://github.com/Neo23x0/auditd'
date: 2020/05/18
tags:
- attack.command_and_control
author: Marie Euler
logsource:
product: linux
service: auditd
detection:
selection:
key:
- 'susp_activity'
condition: selection
falsepositives:
- Admin or User activity
level: medium
+6 -3
View File
@@ -1,9 +1,12 @@
title: Detects Suspicious Commands on Linux systems
title: Suspicious Commands Linux
id: 1543ae20-cbdf-4ec1-8d12-7664d667a825
status: experimental
description: Detects relevant commands often related to malware or hacking activity
references:
- Internal Research - mostly derived from exploit code including code in MSF
tags:
- attack.execution
- attack.t1059.004
date: 2017/12/12
author: Florian Roth
logsource:
@@ -18,7 +21,7 @@ detection:
type: 'EXECVE'
a0: 'chmod'
a1: 'u+s'
cmd3:
cmd3:
type: 'EXECVE'
a0: 'cp'
a1: '/bin/ksh'
@@ -29,4 +32,4 @@ detection:
condition: 1 of them
falsepositives:
- Admin activity
level: medium
level: medium
+1 -1
View File
@@ -4,7 +4,7 @@ status: experimental
description: Detects posible command execution by web application/web shell
tags:
- attack.persistence
- attack.t1100
- attack.t1505.003
references:
- personal experience
author: Ilyas Ochkov, Beyu Denis, oscd.community
+5 -6
View File
@@ -1,13 +1,15 @@
title: Data Compressed
id: a3b5e3e9-1b49-4119-8b8e-0344a01f21ee
status: experimental
description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount
of data sent over the network
description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network
author: Timur Zinniatullin, oscd.community
date: 2019/10/21
modified: 2019/11/04
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1002/T1002.yaml
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560.001/T1560.001.yaml
tags:
- attack.exfiltration
- attack.t1560.001
logsource:
product: linux
service: auditd
@@ -27,6 +29,3 @@ detection:
falsepositives:
- Legitimate use of archiving tools by legitimate user
level: low
tags:
- attack.exfiltration
- attack.t1002
@@ -6,8 +6,9 @@ references:
tags:
- attack.execution
- attack.g0020
- attack.t1059
- attack.t1059.004
author: Florian Roth
date: 2017/04/09
logsource:
product: linux
detection:
+2
View File
@@ -1,6 +1,8 @@
title: Buffer Overflow Attempts
id: 18b042f0-2ecd-4b6e-9f8d-aa7a7e7de781
description: Detects buffer overflow attempts in Unix system log files
author: Florian Roth
date: 2017/03/01
references:
- https://github.com/ossec/ossec-hids/blob/master/etc/rules/attack_rules.xml
logsource:
@@ -0,0 +1,23 @@
title: Remove Immutable File Attribute
id: a5b977d6-8a81-4475-91b9-49dbfcd941f7
description: Detects removing immutable file attribute
status: experimental
tags:
- attack.defense_evasion
- attack.t1222.002
author: Jakob Weinzettl, oscd.community
date: 2019/09/23
logsource:
product: linux
service: auditd
detection:
selection:
type: 'EXECVE'
a0|contains: 'chattr'
a1|contains: '-i'
condition: selection
falsepositives:
- Administrator interacting with immutable files (for instance backups)
level: medium
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1222.002/T1222.002.yaml
+2
View File
@@ -1,6 +1,8 @@
title: Relevant ClamAV Message
id: 36aa86ca-fd9d-4456-814e-d3b1b8e1e0bb
description: Detects relevant ClamAV messages
author: Florian Roth
date: 2017/03/01
references:
- https://github.com/ossec/ossec-hids/blob/master/etc/rules/clam_av_rules.xml
logsource:
+25
View File
@@ -0,0 +1,25 @@
title: Overwriting the File with Dev Zero or Null
id: 37222991-11e9-4b6d-8bdf-60fbe48f753e
date: 2019/10/23
description: Detects overwriting (effectively wiping/deleting) the file
author: Jakob Weinzettl, oscd.community
tags:
- attack.impact
- attack.t1485
logsource:
product: linux
service: auditd
detection:
selection:
type: 'EXECVE'
a0|contains: 'dd'
a1|contains:
- 'if=/dev/null'
- 'if=/dev/zero'
condition: selection
falsepositives:
- Appending null bytes to files
- Legitimate overwrite of files
level: low
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1485/T1485.yaml
+27
View File
@@ -0,0 +1,27 @@
title: Remote File Copy
id: 7a14080d-a048-4de8-ae58-604ce58a795b
description: Detects the use of tools that copy files from or to remote systems
