Thomas Patzke
f907c49ab5
Improved test coverage
...
* Added test case
* Removed unused code
2020-06-13 01:11:08 +02:00
Thomas Patzke
05ced1a3d5
Exclude heatmap.json from versioning
2020-06-13 00:05:57 +02:00
Thomas Patzke
b129556388
Automatic inclusion of all configuration files
2020-06-13 00:04:45 +02:00
Thomas Patzke
80e8f0e5fa
Release 0.17.0
2020-06-12 23:52:06 +02:00
Thomas Patzke
24d83b80cd
Merge branch 'script_entry_points'
2020-06-12 23:13:11 +02:00
Florian Roth
b48e7d8d71
Merge pull request #833 from neu5ron/sigmacs
...
typo and another example
2020-06-12 17:39:14 +02:00
Nate Guagenti
db6c9dc721
Merge remote-tracking branch 'neu5ron-sigma/sigmacs' into sigmacs
...
# Conflicts:
# tools/README.md
2020-06-12 11:37:39 -04:00
Nate Guagenti
aac1af1832
typo, was missing the = and *.
...
also, show option when using case insensitive for everything, how to "exclude" a field from that regex.
Signed-off-by: Nate Guagenti <neu5ron@users.noreply.github.com >
2020-06-12 11:37:32 -04:00
Nate Guagenti
db0292afd2
typo, was missing the = and *.
...
also, show option when using case insensitive for everything, how to "exclude" a field from that regex.
2020-06-12 11:36:19 -04:00
Florian Roth
52ff2e12ab
Merge pull request #832 from Iveco/master
...
Cmd.exe Path Traversal Detection / Argument Spoofing
2020-06-12 10:33:15 +02:00
Iveco
40f0fd989d
- moved to "process_creation" folder instead of "sysmon"
...
- renamed .yml file
2020-06-11 19:21:17 +02:00
Iveco
34d7ea2974
removed one field
2020-06-11 16:23:15 +02:00
Iveco
2081baafe5
updated to process_creation
2020-06-11 15:58:05 +02:00
Iveco
f56e2599b1
Cmd.exe Path Traversal Detection
2020-06-11 15:48:48 +02:00
Florian Roth
97c45f9d46
Merge pull request #812 from tliffick/master
...
added new rules for malware
2020-06-10 17:37:19 +02:00
Florian Roth
96309d247b
fix: cosmetic fault
2020-06-10 16:41:03 +02:00
Florian Roth
6e4aa01baa
Cosmetics
2020-06-10 16:36:17 +02:00
Florian Roth
13c7d40a22
Cosmetics
2020-06-10 16:35:41 +02:00
Florian Roth
f553fb2e33
Cosmetics
2020-06-10 16:35:14 +02:00
Florian Roth
48e4e31713
Merge pull request #826 from NVISO-BE/sysmon_susp_fax_dll
...
Fax Service DLL search order hijacking detection
2020-06-10 16:33:12 +02:00
Florian Roth
1a9da23611
Merge pull request #825 from NVISO-BE/sysmon_office_persistence
...
Office persistence by addin detection
2020-06-10 16:32:50 +02:00
Remco Hofman
8adaa2d672
Fixed bad indentation
2020-06-10 15:02:41 +02:00
Remco Hofman
83a6e25bcb
Fax Service DLL search order hijacking
2020-06-10 15:01:07 +02:00
Remco Hofman
cb8e478ac1
Sigma rule to detect Office persistence via addin.
2020-06-10 14:52:13 +02:00
Thomas Patzke
915ea1cc67
Merge branch 'script_entry_points' into master
2020-06-10 00:51:47 +02:00
Florian Roth
565febd39d
README updated
2020-06-09 23:25:09 +02:00
Florian Roth
51f28271a5
Merge pull request #824 from neu5ron/sigmacs
...
Sigmacs
2020-06-09 23:15:50 +02:00
Nate Guagenti
2b735494cd
Merge branch 'master' of https://github.com/Neo23x0/sigma into sigmacs
2020-06-09 16:54:02 -04:00
Nate Guagenti
f4fe425fa7
update readme for some analyzed field and keyword field examples
2020-06-09 16:53:50 -04:00
Florian Roth
5c835cf1f2
Merge pull request #813 from ozirus/patch-1
...
Create sysmon_apt_muddywater_dnstunnel.yml
2020-06-09 18:44:45 +02:00
Florian Roth
7a334a8d8a
fix: missed line
2020-06-09 17:30:54 +02:00
Florian Roth
04913a4b95
Aligned indentation
2020-06-09 17:20:25 +02:00
Florian Roth
9b8f8b7e09
Merge pull request #822 from NVISO-BE/win_mal_flowcloud
...
TA410 FlowCloud malware detection
2020-06-09 17:18:39 +02:00
Florian Roth
ad5c0a6cf3
Merge pull request #821 from NVISO-BE/win_mal_octopus_scanner
...
Octopus Scanner malware rule
2020-06-09 17:18:04 +02:00
Remco Hofman
a9bf22750a
Fixed bad indentation
2020-06-09 16:30:17 +02:00
Remco Hofman
4ce3ea735e
TA410 FlowCloud malware detection
2020-06-09 16:21:46 +02:00
Remco Hofman
d14d391761
Octopus Scanner malware rule
2020-06-09 16:12:05 +02:00
Nate Guagenti
117ceac492
moved file to ecs-zeek-elastic-beats-implementation.yml
2020-06-09 08:56:01 -04:00
Nate Guagenti
ad9ada7a44
Merge branch 'master' of https://github.com/Neo23x0/sigma into sigmacs
...
Conflicts:
tools/sigma/backends/mdatp.py
2020-06-07 11:51:17 -04:00
Florian Roth
94b90adf10
docs: move Sigmac help from Wiki to repo
2020-06-07 12:18:37 +02:00
Thomas Patzke
36a7077648
Moved tool executables to new location
2020-06-07 01:14:04 +02:00
Thomas Patzke
a7d18c7ed9
Converted sigma2attack and added to entry points
2020-06-07 01:03:09 +02:00
Thomas Patzke
8688e8a2a1
Script entrypoint stubs
2020-06-07 00:22:59 +02:00
Florian Roth
0c2f2fe6df
Merge pull request #816 from Neo23x0/rule-devel
...
merged Cyb3rWarD0g's rules
2020-06-06 16:27:59 +02:00
Florian Roth
d3e261862d
merged Cyb3rWarD0g's rules
2020-06-06 15:42:22 +02:00
Florian Roth
72deaa98f5
Merge pull request #815 from Neo23x0/rule-devel
...
Rule devel
2020-06-06 14:19:37 +02:00
Florian Roth
3697186281
fix: fixed title
2020-06-06 14:04:40 +02:00
Florian Roth
246a95557b
fix: description over multiple lines
2020-06-06 13:56:48 +02:00
Florian Roth
d54209dcc5
rule: ETW disabled
2020-06-06 13:56:19 +02:00
Thomas Patzke
7d70cd95a4
Deduplicated backend list
2020-06-06 01:03:02 +02:00
Thomas Patzke
fb9855bd3b
Added description to es-rule backend
2020-06-06 01:02:44 +02:00
Thomas Patzke
1d211565fc
Moved backend options list to --backend-help
2020-06-06 00:56:00 +02:00
Thomas Patzke
c992dc5215
Improved test coverage
2020-06-05 23:33:51 +02:00
Thomas Patzke
5d88d97c73
Merge branch 'improvements/improved_mdatp_mappings' of https://github.com/wietze/sigma into wietze-improvements/improved_mdatp_mappings
2020-06-05 23:03:52 +02:00
Nate Guagenti
55beecac28
Squashed commit of the following:
...
commit d97d2ced82
Merge: 022d73f8 84dd8c39
Author: Florian Roth <venom14@gmail.com >
Date: Wed Jun 3 15:53:55 2020 +0200
Merge pull request #725 from WilliamBruneau/fix_null_list
Move null values out from list in rules
commit 84dd8c39c4
Author: William Bruneau <william.bruneau@epfedu.fr >
Date: Tue May 5 09:04:47 2020 +0200
Move null values out from list in rules
commit 022d73f842
Merge: 0cbc099d 4ed51201
Author: Florian Roth <venom14@gmail.com >
Date: Wed Jun 3 10:48:05 2020 +0200
Merge pull request #811 from svnscha/fix/field-TargetFileName-to-TargetFilename
All Rules use 'TargetFilename' instead of 'TargetFileName'.
commit 4ed512011a
Author: Sven Scharmentke <sven@vastlimits.com >
Date: Wed Jun 3 09:00:59 2020 +0200
All Rules use 'TargetFilename' instead of 'TargetFileName'.
This commit fixes the incorrect spelling.
commit 0cbc099def
Merge: 74e16fdc 3a6ac5bd
Author: Florian Roth <venom14@gmail.com >
Date: Sat May 30 09:31:45 2020 +0200
Merge pull request #807 from forensicanalysis/master
Add sqlite backend
commit 3a6ac5bd5c
Author: Jonas Plum <git@cugu.eu >
Date: Sat May 30 01:57:06 2020 +0200
Remove unused function
commit 5cc82d0f05
Author: Jonas Plum <git@cugu.eu >
Date: Sat May 30 00:56:06 2020 +0200
Move testcase
commit 4a8ab88ade
Author: Jonas Plum <git@cugu.eu >
Date: Sat May 30 00:15:38 2020 +0200
Fix test path
commit 70935d26ce
Author: Jonas Plum <git@cugu.eu >
Date: Fri May 29 23:56:05 2020 +0200
Add license header
commit 74e16fdccd
Merge: e20b58c4 537bda44
Author: Florian Roth <venom14@gmail.com >
Date: Fri May 29 17:32:43 2020 +0200
Merge pull request #803 from gamma37/clear_cmd_history
Edit Clear Command History
commit e20b58c421
Merge: 7f2fa05e a00f7f19
Author: Florian Roth <venom14@gmail.com >
Date: Fri May 29 17:32:27 2020 +0200
Merge pull request #806 from SanWieb/sysmon_creation_system_file
Fixed wrong field & Improve rule
commit a00f7f19a1
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Fri May 29 16:25:54 2020 +0200
Add tagg Endswith
Prevent the trigger of {}.exe.log
commit 38afd8b5de
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Thu May 28 21:52:17 2020 +0200
Fixed wrong field
commit 7f2fa05ed3
Merge: ec313b6c 39b41b55
Author: Florian Roth <venom14@gmail.com >
Date: Thu May 28 11:16:44 2020 +0200
Merge pull request #802 from Neo23x0/rule-devel
ComRAT and KazuarRAT
commit 537bda4417
Author: gamma37 <marie.euler@polytechnique.edu >
Date: Thu May 28 10:56:35 2020 +0200
Update lnx_shell_clear_cmd_history.yml
commit 5a48934822
Author: gamma37 <marie.euler@polytechnique.edu >
Date: Thu May 28 10:52:17 2020 +0200
Edit Clear Command History
I suggest a new point of view to detect that bash_history has been cleared : Instead of trying to detect all the commands that can do that, we could monitor the size of the file and log whenever it has less than 1 line.
commit 39b41b5582
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Thu May 28 10:13:38 2020 +0200
rule: moved DebugView rule to process creation category
commit 76dcc1a16f
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Thu May 28 09:22:25 2020 +0200
rule: renamed debugview
commit ec313b6c8a
Merge: 5bb6770f d44fc43c
Author: Florian Roth <venom14@gmail.com >
Date: Wed May 27 08:49:20 2020 +0200
Merge pull request #801 from SanWieb/sysmon_creation_system_file
Rule: sysmon_creation_system_file
commit d44fc43c54
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Tue May 26 19:10:11 2020 +0200
Add extension
commit f6ec724d51
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Tue May 26 18:53:54 2020 +0200
Rule: sysmon_creation_system_file
commit 5bb6770f53
Merge: 0b398c5b 3681b8cb
Author: Florian Roth <venom14@gmail.com >
Date: Tue May 26 14:28:47 2020 +0200
Merge pull request #800 from SanWieb/win_system_exe_anomaly
Extended Windows processes: win_system_exe_anomaly
commit 4ca81b896d
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Tue May 26 14:19:22 2020 +0200
rule: Turla ComRAT report
commit 3681b8cb56
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Tue May 26 13:56:51 2020 +0200
Extended Windows processes
commit 0b398c5bf0
Merge: c1f47875 b648998f
Author: Florian Roth <venom14@gmail.com >
Date: Tue May 26 13:31:57 2020 +0200
Merge pull request #798 from Neo23x0/rule-devel
rule: confluence exploit CVE-2019-3398 & Turla ComRAT
commit c1f4787566
Merge: ce1f4634 48c5f2ed
Author: Florian Roth <venom14@gmail.com >
Date: Tue May 26 13:21:04 2020 +0200
Merge pull request #797 from NVISO-BE/sysmon_cve-2020-1048
Changes to sysmon_cve-2020-1048
commit ce1f46346f
Merge: e131f347 1a598282
Author: Florian Roth <venom14@gmail.com >
Date: Tue May 26 13:20:40 2020 +0200
Merge pull request #751 from zaphodef/fix/powershell_ntfs_ads_access
Add 'Add-Content' to powershell_ntfs_ads_access
commit e131f3476e
Merge: 30861b55 7037e775
Author: Florian Roth <venom14@gmail.com >
Date: Tue May 26 13:20:23 2020 +0200
Merge pull request #796 from EccoTheFlintstone/fp
add more false positives
commit 30861b558c
Merge: a962bd1b f9f814f3
Author: Florian Roth <venom14@gmail.com >
Date: Tue May 26 13:20:07 2020 +0200
Merge pull request #799 from SanWieb/susp_file_characteristics
Susp file characteristics: Reduce FP of legitime processes
commit b648998fd0
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Tue May 26 13:18:50 2020 +0200
rule: Turla ComRAT
commit f9f814f3b3
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Tue May 26 13:06:27 2020 +0200
Shortened title
commit a241792e10
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Tue May 26 12:58:15 2020 +0200
Reduce FP of legitime processes
A lot of Windows apps does not have any file characteristics. Some examples:
- Gamebar: C:\\Program Files\\WindowsApps\\Microsoft.XboxGamingOverlay_3.38.25003.0_x64__8wekyb3d8bbwe\\GameBarFT.exe
- YourPhone: C:\\Program Files\\WindowsApps\\Microsoft.YourPhone_1.20022.82.0_x64__8wekyb3d8bbwe\\YourPhoneServer/YourPhoneServer.exe
All C:\Windows\System32\OpenSSH (scp, sftp, ssh etc) does not have a description and company.
Python 2.7, 3.3 and 3.7 does not have any file characteristics.
So I don't think it is possible to whitelist all options, maybe it is worthwhile to check the \Downloads\ folder otherwise it would be better to just delete the rule. All other suspicious folders are covered by /rules/windows/process_creation/win_susp_exec_folder.yml
commit cdf1ade625
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Tue May 26 12:27:16 2020 +0200
fix: typo in selection
commit 91b4ee8d56
Merge: 4cd7c39e a962bd1b
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Tue May 26 12:24:21 2020 +0200
Merge pull request #2 from Neo23x0/master
Update repository
commit 828484d7c6
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Tue May 26 12:09:41 2020 +0200
rule: confluence exploit CVE-2019-3398
commit 48c5f2ed09
Author: Remco Hofman <rhofman@nviso.be >
Date: Tue May 26 11:20:21 2020 +0200
Update to sysmon_cve-2020-1048
Added .com executables to detection
Second TargetObject should have been Details
commit abf1a2c6d7
Author: Jonas Hagg <joy.hagg@web.de >
Date: Mon May 25 10:54:16 2020 +0200
Adjusted Makefile
commit dedfb65d63
Author: Jonas Hagg <joy.hagg@web.de >
Date: Mon May 25 10:44:14 2020 +0200
Implemented Aggregation for SQL, Added SQLite FullTextSearch
commit 7037e77569
Author: ecco <none@none.com >
Date: Mon May 25 04:50:22 2020 -0400
add more FP
commit a962bd1bc1
Merge: 0afe0623 d510e1aa
Author: Florian Roth <venom14@gmail.com >
Date: Mon May 25 10:48:36 2020 +0200
Merge pull request #747 from zaphodef/fix/win_susp_backup_delete_source
Fix 'source' value for win_susp_backup_delete
commit 0afe0623af
Merge: 92d0aa86 beb62dc1
Author: Florian Roth <venom14@gmail.com >
Date: Mon May 25 10:47:23 2020 +0200
Merge pull request #757 from tliffick/master
added rule for Blue Mockingbird (cryptominer)
commit 92d0aa8654
Merge: 0dda757c 6fcf3f9e
Author: Florian Roth <venom14@gmail.com >
Date: Mon May 25 10:46:39 2020 +0200
Merge pull request #795 from SanWieb/Rule-improvement-Netsh-program-allowed
Rule improvement: netsh Application or Port allowed
commit 6fcf3f9ebf
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Mon May 25 10:13:26 2020 +0200
Update win_netsh_fw_add.yml
commit 28652e4648
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Mon May 25 10:02:13 2020 +0200
Add Windows Server 2008 and Windows Vista support
It did not support the command `netsh advfirewall firewall add`
commit 2678cd1d3e
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Mon May 25 09:50:47 2020 +0200
Create win_netsh_fw_add_susp_image.yml
More critical version of the rule windows/process_creation/win_netsh_fw_add.yml with the suspicious image location check.
Combined the following rules for the suspicious locations:
https://github.com/Neo23x0/sigma//blob/master/rules/windows/sysmon/sysmon_susp_download_run_key.yml
https://github.com/Neo23x0/sigma/blob/master/rules/windows/sysmon/sysmon_susp_run_key_img_folder.yml
https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_susp_run_locations.yml
commit 4cd7c39e9d
Merge: 6fbfa9df 0dda757c
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Mon May 25 08:48:16 2020 +0200
Merge pull request #1 from Neo23x0/master
Update repository
commit 0dda757ca5
Merge: 40f0beb5 daf7ab5f
Author: Thomas Patzke <thomas@patzke.org >
Date: Sun May 24 22:58:58 2020 +0200
Merge branch 'socprime-master'
commit daf7ab5ff7
Author: Thomas Patzke <thomas@patzke.org >
Date: Sun May 24 22:41:38 2020 +0200
Cleanup: removal of corelight_* backends
commit d45f8e19fe
Author: Thomas Patzke <thomas@patzke.org >
Date: Sun May 24 21:46:55 2020 +0200
Fixes
commit 32e4998c49
Author: Thomas Patzke <thomas@patzke.org >
Date: Sun May 24 21:45:37 2020 +0200
Removed dead code from ALA backend.
commit 24b08bbf30
Merge: 96fae4be e8b956f5
Author: Thomas Patzke <thomas@patzke.org >
Date: Sun May 24 17:06:32 2020 +0200
Merge branch 'master' of https://github.com/socprime/sigma into socprime-master
commit 40f0beb58d
Merge: 6fbfa9df b8ee736f
Author: Florian Roth <venom14@gmail.com >
Date: Sun May 24 16:30:10 2020 +0200
Merge pull request #794 from SanWieb/update_susp_run_key
Remove AppData folder as suspicious folder
commit b8ee736f44
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Sun May 24 15:16:07 2020 +0200
Remove AppData folder as suspicious folder
A lot of software is using the AppData folder for startup keys. Some examples:
- Microsoft Teams (\AppData\Local\Microsoft\Teams)
- Resilio (\AppData\Roaming\Resilio Sync\)
- Discord ( (\AppData\Local\Discord\)
- Spotify ( (\AppData\Roaming\Spotify\)
Too many to whitelist them all
commit 6fbfa9dfdd
Merge: d0da2810 3028a270
Author: Florian Roth <venom14@gmail.com >
Date: Sat May 23 23:47:12 2020 +0200
Merge pull request #793 from Neo23x0/rule-devel
Esentutl rule and StrongPity Loader UA
commit f970d28f10
Author: ecco <none@none.com >
Date: Sat May 23 15:06:15 2020 -0400
add more false positives
commit 3028a27055
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Sat May 23 18:32:02 2020 +0200
fix: buggy rule
commit df715386b6
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Sat May 23 18:27:36 2020 +0200
rule: suspicious esentutl use
commit d0da2810c1
Merge: 8321cc7e 67faf4bd
Author: Florian Roth <venom14@gmail.com >
Date: Sat May 23 18:13:16 2020 +0200
Merge pull request #792 from EccoTheFlintstone/fff
fix FP + remove powershell rule redundant with sysmon_in_memory_power…
commit 8321cc7ee1
Merge: 9cd9a301 e1a05dfc
Author: Florian Roth <venom14@gmail.com >
Date: Sat May 23 18:11:32 2020 +0200
Merge pull request #772 from gamma37/suspicious_activities
Create a rule for "suspicious activities"
commit d1a5471d21
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Sat May 23 17:38:10 2020 +0200
rule: Strong Pity loader UA
commit 67faf4bd41
Author: ecco <none@none.com >
Date: Sat May 23 10:56:23 2020 -0400
fix FP + remove powershell rule redundant with sysmon_in_memory_powershell.yml
commit 9cd9a301c2
Merge: ee1ca77f d310805e
Author: Florian Roth <venom14@gmail.com >
Date: Sat May 23 16:50:31 2020 +0200
Merge pull request #791 from SanWieb/master
added rule for Netsh RDP port opening
commit e1a05dfc1c
Author: Florian Roth <venom14@gmail.com >
Date: Sat May 23 16:49:03 2020 +0200
Update lnx_auditd_susp_C2_commands.yml
commit ee1ca77fad
Merge: 895c8470 cbf06b1e
Author: Florian Roth <venom14@gmail.com >
Date: Sat May 23 16:47:46 2020 +0200
Merge pull request #771 from gamma37/new_rules
Create a new rule to detect "Create Account"
commit 895c84703f
Merge: 12e1aeaf 327a53c1
Author: Florian Roth <venom14@gmail.com >
Date: Sat May 23 16:47:01 2020 +0200
Merge pull request #790 from EccoTheFlintstone/fp_fix
fix false positive matching on every powershell process not run by SY…
commit 327a53c120
Author: ecco <none@none.com >
Date: Sat May 23 10:25:37 2020 -0400
add new test for sysmon rules without eventid
commit 10ca3006f5
Author: ecco <none@none.com >
Date: Sat May 23 10:07:55 2020 -0400
move rule where needed
commit 2b89e56054
Author: ecco <none@none.com >
Date: Sat May 23 10:03:13 2020 -0400
fix test
commit d9bc09c38c
Author: ecco <none@none.com >
Date: Sat May 23 10:02:58 2020 -0400
fix test
commit 78a7852a43
Author: ecco <none@none.com >
Date: Sat May 23 09:16:40 2020 -0400
renamed dbghelp rule with new ID and comment and removed a false positive
commit d310805ed9
Author: Sander Wiebing <45387038+SanWieb@users.noreply.github.com >
Date: Sat May 23 14:19:52 2020 +0200
rule: Netsh RDP port opening
commit 75ba5f989c
Author: ecco <none@none.com >
Date: Sat May 23 07:44:45 2020 -0400
add 1 more FP to wmi load
commit 9a7f462d79
Author: ecco <none@none.com >
Date: Sat May 23 07:17:56 2020 -0400
move renamed bnaries rule to process creation (they made a lot of false positives in sysmon as there was no event id specified in the rule)
commit cfde0625f5
Author: ecco <none@none.com >
Date: Sat May 23 07:05:09 2020 -0400
fix false positive matching on every powershell process not run by SYSTEM account
commit 12e1aeaf9f
Merge: 46f3a70a 34006d07
Author: Florian Roth <venom14@gmail.com >
Date: Sat May 23 09:54:43 2020 +0200
Merge pull request #788 from Neo23x0/rule-devel
refactor: split up rule for CVE-2020-1048 into 2 rules
commit 46f3a70a7d
Merge: 96fae4be ec17c2ab
Author: Florian Roth <venom14@gmail.com >
Date: Sat May 23 09:54:28 2020 +0200
Merge pull request #786 from EccoTheFlintstone/perf_fix
various rules cleaning (slight perf improvements)
commit 34006d0794
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Sat May 23 09:16:19 2020 +0200
refactor: simplified and extended expression in CVE-2020-1048 rule
commit 57c8e63acd
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Sat May 23 09:09:58 2020 +0200
refactore: split up rule for CVE-2020-1048 into 2 rules
commit ec17c2ab56
Author: ecco <none@none.com >
Date: Fri May 22 10:37:00 2020 -0400
filter on createkey only when needed
commit 96fae4be68
Author: Thomas Patzke <thomas@patzke.org >
Date: Fri May 22 00:50:37 2020 +0200
Added CrachMapExec rules
commit 64e0e7ca72
Merge: bbf78374 91c4c4ec
Author: Florian Roth <venom14@gmail.com >
Date: Thu May 21 14:19:09 2020 +0200
Merge pull request #784 from Neo23x0/rule-devel
refactor: slightly improved Greenbug rule
commit 91c4c4ecc5
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Thu May 21 13:38:11 2020 +0200
refactor: slightly improved Greenbug rule
commit bbf78374b6
Merge: 8d9b706d 9a3b6c1c
Author: Florian Roth <venom14@gmail.com >
Date: Thu May 21 09:55:46 2020 +0200
Merge pull request #783 from Neo23x0/rule-devel
Greenbug Rule
commit 9a3b6c1c77
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Thu May 21 09:44:11 2020 +0200
docs: added MITRE ATT&CK group tag
commit 344eb713c5
Author: Florian Roth <florian.roth@nextron-systems.com >
Date: Thu May 21 09:39:57 2020 +0200
rule: Greenbug campaign
commit 8d9b706d6a
Merge: e7980bb4 06abd6e7
Author: Thomas Patzke <thomas@patzke.org >
Date: Wed May 20 19:11:56 2020 +0200
Merge pull request #727 from 3CORESec/master
Override Features
commit e7980bb434
Merge: af92a5bd 8963c0a6
Author: Florian Roth <venom14@gmail.com >
Date: Wed May 20 12:55:41 2020 +0200
Merge pull request #782 from ZikyHD/patch-1
Remove duplicate 'CommandLine' in fields
commit af92a5bd2c
Merge: 04dfe6c5 9ab65cd1
Author: Florian Roth <venom14@gmail.com >
Date: Wed May 20 12:55:29 2020 +0200
Merge pull request #780 from tatsu-i/master
Null field check to eliminate false positives
commit 8963c0a65e
Author: ZikyHD <ZikyHD@users.noreply.github.com >
Date: Wed May 20 11:54:47 2020 +0200
Remove duplicate 'CommandLine' in fields
commit e8b956f575
Author: vh <vh@socprime.com >
Date: Wed May 20 12:35:00 2020 +0300
Updated config
commit 9ab65cd1c7
Author: Florian Roth <venom14@gmail.com >
Date: Tue May 19 14:50:22 2020 +0200
Update win_alert_ad_user_backdoors.yml
commit 04dfe6c5fc
Merge: df75bdd3 9e272d37
Author: Thomas Patzke <thomas@patzke.org >
Date: Tue May 19 13:18:40 2020 +0200
Merge pull request #778 from neu5ron/sigmacs
SIGMACs: Winlogbeat & Zeek
commit df75bdd3b6
Merge: 4446c4cd 7c3dea22
Author: Florian Roth <venom14@gmail.com >
Date: Tue May 19 13:10:56 2020 +0200
Merge pull request #779 from neu5ron/rules
Rules: Zeek
commit 7c3dea22b8
Author: neu5ron <>
Date: Tue May 19 05:13:48 2020 -0400
small T, big T
commit dd382848b4
Merge: 602c8917 e975d3fd
Author: neu5ron <>
Date: Tue May 19 05:09:05 2020 -0400
Merge remote-tracking branch 'neu5ron-sigma/rules' into rules
commit 602c8917ef
Author: neu5ron <>
Date: Tue May 19 04:41:08 2020 -0400
domain user enumeration via zeek rpc (dce_rpc) log.
commit c815773b1a
Author: Tatsuya Ito <t_ito@cyberdefense.jp >
Date: Tue May 19 18:05:51 2020 +0900
enhancement rule
commit 49f68a327a
Author: Tatsuya Ito <t_ito@cyberdefense.jp >
Date: Tue May 19 18:00:50 2020 +0900
enhancement rule
commit e975d3fd14
Author: neu5ron <>
Date: Tue May 19 04:41:08 2020 -0400
domain user enumeration via zeek rpc (dce_rpc) log.
commit effb2a8337
Author: neu5ron <>
Date: Tue May 19 04:41:00 2020 -0400
add exe webdav download
commit 858ebcd3d3
Author: neu5ron <>
Date: Tue May 19 04:35:47 2020 -0400
author typo update
commit 2fc8d513d6
Author: neu5ron <>
Date: Tue May 19 04:35:30 2020 -0400
zeek, swap `path` and `name`
commit 0dd089db47
Author: ecco <none@none.com >
Date: Mon May 18 20:29:53 2020 -0400
various rules cleaning
commit 71c507d8a9
Author: gamma37 <marie.euler@polytechnique.edu >
Date: Mon May 18 11:34:53 2020 +0200
remove space bedore colon
commit 55eec46932
Author: gamma37 <marie.euler@polytechnique.edu >
Date: Mon May 18 11:25:18 2020 +0200
Create a rule for "suspicious activities"
commit cbf06b1e43
Author: gamma37 <marie.euler@polytechnique.edu >
Date: Mon May 18 10:11:32 2020 +0200
lowercased tag
commit 904716771a
Author: gamma37 <marie.euler@polytechnique.edu >
Date: Mon May 18 10:03:34 2020 +0200
Create a new rule to detect "Create Account"
commit beb62dc163
Author: Florian Roth <venom14@gmail.com >
Date: Fri May 15 12:06:34 2020 +0200
fix: condition location
commit 28dc2a2267
Author: Florian Roth <venom14@gmail.com >
Date: Fri May 15 11:33:36 2020 +0200
Minor changes
hints:
- contains doesn't require wildcards in the strings
- we can use 'endswith' instead of wildcard at the beginning of the string (it's the new way to describe it, we have to change all old rules that contain these wildcards some day)
- we can use "1 of them" to say that 1 of the conditions has to match
commit 40ab1b7247
Author: Trent Liffick <trent.liffick@outlook.com >
Date: Thu May 14 23:33:08 2020 -0400
added 'action: global'
commit 56a2747a70
Author: Trent Liffick <trent.liffick@outlook.com >
Date: Thu May 14 23:18:33 2020 -0400
Corrected missing condition
learning! fail fast & forward
commit fb1d8d7a76
Author: Trent Liffick <trent.liffick@outlook.com >
Date: Thu May 14 23:04:14 2020 -0400
Corrected typo
commit 8aff6b412e
Author: Trent Liffick <trent.liffick@outlook.com >
Date: Thu May 14 22:58:23 2020 -0400
added rule for Blue Mockingbird (cryptominer)
commit 06abd6e76a
Author: Tiago Faria <tiago.faria.backups@gmail.com >
Date: Thu May 14 14:03:23 2020 +0100
added ci tests for ecs-cloudtrail
commit 2893becf8c
Merge: 31ad8187 133319c4
Author: Tiago Faria <tiago.faria.backups@gmail.com >
Date: Thu May 14 14:02:20 2020 +0100
Merge remote-tracking branch 'upstream/master'
commit 1a598282f4
Author: zaphod <18658828+zaphodef@users.noreply.github.com >
Date: Wed May 13 11:57:10 2020 +0200
Add 'Add-Content' to powershell_ntfs_ads_access
commit d510e1aad4
Author: zaphod <18658828+zaphodef@users.noreply.github.com >
Date: Mon May 11 18:31:59 2020 +0200
Fix 'source' value for win_susp_backup_delete
commit fb9c5841f4
Author: vh <vh@socprime.com >
Date: Fri May 8 13:41:52 2020 +0300
Added Humio, Crowdstrike, Corelight
commit 31ad81874f
Author: pdr9rc <pedro.gracio@3coresec.com >
Date: Tue May 5 11:32:18 2020 +0100
capitalized titles
corrected capitalization of titles and removed literals from config
commit aa175a7d5b
Author: pdr9rc <pedro.gracio@3coresec.com >
Date: Mon May 4 18:02:27 2020 +0100
wip
wip
commit dd9e128a15
Author: pdr9rc <pedro.gracio@3coresec.com >
Date: Mon May 4 17:35:12 2020 +0100
kibana target update
kibana target now compatible with overrides
commit b32093e734
Merge: b3194e66 d298bb57
Author: pdr9rc <pedro.gracio@3coresec.com >
Date: Mon May 4 17:26:51 2020 +0100
Merge remote-tracking branch 'upstream/master'
Keeping up with the sigmas.
commit b3194e66c4
Author: pdr9rc <pedro.gracio@3coresec.com >
Date: Mon May 4 16:37:36 2020 +0100
Update base.py
commit dd85467a27
Author: Tiago Faria <tiago.faria.backups@gmail.com >
Date: Sat May 2 00:13:55 2020 +0100
Update aws_ec2_vm_export_failure.yml
commit bc0a2c7ab9
Author: pdr9rc <pedro.gracio@3coresec.com >
Date: Fri May 1 19:20:05 2020 +0100
wip
wip
commit 98391f985a
Author: pdr9rc <pedro.gracio@3coresec.com >
Date: Thu Apr 30 15:19:38 2020 +0100
wip
wip
commit adcc3766e3
Merge: 81422444 dfdb5b95
Author: pdr9rc <pedro.gracio@3coresec.com >
Date: Thu Apr 30 15:08:25 2020 +0100
Merge branch 'master' of https://github.com/3CORESec/sigma
commit 8142244449
Author: pdr9rc <pedro.gracio@3coresec.com >
Date: Thu Apr 30 15:08:20 2020 +0100
wip
wip
commit dfdb5b9550
Author: Tiago Faria <tiago.faria.backups@gmail.com >
Date: Wed Apr 29 23:59:26 2020 +0100
better description and event.outcome
commit ac4a2b1f26
Author: pdr9rc <pedro.gracio@3coresec.com >
Date: Wed Apr 29 22:55:46 2020 +0100
wip
wip
commit 9ce84a38e5
Author: pdr9rc <pedro.gracio@3coresec.com >
Date: Wed Apr 29 20:36:45 2020 +0100
overrides section support + one example rule + cloudtrail config
ditto
2020-06-05 13:18:03 -04:00
Florian Roth
2e77e65285
rule: Covenant launchers
2020-06-05 11:03:28 +02:00
Furkan ÇALIŞKAN
082696ee84
Added UUID
2020-06-04 18:38:42 +03:00
Furkan ÇALIŞKAN
e958a6a939
Date added
2020-06-04 18:34:44 +03:00
Furkan ÇALIŞKAN
5e373153eb
Title fix
2020-06-04 18:28:37 +03:00
Furkan ÇALIŞKAN
0744107fbb
Deleted EventID part
2020-06-04 18:19:08 +03:00
Furkan ÇALIŞKAN
1c677aa172
Fix title as in guideline
...
Fix title error as in guideline and other cosmetic changes
2020-06-04 18:13:32 +03:00
Furkan ÇALIŞKAN
bafd6bde5f
Convert to process_creation
...
Convert to process_creation
2020-06-04 14:45:10 +03:00
Furkan ÇALIŞKAN
09afae1e66
Create sysmon_apt_muddywater_dnstunnel.yml
...
Detecting DNS tunnel activity from MuddyWater as in https://www.virustotal.com/gui/file/5ad401c3a568bd87dd13f8a9ddc4e450ece61cd9ce4d1b23f68ce0b1f3c190b7/
2020-06-04 14:27:19 +03:00
Trent Liffick
6c8c0cd85d
Removed incorrect technique
2020-06-03 17:51:57 -04:00
Trent Liffick
3c89f46899
removed unwanted file
2020-06-03 17:43:12 -04:00
Trent Liffick
2af501c9f5
added rule for zLoader & Office
...
detects changes to Office macro settings & ZLoader malware
2020-06-03 17:40:05 -04:00
Trent Liffick
a2ca199e7d
added rules for Lazaurs and hhsgov
2020-06-03 17:38:03 -04:00
Florian Roth
d97d2ced82
Merge pull request #725 from WilliamBruneau/fix_null_list
...
Move null values out from list in rules
2020-06-03 15:53:55 +02:00
William Bruneau
84dd8c39c4
Move null values out from list in rules
2020-06-03 13:57:22 +02:00
Florian Roth
022d73f842
Merge pull request #811 from svnscha/fix/field-TargetFileName-to-TargetFilename
...
All Rules use 'TargetFilename' instead of 'TargetFileName'.
2020-06-03 10:48:05 +02:00
Sven Scharmentke
4ed512011a
All Rules use 'TargetFilename' instead of 'TargetFileName'.
...
This commit fixes the incorrect spelling.
2020-06-03 09:00:59 +02:00
Florian Roth
0cbc099def
Merge pull request #807 from forensicanalysis/master
...
Add sqlite backend
2020-05-30 09:31:45 +02:00
Jonas Plum
3a6ac5bd5c
Remove unused function
2020-05-30 01:57:06 +02:00
Jonas Plum
5cc82d0f05
Move testcase
2020-05-30 00:56:06 +02:00
Jonas Plum
4a8ab88ade
Fix test path
2020-05-30 00:15:38 +02:00
Jonas Plum
70935d26ce
Add license header
2020-05-29 23:56:05 +02:00
Florian Roth
74e16fdccd
Merge pull request #803 from gamma37/clear_cmd_history
...
Edit Clear Command History
2020-05-29 17:32:43 +02:00
Florian Roth
e20b58c421
Merge pull request #806 from SanWieb/sysmon_creation_system_file
...
Fixed wrong field & Improve rule
2020-05-29 17:32:27 +02:00
Sander Wiebing
a00f7f19a1
Add tagg Endswith
...
