Compare commits

...

410 Commits

Author SHA1 Message Date
Thomas Patzke bae09e9447 Sigmatools release 0.18.1 2020-08-26 00:06:25 +02:00
Thomas Patzke b742e4ef08 Merge pull request #990 from neu5ron/es_backend
ES and Readme from SOC Prime
2020-08-25 21:34:55 +02:00
Nate Guagenti f21b3c50c6 control whether to use an analyzed field or different type if a query/value contains a wildcard.
Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com>
2020-08-25 13:13:18 -04:00
Nate Guagenti a7ffb96b6b elasticsearch regex escape of '.' for case insensitivity backend options
Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com>
2020-08-25 13:10:25 -04:00
Nate Guagenti 474e04dfe3 add new options to readme for elasticbackend
Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com>
2020-08-25 13:00:22 -04:00
Nate Guagenti 76910eaee4 fix sub field name usage if there are 3 or more fields..
Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com>
2020-08-25 12:56:57 -04:00
Nate Guagenti 0d713e4544 control whether to use an analyzed field or different type if a query/value contains a wildcard.
Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com>
2020-08-25 12:56:33 -04:00
Florian Roth 5a9ed1da15 Merge pull request #988 from defensivedepth/master
Zeek RDP rule
2020-08-24 12:39:49 +02:00
Josh Brower 4c4b8db7cf Zeek RDP rule 2020-08-23 13:16:42 -04:00
Florian Roth 437a807a1d Merge pull request #985 from architect00/master
added troubleshooting links to root README.md
2020-08-20 14:56:27 +02:00
David Straßegger 1e8a5b64d9 added troubleshooting links to root README.md 2020-08-20 14:02:26 +02:00
Florian Roth 79adaceffa Merge pull request #979 from barvhaim/patch-3
Update win_susp_rasdial_activity.yml to use `contains` instead of `equal`
2020-08-18 15:08:15 +02:00
Florian Roth bc74ac1f8a Update win_susp_rasdial_activity.yml 2020-08-18 14:40:37 +02:00
Florian Roth fd23a18241 Merge pull request #982 from tungn12/master
Carbon black mapping wrong and fix wild card
2020-08-18 14:33:22 +02:00
Florian Roth 0ba9383774 Merge pull request #984 from EccoTheFlintstone/fix_fp3
SIGMA ASEP: remove some false positives
2020-08-18 14:29:35 +02:00
ecco de4810233c remove false positives in Windows being too broad and add specific keys looked at + add keys from wow64 2020-08-18 05:28:37 -04:00
tung12 1921e9dd89 Fix wild card and some escaped characters 2020-08-18 15:57:13 +07:00
tung12 172f7b371e Change mapped Image to path 2020-08-17 15:05:44 +07:00
Bar Haim bd96b1c5ad Update win_susp_rasdial_activity.yml
`rasdial` is an `exe`, and probably appear as `rasdial.exe`
`LIKE` is more fit in this case
2020-08-16 16:17:49 +03:00
Thomas Patzke 3d9855dd06 Merge pull request #975 from scottdermott/master
+ Adding Mitre Sub-Techniques and python update script to fetch latest from Mitre CTI
2020-08-13 13:18:57 +02:00
Dermott, Scott J 7e6828dd40 + Adding Mitre Sub-Techniques and python update script to fetch latest Pre, Enterprise & Mobile Tactics and Techniques from Mitre CTI 2020-08-13 10:24:44 +01:00
Florian Roth 2e29c07e83 Merge pull request #928 from duzvik/master
Create sysmon_abusing_azure_browser_sso.yml
2020-08-12 17:15:27 +02:00
Florian Roth 61a05ee054 reordered fields, changed indentation 2020-08-12 16:44:37 +02:00
Thomas Patzke 01125ffd3b Fixed: Elastalert backend handling of conditional field mappings 2020-08-11 23:29:18 +02:00
Thomas Patzke d73447c111 Merge pull request #939 from ktecv2000/master
add wmi persistence script event consumer false positive
2020-08-05 23:28:26 +02:00
Thomas Patzke f827a557f2 Merge pull request #936 from rtkmokuka/typo_wmiprvse_spawning_process
Change fitler typo from 'Username' to 'User' for Wmiprvse Spawning Process rule
2020-08-05 23:26:14 +02:00
Thomas Patzke 9b2f8ce1f9 Merge pull request #953 from barvhaim/master
STIX Backend added and updated fields mapping
2020-08-05 23:25:17 +02:00
Florian Roth 98ca8b4ce9 Merge pull request #968 from zinint/master
ATT&CK mapping update suggestions for \linux\
2020-08-05 00:37:36 +02:00
Timur Zinniatullin 72fdf0da45 Update lnx_auditd_susp_cmds.yml 2020-08-04 20:00:30 +03:00
Timur Zinniatullin 4e688233d7 ATT&CK mapping update suggestions for \linux\ 2020-08-04 19:48:18 +03:00
Florian Roth 4529e4cd52 Merge pull request #966 from Neo23x0/rule-devel
rule: TAIDOOR malware load
2020-08-04 14:54:24 +02:00
Florian Roth 052379a512 fix: tightened TAIDOOR rule 2020-08-04 14:37:18 +02:00
Florian Roth c4953409aa rule: TAIDOOR malware load
https://us-cert.cisa.gov/ncas/analysis-reports/ar20-216a
2020-08-04 14:31:29 +02:00
Florian Roth fa36adfe6d Merge pull request #965 from IPv777/patch-2
.002 	= 	SMB/Windows Admin Shares
2020-08-03 18:05:12 +02:00
IPv777 a52583dc68 .002 = SMB/Windows Admin Shares 2020-08-03 17:43:14 +02:00
Florian Roth 732c1fa356 Merge pull request #964 from Neo23x0/rule-devel
New rules
2020-08-03 15:28:45 +02:00
Florian Roth 5625f471d7 Merge pull request #963 from diskurse/rule-devel
win_webshell_regeorg.yml
2020-08-03 13:51:16 +02:00
Florian Roth 3abc3d0a76 docs: add FP condition 2020-08-03 13:50:47 +02:00
Florian Roth 6f7aecbe06 fix: preventive change to avoid FPs 2020-08-03 13:49:52 +02:00
Cian Heasley de33b953ba Add files via upload
Webshell ReGeorg Detection Via Web Logs
2020-08-03 12:20:04 +01:00
Florian Roth df3bfb1b37 rule: Winnti Pipemon 2020-07-30 18:55:47 +02:00
bar 8352eefe22 STIX Support keywords (value without field) 2020-07-28 18:52:02 +03:00
bar 53f36d2ab6 Merge remote-tracking branch 'upstream/master' 2020-07-28 16:24:51 +03:00
Florian Roth 5abf101c0b Merge pull request #954 from Neo23x0/rule-devel
Rule devel
2020-07-28 10:22:52 +02:00
Florian Roth 8970d03f6f Merge pull request #952 from Neo23x0/devel
feat: Detect duplicate rule tags
2020-07-28 10:21:59 +02:00
bar 565f77c199 Added STIX target to README.md 2020-07-27 15:35:30 +03:00
bar de475bb500 updated STIX mapping for more rule fields 2020-07-27 14:36:30 +03:00
Florian Roth 80f4b4ec71 fix: rules with duplicate tags 2020-07-27 11:44:47 +02:00
Florian Roth 051e2ce905 feat: detect duplicate tags 2020-07-27 11:37:58 +02:00
Thomas Patzke 481b695eff Merge pull request #950 from barvhaim/master
STIX Backend bug-fix and mapping updates
2020-07-26 18:33:35 +02:00
bar 32cf352236 Merge remote-tracking branch 'upstream/master' 2020-07-26 14:56:06 +03:00
bar 9643e01b54 extension should use '..' 2020-07-26 12:16:48 +03:00
Thomas Patzke dcb07bab2f Merge pull request #949 from 0xballistics/powershell_backend_fix
partial(?) fix of #762
2020-07-25 10:18:05 +02:00
Florian Roth a0ac6c46c7 Merge pull request #948 from IPv777/patch-1
remove duplicate tag
2020-07-24 20:32:40 +02:00
Simran Kaur Soin b8b1f83ae6 Merge pull request #3 from simrankaursoin/master
Fix bug with NOT handling
2020-07-24 11:55:17 -04:00
IPv777 77a8ac59ef remove duplicate 2020-07-24 16:38:08 +02:00
Florian Roth a55630f02c Merge pull request #947 from ryanplasma/master
Minor fixes to two rules
2020-07-24 09:25:55 +02:00
Ryan Plas aa548ba1a9 Add quotes due to a colon in the falsepositives string 2020-07-23 23:33:36 -04:00
Ryan Plas e52489aaf6 Change production status to stable 2020-07-23 23:33:36 -04:00
Simran Soin c329f6412d Fix bug with NOT handling 2020-07-23 11:47:55 -04:00
Simran Kaur Soin 7e32557ffc Merge pull request #2 from simrankaursoin/master
Update base.py and qradar.py
2020-07-23 11:12:17 -04:00
Florian Roth 8a4b53eb3a fix: rule leads to FPs on systems that don't log the cmdline parameters 2020-07-23 17:04:16 +02:00
Simran Soin 6c7b4cf408 Revert additional change in base.py 2020-07-23 10:47:22 -04:00
Simran Soin ef9af3730a Remove unnecessary edits from qradar.py 2020-07-23 10:34:29 -04:00
Simran Soin 0e49a6acdf Default NOT to false for all functions 2020-07-23 10:18:16 -04:00
Simran Soin 0fac21f4a3 Remove modifications from base file and override in stix.py 2020-07-23 10:13:30 -04:00
Simran Kaur Soin a03d1b091e Merge pull request #1 from simrankaursoin/master
Fix NOT bug
2020-07-23 09:50:18 -04:00
Simran Soin 30ff22776a Fix NOT bug 2020-07-23 09:41:33 -04:00
Florian Roth 951c6fee8b Update sysmon_password_dumper_lsass.yml 2020-07-23 14:31:21 +02:00
bar 5019f2f160 added mapping for stix web, cloud, linux 2020-07-22 21:41:46 +03:00
Florian Roth 02a6b20f5f Merge pull request #944 from rtkdmasse/update-rule-selections
Add 'contains' for the ps encoded chars rule
2020-07-22 17:48:18 +02:00
Daniel Masse 13cf0488ae Add 'contains' for the ps encoded chars rule 2020-07-22 10:49:22 -04:00
Florian Roth db98fe79b0 Revert "rule: update - MATA framework UserAgent"
This reverts commit 81ef0137c5.
2020-07-22 14:02:51 +02:00
Florian Roth 81ef0137c5 rule: update - MATA framework UserAgent 2020-07-22 14:02:13 +02:00
Florian Roth 9682d37ead Merge pull request #941 from architect00/master
fixed wrong function call for elastalert aggregation. fixes #940
2020-07-22 13:13:18 +02:00
Florian Roth 769a9212a5 Merge pull request #943 from diskurse/rule-devel
Webshell Recon Detection Via CommandLine & ProcessesAdd files via upload
2020-07-22 13:02:44 +02:00
Cian Heasley 023bf76363 Add files via upload
Looking for processes spawned by web server components that indicate reconnaissance by popular public domain webshells for whether perl, python or wget are installed.
2020-07-22 09:05:50 +01:00
bar 0543ec1ae3 mapping update, removed unused fields 2020-07-21 19:49:26 +03:00
bar 83623f396c Merge remote-tracking branch 'upstream/master' 2020-07-21 17:22:06 +03:00
bar da30266c60 ImageLoaded mapping added 2020-07-21 17:21:14 +03:00
David Straßegger 875360f373 fixed wrong function call for elastalert aggregation. fixes #940 2020-07-20 14:32:30 +02:00
Poming huang 2b2bf34a64 add wmi persistence script event consumer false positive 2020-07-20 12:27:16 +08:00
Florian Roth 71aa8ad3ba Merge pull request #937 from brachera/master
Updates to rules and tags
2020-07-18 08:19:48 +02:00
Aidan Bracher ff3f9fe9b3 Updated tags 2020-07-18 03:02:43 +01:00
Aidan Bracher 1fd73a23b2 Updated tags with sub-techniques 2020-07-18 03:01:34 +01:00
Aidan Bracher 4ac1058ab5 Updated tags 2020-07-18 03:01:11 +01:00
Aidan Bracher 4ffe9cb042 Updated tags with sub-techniques 2020-07-18 02:53:46 +01:00
Aidan Bracher 3bd768e49b Updated tags with sub-techniques 2020-07-18 02:52:15 +01:00
Aidan Bracher dcf20e580d Updated tags to include sub-techniques 2020-07-18 02:50:57 +01:00
Aidan Bracher 1442812681 Updated tags 2020-07-18 02:44:53 +01:00
Aidan Bracher b61527d0b2 Added ATT&CK tactic 2020-07-18 02:42:10 +01:00
Aidan Bracher 161829a4c0 Added ATT&CK tactic 2020-07-18 02:41:48 +01:00
Aidan Bracher 147fd46157 Added ATT&CK tactic 2020-07-18 02:41:10 +01:00
Aidan Bracher 2d227a08c5 Updated suspicious service with sub-techniques 2020-07-18 02:40:22 +01:00
Aidan Bracher 97452a9df3 Update to include sub-technique mapping 2020-07-18 02:38:47 +01:00
Aidan Bracher 30bd591c96 Update win_apt_ke3chang to include sub-techniques 2020-07-18 02:37:56 +01:00
Aidan Bracher ad9a8ff956 Updated to include extra registry key 2020-07-18 02:37:11 +01:00
Aidan Bracher ea1b2ae59f Updated invoke_phantom with sub-technique mapping 2020-07-18 02:32:42 +01:00
Aidan Bracher 23dd2e3cac Updated to include sub-technique mapping 2020-07-18 02:29:58 +01:00
Aidan Bracher 2006aa8f5e Inclusion of registry keys for WinDefender disabling 2020-07-18 02:23:30 +01:00
Marko Okuka 1d39b40fd1 Fixing typo in rule: Username to User 2020-07-16 10:09:29 -04:00
Florian Roth ae05e8eb11 Merge pull request #935 from SanWieb/933-EventID-process_creation
Revert "Ref #933 - Added windows Process Creation to config"
2020-07-16 14:32:19 +02:00
Sander 94272c7770 Revert "Ref #933 - Added windows Process Creation to config"
This reverts commit 6c35a7afa0.
2020-07-16 14:30:17 +02:00
Florian Roth 80e6e933a9 Merge pull request #934 from SanWieb/933-EventID-process_creation
Proposed fix for #933
2020-07-16 13:38:12 +02:00
Sander 6c35a7afa0 Ref #933 - Added windows Process Creation to config 2020-07-16 13:16:57 +02:00
Florian Roth 3025d6850c Merge pull request #932 from rtkdmasse/rule-selection-typos
Change the selection from Command to CommandLine in a couple of rules
2020-07-16 09:10:15 +02:00
Florian Roth 992bf676f9 Update sysmon_apt_pandemic.yml 2020-07-16 08:48:32 +02:00
Florian Roth b1de627e94 Update win_apt_zxshell.yml 2020-07-16 08:47:24 +02:00
Florian Roth 4b9b57330a Merge pull request #931 from brachera/master
Fix for indentation issue
2020-07-16 08:46:42 +02:00
Daniel Masse 0489a50bd0 Change the selection from Command to CommandLine in a couple of rules 2020-07-15 15:55:26 -04:00
Florian Roth f8e10273ef Merge pull request #929 from Neo23x0/pr/919
Pr/919
2020-07-15 21:30:57 +02:00
Florian Roth b50d234cb5 Merge pull request #913 from ryanplasma/master
Update logsources description->definition
2020-07-15 21:30:33 +02:00
Sander Wiebing 254942e4c3 Merge pull request #4 from Neo23x0/master
Update repository
2020-07-15 17:58:01 +02:00
Aidan Bracher e0476d5ce6 Merge branch 'master' of git://github.com/Neo23x0/sigma 2020-07-15 16:35:29 +01:00
Aidan Bracher 1e5ee5823c Fix for indentation issue
Wrong indentation of line 182 meant that even where config options
were given, the default per backend was being used, rendering
custom config useless.
2020-07-15 16:29:27 +01:00
Florian Roth d0c09f10a9 changed newline character to LF 2020-07-15 16:46:44 +02:00
Ryan Plas de53a08746 Merge branch 'master' of github.com:Neo23x0/sigma 2020-07-15 10:27:33 -04:00
duzvik a9b860d749 Update sysmon_abusing_azure_browser_sso.yml 2020-07-15 14:24:49 +03:00
duzvik d24e15cc27 Update sysmon_abusing_azure_browser_sso.yml 2020-07-15 14:12:58 +03:00
duzvik c5dfffdac0 Create sysmon_abusing_azure_browser_sso.yml 2020-07-15 14:02:34 +03:00
Florian Roth 8f66803ddf Merge pull request #927 from Neo23x0/rule-devel
improved CVE-2020-1350 rule
2020-07-15 12:06:31 +02:00
Florian Roth 1c103a749f fix: more FPs based on feedback
https://twitter.com/GossiTheDog/status/1283341486680166400
2020-07-15 12:05:50 +02:00
Florian Roth c2eb110fca fix: more exact patterns 2020-07-15 11:56:11 +02:00
Florian Roth ae7fbb9245 fix: false positive filters based on SOC Prime's rule 2020-07-15 11:49:20 +02:00
Florian Roth e5a34a965c Merge pull request #926 from Neo23x0/rule-devel
rule: CVE-2020-1350
2020-07-15 11:19:07 +02:00
Florian Roth 80639afd43 rule: CVE-2020-1350 2020-07-15 11:03:31 +02:00
Florian Roth c7e412788a Merge pull request #924 from Neo23x0/devel
Live MITRE ATT&CK data from TAXI service in Test Scripts
2020-07-14 18:15:29 +02:00
Florian Roth 38c29977ff Merge pull request #925 from Neo23x0/rule-devel
fix: issue reported as https://github.com/Neo23x0/sigma/issues/923
2020-07-14 18:14:51 +02:00
Florian Roth 1928b3dc06 Merge pull request #920 from qwerty1q2w/feature
Added AppLocker log source and new rule
2020-07-14 18:03:17 +02:00
Florian Roth 741d42ce88 fix: issue reported as https://github.com/Neo23x0/sigma/issues/923 2020-07-14 17:59:59 +02:00
Florian Roth 71e66ea9ba refactor: tests use live data from MITRE's TAXI service 2020-07-14 17:54:02 +02:00
Florian Roth 58b68758b4 fix: wrong MITRE ATT&CK ids used in the beta version 2020-07-14 17:53:32 +02:00
Florian Roth 43fb39a0b4 Merge pull request #922 from Neo23x0/devel
refactor: ignore sub techniques as long as we do not have a complete …
2020-07-14 12:50:35 +02:00
Florian Roth cf25b9c509 feat: filename test 2020-07-14 12:33:16 +02:00
Florian Roth 495376df77 refactor: references test without warnings for missing refs 2020-07-14 12:33:02 +02:00
Florian Roth bae979f5c7 refactor: ignore sub techniques as long as we do not have a complete list 2020-07-14 11:56:28 +02:00
Florian Roth 44381610ea Merge pull request #918 from Neo23x0/devel
References Test
2020-07-14 09:28:44 +02:00
Florian Roth 781667ef22 fix: zeek rule references isn't a list 2020-07-14 00:33:47 +02:00
Ryan Plas 9eb5d8da4d Add logsource attribute rule test 2020-07-13 17:02:28 -04:00
Ryan Plas 04fd598bcf Update additional rules to have correct logsource attributes 2020-07-13 17:02:17 -04:00
Pushkarev Dmitry efe720d44e Added new rule. AppLocker 2020-07-13 20:51:48 +00:00
Pushkarev Dmitry 6c999df3b7 Added AppLocker log source 2020-07-13 20:48:06 +00:00
Pushkarev Dmitry 8e3f973e69 Added AppLocker log source 2020-07-13 20:46:49 +00:00
Pushkarev Dmitry bdfb646228 Added AppLocker log source 2020-07-13 20:45:30 +00:00
Pushkarev Dmitry 364af53902 Added AppLocker log source 2020-07-13 20:44:03 +00:00
Pushkarev Dmitry 326cf05a74 Added AppLocker log source 2020-07-13 20:41:54 +00:00
Pushkarev Dmitry 46a6183745 Added AppLocker log source 2020-07-13 20:32:03 +00:00
Pushkarev Dmitry a58e037509 Added AppLocker log source 2020-07-13 20:30:02 +00:00
Pushkarev Dmitry 7fb2e2b845 Added AppLocker log source 2020-07-13 20:29:13 +00:00
Pushkarev Dmitry e376948258 Added AppLocker log source 2020-07-13 20:27:52 +00:00
Pushkarev Dmitry 0d925896b9 Added AppLocker log source 2020-07-13 20:23:42 +00:00
Pushkarev Dmitry c30a256030 Added AppLocker log source 2020-07-13 20:21:46 +00:00
Pushkarev Dmitry 1da229e3a9 Added AppLocker log source 2020-07-13 20:20:28 +00:00
Pushkarev Dmitry 3a19e3cf23 Added AppLocker log source 2020-07-13 20:18:01 +00:00
Bart 308420bf7f Update sysmon_dllhost_net_connections.yml
Fix @
2020-07-13 21:20:55 +02:00
Bart 007f62ba01 Add Dllhost WAN access 2020-07-13 21:12:37 +02:00
Florian Roth b3e15eea68 fix: nested check 2020-07-13 18:49:00 +02:00
Florian Roth 91c0bea570 fix: typo and reordered 2020-07-13 18:22:47 +02:00
Florian Roth 758f5039b5 fix: no error on rules without references 2020-07-13 18:16:32 +02:00
Florian Roth 8d91659c2a fix: typo in field value 2020-07-13 18:08:00 +02:00
Florian Roth 4c610ec693 feat: test references is list 2020-07-13 18:07:19 +02:00
Florian Roth f12cb7309b fix: references is not a list 2020-07-13 17:37:03 +02:00
Florian Roth 437a567e4f Merge pull request #917 from Neo23x0/rule-devel
New Empire Rules and Updates
2020-07-13 16:37:59 +02:00
Florian Roth 1c63a93643 fix: wrong casing in tag 2020-07-13 16:20:51 +02:00
Florian Roth 87ce5e5745 fix: missing MITRE ATT&CK IDs in test 2020-07-13 16:02:22 +02:00
Florian Roth 1b75a3a96b Merge pull request #916 from viniciusvec/patch-2
Update lnx_shell_clear_cmd_history.yml
2020-07-13 15:54:11 +02:00
Florian Roth 557e8b0faf rule: improved Empire detection 2020-07-13 15:47:53 +02:00
viniciusvec 26f0d49772 Update lnx_shell_clear_cmd_history.yml
Renamed tags to match production MITRE: https://attack.mitre.org/techniques/T1070/003/
2020-07-13 14:06:14 +01:00
Florian Roth 7e8aa7b12b Merge pull request #915 from Neo23x0/rule-devel
rule: regsvr32 flags anomaly
2020-07-13 12:16:05 +02:00
Florian Roth 7a63fd56da rule: regsvr32 flags anomaly 2020-07-13 11:59:44 +02:00
Ryan Plas 25d978d9bd Update powershell_shellcode_b64.yml logsource to use the correct Sigma schema values 2020-07-11 22:17:06 -04:00
Ryan Plas 3bb45f00af Update web_citrix_cve_2019_19781_exploit.yml logsource to use the correct Sigma schema values 2020-07-11 00:00:21 -04:00
Florian Roth 1a87492bd4 Merge pull request #912 from Neo23x0/rule-devel
rule: improved Citrix rule
2020-07-10 19:46:09 +02:00
Florian Roth 129925ce0b rule: improved Citrix rule 2020-07-10 18:15:35 +02:00
Florian Roth 17dedddbdd Merge pull request #911 from Neo23x0/rule-devel
rule: Citrix Netscaler Attack CVE-2020-8193 CVE-2020-8195
2020-07-10 18:09:19 +02:00
Florian Roth 383953c74e rule: better rule name and descriptions, plus MITRE ATT&CK tags 2020-07-10 17:55:13 +02:00
Florian Roth 0d89208242 rule: updated Citrix rule 2020-07-10 17:49:18 +02:00
Florian Roth eda08e3a89 rule: Citrix Netscaler Attack CVE-2020-8193 CVE-2020-8195 2020-07-10 17:45:11 +02:00
Florian Roth 3ab5eb97d8 Merge pull request #901 from brachera/master
rule: Leviathan registry key
2020-07-10 16:42:02 +02:00
Florian Roth 49aa0b4621 Merge pull request #909 from EccoTheFlintstone/fp2
add WMI module load false positive
2020-07-10 15:45:53 +02:00
Florian Roth 5de82628fa Update sysmon_apt_leviathan.yml 2020-07-10 15:41:55 +02:00
Florian Roth 168952840b Merge pull request #910 from Neo23x0/rule-devel
Rule devel
2020-07-10 14:17:22 +02:00
Florian Roth 268a28daed rule: Evilnum Golden Chicken rule OCX 2020-07-10 13:02:52 +02:00
ecco e30eaa0202 be more specific about file location 2020-07-09 13:33:59 -04:00
ecco 94e3bd9e6b add WMI module load false positive 2020-07-09 13:32:21 -04:00
Florian Roth 6ad2f07193 Merge pull request #907 from EccoTheFlintstone/fix_fp
add WMI and powershell false positives
2020-07-09 17:42:53 +02:00
ecco 905f1b3823 add WMI and powershell false positives 2020-07-09 10:26:54 -04:00
Florian Roth 7949729fa4 rule: PowerShell encoded character syntax 2020-07-09 08:52:32 +02:00
Florian Roth 5200f1f85d Merge pull request #905 from barvhaim/stix-mapping
Incorrect mapping fixes [stix backend]
2020-07-08 19:22:23 +02:00
bar ca7cf8478d - IntegrityLevel mapping to integritylevel 2020-07-08 19:37:24 +03:00
Florian Roth 14210aba16 Merge pull request #906 from GelosSnake/patch-1
adding google chrome to FP list
2020-07-08 16:57:29 +02:00
bar 8855a87dbf - TargetProcessAddress mapping should be as startaddress mapping
- remove extra '-'
2020-07-08 17:35:57 +03:00
Florian Roth e3734aaa27 fix: missing upper tick 2020-07-08 15:53:04 +02:00
GelosSnake efae210556 adding google chrome to FP list
legitimate errors generated by Google Chrome are reported often.