references:
- https://attack.mitre.org/techniques/T1105/
author: Ömer Günal
date: 2020/06/18
tags:
- attack.command_and_control
- attack.lateral_movement
- attack.t1105
level: low
logsource:
product: linux
detection:
keywords:
- Scp|contains:
- 'scp * *@*:*'
- 'scp *@*:* *'
- Rsync|contains:
- 'rsync -r *@*:* *'
- 'rsync -r * *@*:*'
- Sftp|contains:
- 'sftp *@*:* *'
condition: keywords
falsepositives:
- Legitimate administration activities
@@ -0,0 +1,24 @@
title: File or Folder Permissions Change
description: Detects
id: 74c01ace-0152-4094-8ae2-6fd776dd43e5
status: experimental
tags:
- attack.defense_evasion
- attack.t1222.002
author: Jakob Weinzettl, oscd.community
date: 2019/09/23
logsource:
product: linux
service: auditd
detection:
selection:
type: 'EXECVE'
a0|contains:
- 'chmod'
- 'chown'
condition: selection
falsepositives:
- User interracting with files permissions (normal/daily behaviour)
level: low
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1222.002/T1222.002.yaml
+27
View File
@@ -0,0 +1,27 @@
title: Systemd Service Reload or Start
id: 2625cc59-0634-40d0-821e-cb67382a3dd7
description: Detects a reload or a start of a service
status: experimental
tags:
- attack.persistence
- attack.t1543.002
author: Jakob Weinzettl, oscd.community
date: 2019/09/23
logsource:
product: linux
service: auditd
detection:
selection:
type: 'EXECVE'
a0|contains: 'systemctl'
a1|contains:
- 'daemon-reload'
- 'start'
condition: selection
falsepositives:
- Installation of legitimate service
- Legitimate reconfiguration of service
level: low
references:
- https://attack.mitre.org/techniques/T1543/002/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1543.002/T1543.002.yaml
+13 -4
View File
@@ -2,19 +2,27 @@ title: Clear Command History
id: fdc88d25-96fb-4b7c-9633-c0e417fdbd4e
status: experimental
description: Clear command history in linux which is used for defense evasion.
# Example config for this one (place it in .bash_profile):
# (is_empty=false; inotifywait -m .bash_history | while read file; do if [ $(wc -l <.bash_history) -lt 1 ]; then if [ "$is_empty" = false ]; then logger -i -p local5.info -t empty_bash_history "$USER : ~/.bash_history is empty "; is_empty=true; fi; else is_empty=false; fi; done ) &
# It monitors the size of .bash_history and log the words "empty_bash_history" whenever a previously not empty bash_history becomes empty
# We define an empty file as a document with 0 or 1 lines (it can be a line with only one space character for example)
# It has two advantages over the version suggested by Patrick Bareiss :
# - it is not relative to the exact command used to clear .bash_history : for instance Caldera uses "> .bash_history" to clear the history and this is not one the commands listed here. We can't be exhaustive for all the possibilities !
# - the method suggested by Patrick Bareiss logs all the commands entered directly in a bash shell. therefore it may miss some events (for instance it doesn't log the commands launched from a Caldera agent). Here if .bash_history is cleared, it will always be detected
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1146/T1146.yaml
- https://attack.mitre.org/techniques/T1146/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.003/T1070.003.yaml
- https://attack.mitre.org/techniques/T1070/003/
- https://www.hackers-arise.com/single-post/2016/06/20/Covering-your-BASH-Shell-Tracks-AntiForensics
author: Patrick Bareiss
date: 2019/03/24
modified: 2020/07/13
logsource:
product: linux
detection:
keywords:
- 'rm *bash_history'
- 'echo "" > *bash_history'
- 'cat /dev/null > *bash_history'
- 'cat /dev/null > *bash_history'
- 'ln -sf /dev/null *bash_history'
- 'truncate -s0 *bash_history'
# - 'unset HISTFILE' # prone to false positives
@@ -22,10 +30,11 @@ detection:
- 'history -c'
- 'history -w'
- 'shred *bash_history'
- 'empty_bash_history'
condition: keywords
falsepositives:
- Unknown
level: high
tags:
- attack.defense_evasion
- attack.t1146
- attack.t1070.003
+2 -2
View File
@@ -8,8 +8,8 @@ references:
author: Patrick Bareiss
date: 2019/04/05
tags:
- attack.privilege_escalation
- attack.t1068
- attack.execution