Prevent the trigger of {}.exe.log
2020-05-29 16:25:54 +02:00
Sander Wiebing
38afd8b5de
Fixed wrong field
2020-05-28 21:52:17 +02:00
Florian Roth
7f2fa05ed3
Merge pull request #802 from Neo23x0/rule-devel
...
ComRAT and KazuarRAT
2020-05-28 11:16:44 +02:00
gamma37
537bda4417
Update lnx_shell_clear_cmd_history.yml
2020-05-28 10:56:35 +02:00
gamma37
5a48934822
Edit Clear Command History
...
I suggest a new point of view to detect that bash_history has been cleared : Instead of trying to detect all the commands that can do that, we could monitor the size of the file and log whenever it has less than 1 line.
2020-05-28 10:52:17 +02:00
Florian Roth
39b41b5582
rule: moved DebugView rule to process creation category
2020-05-28 10:13:38 +02:00
Florian Roth
76dcc1a16f
rule: renamed debugview
2020-05-28 09:22:25 +02:00
Florian Roth
ec313b6c8a
Merge pull request #801 from SanWieb/sysmon_creation_system_file
...
Rule: sysmon_creation_system_file
2020-05-27 08:49:20 +02:00
Sander Wiebing
d44fc43c54
Add extension
2020-05-26 19:10:11 +02:00
Sander Wiebing
f6ec724d51
Rule: sysmon_creation_system_file
2020-05-26 18:53:54 +02:00
Florian Roth
5bb6770f53
Merge pull request #800 from SanWieb/win_system_exe_anomaly
...
Extended Windows processes: win_system_exe_anomaly
2020-05-26 14:28:47 +02:00
Florian Roth
4ca81b896d
rule: Turla ComRAT report
2020-05-26 14:19:22 +02:00
Sander Wiebing
3681b8cb56
Extended Windows processes
2020-05-26 13:56:51 +02:00
Florian Roth
0b398c5bf0
Merge pull request #798 from Neo23x0/rule-devel
...
rule: confluence exploit CVE-2019-3398 & Turla ComRAT
2020-05-26 13:31:57 +02:00
Florian Roth
c1f4787566
Merge pull request #797 from NVISO-BE/sysmon_cve-2020-1048
...
Changes to sysmon_cve-2020-1048
2020-05-26 13:21:04 +02:00
Florian Roth
ce1f46346f
Merge pull request #751 from zaphodef/fix/powershell_ntfs_ads_access
...
Add 'Add-Content' to powershell_ntfs_ads_access
2020-05-26 13:20:40 +02:00
Florian Roth
e131f3476e
Merge pull request #796 from EccoTheFlintstone/fp
...
add more false positives
2020-05-26 13:20:23 +02:00
Florian Roth
30861b558c
Merge pull request #799 from SanWieb/susp_file_characteristics
...
Susp file characteristics: Reduce FP of legitime processes
2020-05-26 13:20:07 +02:00
Florian Roth
b648998fd0
rule: Turla ComRAT
2020-05-26 13:18:50 +02:00
Sander Wiebing
f9f814f3b3
Shortened title
2020-05-26 13:06:27 +02:00
Sander Wiebing
a241792e10
Reduce FP of legitime processes
...
A lot of Windows apps does not have any file characteristics. Some examples:
- Gamebar: C:\\Program Files\\WindowsApps\\Microsoft.XboxGamingOverlay_3.38.25003.0_x64__8wekyb3d8bbwe\\GameBarFT.exe
- YourPhone: C:\\Program Files\\WindowsApps\\Microsoft.YourPhone_1.20022.82.0_x64__8wekyb3d8bbwe\\YourPhoneServer/YourPhoneServer.exe
All C:\Windows\System32\OpenSSH (scp, sftp, ssh etc) does not have a description and company.
Python 2.7, 3.3 and 3.7 does not have any file characteristics.
So I don't think it is possible to whitelist all options, maybe it is worthwhile to check the \Downloads\ folder otherwise it would be better to just delete the rule. All other suspicious folders are covered by /rules/windows/process_creation/win_susp_exec_folder.yml
2020-05-26 12:58:15 +02:00
Florian Roth
cdf1ade625
fix: typo in selection
2020-05-26 12:27:16 +02:00
Sander Wiebing
91b4ee8d56
Merge pull request #2 from Neo23x0/master
...
Update repository
2020-05-26 12:24:21 +02:00
Florian Roth
828484d7c6
rule: confluence exploit CVE-2019-3398
2020-05-26 12:09:41 +02:00
Remco Hofman
48c5f2ed09
Update to sysmon_cve-2020-1048
...
Added .com executables to detection
Second TargetObject should have been Details
2020-05-26 11:20:21 +02:00
Jonas Hagg
abf1a2c6d7
Adjusted Makefile
2020-05-25 11:58:55 +02:00
Jonas Hagg
dedfb65d63
Implemented Aggregation for SQL, Added SQLite FullTextSearch
2020-05-25 11:58:55 +02:00
ecco
7037e77569
add more FP
2020-05-25 04:50:22 -04:00
Florian Roth
a962bd1bc1
Merge pull request #747 from zaphodef/fix/win_susp_backup_delete_source
...
Fix 'source' value for win_susp_backup_delete
2020-05-25 10:48:36 +02:00
Florian Roth
0afe0623af
Merge pull request #757 from tliffick/master
...
added rule for Blue Mockingbird (cryptominer)
2020-05-25 10:47:23 +02:00
Florian Roth
92d0aa8654
Merge pull request #795 from SanWieb/Rule-improvement-Netsh-program-allowed
...
Rule improvement: netsh Application or Port allowed
2020-05-25 10:46:39 +02:00
Sander Wiebing
6fcf3f9ebf
Update win_netsh_fw_add.yml
2020-05-25 10:13:26 +02:00
Sander Wiebing
28652e4648
Add Windows Server 2008 and Windows Vista support
...
It did not support the command `netsh advfirewall firewall add`
2020-05-25 10:02:13 +02:00
Sander Wiebing
2678cd1d3e
Create win_netsh_fw_add_susp_image.yml
...
More critical version of the rule windows/process_creation/win_netsh_fw_add.yml with the suspicious image location check.
Combined the following rules for the suspicious locations:
https://github.com/Neo23x0/sigma//blob/master/rules/windows/sysmon/sysmon_susp_download_run_key.yml
https://github.com/Neo23x0/sigma/blob/master/rules/windows/sysmon/sysmon_susp_run_key_img_folder.yml
https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_susp_run_locations.yml
2020-05-25 09:50:47 +02:00
Sander Wiebing
4cd7c39e9d
Merge pull request #1 from Neo23x0/master
...
Update repository
2020-05-25 08:48:16 +02:00
Thomas Patzke
0dda757ca5
Merge branch 'socprime-master'
2020-05-24 22:58:58 +02:00
Thomas Patzke
daf7ab5ff7
Cleanup: removal of corelight_* backends
2020-05-24 22:41:38 +02:00
Thomas Patzke
d45f8e19fe
Fixes
2020-05-24 21:46:55 +02:00
Thomas Patzke
32e4998c49
Removed dead code from ALA backend.
2020-05-24 21:45:37 +02:00
Thomas Patzke
24b08bbf30
Merge branch 'master' of https://github.com/socprime/sigma into socprime-master
2020-05-24 17:06:32 +02:00
Florian Roth
40f0beb58d
Merge pull request #794 from SanWieb/update_susp_run_key
...
Remove AppData folder as suspicious folder
2020-05-24 16:30:10 +02:00
Sander Wiebing
b8ee736f44
Remove AppData folder as suspicious folder
...
A lot of software is using the AppData folder for startup keys. Some examples:
- Microsoft Teams (\AppData\Local\Microsoft\Teams)
- Resilio (\AppData\Roaming\Resilio Sync\)
- Discord ( (\AppData\Local\Discord\)
- Spotify ( (\AppData\Roaming\Spotify\)
Too many to whitelist them all
2020-05-24 15:16:07 +02:00
Florian Roth
6fbfa9dfdd
Merge pull request #793 from Neo23x0/rule-devel
...
Esentutl rule and StrongPity Loader UA
2020-05-23 23:47:12 +02:00
ecco
f970d28f10
add more false positives
2020-05-23 15:06:15 -04:00
Florian Roth
3028a27055
fix: buggy rule
2020-05-23 18:32:02 +02:00
Florian Roth
df715386b6
rule: suspicious esentutl use
2020-05-23 18:27:36 +02:00
Florian Roth
d0da2810c1
Merge pull request #792 from EccoTheFlintstone/fff
...
fix FP + remove powershell rule redundant with sysmon_in_memory_power…
2020-05-23 18:13:16 +02:00
Florian Roth
8321cc7ee1
Merge pull request #772 from gamma37/suspicious_activities
...
Create a rule for "suspicious activities"
2020-05-23 18:11:32 +02:00
Florian Roth
d1a5471d21
rule: Strong Pity loader UA
2020-05-23 17:38:10 +02:00
ecco
67faf4bd41
fix FP + remove powershell rule redundant with sysmon_in_memory_powershell.yml
2020-05-23 10:56:23 -04:00
Florian Roth
9cd9a301c2
Merge pull request #791 from SanWieb/master
...
added rule for Netsh RDP port opening
2020-05-23 16:50:31 +02:00
Florian Roth
e1a05dfc1c
Update lnx_auditd_susp_C2_commands.yml
2020-05-23 16:49:03 +02:00
Florian Roth
ee1ca77fad
Merge pull request #771 from gamma37/new_rules
...
Create a new rule to detect "Create Account"
2020-05-23 16:47:46 +02:00
Florian Roth
895c84703f
Merge pull request #790 from EccoTheFlintstone/fp_fix
...
fix false positive matching on every powershell process not run by SY…
2020-05-23 16:47:01 +02:00
ecco
327a53c120
add new test for sysmon rules without eventid
2020-05-23 10:25:37 -04:00
ecco
10ca3006f5
move rule where needed
2020-05-23 10:07:55 -04:00
ecco
2b89e56054
fix test
2020-05-23 10:03:13 -04:00
ecco
d9bc09c38c
fix test
2020-05-23 10:02:58 -04:00
ecco
78a7852a43
renamed dbghelp rule with new ID and comment and removed a false positive
2020-05-23 09:16:40 -04:00
Sander Wiebing
d310805ed9
rule: Netsh RDP port opening
2020-05-23 14:19:52 +02:00
ecco
75ba5f989c
add 1 more FP to wmi load
2020-05-23 07:44:45 -04:00
ecco
9a7f462d79
move renamed bnaries rule to process creation (they made a lot of false positives in sysmon as there was no event id specified in the rule)
2020-05-23 07:17:56 -04:00
ecco
cfde0625f5
fix false positive matching on every powershell process not run by SYSTEM account
2020-05-23 07:05:09 -04:00
Florian Roth
12e1aeaf9f
Merge pull request #788 from Neo23x0/rule-devel
...
refactor: split up rule for CVE-2020-1048 into 2 rules
2020-05-23 09:54:43 +02:00
Florian Roth
46f3a70a7d
Merge pull request #786 from EccoTheFlintstone/perf_fix
...
various rules cleaning (slight perf improvements)
2020-05-23 09:54:28 +02:00
Florian Roth
34006d0794
refactor: simplified and extended expression in CVE-2020-1048 rule
2020-05-23 09:16:19 +02:00
Florian Roth
57c8e63acd
refactore: split up rule for CVE-2020-1048 into 2 rules
2020-05-23 09:09:58 +02:00
ecco
ec17c2ab56
filter on createkey only when needed
2020-05-22 10:37:00 -04:00
Thomas Patzke
96fae4be68
Added CrachMapExec rules
2020-05-22 00:50:37 +02:00
Florian Roth
64e0e7ca72
Merge pull request #784 from Neo23x0/rule-devel
...
refactor: slightly improved Greenbug rule
2020-05-21 14:19:09 +02:00
Florian Roth
91c4c4ecc5
refactor: slightly improved Greenbug rule
2020-05-21 13:38:11 +02:00
Florian Roth
bbf78374b6
Merge pull request #783 from Neo23x0/rule-devel
...
Greenbug Rule
2020-05-21 09:55:46 +02:00
Florian Roth
9a3b6c1c77
docs: added MITRE ATT&CK group tag
2020-05-21 09:44:11 +02:00
Florian Roth
344eb713c5
rule: Greenbug campaign
2020-05-21 09:39:57 +02:00
Thomas Patzke
8d9b706d6a
Merge pull request #727 from 3CORESec/master
...
Override Features
2020-05-20 19:11:56 +02:00
Florian Roth
e7980bb434
Merge pull request #782 from ZikyHD/patch-1
...
Remove duplicate 'CommandLine' in fields
2020-05-20 12:55:41 +02:00
Florian Roth
af92a5bd2c
Merge pull request #780 from tatsu-i/master
...
Null field check to eliminate false positives
2020-05-20 12:55:29 +02:00
ZikyHD
8963c0a65e
Remove duplicate 'CommandLine' in fields
2020-05-20 11:54:47 +02:00
vh
e8b956f575
Updated config
2020-05-20 12:35:00 +03:00
Florian Roth
9ab65cd1c7
Update win_alert_ad_user_backdoors.yml
2020-05-19 14:50:22 +02:00
Thomas Patzke
04dfe6c5fc
Merge pull request #778 from neu5ron/sigmacs
...
SIGMACs: Winlogbeat & Zeek
2020-05-19 13:18:40 +02:00
Florian Roth
df75bdd3b6
Merge pull request #779 from neu5ron/rules
...
Rules: Zeek
2020-05-19 13:10:56 +02:00
neu5ron
7c3dea22b8
small T, big T
2020-05-19 05:13:48 -04:00
neu5ron
dd382848b4
Merge remote-tracking branch 'neu5ron-sigma/rules' into rules
2020-05-19 05:09:05 -04:00
neu5ron
602c8917ef
domain user enumeration via zeek rpc (dce_rpc) log.
2020-05-19 05:08:26 -04:00
Tatsuya Ito
c815773b1a
enhancement rule
2020-05-19 18:05:51 +09:00
neu5ron
9e272d37b7
zeek category update and minor field updates
2020-05-19 05:02:45 -04:00
Tatsuya Ito
49f68a327a
enhancement rule
2020-05-19 18:00:50 +09:00
neu5ron
177f0a783b
winlogbeat forward (at a snails pace) ECS field names
2020-05-19 04:58:51 -04:00
neu5ron
e975d3fd14
domain user enumeration via zeek rpc (dce_rpc) log.
2020-05-19 04:41:08 -04:00
neu5ron
effb2a8337
add exe webdav download
2020-05-19 04:41:00 -04:00
neu5ron
858ebcd3d3
author typo update
2020-05-19 04:35:47 -04:00
neu5ron
2fc8d513d6
zeek, swap path and name
2020-05-19 04:35:30 -04:00
ecco
0dd089db47
various rules cleaning
2020-05-18 20:29:53 -04:00
Florian Roth
4446c4cd4e
Merge pull request #773 from EccoTheFlintstone/fix_fp
...
add some false positives checks
2020-05-18 21:33:48 +02:00
Florian Roth
4bb44f02e1
Merge pull request #776 from Neo23x0/rule-devel
...
docs: missed the reference
2020-05-18 18:35:30 +02:00
Florian Roth
63238fd661
docs: missed the reference
2020-05-18 18:34:30 +02:00
Florian Roth
482c9e5449
Merge pull request #775 from Neo23x0/rule-devel
...
Godmode Sigma Rule
2020-05-18 17:21:34 +02:00
Florian Roth
8819da51c5
Merge branch 'master' into rule-devel
2020-05-18 17:05:25 +02:00
Florian Roth
08c32c9dfc
rule: godmode rule v0.3
2020-05-18 17:04:59 +02:00
ecco
1aa97fe577
flake 8
2020-05-18 10:03:18 -04:00
ecco
088800cd18
fix rule due to sigmac bug?
2020-05-18 09:39:48 -04:00
ecco
e89613aee0
add some false positives checks
2020-05-18 07:19:06 -04:00
Florian Roth
8154ca355a
Merge pull request #768 from maximelb/master
...
Remove "condition" from global rule in CVE-2020-1048.
2020-05-18 12:52:49 +02:00
Florian Roth
ad50b5f3bb
Merge pull request #769 from jaegeral/patch-2
...
replace --target-list with --lists
2020-05-18 12:50:07 +02:00
Florian Roth
f7ef96c077
Merge pull request #770 from EccoTheFlintstone/various_fix
...
standardize rules with Image and CommandLine instead of NewProcessNam…
2020-05-18 12:49:22 +02:00
gamma37
71c507d8a9
remove space bedore colon
2020-05-18 11:34:53 +02:00
gamma37
55eec46932
Create a rule for "suspicious activities"
2020-05-18 11:25:18 +02:00
gamma37
cbf06b1e43
lowercased tag
2020-05-18 10:11:32 +02:00
gamma37
904716771a
Create a new rule to detect "Create Account"
2020-05-18 10:03:34 +02:00
Alexander J
a7176d4811
replace --target-list with --lists
...
The description in the readme is outdated
````
sigmac --target-list
usage: sigmac [-h] [--recurse] [--filter FILTER]
[--target {kibana,ala-rule,splunk,ala,splunkxml,fieldlist,graylog,es-rule,qualys,arcsight-esm,mdatp,netwitness,arcsight,elastalert-dsl,sql,carbonblack,xpack-watcher,limacharlie,qradar,logiq,powershell,grep,ee-outliers,elastalert,es-qs,es-dsl,logpoint,sumologic}]
[--lists] [--config CONFIG] [--output OUTPUT]
[--backend-option BACKEND_OPTION]
[--backend-config BACKEND_CONFIG] [--defer-abort]
[--ignore-backend-errors] [--verbose] [--debug]
[inputs [inputs ...]]
sigmac: error: unrecognized arguments: --target-list
````
2020-05-18 08:11:16 +02:00
Maxime Lamothe-Brassard
25d3a5a893
Remove "condition" from global rule.
...
The condition field in this rule was in the global section which overwrote the condition in sub-rules and generated FPs. For example, once Sigma read the rule, the bottom sub-rule's "condition" was overwritten with "1 of them".
2020-05-17 12:44:57 -07:00
Florian Roth
5d1605bba2
Merge pull request #765 from Neo23x0/rule-devel
...
Rule devel
2020-05-16 09:16:19 +02:00
Florian Roth
a46e357874
Merge branch 'master' into rule-devel
2020-05-16 08:59:34 +02:00
Florian Roth
d5e7d4e302
fix: missing condition in CVE-2020-1048 rule
2020-05-16 08:59:05 +02:00
Florian Roth
4e1991cfee
Merge pull request #761 from EccoTheFlintstone/cve-2020-1048-fix
...
fix CVE 2020-1048 rule
2020-05-16 08:58:31 +02:00
ecco
fd386fe8eb
standardize rules with Image and CommandLine instead of NewProcessName and ProcessCommandLine
2020-05-15 12:35:32 -04:00
Florian Roth
7b713fbe7f
rule: OpenSSHd rule adjusted
2020-05-15 17:19:32 +02:00
ecco
0575fa8d81
fix CVE 2020-1048 rule
2020-05-15 07:25:05 -04:00
Florian Roth
b672d7aeb4
Merge pull request #759 from Neo23x0/rule-devel
...
Rule devel
2020-05-15 12:25:46 +02:00
Florian Roth
cc26b26377
Merge branch 'master' into rule-devel
...
# Conflicts:
# rules/windows/sysmon/sysmon_cve-2020-1048.yml
2020-05-15 12:09:47 +02:00
Florian Roth
8e7caf0e4d
rule: CVE-2020-1048
2020-05-15 12:08:31 +02:00
Florian Roth
8e082283f0
Merge pull request #754 from Neo23x0/rule-devel
...
Rule devel
2020-05-15 12:07:04 +02:00
Florian Roth
beb62dc163
fix: condition location
2020-05-15 12:06:34 +02:00
Florian Roth
5854cc4677
fix: small bug in new CVE-2020-1048 rule
2020-05-15 11:37:46 +02:00
Florian Roth
2282432b6f
Merge pull request #753 from hieuttmmo/master
...
New Sigma rule to detect possible CVE-2020-1048 exploitation and Suspicious network connection from Notepad
2020-05-15 11:35:12 +02:00
Florian Roth
28dc2a2267
Minor changes
...
hints:
- contains doesn't require wildcards in the strings
- we can use 'endswith' instead of wildcard at the beginning of the string (it's the new way to describe it, we have to change all old rules that contain these wildcards some day)
- we can use "1 of them" to say that 1 of the conditions has to match
2020-05-15 11:33:36 +02:00
Florian Roth
d8cd396697
Merge pull request #758 from EccoTheFlintstone/fix_fp
...
remove false positives with cmd as child of services.exe (not specifi…
2020-05-15 11:28:05 +02:00
ecco
54cf535dbc
remove false positives with cmd as child of services.exe (not specifically related to meterpreter/cobaltstrike)
2020-05-15 04:45:25 -04:00
Trent Liffick
40ab1b7247
added 'action: global'
2020-05-14 23:33:08 -04:00
Trent Liffick
56a2747a70
Corrected missing condition
...
learning! fail fast & forward
2020-05-14 23:18:33 -04:00
Trent Liffick
fb1d8d7a76
Corrected typo
2020-05-14 23:04:14 -04:00
Trent Liffick
8aff6b412e
added rule for Blue Mockingbird (cryptominer)
2020-05-14 22:58:23 -04:00
Florian Roth
d25b8a0492
docs: remove GPL reference, DRL in README
2020-05-14 15:56:39 +02:00
Florian Roth
ab950fb89d
fix: removed rules missing in master
2020-05-14 15:53:09 +02:00
Tiago Faria
06abd6e76a
added ci tests for ecs-cloudtrail
2020-05-14 14:03:23 +01:00
Tiago Faria
2893becf8c
Merge remote-tracking branch 'upstream/master'
2020-05-14 14:02:20 +01:00
Tran Trung Hieu
e53a97fa2f
Update condition to filter out printer port
2020-05-14 18:22:49 +07:00
Tran Trung Hieu
443bf09d27
Add author
2020-05-14 18:10:16 +07:00
Tran Trung Hieu
e74970cea0
Suspicious network connection from notepad.exe
2020-05-14 18:08:30 +07:00
Tran Trung Hieu
97b690d340
Change level from Critical to High
2020-05-14 09:02:54 +07:00
Thomas Patzke
133319c417
Merge pull request #737 from NVISO-BE/backend-ee-outliers
...
ee-outliers backend
2020-05-13 22:38:02 +02:00
Florian Roth
7652813c2c
Merge pull request #752 from zaphodef/fix/win_susp_script_execution_false_negatives
...
Widen the search as it gives too many false negatives
2020-05-13 21:02:12 +02:00
Tran Trung Hieu
d0b1c98d5a
Reformat rule
2020-05-14 00:39:41 +07:00
Tran Trung Hieu
3e5b33388b
New rule to detect possible CVE-2020-1048 exploitation
2020-05-14 00:24:36 +07:00
zaphod
78a5c743f2
Widen the search as it gives too many false negatives
2020-05-13 16:20:23 +02:00
Florian Roth
78a8266a1b
Merge pull request #749 from teddy-ROxPin/patch-6
...
Create win_advanced_ip_scanner.yml
2020-05-13 14:09:12 +02:00
hieuttmmo
9ad3427d68
Merge pull request #1 from Neo23x0/master
...
Update
2020-05-13 18:36:52 +07:00
Florian Roth
220a14f31c
fix: typo in contains
2020-05-13 12:38:54 +02:00
zaphod
1a598282f4
Add 'Add-Content' to powershell_ntfs_ads_access
2020-05-13 11:57:10 +02:00
Florian Roth
a1856c5743
Update win_advanced_ip_scanner.yml
2020-05-13 11:56:25 +02:00
Florian Roth
904a31103d
Merge pull request #750 from zaphodef/fix/win_bootconf_mod_bad_commandline
...
Fix a bad CommandLine search
2020-05-13 11:55:16 +02:00
zaphod
a9ef7ef382
Fix a bad CommandLine search
2020-05-13 11:32:05 +02:00
teddy_ROxPin
bb17fd74ee
Create win_advanced_ip_scanner.yml
...
Detects the use of Advanced IP Scanner. Seems to be a popular tool for ransomware groups.
2020-05-12 21:43:01 -06:00
Florian Roth
e01734fda1
rule: proxy UA hidden cobra
2020-05-12 17:43:54 +02:00
zaphod
d510e1aad4
Fix 'source' value for win_susp_backup_delete
2020-05-11 18:31:59 +02:00
Florian Roth
37c33cb6d9
Merge pull request #743 from tliffick/master
...
Registry entry for Azorult malware
2020-05-11 16:37:15 +02:00
Remco Hofman
37b08543ac
Updated author reference in license
2020-05-11 11:47:56 +02:00
Florian Roth
1104044f53
fix: delete duplicate rules
2020-05-11 10:55:02 +02:00
Florian Roth
2b18b66c16
Merge branch 'master' into rule-devel
2020-05-11 10:50:10 +02:00
Florian Roth
4366a95024
rule: Maze ransomware
2020-05-11 10:46:26 +02:00
Florian Roth
f96c3a5fd4
Merge branch 'master' into rule-devel
...
# Conflicts:
# rules/proxy/proxy_ua_suspicious.yml
# rules/windows/process_creation/win_install_reg_debugger_backdoor.yml
# rules/windows/process_creation/win_susp_csc_folder.yml
2020-05-11 10:44:19 +02:00
Florian Roth
09d1b00459
Changed level to ciritcal
2020-05-11 10:40:23 +02:00
tliffick
c98be55d21
Update mal_azorult_reg.yml
2020-05-08 21:31:33 -04:00
tliffick
61f061333b
Registry entry for Azorult malware
...
Detects registry keys used by Azorult malware
2020-05-08 21:26:24 -04:00
Remco Hofman
c5c5e1b79b
Added ee-outliers test to Makefile
2020-05-08 17:51:35 +02:00
Florian Roth
fd7968d4f8
Merge pull request #734 from NVISO-BE/win_susp_failed_logon_source
...
New rule: Failed Logon From Public IP
2020-05-08 16:24:12 +02:00
vh
fb9c5841f4
Added Humio, Crowdstrike, Corelight
2020-05-08 13:41:52 +03:00
Florian Roth
64a5ad0d07
Merge pull request #735 from nl5887/master
...
fix incorrect use of action global
2020-05-08 12:20:33 +02:00
Remco Hofman
dc96b7ffb3
Removed dependency on slugify
2020-05-08 11:40:16 +02:00
Remco Hofman
2d3ee85c46
README updates
2020-05-08 10:40:41 +02:00
Remco Hofman
c5be83eb01
Added ee-outliers backend
2020-05-08 10:18:35 +02:00
Thomas Patzke
3b96b5e497
Merge pull request #723 from neu5ron/socprime_add_zeek_and_corelight
...
sigmacs for Zeek and Corelight(Zeek)
2020-05-06 23:22:14 +02:00
Remco Verhoef
2d38cb7b52
fix incorrect use of global
2020-05-06 23:00:45 +02:00
Remco Verhoef
40539a0c0e
fix incorrect use of action global
2020-05-06 22:53:02 +02:00
Remco Hofman
123a23adae
win_susp_failed_logon_source rule
2020-05-06 22:24:02 +02:00
Thomas Patzke
1797a1e56b
Merge pull request #733 from NVISO-BE/fix-732
...
Fix for broken endswith modifier
2020-05-06 22:17:08 +02:00
Remco Hofman
24029a8f27
Fix for broken endswith modifier
2020-05-06 17:10:54 +02:00
Florian Roth
1ce527c9be
Merge pull request #729 from Rettila/master
...
Rule correction and enhancement
2020-05-05 19:25:49 +02:00
Florian Roth
473c31232e
add additional reference
2020-05-05 19:25:33 +02:00
Rettila
0e1fa5c135
Update win_possible_dc_shadow.yml
2020-05-05 18:14:32 +02:00
Rettila
55d018255c
Update win_possible_dc_shadow.yml
2020-05-05 16:52:08 +02:00
Rettila
3302c63e0c
Update and rename win_possible_dc_sync.yml to win_possible_dc_shadow.yml
2020-05-05 16:51:35 +02:00
Rettila
f27aa4bfee
Update win_possible_dc_sync.yml
2020-05-05 16:50:13 +02:00
Rettila
db810b342f
Delete win_possible_dc_shadow.yml
2020-05-05 16:48:39 +02:00
Rettila
e3f21805f3
Update win_possible_dc_shadow.yml
2020-05-05 16:43:56 +02:00
Rettila
0f4cc9d365
Create win_possible_dc_shadow.yml
2020-05-05 16:40:52 +02:00
pdr9rc
31ad81874f
capitalized titles
...
corrected capitalization of titles and removed literals from config
2020-05-05 11:32:18 +01:00
neu5ron
a01a85cf9b
CI/CD check fixes (missing ID's)
2020-05-04 15:22:18 -04:00
neu5ron
90730508f0
Merge remote-tracking branch 'neu5ron-sigma/socprime_add_zeek_and_corelight' into socprime_add_zeek_and_corelight
2020-05-04 15:17:54 -04:00
neu5ron
a61b1da47a
fixed yaml space causing condition to not be found
2020-05-04 15:17:43 -04:00
neu5ron
98f163e752
fixed yaml space causing condition to not be found
2020-05-04 15:10:48 -04:00
pdr9rc
aa175a7d5b
wip
...
wip
2020-05-04 18:02:27 +01:00
pdr9rc
dd9e128a15
kibana target update
...
kibana target now compatible with overrides
2020-05-04 17:35:12 +01:00
pdr9rc
b32093e734
Merge remote-tracking branch 'upstream/master'
...
Keeping up with the sigmas.
2020-05-04 17:26:51 +01:00
pdr9rc
b3194e66c4
Update base.py
2020-05-04 16:37:36 +01:00
Florian Roth
d298bb5714
Merge pull request #480 from hillu/override-coverage
...
Make coverage binary overridable
2020-05-02 18:50:58 +02:00
Wietze
2b3828730c
Reversed disabling FileDelete
2020-05-02 17:31:50 +01:00
Wietze
e5574e07f2
Disabled FileDelete event (Sysmon 11 - no rules available yet)
2020-05-02 16:21:56 +01:00
Wietze
5abf4cbea9
Reordered fields
2020-05-02 14:46:55 +01:00
Wietze
661108903b
Minor consistency fix
2020-05-02 14:37:37 +01:00
Wietze
46737cbfd3
Improved Microsoft ATP mapping, using Advanced Hunting Schema
...
See https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-schema-reference
2020-05-02 14:31:02 +01:00
Florian Roth
030898ba9c
Merge branch 'master' into override-coverage
2020-05-02 14:22:03 +02:00
Florian Roth
c71e10a7f3
Merge pull request #717 from Karneades/renamedbinary
...
Add netsh to renamed binary rule
2020-05-02 14:12:34 +02:00
Florian Roth
b4b9b0155f
Merge pull request #716 from Karneades/patch-1
...
Add rule to detect wifi creds harvesting using netsh
2020-05-02 14:12:10 +02:00
Florian Roth
7f8baee10d
Merge pull request #720 from 0xThiebaut/specification
...
Update rules to follow the Sigma state specification
2020-05-02 14:11:45 +02:00
neu5ron
d300027848
on behalf of @socprime [SOC Prime Inc.]( https://my.socprime.com/en/tdm/ )
...
add rules for Zeek. This includes Windows Event Channel Security EventID:5145 that have same fields as Zeek SMB
Also, converted some of (MITRE ATT&CK BZAR)[https://github.com/mitre-attack/bzar ] which are Zeek (sensor) scripts.
2020-05-02 07:27:51 -04:00
neu5ron
c66540c029
on behalf of @socprime [SOC Prime Inc.]( https://my.socprime.com/en/tdm/ )
...
create `zeek` folder to store Zeek rules
2020-05-02 07:25:21 -04:00
neu5ron
cbe5af01a1
on behalf of @socprime [SOC Prime Inc.]( https://my.socprime.com/en/tdm/ )
...
add a total of 5 sigmac's (sigma configs) for 3 different backends. full git message to follow in PR.
2020-05-02 07:23:11 -04:00
Tiago Faria
dd85467a27
Update aws_ec2_vm_export_failure.yml
2020-05-02 00:13:55 +01:00
Thomas Patzke
2fafff3278
Fixed: escaping of backslashes before added *
...
Fixes issue #722 .
2020-05-02 00:13:15 +02:00
pdr9rc
bc0a2c7ab9
wip
...
wip
2020-05-01 19:20:05 +01:00
pdr9rc
98391f985a
wip
...
wip
2020-04-30 15:19:38 +01:00
pdr9rc
adcc3766e3
Merge branch 'master' of https://github.com/3CORESec/sigma
2020-04-30 15:08:25 +01:00
pdr9rc
8142244449
wip
...
wip
2020-04-30 15:08:20 +01:00
Tiago Faria
dfdb5b9550
better description and event.outcome
2020-04-29 23:59:26 +01:00
pdr9rc
ac4a2b1f26
wip
...
wip
2020-04-29 22:55:46 +01:00
pdr9rc
9ce84a38e5
overrides section support + one example rule + cloudtrail config
...
ditto
2020-04-29 20:36:45 +01:00
Maxime Thiebaut
4600bf73dc
Update rules to follow the Sigma state specification
...
The [Sigma specification's status component](https://github.com/Neo23x0/sigma/wiki/Specification#status-optional ) states the following:
> Declares the status of the rule:
> - stable: the rule is considered as stable and may be used in production systems or dashboards.
> - test: an almost stable rule that possibly could require some fine tuning.
> - experimental: an experimental rule that could lead to false results or be noisy, but could also identify interesting events.
However the Sigma Rx YAML specification states the following:
> ```yaml
> status:
> type: //any
> of:
> - type: //str
> value: stable
> - type: //str
> value: testing
> - type: //str
> value: experimental
> ```
The specification confuses the `test` and `testing` state. This commit changes the `test` state into the `testing` state which is already used in the code-base:
- [`sigma/sigma-schema.rx.yml`](https://github.com/Neo23x0/sigma/blob/a805d18bbae60d3e4f291c8a18304104ed2e71c7/sigma-schema.rx.yml#L49 )
- [`sigma/tools/sigma/filter.py`](https://github.com/Neo23x0/sigma/blob/f3c60a63099f80296c8750aaba667e98ac71a4f7/tools/sigma/filter.py#L26 )
- [`sigma/tools/sigmac`](https://github.com/Neo23x0/sigma/blob/4e42bebb3480720966a59528cd8482c6271e603c/tools/sigmac#L98 )
Although not modifyable through a PR, the specification should furthermore be updated to use the `testing` state.
2020-04-24 20:50:31 +02:00
Andreas Hunkeler
7d437c2969
Add netsh to renamed binary rule
2020-04-20 17:12:25 +02:00
Andreas Hunkeler
d4e9606266
Improve netsh wifi rule another time due to arg shortcut
2020-04-20 16:40:03 +02:00
Andreas Hunkeler
af498d8a8c
Improve rule to detect argument shortcut in netsh wlan rule
2020-04-20 16:32:25 +02:00
Andreas Hunkeler
ba541c3952
Fix title for new netsh wifi rule
2020-04-20 16:20:45 +02:00
Andreas Hunkeler
d9e5274c9e
Add rule to detect wifi creds harvesting using netsh
2020-04-20 16:14:44 +02:00
Florian Roth
514bd8657b
Merge pull request #704 from Iveco/master
...
Detect Ghost-In-The-Logs (disabling/bypassing ETW)
2020-04-14 14:11:27 +02:00
Florian Roth
2e0e170058
Merge pull request #708 from teddy-ROxPin/patch-4
...
Create powershell_create_local_user.yml
2020-04-14 14:11:15 +02:00
Florian Roth
3175a48bdc
Casing
2020-04-14 13:40:34 +02:00
Florian Roth
ecdec93800
Casing
2020-04-14 13:39:58 +02:00
Florian Roth
5cbe008350
Casing
2020-04-14 13:39:22 +02:00
Florian Roth
5ee0808619
Merge pull request #706 from vesche/update_win_susp_netsh_dll_persistence
...
Update win_susp_netsh_dll_persistence.yml
2020-04-14 13:37:53 +02:00
Florian Roth
4f469c0e39
Adjusted level
2020-04-14 13:37:10 +02:00
Florian Roth
8f40c0a1c8
Merge pull request #710 from vesche/update_win_GPO_scheduledtasks
...
Update win_GPO_scheduledtasks.yml
2020-04-14 13:36:17 +02:00
Florian Roth
b2754af46b
Merge pull request #711 from 0xThiebaut/sysmon_registry_persistence_search_order
...
Add Windows Registry Persistence COM Search Order Hijacking
2020-04-14 13:35:56 +02:00
Maxime Thiebaut
86c6891427
Add Windows Registry Persistence COM Search Order Hijacking
2020-04-14 12:59:29 +02:00
vesche
1f918253e8
Add additional reference
2020-04-13 11:09:36 -05:00
vesche
9cdb3a4a64
Fix typo
2020-04-13 11:09:00 -05:00
teddy-ROxPin
1501331f77
Create powershell_create_local_user.yml
...
Adds coverage for creating a local account via PowerShell from https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1136/T1136.md#atomic-test-4---create-a-new-user-in-powershell
2020-04-11 02:51:05 -06:00
vesche
3889be6255
Replace reference link for win_susp_netsh_dll_persistence
2020-04-10 01:05:10 -05:00
vesche
82db80bee6
Remove wrong mitre technique
2020-04-10 01:02:43 -05:00
vesche
72b821e046
Update win_susp_netsh_dll_persistence.yml
2020-04-09 11:16:18 -05:00
Iveco
61b9234d7f
Update win_user_driver_loaded.yml
...
removed internal field
2020-04-09 11:28:19 +02:00
Thomas Patzke
1c5c8047fd
Fixes
...