Official google standpoint on this:
https://support.google.com/chrome/a/thread/15440066?hl=en
2020-07-08 16:44:41 +03:00
bar 8889ae21ca DestinationPort to network-traffic:dst_port mapping fix 2020-07-08 14:31:04 +03:00
bar 50ef79b398 Custom STIX object "x-sigma" for fields that missing mapping, so the pattern is STIX valid 2020-07-08 14:09:26 +03:00
Thomas Patzke 8cec884d96 Merge branch 'pr-709' 2020-07-08 08:00:03 +02:00
Thomas Patzke bd9410fe06 Added CI test 2020-07-07 23:46:49 +02:00
Thomas Patzke 205b584e80 Merge branch 'pr-829' 2020-07-07 23:42:57 +02:00
Thomas Patzke 3e17cc1900 Merge pull request #894 from caliskanfurkan/master
ditsnap, a credential access tool used in ransomware attacks
2020-07-07 23:21:36 +02:00
Thomas Patzke 28013a15e1 Improved rule 2020-07-07 23:18:07 +02:00
Thomas Patzke 90f09f7b12 Merge branch 'devel' of https://github.com/diskurse/sigma into pr-829 2020-07-07 23:15:39 +02:00
Thomas Patzke 3c760fabc1 Merge pull request #745 from Rettila/master
Added new rules
2020-07-07 23:14:19 +02:00
Thomas Patzke 9bcff522b6 Merge branch 'master' of https://github.com/rashimo/sigma into pr-709 2020-07-07 23:12:03 +02:00
Thomas Patzke 7eb499ad85 Added rule id 2020-07-07 22:54:55 +02:00
Thomas Patzke 360b5714a8 Splitted and improved new rule 2020-07-07 22:47:14 +02:00
Thomas Patzke 0ce5f2cc75 Merge branch 'patch-2' of https://github.com/4A616D6573/sigma into pr-483 2020-07-07 22:37:11 +02:00
Thomas Patzke 4762a59b89 Merge pull request #891 from rtkbkish/image-load-fixes
Fix typo for rule in image_load category
2020-07-07 22:31:32 +02:00
Thomas Patzke 2032a1e7fd Merge pull request #898 from rtkbkish/fix-uac-registry
Proposed fix for sysmon_uac_bypass_eventvwr
2020-07-07 22:29:39 +02:00
Thomas Patzke 9e85731253 Merge pull request #899 from rtkbkish/refix-rules
Re-fix sysmon rules that lost changes with category refactoring.
2020-07-07 22:28:37 +02:00
Thomas Patzke a11bc000fd Merge pull request #900 from barvhaim/stix
STIX backend added including mapping configurations for windows logs and QRadar
2020-07-07 22:26:51 +02:00
Florian Roth b0e59bdb40 Merge pull request #903 from Neo23x0/rule-devel
rule: extended F5 BIG-IP exploitation detection rule
2020-07-07 22:06:00 +02:00
Florian Roth acfe20aa34 rule: extended F5 BIG-IP exploitation detection rule 2020-07-07 21:45:08 +02:00
bar 35bb8df0b5 updated makefile with stix coverage cmd 2020-07-07 16:39:59 +03:00
Aidan Bracher 90983dcc4b add level field to rule 2020-07-07 14:28:18 +01:00
Aidan Bracher f549a14d9a rule: Leviathan registry key 2020-07-07 13:27:57 +01:00
bar acbab2db4b stix backend + mapping configurations for windows logs and qradar 2020-07-07 15:04:16 +03:00
Florian Roth 99ac4f1f3d fix: FPs with RedMimicry rule 2020-07-07 10:11:58 +02:00
Florian Roth c8ca55b3e4 fix: duplicate wrong old key 2020-07-06 17:14:59 +02:00
Florian Roth cc31ed8b84 fix: missing NTLM log source in THOR 2020-07-06 17:07:06 +02:00
Brad Kish c758ca0eb9 Re-fix sysmon rules that are lost changes with category refactoring.
Several fixes for sysmon rules got lost when the rules were refactored to use
categories.