- attack.t1059.004
level: medium
logsource:
product: linux
+5 -2
View File
@@ -6,6 +6,9 @@ references:
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/struts_code_exec_exception_delegator.rb#L121
- http://pastebin.com/FtygZ1cg
- https://artkond.com/2017/03/23/pivoting-guide/
tags:
- attack.execution
- attack.t1059.004
author: Florian Roth
date: 2017/08/21
modified: 2019/02/05
@@ -24,11 +27,11 @@ detection:
- 'socat -O /tmp/*'
- 'socat tcp-connect*'
- '*echo binary >>*'
# Malware
# Malware
- '*wget *; chmod +x*'
- '*wget *; chmod 777 *'
- '*cd /tmp || cd /var/run || cd /mnt*'
# Apache Struts in-the-wild exploit codes
# Apache Struts in-the-wild exploit codes
- '*stop;service iptables stop;*'
- '*stop;SuSEfirewall2 stop;*'
- 'chmod 777 2020*'
@@ -2,6 +2,7 @@ title: Suspicious Log Entries
id: f64b6e9a-5d9d-48a5-8289-e1dd2b3876e1
description: Detects suspicious log entries in Linux log files
author: Florian Roth
date: 2017/03/25
logsource:
product: linux
detection:
@@ -4,6 +4,9 @@ status: experimental
description: Detects suspicious shell commands or program code that may be exected or used in command line to establish a reverse shell
references:
- https://alamot.github.io/reverse_shells/
tags:
- attack.execution
- attack.t1059.004
author: Florian Roth
date: 2019/04/02
logsource:
+2
View File
@@ -1,6 +1,8 @@
title: Shellshock Expression
id: c67e0c98-4d39-46ee-8f6b-437ebf6b950e
description: Detects shellshock expressions in log files
date: 2017/03/14
author: Florian Roth
references:
- http://rubular.com/r/zxBfjWfFYs
logsource:
@@ -1,5 +1,7 @@
title: Multiple Failed Logins with Different Accounts from Single Source System
title: Failed Logins with Different Accounts from Single Source System
id: fc947f8e-ea81-4b14-9a7b-13f888f94e18
author: Florian Roth
date: 2017/02/16
description: Detects suspicious failed logins with different user accounts from a single source system
logsource:
product: linux
+19
View File
@@ -0,0 +1,19 @@
title: Guacamole Two Users Sharing Session Anomaly
status: experimental
id: 1edd77db-0669-4fef-9598-165bda82826d
description: Detects suspicious session with two users present
references:
- https://research.checkpoint.com/2020/apache-guacamole-rce/
author: Florian Roth
date: 2020/07/03
logsource:
product: linux
service: guacamole
detection:
selection:
- '(2 users now present)'
condition: selection
falsepositives:
- Unknown
level: high
+4 -1
View File
@@ -3,12 +3,15 @@ id: 8ec2c8b4-557a-4121-b87c-5dfb3a602fae
description: Detects suspicious command sequence that JexBoss
references:
- https://www.us-cert.gov/ncas/analysis-reports/AR18-312A
tags:
- attack.execution
- attack.t1059.004
author: Florian Roth
date: 2017/08/24
logsource:
product: linux
detection:
selection1:
selection1:
- 'bash -c /bin/bash'
selection2:
- '&/dev/tcp/'
+2 -1
View File
@@ -1,4 +1,4 @@
title: Suspicious SSHD Error
title: Suspicious OpenSSH Daemon Error
id: e76b413a-83d0-4b94-8e4c-85db4a5b8bdc
description: Detects suspicious SSH / SSHD error messages that indicate a fatal or suspicious error that could be caused by exploiting attempts
references:
@@ -6,6 +6,7 @@ references:
- https://github.com/ossec/ossec-hids/blob/master/etc/rules/sshd_rules.xml
author: Florian Roth
date: 2017/06/30
modified: 2020/05/15
logsource:
product: linux
service: sshd
-1
View File
@@ -31,4 +31,3 @@ detection:
falsepositives:
- Unknown
level: medium
@@ -1,6 +1,8 @@
title: Multiple Modsecurity Blocks
id: a06eea10-d932-4aa6-8ba9-186df72c8d23
description: Detects multiple blocks by the mod_security module (Web Application Firewall)
date: 2017/02/28
author: Florian Roth
logsource:
product: linux
service: modsecurity
@@ -9,10 +11,9 @@ detection:
- 'mod_security: Access denied'
- 'ModSecurity: Access denied'
- 'mod_security-message: Access denied'
timeframe: 120m
timeframe: 120m
condition: selection | count() > 6
falsepositives:
- Vulnerability scanners
- Frequent attacks if system faces Internet
level: medium
@@ -0,0 +1,32 @@
title: Cisco Clear Logs
id: ceb407f6-8277-439b-951f-e4210e3ed956
status: experimental
description: Clear command history in network OS which is used for defense evasion.