* Removed commented debug print statements
* Defined nullExpression
* Removed unneeded generateMapItemNode method
* Value cleaning bug on matching of wildcard at first character
2020-04-08 23:43:46 +02:00
Thomas Patzke
72c2241bb4
Cleanup
...
* Added CI test
* Added changelog entry
2020-04-08 23:39:38 +02:00
Thomas Patzke
3277cec7aa
Reverted list sorting
...
This was already implemented meanwhile in a previous commit.
2020-04-08 23:23:44 +02:00
Thomas Patzke
cf896c3093
Merge branch 'master' of https://github.com/abhikhnvasara/sigma into pr-630
2020-04-08 23:16:39 +02:00
Thomas Patzke
551a94af04
Merge branch 'master' of https://github.com/tileo/sigma into pr-658
2020-04-08 22:43:48 +02:00
Thomas Patzke
7224af54b2
Merge pull request #664 from j91321/es-rule-options
...
es-rule backend options for index-patterns and time interval
2020-04-08 22:39:45 +02:00
Thomas Patzke
1b7f33f5e2
Fixed undefined value in exception handling
...
Fixes issue #702 .
2020-04-08 22:28:47 +02:00
Iveco
e913db0dca
Update win_user_driver_loaded.yml
...
CI
2020-04-08 18:54:59 +02:00
Iveco
c5211eb94a
Update sysmon_susp_service_installed.yml
...
CI
2020-04-08 18:54:46 +02:00
Iveco
4520082ef7
Update sysmon_susp_procexplorer_driver_created_in_tmp_folder.yml
...
CI
2020-04-08 18:54:37 +02:00
Iveco
6d85650390
Update sysmon_susp_procexplorer_driver_created_in_tmp_folder.yml
...
Fixed Author
2020-04-08 18:41:33 +02:00
Iveco
fc1febdebe
Update sysmon_susp_service_installed.yml
...
Fixed Author
2020-04-08 18:41:25 +02:00
Iveco
d0746b50f4
Update win_user_driver_loaded.yml
...
Fixed author
2020-04-08 18:41:16 +02:00
Iveco
3280a1dfb0
Update sysmon_susp_procexplorer_driver_created_in_tmp_folder.yml
...
Fixed CI
2020-04-08 18:23:29 +02:00
Iveco
5e724a0a54
Update sysmon_susp_service_installed.yml
...
Fixed CI
2020-04-08 18:22:51 +02:00
Iveco
d1b9c0c34a
Update win_user_driver_loaded.yml
...
Fixed CI
2020-04-08 18:21:59 +02:00
iveco
e87f2705a7
Detect Ghost-In-The-Logs (disabling/bypassing ETW)
2020-04-08 18:01:04 +02:00
Florian Roth
f50767c400
Merge pull request #703 from 0xThiebaut/downgrade
...
Update the NTLM downgrade registry paths
2020-04-07 18:13:29 +02:00
Maxime Thiebaut
73a6428345
Update the NTLM downgrade registry paths
...
Recent windows versions rely on the ["MSV1_0" authentication package](https://docs.microsoft.com/en-us/windows/win32/secauthn/msv1-0-authentication-package ). Production environment tests have shown that NTLM downgrade attacks can be performed as detected by this rule although some of the registry keys are located in an "Lsa" subkey ("MSV1_0"). This commit introduces additionnal wildcards to handle these cases to ensure the previous detection rules are still included.
2020-04-07 17:14:45 +02:00
j91321
3470011ac3
Revert time interval, use index values provided by sigmaparser
2020-04-05 20:30:57 +02:00
Thomas Patzke
693830fa83
Merge pull request 659
2020-04-03 23:46:53 +02:00
Florian Roth
2a579a0a1b
Merge pull request #699 from mpavlunin/patch-2
...
Create new rule T1223
2020-04-03 19:32:50 +02:00
Florian Roth
4e3985866b
Update and rename sysmon_win_chm.yml to win_html_help_spawn.yml
2020-04-03 16:50:48 +02:00
mpavlunin
81d0f82272
Create new rule T1223
...
Suspicious Compiled HTML File
2020-04-03 16:56:26 +03:00
Florian Roth
0ea2db8b9e
Merge pull request #484 from hieuttmmo/master
...
New sigma rules to detect new MITRE technique in last update (T1502)
2020-04-03 09:59:36 +02:00
Florian Roth
f4928e95bc
Update powershell_suspicious_profile_create.yml
2020-04-03 09:36:17 +02:00
Florian Roth
c0ab9c5745
Merge pull request #671 from HarishHary/powershell_downgrade_attack
...
Powershell downgrade attack (small improvements)
2020-04-03 09:31:33 +02:00
Florian Roth
6cf0edc076
Merge pull request #685 from teddy-ROxPin/patch-1
...
Typo fix for powershell_suspicious_invocation_generic.yml
2020-04-03 09:30:32 +02:00
Florian Roth
aa73c39a35
Merge pull request #692 from Neo23x0/ci-deploy
...
PyPI deployment via GitHub Actions
2020-04-03 09:29:49 +02:00
Florian Roth
eef8531a72
Merge pull request #697 from refractionPOINT/lc-remove-timeframe
...
Remove generation of LC rules with timeframe.
2020-04-03 09:29:12 +02:00
Maxime Lamothe-Brassard
f92c5e9b18
Remove generation of LC rules with timeframe.
2020-04-02 15:25:30 -07:00
Florian Roth
ee7babd8cb
fix: security vulnerability with pyyaml < 4.2b1
2020-04-02 12:27:53 +02:00
Florian Roth
dec0c108f9
Merge pull request #683 from NVISO-BE/powershell_wmimplant
...
WMImplant detection rule
2020-04-02 11:54:09 +02:00
Florian Roth
1196f8d60f
Merge pull request #695 from cobsec/master
...
Date typos
2020-04-02 10:20:18 +02:00
Chris O'Brien
fe5dbece3d
Date typos...more than I thought...
2020-04-02 10:00:00 +02:00
Chris O'Brien
97c0872c81
Date typo.
2020-04-02 09:53:09 +02:00
Thomas Patzke
0db3bbb097
Merge pull request #693 from Neo23x0/dependabot/pip/pyyaml-5.1
...
Bump pyyaml from 3.13 to 5.1
2020-04-01 23:25:57 +02:00
Florian Roth
af49c24419
Merge pull request #694 from cobsec/master
...
Fixed date typo - by the looks of the commit date the month/date were…
2020-04-01 18:28:14 +02:00
Chris O'Brien
95e0b12d88
Fixed date typo - by the looks of the commit date the month/date were swapped.
2020-04-01 18:18:13 +02:00
Thomas Patzke
13dbb4cdbd
Moved tools into sigma namespace
2020-03-31 23:46:58 +02:00
dependabot[bot]
c9c73bec3f
Bump pyyaml from 3.13 to 5.1
...
Bumps [pyyaml](https://github.com/yaml/pyyaml ) from 3.13 to 5.1.
- [Release notes](https://github.com/yaml/pyyaml/releases )
- [Changelog](https://github.com/yaml/pyyaml/blob/master/CHANGES )
- [Commits](https://github.com/yaml/pyyaml/compare/3.13...5.1 )
Signed-off-by: dependabot[bot] <support@github.com >
2020-03-31 20:40:52 +00:00
Thomas Patzke
2bda0e097f
Merge pull request #691 from Neo23x0/cleanup
...
Cleanup
2020-03-31 22:37:04 +02:00
Thomas Patzke
8c69c7bb02
PyPI deployment via GitHub Actions
2020-03-31 22:36:16 +02:00
Florian Roth
6aba430de6
fix: sigma_uuid occurances
2020-03-31 16:29:58 +02:00
Florian Roth
8e39b09ba5
Merge pull request #690 from cnotin/patch-1
...
Small typo
2020-03-31 16:27:21 +02:00
Clément Notin
18cdddb09e
Small typo
2020-03-31 15:22:00 +02:00
Florian Roth
4d67dff89a
fix: renamed tools to allow for console_scripts list entries
2020-03-31 14:07:34 +02:00
Florian Roth
18e505c458
fix: list_configurations default values
2020-03-31 12:42:02 +02:00
Florian Roth
c82156a3c9
fix: second list_configurations function params
2020-03-31 11:46:05 +02:00
Florian Roth
23ce69eaae
fix: functions parameters outside of main
2020-03-31 11:42:16 +02:00
Florian Roth
bb50571b13
fix: print_verbose scope
2020-03-31 11:35:21 +02:00
Florian Roth
c83b4fd37c
fix: fixing script install for Windows end systems
2020-03-31 11:30:47 +02:00
Florian Roth
536ad78fc2
refactor: following best practices reg main functions in Python
...
https://realpython.com/python-main-function/
2020-03-31 11:30:14 +02:00
Florian Roth
6a70bdb126
Merge pull request #689 from 0xThiebaut/win_ad_enumeration
...
Add AD User Enumeration
2020-03-31 10:56:48 +02:00
Maxime Thiebaut
8dcbfd9aca
Add AD User Enumeration
...
When the "Read all properties" permission of a user object is set to be
audited in the AD, an event of ID 4662 (An operation was performed on an
object) is triggered whenever a property is accessed.
This rule detects these events by flagging any non-machine
`SubjectUserName` (i.e. another user) which accesses an object of the
`User` AD schema class.
Advantages of this rule include the detection of insider-enumeration
through automated tools such as BloodHound or manually through the usage
of the PowerShell ActiveDirectory module. Although this rule qualifies
as a medium severity one, this event could be qualified as high/critical
one if flagged on non-used canary user-accounts.
False positives may include administrators performing the initial
configuration of new users.
2020-03-31 09:40:07 +02:00
Remco Hofman
b791d599ee
Disabled keywords that could cause FPs
2020-03-30 08:53:52 +02:00
Thomas Patzke
d33f4b290d
Dependency cleanup
...
* Consolidated dependencies into main and development (MISP and test
intergrated).
* Splitted Pipfile dependencies into main and development
* Specified compatible dependencies
2020-03-29 22:55:09 +02:00
Thomas Patzke
38a5fe3a29
Removed Travis CI configuration
2020-03-29 22:20:04 +02:00
Florian Roth
f2a2420e24
Merge pull request #687 from Neo23x0/ci-testing
...
Ci testing
2020-03-29 17:25:28 +02:00
Thomas Patzke
4dbe5e2f17
Moved Elasticsearch dependencies to generic dependencies
...
Omitting waiting for Elasticsearch as it should be started at this time.
2020-03-29 15:19:13 +02:00
Thomas Patzke
5e258efbe7
Improved Elasticsearch waiting process
2020-03-29 14:57:34 +02:00
Thomas Patzke
d68b900077
Wait for Elasticsearch before running tests
2020-03-29 14:37:27 +02:00
Thomas Patzke
821a631325
Run Elasticsearch installation as root
2020-03-29 14:00:15 +02:00
Thomas Patzke
fbe40bd1e8
Fixed Elasticsearch test
...
* Splitted into separate action
* Install dependencies
2020-03-29 13:41:03 +02:00
Thomas Patzke
d24c1e2800
CI testing with GitHub Actions
2020-03-29 13:25:04 +02:00
teddy-ROxPin
1a3731f7ae
Typo fix for powershell_suspicious_invocation_generic.yml
...
' - windowstyle hidden ' changed to ' -windowstyle hidden '
2020-03-29 04:16:15 -06:00
Florian Roth
8ea6b12eed
Merge pull request #670 from 0xThiebaut/sysmon_susp_desktop_ini
...
Add "Suspicious desktop.ini Action" rule
2020-03-28 13:34:01 +01:00
Florian Roth
fe5b5a7782
Merge pull request #673 from j91321/rules-minor-fixes
...
Minor fixes to several rules
2020-03-28 13:27:05 +01:00
Florian Roth
5f0250bff5
Merge pull request #669 from 0xThiebaut/winlogbeat-rulename
...
Add Winlogbeat's RuleName field to mapping
2020-03-28 13:20:08 +01:00
Florian Roth
e2b90220a2
Update sysmon_susp_desktop_ini.yml
2020-03-28 13:19:10 +01:00
Florian Roth
bbb10a51f4
Update win_powershell_downgrade_attack.yml
2020-03-28 13:17:58 +01:00
Florian Roth
0e94eb9e86
Update win_powershell_downgrade_attack.yml
2020-03-28 13:12:07 +01:00
Florian Roth
2426b39d83
Merge pull request #678 from justintime/title_collision
...
Eliminate title collision
2020-03-28 12:57:55 +01:00
Florian Roth
597d914b71
Merge pull request #679 from Iveco/master
...
add LDAPFragger detections
2020-03-28 12:57:33 +01:00
Remco Hofman
f52ed4150d
WMImplant parameter detection
2020-03-27 15:08:35 +01:00
Iveco
55258e1799
Title capitalized
2020-03-26 17:04:08 +01:00
Iveco
3f577c98e7
Title capalized
2020-03-26 17:03:33 +01:00
Iveco
68c20dca20
Fixed title length
2020-03-26 16:56:46 +01:00
Iveco
39a3af04ce
Fixed title length
2020-03-26 16:56:06 +01:00
Justin Ellison
dabc759136
Eliminate title collision
...
Fixing the problem described in HELK here: https://github.com/Cyb3rWard0g/HELK/issues/442 where when running sigmac to generate elastalert rules, this rule has a title collision with another rule in the same directory and causes elastalert to fail to start.
2020-03-26 09:13:52 -05:00
iveco
ddacde9e6b
add LDAPFragger detections
2020-03-26 15:13:36 +01:00
Florian Roth
0e973d1454
Merge pull request #677 from Neo23x0/devel
...
Devel
2020-03-25 19:14:03 +01:00
Florian Roth
28953a2942
fix: MITRE tags in rule
2020-03-25 18:11:04 +01:00
Florian Roth
6584729a0d
rule: powershell downloadfile
2020-03-25 14:58:14 +01:00
Florian Roth
e206cbda7f
Merge pull request #676 from Neo23x0/devel
...
Devel
2020-03-25 14:54:56 +01:00
Florian Roth
35e43db7a7
fix: converted CRLF line break to LF
2020-03-25 14:36:34 +01:00
Florian Roth
17297193c7
Merge branch 'master' into devel
2020-03-25 14:18:11 +01:00
Florian Roth
0e1ff440db
fix: updated MITRE tags in test
2020-03-25 14:04:22 +01:00
Florian Roth
50b0d04ee8
rule: Exploited CVE-2020-10189 Zoho ManageEngine
2020-03-25 14:02:53 +01:00
Florian Roth
28d8b87a0f
rule: extended web shell spawn rule
2020-03-25 14:02:39 +01:00
Thomas Patzke
004eaf0615
Revert "do not escape u"
...
This reverts commit aa112cbd44 .
This was a fix for a previous bug.
2020-03-24 23:36:12 +01:00
j91321
1d86e0b4a5
Change falsepositives to array
2020-03-24 19:59:54 +01:00
j91321
c784adb10b
Wrong indentation falsepositives
2020-03-24 19:55:41 +01:00
j91321
98a633e54c
Add missing status and falsepositives
2020-03-24 19:53:41 +01:00
j91321
3c74d8b87d
Add correct Source to detection to avoid FP
2020-03-24 19:49:24 +01:00
j91321
bc442d3021
Add path with lowercase system32
2020-03-24 19:48:24 +01:00
j91321
78bfa950d7
Add WinPrvSE.exe to detection
2020-03-24 19:47:10 +01:00
Thomas Patzke
5ea623506f
Merge pull request #667 from opflep/master
...
Upgrade CarbonBlack backend
2020-03-22 00:24:57 +01:00
Thomas Patzke
c10332b06c
Merge pull request #663 from neu5ron/updates_sigmac_and_rules
...
Updates sigmac and rules
2020-03-22 00:22:31 +01:00
Harish SEGAR
a88b22a1bd
Fix namefield.
2020-03-20 23:34:15 +01:00
Harish SEGAR
67694e4ba7
Restructure new improvement to process_creation folder.
2020-03-20 23:29:32 +01:00
Harish SEGAR
b9a916ceb4
Removed useless condition.
2020-03-20 22:50:26 +01:00
Harish SEGAR
30fac9545a
Fixed author field.
2020-03-20 22:49:07 +01:00
Harish SEGAR
1f251cec07
Added missing action field
2020-03-20 22:46:19 +01:00
Harish SEGAR
293018a9e7
Added conditions...
2020-03-20 22:33:14 +01:00
Harish SEGAR
74b81120e4
Usage of value modifiers...
2020-03-20 22:03:48 +01:00
Harish SEGAR
b129f09fee
Improvement detection on downgrade of powershell
2020-03-20 21:48:19 +01:00
Maxime Thiebaut
dce18b23b7
Add "Suspicious desktop.ini Action" rule
2020-03-19 21:43:03 +01:00
Maxime Thiebaut
c5bdd18d8d
Add Winlogbeat's RuleName field to mapping
...
When Sysmon logs a "RegistryEvent" event of ID 13, the event might contain a field named "RuleName" as shown in the following excerpt.
```xml
<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<Events>
<Event
xmlns='http://schemas.microsoft.com/win/2004/08/events/event '>
<System>
<Provider Name='Microsoft-Windows-Sysmon' Guid='{5770385f-c22a-43e0-bf4c-06f5698ffbd9}'/>
<EventID>13</EventID>
<Version>2</Version>
<Level>4</Level>
<Task>13</Task>
<Opcode>0</Opcode>
<Keywords>0x8000000000000000</Keywords>
<TimeCreated SystemTime='2020-03-18T03:52:07.173448000Z'/>
<EventRecordID>160631</EventRecordID>
<Correlation/>
<Execution ProcessID='2156' ThreadID='3628'/>
<Channel>Microsoft-Windows-Sysmon/Operational</Channel>
<Computer>win10.sec699-40.lab</Computer>
<Security UserID='S-1-5-18'/>
</System>
<EventData>
<Data Name='RuleName'>Context,ProtectedModeExitOrMacrosUsed</Data>
<Data Name='EventType'>SetValue</Data>
<Data Name='UtcTime'>2020-03-18 03:52:07.129</Data>
<Data Name='ProcessGuid'>{36aa6401-9acb-5e71-0000-0010e3ed6803}</Data>
<Data Name='ProcessId'>5064</Data>
<Data Name='Image'>C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE</Data>
<Data Name='TargetObject'>HKU\S-1-5-21-1850752718-2055233276-2633568556-1126\Software\Microsoft\Office\16.0\Word\Security\Trusted Documents\TrustRecords\%USERPROFILE%/Documents/sec699.docm</Data>
<Data Name='Details'>Binary Data</Data>
</EventData>
</Event>
</Events>
```
When used in combination with Elastic's Winlogbeat, the resulting field is named `winlog.event_data.RuleName`.
This commit introduces a mapping between the Sigma `RuleName` field (pre-existing in the `arcsight.yml` config) and Elastic's `winlog.event_data.RuleName`.
The presence of this field could be leveraged to build Sigma rules detecting events such as the above where a malicious macro was executed.
2020-03-19 19:40:18 +01:00
Florian Roth
6040b1f1f8
Merge pull request #668 from Neo23x0/devel
...
Devel
2020-03-19 18:36:31 +01:00
vunx2
be6519e35d
merge
2020-03-19 11:07:39 +07:00
vunx2
1025930e04
merge
2020-03-19 11:05:52 +07:00
vunx2
c627f6b381
merge
2020-03-19 11:02:10 +07:00
vunx2
2107d86900
merge
2020-03-19 10:58:30 +07:00
vunx2
f3e642f340
merge
2020-03-19 10:54:48 +07:00
vunx2
b9e9408d34
Merge branch 'master' of https://github.com/Neo23x0/sigma
2020-03-19 10:51:37 +07:00
vunx2
0356178c50
eventdict
2020-03-19 10:49:40 +07:00
vunx2
1b12a6b261
modified: tools/sigma/backends/carbonblack.py
2020-03-19 09:00:24 +07:00
neu5ron
aa112cbd44
do not escape u
2020-03-18 08:51:38 -04:00
neu5ron
17318b48bf
- fix agg_option keyword
...
- remove (now) unnecessary other hardcoded `.keyword` locations
2020-03-18 08:50:37 -04:00
vunx2
e228d42b97
clean IP subnet
2020-03-18 16:49:44 +07:00
vunx2
1df5620a14
fix cleanValue + leading wildcard + EventID Intergration
2020-03-18 16:02:44 +07:00
Florian Roth
8454f60a8e
fix: reduced level due to false positives
2020-03-17 20:40:28 +01:00
Florian Roth
4fb42ffaf7
docs: changed wording in license
2020-03-17 20:38:42 +01:00
j91321
f0c83ae3b4
Added es-rule backend options
2020-03-15 13:03:20 +01:00
neu5ron
b575df8cd7
use the taxonomy for http response which is sc-status
2020-03-14 15:02:33 -04:00
neu5ron
4cd99e71bf
use the taxonomy which states to use c-uri instead of c-uri-path
2020-03-14 15:02:06 -04:00
neu5ron
4c94906d53
rule should be wildcard AND had a prepended ^ in one of the CommandLine conditions that would have caused to not trigger
2020-03-14 15:00:42 -04:00
neu5ron
4b572f3ccb
newline in description - typo
2020-03-14 14:58:58 -04:00
neu5ron
d212d43acf
spelling
2020-03-14 14:58:25 -04:00
neu5ron
58ac26e531
more ECS to sigmac taxonomy for web/proxy
2020-03-14 14:57:38 -04:00
neu5ron
213cf895b9
Merge remote-tracking branch 'neu5ron-sigma/elastic-keyword_and_analyzed' into elastic-keyword_and_analyzed
2020-03-11 11:40:17 -04:00
neu5ron
55bf39a2ac
keyword, analyzed field, case insensitivity
2020-03-11 11:38:56 -04:00
neu5ron
398e4527ea
keyword, analyzed field, case insensitivity
2020-03-11 11:29:05 -04:00
Florian Roth
cbf0f43934
Merge pull request #655 from msec1203/msec1203-patch-1
...
add rule for suspicious use of csharp console by scripting utility
2020-03-09 18:01:12 +01:00
Florian Roth
6845fa21b3
fix: fixed several issues
2020-03-09 17:43:16 +01:00
Florian Roth
8a2033aaf9
Merge pull request #657 from EccoTheFlintstone/fix_registry
...
sysmon registry events fix
2020-03-09 17:38:58 +01:00
David Szili
0947538228
MDATP schema changes
...
WDATP was renamed to MDATP (Microsoft Defendre ATP).
MDATP also had schema changes recently: https://techcommunity.microsoft.com/t5/microsoft-defender-atp/advanced-hunting-data-schema-changes/ba-p/1043914
The updates reflect these changes
2020-03-09 17:12:41 +01:00
ecco
2489b8534c
sysmon registry events fix
2020-03-09 12:02:04 -04:00
Florian Roth
c4671f2225
docs: coverage illustration
2020-03-08 13:06:35 +01:00
msec1203
f833407265
Initial upload
2020-03-08 19:06:10 +09:00
Florian Roth
3c3917c1d5
Merge pull request #654 from Neo23x0/devel
...
Minor changes
2020-03-07 11:20:45 +01:00
Florian Roth
ddefb3bc58
Merge branch 'master' into devel
2020-03-07 11:06:25 +01:00
Florian Roth
54d3706a7f
docs: removed outdated section from info graphic
2020-03-07 11:05:53 +01:00
Florian Roth
07914c2783
Merge pull request #652 from 2XXE-SRA/patch-1
...
MMC Lateral Movement Rule 1
2020-03-07 11:02:16 +01:00
Florian Roth
2e184382f5
fix: eventid in process_creation rules
2020-03-07 10:43:47 +01:00
Florian Roth
60279c7501
Merge pull request #610 from axi0m/patch-1
...
Update proxy_raw_paste_service_access.yml
2020-03-07 10:39:56 +01:00
Florian Roth
7e8b59abe6
Merge pull request #643 from grumo35/patch-2
...
Update sysmon_cred_dump_tools_dropped_files.yml
2020-03-07 10:39:35 +01:00
Florian Roth
c609de4f27
Merge pull request #648 from NVISO-BE/patch-azure-ad-replication
...
Exclude Azure AD sync accounts from AD Replication rule
2020-03-07 10:39:04 +01:00
Florian Roth
b040c129be
fix: author field starting with an '@' symbol
2020-03-07 10:38:02 +01:00
Abhijit Khinvasara
07b553daa1
Merge branch 'master' of github.com:abhikhnvasara/sigma
2020-03-04 15:22:17 -08:00
Abhijit Khinvasara
46bc843e51
sort the list of backends presented in sigmac help
2020-03-04 15:21:28 -08:00
Abhijit Khinvasara
6a1f97b69e
Merge branch 'master' of github.com:abhikhnvasara/sigma
2020-03-04 15:11:18 -08:00
Abhijit Khinvasara
9cb395823c
Rework according to review comments.
2020-03-04 14:54:49 -08:00
2XXE (SRA)
ae56db97ff
mmc lateral movement detection 1
...
see https://github.com/Neo23x0/sigma/issues/576
2020-03-04 14:57:41 -05:00
Florian Roth
02d256b3b6
Merge pull request #651 from EccoTheFlintstone/fix_sysmon_registry
...
fix sysmon registry rules with HKLM/HKU format as used since 02/2017 in sysmon
2020-03-04 20:25:11 +01:00
ecco
b9e4734087
fix sysmon registry rules with HKLM/HKU format as used since 02/2017 in sysmon
2020-03-04 12:47:42 -05:00
Florian Roth
6bbb166f3d
rule: extended webshell rule with tomcat.exe
2020-03-04 14:25:57 +01:00
Florian Roth
53278c2a46
Merge pull request #649 from Neo23x0/devel
...
fix: avoiding FPs with Citrix software
2020-03-03 11:35:02 +01:00
Florian Roth
f98ad7a8df
fix: wrong identifier
2020-03-03 11:25:02 +01:00
Florian Roth
be4242aca8
fix avoiding FPs with MpCmdRun
...
ParentImage: C:\Windows\System32\services.exe
CommandLine: C:\Program Files\Microsoft Security Client\\MpCmdRun.exe
2020-03-03 11:16:59 +01:00
Florian Roth
7139bfb0cb
fix: avoiding FPs with Citrix software
...
writing C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\__PSScriptPolicyTest_r23phtye.jsp.ps1
2020-03-03 11:01:42 +01:00
vunx2
b070ffab74
Merge branch 'master' of https://github.com/Neo23x0/sigma
2020-03-03 10:08:31 +07:00
Remco Hofman
d4b5dd5749
Exclude Azure AD sync accounts from AD Replication rule
2020-03-02 16:43:20 +01:00
Thomas Patzke
b63889af75
Fixed rules that likely will cause false negatives by fix
2020-03-01 23:14:53 +01:00
Thomas Patzke
01bd5cf0e0
Merge branch 'issue-645'
2020-03-01 22:41:13 +01:00
Thomas Patzke
0a62b8747e
Merge pull request #634 from EccoTheFlintstone/fp_fix3
...
Rule: restore initial behaviour matching single word with spaces on each side
2020-03-01 22:40:24 +01:00
Thomas Patzke
a0f7da8c03
Splunk XML backend rule title
...
Fixes #645
2020-03-01 22:23:35 +01:00
Florian Roth
a557c727dd
Merge pull request #644 from Neo23x0/devel
...
Devel
2020-02-29 16:17:12 +01:00
Florian Roth
19d383989c
fix: keyword expression in rule
2020-02-29 16:03:31 +01:00
Florian Roth
15a400ac51
fix: fixing bug in rule
2020-02-29 15:51:00 +01:00
Florian Roth
fa6458b70f
rule: two rules to detect CVE-2020-0688 exploitation
2020-02-29 15:45:45 +01:00
Florian Roth
fdcba84fc8
fix: escaped backslash
2020-02-29 10:12:59 +01:00
grumo35
0d932810b5
Update sysmon_cred_dump_tools_dropped_files.yml
...
Adding sysinternal's procdump utility more about this on : https://en.hackndo.com/remote-lsass-dump-passwords/
2020-02-28 15:16:18 +01:00
vunx2
58f5fa1b8e
change to github
2020-02-28 16:56:48 +07:00
vunx2
139600009b
conflict
2020-02-28 16:50:30 +07:00
Florian Roth
9e86170d79
Merge pull request #641 from NVISO-BE/web_exchange_cve_2020_0688_exploit
...
CVE 2020-0688 Exploit attempt rule
2020-02-27 13:34:05 +01:00
Remco Hofman
4f45e14a56
Match on c-uri instead of c-uri-path
2020-02-27 13:23:25 +01:00
Remco Hofman
ff35eb0052
Title capitalization
2020-02-27 12:56:56 +01:00
Remco Hofman
72e34d2aa5
CVE 2020-0688 Exploit attempt rule
2020-02-27 12:51:10 +01:00
Florian Roth
f88225dd2a
Merge pull request #640 from Neo23x0/devel
...
fix: broader exclusion for rule - OneDrive false positives
2020-02-26 18:41:52 +01:00
Florian Roth
6bbd80a8ee
fix: broader exclusion for rule - OneDrive false positives
2020-02-26 18:31:58 +01:00
Florian Roth
ada0edb822
Merge pull request #621 from wagga40/new_koadic_rule
...
New Koadic detection rule
2020-02-26 13:25:03 +01:00
Florian Roth
0ba6874645
Merge pull request #638 from Neo23x0/devel
...
Several false positives with new rules
2020-02-26 09:46:02 +01:00
Florian Roth
ca2cc87f0c
fixed regex syntax to wildcard syntax
2020-02-26 09:43:29 +01:00
Florian Roth
1c90d6badd
level increased
2020-02-26 09:42:31 +01:00
Florian Roth
c8afd4a16b
Merge pull request #637 from tjgeorgen/patch-1
...
fix missing status & description in status field
2020-02-26 09:40:55 +01:00
Florian Roth
031e6d3ee6
Merge pull request #635 from EccoTheFlintstone/fix_fp4
...
wmiprvse subprocess: add fallback check on username instead of only l…
2020-02-26 09:40:34 +01:00
Florian Roth
4f3e3166d3
fixing false positives
2020-02-26 09:33:55 +01:00
Florian Roth
82d2b1e6f0
Merge branch 'master' into devel
...
# Conflicts:
# rules/windows/process_creation/win_susp_squirrel_lolbin.yml
2020-02-26 09:27:48 +01:00
Florian Roth
e7aff17e72
FP: OneDrive setup
2020-02-26 09:26:19 +01:00
Tom Georgen
74f3fe70cc
fix missing status & description in status field
2020-02-25 16:30:41 -05:00
Thomas Patzke
65444f7a77
Release 0.16.0
2020-02-25 22:19:52 +01:00
Thomas Patzke
4e42bebb34
Merge branch 'socprime-master'
2020-02-25 21:32:59 +01:00
Florian Roth
a152853ac3
Merge pull request #624 from Antonlovesdnb/master
...
New rules for Macro Detections
2020-02-25 15:44:31 +01:00
Antonlovesdnb
e8b861bff4
Update sysmon_susp_winword_vbadll_load.yml
2020-02-25 09:24:29 -05:00
Antonlovesdnb
4c5d489428
Update sysmon_susp_office_kerberos_dll_load.yml
2020-02-25 09:23:52 -05:00
Antonlovesdnb
f92e2f2b18
Update sysmon_susp_office_dotnet_assembly_dll_load.yml
2020-02-25 09:23:22 -05:00
Antonlovesdnb
8141b1ae90
Update sysmon_susp_office_dsparse_dll_load.yml
2020-02-25 09:22:56 -05:00
Antonlovesdnb
45e4a585bf
Update sysmon_susp_office_dotnet_gac_dll_load.yml
2020-02-25 09:22:37 -05:00
Antonlovesdnb
c5b42aeaed
Update sysmon_susp_office_dotnet_clr_dll_load.yml
2020-02-25 09:19:03 -05:00
Antonlovesdnb
bb1eecfe14
Update sysmon_susp_office_dotnet_assembly_dll_load.yml
2020-02-25 09:17:33 -05:00
Florian Roth
dd1a0e764c
docs: more false positive conditions
2020-02-25 11:13:58 +01:00
Florian Roth
950fa18418
fix: changed titles to avoid duplicates
2020-02-25 11:12:47 +01:00
Florian Roth
5d96f81a84
fix: lowered level due to false positives
2020-02-25 11:12:11 +01:00
Florian Roth
8f7ee21d5c
docs: detection rule license
2020-02-25 11:09:10 +01:00
Thomas Patzke
5a2ccbd040
Fixed ArcSight backend visibility
2020-02-24 23:27:22 +01:00
Thomas Patzke
6236429f3d
Added/changed CI tests
2020-02-24 23:21:11 +01:00
Thomas Patzke
5b42135935
Added es-rule backend to all ES configurations
2020-02-24 23:20:48 +01:00
Thomas Patzke
d9b48ea747
Fixes in es-rule backend
2020-02-24 23:20:19 +01:00
Thomas Patzke
4ee2c2762e
Sorting of backend and configuration lists
2020-02-24 22:59:59 +01:00
Thomas Patzke
4ac6ddc8ef
Merge branch 'changelog'
2020-02-24 22:35:41 +01:00
Thomas Patzke
fa717233a9
Updated changelog
2020-02-24 22:30:36 +01:00
vh
5dc30bd388
Carbonblack, Arcsight ESM, Elastic Rule
2020-02-24 19:29:45 +02:00
vh
516e61fdb0
t
2020-02-24 19:23:11 +02:00
ecco
3247d5692a
wmiprvse subprocess: add fallback check on username instead of only logonid
2020-02-24 09:25:20 -05:00
ecco
df7356e829
Rule: restore initial behaviour matching single word with spaces on each side
2020-02-24 08:00:06 -05:00
Florian Roth
91d1586b97
Merge pull request #633 from EccoTheFlintstone/fix_fp
...
rule local account discovery: fix FP on rmdir matching dir
2020-02-24 13:41:39 +01:00
ecco
aa1eff5419
fix FP on rmdir matching dir
2020-02-24 05:23:23 -05:00
Florian Roth
bfab143c7c
Merge pull request #632 from EccoTheFlintstone/fp_fix
...
fix false positive on taskkill.exe not related to service stop at all
2020-02-24 09:58:33 +01:00
Florian Roth
53ca71e7ae
Merge pull request #631 from EccoTheFlintstone/ascii_fix
...
fix non ascii character in rule (probably a typo)
2020-02-24 09:58:13 +01:00
ecco
f807dae69a
fix false positive on taskkill.exe not related to service stop at all
2020-02-24 03:03:46 -05:00
ecco
1703b725d3
fix non ascii character in rule
2020-02-24 02:58:34 -05:00
Abhijit Khinvasara
8ad346362c
remove print statements.
2020-02-22 20:59:56 -08:00
Abhijit Khinvasara
612df1666b
add LOGIQ backend.
2020-02-22 20:50:30 -08:00
Thomas Patzke
12be884aa5
Merge branch 'sql-backend'
2020-02-21 22:41:53 +01:00
Thomas Patzke
776b58b594
Improved Splunk Zeek configuration
2020-02-21 22:31:14 +01:00
Thomas Patzke
fa4c76871f
Added CI test for sql backend
2020-02-21 22:27:55 +01:00
Thomas Patzke
746f957a63
Merge branch 'patch-1' of https://github.com/fuseyjz/sigma into fuseyjz-patch-1
2020-02-21 22:24:44 +01:00
Thomas Patzke
3047571132
Merge pull request #625 from ninoseki/fix-sigma2misp
...
Update sigma2misp
2020-02-21 22:22:54 +01:00
Florian Roth
ab1dda7685
fix: non-ascii rule
2020-02-21 16:21:39 +01:00
Thomas Patzke
61d31c3f3a
Fixed tagging
2020-02-20 23:51:12 +01:00
Thomas Patzke
48d95f027c
Merge branch 'oscd'
2020-02-20 23:11:57 +01:00
Thomas Patzke
373424f145
Rule fixes
...
Made tests pass the new CI tests. Added further allowed lower case words
in rule test.
2020-02-20 23:00:16 +01:00
Manabu Niseki
c6eb3bfbf2
Update sigma2misp
...
Make enable to use with modern PyMISP
2020-02-20 18:55:10 +09:00
Antonlovesdnb
9625a94d0b
Update sysmon_susp_office_dotnet_assembly_dll_load.yml
2020-02-19 14:52:31 -05:00
Antonlovesdnb
6234f72a6c
Update sysmon_susp_office_dotnet_clr_dll_load.yml
2020-02-19 14:52:09 -05:00
Antonlovesdnb
328858279f
Update sysmon_susp_office_kerberos_dll_load.yml
2020-02-19 14:51:50 -05:00
Antonlovesdnb
1f01fe446f
Update sysmon_susp_office_dsparse_dll_load.yml
2020-02-19 14:51:22 -05:00
Antonlovesdnb
6d0805ac13
Update sysmon_susp_winword_vbadll_load.yml
2020-02-19 14:51:00 -05:00
Antonlovesdnb
1e461cb2d1
Update sysmon_susp_office_dotnet_gac_dll_load.yml
2020-02-19 14:50:31 -05:00
Antonlovesdnb
56ffa9ec0e
Update sysmon_registry_trust_record_modification.yml
2020-02-19 14:50:09 -05:00
Antonlovesdnb
397cdecb94
5 Rules covering various macro techniques
...