Re-add the fixes.

https://github.com/Neo23x0/sigma/commit/38afd8b5def24191616ff0f0c0324cfbb7f0d6d0

https://github.com/Neo23x0/sigma/commit/422b2bffd77b217e6cec9a67c496b0aa44711ece

https://github.com/Neo23x0/sigma/commit/dfae2a6df6f5bbc90a7b476c22fc9c8fedab47e9
2020-07-06 10:55:42 -04:00
Brad Kish 7e06fd80fd Proposed fix for sysmon_uac_bypass_eventvwr
Issue: https://github.com/Neo23x0/sigma/issues/888

The rules were not merged correctly with the transition to sysmon categories.

Split the rule into separate documents: one for the registry_event and one for
the process_creation
2020-07-06 09:20:34 -04:00
Thomas Patzke 939156fa6d Introduced dns_query log source category 2020-07-05 23:29:51 +02:00
Thomas Patzke 0df21289a0 Merge branch 'dns-fixes' of https://github.com/rtkbkish/sigma into pr-893 2020-07-05 23:24:56 +02:00
Thomas Patzke 57cb255208 Merge pull request #864 from cclauss/patch-3
Fix undefined names in sigma2misp.py
2020-07-05 23:16:22 +02:00
Florian Roth 4aae3a6aa5 Merge pull request #897 from Neo23x0/rule-devel
improved F5 BIG-IP rule based on private feedback
2020-07-05 16:38:20 +02:00
Florian Roth 13ab00f744 improved F5 BIG-IP rule based on private feedback 2020-07-05 16:21:48 +02:00
Florian Roth ab9a988682 Merge pull request #896 from Neo23x0/rule-devel
rule: CVE-2020-5902 F5 BIG-IP Exploitation Attempt
2020-07-05 13:44:36 +02:00
Florian Roth fbe6c0e7d9 improved F5 BIG-IP rule 2020-07-05 13:29:30 +02:00
Florian Roth f079d0f915 rule: CVE-2020-5902 F5 BIG-IP Exploitation Attempt
https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/
2020-07-05 13:18:53 +02:00
Florian Roth c51b4d0524 Merge pull request #890 from rtkbkish/file-event-fixes
Fixes for rules in the sysmon file_event category
2020-07-05 13:13:24 +02:00
Florian Roth 4a810dd136 Merge pull request #886 from Neo23x0/rule-devel
Windows Curl Rules
2020-07-05 13:12:41 +02:00
Florian Roth facd578324 Merge pull request #892 from rtkbkish/registry-event-fixes
Fixes for rules in new sysmon registry_event category
2020-07-05 13:12:04 +02:00
Furkan CALISKAN 8ef82e48eb ditsnap 2020-07-04 23:21:52 +03:00
Brad Kish 8b3b312c4e Proposed fix for https://github.com/Neo23x0/sigma/issues/889
This change removes dns events from the network connection category. The
one change is that sysmon_regsvr32_network_activity.yml needs to test
the network connection category separately from the DNS event id.
2020-07-03 16:28:19 -04:00
Brad Kish 7031d9e2b8 Fix typo for rule in image_load category
image_load not image_loaded.
2020-07-03 16:23:17 -04:00
Brad Kish 1e9d0e9653 Fixes for rules in the sysmon file_event category
Fix a couple of typos

For sysmon_hack_dumpert:
Make sure the logsource is category file_event and not sysmon. Don't set
the category at the global level. Instead set in the individual document.
2020-07-03 16:22:29 -04:00
Brad Kish 4b31633355 Fixes for rules in new sysmon registry_event category
To be consistent with the behaviour of the other rules, the eventID should not
be specified as part of the rule. The category defines the eventID.
2020-07-03 16:20:37 -04:00
Florian Roth 11517edbd7 rule: suspicious curl usage 2020-07-03 18:55:44 +02:00
Florian Roth c4267a4614 rule: suspicious curl file upload 2020-07-03 18:20:44 +02:00
Florian Roth 80f15a1e50 Merge pull request #885 from Neo23x0/rule-devel
fix: trailing whitespace
2020-07-03 18:00:19 +02:00
Florian Roth 4d9e2e8c16 fix: trailing white space 2020-07-03 17:59:50 +02:00
Florian Roth 26d8810efb Merge pull request #882 from Neo23x0/rule-devel
Rule devel
2020-07-03 15:33:55 +02:00
Florian Roth 8a0262d1a2 fix: in linux keyword expression 2020-07-03 15:08:20 +02:00
Florian Roth 4dc818aafd fix: rar flags rule caused too many FPs 2020-07-03 13:20:24 +02:00
Florian Roth 5dd5b87f43 rule: guacamole exploitation detection 2020-07-03 13:20:03 +02:00
Florian Roth abf5f799d6 docs: more references 2020-07-03 13:19:44 +02:00
Florian Roth fa452bf3e5 Merge pull request #849 from omergunal/ogunal-1
Rules for detecting suspicious remote file copy
2020-07-03 11:59:45 +02:00
Florian Roth b9966a173c Update lnx_file_copy.yml 2020-07-03 11:32:49 +02:00
Florian Roth 6420820eb2 Merge pull request #871 from Christopolos94/master
Update to mdatp backend
2020-07-03 11:29:01 +02:00
Florian Roth 5f04fcccf5 fix: broken links 2020-07-03 11:22:06 +02:00
Florian Roth 3111ab8396 refactor: new way to write that rule 2020-07-03 11:20:36 +02:00
Florian Roth d12b8347dc fix: bug in cmstp rule
https://github.com/Neo23x0/sigma/issues/876
2020-07-03 11:19:11 +02:00
Florian Roth 0bbf40fb14 refactor: include xcopy 2020-07-03 11:03:45 +02:00
Florian Roth 3bea08edfc refactor: copy from/to system32 rule 2020-07-03 10:56:26 +02:00
Florian Roth 02dee36f4c Merge pull request #880 from Neo23x0/rule-devel
fix: typo in systemroot
2020-07-03 10:25:31 +02:00
Florian Roth 34ea706e4f fix: typo in systemroot 2020-07-03 10:24:58 +02:00
Florian Roth 53620a0d2f Merge pull request #879 from Neo23x0/rule-devel
fix: missing copy command
2020-07-03 10:18:21 +02:00
Florian Roth 0fa1c1525b fix: missing copy command 2020-07-03 10:17:34 +02:00
Florian Roth 248506be93 Merge pull request #878 from Neo23x0/rule-devel
DesktopImgDownLdr Rules and extra rule
2020-07-03 10:14:58 +02:00
Florian Roth 1f0b1e58a9 fix: bugs in rule and title 2020-07-03 09:54:10 +02:00
Florian Roth 01ed87186f Copy From System Root rule 2020-07-03 09:45:58 +02:00
Florian Roth 33fef8bcf5 DesktopImgDownLdr rules 2020-07-03 09:45:48 +02:00
Thomas Patzke 43e5ae5d24 Added Windows NTLM log source + fixes 2020-07-02 23:20:36 +02:00
Thomas Patzke de0bb36c51 Merge branch 'master' of https://github.com/4A616D6573/sigma into pr-785 2020-07-02 23:04:59 +02:00
Florian Roth bb86d9c125 Merge pull request #875 from Neo23x0/rule-devel
fix: duplicate IDs and rule titles
2020-07-01 16:58:06 +02:00
Florian Roth 4c4ed1a4a2 fix: duplicate IDs and rule titles 2020-07-01 16:37:27 +02:00
Florian Roth 61c3b2e0d6 Merge pull request #873 from Neo23x0/rule-devel
fix: remove duplicate rules in sysmon (generic rule cleanup)
2020-07-01 11:29:04 +02:00
Florian Roth 9c0f9f398f refactor: sysmon rule cleanup > generlization 2020-07-01 10:58:39 +02:00
Florian Roth 4231fe2efc fix: remove duplicate rules in sysmon (generic rule cleanup) 2020-07-01 10:23:30 +02:00
Florian Roth bc71ee5614 Merge pull request #872 from Neo23x0/rule-devel
Rule devel
2020-07-01 10:16:57 +02:00
Florian Roth ab40cdbbd7 fix: missing ATT&CK id 2020-07-01 09:57:35 +02:00
Florian Roth 154181c6c8 fix: renamed files and lien break change 2020-07-01 09:48:48 +02:00
Florian Roth d70b63b78c rule: RedMimicry rules (modified) 2020-07-01 09:17:31 +02:00
Florian Roth fe71d21d97 style: removed new lines 2020-07-01 09:11:00 +02:00
Florian Roth b7ac36e6ab Merge branch 'master' into rule-devel 2020-07-01 09:04:46 +02:00
Florian Roth f2587791f2 rule: suspicious rar flags 2020-07-01 09:04:26 +02:00
Chris Brake 6ed1ea6509 Updating the mdatp backend file as it is currently impossible to set an ActionType as there is no mapping to EventType 2020-06-30 14:49:29 +01:00
Florian Roth ba682c5de6 Merge pull request #863 from qwerty1q2w/feature
add win_not_allowed_rdp_access.yml rule
2020-06-30 10:03:11 +02:00
Florian Roth 77553e11e8 Update win_not_allowed_rdp_access.yml 2020-06-30 10:03:00 +02:00
Florian Roth 2e3669a5a4 Merge pull request #865 from j91321/defender-rules
Windows Defender logsource and rules
2020-06-30 10:01:17 +02:00
Florian Roth eb3a6e86af Merge pull request #867 from HarishHary/suspicious_powershell_parent_process
New Rule: Suspicious powershell parent process
2020-06-30 10:00:28 +02:00
Florian Roth 2c3f98dc83 Merge pull request #868 from HarishHary/pwsh_xor_commandline
New Rule: PowerShell xor commandline
2020-06-30 10:00:07 +02:00
Harish SEGAR 9c74018e12 Added new rule for pwsh_xor_cmd (sysmon) 2020-06-29 22:18:25 +02:00
Harish SEGAR 5e740fd7b2 Added new rule for pwsh_xor_cmd (sysmon) 2020-06-29 22:13:49 +02:00
Harish SEGAR 649e4eaa63 Added new rule for pwsh_xor_cmd 2020-06-29 22:09:58 +02:00
Florian Roth 5a11ef90d0 rule reorganized 2020-06-29 21:24:47 +02:00
Harish SEGAR 1a088425f9 Fix rules. 2020-06-29 20:42:35 +02:00
Ömer Günal 0c3ce445da Delete remote_copy.yml 2020-06-29 18:51:18 +03:00
Florian Roth bb214f5832 rule: Explorer Root Flag Process Tree Break 2020-06-29 12:07:15 +02:00
j91321 24029d998a FIX: lint error for title 2020-06-28 11:05:19 +02:00
j91321 ae842a65cb Windows Defender rules and logsource 2020-06-28 10:55:32 +02:00
Christian Clauss 9dc3940c07 Fix undefined names in sigma2misp.py
create_new_event() -> create_new_event(args, misp) to fix:

flake8 testing of https://github.com/Neo23x0/sigma on Python 3.8.3

% _flake8 . --count --select=E9,F63,F7,F82 --show-source --statistics_
```
./tools/sigma/sigma2misp.py:11:16: F821 undefined name 'misp'
    if hasattr(misp, "new_event"):
               ^
./tools/sigma/sigma2misp.py:12:16: F821 undefined name 'misp'
        return misp.new_event(info=args.info)["Event"]["id"]
               ^
./tools/sigma/sigma2misp.py:12:36: F821 undefined name 'args'
        return misp.new_event(info=args.info)["Event"]["id"]
                                   ^
./tools/sigma/sigma2misp.py:14:13: F821 undefined name 'misp'
    event = misp.MISPEvent()
            ^
./tools/sigma/sigma2misp.py:15:18: F821 undefined name 'args'
    event.info = args.info
                 ^
./tools/sigma/sigma2misp.py:16:12: F821 undefined name 'misp'
    return misp.add_event(event)["Event"]["id"]
           ^
6     F821 undefined name 'misp'
6
```
2020-06-28 07:02:41 +02:00
Thomas Patzke 0ee47e118c Merge branch 'pr-848' 2020-06-28 01:04:30 +02:00
Thomas Patzke 89ed9f3763 Merge pull request #819 from cclauss/patch-2
Undefined name: from .exceptions import SigmaCollectionParseError
2020-06-28 00:37:09 +02:00
Thomas Patzke 4309082d6b Merge pull request #818 from cclauss/patch-1
Undefined name: parser_print_help() --> parser.print_help()
2020-06-28 00:34:27 +02:00
Thomas Patzke 09378b5ebf Fixed unsupported attempt to index a set 2020-06-28 00:27:33 +02:00
Thomas Patzke 415f826ece Merge branch 'default-pop' of https://github.com/rtkbkish/sigma into rtkbkish-default-pop 2020-06-28 00:09:39 +02:00
Thomas Patzke b1e4f44c21 Merge pull request #823 from Kuermel/master
Add more Options for XPackWatcherBackend (Elasticsearch)
2020-06-28 00:03:04 +02:00
Thomas Patzke d1f37bdbd4 Merge pull request #828 from stevengoossensB/master
Split rules based on Sysmon event ID
2020-06-28 00:00:32 +02:00
Thomas Patzke de5e453e19 Merge pull request #831 from 404d/cbr-backend-tweaks
Add parentheses around field list groups in CB
2020-06-27 23:39:57 +02:00
Pushkarev Dmitry 502ec4b417 add win_not_allowed_rdp_access.yml rule 2020-06-26 22:15:53 +00:00
Florian Roth 555c94bd7e Merge pull request #861 from jaegeral/patch-4
s/straight forward/straightforward
2020-06-26 15:40:09 +02:00
Alexander J 839e06e37a s/straight forward/straightforward
Fix a typo.
2020-06-26 12:40:06 +02:00
Florian Roth da46ff6e93 docs: descriptions for source configs 2020-06-25 13:59:51 +02:00
Florian Roth 825bda397d desc: better descriptions in help for backends and configurations 2020-06-25 13:21:43 +02:00
Florian Roth 3decee07ba fix: bugfix and cosmetics 2020-06-24 18:10:58 +02:00
Florian Roth 07c0a6558e fix: wording on sysmon mapping file 2020-06-24 17:49:42 +02:00
Florian Roth f3fedef8f5 Changed category names and remove sysmon log source 2020-06-24 17:41:21 +02:00
Florian Roth 4224a6517d Merge pull request #859 from Neo23x0/rule-devel
fix: duplicate IDs
2020-06-24 17:23:13 +02:00
Florian Roth 6d7f991424 Merge pull request #853 from rtkbkish/fix-win_ad_object_writedac_access
Fix quoting for AD Object WriteDAC Access
2020-06-24 17:06:15 +02:00
Florian Roth c3ffa0b9d3 fix: duplicate IDs 2020-06-24 17:04:04 +02:00
Brad Kish d385cbfa69 Fix quoting for AD Object WriteDAC Access
The AccessMask field needs to be quoted so that it is compared correctly.
2020-06-22 15:31:03 -04:00
Ömer Günal 4eb97ec43d Update lnx_file_copy.yml 2020-06-22 21:35:50 +03:00
Florian Roth e2a16087c9 Merge pull request #851 from ozirus/master
Update for new method
2020-06-22 20:11:39 +02:00
Furkan ÇALIŞKAN b091e3b1c4 Update for new method
Update for method mentioned in https://ired.team/offensive-security/code-execution/code-execution-through-control-panel-add-ins
2020-06-22 01:06:34 +03:00
Ömer Günal d17e0ae6eb typo 2020-06-20 23:04:52 +03:00
Florian Roth 1ef81a36af Merge pull request #850 from Neo23x0/rule-devel
K3chang and IE Registry Mods
2020-06-19 11:25:43 +02:00
Florian Roth 912ad94771 fix: missing ATT&CK id in tests 2020-06-19 10:00:44 +02:00
Florian Roth e1225784f7 fix: fixed indentation 2020-06-19 09:54:08 +02:00
Florian Roth 62632db818 refactor: added variant to IE rule 2020-06-19 09:53:35 +02:00
Florian Roth 5cb6f5da9d fix: title adjusted 2020-06-19 09:39:11 +02:00
Florian Roth b8a5cd4787 Disabled IE Security Features 2020-06-19 09:37:10 +02:00
Florian Roth da060bfb90 Ke3chang rule 2020-06-19 09:36:54 +02:00
Florian Roth b675c4c706 Merge branch 'master' into rule-devel 2020-06-19 09:24:26 +02:00
Ömer Günal 93719d8a01 Merge pull request #1 from omergunal/omergunal-patch-1
Remote file copy
2020-06-18 23:56:29 +03:00
Ömer Günal 40a07a2d4f Delete lnx_sudo_enumeration.yml 2020-06-18 23:55:24 +03:00
Ömer Günal d87b0c95a4 Delete lnx_trap.yml 2020-06-18 23:55:16 +03:00
Ömer Günal 8db7c3207a Delete lnx_sudo_caching.yml 2020-06-18 23:54:43 +03:00
Ömer Günal 5bc72b6cba Delete lnx_space_after_filename.yml 2020-06-18 23:54:28 +03:00
Ömer Günal f10440b9fa Delete lnx_setuid_setgid.yml 2020-06-18 23:54:20 +03:00
Ömer Günal 6c8d104e7d Delete lnx_disabling_security_tools.yml 2020-06-18 23:54:06 +03:00
Ömer Günal 84c4683607 Delete lnx_connection_proxy.yml 2020-06-18 23:53:43 +03:00
Ömer Günal c4a1e853bc Remote file copy 2020-06-18 23:47:53 +03:00
Ömer Günal c6c455a3ec Remote file copy 2020-06-18 23:37:49 +03:00
Brad Kish 203aa192c7 Fix multiple references to default field mapping in same rule
If there is a default mapping specified for a fieldmapping and that field is
referenced multiple times in the rule, the default mapping will be "pop"ped
and return the unmapped key on subsequent uses.

Don't pop the value. Just return the first entry.
2020-06-18 13:01:31 -04:00
Florian Roth 4b0c80885f Merge pull request #810 from EccoTheFlintstone/fp
add WMI module load false positives
2020-06-18 12:50:40 +02:00
Florian Roth 32ecb81630 Merge pull request #845 from ikiril01/att&ck_subtechniques_v2
ATT&CK subtechniques v2
2020-06-18 09:10:09 +02:00
Ivan Kirillov 69760f6446 Added subtechniques to MITRE_TECHNIQUES 2020-06-17 11:51:48 -06:00
Ivan Kirillov b343df2225 Further subtechnique updates 2020-06-17 11:31:40 -06:00
Ömer Günal 3a607abe33 Update lnx_trap.yml 2020-06-17 19:51:53 +03:00
ecco 99bfa14ae0 add 1 more FP 2020-06-17 12:49:27 -04:00
Ömer Günal 7b86f4aefb Update lnx_trap.yml 2020-06-17 19:47:31 +03:00
Ömer Günal ebbd32d2e1 file extension 2020-06-17 19:43:57 +03:00
Ömer Günal f989f7e155 file extension 2020-06-17 19:43:49 +03:00
Ömer Günal 772c03c49a Connection Proxy 2020-06-17 19:39:55 +03:00
Ömer Günal 9d285ecf74 Trap 2020-06-17 19:39:00 +03:00
Ömer Günal d0b66ab828 Space After Filename 2020-06-17 19:38:38 +03:00
Ömer Günal 3b8fb9e3d8 Disabling Security Tools 2020-06-17 19:38:10 +03:00
Florian Roth 0022705373 fix: filter not functional
since `UsrLogon.cmd` does appear only in `C:\Windows\system32\cmd.exe /c UsrLogon.cmd` command line
2020-06-17 16:09:44 +02:00
Ivan Kirillov 5c0bb0e94f Fixed indentation 2020-06-16 15:01:13 -06:00
Ivan Kirillov 0fbfcc6ba9 Initial round of subtechnique updates 2020-06-16 14:46:08 -06:00
Florian Roth fd2429bd34 Update lnx_setuid_setgid.yml 2020-06-16 19:46:50 +02:00
Florian Roth 06fe720165 Update lnx_sudo_enumeration.yml 2020-06-16 19:33:39 +02:00
Florian Roth 545c05d4d3 Update lnx_setuid_setgid.yml 2020-06-16 19:31:34 +02:00
Ömer Günal 0027415fa2 Update lnx_setuid_setgid.yml 2020-06-16 20:26:50 +03:00
Ömer Günal 41b2309418 file type changed 2020-06-16 20:24:09 +03:00
Ömer Günal 0d0058da43 added id 2020-06-16 20:21:07 +03:00
Ömer Günal bbcd506fb1 added id 2020-06-16 20:21:02 +03:00
Ömer Günal ace575aaa6 added id 2020-06-16 20:20:42 +03:00
Ömer Günal 4b1557a587 Setuid and Setgid
Detects suspicious change of file privileges with chown and chmod commands
2020-06-16 20:12:24 +03:00
Ömer Günal b7e1c6750c sudo caching
attack.t1206
2020-06-16 19:31:02 +03:00
Ömer Günal e43f13ed67 Update lnx_sudo_enumeration.yml
attack.t1169
2020-06-16 19:20:42 +03:00
Ömer Günal 52487159c5 Detect Sudo enumeration commands 2020-06-16 19:17:00 +03:00
Florian Roth d24ec665fd Merge pull request #838 from rtkbkish/fix-identifier
Identifiers shared between global document and rule gets overwritten
2020-06-15 20:20:23 +02:00
Florian Roth 87053502a3 Merge pull request #839 from rtkbkish/fix-double-backslash
Fix match for double-backslash
2020-06-15 20:19:56 +02:00
Florian Roth 869162a5da Merge pull request #840 from rtkbkish/remove-wrong-sysmon-id
Rule lists extra Sysmon ID (11). Should just match registry events (1…
2020-06-15 20:19:27 +02:00
Florian Roth 3482e048fb Merge pull request #841 from rtkbkish/fix-rule-match
Rule needs endwith, not exact match.
2020-06-15 20:19:12 +02:00
Florian Roth 46bd56a708 Merge pull request #837 from rtkbkish/fix-win-invoke-obfuscation
Fix logsource field name from service->category
2020-06-15 20:18:53 +02:00
Florian Roth 3d962bdb47 Merge pull request #836 from rtkbkish/fix-escaping
Fix rules with incorrect escaping of wildcars
2020-06-15 20:18:34 +02:00
Brad Kish dfae2a6df6 Rule needs endwith, not exact match.
Fix ImageLoaded filter to match with endswith, rather than exact match.
2020-06-15 13:54:02 -04:00
Brad Kish a9c6fa904f Rule lists extra Sysmon ID (11). Should just match registry events (12-14)
Remove extraneous event ID 11. It will never match.
2020-06-15 13:52:12 -04:00
Brad Kish f196046b3d Fix match for double-backslash
To match a double-backslash you actually need three backslashes, since two
backslashes gets reduced to one.
2020-06-15 13:39:50 -04:00
Brad Kish 422b2bffd7 Fix rules with incorrect escaping of wildcars
A backslash before a wildcard needs to be escaped with another backslash.
2020-06-15 13:38:18 -04:00
Brad Kish 8d58c8f5c8 Fix logsource field name from service->category
The rule win_invoke_obfuscation_obfuscated_iex_commandline has the
wrong field name for the "process_creation" tag. Rename from "service"
to "category"
2020-06-15 13:18:05 -04:00
Brad Kish f5aa871e5d Identifiers shared between global document and rule gets overwritten
The global document defines a "selection" identifier which is also defined the
individual rules. The rule identifier is getting overwritten by the global identifier.
Fix by giving unique names to the global identifier.
2020-06-15 13:14:31 -04:00
Florian Roth d371fd864c Merge pull request #834 from ebeahan/elastic-updates
Elastic section updates
2020-06-13 10:04:49 +02:00
Eric Beahan bba0b2d851 Elastic documentation improvements 2020-06-12 13:40:39 -05:00
Simen Lybekk bbcbed4742 Add parentheses about field list groups in CB
This should address the grouping issue from #660.
The grouping issue was solved by just slamming some parentheses around the fields in the listExpression field.
2020-06-11 15:33:02 +02:00
Florian Roth a7136481f1 Update win_pcap_drivers.yml 2020-06-11 11:14:43 +02:00
Cian Heasley 9835c6d67d add win_pcap_drivers.yml 2020-06-10 15:53:22 +01:00
Steven Goossens e5f36dd146 Added rules files split into folders 2020-06-10 16:32:30 +02:00
Steven Goossens 423baafa2a Added rules for different sysmon categories and added the category definition 2020-06-10 15:02:15 +02:00
Thomas G 8c61dc9248 Add more Options for XPackWatcherBackend (Elasticsearch)
Add action_throttle_period, mail_from adn mail_profile to the XPackWatcherBackend (Elasticsearch)
2020-06-09 20:57:26 +02:00
Christian Clauss dff7efc173 Update collection.py 2020-06-08 13:55:52 +02:00
Christian Clauss 55c0a03564 Undefined name: from .exceptions import SigmaCollectionParseError
Discovered in #378.  `SigmaCollectionParseError()` is called on line 55 but it is never defined or imported which means that NameError will be raised instead of SigmaCollectionParseError.
2020-06-08 13:55:16 +02:00
Christian Clauss 3fdb355f2b Undefined name: parser_print_help() --> parser.print_help()
Discovered in #378 
https://docs.python.org/3.8/library/argparse.html#argparse.ArgumentParser.print_help
2020-06-08 13:49:44 +02:00
Florian Roth 6e349030d9 rule: suspicious camera and mic access 2020-06-08 10:18:44 +02:00
ecco b1c11cc345 add WMI module load false positive 2020-06-01 03:30:27 -04:00
4A616D6573 879ad6f206 Update win_susp_ntlm_rdp.yml 2020-05-22 13:32:02 +10:00
4A616D6573 daa3c5e053 Update win_susp_ntlm_rdp.yml 2020-05-22 13:28:56 +10:00
4A616D6573 0f8f5fb29c Create win_susp_ntlm_rdp.yml 2020-05-22 13:24:27 +10:00
~noyan 2b72ee7b84 partial(?) fix of #762 2020-05-16 14:51:58 +03:00
Rettila 6ec74364f2 Create win_global_catalog_enumeration.yml 2020-05-11 17:40:47 +02:00
Rettila ccacedf621 Merge pull request #3 from Neo23x0/master
merge
2020-05-11 17:38:27 +02:00
Florian Roth 24c0765694 Merge branch 'master' into devel 2020-05-08 12:17:14 +02:00
Florian Roth 7cc1b300d2 rule: maze ransomware patterns 2020-05-08 11:42:06 +02:00
Rettila 07a50edf89 Update win_metasploit_authentication.yml 2020-05-07 14:42:00 +02:00
Rettila 6aed82a039 Update win_metasploit_authentication.yml 2020-05-06 17:04:47 +02:00
Rettila 2beb65076c Update win_metasploit_authentication.yml 2020-05-06 16:44:19 +02:00
Rettila 7371ce234b Create win_metasploit_authentication.yml 2020-05-06 16:42:27 +02:00
Rettila ddb02c6820 Merge pull request #1 from Neo23x0/master 2020-05-06 11:24:26 +02:00
Florian Roth e67dddcc35 rule: PwnDrp access 2020-04-17 08:55:54 +02:00
alm8i 7ac685882c comments for usage 2020-04-11 15:47:23 +02:00
Danijel Grah 6312f381bf C# backend
Converts Sigma rule into C# Regex in LINQ query
2020-04-10 16:12:05 +02:00
Harish SEGAR ba3994f319 Fix of '1 of x' condition 2020-03-21 12:19:01 +01:00
Harish SEGAR 81b277ba1a suspicious powershell parent process... 2020-03-21 00:26:30 +01:00
4A616D6573 c8e5fc4e6d Revert "Create win_susp_local_anon_logon_created.yml"
This reverts commit d174e172b0.
2019-10-31 21:49:57 +11:00
4A616D6573 d174e172b0 Create win_susp_local_anon_logon_created.yml 2019-10-31 21:44:47 +11:00
4A616D6573 fdbdca003b Create win_powershell_web_request.yml
Broader rule for detecting web requests via various methods using Windows PowerShell, slightly crosses over the below rules but caters for different methods:

https://github.com/Neo23x0/sigma/blob/99b15edf8add183543ca5738ec93f87416c34bd9/rules/windows/process_creation/win_powershell_download.yml
https://github.com/Neo23x0/sigma/blob/0fa914139ca85966b49f0a8eda40a3f26608e86b/rules/windows/powershell/powershell_suspicious_download.yml
2019-10-24 11:57:37 +11:00
434 changed files with 8774 additions and 5746 deletions
+31
View File
@@ -6,6 +6,37 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/),
and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html)
from version 0.14.0.
## 0.18.1 - 2020-08-25
Release created for technical reasons (issues with extended README and PyPI), no real changes done.
## 0.18.0 - 2020-08-25
### Added
* C# backend
* STIX backend
* Options to xpack-watcher backend (action_throttle_period, mail_from acaw, mail_profile and other)
* More generic log sources
* Windows Defender log sources
* Generic DNS query log source
* AppLocker log source
### Changed
* Improved backend and configuration descriptions
* Microsoft Defender ATP mapping updated
* Improved handling of wildcards in Elastic backends
### Fixed
* Powershell backend: key name was incorrectly added into regular expression
* Grouping issue in Carbon Black backend
* Handling of default field mapping in case field is referenced multiple from a rule
* Code cleanup and various fixes
* Log source mappings in configurations
* Handling of conditional field mappings by Elastic backends
## 0.17.0 - 2020-06-12
### Added
+2
View File
@@ -52,6 +52,7 @@ test-sigmac:
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t arcsight -c tools/config/arcsight.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t arcsight-esm -c tools/config/arcsight.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qradar -c tools/config/qradar.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t stix -c tools/config/stix.yml -c tools/config/stix-qradar.yml -c tools/config/stix-windows.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t limacharlie -c tools/config/limacharlie.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t carbonblack -c tools/config/carbon-black.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t qualys -c tools/config/qualys.yml rules/ > /dev/null
@@ -61,6 +62,7 @@ test-sigmac:
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t crowdstrike -O rulecomment -c tools/config/crowdstrike.yml rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t sql -c sysmon rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t sqlite -c sysmon rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t csharp -c sysmon rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t logiq -c sysmon rules/ > /dev/null
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level>=high,level<=critical,status=stable,logsource=windows,tag=attack.execution' rules/ > /dev/null
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -rvdI -t splunk -c tools/config/splunk-windows-index.yml -f 'level>=high,level<=critical,status=xstable,logsource=windows' rules/ > /dev/null
+8 -1
View File
@@ -8,7 +8,7 @@ Generic Signature Format for SIEM Systems
# What is Sigma
Sigma is a generic and open signature format that allows you to describe relevant log events in a straight forward manner. The rule format is very flexible, easy to write and applicable to any type of log file. The main purpose of this project is to provide a structured form in which researchers or analysts can describe their once developed detection methods and make them shareable with others.
Sigma is a generic and open signature format that allows you to describe relevant log events in a straightforward manner. The rule format is very flexible, easy to write and applicable to any type of log file. The main purpose of this project is to provide a structured form in which researchers or analysts can describe their once developed detection methods and make them shareable with others.
Sigma is for log files what [Snort](https://www.snort.org/) is for network traffic and [YARA](https://github.com/VirusTotal/yara) is for files.
@@ -71,6 +71,12 @@ Florian wrote a short [rule creation tutorial](https://www.nextron-systems.com/2
5. Convert a whole rule directory with `python sigmac -t splunk -r ../rules/proxy/`
6. Check the `./tools/config` folder and the [wiki](https://github.com/Neo23x0/sigma/wiki/Converter-Tool-Sigmac) if you need custom field or log source mappings in your environment
## Troubles / Troubleshooting / Help
If you need help for a specific supported backend you can use e.g. `sigmac --backend-help elastalert-dsl`. More details on the usage of `sigmac` can be found in the dedicated [README.md](https://github.com/Neo23x0/sigma/blob/master/tools/README.md).
Be sure to checkout the [guidance on backend specific settings](https://github.com/Neo23x0/sigma/blob/master/tools/README.md#choosing-the-right-sigmac) for `sigmac`.
# Examples
Windows 'Security' Eventlog: Access to LSASS Process with Certain Access Mask / Object Type (experimental)
@@ -202,6 +208,7 @@ tools/sigmac -t splunk -c ~/my-splunk-mapping.yml -c tools/config/generic/window
* [Grep](https://www.gnu.org/software/grep/manual/grep.html) with Perl-compatible regular expression support
* [LimaCharlie](https://limacharlie.io)
* [ee-outliers](https://github.com/NVISO-BE/ee-outliers)
* [Structured Threat Information Expression (STIX)](https://oasis-open.github.io/cti-documentation/stix/intro.html)
Current work-in-progress
* [Splunk Data Models](https://docs.splunk.com/Documentation/Splunk/7.1.0/Knowledge/Aboutdatamodels)
+1 -1
View File
@@ -124,7 +124,7 @@ def get_rule_as_sumologic(file):
return "".join(output)
if args.help:
parser_print_help()
parser.print_help()
if args.conf:
with open(args.conf, 'r') as ymlfile:
+13 -11
View File
@@ -5,20 +5,22 @@ author: vitaliy0x1
date: 2020/01/21
description: Detects disabling, deleting and updating of a Trail
references:
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/best-practices-security.html
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/best-practices-security.html
logsource:
service: cloudtrail
service: cloudtrail
detection:
selection_source:
- eventSource: cloudtrail.amazonaws.com
events:
- eventName:
- StopLogging
- UpdateTrail
- DeleteTrail
condition: selection_source AND events
selection_source:
- eventSource: cloudtrail.amazonaws.com
events:
- eventName:
- StopLogging
- UpdateTrail
- DeleteTrail
condition: selection_source AND events
level: medium
falsepositives:
- Valid change in a Trail
tags:
- attack.t1089
- attack.defense_evasion
- attack.t1089
- attack.t1562.001
+11 -9
View File
@@ -5,17 +5,19 @@ author: vitaliy0x1
date: 2020/01/21
description: Detects AWS Config Service disabling
logsource:
service: cloudtrail
service: cloudtrail
detection:
selection_source:
- eventSource: config.amazonaws.com
events:
- eventName:
- DeleteDeliveryChannel
- StopConfigurationRecorder
condition: selection_source AND events
selection_source:
- eventSource: config.amazonaws.com
events:
- eventName:
- DeleteDeliveryChannel
- StopConfigurationRecorder
condition: selection_source AND events
level: high
falsepositives:
- Valid change in AWS Config Service
tags:
- attack.t1089
- attack.defense_evasion
- attack.t1089
- attack.t1562.001
@@ -21,3 +21,4 @@ falsepositives:
- Valid changes to the startup script
tags:
- attack.t1064
- attack.t1059
+2
View File
@@ -18,4 +18,6 @@ level: high
falsepositives:
- Valid change in the GuardDuty (e.g. to ignore internal scanners)
tags:
- attack.defense_evasion
- attack.t1089
- attack.t1562.001
-2
View File
@@ -30,8 +30,6 @@ tags:
- NIST CSF 1.1 PR.AC-7
- NIST CSF 1.1 PR.DS-1
- NIST CSF 1.1 PR.DS-2
- NIST CSF 1.1 PR.PT-3
- NIST CSF 1.1 PR.PT-3
- ISO 27002-2013 A.9.2.1
- ISO 27002-2013 A.9.2.2
- ISO 27002-2013 A.9.2.3
@@ -9,6 +9,7 @@ tags:
- attack.s0003
- attack.t1156
- attack.persistence
- attack.t1546.004
author: Peter Matkovski
logsource:
product: linux
@@ -11,6 +11,7 @@ references:
tags:
- attack.defense_evasion
- attack.t1054
- attack.t1562.006
author: Mikhail Larin, oscd.community
status: experimental
date: 2019/10/25
@@ -6,11 +6,11 @@ author: E.M. Anhaus (orignally from Atomic Blue Detections, Tony Lambert), oscd.
date: 2019/10/24
modified: 2019/11/11
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1055/T1055.yaml
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1574.006/T1574.006.yaml
- https://eqllib.readthedocs.io/en/latest/analytics/fd9b987a-1101-4ed3-bda6-a70300eaf57e.html
tags:
- attack.defense_evasion
- attack.t1055
- attack.t1574.006
logsource:
product: linux
service: auditd
@@ -10,6 +10,7 @@ references:
tags:
- attack.defense_evasion
- attack.t1054
- attack.t1562.006
author: Mikhail Larin, oscd.community
status: experimental
date: 2019/10/25
@@ -6,7 +6,10 @@ description: Masquerading occurs when the name or location of an executable, leg
author: Timur Zinniatullin, oscd.community
date: 2019/10/21
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1036/T1036.yaml
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1036.003/T1036.003.yaml
tags:
- attack.defense_evasion
- attack.t1036.003
logsource:
product: linux
service: auditd
@@ -19,6 +22,3 @@ detection:
a3: '*/crond'
condition: selection
level: medium
tags:
- attack.defense_evasion
- attack.t1036
@@ -4,6 +4,9 @@ status: experimental
description: Detects relevant commands often related to malware or hacking activity
references:
- Internal Research - mostly derived from exploit code including code in MSF
tags:
- attack.execution
- attack.t1059.004
date: 2017/12/12
author: Florian Roth
logsource:
+1 -1
View File
@@ -4,7 +4,7 @@ status: experimental
description: Detects posible command execution by web application/web shell
tags:
- attack.persistence
- attack.t1100
- attack.t1505.003
references:
- personal experience
author: Ilyas Ochkov, Beyu Denis, oscd.community
+5 -6
View File
@@ -1,13 +1,15 @@
title: Data Compressed
id: a3b5e3e9-1b49-4119-8b8e-0344a01f21ee
status: experimental
description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount
of data sent over the network
description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network
author: Timur Zinniatullin, oscd.community
date: 2019/10/21
modified: 2019/11/04
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1002/T1002.yaml
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560.001/T1560.001.yaml
tags:
- attack.exfiltration
- attack.t1560.001
logsource:
product: linux
service: auditd
@@ -27,6 +29,3 @@ detection:
falsepositives:
- Legitimate use of archiving tools by legitimate user
level: low
tags:
- attack.exfiltration
- attack.t1002
+1 -1
View File
@@ -6,7 +6,7 @@ references:
tags:
- attack.execution
- attack.g0020
- attack.t1059
- attack.t1059.004
author: Florian Roth
date: 2017/04/09
logsource:
+2 -2
View File
@@ -4,7 +4,7 @@ description: Detects removing immutable file attribute
status: experimental
tags:
- attack.defense_evasion
- attack.t1222
- attack.t1222.002
author: Jakob Weinzettl, oscd.community
date: 2019/09/23
logsource:
@@ -20,4 +20,4 @@ falsepositives:
- Administrator interacting with immutable files (for instance backups)
level: medium
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1222/T1222.yaml
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1222.002/T1222.002.yaml
+27
View File
@@ -0,0 +1,27 @@
title: Remote File Copy
id: 7a14080d-a048-4de8-ae58-604ce58a795b
description: Detects the use of tools that copy files from or to remote systems
references:
- https://attack.mitre.org/techniques/T1105/
author: Ömer Günal
date: 2020/06/18
tags:
- attack.command_and_control
- attack.lateral_movement
- attack.t1105
level: low
logsource:
product: linux
detection:
keywords:
- Scp|contains:
- 'scp * *@*:*'
- 'scp *@*:* *'
- Rsync|contains:
- 'rsync -r *@*:* *'
- 'rsync -r * *@*:*'
- Sftp|contains:
- 'sftp *@*:* *'
condition: keywords
falsepositives:
- Legitimate administration activities
@@ -1,10 +1,10 @@
title: File or Folder Permissions Change
description: Detects
description: Detects
id: 74c01ace-0152-4094-8ae2-6fd776dd43e5
status: experimental
tags:
- attack.defense_evasion
- attack.t1222
- attack.t1222.002
author: Jakob Weinzettl, oscd.community
date: 2019/09/23
logsource:
@@ -21,4 +21,4 @@ falsepositives:
- User interracting with files permissions (normal/daily behaviour)
level: low
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1222/T1222.yaml
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1222.002/T1222.002.yaml
+3 -3
View File
@@ -4,7 +4,7 @@ description: Detects a reload or a start of a service
status: experimental
tags:
- attack.persistence
- attack.t1501
- attack.t1543.002
author: Jakob Weinzettl, oscd.community
date: 2019/09/23
logsource:
@@ -23,5 +23,5 @@ falsepositives:
- Legitimate reconfiguration of service
level: low
references:
- https://attack.mitre.org/techniques/T1501/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1501/T1501.yaml