references:
- https://attack.mitre.org/techniques/T1146/
- https://attack.mitre.org/techniques/T1070/
author: Austin Clark
date: 2019/08/12
tags:
- attack.defense_evasion
- attack.t1146
- attack.t1070
- attack.t1070.003
logsource:
product: cisco
service: aaa
category: accounting
fields:
- src
- CmdSet
- User
- Privilege_Level
- Remote_Address
detection:
keywords:
- 'clear logging'
- 'clear archive'
condition: keywords
falsepositives:
- Legitimate administrators may run these commands.
level: high
@@ -0,0 +1,40 @@
title: Cisco Collect Data
id: cd072b25-a418-4f98-8ebc-5093fb38fe1a
status: experimental
description: Collect pertinent data from the configuration files
references:
- https://attack.mitre.org/techniques/T1087/
- https://attack.mitre.org/techniques/T1003/
- https://attack.mitre.org/techniques/T1081/
- https://attack.mitre.org/techniques/T1005/
author: Austin Clark
date: 2019/08/11
tags:
- attack.discovery
- attack.credential_access
- attack.collection
- attack.t1087
- attack.t1003
- attack.t1081
- attack.t1005
- attack.t1552.001
logsource:
product: cisco
service: aaa
category: accounting
fields:
- src
- CmdSet
- User
- Privilege_Level
- Remote_Address
detection:
keywords:
- 'show running-config'
- 'show startup-config'
- 'show archive config'
- 'more'
condition: keywords
falsepositives:
- Commonly run by administrators.
level: low
@@ -0,0 +1,35 @@
title: Cisco Crypto Commands
id: 1f978c6a-4415-47fb-aca5-736a44d7ca3d
status: experimental
description: Show when private keys are being exported from the device, or when new certificates are installed.
references:
- https://attack.mitre.org/techniques/T1145/
- https://attack.mitre.org/techniques/T1130/
author: Austin Clark
date: 2019/08/12
tags:
- attack.credential_access
- attack.defense_evasion
- attack.t1130
- attack.t1145
- attack.t1553.004
- attack.t1552.004
logsource:
product: cisco
service: aaa
category: accounting
fields:
- src
- CmdSet
- User
- Privilege_Level
- Remote_Address
detection:
keywords:
- 'crypto pki export'
- 'crypto pki import'
- 'crypto pki trustpoint'
condition: keywords
falsepositives:
- Not commonly run by administrators. Also whitelist your known good certificates.
level: high
@@ -0,0 +1,30 @@
title: Cisco Disabling Logging
id: 9e8f6035-88bf-4a63-96b6-b17c0508257e
status: experimental
description: Turn off logging locally or remote
references:
- https://attack.mitre.org/techniques/T1089
author: Austin Clark
date: 2019/08/11
tags:
- attack.defense_evasion
- attack.t1089
- attack.t1562.001
logsource:
product: cisco
service: aaa
category: accounting
fields:
- src
- CmdSet
- User
- Privilege_Level
- Remote_Address
detection:
keywords:
- 'no logging'
- 'no aaa new-model'
condition: keywords
falsepositives:
- Unknown
level: high
@@ -0,0 +1,46 @@
title: Cisco Discovery
id: 9705a6a1-6db6-4a16-a987-15b7151e299b
status: experimental
description: Find information about network devices that are not stored in config files.
references:
- https://attack.mitre.org/tactics/TA0007/
author: Austin Clark
date: 2019/08/12
tags:
- attack.discovery
- attack.t1083
- attack.t1201
- attack.t1057
- attack.t1018
- attack.t1082
- attack.t1016
- attack.t1049
- attack.t1033
- attack.t1124
logsource:
product: cisco
service: aaa
category: accounting
fields:
- src
- CmdSet
- User
- Privilege_Level
- Remote_Address
detection:
keywords:
- 'dir'
- 'show processes'
- 'show arp'
- 'show cdp'
- 'show version'
- 'show ip route'
- 'show ip interface'
- 'show ip sockets'
- 'show users'
- 'show ssh'
- 'show clock'
condition: keywords
falsepositives:
- Commonly used by administrators for troubleshooting
level: low
+28
View File
@@ -0,0 +1,28 @@
title: Cisco Denial of Service
id: d94a35f0-7a29-45f6-90a0-80df6159967c
status: experimental
description: Detect a system being shutdown or put into different boot mode
references:
- https://attack.mitre.org/techniques/T1499/
- https://attack.mitre.org/techniques/T1495/
author: Austin Clark
date: 2019/08/15
tags:
- attack.impact
- attack.t1499
- attack.t1495
logsource:
product: cisco
service: aaa
category: accounting
fields:
- CmdSet
detection:
keywords:
- 'shutdown'
- 'config-register 0x2100'
- 'config-register 0x2142'
condition: keywords
falsepositives:
- Legitimate administrators may run these commands, though rarely.