- Rule to look for GAC DLL loaded by an Office Product
- Rule to look for any DLL in C:\Windows\assembly loaded by an Office Product
- Rule to look for clr.dll loaded by an Office Product
- Rule to look for directory services parsing dll loaded by an Office Product
- Rule to look for kerberos dll loaded by an Office Product
2020-02-19 14:43:13 -05:00
Antonlovesdnb
f8be92dae0
Add files via upload
2020-02-19 10:13:44 -05:00
Florian Roth
a9403b70d5
Merge pull request #623 from Neo23x0/devel
...
fix: fixing too restrictive rule
2020-02-18 11:14:51 +01:00
Florian Roth
6413730810
fix: fixing too restrictive rule
...
https://twitter.com/Hexacorn/status/1229702521679118336
2020-02-18 10:43:22 +01:00
Florian Roth
f7a6ffa121
Merge pull request #622 from Neo23x0/devel
...
Minor changes, process dump via rundll32 comsvcs.dll
2020-02-18 10:26:28 +01:00
Florian Roth
04b97bd84c
fix: character in filename
2020-02-18 10:19:48 +01:00
Florian Roth
5a4095f13f
fix: restored GPL
2020-02-18 10:06:00 +01:00
Florian Roth
cd607d4fed
rule: process dump via rundll32 and comsvcs.dll's MiniDumpW
2020-02-18 10:04:55 +01:00
Florian Roth
73dfc847fc
rule: changed lsass process dump to level high
2020-02-18 10:03:25 +01:00
yugoslavskiy
7f3f1944d9
fix redundancy
2020-02-18 01:10:56 +03:00
Florian Roth
2363213fc9
add TimeSketch to list of products that use Sigma
2020-02-17 08:41:23 +01:00
Thomas Patzke
01d6c3b58d
Fixes
2020-02-16 23:24:00 +01:00
Wagga
b9c745a1b2
New Koadic detection rule
2020-02-16 16:48:49 +01:00
yugoslavskiy
d0e284ae18
fix typo (duplicates)
2020-02-16 18:19:25 +03:00
yugoslavskiy
168ab7c620
Merge branch 'oscd' of https://github.com/Neo23x0/sigma into oscd
2020-02-16 17:57:48 +03:00
Thomas Patzke
f118839664
Further fixes and deduplications
...
From suggestions of @yugoslavskiy in issue #554 .
2020-02-16 14:03:07 +01:00
Thomas Patzke
77c927bc14
Revert "Moved rules with enrichments into unsupported"
...
This reverts commit ba83b8862a .
2020-02-15 22:52:06 +01:00
Florian Roth
eb36150e6b
rule: UserAgent used by PowerTon malware
2020-02-15 19:06:49 +01:00
Florian Roth
d909fefa82
Merge pull request #620 from james0d0a/master
...
rule: Zeek Suspicious kerberos network traffic RC4
2020-02-13 09:34:06 +01:00
Florian Roth
94bb7dd77f
fix: issues
2020-02-13 09:17:21 +01:00
Florian Roth
983f7fcd39
Merge pull request #618 from faloker/master
...
More rules for AWS events
2020-02-13 09:15:04 +01:00
james dickenson
21e4aa33dc
rule modification: fixed filter condition on zeek suspicious rc4 traffic
2020-02-12 21:27:36 -08:00
james dickenson
1347e5060f
logsource config for zeek events in splunk
2020-02-12 21:24:03 -08:00
james dickenson
93367d725d
rule: zeek suspicious kerberos RC4 traffic
2020-02-12 21:21:46 -08:00
faloker
6d9c8e44d7
Update rules titles
2020-02-12 23:09:16 +02:00
faloker
1b15dba712
Correct the indentation
2020-02-12 22:48:46 +02:00
faloker
f387cf0c37
Add the rule to detect changes to startup scripts
2020-02-12 22:23:18 +02:00
faloker
01d2f9f99d
Add the rule to detect backdooring of users keys
2020-02-12 22:22:38 +02:00
faloker
b26c5d8c51
Add rules to detect AWS RDS exfiltration
2020-02-12 22:21:52 +02:00
faloker
ddf5f8ec23
Update conditions
2020-02-12 22:20:15 +02:00
faloker
aacab37f84
Add a rule for guardduty trusted IPs manipulation
2020-02-11 23:28:23 +02:00
faloker
b6c834195e
Add a rule for ec2 userdata exfil
2020-02-11 23:25:54 +02:00
Florian Roth
7a5587f14d
Merge pull request #616 from Neo23x0/devel
...
rule: remove keywords in powershell rule prone to FPs
2020-02-11 16:43:01 +01:00
Florian Roth
a4c210ed16
rule: remove keywords in powershell rule prone to FPs
2020-02-11 16:26:17 +01:00
Florian Roth
bf98d286f9
Merge pull request #615 from Neo23x0/devel
...
fix: dumpert rule with wrong sysmon event id
2020-02-08 20:03:28 +01:00
Florian Roth
d9645af840
rule: added Emotet UA
...
https://twitter.com/webbthewombat/status/1225827092132179968
2020-02-08 10:37:56 +01:00
Florian Roth
880a0b5593
Merge pull request #614 from timbMSFT/gallium_vpn
...
additional gallium ttp
2020-02-07 17:56:09 +01:00
Florian Roth
080532d20c
logsource change
...
I've swapped the lines in the logsource section to make it clearer that the category "process_creation" covers all sources that generate process creation logs on the windows platform.
2020-02-07 15:47:27 +01:00
Tim Burrell (MSTIC)
f70f847524
additional gallium ttp
...
sha1 process creation only makes sense for sysmon
2020-02-07 14:08:40 +00:00
Florian Roth
be9b80d6ab
fix: dumpert rule with wrong sysmon event id
2020-02-07 13:14:18 +01:00
Thomas Patzke
7fdd6f7bce
Swapped accidental deletion of older rule duplicate
2020-02-06 23:41:05 +01:00
vunx2
d0e9af171f
cleanIPRange
2020-02-06 17:20:52 +07:00
vunx2
627f46abc2
backslash fix
2020-02-06 16:28:27 +07:00
vunx2
bc4c6ce8db
cleanValue
2020-02-06 11:02:22 +07:00
vunx2
19d9e4856e
clean Value + config
2020-02-05 17:47:35 +07:00
Florian Roth
1a80b180fd
Merge pull request #613 from Neo23x0/devel
...
rule: dumpert process dump tool
2020-02-04 23:07:07 +01:00
Florian Roth
10490a6cee
rule: reworked dumpert rule
2020-02-04 22:56:04 +01:00
Florian Roth
1f44969afd
rule: avoiding build issues with sysmon event id 1
2020-02-04 22:50:46 +01:00
Florian Roth
535e2d149b
rule: improved dumpert rule
2020-02-04 22:46:16 +01:00
Florian Roth
8f8b977c85
rule: dumpert process dump tool
2020-02-04 22:38:06 +01:00
vunx2
579e7481c7
cleanValue + eventID list
2020-02-04 18:14:40 +07:00
Thomas Patzke
d7bd90cb24
Merge branch 'master' into oscd
2020-02-03 23:13:16 +01:00
Thomas Patzke
f7394d09e0
Deduplication
2020-02-03 22:41:55 +01:00
Thomas Patzke
1bc2c0b930
Deduplication of backend list
...
Fixes issue #609 . Added backend list debug output (class name).
2020-02-03 22:16:00 +01:00
Thomas Patzke
666542ae7f
Added colorama to Pipfile
2020-02-03 22:15:27 +01:00
Kevin Dienst
98471bc53c
Update proxy_raw_paste_service_access.yml
...
Add another paste provider website, ghostbin.co to the list. Note that saved pastes generate pseudo random 5 character strings before being suffixed with `/raw` at the end of the URL. e.g. `https://ghostbin.co/paste/y4e9a/raw `
Thus, I've added a regex match between /paste and /raw. I'm unsure if this is supported, I skimmed the Sigma specification wiki but didn't see anything other than that contains adds '*' to end and beginning of each selection. If this regex isn't going to work then I'd imagine we just have to remove the `.+/raw/` from the URI.
2020-02-03 07:29:42 -06:00
vunx2
2930df17d6
update sigma
2020-02-03 09:47:06 +07:00
Thomas Patzke
815c562a17
Merge branch 'master' into oscd
2020-02-02 13:40:08 +01:00
Thomas Patzke
f59b36d891
Fixed rule
2020-02-02 12:54:56 +01:00
Thomas Patzke
ba83b8862a
Moved rules with enrichments into unsupported
2020-02-02 12:46:03 +01:00
Thomas Patzke
593abb1cce
OSCD QA wave 3
2020-02-02 12:41:12 +01:00
Florian Roth
016d726d4e
fix: bug in formatting
2020-02-02 11:31:39 +01:00
Florian Roth
dcc7d03c37
docs: better description
2020-02-02 11:31:22 +01:00
Florian Roth
296cf6aa08
fix: fixed examples and added a new one
2020-02-02 09:27:56 +01:00
Florian Roth
68b34467a8
Merge pull request #608 from yt0ng/development
...
additional execution observed
2020-02-02 08:37:59 +01:00
Neis Markus
0d7f55948c
additional execution observed
2020-02-02 08:07:00 +01:00
Florian Roth
aa8a0f5e1f
Merge pull request #606 from Neo23x0/devel
...
refactor: moved rues from 'apt' folder in respective folders
2020-02-01 18:25:19 +01:00
Florian Roth
03ecb3b8dc
refactor: moved rues from 'apt' folder in respective folders
2020-02-01 17:59:26 +01:00
Florian Roth
6ea861da53
Merge pull request #605 from Neo23x0/devel
...
Winnti rule and helpful message in test script
2020-02-01 15:51:16 +01:00
Florian Roth
a752e6c95f
rule: winnti group campaign against HK universities
2020-02-01 15:43:30 +01:00
Florian Roth
9876623710
doc: helpful link in error message
2020-02-01 15:43:11 +01:00
vh
dc5a31aebc
Updated Azure Sentinel backend
2020-01-31 17:17:24 +02:00
Florian Roth
5b157efd7e
Merge pull request #340 from virtuallaik/master
...
Create powershell_nishang_malicious_commandlets.yml + edits
2020-01-31 15:37:59 +01:00
Florian Roth
7a222920df
added 'date'
2020-01-31 15:27:30 +01:00
Florian Roth
913c839780
added 'id'
2020-01-31 15:26:43 +01:00
Florian Roth
848e0c90e4
Merge branch 'master' into master
2020-01-31 14:45:29 +01:00
Florian Roth
aba4f37517
Merge pull request #366 from dvas0004/patch-1
...
Update win_alert_ad_user_backdoors.yml
2020-01-31 14:41:50 +01:00
Florian Roth
1213712978
Merge branch 'master' into patch-1
2020-01-31 14:32:27 +01:00
Florian Roth
afecca3c13
Merge pull request #511 from 4A616D6573/patch-3
...
Created win_susp_local_anon_logon_created.yml
2020-01-31 14:30:54 +01:00
Florian Roth
70034bd793
Merge pull request #388 from yt0ng/Renamed_Files
...
Renamed Jusched
2020-01-31 14:18:28 +01:00
Florian Roth
8c4aadb423
Merge branch 'master' into Renamed_Files
2020-01-31 08:49:10 +01:00
Florian Roth
190afcac88
Missing ID, wrong tag
2020-01-31 07:32:28 +01:00
Florian Roth
e3d61d5579
Missing ID
2020-01-31 07:31:56 +01:00
Florian Roth
033ab26d5e
Added date
2020-01-31 07:21:02 +01:00
Florian Roth
82cae6d63c
Merge pull request #604 from Neo23x0/devel
...
New tests, colorized test output and rule cleanup
2020-01-31 07:07:13 +01:00
Florian Roth
ae2c186872
rule: wsreset.exe UAC bypass
2020-01-30 18:05:47 +01:00
Florian Roth
1735614747
feat: rule title tests
2020-01-30 17:26:21 +01:00
Florian Roth
d42e87edd7
fix: fixed casing and long rule titles
2020-01-30 17:26:09 +01:00
Florian Roth
43af93a678
feat: detect missing date
2020-01-30 16:08:34 +01:00
Florian Roth
14e7b17eb9
feat: detect missing id
2020-01-30 16:08:24 +01:00
Florian Roth
93e1299010
style: PEP8 in test_rules.py
2020-01-30 16:08:10 +01:00
Florian Roth
e79e99c4aa
fix: fixed missing date fields in remaining files
2020-01-30 16:07:37 +01:00
Thomas Patzke
4fa0ae7259
Merge branch 'ruleid'
2020-01-30 16:03:10 +01:00
Florian Roth
efd3af0812
fix: fixed missing date fields in other files
2020-01-30 15:32:39 +01:00
Florian Roth
617ece1aa2
fix: fixed missing date fields in proxy rules
2020-01-30 15:20:52 +01:00
Florian Roth
4ad71c44bc
chore: moved network device rules to the 'network' folder
2020-01-30 14:30:26 +01:00
Florian Roth
5130072b04
Merge pull request #529 from c2defense/master
...
Network Device Analytics
2020-01-30 14:28:44 +01:00
Florian Roth
30d872f98f
Merge pull request #492 from booberry46/master
...
Bypass Windows Defender
2020-01-30 14:27:30 +01:00
Thomas Patzke
7b4ec734a8
Using rule ids as Kibana object id
2020-01-30 11:30:01 +01:00
Florian Roth
598b750f48
Minor change
2020-01-30 10:31:16 +01:00
Florian Roth
8cef4b2941
fix: missing id
2020-01-30 10:14:18 +01:00
Florian Roth
bf81ff90a8
fix: using a specific field
2020-01-30 10:13:33 +01:00
Florian Roth
0207eeece4
fix: hyphen
2020-01-30 10:10:03 +01:00
Florian Roth
2f1890b5e8
Update win_rdp_reverse_tunnel.yml
2020-01-30 10:09:41 +01:00
Florian Roth
8ec0060938
fix: fixing bug
2020-01-30 10:09:22 +01:00
Florian Roth
6ca100cabf
reverted changes
2020-01-30 10:08:25 +01:00
Florian Roth
0a4d32c7c7
fix: fixing issues
2020-01-30 10:07:24 +01:00
Florian Roth
9828d7f81d
re-added old reference
2020-01-30 10:03:09 +01:00
Florian Roth
d90ea6d267
improved rule
2020-01-30 09:58:32 +01:00
Florian Roth
f8e022a709
Fixed indentation
2020-01-30 09:54:41 +01:00
Florian Roth
d2122b6b83
Merge pull request #594 from sreemanshanker/master
...
Sigma rule to Monitor for writing of malicious files to system32 and syswow64 folders
2020-01-30 09:14:58 +01:00
Florian Roth
6adc732d79
Merge pull request #603 from Neo23x0/devel
...
Colorized Testing
2020-01-30 09:14:25 +01:00
Florian Roth
f84b3abf2d
fix: missing commas in list
2020-01-30 08:56:13 +01:00
Florian Roth
aa5ce18abc
feat: support of new MITRE ATT&CK tags
2020-01-30 08:55:44 +01:00
Florian Roth
2c38c53829
fix: removed test rule
2020-01-30 08:52:33 +01:00
Florian Roth
7bf472834b
feat: colorized error messages
2020-01-30 08:50:22 +01:00
Florian Roth
9d96b7c1a3
fix: print_error function not global
2020-01-30 08:39:58 +01:00
Florian Roth
fe6c30fa59
feat: colorized output in test
2020-01-30 08:37:47 +01:00
Florian Roth
a01773681a
fix: filename
2020-01-30 08:18:29 +01:00
Florian Roth
529e95e3a5
Fixed everything
...
This rule had a lot of errors and problems.
- title
- file name
- status stable > experimental
- field order
- indentation
- unnecessary use of regular expressions
- interesting fields incomplete
- missing date
- missing id
- reference not as list
2020-01-30 08:17:46 +01:00
Florian Roth
4c90e636b1
changed file name
2020-01-30 08:07:56 +01:00
Florian Roth
a935cea665
fix: condition
2020-01-30 08:06:53 +01:00
sreemanshanker
d5c7b4795d
Add files via upload
2020-01-30 11:29:01 +08:00
Florian Roth
647d98ac71
Merge pull request #599 from vitaliy0x1/master
...
Detection Rules for AWS events
2020-01-29 21:01:20 +01:00
Florian Roth
376092cfd3
Merge pull request #565 from RiccardoAncarani/master
...
Add Covenant default named pipe
2020-01-29 20:28:00 +01:00
Florian Roth
05d7448a9a
Minor Changes
2020-01-29 20:25:46 +01:00
Florian Roth
d1357ddc50
Minor changes
2020-01-29 20:25:14 +01:00
Florian Roth
8a4f9ad7f8
Minor changes
2020-01-29 20:24:31 +01:00
Florian Roth
a6d7af270d
Added date
2020-01-29 20:23:40 +01:00
Florian Roth
56e1e6b13d
Lower case service name
2020-01-29 20:23:12 +01:00
Florian Roth
f1ce6ba6ad
Lowering level
...
Lowering level to medium for events that can have a legitimate cause
2020-01-29 20:22:34 +01:00
Florian Roth
eac484092c
fix: changed hashes field to sha1 for better consistency
2020-01-29 19:52:24 +01:00
Florian Roth
56576b539f
Merge pull request #602 from Neo23x0/devel
...
rule: FromBase64String command line
2020-01-29 16:12:29 +01:00
Florian Roth
a816f4775f
rule: FromBase64String command line
2020-01-29 16:05:12 +01:00
Florian Roth
1948fd94bd
Merge pull request #601 from Neo23x0/devel
...
Devel
2020-01-28 11:35:57 +01:00
Florian Roth
7786edac29
rule: dctask64.exe evasion techniques
...
https://twitter.com/gN3mes1s/status/1222088214581825540
2020-01-28 11:29:24 +01:00
Florian Roth
d48fc9d1ff
fix: multiple false positive conditions
2020-01-28 10:11:09 +01:00
Florian Roth
240b764660
rule: reduced level of system time mod rule
2020-01-27 14:30:09 +01:00
Florian Roth
60f55cbd2b
Merge pull request #590 from Neo23x0/devel
...
Devel
2020-01-24 16:29:19 +01:00
Florian Roth
df324a59c5
Merge branch 'master' into devel
2020-01-24 16:21:53 +01:00
Florian Roth
5f0589b787
rule: mstsc shadowing
2020-01-24 16:18:19 +01:00
Florian Roth
e24ea159f3
rule: split up renamed binary rule
2020-01-24 15:31:07 +01:00
2d4d
bace799f07
complete_cve_2019-19781
2020-01-24 15:31:06 +01:00
Florian Roth
4066ae6371
rule: added a reference
2020-01-24 15:31:06 +01:00
Florian Roth
11607a8621
rule: windows audit cve
2020-01-24 15:31:06 +01:00
Florian Roth
f40a7aab3d
rule: changes at Shitrix rule
2020-01-24 15:31:06 +01:00
Thomas Patzke
d408c0fd34
Added ala-rule backend to CI testing
2020-01-24 15:31:06 +01:00
Thomas Patzke
8525e9e961
Moved ala-rule backend code into ala backend module
2020-01-24 15:31:06 +01:00
sbousseaden
a4e62fcb1b
Update win_lm_namedpipe.yml
2020-01-24 15:31:06 +01:00
neu5ron
ee1ae805d3
fix name of network_initiated
2020-01-24 15:31:06 +01:00
2d4d
341ed340a3
add newbm.pl
2020-01-24 15:31:06 +01:00
Florian Roth
4e07a786a7
rule: updated netscaler rule
2020-01-24 15:31:06 +01:00
Florian Roth
c22f7b0b65
fix: shortened path in Citrix Netscaler rule
2020-01-24 15:31:06 +01:00
2d4d
d0230f0024
add rule for Citrix Netscaler CVE-2019-19781
2020-01-24 15:31:06 +01:00
2d4d
0bde8b5f00
add rule for Citrix Netscaler CVE-2019-19781
2020-01-24 15:31:06 +01:00
Tim Burrell (MSTIC)
a371cf1057
fixup - unique rule id; use process_creation instead of sysmon EventID:1
2020-01-24 15:31:06 +01:00
Tim Burrell (MSTIC)
c24bbdcf81
Sigma queries for
...
-- terminating threads in a svchost process (InvokePhantom uses this technique to disable windows event logging)
-- GALLIUM threat intel IOCs in recent MSTIC blog/release.
2020-01-24 15:31:06 +01:00
Maxime Lamothe-Brassard
d1774f7735
Fixed actual event tag
2020-01-24 15:31:06 +01:00
Maxime Lamothe-Brassard
1bfb809b6f
Mapping OriginalFileName to event/INTERNAL_NAME now that it's available.
2020-01-24 15:31:06 +01:00
SOC Prime
2aae27f0a4
Update ala-rule.py
2020-01-24 15:31:06 +01:00
SOC Prime
85f09419fb
Update ala-rule.py
2020-01-24 15:31:06 +01:00
vh
8d30459532
Azure Sentinel backend (ala) - Fixed path in query
...
Added new backend Azure Sentinel Rule (ala-rule)
2020-01-24 15:31:06 +01:00
msec1203
4f29556a01
Update win_susp_winword_wmidll_load.yml
...
Update x2
2020-01-24 15:31:06 +01:00
msec1203
48a071ad4e
Update win_susp_winword_wmidll_load.yml
...
Fix to error on incorrect mitre tags used.
2020-01-24 15:31:06 +01:00
GelosSnake
8fbe08d5fa
Update win_system_exe_anomaly.yml
...
fixing to much original fork.
2020-01-24 15:31:06 +01:00
GelosSnake
9f3672fdc0
Update win_system_exe_anomaly.yml
...
Following sigma event I've noticed my twitter account was referenced:
https://twitter.com/GelosSnake/status/934900723426439170
Rule:
https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_system_exe_anomaly.yml
Seems like - '\SystemRoot\System32\\*' is missing and hence triggering an FP.
2020-01-24 15:31:06 +01:00
msec1203
4260d01ff0
Initial Upload
...
Submit Sigma Rule For Detecting Word Loading WMI DLL's.
2020-01-24 15:31:06 +01:00
Justin Schoenfeld
5f8b152166
Added new sticky key attack binary
2020-01-24 15:31:06 +01:00
david-burkett
5d04c76f68
svchost spawned without cli
2020-01-24 15:31:06 +01:00
Florian Roth
72341f08c5
Added MITRE ATT&CK Technique T1482
...
https://attack.mitre.org/techniques/T1482/
2020-01-24 15:31:06 +01:00
david-burkett
032c382184
corrected logic
2020-01-24 15:31:06 +01:00
David Burkett
991e3b8a51
Trickbot behavioral recon activity
2020-01-24 15:31:06 +01:00
Alessio Dalla Piazza
9f7eee8bb1
Add the ability to detect PowerUp - Invoke-AllChecks
...
PowerUp allow attackers to check if is possible to have a local privilege escalation attacks against Windows systems. The main function is called "Invoke-AllChecks" and check possible path of escalation.
2020-01-24 15:31:06 +01:00
Thomas Patzke
0f4aef1000
Added sigma2attack to CI testing
2020-01-24 15:31:06 +01:00
vitaliy0x1
5aa75a90fd
added aws_root_account_usage.yml
2020-01-21 15:07:32 +02:00
vitaliy0x1
0d6642abd6
added aws_config_disable_recording.yml
2020-01-21 15:07:10 +02:00
vitaliy0x1
17c00d8a11
added aws_cloudtrail_disable_logging.yml
2020-01-21 15:06:44 +02:00
Vitaliy
ffcc2dc049
Merge pull request #1 from Neo23x0/master (fetch upstream)
...
fetch upstream
2020-01-20 14:18:48 +02:00
Thomas Patzke
5f1e933b93
Merge pull request #588 from timbMSFT/timb
...
Sigma queries - defense evasion by tampering with svchost; recently released GALLIUM activity group IOCs
2020-01-20 10:06:06 +01:00
Thomas Patzke
9bb50f3d60
OSCD QA wave 2
...
* Improved rules
* Added filtering
* Adjusted severity
2020-01-17 15:46:28 +01:00
Florian Roth
e9012d57f7
Merge pull request #596 from 2d4d/master
...
complete_cve_2019-19781
2020-01-16 12:46:25 +01:00
2d4d
e35ebcc185
complete_cve_2019-19781
2020-01-15 21:59:33 +01:00
Florian Roth
41c4a499b4
rule: added a reference
2020-01-15 21:27:40 +01:00
Florian Roth
6db20d4bad
rule: windows audit cve
2020-01-15 21:23:32 +01:00
Florian Roth
5ef64e4e99
rule: changes at Shitrix rule
2020-01-13 20:15:08 +01:00
Florian Roth
a0bad54dbd
Merge pull request #592 from 2d4d/fix_web_citrix_cve_2019_19781_exploit.yml
...
add newbm.pl
2020-01-13 14:48:38 +01:00
Thomas Patzke
7216fe400f
Merge branch 'ala-rule'
2020-01-13 13:49:53 +01:00
Thomas Patzke
d95a2606f0
Merge branch 'socprime-master' into ala-rule
2020-01-13 13:48:19 +01:00
Thomas Patzke
638d461b16
Added ala-rule backend to CI testing
2020-01-13 13:47:11 +01:00
Thomas Patzke
7b62b931ce
Moved ala-rule backend code into ala backend module
2020-01-13 11:24:46 +01:00
Florian Roth
e89b4b1c1f
Merge pull request #595 from sbousseaden/patch-1
...
Update win_lm_namedpipe.yml
2020-01-13 11:21:24 +01:00
Thomas Patzke
de690cbfbf
Merge branch 'master' of https://github.com/socprime/sigma into socprime-master
2020-01-13 11:19:39 +01:00
sbousseaden
b60671397d
Update win_lm_namedpipe.yml
2020-01-13 10:50:35 +01:00
Florian Roth
ba7c634f1a
More changes
2020-01-13 09:59:14 +01:00
Florian Roth
7bd820c151
Changes
2020-01-13 09:56:49 +01:00
Florian Roth
53d76a69c1
Merge pull request #593 from neu5ron/updates_to_sigma_master
...
HELK SIGMAC fix name of network_initiated
2020-01-13 09:51:13 +01:00
sreemanshanker
8833b43cea
Merge pull request #1 from sreemanshanker/sreemanshanker-patch-1
...
Add files via upload
2020-01-13 13:21:29 +08:00
sreemanshanker
ffcfcb70ad
Add files via upload
2020-01-13 13:21:06 +08:00
neu5ron
d8b703462d
fix name of network_initiated
2020-01-13 00:12:04 -05:00
2d4d
364e859a6b
add newbm.pl
2020-01-12 00:29:10 +01:00
Thomas Patzke
ae6fcefbcd
Removed ATT&CK technique ids from titles and added tags
2020-01-11 00:33:50 +01:00
Thomas Patzke
8d6a507ec4
OSCD QA wave 1
...
* Checked all rules against Mordor and EVTX samples datasets
* Added field names
* Some severity adjustments
* Fixes
2020-01-11 00:11:27 +01:00
Thomas Patzke
b34bf98c61
Fixed rule: added condition
2020-01-07 15:20:16 +01:00
Florian Roth
a29c832b6a
rule: updated netscaler rule
2020-01-07 14:42:16 +01:00
Florian Roth
c9a75a8371
fix: shortened path in Citrix Netscaler rule
2020-01-07 13:00:28 +01:00
Florian Roth
48f5f480fd
fix: SCCM false positives with whoami.exe rule
2020-01-07 12:13:47 +01:00
Florian Roth
b03a43ca1b
Merge pull request #589 from 2d4d/add_cve_2019-19781
...
add rule for Citrix Netscaler CVE-2019-19781
2020-01-06 14:15:46 +01:00
2d4d
35fbdd1248
add rule for Citrix Netscaler CVE-2019-19781
2020-01-03 01:48:29 +01:00
2d4d
b98e57603e
add rule for Citrix Netscaler CVE-2019-19781
2020-01-03 00:34:52 +01:00
Tim Burrell (MSTIC)
9bd0402681
fixup - unique rule id; use process_creation instead of sysmon EventID:1
2020-01-02 20:05:28 +00:00
Tim Burrell (MSTIC)
5051334e85
Sigma queries for
...
-- terminating threads in a svchost process (InvokePhantom uses this technique to disable windows event logging)
-- GALLIUM threat intel IOCs in recent MSTIC blog/release.
2020-01-02 14:47:55 +00:00
Florian Roth
fd28a64591
rule: WCE
2019-12-31 09:27:38 +01:00
Florian Roth
ed5c77e1be
Merge pull request #587 from refractionPOINT/internal-name
...
Adding LimaCharlie support for OriginalFileName field.
2019-12-31 08:32:51 +01:00
Maxime Lamothe-Brassard
a3ad7cb1c5
Fixed actual event tag
2019-12-30 18:15:12 -08:00
Maxime Lamothe-Brassard
9b32086d92
Mapping OriginalFileName to event/INTERNAL_NAME now that it's available.
2019-12-30 15:58:18 -08:00
SOC Prime
92bc96a308
Update ala-rule.py
2019-12-30 16:26:30 +02:00
vh
f2117f798a
Fix ala-rule
2019-12-30 16:24:08 +02:00
SOC Prime
f015c97dff
Update ala-rule.py
2019-12-30 16:13:27 +02:00
vh
f9570a48cb
Azure Sentinel backend (ala) - Fixed path in query
...
Added new backend Azure Sentinel Rule (ala-rule)
2019-12-30 16:11:53 +02:00
vh
d42409372c
Azure Sentinel backend (ala) - Fixed path in query
...
Added new backend Azure Sentinel Rule (ala-rule)
2019-12-30 16:09:19 +02:00
Florian Roth
c007ecf90c
Merge pull request #585 from Neo23x0/devel
...
Devel
2019-12-30 15:08:43 +01:00
SOC Prime
9c18f20e7b
Merge pull request #3 from Neo23x0/master
...
latest sigmac
2019-12-30 16:02:46 +02:00
Florian Roth
5980cb8d0c
rule: copy from admin share - lateral movement
2019-12-30 14:25:43 +01:00
Florian Roth
86e6b92903
rule: SecurityXploded tool
2019-12-30 14:25:29 +01:00
Florian Roth
5ad793e04a
Merge pull request #582 from tvjust/patch-1
...
Added new sticky key attack binary
2019-12-30 14:14:20 +01:00
Florian Roth
948af2993b
Merge pull request #583 from msec1203/msec1203-submit-rule1
...
MS Office Doc Load WMI DLL Rule
2019-12-30 14:13:58 +01:00
msec1203
dbdf6680e0
Update win_susp_winword_wmidll_load.yml
...
Update x2
2019-12-30 18:49:39 +09:00
msec1203
a45f877712
Update win_susp_winword_wmidll_load.yml
...
Fix to error on incorrect mitre tags used.
2019-12-30 18:41:16 +09:00
Florian Roth
e043bc2193
Merge pull request #584 from GelosSnake/master
...
FP in win_system_exe_anomaly.yml
2019-12-29 18:52:43 +01:00
GelosSnake
f574c20432
Update win_system_exe_anomaly.yml
...
fixing to much original fork.
2019-12-29 18:02:49 +02:00
GelosSnake
7e7f6d1182
Update win_system_exe_anomaly.yml
...
Following sigma event I've noticed my twitter account was referenced:
https://twitter.com/GelosSnake/status/934900723426439170
Rule:
https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_system_exe_anomaly.yml
Seems like - '\SystemRoot\System32\\*' is missing and hence triggering an FP.
2019-12-29 18:01:19 +02:00
msec1203
845d67f1f3
Initial Upload
...
Submit Sigma Rule For Detecting Word Loading WMI DLL's.
2019-12-29 23:14:29 +09:00
Justin Schoenfeld
a1f07cdb4b
Added new sticky key attack binary
2019-12-29 08:32:23 -05:00
Florian Roth
042c58dfc1
Merge pull request #581 from david-burkett/master
...
Trickbot behavioral recon activity / svchost spawned without CLI
2019-12-28 18:11:34 +01:00
david-burkett
4a65a25070
svchost spawned without cli
2019-12-28 10:28:08 -05:00
Florian Roth
5e59bbb3c3
Added MITRE ATT&CK Technique T1482
...
https://attack.mitre.org/techniques/T1482/
2019-12-28 16:02:26 +01:00
david-burkett
35b4806104
corrected logic
2019-12-28 09:55:39 -05:00
David Burkett
474a8617e5
Trickbot behavioral recon activity
2019-12-27 21:25:53 -05:00
Yugoslavskiy Daniil
3a3cd5a830
Merge branch 'master' into oscd
2019-12-28 03:27:13 +03:00
fuseyjz
0b2f88d5df
Sigma converter for SQL format
...
Get the converted SQL query after the WHERE statement for any filtering on SQL platform.
Example:
https://github.com/fuseyjz/sigma-sql/blob/master/README.md
2019-12-24 10:42:25 +08:00
Florian Roth
62bd2cc3ab
Merge pull request #572 from alessiodallapiazza/master
...
Add the ability to detect PowerUp - Invoke-AllChecks
2019-12-23 12:57:55 +01:00
Alessio Dalla Piazza
0ff81cc693
Merge pull request #1 from alessiodallapiazza/alessiodallapiazza-patch-1
...
Add the ability to detect PowerUp - Invoke-AllChecks
2019-12-23 11:51:34 +01:00
Alessio Dalla Piazza
f45587074b
Add the ability to detect PowerUp - Invoke-AllChecks
...
PowerUp allow attackers to check if is possible to have a local privilege escalation attacks against Windows systems. The main function is called "Invoke-AllChecks" and check possible path of escalation.
2019-12-23 11:50:57 +01:00
Florian Roth
04afcccd2c
Merge pull request #571 from Neo23x0/devel
...
rule: whoami as local system
2019-12-22 19:23:50 +01:00
Florian Roth
fc8607bbea
rule: whoami as local system
2019-12-22 18:50:26 +01:00
Florian Roth
a7ca386a1b
Merge pull request #570 from Neo23x0/devel
...
CreateMiniDump
2019-12-22 08:40:45 +01:00
Florian Roth
fb76f2b9ac
rule: CreateMiniDump
2019-12-22 08:29:12 +01:00
Florian Roth
511229c0b6
rule: modified Bloodhound rule
2019-12-21 21:22:13 +01:00
Thomas Patzke
530ac854df
Added sigma2attack to CI testing
2019-12-20 22:53:22 +01:00
Thomas Patzke
781f53332b
Merge pull request #566 from christophetd/sigma2attack
...
Add sigma2attack
2019-12-20 21:57:02 +01:00
Florian Roth
1fd4c26005
Merge pull request #569 from Neo23x0/devel
...
rule: improved bloodhound rule
2019-12-20 17:32:21 +01:00
Florian Roth
0fa5ba925e
rule :improved bloodhound rule
2019-12-20 17:23:40 +01:00
Florian Roth
cbebaf637f
Merge pull request #568 from Neo23x0/devel
...
Devel
2019-12-20 16:22:29 +01:00
Florian Roth
0e82dce2a0
fix: fixed wrong condition
2019-12-20 16:11:39 +01:00
Florian Roth
0000257371
rule: improved bloodhound rule
2019-12-20 16:08:26 +01:00
Florian Roth
3a933c38f2
rule: changed level of BloodHound rule
2019-12-20 15:37:58 +01:00
Florian Roth
68efeb909d
rule: false positive condition for BloodHound rule
2019-12-20 15:35:13 +01:00
Florian Roth
825b1edb0f
Merge pull request #567 from Neo23x0/devel
...
Devel
2019-12-20 15:32:56 +01:00
Florian Roth
5f061c15d0
fix: fixed missing condition
2019-12-20 15:18:05 +01:00
Florian Roth
bb466407ee
rule: operation Wocao activity
2019-12-20 15:00:07 +01:00
Florian Roth
708c17e2bc
rule: Bloodhound
2019-12-20 14:59:36 +01:00
Florian Roth
ab038d1ac7
style: minor changes
2019-12-20 14:59:26 +01:00
Thomas Patzke
9ca52259dd
Fixed identifier
2019-12-20 00:11:34 +01:00
Thomas Patzke
924e1feb54
UUIDs + moved unsupported logic
...
* Added UUIDs to all contributed rules
* Moved unsupported logic directory out of rules/ because this breaks CI
testing.
2019-12-19 23:56:36 +01:00
Thomas Patzke
694d666539
Merge branch 'master' into oscd
2019-12-19 23:15:15 +01:00
christophetd
e99b0fe2d7
Add sigma2attack
2019-12-19 00:00:13 +01:00
Riccardo Ancarani
8b70cb6761
Add Covenant default named pipe
...
Covenant (https://github.com/cobbr/Covenant ) can use named pipes for peer to peer communication.
The default named pipe name is "\gruntsvc".
References: https://posts.specterops.io/designing-peer-to-peer-command-and-control-ad2c61740456
2019-12-18 15:19:47 +00:00
Florian Roth
0a26184286
Merge pull request #563 from Neo23x0/devel
...
Devel
2019-12-17 14:48:07 +01:00
Florian Roth
c8b6b5c556
rule: updating csc.exe rule
2019-12-17 13:45:40 +01:00
Florian Roth
7a3041c593
rule: improved csc.exe rule
2019-12-17 11:05:43 +01:00
Thomas Patzke
397b3b8cc6
Updated rule test MITRE ATT&CK identifiers
2019-12-17 01:13:06 +01:00
Florian Roth
e8d92fab0c
rule: ryuk ransomware
2019-12-16 20:33:12 +01:00
Florian Roth
da06e5bc1c
Merge pull request #562 from Neo23x0/devel
...