- https://attack.mitre.org/techniques/T1543/002/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1543.002/T1543.002.yaml
+7 -7
View File
@@ -7,22 +7,22 @@ description: Clear command history in linux which is used for defense evasion.
# It monitors the size of .bash_history and log the words "empty_bash_history" whenever a previously not empty bash_history becomes empty
# We define an empty file as a document with 0 or 1 lines (it can be a line with only one space character for example)
# It has two advantages over the version suggested by Patrick Bareiss :
# - it is not relative to the exact command used to clear .bash_history : for instance Caldera uses "> .bash_history" to clear the history and this is not one the commands listed here. We can't be exhaustive for all the possibilities !
# - the method suggested by Patrick Bareiss logs all the commands entered directly in a bash shell. therefore it may miss some events (for instance it doesn't log the commands launched from a Caldera agent). Here if .bash_history is cleared, it will always be detected
# - it is not relative to the exact command used to clear .bash_history : for instance Caldera uses "> .bash_history" to clear the history and this is not one the commands listed here. We can't be exhaustive for all the possibilities !
# - the method suggested by Patrick Bareiss logs all the commands entered directly in a bash shell. therefore it may miss some events (for instance it doesn't log the commands launched from a Caldera agent). Here if .bash_history is cleared, it will always be detected
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1146/T1146.yaml
- https://attack.mitre.org/techniques/T1146/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1070.003/T1070.003.yaml
- https://attack.mitre.org/techniques/T1070/003/
- https://www.hackers-arise.com/single-post/2016/06/20/Covering-your-BASH-Shell-Tracks-AntiForensics
author: Patrick Bareiss
date: 2019/03/24
modified: 2020/05/28
modified: 2020/07/13
logsource:
product: linux
detection:
keywords:
- 'rm *bash_history'
- 'echo "" > *bash_history'
- 'cat /dev/null > *bash_history'
- 'cat /dev/null > *bash_history'
- 'ln -sf /dev/null *bash_history'
- 'truncate -s0 *bash_history'
# - 'unset HISTFILE' # prone to false positives
@@ -37,4 +37,4 @@ falsepositives:
level: high
tags:
- attack.defense_evasion
- attack.t1146
- attack.t1070.003
+2 -2
View File
@@ -8,8 +8,8 @@ references:
author: Patrick Bareiss
date: 2019/04/05
tags:
- attack.privilege_escalation
- attack.t1068
- attack.execution
- attack.t1059.004
level: medium
logsource:
product: linux
+5 -2
View File
@@ -6,6 +6,9 @@ references:
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/struts_code_exec_exception_delegator.rb#L121
- http://pastebin.com/FtygZ1cg
- https://artkond.com/2017/03/23/pivoting-guide/
tags:
- attack.execution
- attack.t1059.004
author: Florian Roth
date: 2017/08/21
modified: 2019/02/05
@@ -24,11 +27,11 @@ detection:
- 'socat -O /tmp/*'
- 'socat tcp-connect*'
- '*echo binary >>*'
# Malware
# Malware
- '*wget *; chmod +x*'
- '*wget *; chmod 777 *'
- '*cd /tmp || cd /var/run || cd /mnt*'
# Apache Struts in-the-wild exploit codes
# Apache Struts in-the-wild exploit codes
- '*stop;service iptables stop;*'
- '*stop;SuSEfirewall2 stop;*'
- 'chmod 777 2020*'
@@ -4,6 +4,9 @@ status: experimental
description: Detects suspicious shell commands or program code that may be exected or used in command line to establish a reverse shell
references:
- https://alamot.github.io/reverse_shells/
tags:
- attack.execution
- attack.t1059.004
author: Florian Roth
date: 2019/04/02
logsource:
+19
View File
@@ -0,0 +1,19 @@
title: Guacamole Two Users Sharing Session Anomaly
status: experimental
id: 1edd77db-0669-4fef-9598-165bda82826d
description: Detects suspicious session with two users present
references:
- https://research.checkpoint.com/2020/apache-guacamole-rce/
author: Florian Roth
date: 2020/07/03
logsource:
product: linux
service: guacamole
detection:
selection:
- '(2 users now present)'
condition: selection
falsepositives:
- Unknown
level: high
+4 -1
View File
@@ -3,12 +3,15 @@ id: 8ec2c8b4-557a-4121-b87c-5dfb3a602fae
description: Detects suspicious command sequence that JexBoss
references:
- https://www.us-cert.gov/ncas/analysis-reports/AR18-312A
tags:
- attack.execution
- attack.t1059.004
author: Florian Roth
date: 2017/08/24
logsource:
product: linux
detection:
selection1:
selection1:
- 'bash -c /bin/bash'
selection2:
- '&/dev/tcp/'
@@ -11,6 +11,7 @@ tags:
- attack.defense_evasion
- attack.t1146
- attack.t1070
- attack.t1070.003
logsource:
product: cisco
service: aaa
@@ -17,6 +17,7 @@ tags:
- attack.t1003
- attack.t1081
- attack.t1005
- attack.t1552.001
logsource:
product: cisco
service: aaa
@@ -12,6 +12,8 @@ tags:
- attack.defense_evasion
- attack.t1130
- attack.t1145
- attack.t1553.004
- attack.t1552.004
logsource:
product: cisco
service: aaa
@@ -9,6 +9,7 @@ date: 2019/08/11
tags:
- attack.defense_evasion
- attack.t1089
- attack.t1562.001
logsource:
product: cisco
service: aaa
@@ -14,6 +14,9 @@ tags:
- attack.t1107
- attack.t1488
- attack.t1487
- attack.t1561.002
- attack.t1070.004
- attack.t1561.001
logsource:
product: cisco
service: aaa
@@ -12,6 +12,7 @@ tags:
- attack.credential_access
- attack.t1139
- attack.t1056
- attack.t1552.003
logsource:
product: cisco
service: aaa
@@ -16,6 +16,9 @@ tags:
- attack.t1100
- attack.t1168
- attack.t1490
- attack.t1565.002
- attack.t1505
- attack.t1053
logsource:
product: cisco
service: aaa
@@ -19,6 +19,8 @@ tags:
- attack.t1105
- attack.t1492
- attack.t1002
- attack.t1560
- attack.t1565.001
logsource:
product: cisco
service: aaa
@@ -7,17 +7,18 @@ references:
- https://github.com/samratashok/nishang/blob/master/Backdoors/DNS_TXT_Pwnage.ps1
tags:
- attack.t1071
- attack.t1071.004
author: Markus Neis
date: 2018/08/08
logsource:
category: dns
detection:
selection:
record_type: 'TXT'
answer:
- '*IEX*'
- '*Invoke-Expression*'
- '*cmd.exe*'
record_type: 'TXT'
answer:
- '*IEX*'
- '*Invoke-Expression*'
- '*cmd.exe*'
condition: selection
falsepositives:
- Unknown
@@ -6,46 +6,48 @@ date: 2020/03/19
references:
- https://github.com/mitre-attack/bzar#indicators-for-attck-execution
tags:
- attack.execution
- attack.t1035
- attack.t1047
- attack.t1053
- attack.execution
- attack.t1035
- attack.t1047
- attack.t1053
- attack.t1053.002
- attack.t1569.002
logsource:
product: zeek
service: dce_rpc
product: zeek
service: dce_rpc
detection:
op1:
endpoint: 'JobAdd'
operation: 'atsvc'
op2:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcEnableTask'
op3:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRegisterTask'
op4:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRun'
op5:
endpoint: 'IWbemServices'
operation: 'ExecMethod'
op6:
endpoint: 'IWbemServices'
operation: 'ExecMethodAsync'
op7:
endpoint: 'svcctl'
operation: 'CreateServiceA'
op8:
endpoint: 'svcctl'
operation: 'CreateServiceW'
op9:
endpoint: 'svcctl'
operation: 'StartServiceA'
op10:
endpoint: 'svcctl'
operation: 'StartServiceW'
condition: 1 of them
op1:
endpoint: 'JobAdd'
operation: 'atsvc'
op2:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcEnableTask'
op3:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRegisterTask'
op4:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRun'
op5:
endpoint: 'IWbemServices'
operation: 'ExecMethod'
op6:
endpoint: 'IWbemServices'
operation: 'ExecMethodAsync'
op7:
endpoint: 'svcctl'
operation: 'CreateServiceA'
op8:
endpoint: 'svcctl'
operation: 'CreateServiceW'
op9:
endpoint: 'svcctl'
operation: 'StartServiceA'
op10:
endpoint: 'svcctl'
operation: 'StartServiceW'
condition: 1 of them
falsepositives:
- 'Windows administrator tasks or troubleshooting'
- 'Windows management scripts or software'
level: medium
level: medium
@@ -8,30 +8,31 @@ references:
tags:
- attack.persistence
- attack.t1004
- attack.t1547.004
logsource:
product: zeek
service: dce_rpc
product: zeek
service: dce_rpc
detection:
op1:
endpoint: 'spoolss'
operation: 'RpcAddMonitor'
op2:
endpoint: 'spoolss'
operation: 'RpcAddPrintProcessor'
op3:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddMonitor'
op4:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddPrintProcessor'
op5:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonW'
op6:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonExW'
condition: 1 of them
op1:
endpoint: 'spoolss'
operation: 'RpcAddMonitor'
op2:
endpoint: 'spoolss'
operation: 'RpcAddPrintProcessor'
op3:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddMonitor'
op4:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddPrintProcessor'
op5:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonW'
op6:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonExW'
condition: 1 of them
falsepositives:
- 'Windows administrator tasks or troubleshooting'
- 'Windows management scripts or software'
level: medium
level: medium
@@ -8,9 +8,10 @@ references:
tags:
- attack.command_and_control
- attack.t1043
- attack.t1571
logsource:
product: zeek
service: http
product: zeek
service: http
date: 2020/05/01
detection:
selection_webdav:
@@ -23,4 +24,4 @@ detection:
falsepositives:
- unknown
level: medium
status: experimental
status: experimental
@@ -0,0 +1,45 @@
title: Publicly Accessible RDP Service
id: 1fc0809e-06bf-4de3-ad52-25e5263b7623
status: experimental
description: Detects connections from routable IPs to an RDP listener - which is indicative of a publicly-accessible RDP service.
references:
- https://attack.mitre.org/techniques/T1021/001/
tags:
- attack.t1021
- attack.t1021.001
author: 'Josh Brower @DefensiveDepth'
date: 2020/08/22
logsource:
product: zeek
service: rdp
detection:
selection:
src_ip|startswith:
- '192.168.'
- '10.'
- '172.16.'
- '172.17.'
- '172.18.'
- '172.19.'
- '172.20.'
- '172.21.'
- '172.22.'
- '172.23.'
- '172.24.'
- '172.25.'
- '172.26.'
- '172.27.'
- '172.28.'
- '172.29.'
- '172.30.'
- '172.31.'
#approved_rdp:
#dst_ip:
#- x.x.x.x
condition: not selection #and not approved_rdp
fields:
- src_ip
- dst_ip
falsepositives:
- none
level: high
@@ -1,5 +1,5 @@
title: Remote Task Creation via ATSVC Named Pipe - Zeek
id: f6de6525-4509-495a-8a82-1f8b0ed73a00
id: dde85b37-40cd-4a94-b00c-0b8794f956b5
description: Detects remote task creation via at.exe or API interacting with ATSVC namedpipe
author: 'Samir Bousseaden, @neu5rn'
date: 2020/04/03
@@ -11,6 +11,7 @@ tags:
- attack.t1053
- car.2013-05-004
- car.2015-04-001
- attack.t1053.002
logsource:
product: zeek
service: smb_files
@@ -8,14 +8,17 @@ references:
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.002
- attack.t1003.004
- attack.t1003.003
logsource:
product: zeek
service: smb_files
detection:
selection:
path: '\\*ADMIN$'
name: '*SYSTEM32\\*.tmp'
condition: selection
selection:
path: '\\*ADMIN$'
name: '*SYSTEM32\\*.tmp'
condition: selection
falsepositives:
- 'unknown'
level: high
@@ -1,14 +1,14 @@
title: First Time Seen Remote Named Pipe - Zeek
id: 52d8b0c6-53d6-439a-9e41-52ad442ad9ad
description: This detection excludes known namped pipes accessible remotely and notify on newly observed ones, may help to detect lateral movement and remote exec
using named pipes
id: 021310d9-30a6-480a-84b7-eaa69aeb92bb
description: This detection excludes known namped pipes accessible remotely and notify on newly observed ones, may help to detect lateral movement and remote exec using named pipes
author: 'Samir Bousseaden, @neu5ron'
date: 2020/04/02
references:
- https://github.com/neo23x0/sigma/blob/d42e87edd741dd646db946f30964f331f92f50e6/rules/windows/builtin/win_lm_namedpipe.yml
tags:
tags:
- attack.lateral_movement
- attack.t1077
- attack.t1021.002
logsource:
product: zeek
service: smb_files
@@ -18,23 +18,23 @@ detection:
selection2:
path: \\*\IPC$
name:
- 'atsvc'
- 'samr'
- 'lsarpc'
- 'winreg'
- 'netlogon'
- 'srvsvc'
- 'protected_storage'
- 'wkssvc'
- 'browser'
- 'netdfs'
- 'svcctl'
- 'spoolss'
- 'ntsvcs'
- 'LSM_API_service'
- 'HydraLsPipe'
- 'TermSrv_API_service'
- 'MsFteWds'
- 'atsvc'
- 'samr'
- 'lsarpc'
- 'winreg'
- 'netlogon'
- 'srvsvc'
- 'protected_storage'
- 'wkssvc'
- 'browser'
- 'netdfs'
- 'svcctl'
- 'spoolss'
- 'ntsvcs'
- 'LSM_API_service'
- 'HydraLsPipe'
- 'TermSrv_API_service'
- 'MsFteWds'
condition: selection1 and not selection2
falsepositives:
- update the excluded named pipe to filter out any newly observed legit named pipe
@@ -8,6 +8,7 @@ references:
tags:
- attack.lateral_movement
- attack.t1077
- attack.t1021.002
logsource:
product: zeek
service: smb_files
@@ -15,9 +16,9 @@ detection:
selection1:
path: \\*\IPC$
name:
- '*-stdin'
- '*-stdout'
- '*-stderr'
- '*-stdin'
- '*-stdout'
- '*-stderr'
selection2:
name: \\*\IPC$
path: 'PSEXESVC*'
@@ -3,7 +3,8 @@ id: 286b47ed-f6fe-40b3-b3a8-35129acd43bc
description: Detects known sensitive file extensions via Zeek
author: 'Samir Bousseaden, @neu5ron'
date: 2020/04/02
references: https://github.com/neo23x0/sigma/blob/d42e87edd741dd646db946f30964f331f92f50e6/rules/windows/builtin/win_susp_raccess_sensitive_fext.yml