level: medium
@@ -0,0 +1,34 @@
title: Cisco Show Commands Input
id: 71d65515-c436-43c0-841b-236b1f32c21e
status: experimental
description: See what files are being deleted from flash file systems
references:
- https://attack.mitre.org/techniques/T1107/
- https://attack.mitre.org/techniques/T1488/
- https://attack.mitre.org/techniques/T1487/
author: Austin Clark
date: 2019/08/12
tags:
- attack.defense_evasion
- attack.impact
- attack.t1107
- attack.t1488
- attack.t1487
- attack.t1561.002
- attack.t1070.004
- attack.t1561.001
logsource:
product: cisco
service: aaa
category: accounting
fields:
- CmdSet
detection:
keywords:
- 'erase'
- 'delete'
- 'format'
condition: keywords
falsepositives:
- Will be used sometimes by admins to clean up local flash space.
level: medium
@@ -0,0 +1,30 @@
title: Cisco Show Commands Input
id: b094d9fb-b1ad-4650-9f1a-fb7be9f1d34b
status: experimental
description: See what commands are being input into the device by other people, full credentials can be in the history
references:
- https://attack.mitre.org/techniques/T1056/
- https://attack.mitre.org/techniques/T1139/
author: Austin Clark
date: 2019/08/11
tags:
- attack.collection
- attack.credential_access
- attack.t1139
- attack.t1056
- attack.t1552.003
logsource:
product: cisco
service: aaa
category: accounting
fields:
- CmdSet
detection:
keywords:
- 'show history'
- 'show history all'
- 'show logging'
condition: keywords
falsepositives:
- Not commonly run by administrators, especially if remote logging is configured.
level: medium
@@ -0,0 +1,27 @@
title: Cisco Local Accounts
id: 6d844f0f-1c18-41af-8f19-33e7654edfc3
status: experimental
description: Find local accounts being created or modified as well as remote authentication configurations
references:
- https://attack.mitre.org/techniques/T1098/
- https://attack.mitre.org/techniques/T1136/
author: Austin Clark
date: 2019/08/12
tags:
- attack.persistence
- attack.t1136
- attack.t1098
logsource:
product: cisco
service: aaa
category: accounting
fields:
- CmdSet
detection:
keywords:
- 'username'
- 'aaa'
condition: keywords
falsepositives:
- When remote authentication is in place, this should not change often.
level: high
@@ -0,0 +1,41 @@
title: Cisco Modify Configuration
id: 671ffc77-50a7-464f-9e3d-9ea2b493b26b
status: experimental
description: Modifications to a config that will serve an adversary's impacts or persistence
references:
- https://attack.mitre.org/techniques/T1100/
- https://attack.mitre.org/techniques/T1168/
- https://attack.mitre.org/techniques/T1493/
author: Austin Clark
date: 2019/08/12
tags:
- attack.persistence
- attack.privilege_escalation
- attack.impact
- attack.t1493
- attack.t1100
- attack.t1168
- attack.t1490
- attack.t1565.002
- attack.t1505
- attack.t1053
logsource:
product: cisco
service: aaa
category: accounting
fields:
- CmdSet
detection:
keywords:
- 'ip http server'
- 'ip https server'
- 'kron policy-list'
- 'kron occurrence'
- 'policy-list'
- 'access-list'
- 'ip access-group'
- 'archive maximum'
condition: keywords
falsepositives:
- Legitimate administrators may run these commands.
level: medium
@@ -0,0 +1,41 @@
title: Cisco Stage Data
id: 5e51acb2-bcbe-435b-99c6-0e3cd5e2aa59
status: experimental
description: Various protocols maybe used to put data on the device for exfil or infil
references:
- https://attack.mitre.org/techniques/T1074/
- https://attack.mitre.org/techniques/T1105/
- https://attack.mitre.org/techniques/T1498/
- https://attack.mitre.org/techniques/T1002/
author: Austin Clark
date: 2019/08/12
tags:
- attack.collection
- attack.lateral_movement
- attack.command_and_control
- attack.exfiltration
- attack.impact
- attack.t1074
- attack.t1105
- attack.t1492
- attack.t1002
- attack.t1560
- attack.t1565.001
logsource:
product: cisco
service: aaa
category: accounting
fields:
- CmdSet
detection:
keywords:
- 'tftp'
- 'rcp'
- 'puts'
- 'copy'
- 'configure replace'
- 'archive tar'
condition: keywords
falsepositives:
- Generally used to copy configs or IOS images.