Improved PowerShell Encoded Command Rule
2019-12-16 19:31:15 +01:00
Florian Roth
bbaa9df217
rule: better JAB rule
2019-12-16 19:08:51 +01:00
Florian Roth
f83eb2268e
rule: improved JAB expression
2019-12-16 19:04:05 +01:00
Florian Roth
bd7c996588
rule: suspicious PS rule modified to cover newest malware campaigns
2019-12-16 19:02:57 +01:00
Thomas Patzke
ef63a65efe
Converted to Unix line end
2019-12-15 23:30:42 +01:00
Yugoslavskiy Daniil
d19df2e4f7
fix issues with wrong tagging
2019-12-15 00:17:22 +01:00
Yugoslavskiy Daniil
9a511e5e62
fix issue with doubled detection section in apt_silence_downloader_v3.yml
2019-12-15 00:06:28 +01:00
Florian Roth
7acfecbe66
Merge pull request #530 from bartblaze/master
...
Add scriptlets
2019-12-14 11:24:51 +01:00
Thomas Patzke
d2a940a0a6
Merge branch 'devel' of https://github.com/Neo23x0/sigma
2019-12-13 22:01:40 +01:00
Thomas Patzke
5930c1c290
Updated changelog
2019-12-13 22:00:40 +01:00
Thomas Patzke
ee4138c48e
Merge pull request #526 from zouzias/hotfix_aggregate_count_distinct_groupby
...
[feature] extend es-dsl to support nested aggregations
2019-12-13 21:55:47 +01:00
Thomas Patzke
a25b2ec361
Merge pull request #523 from refractionPOINT/lc-added-mtd
...
LC added FP metadata
2019-12-13 21:50:52 +01:00
Thomas Patzke
1369b3a2dc
Merge pull request #537 from webhead404/webhead404-contrib-sigma
...
Added sigma rule to detect external devices or USB drive
2019-12-13 21:50:01 +01:00
Thomas Patzke
38b3ace461
Merge pull request #556 from Karneades/fixChangelog
...
Add release date for each version in changelog
2019-12-13 21:47:58 +01:00
Thomas Patzke
7a280ae092
Merge pull request #557 from robrankin/fix_dupe_rule_name
...
Elastalert error, duplicate rule titles
2019-12-13 21:46:58 +01:00
Florian Roth
1b42f2a0e2
Merge pull request #561 from Neo23x0/devel
...
Devel
2019-12-12 13:34:58 +01:00
Florian Roth
67dfd729fd
rule: extended Proxy UA suspicious rule
2019-12-12 10:42:23 +01:00
Florian Roth
9c59e3cf13
Merge branch 'master' into devel
2019-12-12 09:40:02 +01:00
Florian Roth
065df363dc
rule: added Empire UA
2019-12-12 09:39:28 +01:00
Florian Roth
c25b902add
Merge pull request #558 from vburov/patch-7
...
Added svchost.exe as a parent image
2019-12-10 20:17:22 +01:00
Florian Roth
611b72dba5
Merge pull request #559 from vburov/patch-8
...
Added some suspicious locations
2019-12-10 20:15:16 +01:00
Vasiliy Burov
977551c69d
Added some suspicious locations
...
Added 'C:\Windows\Tasks' and 'C:\Windows\System32\Tasks' as suspicious locations accordingly article: https://github.com/ThreatHuntingProject/ThreatHunting/blob/master/hunts/suspicious_process_creation_via_windows_event_logs.md
2019-12-10 20:17:40 +03:00
Vasiliy Burov
0dd4324aba
Added svchost.exe as a parent image
...
Added svchost.exe as a parent image accordingly this article (https://www.carbonblack.com/2014/06/10/screenshot-demo-hunt-evil-faster-than-ever-with-carbon-black/ ) and my investigations.
2019-12-10 19:31:12 +03:00
Karneades
fd4536afb5
Resolve PR #556 merge conflict
2019-12-09 21:23:00 +01:00
Rob Rankin
e251568760
Data Compressed duplciate titles
2019-12-09 16:24:10 +00:00
Rob Rankin
b771dd3d3b
Rule name conflicts in Elastalert output
2019-12-09 16:14:28 +00:00
Thomas Patzke
b701e9be50
Added ECS proxy configuration
2019-12-09 16:34:07 +01:00
Karneades
1c05b858fd
Add release date for each version in changelog
2019-12-09 16:18:58 +01:00
Thomas Patzke
a9d6158dde
Merge branch 'rules'
2019-12-09 16:17:39 +01:00
Thomas Patzke
2ea87f187c
Added Ursnif proxy detections
2019-12-09 16:02:10 +01:00
Yugoslavskiy Daniil
185a634bd9
update authors for 2 rules
2019-12-07 02:10:06 +01:00
Yugoslavskiy Daniil
4789b15fd5
add rules by Sergey Soldatov, Kaspersky Lab
2019-12-07 01:45:55 +01:00
Thomas Patzke
991108e64d
Further proxy field name fixes (config + rules)
2019-12-07 00:23:30 +01:00
Thomas Patzke
dd8442590f
Fixed proxy rule field names
2019-12-07 00:11:33 +01:00
Thomas Patzke
51e9689425
Sigmatool release 0.15.0
2019-12-06 22:13:44 +01:00
Thomas Patzke
58d8512396
Merge pull request #553 from berggren/patch-1
...
Add source distribution for PyPi when building
2019-12-06 22:10:19 +01:00
Johan Berggren
d8e1f56219
Add source distribution for PyPi when building
...
Add sdist when building. This makes it easier to build packages from PyPi for example Debian PPA pkgs etc.
This will not affect anything else, just make the source distribution available in PyPi as a tar.gz archive.
If this gets merged, please bump the version and push to PyPi as well.
2019-12-06 15:45:28 +01:00
Florian Roth
e1244acf49
rule: fixed and extended bitsadmin rule
2019-12-06 13:39:04 +01:00
Florian Roth
c1647ca4b7
Merge branch 'master' into devel
2019-12-06 13:38:29 +01:00
Florian Roth
e91a79e707
Merge pull request #550 from refractionPOINT/lc-proxy-support
...
LimaCharlie basic support for Proxy rule category.
2019-12-06 08:20:14 +01:00
Florian Roth
6359223390
Merge pull request #551 from axi0m/patch-1
...
Add hastebin raw URI to contains selection
2019-12-06 08:19:44 +01:00
Kevin Dienst
865251238f
Add hastebin raw URI to contains selection
2019-12-05 14:16:20 -06:00
Maxime Lamothe-Brassard
27bb07b74e
Adding support for basic proxy rules using the HTTP_REQUEST events from the Chrome LC Agent.
2019-12-05 09:35:09 -08:00
Florian Roth
ab2dd094a5
fix: fixed broken link in elise rule
2019-12-05 09:56:20 +01:00
Florian Roth
8e107f43a2
rule: raw paste service access
2019-12-05 08:54:49 +01:00
Thomas Patzke
ad7d5d2a39
Added WMI login rule
2019-12-04 11:13:04 +01:00
Thomas Patzke
e8c1c97f3e
Added rule for failed code integrity checks
2019-12-03 15:08:26 +01:00
Thomas Patzke
c47af5169c
Increased SID history rule severity
2019-12-03 14:28:46 +01:00
Thomas Patzke
76578927e8
Added domain trust rule
2019-12-03 14:28:20 +01:00
Florian Roth
c8e29da7ec
fix: simplified rule with RE
2019-12-03 11:24:06 +01:00
Florian Roth
fc09533f56
style: fixed title
2019-12-03 11:24:06 +01:00
yugoslavskiy
15cb1c42a9
Merge branch 'mrblacyk-oscd' into oscd
2019-12-02 02:57:07 +01:00
yugoslavskiy
edad1695f6
Merge branch 'oscd' of https://github.com/mrblacyk/sigma into mrblacyk-oscd
2019-12-02 02:56:53 +01:00
yugoslavskiy
48a94d1609
Update lnx_dd_delete_file.yml
2019-12-02 02:54:48 +01:00
yugoslavskiy
ca1c2f4436
Update lnx_chattr_immutable_removal.yml
2019-12-02 02:54:32 +01:00
yugoslavskiy
9e90335a5a
Update lnx_pers_systemd_reload.yml
2019-12-02 02:54:13 +01:00
yugoslavskiy
46ca68436e
Update lnx_file_or_folder_permissions.yml
2019-12-02 02:53:35 +01:00
yugoslavskiy
1273a10dcb
add win_new_service_creation.yml
2019-12-02 01:19:54 +01:00
yugoslavskiy
9fba097421
add sysmon_in_memory_powershell.yml by Tom Kern
2019-12-01 23:26:00 +01:00
booberry46
df162b232f
Update win_malware_emotet.yml
2019-11-30 13:17:44 +08:00
Thomas Patzke
98be3ce069
Fixed changelog (missing title)
2019-11-30 00:34:17 +01:00
mrblacyk
9d0889def4
Adding auditd compatibility
2019-11-29 09:34:08 +01:00
mrblacyk
cafbb25d2e
Update lnx_file_or_folder_permissions.yml
2019-11-29 09:33:04 +01:00
mrblacyk
bf5e6cc56b
Adding auditd compatibility
2019-11-29 09:32:05 +01:00
mrblacyk
a15c84eb80
Adding auditd compatibility
2019-11-29 09:27:31 +01:00
Yugoslavskiy Daniil
71e588cae1
add apt silence rules by Group-IB
2019-11-28 21:15:55 +01:00
Lep
60997b47b2
moreEventID
2019-11-28 21:34:52 +07:00
Lep
412dfc4f05
Merge branch 'master' of http://git.security.fis.vn/VuNX2/sigma
2019-11-28 17:38:57 +07:00
Lep
738008b52b
requiment
2019-11-28 17:38:05 +07:00
Nguyen Xuan Vu
042d078ee1
Update requirements.txt
2019-11-28 05:26:09 -05:00
Lep
158ffd2f0c
requiment
2019-11-28 17:23:05 +07:00
Nguyen Xuan Vu
f1ae6fa1ed
Update README.md
2019-11-28 04:56:05 -05:00
Nguyen Xuan Vu
6ce5a2554f
Update README.md
2019-11-28 04:41:58 -05:00
Nguyen Xuan Vu
1fcdf6e5d0
Update README.md
2019-11-28 04:40:52 -05:00
Nguyen Xuan Vu
cd1866b30f
Update README.md
2019-11-28 04:38:03 -05:00
Nguyen Xuan Vu
6fa6cba16d
Update README.md
2019-11-28 04:32:34 -05:00
Nguyen Xuan Vu
31cf40e0e8
Update README.md
2019-11-28 04:31:52 -05:00
Nguyen Xuan Vu
2da7f36e48
Update README.md
2019-11-28 04:31:04 -05:00
Lep
37257170dd
postAPI
2019-11-28 16:01:24 +07:00
Lep
d08ff35222
postAPI
2019-11-28 11:45:49 +07:00
yugoslavskiy
d5722979ea
add rules by Daniel Bohannon
2019-11-27 00:02:45 +01:00
yugoslavskiy
41a09cde34
updated filenames
2019-11-26 23:31:18 +01:00
webhead404
21ef152e3a
Update win_external_device.yml
2019-11-20 16:19:45 -06:00
webhead404
2bfd4ea654
Added MITRE tags
2019-11-20 16:18:03 -06:00
webhead404
b96ad8ccd7
Merge pull request #2 from webhead404/webhead404-contrib
...
Create win_external_device
2019-11-20 16:09:15 -06:00
webhead404
5c5d28acdc
Create win_external_device
2019-11-20 16:07:29 -06:00
Florian Roth
39293d5f2b
rule: another reference for CVE-2019-1388 rule
2019-11-20 15:09:30 +01:00
Florian Roth
00a26dff16
Merge pull request #536 from Neo23x0/devel
...
Changes to CVE-2019-1388 rule
2019-11-20 09:27:56 +01:00
Florian Roth
f9e6a929ba
rule: made it more specific - command line must contain URL
2019-11-20 09:23:04 +01:00
Florian Roth
55e66b1843
rule: added status
2019-11-20 09:21:42 +01:00
Florian Roth
0b9cd47c1e
Merge pull request #535 from Neo23x0/devel
...
Rule to detect CVE-2019-1388
2019-11-20 09:19:52 +01:00
Florian Roth
4022e3251b
rule: changed title
2019-11-20 09:16:00 +01:00
Florian Roth
158f6b3065
rule: exploitation of CVE-2019-1388
2019-11-20 09:12:02 +01:00
Florian Roth
a6d069c6d2
Merge branch 'master' into devel
2019-11-19 15:59:22 +01:00
Florian Roth
98aa4d4ecb
fix: fixed typo in rule for renamed procdump
2019-11-19 15:59:07 +01:00
yugoslavskiy
1b591ee598
add JET CSIRT team sysmon_process_reimaging.yml with unsupported logic
2019-11-19 02:17:07 +01:00
yugoslavskiy
2a33e6fed9
unify location of rules with unsupported logic
2019-11-19 02:12:22 +01:00
yugoslavskiy
efc404fbae
resolve conflicts with rule IDs; restored and deprecated sysmon_mimikatz_detection_lsass.yml
2019-11-19 02:11:19 +01:00
Maxime Lamothe-Brassard
61bcc46394
Prettier formatting of YAML.
2019-11-18 14:50:41 -05:00
Florian Roth
0dd583510a
Merge pull request #534 from Neo23x0/devel
...
rules and fixes
2019-11-18 16:01:26 +01:00
Florian Roth
2c855be9d3
fix: casing fix in renamed procdump rule
2019-11-18 15:57:14 +01:00
Florian Roth
fdc32889a7
rule: PulseSecure CVE-2019-11510 attack
2019-11-18 15:33:58 +01:00
Florian Roth
93f890b31d
rule: renamed procdump
2019-11-18 15:27:04 +01:00
Florian Roth
da05c9bb82
fix: line break in description
2019-11-18 15:26:55 +01:00
Florian Roth
2c54d1afe4
rule: removed Zebrocy rule because it doesn't work that way
...
reason: command line gets split up at the '&' character, which results in two command lines
2019-11-18 11:42:38 +01:00
Austin Clark
ad1a6a2bd3
Update cisco_cli_net_sniff.yml
2019-11-15 19:32:53 +01:00
Austin Clark
441a302623
Update cisco_cli_moving_data.yml
2019-11-15 19:31:41 +01:00
Austin Clark
93a40b3b97
Update cisco_cli_modify_config.yml
2019-11-15 19:31:07 +01:00
Austin Clark
9cd6670501
Update cisco_cli_local_accounts.yml
2019-11-15 19:30:33 +01:00
Austin Clark
ed85f1e612
Update cisco_cli_input_capture.yml
2019-11-15 19:11:03 +01:00
Austin Clark
d8e0cfb64c
Update cisco_cli_file_deletion.yml
2019-11-15 19:10:19 +01:00
Austin Clark
af1cf4615f
Update cisco_cli_dos.yml
2019-11-15 19:09:38 +01:00
Austin Clark
46c63094de
Update cisco_cli_discovery.yml
2019-11-15 19:08:53 +01:00
Austin Clark
ac07b00497
Update cisco_cli_disable_logging.yml
2019-11-15 19:08:08 +01:00
Austin Clark
6448631005
Update cisco_cli_crypto_actions.yml
2019-11-15 19:07:09 +01:00
Austin Clark
82237fa347
Update cisco_cli_collect_data.yml
2019-11-15 19:05:55 +01:00
Austin Clark
55f467eae2
Update cisco_cli_clear_logs.yml
2019-11-15 19:05:02 +01:00
Maxime Lamothe-Brassard
9eed57ee1d
Adding the "falsepositives" field to the LC metadata.
2019-11-15 08:30:41 -05:00
Florian Roth
396c506794
Merge pull request #532 from Neo23x0/devel
...
rule: RottenPotato attack pattern
2019-11-15 12:01:42 +01:00
Florian Roth
04288771a1
fix: bugfix in RottenPotato rule - wrong identifier
2019-11-15 11:50:03 +01:00
Florian Roth
7e6031705e
rule: RottenPotato attack pattern
2019-11-15 11:44:18 +01:00
Florian Roth
c99ab28834
Merge pull request #531 from Neo23x0/devel
...
Devel
2019-11-15 00:34:38 +01:00
Florian Roth
ff3ed04405
rule: Exploiting SetupComplete.cmd CVE-2019-1378
2019-11-15 00:26:18 +01:00
Florian Roth
2cf6e16024
fix: missing new MITRE tactics category in tests
2019-11-14 23:31:38 +01:00
Bart
a5b4b276d4
Add scriptlets
...
Adds .sct and .vbe.
2019-11-14 22:26:22 +01:00
Austin Clark
4ec6babdff
Delete test
2019-11-14 20:56:21 +01:00
Austin Clark
85403d353c
Add files via upload
2019-11-14 20:55:28 +01:00
Austin Clark
2c8f6b5020
Create test
2019-11-14 20:53:56 +01:00
Anastasios Zouzias
3c7f522017
add .keyword on aggs; add extra unit test
2019-11-14 14:34:50 +01:00
Florian Roth
e8bfc28284
Merge branch 'devel'
2019-11-14 10:16:56 +01:00
Florian Roth
2b7699cc15
fix: fixed broken condition
2019-11-14 10:15:18 +01:00
Florian Roth
2e452d4035
Merge pull request #528 from Neo23x0/devel
...
Rule: suspicious msiexec directory
2019-11-14 10:00:12 +01:00
Florian Roth
95a8563606
Rule: suspicious msiexec directory
2019-11-14 09:51:55 +01:00
yugoslavskiy
ac21810d7a
Merge pull request #516 from yugoslavskiy/oscd_task_#2_credentials_dumping
...
oscd task #2 completed
2019-11-14 01:03:27 +03:00
yugoslavskiy
1cc9ddc8b8
Update win_dumping_ntdsdit_via_netsync.yml
2019-11-14 01:00:28 +03:00
yugoslavskiy
d29941b414
Update win_dumping_ntdsdit_via_dcsync.yml
2019-11-14 00:59:38 +03:00
yugoslavskiy
01ed5a7135
Update sysmon_unsigned_image_loaded_into_lsass.yml
2019-11-14 00:58:39 +03:00
yugoslavskiy
20a5c9498c
Update sysmon_raw_disk_access_using_illegitimate_tools.yml
2019-11-14 00:58:00 +03:00
yugoslavskiy
4b8873b706
Update sysmon_lsass_memory_dump_file_creation.yml
2019-11-14 00:55:20 +03:00
yugoslavskiy
f0cce60a2c
Update sysmon_cred_dump_tools_dropped_files.yml
2019-11-14 00:53:25 +03:00
yugoslavskiy
9b9f37715f
Update process_creation_shadow_copies_deletion.yml
2019-11-14 00:50:10 +03:00
yugoslavskiy
a1831bb503
Update process_creation_shadow_copies_creation.yml
2019-11-14 00:48:50 +03:00
yugoslavskiy
1445589839
Update process_creation_copying_sensitive_files_with_credential_data.yml
2019-11-14 00:47:14 +03:00
yugoslavskiy
c7c29a39b6
Update win_susp_lsass_dump_generic.yml
2019-11-14 00:45:47 +03:00
yugoslavskiy
633c6db254
Update win_remote_registry_management_using_reg_utility.yml
2019-11-14 00:44:47 +03:00
yugoslavskiy
cd31354df2
Update win_quarkspwdump_clearing_hive_access_history.yml
2019-11-14 00:43:56 +03:00
yugoslavskiy
334626168c
Update win_mal_service_installs.yml
2019-11-14 00:43:03 +03:00
yugoslavskiy
fecaddcd47
Merge pull request #505 from darkquasar/master
...
Adding rule Suspicious In-Memory Module Execution
2019-11-14 00:36:53 +03:00
yugoslavskiy
cd69111522
Merge branch 'oscd' into master
2019-11-14 00:36:34 +03:00
yugoslavskiy
3cd1abd0a1
Update sysmon_suspicious_remote_thread.yml
2019-11-14 00:34:09 +03:00
yugoslavskiy
1e75979a2a
Update sysmon_minidumwritedump_lsass.yml
2019-11-14 00:32:06 +03:00
yugoslavskiy
f2caf366cb
moved net_possible_dns_rebinding.yml to unsupported logic directory; renamed win_powershell_bitsjob.yaml -> win_powershell_bitsjob.yml
2019-11-14 00:24:53 +03:00
yugoslavskiy
94caaff4fa
Merge branch 'oscd' of https://github.com/Neo23x0/sigma into oscd
2019-11-14 00:23:22 +03:00
yugoslavskiy
cb29628ceb
modify rules based on BSI contribution
2019-11-14 00:23:16 +03:00
yugoslavskiy
c8ee6e9631
Merge pull request #504 from yugoslavskiy/oscd_ilyas_ochkov
...
[OSCD] Ilyas Ochkov contribution
2019-11-14 00:22:48 +03:00
yugoslavskiy
b47748399d
Update sysmon_new_dll_added_to_appcertdlls_registry_key.yml
2019-11-14 00:19:30 +03:00
yugoslavskiy
1fe7f55d47
Update sysmon_suspicious_outbound_kerberos_connection.yml
2019-11-14 00:10:05 +03:00
yugoslavskiy
07ad11f3ae
Update sysmon_possible_dns_rebinding.yml
2019-11-14 00:08:50 +03:00
yugoslavskiy
ded75d033a
Update sysmon_new_dll_added_to_appinit_dlls_registry_key.yml
2019-11-13 23:47:24 +03:00
yugoslavskiy
0cb1d4fdbd
Update sysmon_new_dll_added_to_appcertdlls_registry_key.yml
2019-11-13 23:44:03 +03:00
yugoslavskiy
bba360212a
Update sysmon_new_dll_added_to_appcertdlls_registry_key.yml
2019-11-13 23:43:45 +03:00
yugoslavskiy
e6e308ef51
Update sysmon_disable_security_events_logging_adding_reg_key_minint.yml
2019-11-13 23:40:29 +03:00
yugoslavskiy
d8447946d6
Update win_suspicious_outbound_kerberos_connection.yml
2019-11-13 23:37:25 +03:00
yugoslavskiy
7f01a5b1bb
Update win_new_or_renamed_user_account_with_dollar_sign.yml
2019-11-13 23:35:59 +03:00
yugoslavskiy
26479485e6
Update win_new_or_renamed_user_account_with_dollar_sign.yml
2019-11-13 23:34:46 +03:00
Thomas Patzke
cf22e9e576
Added hint on failed UUID check
2019-11-12 23:37:28 +01:00
Thomas Patzke
8d8530be2a
Added UUID check to CI tests
2019-11-12 23:15:30 +01:00
Thomas Patzke
0592cbb67a
Added UUIDs to rules
2019-11-12 23:12:27 +01:00
Thomas Patzke
ca53e937d9
Removed sigma.output from setup packages
2019-11-12 23:11:39 +01:00
Thomas Patzke
5f6a4225ec
Unified line terminators of rules to Unix
2019-11-12 23:05:36 +01:00
Thomas Patzke
d16175fe35
Added id diff filter script
2019-11-12 23:05:27 +01:00
Thomas Patzke
3828f4a95c
Merge branch 'uuid' into assign-ids
2019-11-12 22:46:54 +01:00
Thomas Patzke
d42cc78509
Converted rules Sysmon/1 parts to generic process_creation
2019-11-12 21:06:24 +01:00
Thomas Patzke
0065e2420f
Merge branch 'oscd-qa'
2019-11-12 20:54:11 +01:00
Anastasios Zouzias
e7ed0fa9ea
added unit test
2019-11-12 14:06:10 +01:00
Florian Roth
b7c3f8da91
refactor: cleanup, single element lists, renamed files, level adjustments
2019-11-12 12:55:05 +01:00
Anastasios Zouzias
324005a126
[feature] extend es-dsl to support nested aggregations
2019-11-12 11:46:43 +01:00
Thomas Patzke
ffdf312932
Added Ursnif user agents
2019-11-12 08:52:37 +01:00
Thomas Patzke
6d62d426c9
Added sigma-uuid tool
...
* Moved SigmaYAMLDumper to new sigma.output module
2019-11-11 23:35:16 +01:00
yugoslavskiy
a4331b0eec
Merge pull request #498 from theRabbitCode/oscd
...
[OSCD] Added Atomic Blue Detections Repo
2019-11-11 23:22:57 +03:00
yugoslavskiy
1f142f6613
Delete win_reg_sam_dumping.yml
...
redundant with https://github.com/Neo23x0/sigma/pull/516/files#diff-2f8d87b345d7d8c228d22b7a3b83c6ee
authorship has been updated
2019-11-11 23:22:47 +03:00
yugoslavskiy
cad0e30933
Update process_creation_grabbing_sensitive_hives_via_reg.yml
2019-11-11 23:22:25 +03:00
yugoslavskiy
38d0f832a4
Update win_uac_wsreset.yml
2019-11-11 23:13:28 +03:00
yugoslavskiy
49fb6bdf8f
Update win_uac_fodhelper.yml
2019-11-11 23:10:49 +03:00
yugoslavskiy
f991bf20b0
Update win_uac_cmstp.yml
2019-11-11 23:05:43 +03:00
yugoslavskiy
7f975f5878
Update win_trust_discovery.yml
2019-11-11 23:02:13 +03:00
yugoslavskiy
4c10a36e94
Update win_remote_time_discovery.yml
2019-11-11 22:51:35 +03:00
yugoslavskiy
ef55a580cf
Update win_net_enum.yml
2019-11-11 22:36:00 +03:00
yugoslavskiy
4635c5b1f9
Update win_net_user_add.yml
2019-11-11 22:35:43 +03:00
yugoslavskiy
bf4c2a508d
Update win_powershell_bitsjob.yaml
2019-11-11 22:06:57 +03:00
yugoslavskiy
90bf1c4187
Update win_powershell_audio_capture.yml
2019-11-11 22:03:49 +03:00
yugoslavskiy
8d9e293143
Update win_net_user_add.yml
2019-11-11 22:00:46 +03:00
yugoslavskiy
81b373cea7
Update win_net_enum.yml
2019-11-11 21:54:23 +03:00
yugoslavskiy
b181f09339
Update win_net_enum.yml
2019-11-11 21:53:18 +03:00
yugoslavskiy
f169163d3e
Update win_mshta_javascript.yml
2019-11-11 21:49:46 +03:00
yugoslavskiy
20a116cde5
Update win_lsass_dump.yml
2019-11-11 21:46:54 +03:00
Florian Roth
b6f94b1352
Merge pull request #522 from Neo23x0/devel
...
fix: wrong mapping on thor.cfg
2019-11-11 09:21:09 +01:00
Florian Roth
e2628d6df6
fix: wrong mapping on thor.cfg
2019-11-11 09:20:20 +01:00
yugoslavskiy
119a3417c6
Update win_interactive_at.yml
2019-11-11 04:06:37 +03:00
yugoslavskiy
e18ff0b9f9
Update win_interactive_at.yml
2019-11-11 04:05:21 +03:00
yugoslavskiy
c584b67095
Update win_indirect_cmd.yml
2019-11-11 03:20:09 +03:00
yugoslavskiy
f585c556a4
Update win_hh_chm.yml
2019-11-11 03:04:54 +03:00
yugoslavskiy
7e170900ba
Merge pull request #485 from 4A616D6573/patch-1
...
Update win_susp_net_execution.yml
2019-11-11 02:58:31 +03:00
yugoslavskiy
24ea49a2a1
Update win_susp_net_execution.yml
2019-11-11 02:57:59 +03:00
yugoslavskiy
03d08067b5
Delete win_fsutil_usn_delete.yml
...
redundant with ./rules/windows/process_creation/win_susp_fsutil_usage.yml.
authorship has been updated
2019-11-11 02:11:28 +03:00
yugoslavskiy
e7e9185f99
Delete win_eventlog_cleared.yml
...
redundant with ./rules/windows/process_creation/win_susp_eventlog_clear.yml
2019-11-11 01:59:29 +03:00
yugoslavskiy
521d9311c7
Delete win_cmd_rar.yml
...
redundant with ./rules/windows/process_creation/win_data_compressed_with_rar.yml
authorship was updated
2019-11-11 01:58:22 +03:00
yugoslavskiy
afb17d0e0e
Update win_bootconf_mod.yml
2019-11-11 01:53:46 +03:00
yugoslavskiy
fc8901fa1a
Update win_soundrec_audio_capture.yml
2019-11-11 01:45:39 +03:00
yugoslavskiy
bdff2c312b
Update lnx_auditd_ld_so_preload_mod.yml
2019-11-11 01:44:53 +03:00
yugoslavskiy
570f5b238e
Update win_soundrec_audio_capture.yml
2019-11-11 01:40:45 +03:00
yugoslavskiy
37098be291
Update win_net_user_add.yml
2019-11-11 01:35:51 +03:00
yugoslavskiy
385ebac502
Merge pull request #497 from Heirhabarov/master
...
OSCD Task 1 - Privilege Escalation
2019-11-11 01:33:28 +03:00
yugoslavskiy
8adc51d4aa
Update sysmon_possible_privilege_escalation_via_service_registry_permissions_weakness.yml
2019-11-11 01:30:19 +03:00
yugoslavskiy
20c87ae83c
Update win_whoami_as_system.yml
2019-11-11 01:18:45 +03:00
yugoslavskiy
0e6d4f7d76
Update win_using_sc_to_change_sevice_image_path_by_non_admin.yml
2019-11-11 01:17:47 +03:00
yugoslavskiy
454701cbee
Update win_possible_privilege_escalation_using_rotten_potato.yml
2019-11-11 01:10:18 +03:00
yugoslavskiy
24e17a9c50
Update win_meterpreter_or_cobaltstrike_getsystem_service_start.yml
2019-11-11 01:08:35 +03:00
yugoslavskiy
a69d9d9980
Update win_meterpreter_or_cobaltstrike_getsystem_service_installation.yml
2019-11-11 01:04:01 +03:00
yugoslavskiy
69a99bc2c3
Merge pull request #493 from alx1m1k/oscd
...
[OSCD] rules from Jet CSIRT team
2019-11-10 23:11:24 +03:00
yugoslavskiy
1f5a31f0e7
fix logsource for remote_powershell_session_process.yml
2019-11-10 23:10:24 +03:00
yugoslavskiy
fcde35d6ab
Update sysmon_regsvr32_network_activity.yml
2019-11-10 22:51:53 +03:00
yugoslavskiy
0beeaadb6f
Update sysmon_narrator_feedback_persistance.yml
2019-11-10 22:47:48 +03:00
yugoslavskiy
5756df1922
rename file
2019-11-10 21:56:34 +03:00
yugoslavskiy
86d315598b
Merge branch 'oscd' of https://github.com/Neo23x0/sigma into oscd
2019-11-10 21:40:15 +03:00
yugoslavskiy
6f2243efc4
fix reg rule
2019-11-10 21:40:08 +03:00
yugoslavskiy
e5e44e2ade
Merge pull request #488 from stvetro/oscd
...
[OSCD][ART] Task 7: T1060, T1031
2019-11-10 21:39:32 +03:00
yugoslavskiy
f2f1628506
Update and rename sysmon_runkey_from_powershell.yml to sysmon_asep_regirstry_modification.yml
2019-11-10 21:36:21 +03:00
yugoslavskiy
0d00b643cd
Update win_susp_service_path_modification.yml
2019-11-10 21:25:26 +03:00
yugoslavskiy
b9991bb2ec
Update win_susp_netsh_dll_persistence.yml
2019-11-10 21:21:42 +03:00
yugoslavskiy
b665b1b990
Update and rename win_susp_direct_run_key_modification.yml to win_susp_direct_asep_reg_keys_modification.yml
2019-11-10 21:19:06 +03:00
yugoslavskiy
0db5436778
add tieto dns exfil rules
2019-11-10 20:27:21 +03:00
yugoslavskiy
bdac415fea
Merge pull request #486 from yugoslavskiy/tieto_oscd
...
[OSCD] Tieto DNS exfiltration rules
2019-11-10 19:36:02 +03:00
yugoslavskiy
4fa928866f
oscd task #6 done.
...
add 25 new rules:
- win_ad_replication_non_machine_account.yml
- win_dpapi_domain_backupkey_extraction.yml
- win_protected_storage_service_access.yml
- win_dpapi_domain_masterkey_backup_attempt.yml
- win_sam_registry_hive_handle_request.yml
- win_sam_registry_hive_dump_via_reg_utility.yml
- win_lsass_access_non_system_account.yml
- win_ad_object_writedac_access.yml
- powershell_alternate_powershell_hosts.yml
- sysmon_remote_powershell_session_network.yml
- win_remote_powershell_session.yml
- win_scm_database_handle_failure.yml
- win_scm_database_privileged_operation.yml
- sysmon_wmi_module_load.yml
- sysmon_remote_powershell_session_process.yml
- sysmon_rdp_registry_modification.yml
- sysmon_powershell_execution_pipe.yml
- sysmon_alternate_powershell_hosts_pipe.yml
- sysmon_powershell_execution_moduleload.yml
- sysmon_createremotethread_loadlibrary.yml
- sysmon_alternate_powershell_hosts_moduleload.yml
- powershell_remote_powershell_session.yml
- win_non_interactive_powershell.yml
- win_syskey_registry_access.yml
- win_wmiprvse_spawning_process.yml
improve 1 rule:
- rules/windows/builtin/win_account_backdoor_dcsync_rights.yml
2019-11-10 18:43:41 +03:00
yugoslavskiy
c0ac9b8fb9
fix conflict
2019-11-10 17:31:33 +03:00
yugoslavskiy
127335a0ec
Merge pull request #482 from yugoslavskiy/master
...
[OSCD][The ThreatHunter-Playbook] Task 6: DONE
2019-11-10 17:27:54 +03:00
yugoslavskiy
a59d4fdd33
Merge branch 'master' of https://github.com/Neo23x0/sigma into oscd
2019-11-10 14:47:27 +03:00
Thomas Patzke
feb836cbf2
Sigmatools release 0.14
2019-11-10 00:09:59 +01:00
Florian Roth
8cc16d252a
fix: more FP reductions
2019-11-09 23:36:29 +01:00
Florian Roth
038f205f0f
fix: FPs with UserInitMprLogonScript rule
2019-11-09 23:32:53 +01:00
Florian Roth
fbe138ed90
rule: reduced level of rule to medium due to FPs
2019-11-09 23:24:31 +01:00
Florian Roth
faeccf0c3d
Merge branch 'master' into devel
2019-11-09 22:42:16 +01:00
Florian Roth
a0beda240c
fix: fixed wrong field mapping in windows-audit source config
2019-11-09 22:42:00 +01:00
Florian Roth
ef0af10747
Merge pull request #521 from Neo23x0/devel
...
fix: fixed false positive in suspicious shell spawn rule
2019-11-09 12:50:50 +01:00
Florian Roth
9835950f04
rule: SID to AD object rule level adjusted
2019-11-09 12:49:54 +01:00
Florian Roth
be62fad5cc
fix: fixed false positive in suspicious shell spawn rule
2019-11-09 10:45:46 +01:00
Thomas Patzke
2222550b6e
Allow ignore of type errors with sigmac -I
2019-11-08 23:56:39 +01:00
Thomas Patzke
8f1974d7d3
Added regular expression support in es-dsl backend
2019-11-08 23:56:39 +01:00
Thomas Patzke
2078a1d4f2
Added changelog
2019-11-08 23:56:39 +01:00
Thomas Patzke
8ae824f09f
Improved rules
...
Reduced false positives
2019-11-08 23:56:14 +01:00
Thomas Patzke
465e41bfbb
Added regular expression support in es-dsl backend
2019-11-08 22:31:02 +01:00
Thomas Patzke
238adf9eea
Improved rule test
...
* Added ATT&CK technique
* Removed invalid tags
2019-11-08 22:03:19 +01:00
Thomas Patzke
6e2fe09d24
Removed invalid tags
2019-11-08 22:02:12 +01:00
Thomas Patzke
5d995ad704
sigma-similarity: primary rule set for restriction of comparison
2019-11-08 21:15:13 +01:00
yugoslavskiy
5861664d0f
Update win_dsquery_domain_trust_discovery.yml
2019-11-08 02:58:32 +03:00
yugoslavskiy
3624a7d5da
Update win_file_permission_modifications.yml
2019-11-08 02:51:42 +03:00
yugoslavskiy
7d3c9e129d
Update win_service_stop.yml
2019-11-08 02:40:37 +03:00
yugoslavskiy
b176339da8
Merge pull request #479 from alexpetrov12/master
...
add rule
2019-11-08 02:16:22 +03:00
yugoslavskiy
00fc6c62b4
Delete renamed_binary_description.yml
...
agreed on improvements. will be added later
2019-11-08 02:16:01 +03:00
yugoslavskiy
98f32e9098
Delete sysmon_mimikatz_сreds_dump.yml
...
merged with rules/windows/sysmon/sysmon_cred_dump_lsass_access.yml
2019-11-08 02:06:31 +03:00
yugoslavskiy
6d61401b12
Delete sysmon_сreds_dump.yml
...
merged with rules/windows/sysmon/sysmon_cred_dump_lsass_access.yml
2019-11-08 02:06:20 +03:00
yugoslavskiy
6b98c37910
Update and rename sysmon_mimikatz_detection_lsass.yml to sysmon_cred_dump_lsass_access.yml
2019-11-08 02:05:34 +03:00
yugoslavskiy
562e07de38
Delete cobalt_execute_assembly.yml
...
merged with existing [sysmon_cobaltstrike_process_injection.yml](https://github.com/Neo23x0/sigma/blob/oscd/rules/windows/sysmon/sysmon_cobaltstrike_process_injection.yml )
2019-11-08 01:42:42 +03:00
yugoslavskiy
52d099a6e3
improve sysmon_cobaltstrike_process_injection.yml
2019-11-08 01:41:26 +03:00
yugoslavskiy
4443870577
Delete win_odbcconf_execution.yml
...
merged with rules/windows/process_creation/win_odbcconf_execution.yml
2019-11-08 01:36:03 +03:00
yugoslavskiy
3b34ed6150
add modifiers
2019-11-08 01:34:30 +03:00
Thomas Patzke
8b7560c2f4
Added changelog
2019-11-07 23:08:44 +01:00
yugoslavskiy
8164e1e096
Update sysmon_mimikatz_detection_lsass.yml
2019-11-07 04:50:22 +03:00
yugoslavskiy
7affc09c19
Update sysmon_mimikatz_detection_lsass.yml
2019-11-07 04:33:40 +03:00
yugoslavskiy
92e09db9ab
Update win_susp_lsass_dump_generic.yml
2019-11-07 04:27:53 +03:00
yugoslavskiy
6083d70975
Update sysmon_registry_persistence_key_linking.yml
2019-11-07 04:23:20 +03:00
yugoslavskiy
82b185db6a
Update win_sysmon_driver_unload.yml
2019-11-07 04:11:26 +03:00
yugoslavskiy
404a6d9915
Update win_netsh_packet_capture.yml
2019-11-07 03:37:41 +03:00
yugoslavskiy
ddf24819ed
Update silenttrinity_stage_use.yml
2019-11-07 03:33:12 +03:00
yugoslavskiy
0d8c64da86
duplicate rule deleted
...
this rule already present in Sigma repo — [./rules/windows/process_creation/win_susp_comsvcs_procdump.yml](https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_susp_comsvcs_procdump.yml )
2019-11-07 03:21:09 +03:00
yugoslavskiy
5513687e63
Merge branch 'master' of https://github.com/Neo23x0/sigma into oscd
2019-11-07 03:03:35 +03:00
webhead404
a704256632
Merge pull request #1 from webhead404/webhead404-patch-1
...