references:
- https://github.com/neo23x0/sigma/blob/d42e87edd741dd646db946f30964f331f92f50e6/rules/windows/builtin/win_susp_raccess_sensitive_fext.yml
tags:
- attack.collection
logsource:
@@ -4,26 +4,29 @@ description: Transferring files with well-known filenames (sensitive files with
author: '@neu5ron, Teymur Kheirkhabarov, oscd.community'
date: 2020/04/02
references:
- https://github.com/neo23x0/sigma/blob/373424f14574facf9e261d5c822345a282b91479/rules/windows/builtin/win_transferring_files_with_credential_data_via_network_shares.yml
- https://github.com/neo23x0/sigma/blob/373424f14574facf9e261d5c822345a282b91479/rules/windows/builtin/win_transferring_files_with_credential_data_via_network_shares.yml
tags:
- attack.credential_access
- attack.t1003
- attack.credential_access
- attack.t1003
- attack.t1003.002
- attack.t1003.001
- attack.t1003.003
logsource:
product: zeek
service: smb_files
product: zeek
service: smb_files
detection:
selection:
name:
- '\mimidrv'
- '\lsass'
- '\windows\minidump\'
- '\hiberfil'
- '\sqldmpr'
- '\sam'
- '\ntds.dit'
- '\security'
condition: selection
selection:
name:
- '\mimidrv'
- '\lsass'
- '\windows\minidump\'
- '\hiberfil'
- '\sqldmpr'
- '\sam'
- '\ntds.dit'
- '\security'
condition: selection
falsepositives:
- Transferring sensitive files for legitimate administration work by legitimate administrator
level: medium
status: experimental
status: experimental
@@ -8,6 +8,7 @@ references:
tags:
- attack.credential_access
- attack.t1208
- attack.t1558.003
logsource:
product: zeek
service: kerberos
@@ -0,0 +1,25 @@
title: Empire UserAgent URI Combo
id: b923f7d6-ac89-4a50-a71a-89fb846b4aa8
status: experimental
description: Detects user agent and URI paths used by empire agents
references:
- https://github.com/BC-SECURITY/Empire
author: Florian Roth
date: 2020/07/13
logsource:
category: proxy
detection:
selection:
c-useragent: 'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko'
cs-uri-query:
- '/admin/get.php'
- '/news.php'
- '/login/process.php'
cs-method: 'POST'
condition: selection
fields:
- c-uri
- c-ip
falsepositives:
- Valid requests with this exact user agent to server scripts of the defined names
level: high
+21
View File
@@ -0,0 +1,21 @@
title: PwnDrp Access
id: 2b1ee7e4-89b6-4739-b7bb-b811b6607e5e
status: experimental
description: Detects downloads from PwnDrp web servers developed for red team testing and most likely also used for criminal activity
references:
- https://breakdev.org/pwndrop/
author: Florian Roth
date: 2020/04/15
logsource:
category: proxy
detection:
selection:
c-uri|contains: '/pwndrop/'
condition: selection
fields:
- ClientIP
- c-uri
- c-useragent
falsepositives:
- Unknown
level: critical
@@ -13,7 +13,7 @@ date: 2020/01/02
modified: 2020/03/14
logsource:
category: webserver
description: 'Make sure that your Netscaler appliance logs all kinds of attacks (test with http://your-citrix-gw.net/robots.txt). The directory traversal with ../ might not be needed on certain cloud instances or for authenticated users, so we also check for direct paths. All scripts in portal/scripts are exploitable except logout.pl.'
definition: 'Make sure that your Netscaler appliance logs all kinds of attacks (test with http://your-citrix-gw.net/robots.txt). The directory traversal with ../ might not be needed on certain cloud instances or for authenticated users, so we also check for direct paths. All scripts in portal/scripts are exploitable except logout.pl.'
detection:
selection:
c-uri:
@@ -0,0 +1,34 @@
title: Citrix ADS Exploitation CVE-2020-8193 CVE-2020-8195
description: Detects exploitation attempt against Citrix Netscaler, Application Delivery Controller (ADS) and Citrix Gateway exploiting vulnerabilities reported as CVE-2020-8193 and CVE-2020-8195
id: 0d0d9a8a-a49e-4e27-b061-7ce4b936cfb7
references:
- https://support.citrix.com/article/CTX276688
- https://research.nccgroup.com/2020/07/10/rift-citrix-adc-vulnerabilities-cve-2020-8193-cve-2020-8195-and-cve-2020-8196-intelligence/
- https://dmaasland.github.io/posts/citrix.html
author: Florian Roth
status: experimental
date: 2020/07/10
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection1:
c-uri|contains:
- '/rapi/filedownload?filter=path:%2F'
selection2:
c-uri|contains|all:
- '/pcidss/report'
- 'type=all_signatures'
- 'sig_name=_default_signature_'
condition: 1 of them
fields:
- client_ip
- vhost
- url
- response
falsepositives:
- Unknown
level: critical
@@ -13,7 +13,7 @@ logsource:
category: webserver
detection:
selection:
c-uri:
c-uri:
- '*/config/keystore/*.js*'
condition: selection
fields:
@@ -28,5 +28,6 @@ tags:
- attack.persistence
- attack.privilege_escalation
- cve.2018-2894
- attack.t1505
level: critical
+34
View File
@@ -0,0 +1,34 @@
title: CVE-2020-5902 F5 BIG-IP Exploitation Attempt
id: 44b53b1c-e60f-4a7b-948e-3435a7918478
status: experimental
description: Detects the exploitation attempt of the vulnerability found in F5 BIG-IP and described in CVE-2020-5902
references:
- https://support.f5.com/csp/article/K52145254
- https://www.ptsecurity.com/ww-en/about/news/f5-fixes-critical-vulnerability-discovered-by-positive-technologies-in-big-ip-application-delivery-controller/
- https://twitter.com/yorickkoster/status/1279709009151434754
- https://www.criticalstart.com/f5-big-ip-remote-code-execution-exploit/
author: Florian Roth
date: 2020/07/05
modified: 2020/07/07
logsource:
category: webserver
detection:
selection_base:
c-uri|contains:
- '/tmui/'
- '/hsqldb'
selection_traversal:
c-uri|contains:
- '..;/'
- '.jsp/..'
condition: selection_base and selection_traversal
fields:
- c-ip
- c-dns
falsepositives:
- Unknown
tags:
- attack.initial_access
- attack.t1190
level: critical
+37
View File
@@ -0,0 +1,37 @@
title: Webshell ReGeorg Detection Via Web Logs
id: 2ea44a60-cfda-11ea-87d0-0242ac130003
status: experimental
description: Certain strings in the uri_query field when combined with null referer and null user agent can indicate activity associated with the webshell ReGeorg.
author: Cian Heasley
reference:
- https://community.rsa.com/community/products/netwitness/blog/2019/02/19/web-shells-and-netwitness-part-3
- https://github.com/sensepost/reGeorg
date: 2020/08/04
tags:
- attack.privilege_escalation
- attack.persistence
- attack.t1100
- attack.t1505.003
logsource:
category: webserver
detection:
selection:
uri_query|contains:
- '*cmd=read*'
- '*connect&target*'
- '*cmd=connect*'
- '*cmd=disconnect*'
- '*cmd=forward*'
filter:
referer: null
useragent: null
method: POST
condition: selection and filter
fields:
- uri_query
- referer
- method
- useragent
falsepositives:
- web applications that use the same URL parameters as ReGeorg
level: high
@@ -10,10 +10,11 @@ tags:
- attack.persistence
- attack.lateral_movement
- attack.t1053
- attack.t1053.005
logsource:
product: windows
service: security
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
definition: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
detection:
selection:
EventID: 5145
@@ -16,7 +16,7 @@ detection:
selection:
EventID: 4662
ObjectServer: 'DS'
AccessMask: 0x40000
AccessMask: '0x40000'
ObjectType:
- '19195a5b-6da0-11d0-afd3-00c04fd930c9'
- 'domainDNS'
@@ -4,6 +4,7 @@ description: Detects access to $ADMIN share
tags:
- attack.lateral_movement
- attack.t1077
- attack.t1021.002
status: experimental
author: Florian Roth
date: 2017/03/04
@@ -14,8 +14,8 @@ tags:
logsource:
product: windows
service: security
definition1: 'Requirements: Audit Policy : Account Management > Audit User Account Management, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit User Account Management'
definition2: 'Requirements: Audit Policy : DS Access > Audit Directory Service Changes, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\DS Access\Audit Directory Service Changes'
definition: 'Requirements: Audit Policy : Account Management > Audit User Account Management, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Account Management\Audit User Account Management,
DS Access > Audit Directory Service Changes, Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\DS Access\Audit Directory Service Changes'
detection:
selection1:
EventID: 4738
@@ -9,6 +9,7 @@ date: 2017/07/30
tags:
- attack.defense_evasion
- attack.t1089
- attack.t1562.001
logsource:
product: windows
service: security
@@ -18,9 +19,9 @@ detection:
EventID: 4738
keywords:
Message:
- '*DES*'
- '*Preauth*'
- '*Encrypted*'
- '*DES*'
- '*Preauth*'
- '*Encrypted*'
filters:
Message:
- '*Enabled*'
@@ -10,6 +10,7 @@ tags:
- attack.credential_access
- attack.t1003
# Defender Attack Surface Reduction
- attack.t1003.001
logsource:
product: windows_defender
definition: 'Requirements:Enabled Block credential stealing from the Windows local security authority subsystem (lsass.exe) from Attack Surface Reduction (GUID: 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2)'
@@ -1,7 +1,6 @@
title: Mimikatz Use
id: 06d71506-7beb-4f22-8888-e2e5e2ca7fd8
description: This method detects mimikatz keywords in different Eventlogs (some of them only appear in older Mimikatz version that are however still used by different
threat groups)
description: This method detects mimikatz keywords in different Eventlogs (some of them only appear in older Mimikatz version that are however still used by different threat groups)
author: Florian Roth
date: 2017/01/10
modified: 2019/10/11
@@ -12,21 +11,25 @@ tags:
- attack.credential_access
- car.2013-07-001
- car.2019-04-004
- attack.t1003.002
- attack.t1003.004
- attack.t1003.001
- attack.t1003.006
logsource:
product: windows
detection:
keywords:
Message:
- "* mimikatz *"
- "* mimilib *"
- "* <3 eo.oe *"
- "* eo.oe.kiwi *"
- "* privilege::debug *"
- "* sekurlsa::logonpasswords *"
- "* lsadump::sam *"
- "* mimidrv.sys *"
- "* p::d *"
- "* s::l *"
- "* mimikatz *"
- "* mimilib *"
- "* <3 eo.oe *"
- "* eo.oe.kiwi *"
- "* privilege::debug *"
- "* sekurlsa::logonpasswords *"
- "* lsadump::sam *"
- "* mimidrv.sys *"
- "* p::d *"
- "* s::l *"
condition: keywords
falsepositives:
- Naughty administrators
+5 -4
View File
@@ -17,18 +17,19 @@ tags:
- attack.t1075
- attack.t1114
- attack.t1059
- attack.t1550.002
logsource:
product: windows
service: security
detection:
selection1:
EventID:
- 4776
EventID:
- 4776
Workstation: 'RULER'
selection2:
EventID:
- 4624
- 4625
- 4624
- 4625
WorkstationName: 'RULER'
condition: (1 of selection*)
falsepositives:
@@ -0,0 +1,37 @@
title: File Was Not Allowed To Run
id: 401e5d00-b944-11ea-8f9a-00163ecd60ae
description: Detect run not allowed files. Applocker is a very useful tool, especially on servers where unprivileged users have access. For example terminal servers. You need configure applocker and log collect to receive these events.
status: experimental
tags:
- attack.execution
- attack.t1204
- attack.t1086
- attack.t1064
- attack.t1035
references:
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/applocker/what-is-applocker
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/applocker/using-event-viewer-with-applocker
- https://nxlog.co/documentation/nxlog-user-guide/applocker.html
author: Pushkarev Dmitry
date: 2020/06/28
logsource:
product: windows
service: applocker
detection:
selection:
EventID:
- 8004
- 8007
condition: selection
fields:
- PolicyName
- RuleId
- RuleName
- TargetUser
- TargetProcessId
- FilePath
- FileHash
- Fqbn
falsepositives:
- need tuning applocker or add exceptions in SIEM
level: medium
@@ -7,6 +7,7 @@ tags:
- attack.persistence
- attack.g0010
- attack.t1050
- attack.t1543.003
date: 2017/03/31
author: Florian Roth
logsource:
@@ -9,6 +9,7 @@ tags:
- attack.persistence
- attack.g0064
- attack.t1050
- attack.t1543.003
logsource:
product: windows
service: system
@@ -9,6 +9,7 @@ tags:
- attack.persistence
- attack.g0010
- attack.t1050
- attack.t1543.003
logsource:
product: windows
service: system
+2 -1
View File
@@ -11,10 +11,11 @@ tags:
- attack.t1053
- car.2013-05-004
- car.2015-04-001
- attack.t1053.002
logsource:
product: windows
service: security
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
definition: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
detection:
selection:
EventID: 5145
+3 -2
View File
@@ -12,18 +12,19 @@ tags:
- attack.credential_access
- attack.s0002
- attack.t1003
- attack.t1003.006
logsource:
product: windows
service: security
detection:
selection:
EventID: 4662
Properties:
Properties:
- '*Replicating Directory Changes All*'
- '*1131f6ad-9c07-11d1-f79f-00c04fc2dcd2*'
filter1:
SubjectDomainName: 'Window Manager'
filter2:
filter2:
SubjectUserName:
- 'NT AUTHORITY*'
- '*$'
@@ -1,15 +1,12 @@
title: Disabling Windows Event Auditing
id: 69aeb277-f15f-4d2d-b32a-55e883609563
description: 'Detects scenarios where system auditing (ie: windows event log auditing) is disabled. This may be used in a scenario where an entity would want to bypass
local logging to evade detection when windows event logging is enabled and reviewed. Also, it is recommended to turn off "Local Group Policy Object Processing"