level: low
@@ -0,0 +1,27 @@
title: Cisco Sniffing
id: b9e1f193-d236-4451-aaae-2f3d2102120d
status: experimental
description: Show when a monitor or a span/rspan is setup or modified
references:
- https://attack.mitre.org/techniques/T1040
author: Austin Clark
date: 2019/08/11
tags:
- attack.credential_access
- attack.discovery
- attack.t1040
logsource:
product: cisco
service: aaa
category: accounting
fields:
- CmdSet
detection:
keywords:
- 'monitor capture point'
- 'set span'
- 'set rspan'
condition: keywords
falsepositives:
- Admins may setup new or modify old spans, or use a monitor for troubleshooting.
level: medium
@@ -8,6 +8,7 @@ tags:
- attack.command_and_control
- attack.g0020
author: Florian Roth
date: 2017/04/15
logsource:
category: firewall
detection:
+3 -2
View File
@@ -9,7 +9,7 @@ references:
author: Patrick Bareiss
date: 2019/04/07
logsource:
product: dns
category: dns
detection:
selection:
parent_domain: '*'
@@ -18,4 +18,5 @@ falsepositives:
- Valid software, which uses dns for transferring data
level: high
tags:
- attack.t1043
- attack.t1048
- attack.exfiltration
+29
View File
@@ -0,0 +1,29 @@
action: global
title: High DNS Bytes Out
id: 0f6c1bf5-70a5-4963-aef9-aab1eefb50bd
description: High DNS queries bytes amount from host per short period of time
status: experimental
author: Daniil Yugoslavskiy, oscd.community
date: 2019/10/24
tags:
- attack.exfiltration
- attack.t1048
falsepositives:
- Legitimate high DNS bytes out rate to domain name which should be added to whitelist
level: medium
---
logsource:
category: dns
detection:
selection:
query: '*'
timeframe: 1m
condition: selection | sum(question_length) by src_ip > 300000
---
logsource:
category: firewall
detection:
selection:
dst_port: 53
timeframe: 1m
condition: selection | sum(message_size) by src_ip > 300000
@@ -0,0 +1,29 @@
action: global
title: High DNS Requests Rate
id: b4163085-4001-46a3-a79a-55d8bbbc7a3a
description: High DNS requests amount from host per short period of time
status: experimental
author: Daniil Yugoslavskiy, oscd.community
date: 2019/10/24
tags:
- attack.exfiltration
- attack.t1048
falsepositives:
- Legitimate high DNS requests rate to domain name which should be added to whitelist
level: medium
---
logsource:
category: dns
detection:
selection:
query: '*'
timeframe: 1m
condition: selection | count() by src_ip > 1000
---
logsource:
category: firewall
detection:
selection:
dst_port: 53
timeframe: 1m
condition: selection | count() by src_ip > 1000
@@ -0,0 +1,19 @@
title: High NULL Records Requests Rate
id: 44ae5117-9c44-40cf-9c7c-7edad385ca70
description: Extremely high rate of NULL record type DNS requests from host per short period of time. Possible result of iodine tool execution
status: experimental
author: Daniil Yugoslavskiy, oscd.community
date: 2019/10/24
tags:
- attack.exfiltration
- attack.t1048
logsource:
category: dns
detection:
selection:
record_type: "NULL"
timeframe: 1m
condition: selection | count() by src_ip > 50
falsepositives:
- Legitimate high DNS NULL requests rate to domain name which should be added to whitelist
level: medium
@@ -0,0 +1,19 @@
title: High TXT Records Requests Rate
id: f0a8cedc-1d22-4453-9c44-8d9f4ebd5d35
description: Extremely high rate of TXT record type DNS requests from host per short period of time. Possible result of Do-exfiltration tool execution
status: experimental
author: Daniil Yugoslavskiy, oscd.community
date: 2019/10/24
tags:
- attack.exfiltration
- attack.t1048
logsource:
category: dns
detection:
selection:
record_type: "TXT"
timeframe: 1m
condition: selection | count() by src_ip > 50
falsepositives:
- Legitimate high DNS TXT requests rate to domain name which should be added to whitelist
level: medium
@@ -1,4 +1,4 @@
title: DNS TXT Answer with possible execution strings
title: DNS TXT Answer with Possible Execution Strings
id: 8ae51330-899c-4641-8125-e39f2e07da72
status: experimental
description: Detects strings used in command execution in DNS TXT Answer
@@ -7,17 +7,18 @@ references:
- https://github.com/samratashok/nishang/blob/master/Backdoors/DNS_TXT_Pwnage.ps1
tags:
- attack.t1071
- attack.t1071.004
author: Markus Neis
date: 2018/08/08