Update and add another selection for regsvr32
2019-11-06 15:51:30 -06:00
webhead404
f7a968e3d2
Update and add another selection for regsvr32
...
Added cmd.exe to the detection after observing Atomic Red Team test
https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1117/T1117.md#atomic-test-2---regsvr32-remote-com-scriptlet-execution
2019-11-06 15:49:53 -06:00
booberry46
cfe7ddbe5b
Update av_exploiting.yml
...
Not sure if the '' affects.
2019-11-06 16:16:49 +08:00
Thomas Patzke
ef14ee542d
Added modifiers: startswith and endswith
2019-11-05 23:04:13 +01:00
Thomas Patzke
97d13660f7
Merge pull request #517 from Neo23x0/devel
...
Firewall Deactivation Rule
2019-11-05 22:54:50 +01:00
Thomas Patzke
7a81054cdd
Merge pull request #518 from refractionPOINT/master
...
LimaCharlie Productionization
2019-11-05 22:54:01 +01:00
Maxime Lamothe-Brassard
1b9054c1f3
Adding some comments
2019-11-05 08:39:24 -05:00
Maxime Lamothe-Brassard
b7018bcd4a
Adding a post-mapper mechanism to fix some common issues in Sigma rules to LC.
2019-11-05 08:39:24 -05:00
Maxime Lamothe-Brassard
c2e621cf08
Fixing another edge case with string escape.
2019-11-05 08:39:24 -05:00
Maxime Lamothe-Brassard
0c6b9e532b
Remove debugging statement
2019-11-05 08:39:24 -05:00
Maxime Lamothe-Brassard
6f2f1d2bd7
Add ability to map fields and values based on callbacks.
2019-11-05 08:39:24 -05:00
Maxime Lamothe-Brassard
0b9a3f3a08
Refactor to better support keyword fields.
2019-11-05 08:39:24 -05:00
Maxime Lamothe-Brassard
9aedb8f764
Adding another exception case to get more "contains" shortcuts instead of REs.
2019-11-05 08:39:24 -05:00
Maxime Lamothe-Brassard
102ab3081b
Fix the convertion from simple wildcard strings to a full regular expression so that it is always correct. The previous solution just mostly-worked.
2019-11-05 08:39:24 -05:00
Maxime Lamothe-Brassard
e52f29dda9
Fix matches operator field set to value instead of re.
2019-11-05 08:38:06 -05:00
Florian Roth
c60563e546
rule: add modified rule date
2019-11-05 11:24:52 +01:00
yugoslavskiy
82f23c5f63
Merge pull request #477 from zinint/oscd
...
add 13 new rules:
- rules/linux/auditd/lnx_auditd_masquerading_crond.yml
- rules/linux/auditd/lnx_auditd_user_discovery.yml
- rules/linux/auditd/lnx_data_compressed.yml
- rules/linux/auditd/lnx_network_sniffing.yml
- rules/windows/powershell/powershell_data_compressed.yml
- rules/windows/powershell/powershell_winlogon_helper_dll.yml
- rules/windows/process_creation/win_change_default_file_association.yml
- rules/windows/process_creation/win_data_compressed_with_rar.yml
- rules/windows/process_creation/win_local_system_owner_account_discovery.yml
- rules/windows/process_creation/win_network_sniffing.yml
- rules/windows/process_creation/win_query_registry.yml
- rules/windows/process_creation/win_service_execution.yml
- rules/windows/process_creation/win_xsl_script_processing.yml
modify 1 rule:
- rules/windows/process_creation/win_possible_applocker_bypass.yml
2019-11-05 04:55:29 +03:00
yugoslavskiy
cc7aebe9b6
Update win_service_execution.yml
2019-11-05 04:42:53 +03:00
yugoslavskiy
534f5fc0e1
Update lnx_network_sniffing.yml
2019-11-05 04:40:40 +03:00
yugoslavskiy
70fdd9c7d7
Update lnx_data_compressed.yml
2019-11-05 04:38:27 +03:00
yugoslavskiy
ac95d840b4
Update powershell_winlogon_helper_dll.yml
2019-11-05 04:33:07 +03:00
yugoslavskiy
479aafe466
Update win_service_execution.yml
2019-11-05 04:26:19 +03:00
yugoslavskiy
37674b944f
Update win_query_registry.yml
2019-11-05 03:04:46 +03:00
yugoslavskiy
9d9de64387
Update win_query_registry.yml
2019-11-05 03:00:33 +03:00
yugoslavskiy
27e63abcc4
Update and rename win_custom_service_execution.yml to win_service_execution.yml
2019-11-05 02:57:15 +03:00
yugoslavskiy
3d5f5e2fe7
Update win_custom_service_execution.yml
2019-11-05 02:56:50 +03:00
yugoslavskiy
66bfbd0af9
Update and rename win_service_execution.yml to win_custom_service_execution.yml
2019-11-05 02:55:41 +03:00
yugoslavskiy
c147863eb3
Update powershell_data_compressed.yml
2019-11-05 02:38:36 +03:00
yugoslavskiy
b755d4fb68
Update and rename win_system_owner_user_discovery.yml to win_local_system_owner_account_discovery.yml
2019-11-05 02:31:20 +03:00
yugoslavskiy
9831897b6b
Update win_xsl_script_processing.yml
2019-11-05 01:32:29 +03:00
yugoslavskiy
ce55f80fb6
Update win_xsl_script_processing.yml
2019-11-05 01:31:55 +03:00
zinint
cd1cd48619
Delete win_app_windows_discovery.yml
2019-11-05 01:18:26 +03:00
zinint
a3ec56da07
Update win_xsl_script_processing.yml
2019-11-05 00:02:19 +03:00
zinint
fd6875485b
Add files via upload
2019-11-05 00:00:14 +03:00
zinint
cd43354c04
Delete sysmon_xsl_script_processing.yml
2019-11-04 23:47:23 +03:00
zinint
2679baddcd
Delete powershell_network_sniffing.yml
2019-11-04 23:46:43 +03:00
yugoslavskiy
e81f4f0ea6
Update sysmon_xsl_script_processing.yml
2019-11-04 23:42:47 +03:00
yugoslavskiy
b565398bc5
Update win_network_sniffing.yml
2019-11-04 23:02:03 +03:00
yugoslavskiy
e38116fce2
Update and rename win_data_compressed.yml to win_data_compressed_with_rar.yml
2019-11-04 22:55:32 +03:00
yugoslavskiy
cb167e73b1
fix filenames
2019-11-04 22:49:28 +03:00
yugoslavskiy
f880fa82b5
Rename process_creation_change_default_file_association.yml to win_change_default_file_association.yml
2019-11-04 22:48:13 +03:00
yugoslavskiy
cbf01aa51e
Update and rename win_change_default_file_association.yml to process_creation_change_default_file_association.yml
2019-11-04 22:46:55 +03:00
yugoslavskiy
75f2b8536f
Update lnx_auditd_user_discovery.yml
2019-11-04 22:14:30 +03:00
yugoslavskiy
8b2216e94e
Update lnx_auditd_masquerading_crond.yml
2019-11-04 22:14:10 +03:00
yugoslavskiy
0d5489bbb0
Update lnx_auditd_user_discovery.yml
2019-11-04 22:07:30 +03:00
yugoslavskiy
bb71f95810
Update lnx_auditd_masquerading_crond.yml
2019-11-04 21:58:42 +03:00
yugoslavskiy
ce849a1184
Merge branch 'master' into oscd
2019-11-04 20:48:19 +03:00
yugoslavskiy
1f1fd68331
Merge pull request #472 from feedb/oscd
...
add 11 new rules:
- rules/linux/auditd/lnx_auditd_web_rce.yml
- rules/windows/process_creation/process_creation_susp_bginfo.yml
- rules/windows/process_creation/process_creation_susp_cdb.yml
- rules/windows/process_creation/process_creation_susp_devtoolslauncher.yml
- rules/windows/process_creation/process_creation_susp_dnx.yml
- rules/windows/process_creation/process_creation_susp_dxcap.yml
- rules/windows/process_creation/process_creation_susp_msoffice.yml
- rules/windows/process_creation/process_creation_susp_odbcconf.yml
- rules/windows/process_creation/process_creation_susp_openwith.yml
- rules/windows/process_creation/process_creation_susp_psr_capture_screenshots.yml
- rules/windows/sysmon/sysmon_webshell_creation_detect.yml
2019-11-04 20:40:58 +03:00
yugoslavskiy
3f1c94837b
Rename process_creation_susp_openwith_execution.yml to process_creation_susp_openwith.yml
2019-11-04 20:38:44 +03:00
yugoslavskiy
54e9be9cd0
Rename process_creation_susp_devtoolslauncher_execution.yml to process_creation_susp_devtoolslauncher.yml
2019-11-04 20:38:24 +03:00
yugoslavskiy
999126446b
Rename win_susp_psr_capture_screenshots.yml to process_creation_susp_psr_capture_screenshots.yml
2019-11-04 20:37:16 +03:00
yugoslavskiy
85cd989b6f
Rename win_susp_openwith_execution.yml to process_creation_susp_openwith_execution.yml
2019-11-04 20:36:58 +03:00
yugoslavskiy
8d0923de2d
Rename win_susp_odbcconf.yml to process_creation_susp_odbcconf.yml
2019-11-04 20:36:46 +03:00
yugoslavskiy
de098ff5b7
Rename win_susp_msoffice.yml to process_creation_susp_msoffice.yml
2019-11-04 20:36:21 +03:00
yugoslavskiy
9c19d1b58c
Rename win_susp_dxcap.yml to process_creation_susp_dxcap.yml
2019-11-04 20:36:07 +03:00
yugoslavskiy
66eba43a8d
Rename win_susp_dnx.yml to process_creation_susp_dnx.yml
2019-11-04 20:35:53 +03:00
yugoslavskiy
d18314b6b2
Rename win_susp_devtoolslauncher_execution.yml to process_creation_susp_devtoolslauncher_execution.yml
2019-11-04 20:35:43 +03:00
yugoslavskiy
49bc6ada25
Rename win_susp_cdb.yml to process_creation_susp_cdb.yml
2019-11-04 20:35:28 +03:00
yugoslavskiy
95412e5f30
Rename win_susp_bginfo.yml to process_creation_susp_bginfo.yml
2019-11-04 20:35:11 +03:00
yugoslavskiy
19396fd274
Update sysmon_webshell_creation_detect.yml
2019-11-04 19:23:52 +03:00
yugoslavskiy
9371e533c3
Update win_susp_openwith_execution.yml
2019-11-04 19:05:23 +03:00
yugoslavskiy
e6a39f1061
Update win_susp_odbcconf.yml
2019-11-04 19:01:30 +03:00
yugoslavskiy
c18fa0940d
Update win_susp_msoffice.yml
2019-11-04 18:44:07 +03:00
yugoslavskiy
bd0ebf0604
Update win_susp_dxcap.yml
2019-11-04 18:43:42 +03:00
yugoslavskiy
df07291e53
Update win_susp_cdb.yml
2019-11-04 18:43:03 +03:00
yugoslavskiy
a66539c771
Update win_susp_msoffice.yml
2019-11-04 18:42:26 +03:00
yugoslavskiy
56b7402e62
Update win_susp_dxcap.yml
2019-11-04 18:38:37 +03:00
yugoslavskiy
a9fdfee5c2
Update win_susp_dnx.yml
2019-11-04 18:34:25 +03:00
yugoslavskiy
dc23e566a0
Update win_susp_devtoolslauncher_execution.yml
2019-11-04 18:30:04 +03:00
yugoslavskiy
989d75033a
Update win_susp_cdb.yml
2019-11-04 18:25:30 +03:00
yugoslavskiy
43c20d203d
Update and rename win_susp_capture_screenshots.yml to win_susp_psr_capture_screenshots.yml
2019-11-04 18:16:39 +03:00
yugoslavskiy
a800093aaf
Update win_susp_bginfo.yml
2019-11-04 18:14:44 +03:00
Florian Roth
5786688f97
rule: Firewall disabled via Netsh
2019-11-04 16:10:10 +01:00
yugoslavskiy
8a35a51211
Update lnx_auditd_web_rce.yml
2019-11-04 18:08:17 +03:00
yugoslavskiy
2697b829b0
fix logic
2019-11-04 14:57:58 +03:00
darkquasar
5f027e97c2
fixing as as per comment on rule
...
https://github.com/Neo23x0/sigma/pull/505#discussion_r340790327
2019-11-03 20:35:58 -08:00
yugoslavskiy
becb80f609
add rules/windows/builtin/win_quarkspwdump_clearing_hive_access_history.yml
2019-11-04 05:38:49 +03:00
yugoslavskiy
1f7b3bc9a2
add rules/windows/builtin/win_quarkspwdump_clearing_hive_access_history.yml
2019-11-04 05:05:57 +03:00
yugoslavskiy
701e7f7cc6
oscd task #2 completed
...
- new rules:
+ rules/windows/builtin/win_susp_lsass_dump_generic.yml
+
rules/windows/builtin/win_transferring_files_with_credential_data_via_ne
twork_shares.yml
+
rules/windows/builtin/win_remote_registry_management_using_reg_utility.y
ml
+ rules/windows/sysmon/sysmon_unsigned_image_loaded_into_lsass.yml
+ rules/windows/sysmon/sysmon_lsass_memory_dump_file_creation.yml
+
rules/windows/sysmon/sysmon_raw_disk_access_using_illegitimate_tools.yml
+ rules/windows/sysmon/sysmon_cred_dump_tools_dropped_files.yml
+ rules/windows/sysmon/sysmon_cred_dump_tools_named_pipes.yml
+
rules/windows/process_creation/process_creation_shadow_copies_creation.y
ml
+
rules/windows/process_creation/process_creation_shadow_copies_deletion.y
ml
+
rules/windows/process_creation/process_creation_copying_sensitive_files_
with_credential_data.yml
+
rules/windows/process_creation/process_creation_shadow_copies_access_sym
link.yml
+
rules/windows/process_creation/process_creation_grabbing_sensitive_hives
_via_reg.yml
+
rules/windows/process_creation/process_creation_mimikatz_command_line.ym
l
+
rules/windows/unsupported_logic/builtin/dumping_ntds.dit_via_dcsync.yml
+
rules/windows/unsupported_logic/builtin/dumping_ntds.dit_via_netsync.yml
.yml
- updated rules:
+ rules/windows/builtin/win_susp_raccess_sensitive_fext.yml
+ rules/windows/builtin/win_mal_creddumper.yml
+ rules/windows/builtin/win_mal_service_installs.yml
+ rules/windows/process_creation/win_susp_process_creations.yml
+ rules/windows/sysmon/sysmon_powershell_exploit_scripts.yml
+ rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
- deprecated rules:
+ rules/windows/process_creation/win_susp_vssadmin_ntds_activity.yml
2019-11-04 04:26:34 +03:00
Thomas Patzke
54c75167ce
Default configurations for backends
2019-11-03 23:32:50 +01:00
Thomas Patzke
0c64992276
Merge branch 'master' of https://github.com/Neo23x0/sigma
2019-11-02 23:05:41 +01:00
Thomas Patzke
a5579fa8cd
Merge pull request #513 from Karneades/fix-sysmon-rule
...
fix: bound sysmon logon script rule to field
2019-11-02 23:04:35 +01:00
Thomas Patzke
c0f1b12833
Merge pull request #512 from Karneades/fix-win-rules
...
fix: bound windows event log rules to message field
2019-11-02 23:03:44 +01:00
Thomas Patzke
66d9de460d
Merge branch 'master' of https://github.com/Neo23x0/sigma
2019-11-02 22:56:32 +01:00
Thomas Patzke
4f19ef5708
Graylog backend now derived from es-qs
...
Technically, Graylog is ES. Fixes and improvements for ES didn't
propagate to Graylog, now they do.
2019-11-02 22:56:01 +01:00
Thomas Patzke
8af2b70594
Restrict search not bound to fields to keyword fields
2019-11-02 22:55:04 +01:00
Thomas Patzke
c9eb921f68
ConditionAND/OR constructor now allows arbeitrary number of operands
2019-11-02 22:54:35 +01:00
Karneades
0117dac1db
fix: bound sysmon logon script rule to field
...
Fixed rule:
- rules/windows/sysmon/sysmon_logon_scripts_userinitmprlogonscript.yml
2019-11-02 11:47:20 +01:00
Karneades
68fd20cb66
fix: bound windows event log rules to message field
...
Fixed rules
- rules/windows/builtin/win_susp_msmpeng_crash.yml
- rules/windows/builtin/win_alert_active_directory_user_control.yml
- rules/windows/builtin/win_av_relevant_match.yml
- rules/windows/builtin/win_mal_creddumper.yml
- rules/windows/builtin/win_susp_sam_dump.yml
- rules/windows/builtin/win_alert_mimikatz_keywords.yml
- rules/windows/builtin/win_alert_enable_weak_encryption.yml
2019-11-02 11:25:29 +01:00
4A616D6573
013d862afd
Create win_susp_local_anon_logon_created.yml
2019-10-31 21:56:30 +11:00
Florian Roth
3107c0c268
rule: Formbook rule improved
2019-10-31 09:32:18 +01:00
zinint
60bf34e220
T1042
2019-10-30 23:30:56 +03:00
zinint
12ef86fcbe
t1040
2019-10-30 23:18:37 +03:00
zinint
b3b203e5b1
t1040
2019-10-30 23:15:19 +03:00
zinint
11e7bdc727
Update lnx_network_sniffing.yml
2019-10-30 22:59:46 +03:00
zinint
fd09c00b35
Update lnx_network_sniffing.yml
2019-10-30 20:59:07 +03:00
Florian Roth
4741b6a4d6
rule: Mustang Panda dropper
2019-10-30 18:22:40 +01:00
Florian Roth
d661771608
rule: another DTRACK reference
2019-10-30 18:22:25 +01:00
zinint
3d106d8e7f
Update lnx_network_sniffing.yml
2019-10-30 19:11:51 +03:00
zinint
e0c5479f0a
Update lnx_network_sniffing.yml
2019-10-30 19:10:48 +03:00
zinint
b5b40f2861
Update lnx_network_sniffing.yml
2019-10-30 19:07:05 +03:00
zinint
cc4a8df5e3
Update lnx_network_sniffing.yml
2019-10-30 19:06:53 +03:00
zinint
7e3d8ccaf3
T1040
2019-10-30 19:05:50 +03:00
Florian Roth
3ac28f3eed
rule: DTRACK process creation
2019-10-30 15:16:33 +01:00
Thomas Patzke
219f00e3fb
Added command line parameter
...
Implements #418
2019-10-29 23:04:28 +01:00
Thomas Patzke
2eeccf48e0
Removed line breaks in Elastalert YAML output
...
Fixes #453
2019-10-29 22:45:37 +01:00
Thomas Patzke
f4e9690d6b
Merge pull request #508 from Karneades/fixRule3
...
fix: bound keywords to field in multiple PS rules
2019-10-29 22:34:08 +01:00
Thomas Patzke
78d8ca2b41
Merge pull request #507 from Karneades/fixRule2
...
fix: bound keywords to field in PS cred prompt rule
2019-10-29 22:31:01 +01:00
Thomas Patzke
40df0d4534
Merge pull request #506 from Karneades/fixRule1
...
fix: bound keywords to field in WMI persistence rule
2019-10-29 22:30:27 +01:00
Thomas Patzke
6eb49fc1ce
Merge pull request #509 from Karneades/fixRule4
...
fix: change keyword and bound it to a field in PS rule
2019-10-29 22:27:54 +01:00
Thomas Patzke
b6403793c1
Fixed escaping in rule
2019-10-29 22:06:23 +01:00
zinint
4a560e9375
T1002
2019-10-29 22:56:45 +03:00
zinint
583980f8ec
Delete win_data_compressed.yml
2019-10-29 22:56:30 +03:00
zinint
4eb7965662
T1002
2019-10-29 22:54:42 +03:00
zinint
950796f71f
Update lnx_auditd_masquerading_crond.yml
2019-10-29 22:48:39 +03:00
zinint
c5599399b5
Update lnx_auditd_masquerading_crond.yml
2019-10-29 22:48:00 +03:00
zinint
47f7d648a3
T1036
2019-10-29 22:33:03 +03:00
Karneades
ab5556ae8c
fix: change keyword and bound it to a field
2019-10-29 19:59:43 +01:00
Karneades
aafab2e936
fix: bound keywords to field in multiple PS rules
...
Rules changed:
- rules/windows/powershell/powershell_malicious_commandlets.yml
- rules/windows/powershell/powershell_malicious_keywords.yml
- rules/windows/powershell/powershell_suspicious_download.yml
- rules/windows/powershell/powershell_suspicious_invocation_specific.yml
2019-10-29 19:53:18 +01:00
Karneades
f31750e567
fix: bound keywords to field in PS cred prompt rule
2019-10-29 19:43:04 +01:00
Karneades
cd20e4a3fc
fix: bound keywords to field in WMI persistence rule
...
See #501 .
2019-10-29 19:22:41 +01:00
zinint
c243c4e210
T1035
2019-10-29 20:58:52 +03:00
booberry46
36fe748c2e
Update win_rdp_reverse_tunnel.yml
...
With the recent example for the evtx. RDP Tunneling can happen not only from port 3389. So I tune it to fit in general.
Changed the obsolete twitter status with linkage to the evtx from Samir Bousseaden
2019-10-29 17:25:37 +08:00
darkquasar
cb6eb35913
adding some more suspicious PS keywords
...
found in multiple internally analyzed malicious scripts (in the wild and as result of engagements)
2019-10-28 22:14:14 -07:00
darkquasar
96643b5446
New rule Suspicious Remote Thread Created
2019-10-28 22:12:57 -07:00
darkquasar
551d3d653c
Dumping Lsass.exe memory with MiniDumpWriteDump API
2019-10-28 22:11:55 -07:00
darkquasar
a6b24da6dd
Adding rule Suspicious In-Memory Module Execution
2019-10-28 22:07:26 -07:00
alx1m1k
116d17c9b1
Merge pull request #1 from yugoslavskiy/oscd
...
fix some typos and remove redundant references
2019-10-29 08:04:04 +03:00
Yugoslavskiy Daniil
fd606cb376
spaces fix
2019-10-29 03:59:07 +03:00
Yugoslavskiy Daniil
4251d9f490
ilyas ochkov contribution
2019-10-29 03:44:22 +03:00
Yugoslavskiy Daniil
3376cf4dd8
fix some typos and remove redundand references
2019-10-29 01:40:06 +03:00
Thomas Patzke
632c45843b
Merge pull request #500 from refractionPOINT/master
...
Adding LimaCharlie to the README's supported targets.
2019-10-28 21:17:30 +01:00
Maxime Lamothe-Brassard
f01913c996
Adding LimaCharlie to the README's supported targets.
2019-10-28 14:48:04 -05:00
Thomas Patzke
6a76f5950b
Merge pull request #499 from refractionPOINT/master
...
Adding Backend for LimaCharlie D&R rules
2019-10-28 20:38:33 +01:00
Maxime Lamothe-Brassard
f6fb9c7f5f
Fixing typo in response metadata.
2019-10-28 11:31:50 -05:00
Maxime Lamothe-Brassard
2873e1ded3
Small refactors to make more readable and remove deprecated code paths to increase coverage.
2019-10-28 10:49:05 -05:00
Florian Roth
8ff85499c8
rule: svchost dll search order hijack
2019-10-28 12:03:03 +01:00
Florian Roth
1a3444d0ef
docs: comment on rule expression
2019-10-28 12:02:46 +01:00
RRRabbit
becfca6b41
Added Atomic Blue Detections Repo
2019-10-28 11:59:49 +01:00
Teimur Kheirkhabarov
59c6250282
Delete rules/windows/.DS_Store
2019-10-28 09:38:17 +03:00
Teimur Kheirkhabarov
2fb40acfe6
Fix mistake in possible_privilege_escalation_via_service_registry_permissions_weakness
2019-10-28 09:30:26 +03:00
Teimur Kheirkhabarov
32b0a3987e
Several mistakes were fixed
2019-10-28 08:43:58 +03:00
Teimur Kheirkhabarov
3125b39239
Change incorrect MITRE Tags for some rules
2019-10-28 07:56:15 +03:00
zinint
d1cf80d9b6
Update lnx_auditd_user_discovery.yml
2019-10-28 00:00:06 +03:00
zinint
68b4541274
t1033
2019-10-27 23:59:16 +03:00
Maxime Lamothe-Brassard
a7003c2aa3
Adding support for "unix", looking like a mistake by the creator.
2019-10-27 15:55:12 -05:00
zinint
87c8326133
T1033
2019-10-27 23:49:07 +03:00
Maxime Lamothe-Brassard
d019cef439
Ading a bit more of early support for netflow and some linux exe.
2019-10-27 15:48:28 -05:00
Maxime Lamothe-Brassard
a57a7b58cf
Added conceptial support for aliasing keyworkds to a specific field depending on the log source.
2019-10-27 15:28:54 -05:00
zinint
55eaae1cea
Rename win_app_windows_descovery.yml to win_app_windows_discovery.yml
2019-10-27 23:15:10 +03:00
zinint
93b867024c
T1012
2019-10-27 23:13:03 +03:00
Teimur Kheirkhabarov
fde949174d
OSCD Task 1 - Privilege Escalation
2019-10-27 20:54:07 +03:00
Maxime Lamothe-Brassard
60b20a76a6
Fixing handling of unsupported sources.
2019-10-27 12:37:06 -05:00
Maxime Lamothe-Brassard
0fe72d6133
Emit error on full-text searches not being supported.
2019-10-27 12:26:36 -05:00
Maxime Lamothe-Brassard
f43300af8e
Fix the top level pre-condition for Windows Event Logs on LC.
2019-10-27 12:17:15 -05:00
Maxime Lamothe-Brassard
91e48d8c1b
Adding setup links and fixing test that would crash Not node, but not seen in prod rules.
2019-10-27 11:56:32 -05:00
Mikhail Larin
1f6aec8060
removed unsupported rule from oscd branch
2019-10-27 15:33:38 +03:00
4A616D6573
ca819d8707
Update win_susp_net_execution.yml
...
Updated tags to pass Travis CI checks.
2019-10-27 14:06:52 +11:00
Maxime Lamothe-Brassard
8d866b0868
Adding comments.
2019-10-26 17:37:13 -05:00
Maxime Lamothe-Brassard
bc5e9bd03a
Making rule output a full D&R (with the Response component) and includes a lot of metadata from the rule in the report.
2019-10-26 17:30:40 -05:00
Maxime Lamothe-Brassard
8cc3990aef
Extending support for more random rules with odd names.
2019-10-26 16:59:33 -05:00
Maxime Lamothe-Brassard
4d65b62063
Adding support for generating rules for Windows builtin category for use in the External Logs of LC.
2019-10-26 16:30:50 -05:00
Maxime Lamothe-Brassard
30cc7ee809
Refactor mappings into a flat structure to account for missing parameters in some combinations.
2019-10-26 16:09:39 -05:00
Maxime Lamothe-Brassard
77329714c5
Adding service to indirection of mappings since it will be used for Windows Event Logs.
2019-10-26 16:06:42 -05:00
Maxime Lamothe-Brassard
823d86c7d9
Remove unimplemented config entries and fix bug with valueNode.
2019-10-26 15:54:08 -05:00
Maxime Lamothe-Brassard
bba43c7a86
First draft of support for LimaCharlie D&R rules.
2019-10-26 15:45:48 -05:00
root
717e40e8ed
modified win_susp_dxcap.yml
2019-10-26 20:27:32 +02:00
root
9bf0150100
modified win_susp_dnx.yml
2019-10-26 20:20:21 +02:00
root
3b70f2edd6
modified win_susp_dnx.yml
2019-10-26 20:16:40 +02:00
root
3528afeef7
modified win_susp_dnx.yml
2019-10-26 20:13:53 +02:00
root
1dca0456ee
modified win_susp_dxcap.yml
2019-10-26 20:09:25 +02:00
root
cbe0d73ce8
add win_susp_dxcap.yml
2019-10-26 20:06:02 +02:00
root
aaf63d2238
add win_susp_dxcap.yml
2019-10-26 20:02:25 +02:00
root
0616c2c39d
add win_susp_dnx.yml
2019-10-26 19:58:45 +02:00
root
ee21888e67
add win_susp_cdb.yml
2019-10-26 19:49:45 +02:00
booberry46
b7fe52133d
Update win_defender_bypass.yml
2019-10-27 00:07:56 +08:00
booberry46
3f1fc9a507
Add files via upload
2019-10-27 00:06:49 +08:00
Florian Roth
66a32549f1
rule: proxy malware ua - Zebrocy
2019-10-26 14:20:29 +02:00
Florian Roth
42808b7eb8
rule: webshell detection improved
2019-10-26 09:14:54 +02:00
root
844d55c781
add win_susp_bginfo.yml
2019-10-26 08:18:37 +02:00
root
5bb5938e86
add win_susp_bginfo.yml
2019-10-26 08:16:08 +02:00
root
01c4c7cdbd
modifed win_susp_msoffice.yml
2019-10-26 08:11:09 +02:00
root
bea2daac45
modifed win_susp_msoffice.yml
2019-10-26 07:55:44 +02:00
root
fc7f8ecea3
add win_susp_msoffice.yml
2019-10-26 07:48:38 +02:00
root
611c193826
modifed win_susp_odbcconf.yml
2019-10-26 07:45:53 +02:00
Thomas Patzke
30948b9c1a
Added sigma-similarity tool
...
Fixed also bug in backend base class that was triggered by the way
backends are used by this tool.
2019-10-25 21:59:03 +02:00
root
aa9a22e662
add win_susp_odbcconf.yml
2019-10-25 19:02:17 +02:00
alexpetrov12
8c2b7e9f85
fix
2019-10-25 18:30:40 +03:00
alexpetrov12
7aa804fe90
added new rules
...
Packet capture Windows command prompt, ODBCCONF execution dll, Windows Registry Persistence - COM key linking
2019-10-25 18:01:36 +03:00
Mikhail Larin
334301c185
OSCD event rules from Jet CSIRT team
2019-10-25 17:57:56 +03:00
zinint
6e94e798be
t1010
2019-10-25 16:12:51 +03:00
stvetro
dcaacd07bf
4 rules to cover ART
2019-10-25 15:38:47 +04:00
hieuttmmo
0c07c5ea16
convention
2019-10-25 11:00:05 +07:00
hieuttmmo
e86ab608f2
Update powershell_suspicious_profile_create.yml
2019-10-25 10:53:21 +07:00
yugoslavskiy
5eb484a062
add tieto dns exfiltration rules
2019-10-25 04:30:55 +02:00
4A616D6573
5678357f4e
Update win_susp_net_execution.yml
...
Added tag for:
References:
https://attack.mitre.org/techniques/T1077/
https://eqllib.readthedocs.io/en/latest/analytics/9b3dd402-891c-4c4d-a662-28947168ce61.html
2019-10-25 12:20:47 +11:00
4A616D6573
a7a753862c
Update win_susp_net_execution.yml
...
Added:
1. Additional tags for techniques as defined by Atomic Blue.
2. Detection for OriginalFileName as net.exe can easily be renamed.
Part of oscd.community effort.
2019-10-25 12:06:32 +11:00
4A616D6573
c248842995
Revert "Update win_susp_net_execution.yml"
...
This reverts commit f7e26b1e0b .
2019-10-25 12:03:23 +11:00
4A616D6573
f7e26b1e0b
Update win_susp_net_execution.yml
...
Added:
1. Additional tags for techniques as defined by Atomic Blue.
2. Detection for OriginalFileName as net.exe can easily be renamed.
Part of oscd.community effort.
2019-10-25 11:53:56 +11:00
hieuttmmo
edb698c7f7
Update powershell_suspicious_profile_create.yml
2019-10-25 00:28:11 +07:00
hieuttmmo
73b10807d8
Rename powershell_susp_profile_create.yml to powershell_suspicious_profile_create.yml
2019-10-25 00:14:39 +07:00
hieuttmmo
0e4cd397ef
Create new rules for T1502
2019-10-25 00:14:21 +07:00
yugoslavskiy
4fb9821b49
added:
...
win_non_interactive_powershell.yml
win_remote_powershell_session.yml
win_wmiprvse_spawning_process.yml
powershell_alternate_powershell_hosts.yml
powershell_remote_powershell_session.yml
sysmon_alternate_powershell_hosts_moduleload.yml
sysmon_alternate_powershell_hosts_pipe.yml
sysmon_non_interactive_powershell_execution.yml
sysmon_powershell_execution_moduleload.yml
sysmon_powershell_execution_pipe.yml
sysmon_remote_powershell_session_network.yml
sysmon_remote_powershell_session_process.yml
sysmon_wmi_module_load.yml
sysmon_wmiprvse_spawning_process.yml
2019-10-24 15:48:38 +02:00
zinint
aef5fa3c2b
Rename powershell_winlogon_helper_dll.yaml to powershell_winlogon_helper_dll.yml
2019-10-24 16:37:38 +03:00
Florian Roth
a5ec6722a1
rule: the actual changes to hwp rule
2019-10-24 15:35:13 +02:00
zinint
5a98fdbbbd
ART t1004
2019-10-24 16:33:29 +03:00
zinint
317e9d3df9
PS Data Compressed attack.t1002
...
PS Data Compressed attack.t1002
2019-10-24 15:43:46 +03:00
yugoslavskiy
3934f6c756
add win_ad_object_writedac_access.yml, sysmon_createremotethread_loadlibrary.yml, sysmon_rdp_registry_modification.yml; modified win_account_backdoor_dcsync_rights.yml
2019-10-24 14:34:16 +02:00
zinint
7c5dc0ca01
Update win_data_compressed.yml
2019-10-24 15:34:13 +03:00
Florian Roth
86c1b4ae4b
rule: hwp exploits
2019-10-24 11:46:56 +02:00
Yugoslavskiy Daniil
7cfd47be7c
add win_scm_database_handle_failure.yml, win_scm_database_privileged_operation.yml, win_syskey_registry_access.yml
2019-10-24 02:40:11 +02:00
alexpetrov12
cc998aa667
fix
2019-10-24 00:48:43 +03:00
alexpetrov12
f1ccf296f4
fix
2019-10-24 00:40:58 +03:00
mrblacyk
499627edf3
File permissions modification (T1222)
2019-10-23 11:24:13 -07:00
mrblacyk
4979b56296
Domain Trust Discovery rule (T1482)
2019-10-23 11:23:12 -07:00
mrblacyk
c2d906c15f
DD overwrite with zero/null (T1485)
2019-10-23 11:22:33 -07:00
mrblacyk
262514c782
Windows Service stop rule (T1489)
2019-10-23 11:22:09 -07:00
mrblacyk
5ae267e326
Linux systemd reload or start rule (T1501)
2019-10-23 11:21:19 -07:00
alexpetrov12
d3715a508b
fix
2019-10-23 18:15:46 +03:00
alexpetrov12
4c84412944
added new rule
...
silenttrinity_stage_ use, sysmon_mimikatz_сreds_dump, sysmon_registry_persistence_key_linking, sysmon_сreds_dump
2019-10-23 18:08:30 +03:00
Hilko Bengen
d759896e07
Make coverage binary overridable
...