via GPO, which will make sure that Active Directory GPOs take precedence over local/edited computer policies via something such as "gpedit.msc". Please note,
that disabling "Local Group Policy Object Processing" may cause an issue in scenarios of one off specific GPO modifications -- however it is recommended to perform
these modifications in Active Directory anyways.'
description: 'Detects scenarios where system auditing (ie: windows event log auditing) is disabled. This may be used in a scenario where an entity would want to bypass local logging to evade detection when windows event logging is enabled and reviewed. Also, it is recommended to turn off "Local Group Policy Object Processing" via GPO, which will make sure that Active Directory GPOs take precedence over local/edited computer policies via something such as "gpedit.msc". Please note, that disabling "Local Group Policy Object Processing" may cause an issue in scenarios of one off specific GPO modifications -- however it is recommended to perform these modifications in Active Directory anyways.'
references:
- https://bit.ly/WinLogsZero2Hero
tags:
- attack.defense_evasion
- attack.t1054
- attack.t1562.006
author: '@neu5ron'
date: 2017/11/19
logsource:
@@ -9,11 +9,12 @@ references:
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.004
logsource:
product: windows
service: security
detection:
selection:
selection:
EventID: 4662
ObjectType: 'SecretObject'
AccessMask: '0x2'
@@ -21,4 +22,4 @@ detection:
condition: selection
falsepositives:
- Unknown
level: critical
level: critical
@@ -9,11 +9,12 @@ references:
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.004
logsource:
product: windows
service: security
detection:
selection:
selection:
EventID: 4692
condition: selection
fields:
@@ -0,0 +1,23 @@
title: Enumeration via the Global Catalog
description: Detects enumeration of the global catalog (that can be performed using BloodHound or others AD reconnaissance tools). Adjust Treshhold according to domain width.
author: Chakib Gzenayi (@Chak092), Hosni Mribah
id: 619b020f-0fd7-4f23-87db-3f51ef837a34
date: 2020/05/11
tags:
- attack.discovery
- attack.t1087
logsource:
product: windows
service: system
definition: 'The advanced audit policy setting "Windows Filtering Platform > Filtering Platform Connection" must be configured for Success'
detection:
selection:
EventID: 5156
DestinationPort:
- 3268
- 3269
timeframe: 1h
condition: selection | count() by SourceAddress > 2000
falsepositives:
- Exclude known DCs.
level: medium
+3 -1
View File
@@ -10,6 +10,8 @@ tags:
- attack.execution
- attack.t1077
- attack.t1035
- attack.t1021
- attack.t1569.002
logsource:
product: windows
service: system
@@ -25,4 +27,4 @@ fields:
falsepositives:
- Penetration Test
- Unknown
level: critical
level: critical
@@ -8,10 +8,13 @@ references:
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.002
- attack.t1003.004
- attack.t1003.003
logsource:
product: windows
service: security
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
definition: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
detection:
selection:
EventID: 5145
@@ -12,7 +12,7 @@ falsepositives:
- Unknown
level: high
detection:
selection:
selection_1:
- ImagePath|re: '\$PSHome\[\s*\d{1,3}\s*\]\s*\+\s*\$PSHome\['
- ImagePath|re: '\$ShellId\[\s*\d{1,3}\s*\]\s*\+\s*\$ShellId\['
- ImagePath|re: '\$env:Public\[\s*\d{1,3}\s*\]\s*\+\s*\$env:Public\['
@@ -20,7 +20,7 @@ detection:
- ImagePath|re: '\*mdr\*\W\s*\)\.Name'
- ImagePath|re: '\$VerbosePreference\.ToString\('
- ImagePath|re: '\String\]\s*\$VerbosePreference'
condition: selection
condition: selection and selection_1
---
logsource:
product: windows
+20 -20
View File
@@ -1,7 +1,6 @@
title: First Time Seen Remote Named Pipe
id: 52d8b0c6-53d6-439a-9e41-52ad442ad9ad
description: This detection excludes known namped pipes accessible remotely and notify on newly observed ones, may help to detect lateral movement and remote exec
using named pipes
description: This detection excludes known namped pipes accessible remotely and notify on newly observed ones, may help to detect lateral movement and remote exec using named pipes
author: Samir Bousseaden
date: 2019/04/03
references:
@@ -9,10 +8,11 @@ references:
tags:
- attack.lateral_movement
- attack.t1077
- attack.t1021.002
logsource:
product: windows
service: security
description: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
definition: 'The advanced audit policy setting "Object Access > Audit Detailed File Share" must be configured for Success/Failure'
detection:
selection1:
EventID: 5145
@@ -21,23 +21,23 @@ detection:
EventID: 5145
ShareName: \\*\IPC$
RelativeTargetName:
- 'atsvc'
- 'samr'
- 'lsarpc'
- 'winreg'
- 'netlogon'
- 'srvsvc'
- 'protected_storage'
- 'wkssvc'
- 'browser'
- 'netdfs'
- 'svcctl'
- 'spoolss'
- 'ntsvcs'
- 'LSM_API_service'
- 'HydraLsPipe'
- 'TermSrv_API_service'
- 'MsFteWds'
- 'atsvc'
- 'samr'
- 'lsarpc'
- 'winreg'
- 'netlogon'
- 'srvsvc'
- 'protected_storage'
- 'wkssvc'
- 'browser'
- 'netdfs'
- 'svcctl'
- 'spoolss'
- 'ntsvcs'
- 'LSM_API_service'
- 'HydraLsPipe'
- 'TermSrv_API_service'
- 'MsFteWds'
condition: selection1 and not selection2
falsepositives:
- update the excluded named pipe to filter out any newly observed legit named pipe
@@ -10,11 +10,12 @@ references:
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.001
logsource:
product: windows
service: security
detection:
selection:
selection:
EventID:
- 4663
- 4656
@@ -11,6 +11,8 @@ tags:
- attack.t1035
- attack.t1050
- car.2013-09-005
- attack.t1543.003
- attack.t1569.002
logsource:
product: windows
service: system
@@ -24,6 +26,6 @@ detection:
malsvc_persistence:
ServiceFileName|contains: 'net user'
condition: selection and 1 of malsvc_*
falsepositives:
falsepositives:
- Penetration testing
level: critical
@@ -0,0 +1,29 @@
title: Metasploit SMB Authentication
description: Alerts on Metasploit host's authentications on the domain.
id: 72124974-a68b-4366-b990-d30e0b2a190d
author: Chakib Gzenayi (@Chak092), Hosni Mribah
date: 2020/05/06
references:
- https://github.com/rapid7/metasploit-framework/blob/master/lib/rex/proto/smb/client.rb
tags:
- attack.credential_access
- attack.t1110
logsource:
product: windows
service: security
detection:
selection1:
EventID:
- 4625
- 4624
LogonType: 3
AuthenticationPackage: 'NTLM'
WorkstationName|re: '^[A-Za-z0-9]{16}$'
selection2:
ProcessName:
EventID: 4776
SourceWorkstation|re: '^[A-Za-z0-9]{16}$'
condition: selection1 OR selection2
falsepositives:
- Linux hostnames composed of 16 characters.
level: high
@@ -12,7 +12,7 @@ tags:
- attack.privilege_escalation
- attack.t1134
detection:
selection:
selection_1:
# meterpreter getsystem technique 1: cmd.exe /c echo 559891bb017 > \\.\pipe\5e120a
- ServiceFileName|contains|all:
- 'cmd'
@@ -30,7 +30,7 @@ detection:
- 'rundll32'
- '.dll,a'
- '/p:'
condition: selection
condition: selection and selection_1
fields:
- ComputerName
- SubjectDomainName
@@ -1,23 +1,25 @@
title: MMC20 Lateral Movement
id: f1f3bf22-deb2-418d-8cce-e1a45e46a5bd
description: Detects MMC20.Application Lateral Movement; specifically looks for the spawning of the parent MMC.exe with a command line of "-Embedding" as a child of svchost.exe
description: Detects MMC20.Application Lateral Movement; specifically looks for the spawning of the parent MMC.exe with a command line of "-Embedding" as a child of svchost.exe
author: '@2xxeformyshirt (Security Risk Advisors)'
date: 2020/03/04
references:
- https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/
- https://drive.google.com/file/d/1lKya3_mLnR3UQuCoiYruO3qgu052_iS_/view?usp=sharing
- https://enigma0x3.net/2017/01/05/lateral-movement-using-the-mmc20-application-com-object/
- https://drive.google.com/file/d/1lKya3_mLnR3UQuCoiYruO3qgu052_iS_/view?usp=sharing
tags:
- attack.execution
- attack.t1175
- attack.execution
- attack.t1175
- attack.t1021.003
- attack.t1559.001
logsource:
category: process_creation
product: windows
category: process_creation
product: windows
detection:
selection:
ParentImage: '*\svchost.exe'
Image: '*\mmc.exe'
CommandLine: '*-Embedding*'
condition: selection
selection:
ParentImage: '*\svchost.exe'
Image: '*\mmc.exe'
CommandLine: '*-Embedding*'
condition: selection
falsepositives:
- Unlikely
- Unlikely
level: high
@@ -0,0 +1,27 @@
title: Denied Access To Remote Desktop
id: 8e5c03fa-b7f0-11ea-b242-07e0576828d9
description: This event is generated when an authenticated user who is not allowed to log on remotely attempts to connect to this computer through Remote Desktop.
Often, this event can be generated by attackers when searching for available windows servers in the network.
status: experimental
tags:
- attack.lateral_movement
- attack.t1076
- attack.t1021.001
references:
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid=4825
author: Pushkarev Dmitry
date: 2020/06/27
logsource:
product: windows
service: security
detection:
selection:
EventID: 4825
condition: selection
fields:
- EventCode
- AccountName
- ClientAddress
falsepositives:
- Valid user was not added to RDP group
level: medium
@@ -10,6 +10,7 @@ tags:
- attack.lateral_movement
- attack.t1075
- attack.s0002
- attack.t1550.002
logsource:
product: windows
service: security
@@ -10,6 +10,7 @@ tags:
- attack.lateral_movement
- attack.t1075
- car.2016-04-004
- attack.t1550.002
logsource:
product: windows
service: security
@@ -1,6 +1,6 @@
title: Pass the Hash Activity 2
id: 8eef149c-bd26-49f2-9e5a-9b00e3af499b
status: production
status: stable
description: Detects the attack technique pass the hash which is used to move laterally inside the network
references:
- https://github.com/iadgov/Event-Forwarding-Guidance/tree/master/Events
@@ -11,6 +11,7 @@ date: 2019/06/14
tags:
- attack.lateral_movement
- attack.t1075
- attack.t1550.002
logsource:
product: windows
service: security
@@ -8,6 +8,7 @@ modified: 2019/11/13
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.002
level: critical
logsource:
product: windows
@@ -10,6 +10,7 @@ tags:
- attack.persistence
- attack.t1053
- car.2013-08-001
- attack.t1053.005
logsource:
product: windows
service: security
@@ -9,6 +9,7 @@ tags:
- attack.privilege_escalation
- attack.t1050
- car.2013-09-005
- attack.t1543.003
logsource:
product: windows
service: system
@@ -9,6 +9,7 @@ tags:
- attack.lateral_movement
- attack.t1076
- car.2013-07-002
- attack.t1021.001
status: experimental
author: Thomas Patzke
logsource:
@@ -14,6 +14,7 @@ tags:
- attack.t1076
- attack.t1090
- car.2013-07-002
- attack.t1021
logsource:
product: windows
service: security
@@ -8,6 +8,7 @@ tags:
- attack.lateral_movement
- attack.privilege_escalation
- attack.t1208
- attack.t1558.003
author: Roberto Rodriguez (source), Ilyas Ochkov (rule), oscd.community
date: 2019/10/24
logsource:
@@ -9,11 +9,12 @@ references:
tags:
- attack.execution
- attack.t1086
- attack.t1059.001
logsource:
product: windows
service: security
detection:
selection:
selection:
EventID: 5156
DestPort:
- 5985
@@ -10,6 +10,7 @@ tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1178
- attack.t1134.005
logsource:
product: windows
service: security
@@ -25,7 +26,7 @@ detection:
- '-'
- '%%1793'
filter_null:
SidHistory: null
SidHistory:
condition: selection1 or (selection2 and not selection3 and not filter_null)
falsepositives:
- Migration of an account into a new domain
@@ -10,6 +10,7 @@ date: 2017/05/12
tags:
- attack.defense_evasion
- attack.t1107
- attack.t1070.004
logsource:
product: windows
service: application
@@ -7,6 +7,7 @@ date: 2019/12/03
tags:
- attack.defense_evasion
- attack.t1009
- attack.t1027
logsource:
product: windows
service: security
@@ -11,6 +11,7 @@ author: Dimitrios Slamaris
tags:
- attack.defense_evasion
- attack.t1073
- attack.t1574.002
logsource:
product: windows
service: system
@@ -19,6 +20,6 @@ detection:
EventID: 1033
Source: Microsoft-Windows-DHCP-Server
condition: selection
falsepositives:
falsepositives:
- Unknown
level: critical
@@ -11,18 +11,19 @@ modified: 2019/07/17
tags:
- attack.defense_evasion
- attack.t1073
- attack.t1574.002
author: "Dimitrios Slamaris, @atc_project (fix)"
logsource:
product: windows
service: system
detection:
selection:
EventID:
EventID:
- 1031
- 1032
- 1034
Source: Microsoft-Windows-DHCP-Server
Source: Microsoft-Windows-DHCP-Server
condition: selection
falsepositives:
falsepositives:
- Unknown
level: critical
@@ -10,17 +10,18 @@ references:
tags:
- attack.defense_evasion
- attack.t1073
- attack.t1574.002
author: Florian Roth
logsource:
product: windows
service: dns-server
detection:
selection:
EventID:
EventID:
- 150
- 770
condition: selection
falsepositives:
falsepositives:
- Unknown
level: critical
@@ -8,6 +8,7 @@ references:
tags:
- attack.credential_access
- attack.t1003
- attack.t1003.001
logsource:
product: windows
service: security

Some files were not shown because too many files have changed in this diff Show More