logsource:
category: dns
detection:
selection:
record_type: 'TXT'
answer:
- '*IEX*'
- '*Invoke-Expression*'
- '*cmd.exe*'
record_type: 'TXT'
answer:
- '*IEX*'
- '*Invoke-Expression*'
- '*cmd.exe*'
condition: selection
falsepositives:
- Unknown
+1
View File
@@ -2,6 +2,7 @@ title: Network Scans
id: fab0ddf0-b8a9-4d70-91ce-a20547209afb
description: Detects many failed connection attempts to different ports or hosts
author: Thomas Patzke
date: 2017/02/19
logsource:
category: firewall
detection:
@@ -0,0 +1,35 @@
title: Domain User Enumeration Network Recon 01
description: Domain user and group enumeration via network reconnaissance. Seen in APT 29 and other common tactics and actors. Detects a set of RPC (remote procedure calls) used to enumerate a domain controller. The rule was created based off the datasets and hackathon from https://github.com/OTRF/detection-hackathon-apt29
id: 66a0bdc6-ee04-441a-9125-99d2eb547942
references:
- "https://github.com/OTRF/detection-hackathon-apt29"
- "https://github.com/OTRF/detection-hackathon-apt29/issues/37"
author: 'Nate Guagenti (@neu5ron), Open Threat Research (OTR)'
date: 2020/05/03
modified: 2020/05/03
tags:
- attack.discovery
- attack.t1087
- attack.t1082
logsource:
product: zeek
service: dce_rpc
detection:
selection:
operation:
#- LsarEnumerateTrustedDomains #potentially too many FPs, removing. caused by netlogon
#- SamrEnumerateDomainsInSamServer #potentially too many FPs, removing. #method obtains a listing of all domains hosted by the server side of this protocol. This value is a cookie that the server can use to continue an enumeration on a subsequent call
- LsarLookupNames3 #method translates a batch of security principal names to their SID form
- LsarLookupSids3 #translates a batch of security principal SIDs to their name forms
- SamrGetGroupsForUser #obtains a listing of groups that a user is a member of
- SamrLookupIdsInDomain #method translates a set of RIDs into account names
- SamrLookupNamesInDomain #method translates a set of account names into a set of RIDs
- SamrQuerySecurityObject #method queries the access control on a server, domain, user, group, or alias object
- SamrQueryInformationGroup #obtains attributes from a group object
timeframe: 30s
condition: selection | count(operation) by src_ip > 4
falsepositives:
- Devices that may do authentication like a VPN or a firewall that looksup IPs to username
- False positives depend on scripts and administrative tools used in the monitored environment
level: medium
status: experimental
@@ -0,0 +1,53 @@
title: MITRE BZAR Indicators for ATT&CK Execution
id: b640c0b8-87f8-4daa-aef8-95a24261dd1d
description: 'Windows DCE-RPC functions which indicate an ATT&CK-like Execution techniques on the remote system. All credit for the Zeek mapping of the suspicious endpoint/operation field goes to MITRE.'
author: '@neu5ron, SOC Prime'
date: 2020/03/19
references:
- https://github.com/mitre-attack/bzar#indicators-for-attck-execution
tags:
- attack.execution
- attack.t1035
- attack.t1047
- attack.t1053
- attack.t1053.002
- attack.t1569.002
logsource:
product: zeek
service: dce_rpc
detection:
op1:
endpoint: 'JobAdd'
operation: 'atsvc'
op2:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcEnableTask'
op3:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRegisterTask'
op4:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRun'
op5:
endpoint: 'IWbemServices'
operation: 'ExecMethod'
op6:
endpoint: 'IWbemServices'
operation: 'ExecMethodAsync'
op7:
endpoint: 'svcctl'
operation: 'CreateServiceA'
op8:
endpoint: 'svcctl'
operation: 'CreateServiceW'
op9:
endpoint: 'svcctl'
operation: 'StartServiceA'
op10:
endpoint: 'svcctl'
operation: 'StartServiceW'
condition: 1 of them
falsepositives:
- 'Windows administrator tasks or troubleshooting'
- 'Windows management scripts or software'
level: medium
@@ -0,0 +1,38 @@
title: MITRE BZAR Indicators for ATT&CK Persistence
id: 53389db6-ba46-48e3-a94c-e0f2cefe1583
description: 'Windows DCE-RPC functions which indicate an ATT&CK-like Persistence techniques on the remote system. All credit for the Zeek mapping of the suspicious endpoint/operation field goes to MITRE.'