This makes it possible to pass a different coverage program to make
test, e.g.:
make test COVERAGE=python3-coverage
2019-10-23 15:42:25 +02:00
alexpetrov12
bc943343df
update win_sysmon_driver_unload
2019-10-23 15:41:14 +03:00
alexpetrov12
215e500894
fix
2019-10-23 14:43:01 +03:00
alexpetrov12
193c95a11a
add new rule1
2019-10-23 14:27:52 +03:00
root
edcbc49ce8
add rule win_susp_open with_execution.yml win_susp_devt oolslauncher_execution.yml
2019-10-23 13:00:21 +02:00
alexpetrov12
043e3f7ca6
fix
2019-10-23 13:48:44 +03:00
alexpetrov12
e38540a37f
fix
2019-10-23 13:28:04 +03:00
alexpetrov12
c1cfbacd24
fix
2019-10-23 13:18:57 +03:00
alexpetrov12
ad9b98541c
fix
2019-10-23 13:05:38 +03:00
alexpetrov12
fa4a8c974d
fix
2019-10-23 12:45:06 +03:00
alexpetrov12
f4ea01217e
fix
2019-10-23 02:47:04 +03:00
alexpetrov12
ebe4fe0377
fix
2019-10-23 02:42:37 +03:00
alexpetrov12
29cd7fed3e
fix
2019-10-23 02:39:40 +03:00
alexpetrov12
5a260db459
fix
2019-10-23 02:27:14 +03:00
alexpetrov12
6c4f4ce309
fix
2019-10-23 02:25:04 +03:00
alexpetrov12
8d0c89b598
added new rules
...
add rule MiniDumpWriteDump via COM+, renamed_binary_description, cobalt_execute_assembly, win_sysmon_driver_onload
2019-10-23 01:55:03 +03:00
Florian Roth
3d4ce9d175
rule: another reference link for 'execution by ordinal'
2019-10-22 15:18:19 +02:00
zinint
49f9b797a7
Update sysmon_xsl_script_processing.yml
2019-10-22 15:20:15 +03:00
zinint
a8bd2c8e78
Update win_data_compressed.yml
2019-10-22 14:57:53 +03:00
zinint
74d1fef8b8
Update win_data_compressed.yml
2019-10-22 14:53:43 +03:00
zinint
cc6d4b05ac
OSCD Task 7 : ART T1002 Exfiltration With Rar
...
OSCD Task 7 : ART T1002 Compress Data for Exfiltration With Rar
2019-10-22 14:00:52 +03:00
gsanm
150afd816d
IP Clean
2019-10-22 17:49:50 +07:00
Florian Roth
b3654947bc
rule: suspicious call by ordinal (rundll32)
2019-10-22 12:40:26 +02:00
Florian Roth
0f02f2bdfc
rule: adjusted very noisy rule on AppLocker whitelist bypass
2019-10-22 12:32:37 +02:00
root
00a757959e
add rule win_susp_capture_screenshots.yml
2019-10-22 06:06:07 +02:00
root
2bd9d8a9d8
add rule sysmon_webshell_creation_detect.yml
2019-10-22 05:56:37 +02:00
root
fb53855ae5
add rule sysmon_webshell_creation_detect.yml
2019-10-22 05:50:49 +02:00
zinint
daf1034621
Update win_possible_applocker_bypass.yml
2019-10-22 00:54:29 +03:00
zinint
789782ef59
Update sysmon_xsl_script_processing.yml
2019-10-22 00:08:46 +03:00
zinint
56f807cb44
Update sysmon_xsl_script_processing.yml
2019-10-22 00:06:54 +03:00
zinint
0d8eff0d86
Update sysmon_xsl_script_processing.yml
2019-10-22 00:06:10 +03:00
zinint
a1d72f20c8
Update sysmon_xsl_script_processing.yml
2019-10-21 23:51:39 +03:00
zinint
5248f83fb3
Update sysmon_xsl_script_processing.yml
2019-10-21 23:46:11 +03:00
zinint
a685c9c3be
Update sysmon_xsl_script_processing.yml
2019-10-21 23:39:33 +03:00
zinint
784d7138ca
OSCD Task 7 ART T1220
...
OSCD Task 7 ART T1220 rule add
2019-10-21 22:22:55 +03:00
Florian Roth
3bd3e724f1
Merge pull request #473 from joesecurity/patch-3
...
Update README.md
2019-10-21 13:34:41 +02:00
Florian Roth
439045a87b
Reordered projects
2019-10-21 13:34:30 +02:00
Florian Roth
4e7ad5c948
rule: added date to crypto miner rule
2019-10-21 13:24:33 +02:00
Florian Roth
e8963b2599
rule: crypto miner user agents in proxy logs
2019-10-21 13:21:50 +02:00
Joe Security
b815b15255
Update README.md
...
Added Joe Sandbox to list of supported Projects or Products.
2019-10-21 13:13:49 +02:00
Florian Roth
c8b5b91815
Merge pull request #471 from a2tf/rule_change_proxy_uri_to_url
...
rule: changed two proxy rules from uri-query to url
2019-10-21 12:52:36 +02:00
Thomas Patzke
8a545b973b
Sigmatools release 0.13
2019-10-21 11:58:26 +02:00
root
e47caf4749
add rule lnx_auditd_web_rce.yml
2019-10-21 11:54:21 +02:00
root
a499141483
modified rule lnx_auditd_web_rce.yml
2019-10-21 11:28:59 +02:00
Florian Roth
9457f01c29
Update proxy_ios_implant.yml
2019-10-21 11:20:11 +02:00
Florian Roth
f8d8eb7948
Update proxy_chafer_malware.yml
2019-10-21 11:19:59 +02:00
root
ac8308dfc9
add rule lnx_auditd_web_rce.yml
2019-10-21 11:14:24 +02:00
Florian Roth
454ba2b576
rule: modified sudo vuln rule to be most generic
2019-10-20 14:02:10 +02:00
Florian Roth
08ff2f38bc
Revert "rule: modified sudo vuln rule to be most generic"
...
This reverts commit ef6a25d109 .
2019-10-20 14:01:14 +02:00
Florian Roth
ef6a25d109
rule: modified sudo vuln rule to be most generic
2019-10-20 10:37:05 +02:00
Florian Roth
bd93425639
Added Sumologic to list
2019-10-19 10:11:28 +02:00
a2tf
a2753ba5a6
rule: changed two proxy rules from uri-query to url
2019-10-18 14:15:39 +00:00
lep
1c5816b214
update carbonblack module
2019-10-18 17:51:31 +07:00
lep
7219e0b0f1
module carbonblack
2019-10-18 14:04:38 +07:00
Thomas Patzke
fc276612b6
Added encoding modifiers
2019-10-16 23:52:06 +02:00
Thomas Patzke
522f021ef1
Merge pull request #461 from Galapag0s/patch-2
...
Added Additional history clearing options
2019-10-16 22:35:41 +02:00
Thomas Patzke
02d193c518
Merge pull request #470 from stevengoossensB/master
...
Mapping the fields in the select statement according to the configuration file
2019-10-16 22:34:28 +02:00
Florian Roth
deb3ecf404
fix: relevant fields in lsass dll load rule
2019-10-16 19:09:20 +02:00
Steven Goossens
5f7813f71e
Merge branch 'master' of https://github.com/Neo23x0/sigma
2019-10-16 16:38:59 +02:00
Steven Goossens
6a1a96a918
Implement mapping when selecting the fields for the AQL query. This was not being done correctly
2019-10-16 16:37:09 +02:00
Florian Roth
ab292a4029
rule: simplified Emotet rule
2019-10-16 15:29:42 +02:00
Florian Roth
36f678930d
rule: updated sudo vuln rule to detect 0-padding part 2
...
https://twitter.com/joshbressers/status/1184455759620378627
2019-10-16 15:10:44 +02:00
Florian Roth
5374d18e4b
rule: updated sudo vuln rule to detect 0-padding
...
https://twitter.com/taviso/status/1184238670343065600
2019-10-16 15:03:28 +02:00
Florian Roth
c396526f40
rule: LSASS DLL load via undocumented Registry key
...
https://twitter.com/SBousseaden/status/1183745981189427200
2019-10-16 13:18:44 +02:00
Florian Roth
5d143f4f22
rule: emotet rule references extended
2019-10-16 13:18:44 +02:00
Thomas Patzke
8c8ac52b57
Merge pull request #469 from stevengoossensB/master
...
Added the cleanValue function for Qradar
2019-10-16 11:24:57 +02:00
Steven Goossens
c6e0e10613
Merge branch 'master' of https://github.com/Neo23x0/sigma
2019-10-16 11:06:53 +02:00
Steven Goossens
2837d3ba74
Added the cleanValue function for Qradar
2019-10-16 10:27:24 +02:00
Florian Roth
d46154da5c
rule: extending Emotet rule
2019-10-16 10:22:48 +02:00
Florian Roth
38c19db1c5
Set theme jekyll-theme-minimal
2019-10-15 16:39:49 +02:00
Florian Roth
4ea469d138
rule: suspicious compression tool parameters
2019-10-15 16:38:53 +02:00
Florian Roth
e870c86fb0
rule: keyboad layout preloads extended with '
2019-10-15 15:11:00 +02:00
Florian Roth
921a39f1e3
rule: extended sudo rule with variant for USER field
2019-10-15 14:55:09 +02:00
Florian Roth
96d77447d2
rule: added reference and mitre tags
2019-10-15 09:44:17 +02:00
Florian Roth
49ed76004c
rule: sudo priv esc vuln CVE-2019-14287
2019-10-15 09:39:08 +02:00
Florian Roth
52fef7ae10
Merge pull request #468 from 2d4d/lsass_without_exe
...
remove .exe from lsass
2019-10-14 18:03:13 +02:00
Florian Roth
8db1cac910
fix: made rule compatible with event id 4688
2019-10-14 18:01:24 +02:00
Florian Roth
0e2284a176
rule: modified the default
2019-10-14 17:50:48 +02:00
Florian Roth
312311494d
rule: suspicious code page switch using chcp
2019-10-14 17:45:25 +02:00
2d4d
cf5d7f11ad
remove .exe from lsass
2019-10-14 17:26:33 +02:00
Florian Roth
7ee3974428
rule: suspicious keyboard layout load
2019-10-14 16:25:27 +02:00
Florian Roth
5583684efd
rule: extended suspicious procdump rule
2019-10-14 16:21:37 +02:00
Florian Roth
98f0d01b2e
rule: mimikatz use extended
2019-10-11 18:50:33 +02:00
Florian Roth
60af1f5a4b
rule: WMI Backdoor Exchange Transport Agent
2019-10-11 12:12:44 +02:00
Thomas Patzke
849a5a520d
Conditional field mapping resolve_fieldname now functional
...
Before this method just had some placeholder function that wasn't really
implementing the intended functionality of the conditional field
mapping. Now aggregations get also conditional field mapping
functionality.
2019-10-09 23:57:41 +02:00
Florian Roth
ec5bb71049
fix: Mimikatz DC Sync rule FP description and level
2019-10-08 17:45:10 +02:00
Florian Roth
14971a7b9c
fix: FPs with Mimikatz DC Sync rule
2019-10-08 17:44:00 +02:00
Thomas Patzke
95c8d25858
Improved --backend-config help text
2019-10-07 22:30:57 +02:00
Thomas Patzke
60ef593a6f
Fixed wrong backslash escaping of *
...
Fixes issue #466
2019-10-07 22:14:44 +02:00
Thomas Patzke
4711d4cad6
Merge pull request #464 from neu5ron/updates-to-sigma-main
...
update HELK and add winlogbeat module enabled taxonomy
2019-10-07 21:36:40 +02:00
Florian Roth
d096ab0e21
rules: AV rules updated to reflect 1.7.2 auf AV cheat sheet
2019-10-04 16:17:34 +02:00
Florian Roth
3eaf4d6e94
fix: fixed typo in bluemashroom rule
2019-10-02 15:45:55 +02:00
Florian Roth
6d78a5fede
rule: extended the command line in bluemashroom rule
2019-10-02 14:03:34 +02:00
Florian Roth
7423fe2072
fix: fixed typo in APT group name
2019-10-02 14:02:07 +02:00
Florian Roth
e993ef46f0
rule: APT blue mushroom
2019-10-02 13:57:14 +02:00
Florian Roth
4bc7f6ea52
rule: QBot process creation
2019-10-01 17:25:04 +02:00
neu5ron
a729cc7905
create winlogbeat config/taxonomy specific to elastic enabled winlogbeat modules such as the one for sysmon]( https://github.com/elastic/beats/blob/master/x-pack/winlogbeat/module/security/config/winlogbeat-security.js ) sigmac conversion
2019-10-01 10:16:42 -04:00
neu5ron
f7fd936433
update HELK config taxonomy/mapping for sigmac conversion
2019-10-01 10:14:54 -04:00
Florian Roth
e0009bfb4a
fix: merged duplicate rules
2019-10-01 16:14:38 +02:00
Florian Roth
d8af435827
rule: RUN key pointing to suspicious folders
2019-10-01 16:08:31 +02:00
Florian Roth
c44f940fb6
rule: suspicious RUN key created by exe in temp/download folders
2019-10-01 16:08:13 +02:00
Florian Roth
52df9e9f44
rule: execution in Outlook temp folder
2019-10-01 16:07:43 +02:00
Florian Roth
9a7ef0e3c2
fix: fixed rule warning
2019-09-30 19:38:40 +02:00
Florian Roth
2fbd35053e
rule: improved formbook detection rule
2019-09-30 19:01:40 +02:00
Florian Roth
38831a05ae
rule: formbook malware process creation
2019-09-30 18:57:58 +02:00
Florian Roth
05ca684962
rule: improved emotet rule
2019-09-30 17:17:23 +02:00
Florian Roth
66cbdbfff5
rule: emotet process creation
2019-09-30 15:53:29 +02:00
Thomas Patzke
d4f89ebc1c
Aggregation on keyword field in es-dsl backend
...
* Fixes #452
* Further fixed reference to count in restriction of results
2019-09-29 23:18:17 +02:00
Florian Roth
93227e1eec
Merge pull request #436 from EccoTheFlintstone/master
...
rule: impacket framework lateralization detection
2019-09-28 11:37:07 +02:00
Florian Roth
ad59c90b29
Capitalization in Title
2019-09-28 10:30:16 +02:00
Florian Roth
0eb5fd75e1
Merge pull request #446 from EccoTheFlintstone/eventclear
...
move wevtutil / fsutil events from ransomware to dedicated rules
2019-09-28 10:29:03 +02:00
Florian Roth
de3a843bea
Merge pull request #457 from EccoTheFlintstone/sysmon_eventid3
...
sysmon eventid 3: filter on outgoing connections (initiated: true) to…
2019-09-28 10:16:02 +02:00
Florian Roth
29c5a9dc8e
Merge pull request #458 from EccoTheFlintstone/psexec
...
fix: PsExec false positives
2019-09-28 10:15:23 +02:00
Florian Roth
d44f89454e
Merge pull request #462 from EccoTheFlintstone/taskmgr
...
Sysmon rules cleanup and move to process_creation
2019-09-28 09:54:26 +02:00
ecco
5a15687c6c
fix rule: task manager as parent: task manager can be run with higher privileges (show processes from all users --> UAC) and its parent is still the old taskmgr
2019-09-27 11:06:21 -04:00
Galapag0s
1e4ef648db
Added Additional history clearing options
...
history -w will clear the current shell history
shred purposely overwrites data replacing it with random data
2019-09-26 12:53:13 -04:00
ecco
7a1d48cccd
fix: PsExec false positives
2019-09-26 04:50:43 -04:00
Florian Roth
36bcd1c54e
Merge pull request #443 from EccoTheFlintstone/aduserbck
...
fix FP : field null value can be '-'
2019-09-25 17:43:22 +02:00
Florian Roth
3d333290a9
Merge pull request #445 from EccoTheFlintstone/localadmin
...
rule: user added to local administrator: handle non english systems b…
2019-09-25 17:29:41 +02:00
Florian Roth
8063484b0d
Merge pull request #447 from Galapag0s/patch-1
...
Added Sticky Bits
2019-09-25 17:28:48 +02:00
Florian Roth
e77657db2f
Merge pull request #451 from EccoTheFlintstone/sysmon_clean
...
sysmon rules cleanup and move to process_creation
2019-09-25 17:28:23 +02:00
Florian Roth
365a46e27e
Merge pull request #454 from EccoTheFlintstone/no_tab
...
remove TAB from cli escape as it's currently unsupported in sigmac
2019-09-25 17:27:56 +02:00
Florian Roth
596140543d
Merge pull request #455 from EccoTheFlintstone/ruler_fix
...
Ruler fix
2019-09-25 17:26:55 +02:00
Florian Roth
ca5b11c622
Merge pull request #456 from EccoTheFlintstone/pth
...
fix PtH rule : field name in event 4624 is SubjectUserSid with null S…
2019-09-25 17:26:22 +02:00
ecco
4c54e8322a
sysmon eventid 3: filter on outgoing connections (initiated: true) to avoid false positives
2019-09-25 11:11:22 -04:00
Florian Roth
7b8b1db241
rule: proxy ua unknown zero day implant
2019-09-24 18:24:48 +02:00
ecco
a644b938a0
fix PtH rule : field name in event 4624 is SubjectUserSid with null SID value (S-1-0-0)
2019-09-23 05:44:26 -04:00
ecco
6a7f7e0f76
add microsoft reference for events fields names
2019-09-23 05:21:30 -04:00
ecco
d48b63a235
ruler rule field name fix for eventID 4776
2019-09-23 05:17:35 -04:00
ecco
c2868f6e03
remove TAB from cli escape as it's currently unsupported in sigmac
2019-09-23 04:46:10 -04:00
Thomas Patzke
9630635e25
Merge branch 'herrBez-addt push origin master-datefield-xpack-watcher'
2019-09-12 00:20:28 +02:00
Thomas Patzke
19f431b6d2
Changed xpack-watcher dateField default to previous value
2019-09-12 00:19:58 +02:00
ecco
0c96777f6a
sysmon rules cleanup and move to process_creation
2019-09-11 10:24:43 -04:00
ecco
4c5eab88b6
add GroupSid to other configs
2019-09-11 04:53:30 -04:00
herrBez
8f612f743c
Use config dateField in xpack watcher to determine
...
datefield name as in elasticsearch dsl backend
2019-09-11 09:38:03 +02:00
Florian Roth
038900e2fe
fix: renamed powershell rule
2019-09-06 17:33:56 +02:00
Galapag0s
ccdda5e82b
Update lnx_shell_priv_esc_prep.yml
2019-09-06 11:29:42 -04:00
Galapag0s
23021aa110
Added Sticky Bits
...
Attackers may look to exploit binaries with the sticky bits enabled. By being able to run a binary as a different user or group, they may be able to run separate commands as an elevated user.
2019-09-06 11:25:48 -04:00
ecco
b410710338
move wevtutil / fsutil events from ransomware to dedicated rules
2019-09-06 10:57:03 -04:00
ecco
5ae46ac56d
rule: user added to local administrator: handle non english systems by using group sid instead of name
2019-09-06 06:21:42 -04:00
ecco
fe93d84015
fix FP : field null value can be '-'
2019-09-06 05:14:58 -04:00
Florian Roth
7f1b6eb311
fix: duplicate rule
2019-09-06 10:30:47 +02:00
Florian Roth
fcbae16cc8
rule: image debugger
2019-09-06 10:28:20 +02:00
Florian Roth
afcbf4226d
fix: duplicate rule - issue #441
2019-09-06 10:22:27 +02:00
Florian Roth
e85c204404
fix: removed event id
2019-09-06 10:20:36 +02:00
Florian Roth
2ec1f710f3
Merge pull request #441 from EccoTheFlintstone/powershell_rules
...
powershell false positives
2019-09-06 10:19:45 +02:00
Florian Roth
01d5e3882f
fix: log source category
2019-09-06 10:17:32 +02:00
Florian Roth
e9fc8d3d09
rule: split up registry debugger registration rule into two
2019-09-06 10:13:21 +02:00
Florian Roth
27f875755f
rule: debugger registration
2019-09-06 10:08:09 +02:00
ecco
01956f1312
powershell false positives
2019-09-06 03:54:19 -04:00
Thomas Patzke
c80cb418cd
Improved QRadar regular expression support
2019-09-05 15:35:26 +02:00
Thomas Patzke
30b6db8299
Fixed ES backend keyword field mapping wildcard match pattern
2019-09-05 12:55:10 +02:00
Thomas Patzke
3b1cbe529e
Elasticsearch keyword field name blacklisting with wildcards
2019-09-05 12:38:32 +02:00
Thomas Patzke
afe6668fbd
Merge pull request #438 from duzvik/master
...
Escaped '\*' to '\*' where required
2019-09-05 10:57:25 +02:00
Thomas Patzke
2a60c71b9d
Merge pull request #437 from svent/qradar_regex_modifier
...
QRadar backend: add support for re type modifiers
2019-09-05 10:30:18 +02:00
Thomas Patzke
f9f5558ae1
Merge pull request #392 from TareqAlKhatib/shim
...
Fixed commandline to detect any shim install from any location
2019-09-05 10:28:50 +02:00
Thomas Patzke
de5e2045f0
Merge pull request #428 from stevengoossensB/master
...
AQL field selection from signatures
2019-09-05 10:28:02 +02:00
Thomas Patzke
37e179b6a7
Merge pull request #390 from juju4/devel-sumo2
...
sumologic backend: fix index and full mapping coverage
2019-09-05 10:27:19 +02:00
ecco
bdf8f99fdb
fix typo
2019-09-04 11:31:00 -04:00
Florian Roth
7bef822da7
rule: minor improvement to susp ps enc cmd
2019-09-04 16:31:49 +02:00
Denys Iuzvyk
774be4d008
Escaped '\*' to '\*' where required
2019-09-04 14:05:58 +03:00
svent
467c8f694c
QRadar backend: add support for re type modifiers
2019-09-03 22:55:48 +02:00
ecco
fc89804f34
rule: impacket framework lateralization detection
2019-09-03 10:28:59 -04:00
Florian Roth
03d45d57de
rule: emissary panda activity
2019-09-03 15:35:33 +02:00
Florian Roth
c81d3bf56c
rule: emissary panda activity
2019-09-03 15:31:25 +02:00
Florian Roth
3a29835221
Merge pull request #433 from EccoTheFlintstone/master
...
add comcvcs.dll memdump method
2019-09-02 14:13:24 +02:00
ecco
8cad0c638e
add comcvcs.dll memdump method
2019-09-02 07:49:19 -04:00
Florian Roth
dca5a7a248
Merge pull request #432 from EccoTheFlintstone/master
...
add/modify powershell Empire rules
2019-09-02 11:40:36 +02:00
ecco
5f30e52739
add/modify powershell Empire rules
2019-09-02 05:04:44 -04:00
Florian Roth
d9606067a6
rule: MuddyWater script execution
2019-08-31 08:50:59 +02:00
Florian Roth
ace0cc36c6
rule: improved csc rule
2019-08-31 08:44:09 +02:00
Florian Roth
7cc26e30b4
docs: renamed file name
2019-08-30 12:04:20 +02:00
Florian Roth
f8785e722f
docs: changed title and description of rule
2019-08-30 12:03:42 +02:00
Florian Roth
ba46d6b4de
docs: added reference to rule
2019-08-30 11:55:02 +02:00
Florian Roth
398ef9c6aa
rules: teardown implant, apt28 ua
2019-08-30 11:53:55 +02:00
Florian Roth
a3349823e5
rule: implant teardown
2019-08-30 11:48:51 +02:00
Florian Roth
8a078b6c86
rule: APT28 UA
2019-08-30 11:48:38 +02:00
Lep
dfe6b968c0
addins
2019-08-29 15:48:42 +07:00
Lep
af264c049b
end space
2019-08-29 15:43:36 +07:00
Lep
c95a17b061
process_creation
2019-08-28 17:30:13 +07:00
Lep
ba30b4929c
process_creation update
2019-08-28 17:13:54 +07:00
Florian Roth
f2c44c80b6
Merge branch 'master' into rule-devel
...
# Conflicts:
# rules/windows/process_creation/win_encoded_frombase64string.yml
# rules/windows/process_creation/win_susp_csc_folder.yml
2019-08-28 09:21:25 +02:00
Florian Roth
f71dc41531
rule: extended csc rule
2019-08-28 09:00:43 +02:00
Florian Roth
406b40af11
rule: suspicious msbuild folder
2019-08-28 09:00:35 +02:00
Lep
8b6bd45b0b
rules for APT32
2019-08-28 10:12:01 +07:00
Florian Roth
fe8f040863
Merge pull request #429 from weev3/master
...
Control Panel Item, MITRE_ID=T1196
2019-08-27 14:24:56 +02:00
Florian Roth
ca2019b57f
fix: typo in MITRE tag
2019-08-27 12:32:56 +02:00
Florian Roth
6b7cd94197
Changes
2019-08-27 12:23:42 +02:00
weev3
d42a51372d
Control Panel Item, MITRE_ID=T1196
2019-08-27 14:55:55 +06:30
Steven Goossens
cb088e4911
Remove quotes from around the fields to make the query semantically correct
2019-08-26 12:43:26 +00:00
Steven Goossens
ad19f05e2c
Include mapped names rather then signature names
2019-08-26 12:06:20 +00:00
Steven Goossens
37caccd52e
Includes the trial condition so generic query is generated whenever the fields are not defined
2019-08-26 11:48:40 +00:00
Steven Goossens
895682aef2
Implementing the fields to be selected
2019-08-26 10:57:43 +00:00
Thomas Patzke
59a6a0c523
Added ATT&CK technique to rule test
2019-08-25 10:13:11 +02:00
Florian Roth
70a26a6132
fix: fixed MITRE tags
2019-08-24 13:58:54 +02:00
Florian Roth
c321fc2680
rule: csc.exe suspicious source folder
2019-08-24 13:53:15 +02:00
Florian Roth
b32ed3c817
rules: encoded FromBase64String keyword
2019-08-24 13:53:05 +02:00
Florian Roth
1dfd560299
rule: csc.exe suspicious source folder
2019-08-24 13:49:40 +02:00
Florian Roth
a137a1380b
rules: encoded FromBase64String keyword
2019-08-24 12:38:51 +02:00
Florian Roth
c9a4e6fe8a
rule: process creations in env var folders
2019-08-24 08:26:37 +02:00
Florian Roth
87ce52f6fe
fix: fixed wrong MITRE tag
2019-08-23 23:19:39 +02:00
Florian Roth
5bd242cb21
rule: encoded IEX
2019-08-23 23:13:36 +02:00
Thomas Patzke
68fb56f503
Merge pull request #345 from ki11oFF/patch-1
...
Detection of usage mimikatz trough WinRM
2019-08-23 23:04:07 +02:00
Thomas Patzke
945f45ebd7
Merge pull request #399 from yugoslavskiy/win_rdp_potential_cve-2019-0708_improvement
...
rules/windows/builtin/win_rdp_potential_cve-2019-0708.yml improved
2019-08-23 23:01:25 +02:00
Thomas Patzke
fc08e3c5b7
Merge pull request #398 from yugoslavskiy/win_susp_add_sid_history_improvement
...
Win susp add sid history improvement
2019-08-23 22:58:46 +02:00
Thomas Patzke
9d3232cf90
Merge pull request #424 from import-au/master
...
Support for Malicious cmdlets in ATP
2019-08-23 22:57:06 +02:00
Florian Roth
cc01f76e99
docs: minor changes
2019-08-22 14:22:55 +02:00
Florian Roth
c291038ebe
rule: renamed powershell
2019-08-22 14:22:55 +02:00
agold
0984293d0c
Support for Malicious cmdlets in ATP
2019-08-20 14:33:08 -07:00
Florian Roth
1bfe925f6b
Merge pull request #422 from EccoTheFlintstone/master
...
Windows process suspicious parents: filter NULL values to remove false positives
2019-08-20 11:59:16 +02:00
ecco
d0a24f4409
filter NULL values to remove false positives
2019-08-20 05:10:41 -04:00
Thomas Patzke
50874c2323
Merge pull request #420 from svent/improve_qradar_backend
...
Improve qradar backend
2019-08-13 08:38:16 +02:00
svent
1ea6d00a39
Fix QRadar field name escaping and handling
2019-08-12 23:47:43 +02:00
svent
826c1e3942
Fix QRadar backend config
2019-08-12 23:47:43 +02:00
Thomas Patzke
e1b1db8cca
Merge pull request #416 from NVISO-BE/es-dsl-wildcard-fix
...
Correctly escape slashes within es-dsl wildcard queries (issue #387 )
2019-08-11 23:19:59 +02:00
Thomas Patzke
2f97300ea2
Pipenv packaging
2019-08-09 14:43:29 +02:00
Florian Roth
f328734274
Merge pull request #417 from Karneades/patch-2
...
improve(rule): add Empire links and userland match
2019-08-09 14:36:17 +02:00
Karneades
18bbec4bcd
improve(rule): add Empire links and userland match
...
Add default task name and powershell task command to match what the rule name says: detects default config.
2019-08-09 11:58:43 +02:00
Florian Roth
4fcb52d098
fix: removed mmc susp rule due to many FPs
2019-08-07 14:26:15 +02:00
Michiel Meersmans
0708fdd28e
Correctly escape slashes within es-dsl wildcard queries
2019-08-07 12:56:19 +02:00
Florian Roth
abd233d66f
Merge pull request #415 from deralexxx/patch-1
...
Add Contribute section
2019-08-06 12:22:41 +02:00
Florian Roth
6513828cc1
Fix
2019-08-06 12:22:31 +02:00
Florian Roth
1fa2e59014
Extended contribution section
2019-08-06 12:22:03 +02:00
Alexander J
4d78b6c037
Add Contribute section
...
As @Neo23x0 was writing in Twitter, more contribution is needed, so a Contribute section seems reasonable to tell people how they can contribute.
https://twitter.com/cyb3rops/status/1158660279825252352
2019-08-06 11:36:54 +02:00
Florian Roth
f6fd1df6f4
Rule: separate Ryuk rule created for VBurovs strings
2019-08-06 10:33:46 +02:00
Florian Roth
a8b738e346
Merge pull request #380 from vburov/patch-5
...
Ryuk Ransomware commands from real case
2019-08-06 10:29:00 +02:00
Florian Roth
9c85d5e80f
Merge pull request #406 from tuckner/master
...
Fix ala parsing issues
2019-08-06 10:28:07 +02:00
Florian Roth
ecf2a6be80
Merge pull request #413 from Karneades/patch-1
...
Fix small typos in file breaking-changes
2019-08-06 10:27:35 +02:00
Karneades
6617dee59a
Fix small typos in file breaking-changes
2019-08-06 09:57:00 +02:00
Thomas Patzke
940c36a4cd
Fixed build
...
Missing package specification
2019-08-05 23:42:33 +02:00
Florian Roth
83841ea117
Merge pull request #411 from nikotin69/master
...
compliance rules by SOC prime
2019-08-05 20:53:02 +02:00
Florian Roth
302ae9c5d0
Added level
2019-08-05 19:51:22 +02:00
Florian Roth
4dbf392562
Title, Level adjusted
2019-08-05 19:48:56 +02:00
Florian Roth
fdb9b351d0
Level to low
2019-08-05 19:48:21 +02:00
Florian Roth
317c0bd07a
Removed "Detects" keyword from title
2019-08-05 19:47:46 +02:00
Florian Roth
2af8cb0d0e
Update cleartext_protocols.yml
2019-08-05 19:47:03 +02:00
Florian Roth
b3780022d3
Merge pull request #412 from Karneades/mmc-rules
...
Improve MMC rules: fix generic rule and add new rule for shell spawning
2019-08-05 19:46:31 +02:00
Florian Roth
c7ec45c0ff
Update workstation_was_locked.yml
2019-08-05 19:44:14 +02:00
Florian Roth
e64fcb32a2
Update group_modification_logging.yml
2019-08-05 19:43:59 +02:00
Florian Roth
5caf4f5f14
Update default_credentials_usage.yml
2019-08-05 19:43:46 +02:00
Florian Roth
10cc1de4c9
Fixed global rule syntax
2019-08-05 19:43:15 +02:00
Florian Roth
dcdd021dc6
Duplicate port 3306
2019-08-05 19:36:50 +02:00
Karneades
42e6c9149b
Remove unneeded event code
2019-08-05 19:13:39 +02:00
Karneades
0e3cc042f4
Add more exclusions to mmc process rule
2019-08-05 18:53:33 +02:00
Karneades
5caa951b8f
Add new rule for detecting MMC spawning a shell
...
Add (analog to win_mshta_spawn_shell.yml) a dedicated rule for dedecting MMC spawning a shell. See https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_mshta_spawn_shell.yml . And it should cover the (removed) cmd part from the existing rule https://github.com/Neo23x0/sigma/blob/master/rules/windows/process_creation/win_susp_mmc_source.yml .
2019-08-05 18:42:31 +02:00
nikotin
780d9223e6
compliance rules by SOC prime
2019-08-05 19:42:19 +03:00
Karneades
cfe44ad17d
Fix win_susp_mmc_source to match what title says
...
Remove cmd.exe filter to match what title and rule says: detect all processes created by MMC. A new dedicated rule will be created for detecting shells spawned by MMC.
2019-08-05 16:21:56 +02:00
Florian Roth
6a8adc72ac
rule: reworked vssadmin rule
2019-08-04 11:27:17 +02:00
Thomas Patzke
a65a9655f4
Fixed config naming in es-qs query backend test
2019-08-02 08:25:21 +02:00
Thomas Patzke
b8d3642c29
Merge branch 'master' of https://github.com/Neo23x0/sigma
2019-08-01 23:46:33 +02:00
Thomas Patzke
d5885686fc
Sigmatools release 0.12
...
* Value modifiers
* Config name cleanup
2019-08-01 23:45:07 +02:00
Thomas Patzke
805c739611
Merge branch 'devel-modifiers'
2019-07-31 23:44:10 +02:00
Thomas Patzke
31c6ffcb61
No escaping for typed values
2019-07-31 23:43:29 +02:00
Florian Roth
d32fc2b2cf
fix: fixing rule win_cmstp_com_object_access
...
https://github.com/Neo23x0/sigma/issues/408
2019-07-31 14:16:52 +02:00
Florian Roth
0657f29c99
Rule: reworked win_susp_powershell_enc_cmd
2019-07-30 14:36:30 +02:00
tuckner
8f2f1922c6
Merge pull request #1 from Neo23x0/master
...
update fork
2019-07-27 21:27:52 -05:00
Florian Roth
9143e89f3e
Rule: renamed and reworked hacktool Ruler rule
2019-07-26 14:49:09 +02:00
Florian Roth
f3fb2b41b2
Rule: FP filters extended
2019-07-23 14:58:36 +02:00
Florian Roth
2c57b443e4
docs: modification date in rule
2019-07-17 09:21:35 +02:00
Florian Roth
de74eb4eb7
Merge pull request #400 from yugoslavskiy/win_susp_dhcp_config_failed_fix
...
Win susp dhcp config failed fix
2019-07-17 09:20:25 +02:00
Florian Roth
bf0179c0d5
Merge pull request #397 from neu5ron/patch-5
...
prevent EventID collision for dhcp
2019-07-17 09:17:05 +02:00
yugoslavskiy
e8b9a6500e
author string modified
2019-07-17 07:02:59 +03:00
yugoslavskiy
a295334355
win_susp_dhcp_config_failed fixed
2019-07-17 07:01:58 +03:00
yugoslavskiy
bb1c040b1b
rules/windows/builtin/win_rdp_potential_cve-2019-0708.yml improved
2019-07-17 06:19:18 +03:00
yugoslavskiy
803f2d4074
changed logic to detect events related to sid history adding
2019-07-17 04:28:21 +03:00
yugoslavskiy
310e3b7a44
rules/windows/builtin/win_susp_add_sid_history.yml improved
2019-07-17 03:55:02 +03:00
Thomas Patzke
0ca15e5c5e
Added test case for value modifiers
2019-07-16 23:14:55 +02:00
Thomas Patzke
8a3117d73e
Nested list handling for chained value modifiers
2019-07-16 23:03:19 +02:00
Nate Guagenti
e2050404bc
prevent EventID collision for dhcp
...
This prevents EventID collision for this rule with other sources/logs that share the same EventIDs.
specifically a lot with Microsoft-Windows-Security-SPP
2019-07-16 15:30:52 -04:00
Thomas Patzke
6881967889
Further modifiers
...
* base64
* base64offset
2019-07-16 00:00:35 +02:00
Thomas Patzke
1bb29dca26
Implemented type modifiers and regular expressions
2019-07-15 22:52:10 +02:00
Thomas Patzke
b9ff280209
Cleanup of configuration names
2019-07-14 00:50:15 +02:00
Thomas Patzke
b20b42b9c9
Added breaking changes file
2019-07-14 00:24:32 +02:00
Thomas Patzke
5489f870cc
Merge pull request #393 from HacknowledgeCH/master
...
Explicit OR for list elements
2019-07-13 23:11:44 +02:00
Thomas Patzke
134bfebe57
Ignore "timeframe" detection keyword in "all/any of" conditions
...
Fixes #395
2019-07-13 00:35:35 +02:00
christophetd
576912eb7a
Support OR queries for Elasticsearch 6 and above
2019-07-08 17:12:53 +02:00
Tareq AlKhatib
d08a993159
Fixed commandline to detect any shim install from any location
2019-07-08 12:31:18 +03:00
juju4
10290beb54
config/sumologic: more index mappings
2019-07-06 12:42:12 -04:00
juju4
7b0cace217
config/sumologic: more index mappings
2019-07-06 12:42:05 -04:00
juju4
2b5a77db53
add sumologic _sourceCategory and _view in aFL
2019-07-06 12:41:56 -04:00
juju4
b358d38e68
_index in aFL and mappings working!
2019-07-06 12:41:40 -04:00
Florian Roth
2b062a0de7
Merge pull request #389 from christophetd/patch-1
...
Include Github raw URLs in suspicious downloads detection rule
2019-07-05 16:54:09 +02:00
Christophe Tafani-Dereeper
5bc10a4855
Include Github raw URLs in suspicious downloads detection rule
2019-07-05 09:01:35 +00:00
Florian Roth
f7ba2b3976
fix: bug in sumologic backend with 'null' values
2019-07-02 22:31:10 +02:00
Florian Roth
0b883a90b6
fix: null value in separate expression
2019-07-02 20:14:45 +02:00
Florian Roth
f5a8a81ff7
fix: linux cmds rule
2019-07-02 15:22:26 +02:00
Florian Roth
ce43d600e3
fix: added null value / application to 4688 problem
2019-07-02 10:51:48 +02:00
Thomas Patzke
337681cfce
Value modifiers
...