author: '@neu5ron, SOC Prime'
date: 2020/03/19
references:
- https://github.com/mitre-attack/bzar#indicators-for-attck-persistence
tags:
- attack.persistence
- attack.t1004
- attack.t1547.004
logsource:
product: zeek
service: dce_rpc
detection:
op1:
endpoint: 'spoolss'
operation: 'RpcAddMonitor'
op2:
endpoint: 'spoolss'
operation: 'RpcAddPrintProcessor'
op3:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddMonitor'
op4:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddPrintProcessor'
op5:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonW'
op6:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonExW'
condition: 1 of them
falsepositives:
- 'Windows administrator tasks or troubleshooting'
- 'Windows management scripts or software'
level: medium
@@ -0,0 +1,27 @@
title: Executable from Webdav
description: "Detects executable access via webdav6. Can be seen in APT 29 such as from the emulated APT 29 hackathon https://github.com/OTRF/detection-hackathon-apt29/"
id: aac2fd97-bcba-491b-ad66-a6edf89c71bf
author: 'SOC Prime, Adam Swan'
references:
- http://carnal0wnage.attackresearch.com/2012/06/webdav-server-to-download-custom.html
- https://github.com/OTRF/detection-hackathon-apt29
tags:
- attack.command_and_control
- attack.t1043
- attack.t1571
logsource:
product: zeek
service: http
date: 2020/05/01
detection:
selection_webdav:
- c-useragent: '*WebDAV*'
- c-uri: '*webdav*'
selection_executable:
- resp_mime_types: '*dosexec*'
- c-uri: '*.exe'
condition: selection_webdav AND selection_executable
falsepositives:
- unknown
level: medium
status: experimental
@@ -0,0 +1,45 @@
title: Publicly Accessible RDP Service
id: 1fc0809e-06bf-4de3-ad52-25e5263b7623
status: experimental
description: Detects connections from routable IPs to an RDP listener - which is indicative of a publicly-accessible RDP service.
references:
- https://attack.mitre.org/techniques/T1021/001/
tags:
- attack.t1021
- attack.t1021.001
author: 'Josh Brower @DefensiveDepth'
date: 2020/08/22
logsource:
product: zeek
service: rdp
detection:
selection:
src_ip|startswith:
- '192.168.'
- '10.'
- '172.16.'
- '172.17.'
- '172.18.'
- '172.19.'
- '172.20.'
- '172.21.'
- '172.22.'
- '172.23.'
- '172.24.'
- '172.25.'
- '172.26.'
- '172.27.'
- '172.28.'
- '172.29.'
- '172.30.'
- '172.31.'
#approved_rdp:
#dst_ip:
#- x.x.x.x
condition: not selection #and not approved_rdp
fields:
- src_ip
- dst_ip
falsepositives:
- none
level: high
@@ -0,0 +1,26 @@
title: Remote Task Creation via ATSVC Named Pipe - Zeek
id: dde85b37-40cd-4a94-b00c-0b8794f956b5
description: Detects remote task creation via at.exe or API interacting with ATSVC namedpipe
author: 'Samir Bousseaden, @neu5rn'
date: 2020/04/03
references:
- https://github.com/neo23x0/sigma/blob/d42e87edd741dd646db946f30964f331f92f50e6/rules/windows/builtin/win_atsvc_task.yml
tags:
- attack.lateral_movement
- attack.persistence
- attack.t1053
- car.2013-05-004
- car.2015-04-001
- attack.t1053.002
logsource:
product: zeek
service: smb_files
detection:
selection:
path: \\*\IPC$
name: atsvc
#Accesses: '*WriteData*'
condition: selection
falsepositives:
- unknown
level: medium
@@ -0,0 +1,24 @@
title: Possible Impacket SecretDump Remote Activity - Zeek
id: 92dae1ed-1c9d-4eff-a567-33acbd95b00e
description: 'Detect AD credential dumping using impacket secretdump HKTL. Based on the SIGMA rules/windows/builtin/win_impacket_secretdump.yml'
author: 'Samir Bousseaden, @neu5ron'
date: 2020/03/19
references:
- https://blog.menasec.net/2019/02/threat-huting-10-impacketsecretdump.html
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.002
- attack.t1003.004
- attack.t1003.003
logsource:
product: zeek
service: smb_files
detection:
selection:
path: '\\*ADMIN$'
name: '*SYSTEM32\\*.tmp'
condition: selection
falsepositives:
- 'unknown'
level: high

Some files were not shown because too many files have changed in this diff Show More