* First transformation modfiers: contains, all
* Sigma converter modifier list
2019-06-30 23:41:28 +02:00
Thomas Patzke
161965d14c
Added version information to Winlogbeat configs
2019-06-30 22:44:12 +02:00
Thomas Patzke
66f7f5b516
Merge pull request #385 from herrBez/fix-beat-fieldnames
...
Modified winlogbeat config to adhere to winlogbeat 7 field names
2019-06-30 22:42:59 +02:00
Thomas Patzke
141c4f42f3
Merge pull request #383 from TareqAlKhatib/typos
...
fixed typos
2019-06-30 22:39:56 +02:00
herrBez
74021d53d8
Modified winlogbeat config to adhere to winlogbeat 7 field names breaking changes
...
ref: https://www.elastic.co/guide/en/beats/libbeat/current/breaking-changes-7.0.html
2019-06-30 12:13:21 +02:00
Tareq AlKhatib
15e2f5df5f
fixed typos
2019-06-29 15:35:59 +03:00
Thomas Patzke
f4c8745cde
Merge branch 'juju4-devel-sumo'
2019-06-29 00:12:25 +02:00
Thomas Patzke
6fab5d7f23
Improved testing and removed dead&debug code
2019-06-29 00:09:53 +02:00
Thomas Patzke
377872c91e
Merge branch 'devel-sumo' of https://github.com/juju4/sigma into juju4-devel-sumo
2019-06-28 23:39:15 +02:00
Thomas Patzke
1cb84d0592
Merge pull request #381 from vburov/patch-6
...
Added command that stops services.
2019-06-28 23:33:54 +02:00
Thomas Patzke
a61ad9c9a6
Merge branch 'master' of https://github.com/Neo23x0/sigma
2019-06-28 23:32:37 +02:00
Thomas Patzke
c09c1c1b6e
Merge branch 'sacx-master'
2019-06-28 23:31:09 +02:00
Thomas Patzke
0c7151c901
Watcher backend default options, refactoring and testing
2019-06-28 23:22:16 +02:00
Vasiliy Burov
2f123f64a7
Added command that stops services.
2019-06-28 19:46:34 +03:00
Vasiliy Burov
3813d277a6
Ryuk Ransomware commands from real case
2019-06-28 19:26:05 +03:00
Adrian Constantin Stanila
feac0be8a4
Added 2 more actions on Elasticsearch X-pack Watcher: index and webhook
...
Added timestamp filter query.
2019-06-27 08:54:59 +03:00
Florian Roth
ad386474bf
fix: removed unusable extensions in proc exec context
2019-06-26 17:03:01 +02:00
Florian Roth
708f3ef002
fix: fixed duplicate element in new double extension rule
2019-06-26 16:00:58 +02:00
Florian Roth
41dc076959
Rule: suspicious double extension
2019-06-26 15:57:25 +02:00
Thomas Patzke
0ea3a681df
Merge pull request #378 from cclauss/patch-1
...
Use print() function in both Python 2 and Python 3
2019-06-26 15:15:49 +02:00
cclauss
2cbefb208b
Use print() function in both Python 2 and Python 3
...
Legacy __print__ statements are syntax errors in Python 3 but __print()__ function works as expected in both Python 2 and Python 3.
[flake8](http://flake8.pycqa.org ) testing of https://github.com/Neo23x0/sigma on Python 3.7.1
$ __flake8 . --count --select=E9,F63,F72,F82 --show-source --statistics__
```
./contrib/sigma2sumologic.py:123:5: F821 undefined name 'parser_print_help'
parser_print_help()
^
./contrib/sigma2sumologic.py:211:32: F821 undefined name 'r'
f.write(json.dumps(r, indent=4, sort_keys=True) + " ERROR: %s\n\nQUERY: %s" % (e, sumo_query))
^
./contrib/sigma2elastalert.py:165:32: E999 SyntaxError: invalid syntax
print "Converting file " + file
^
./tools/sigma/parser/collection.py:52:27: F821 undefined name 'SigmaCollectionParseError'
raise SigmaCollectionParseError("action 'repeat' is only applicable after first valid Sigma rule")
^
1 E999 SyntaxError: invalid syntax
3 F821 undefined name 'parser_print_help'
4
```
__E901,E999,F821,F822,F823__ are the "_showstopper_" [flake8](http://flake8.pycqa.org ) issues that can halt the runtime with a SyntaxError, NameError, etc. These 5 are different from most other flake8 issues which are merely "style violations" -- useful for readability but they do not effect runtime safety.
* F821: undefined name `name`
* F822: undefined name `name` in `__all__`
* F823: local variable name referenced before assignment
* E901: SyntaxError or IndentationError
* E999: SyntaxError -- failed to compile a file into an Abstract Syntax Tree
2019-06-26 14:44:09 +02:00
Florian Roth
39b5eddfc7
Rule: Suspicious userinit.exe child process
2019-06-23 13:27:06 +02:00
juju4
654a009c9e
sumologic backend: remove TypeError
2019-06-22 16:49:46 -04:00
juju4
559d0f4ba8
sumologic backend: force as string
2019-06-22 16:43:50 -04:00
juju4
2df0e9765c
sumologic backend: pycodestyle review - E501
2019-06-22 16:41:57 -04:00
juju4
49533a5909
sumologic backend: pycodestyle review
2019-06-22 16:39:13 -04:00
juju4
84de12635e
self.debug option, fix multiple keyvalue escapings/cleanValue, inline index for now
2019-06-22 16:19:45 -04:00
juju4
059957138d
pycodestyle review, openpyxl, error at query generation=continue
2019-06-22 16:18:17 -04:00
juju4
a11d800353
Merge branch 'master' into devel-sumo
2019-06-22 09:18:23 -04:00
Florian Roth
26036e0d35
fix: fixed image in taskmgr rule
2019-06-21 17:15:53 +02:00
Thomas Patzke
ff7128209e
Adjusted level
2019-06-20 00:03:48 +02:00
Thomas Patzke
5aecb6a5af
Merge branch 'mgreen27-master'
2019-06-20 00:02:57 +02:00
Thomas Patzke
0f8849a652
Rule fixes
...
* tagging
* removed spaces
* converted to generic log source
* typos/case
2019-06-20 00:01:56 +02:00
Thomas Patzke
f4c86f15b8
Merge branch 'master' of https://github.com/mgreen27/sigma into mgreen27-master
2019-06-19 23:49:20 +02:00
Thomas Patzke
429c29ed5a
Merge pull request #363 from yugoslavskiy/win_kernel_and_3rd_party_drivers_exploits_token_stealing
...
rule added: Windows Kernel and 3rd-party drivers exploits. Token stea…
2019-06-19 23:43:10 +02:00
Thomas Patzke
f4da0c5540
Added field SecurityID to Winlogbeat config
2019-06-19 23:35:50 +02:00
Thomas Patzke
960cd69d50
Merge branch 'patch-4' of https://github.com/dvas0004/sigma into dvas0004-patch-4
2019-06-19 23:34:25 +02:00
Thomas Patzke
f271685f59
Merge pull request #372 from dvas0004/patch-2
...
Addition of KeyLength field
2019-06-19 23:28:31 +02:00
Thomas Patzke
e4e8ebbf95
Merge pull request #368 from JayPowerUser/web-source-code-enumeration
...
Web Source Code Enumeration via .git
2019-06-19 23:27:37 +02:00
Thomas Patzke
dbbc1751ef
Converted rule to generic log source
2019-06-19 23:25:25 +02:00
Thomas Patzke
d14f5c3436
Merge pull request #371 from savvyspoon/issue285
...
CAR tagging
2019-06-19 23:21:43 +02:00
Thomas Patzke
d82df83ef1
Merge pull request #369 from TareqAlKhatib/refactors
...
Refactors
2019-06-19 23:16:19 +02:00
Florian Roth
a47ec859a8
List for field 'AllowedToDelegateTo'
2019-06-19 08:20:41 +02:00
Thomas Patzke
84c7320849
Merge pull request #370 from SherifEldeeb/patch-1
...
Add detection for recent Mimikatz versions
2019-06-16 12:50:42 +02:00
mgreen27
07e2ee474c
sigma/Add sysmon_renamed_binary
2019-06-15 20:20:52 +10:00
mgreen27
1d26708887
sigma/Add sysmon_renamed_binary
2019-06-15 20:19:35 +10:00
David Vassallo
d7443d71a4
Create win_pass_the_hash_2.yml
...
alternative detection methods
2019-06-14 18:08:36 +03:00
David Vassallo
fdce7ad9bf
Addition of KeyLength field
2019-06-14 17:58:47 +03:00
Michael Wade
f70549ec54
First Pass
2019-06-13 23:15:38 -05:00
Sherif Eldeeb
2d22a3fe02
Add detection for recent Mimikatz versions
...
GrantedAccess is 0x1010 not 0x1410 in recent versions of mimikatz.
This modification should address both
2019-06-12 12:13:31 +03:00
Thomas Patzke
a23f15d42b
Converted rule to generic log source
2019-06-11 13:20:15 +02:00
Thomas Patzke
5715413da9
Usage of Channel field name in ELK Windows config
2019-06-11 13:15:43 +02:00
John Tuckner
3529b717cb
fixed backend errors in ala
2019-06-10 09:25:59 -05:00
Tareq AlKhatib
d61a971874
Minor refactors
2019-06-10 09:55:52 +03:00
Tareq AlKhatib
3bcfc53905
Corrected Typo
2019-06-10 09:54:37 +03:00
Tareq AlKhatib
fce2a45dac
Corrected Typo
2019-06-10 09:51:34 +03:00
James Ahearn
eae7e3ab10
Web Source Code Enumeration via .git
2019-06-08 22:40:28 -04:00
Thomas Patzke
407d8214f7
Added APT40 Dropbox exfiltration proxy rule
2019-06-07 14:03:41 +02:00
David Vassallo
41f5ebc403
Update win_alert_ad_user_backdoors.yml
...
the original rule generates false positives if the "AllowedToDelegateTo" is set to "-". This seems to be a common occurrence, hence my proposed addition
2019-06-07 13:29:45 +03:00
Unknown
7b0ecde334
Renamed jusched
...
https://www.bitdefender.com/files/News/CaseStudies/study/262/Bitdefender-WhitePaper-An-APT-Blueprint-Gaining-New-Visibility-into-Financial-Threats-interactive.pdf
2019-06-06 14:03:02 +02:00
Unknown
5037f7bf54
Merge remote-tracking branch 'sigma/development' into development
2019-06-06 13:45:25 +02:00
t0x1c-1
7b9a73fb1f
Improved Rule
...
Removed complex CommandLine
2019-06-06 13:45:21 +02:00
yugoslavskiy
5827165c2d
event id deleted
2019-06-03 15:51:54 +02:00
yugoslavskiy
cf947e3720
changed to process_creation category
2019-06-03 15:47:24 +02:00
yugoslavskiy
6a39b4fb41
date added
2019-06-03 15:42:02 +02:00
yugoslavskiy
10db09c596
rule added: Windows Kernel and 3rd-party drivers exploits. Token stealing
2019-06-03 15:37:41 +02:00
Florian Roth
a0c9f1594e
Rule: renamed file - name was too generic
2019-06-02 10:57:44 +02:00
Florian Roth
491c519d1f
Rule: added wmic SHADOWCOPY DELETE
2019-06-02 10:56:13 +02:00
Florian Roth
80560dc12f
Rule: Scanner PoC for CVE-2019-0708 RDP RCE vuln
2019-06-02 09:52:18 +02:00
Florian Roth
5e7ae0590c
Rule: Split up WanaCry rule into two separate rules
2019-06-02 09:52:18 +02:00
Florian Roth
df35d70ab1
Merge pull request #361 from neu5ron/patch-4
...
update correct process name
2019-06-01 20:51:55 +02:00
Nate Guagenti
2163208e9c
update correct process name
...
incorrect process name. accidentally had fsutil, should be bcdedit.
thanks to https://twitter.com/INIT_3 for pointing this out
2019-06-01 09:50:50 -04:00
Thomas Patzke
8a0f706cca
Merge branch 'master' of https://github.com/Neo23x0/sigma
2019-05-30 23:24:37 +02:00
Thomas Patzke
1986bcb843
Sigma tools release 0.11
2019-05-30 22:56:38 +02:00
Thomas Patzke
4e96666c04
Merge pull request #336 from petermat/added_rule_T1156
...
added rule .bash_profile and .bashrc T1156
2019-05-30 22:43:33 +02:00
Thomas Patzke
673973e523
Merge pull request #357 from agix/es_dsl_bug
...
fix missing condition when unique plus timeframe
2019-05-30 22:42:09 +02:00
Thomas Patzke
fa0aaa7d2b
Merge branch 'agix-elastalert_dsl_backend'
2019-05-30 22:38:41 +02:00
Thomas Patzke
67707b6c82
Added test for new elastalert-dsl backend
2019-05-30 22:38:12 +02:00
Thomas Patzke
8023011bb1
Merge branch 'elastalert_dsl_backend' of https://github.com/agix/sigma into agix-elastalert_dsl_backend
2019-05-30 22:33:57 +02:00
Florian GAULTIER
89c1d7b63d
Wrong fix, self.queries should be emptied after copied to rule_object
2019-05-29 16:10:14 +02:00
Florian GAULTIER
748ac2e206
Dont combine multiple queries
2019-05-29 16:05:53 +02:00
Florian Roth
2cf402aa1f
Merge pull request #360 from spellanser/patch-1
...
win_disable_event_logging.yml: typo in audit policy name;
2019-05-29 15:07:46 +02:00
Sarkis Nanyan
60bc5253cf
win_disable_event_logging.yml: typo in audit policy name;
2019-05-29 15:43:44 +03:00
Thomas Patzke
04d91573f3
Merge pull request #355 from agix/allow_empty_keyword
...
Allow empty keyword_field
2019-05-28 21:45:55 +02:00
Thomas Patzke
2ecc55c13f
Merge pull request #351 from ipninichuck/master
...
added metadata field to the watcher alert
2019-05-28 21:42:27 +02:00
Thomas Patzke
f3edc39535
Merge pull request #346 from tuckner/master
...
Add Azure Log Analytics / Azure Sentinel to README list of integrations
2019-05-28 21:41:19 +02:00
Florian GAULTIER
d866e75750
Be sure there is a key in the single condition
2019-05-27 17:27:16 +02:00
Florian GAULTIER
e8a7c5f7b9
fix missing condition when unique plus timeframe
2019-05-27 17:22:28 +02:00
Florian GAULTIER
6bf010fb4b
introduce elastalert-dsl
...
(cherry picked from commit 0235ec23200e62766d9f21fbd26ed834991a0b61)
2019-05-27 17:18:19 +02:00
Florian GAULTIER
4168c0ec64
Allow empty keyword_field
2019-05-27 15:08:33 +02:00
Thomas Patzke
36ba9f78da
Improved message if configuration is missing
2019-05-27 13:18:36 +02:00
Florian Roth
7c1e856095
Merge pull request #353 from lprat/master
...
Add rule for CVE-2019-0708
2019-05-27 09:11:17 +02:00
Florian Roth
323a7313fd
FP adjustments
...
We have checked the False Positive rate in different environments and noticed these event IDs in cases in which systems had bad network connections / we accessed via VPN. Therefore we reduced the level to "high" and added that note to the "False Positives" list.
2019-05-27 08:54:18 +02:00
Thomas Patzke
38f3966751
Changed backend list formatting to new method
2019-05-26 22:58:14 +02:00
Thomas Patzke
eb9564557e
Moved generic class discovery code into new tools module
2019-05-26 22:29:07 +02:00
Thomas Patzke
84690280c5
Improved behavior on missing configuration
...
Listing all configus usable with chosen backend
2019-05-24 22:41:47 +02:00
Thomas Patzke
241d814221
Merged WannaCry rules
2019-05-24 22:17:36 +02:00
Lionel PRAT
f65f693a88
Add rule for CVE-2019-0708
2019-05-24 10:01:19 +02:00
Florian Roth
7b63c92fc0
Rule: applying recommendation
...
https://twitter.com/SwiftOnSecurity/status/1131464234901094400
2019-05-23 09:44:25 +02:00
Florian Roth
253417a367
Merge pull request #350 from olafhartong/master
...
Rule Windows 10 scheduled task SandboxEscaper 0-day
2019-05-22 13:54:45 +02:00
ipninichuck
75ec169d5c
added metadata field to the watcher alert
...
While utilizing Kibana to track watches directly from the watch index it became quickly apparent that useful metadata was not available. In my project's case it was the title, description and tags from the sigma rule. By adding them to the metadata field it makes it easier to utilize them in visualizations of the watches themselves. In the future perhaps the contents of the metadata field could be given as an option for each user.
2019-05-22 04:30:47 -07:00
Olaf Hartong
b60cfbe244
Added password flag
2019-05-22 13:20:26 +02:00
Florian Roth
346022cfe8
Transformed to process creation rule
2019-05-22 12:50:49 +02:00
Olaf Hartong
4a775650a2
Rule Windows 10 scheduled task SandboxEscaper 0-day
2019-05-22 12:36:03 +02:00
Olaf Hartong
e675cdf9c4
Rule Windows 10 scheduled task SandboxEscaper 0-day
2019-05-22 12:32:07 +02:00
Olaf Hartong
544dfe3704
Rule Windows 10 scheduled task SandboxEscaper 0-day
2019-05-22 12:28:42 +02:00
Florian Roth
c937fe3c1b
Rule: Terminal Service Process Spawn
2019-05-22 10:38:27 +02:00
Florian Roth
74ca0eeb88
Rule: Renamed PsExec
2019-05-21 09:49:40 +02:00
Thomas Patzke
2d0c08cc8b
Added wildcards to rule values
...
These values appear somewhere in a log message, therefore wildcards are
required.
2019-05-21 01:03:20 +02:00
tuckner
7d10491bf2
Update README.md
2019-05-20 17:46:28 -05:00
tuckner
5867b5da74
Update README.md
2019-05-20 17:45:18 -05:00
Thomas Patzke
194afa739f
Generate rule name for each condition
...
In backends kibana and xpack-watcher.
Fixes #329
2019-05-21 00:36:19 +02:00
Thomas Patzke
af0bd1b082
Removed debug code from backend option handling
...
Additionally: code simplification
2019-05-21 00:21:52 +02:00
Thomas Patzke
97541ac267
Added -C shortcut for --backend-config
2019-05-21 00:15:01 +02:00
Thomas Patzke
7e163d71eb
Added option to use old URL in xpack-watcher backend
2019-05-21 00:01:21 +02:00
Thomas Patzke
4e63e925cf
Merge branch 'patch-1' of https://github.com/lliknart/sigma into lliknart-patch-1
2019-05-20 23:43:49 +02:00
Patryk
c163dcbe05
Update sysmon_mimikatz_trough_winrm.yml
...
Deleted tab character (\t)
2019-05-20 13:22:36 +02:00
Patryk
a9faa3dc33
Create sysmon_mimikatz_trough_winrm.yml
...
Detects usage of mimikatz through WinRM protocol
2019-05-20 12:25:58 +02:00
Thomas Patzke
11ed7e7ef8
Check for valid configuration/backend combinations
2019-05-20 01:00:33 +02:00
Thomas Patzke
e271484eef
Load configurations via new config management
2019-05-20 00:27:35 +02:00
t0x1c-1
701801796c
Improved Rule
...
Removed complex CommandLine
2019-05-18 17:43:31 +02:00
Alec Costello
886de39814
Small edits
...
Got trigger happy, first time doing this, please dont cruicify me.
2019-05-17 17:40:32 +03:00
Alec Costello
34d9b4b365
Update win_susp_process_creations.yml
...
Tested the type method redirecting to a file and dumping the hashes out with pwdump.
Used the wmic method to create the shadow copy.
2019-05-17 16:10:43 +03:00
Alec Costello
3c8be3d48b
Update win_susp_vssadmin_ntds_activity.yml
2019-05-17 15:19:03 +03:00
Alec Costello
8b14a5673d
Update win_susp_vssadmin_ntds_activity.yml
...
Updated with SAM and SYSTEM for esentutl
2019-05-17 15:18:01 +03:00
Thomas Patzke
3d20e0bc98
Sigma configuration management with listing
...
Missing:
* Use config by identifier
2019-05-17 09:13:59 +02:00
Thomas Patzke
71ff6bd943
Catch type errors in configuration handling
2019-05-16 23:34:44 +02:00
Thomas Patzke
36aeb19721
Added title to all configurations
2019-05-16 23:33:51 +02:00
Alec Costello
d90c0ea990
Create powershell_nishang_malicious_commandlets.yml
2019-05-16 17:51:45 +03:00
lliknart
f86342012a
Update elasticsearch.py
...
From ElasticSearch 7.0, the URI to access to Watcher API changes
Deprecation: [PUT /_xpack/watcher/watch/{id}] is deprecated! Use [PUT /_watcher/watch/{id}] instead.
2019-05-16 16:17:57 +02:00
Florian Roth
9e2345c491
Merge pull request #338 from yt0ng/development
...
Suspicious Outbound RDP Rule likely identifying CVE-2019-0708
2019-05-15 21:35:52 +02:00
Florian Roth
a6d2a5d79b
fix: more general fixes of the var type issue
2019-05-15 21:25:53 +02:00
Florian Roth
9f1bbb0a0d
fix: missing type check in WDATP backend
2019-05-15 21:20:20 +02:00
Florian Roth
694fa567b6
Reformatted
2019-05-15 20:22:53 +02:00
Florian Roth
1c36bfde79
Bugfix - Swisscom in Newline
2019-05-15 15:03:55 +02:00
Florian Roth
d5f49c5777
Fixed syntax
2019-05-15 14:50:57 +02:00
Florian Roth
508d1cdae0
Removed double back slashes
2019-05-15 14:46:45 +02:00
Unknown
13522b97a7
Adjusting Newline
2019-05-15 12:15:41 +02:00
Unknown
275896dbe6
Suspicious Outbound RDP Rule likely identifying CVE-2019-0708
2019-05-15 11:47:12 +02:00
petermmm
b6c4e64a9b
fixed attack category number 2->3
2019-05-12 11:59:13 +02:00
petermmm
2778558ae3
added rule .bash_profile and .bashrc T1156
2019-05-12 02:07:13 +02:00
Florian Roth
5dfe39c05b
Merge pull request #335 from Codehardt/master
...
fix: fixed reference list, otherwise it's not valid string list
2019-05-10 14:06:11 +02:00
Codehardt
1ca57719b0
fix: fixed reference list, otherwise it's not valid string list
2019-05-10 10:37:12 +02:00
Thomas Patzke
1c2bc87946
Merge pull request #334 from Codehardt/master
...
fix: fixed reference list, otherwise it's not valid string list
2019-05-10 10:19:56 +02:00
Codehardt
6585c83077
fix: fixed reference list, otherwise it's not valid string list
2019-05-10 10:13:35 +02:00
Thomas Patzke
526468bec3
Merge pull request #298 from christophetd/elastalert-allow-rules-without-http-post-url
...
Allow generating Elastalert rules with the http_post alert type without specifying a URL at generation time
2019-05-10 00:31:33 +02:00
Thomas Patzke
f4d8dcaa1e
Merge branch 'Karneades-patch-1'
2019-05-10 00:21:15 +02:00
Thomas Patzke
25c0330dca
Added filter
2019-05-10 00:20:56 +02:00
Thomas Patzke
995c03eef9
Merge branch 'patch-1' of https://github.com/Karneades/sigma into Karneades-patch-1
2019-05-10 00:15:51 +02:00
Thomas Patzke
a361664ed2
Merge pull request #318 from HacknowledgeCH/es-qs-not-parenthesis-fix
...
Correct parenthesization for NOT expressions in the ES-QS backend
2019-05-10 00:14:29 +02:00
Thomas Patzke
56f64ca47d
Merge pull request #315 from P4T12ICK/feature/net_dnc_c2_detection
...
New C2 DNS Tunneling Sigma Detection Rule
2019-05-10 00:12:39 +02:00
Thomas Patzke
c50119b913
Merge branch 'P4T12ICK-feature/lnx-priv-esc-prep'
2019-05-10 00:08:48 +02:00
Thomas Patzke
46c789105b
Fix and ordering
2019-05-10 00:08:26 +02:00
Thomas Patzke
595f22552d
Merge branch 'feature/lnx-priv-esc-prep' of https://github.com/P4T12ICK/sigma into P4T12ICK-feature/lnx-priv-esc-prep
2019-05-10 00:05:06 +02:00
Thomas Patzke
27199fc231
Merge branch 'neu5ron-patch-3'
2019-05-10 00:02:33 +02:00
Thomas Patzke
15a4c7e477
Fixed rule
2019-05-10 00:02:20 +02:00
Thomas Patzke
666e859d14
Merge branch 'patch-3' of https://github.com/neu5ron/sigma into neu5ron-patch-3
2019-05-10 00:00:14 +02:00
Thomas Patzke
14b10c232e
Merge branch 'MadsRC-MadsRC-patch-1'
2019-05-09 23:58:14 +02:00
Thomas Patzke
f51e918a2e
Small rule change
2019-05-09 23:57:55 +02:00
Thomas Patzke
31946426a5
Merge branch 'MadsRC-patch-1' of https://github.com/MadsRC/sigma into MadsRC-MadsRC-patch-1
2019-05-09 23:54:18 +02:00
Thomas Patzke
f01fbd6b79
Merge branch
2019-05-09 23:51:15 +02:00
Thomas Patzke
e60fe1f46d
Changed rule
...
* Adapted false positive notice to observation
* Decreased level
2019-05-09 23:49:39 +02:00
Florian Roth
3dd76a9c5e
Converted to generic process creation rule
...
Previous rule was prone to FPs; more generic form
2019-05-09 23:48:42 +02:00
Vasiliy Burov
792095734d
Update win_proc_wrong_parent.yml
...
changes accordingly this documents:
https://www.carbonblack.com/2014/06/10/screenshot-demo-hunt-evil-faster-than-ever-with-carbon-black/
https://www.13cubed.com/downloads/windows_process_genealogy_v2.pdf
2019-05-09 23:48:36 +02:00
Florian Roth
378ba5b38f
Transformed rule
...
I would try it like this - the 4th selection for uncommon parents of explorer.exe looks prone to FPs
Fixed Typo
Changes to title and description
2019-05-09 23:48:36 +02:00
Vasiliy Burov
8e6295e402
Windows processes with wrong parent
...
Detect scenarios when malicious program is disguised as legitimate process
2019-05-09 23:48:36 +02:00
Thomas Patzke
1e2ef92104
Merge branch 'vburov-patch-2'
2019-05-09 23:10:52 +02:00
Thomas Patzke
121e21960e
Rule changes
...
* Replaced variables with usual path names
* Removed Temp directories due to many false positives
* Matching on Image field, CommandLines often contain these paths
2019-05-09 23:09:22 +02:00
Thomas Patzke
9b67705799
Merge branch 'patch-2' of https://github.com/vburov/sigma into vburov-patch-2
2019-05-09 22:55:07 +02:00
Thomas Patzke
763939a8ca
Hide --shoot-yourself-in-the-foot
2019-04-25 23:42:13 +02:00
Thomas Patzke
eb022f3908
Conditional field mapping for null values
...
Fixes #326
2019-04-25 23:24:05 +02:00
Thomas Patzke
cfb4f32651
Backend es-dsl tolerates rules without title and log source
2019-04-25 22:41:31 +02:00
Florian Roth
16bf5eef0f
Merge pull request #327 from Codehardt/master
...
Added logsources for generic sigma rules to spark config, renamed spa…
2019-04-25 10:10:51 +02:00
Codehardt
17ae9ea91c
Renamed spark config in setup.py
2019-04-25 09:56:29 +02:00
Codehardt
8cf505fcb3
Accidentally removed windows-dhcp logsource in spark's config file
2019-04-25 08:23:48 +02:00
Codehardt
79f7edb6b4
Added logsources for generic sigma rules to spark config, renamed spark config to thor config
2019-04-25 08:15:50 +02:00
Thomas Patzke
6918784e87
Configuration order checking
2019-04-23 00:54:10 +02:00
Thomas Patzke
c90d3e811e
Formatted error code definitions
2019-04-23 00:53:52 +02:00
Thomas Patzke
e9af99c147
Completed error codes
2019-04-23 00:52:31 +02:00
Thomas Patzke
4559aa4e00
Fixed es-qs backend check
2019-04-23 00:05:36 +02:00
Thomas Patzke
d0bd8a2a41
Mandatory configuration for most backends
2019-04-22 23:40:21 +02:00
Thomas Patzke
87abd20c0f
Removed deprecated PyYAML API from rule test
2019-04-22 23:21:08 +02:00
Thomas Patzke
34c426a95b
Moved error codes to constants defined centrally
2019-04-22 23:15:35 +02:00
Thomas Patzke
f0b0f54500
Merge improved pull request #322
2019-04-21 23:56:36 +02:00
Thomas Patzke
765fe9dcd9
Further improved Windows user creation rule
...
* Decreased level
* Fixed field names
* Added false positive possibility
2019-04-21 23:54:18 +02:00
Florian Roth
d0950bd077
fix: yaml.load() issue
...
https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation
2019-04-21 20:30:31 +02:00
Karneades
b47900fbee
Add default path to filter for explorer in exe anomaly rule
2019-04-21 17:42:47 +02:00
Florian Roth
38d548868d
Merge pull request #324 from Neo23x0/revert-322-feature/win_user_creation
...
Revert "New Sigma rule detecting local user creation"
2019-04-21 09:20:48 +02:00
Florian Roth
dd9648b31e
Revert "New Sigma rule detecting local user creation"
2019-04-21 09:09:25 +02:00
Florian Roth
a85acdfd02
Changed title and description
2019-04-21 08:54:56 +02:00
Florian Roth
0713360443
Fixed MITRE ATT&CK tags
2019-04-21 08:52:07 +02:00
Thomas Patzke
49beb5d1a8
Integrated PR from @P4T12ICK in existing rule
...
PR #321
2019-04-21 00:28:40 +02:00
Thomas Patzke
bdd184a24c
Merge pull request #322 from P4T12ICK/feature/win_user_creation
...
New Sigma rule detecting local user creation
2019-04-21 00:20:15 +02:00
Thomas Patzke
80f45349ed
Modified rule
...
* Adjusted ATT&CK tagging
* Set status
2019-04-21 00:14:57 +02:00
Florian Roth
aab3dbee4f
Rule: Detect Empire PowerShell Default Cmdline Params
2019-04-20 09:38:41 +02:00
Florian Roth
03d8184990
Rule: Extended PowerShell Susp Cmdline Enc Commands
2019-04-20 09:38:41 +02:00
Florian Roth
5249279a66
Rule: another MSF payload user agent
2019-04-20 09:38:41 +02:00
Florian Roth
d5fa51eab9
Merge pull request #305 from Karneades/patch-3
...
Remove too loose filter in notepad++ updater rule
2019-04-19 12:40:24 +02:00
Florian Roth
e32708154f
Merge pull request #304 from Karneades/patch-2
...
Remove too loose filter in mshta rule
2019-04-19 09:51:45 +02:00
Florian Roth
74dd008b10
FP note for HP software
2019-04-19 09:51:32 +02:00
Florian Roth
8a5ae01f0e
Merge pull request #323 from Karneades/filterFix
...
Restrict filter in system exe anomaly rule
2019-04-19 09:17:16 +02:00
Karneades
d75ea35295
Restrict whitelist filter in system exe anomaly rule
2019-04-18 22:06:12 +02:00
patrick
8609fc7ece
New Sigma rule detecting local user creation
2019-04-18 19:59:43 +02:00
Florian Roth
f78413deab
Merge pull request #309 from jmlynch/master
...
added rules for renamed wscript, cscript and paexec. Added two direct…
2019-04-17 23:59:27 +02:00
Florian Roth
4808f49e0d
More exact path
2019-04-17 23:45:15 +02:00
Florian Roth
1a4a74b64b
fix: dot mustn't be escaped
2019-04-17 23:44:36 +02:00
Florian Roth
76780ccce2
Too many different trusted cscript imphashes
2019-04-17 23:33:56 +02:00
Florian Roth
7c5f985f6f
Modifications
2019-04-17 23:30:49 +02:00
Florian Roth
4298abffb7
Modifications
2019-04-17 23:29:29 +02:00
Florian Roth
615a802a8e
Modifications
2019-04-17 23:26:20 +02:00
Florian Roth
0a960ed3cd
Merge pull request #319 from Sam0x90/master
...
Update win_susp_svchost rule
2019-04-17 23:22:08 +02:00
Sam0x90
0e8a46aaf7
Update win_subp_svchost rule
...
Adding rpcnet.exe as ParentImage
2019-04-16 15:00:06 +02:00
christophetd
4e16bbafa8
Correct parenthesization for NOT expressions in the ES-QS backend
2019-04-16 10:30:18 +02:00
Florian Roth
17470d1545
Rule: extended parent list for legitimate svchost starts
...
https://twitter.com/Sam0x90/status/1117768799816753153
2019-04-15 14:54:35 +02:00
Florian Roth
daaee558a1
Rule: added date to Tom's WMI rule
2019-04-15 09:06:53 +02:00
Florian Roth
612a7642d2
Added Local directory
2019-04-15 08:47:53 +02:00
Florian Roth
65b81dad32
Rule: Suspicious scripting in a WMI consumer
2019-04-15 08:13:35 +02:00
Florian Roth
1d3159bef0
Rule: Extended Office Shell rule
2019-04-15 08:13:35 +02:00
Karneades
d872c52a43
Add restricted filters to notepad++ gup.exe rule
2019-04-15 08:12:12 +02:00
Thomas Patzke
5194e8778c
Fail on missing target selection
2019-04-14 23:50:07 +02:00
Florian Roth
1e262f5055
Merge pull request #303 from Karneades/patch-1
...
Remove too loose filter in wmi spwns powershell rule
2019-04-14 23:11:57 +02:00
Florian Roth
cb0a87e21e
Merge pull request #316 from megan201296/patch-19
...
Update win_mal_ursnif.yml
2019-04-14 23:10:16 +02:00
Florian Roth
08ec8597a5
Merge pull request #317 from megan201296/patch-20
...
Create apt_oceanlotus_registry.yml
2019-04-14 23:09:42 +02:00
Thomas Patzke
5463128ea0
Merge pull request #314 from Karneades/patch-4
...
Remove loose wildcard filter in powershell encoded cmd rule
2019-04-14 23:02:42 +02:00
megan201296
74fce5f511
Create apt_oceanlotus_registry.yml
...
Rule based on https://www.welivesecurity.com/2019/03/20/fake-or-fake-keeping-up-with-oceanlotus-decoys/ . Based on OSINT, these keys are unique to the oceanlotus activity and not at all legitimate.
2019-04-14 12:01:52 -05:00
megan201296
eb8a0636c5
Update win_mal_ursnif.yml
...
After @thomaspatzke changed to HKU, I did some reading. HKU is for HKEY_User, not HKEY_Current_User (what this threat is tied to. However, he was correct that HKCU does not exist as a prefix for sysmon (see the notes section under event id 13 here: https://github.com/SwiftOnSecurity/sysmon-config/blob/master/sysmonconfig-export.xml ). Changed to ignore the key name, confirmed that the key is still uniique.
2019-04-14 11:51:13 -05:00
patrick
51d19b36cc
Add new Sigma Rule for C2 DNS Tunneling
2019-04-13 20:28:55 +02:00
patrick
4b43db2aac
Add new Sigma Rule for C2 DNS Tunneling
2019-04-13 20:27:36 +02:00
Florian Roth
6351c5a350
Sigma ATT&CK coverage by @jmallette
2019-04-11 18:27:52 +02:00
Florian Roth
038918d2c0
Merge pull request #311 from jmallette/master
...
ATT&CK Navigator Coverage Layer
2019-04-11 18:18:16 +02:00
Karneades
75d36165fc
Remove non-generic falsepositives
...
There are tons of FPs for that... :)
2019-04-11 12:55:24 +02:00
Karneades
51e65be98b
Remove loose wildcard filter in powershell encoded cmd rule
2019-04-11 12:53:12 +02:00
Jon
cd456a1d2b
initial SIGMA ATTACK Navigator layer release
2019-04-09 22:49:28 -04:00
jmallette
c775b7a033
Merge pull request #1 from Neo23x0/master
...
update fork
2019-04-09 22:43:32 -04:00
Jason Lynch
89fb726875
added win_office_spawn_exe_from_users_directory.yml. Detects executable in users directory started via office program. Helpful for adversaries that tend to drop and execute renamed binaries in this location such as fin7
2019-04-09 09:45:07 -04:00
Jason Lynch
f0c8c428bb
added rules for renamed wscript, cscript and paexec. Added two directories to the existing sysmon_susp_prog_location_network_connection rule. These additions are all fin7 related.
2019-04-08 08:07:30 -04:00
juju4
152febcea2
sumologic: fixing non-pushed cleannode()
2019-04-07 13:04:15 -04:00
patrick
ca4b710c01
Added Sigma Use Case detecting Privilege Escalation Preparation in Linux
2019-04-07 15:36:19 +02:00
Karneades
97376c00de
Fix condition
2019-04-04 22:33:32 +02:00
Karneades
766b8b8d18
Fix condition
2019-04-04 22:32:47 +02:00
Karneades
788e75ef1b
Fix condition
2019-04-04 22:32:21 +02:00
Karneades
840eb2f519
Remove too loose filter in notepad updater rule
2019-04-04 22:25:05 +02:00
Karneades
eb690d8902
Remove too loose filter in mshta rule
2019-04-04 22:16:24 +02:00
Karneades
1915561351
Remove to loose wildcard from wmi spwns powershell rule
2019-04-04 22:12:28 +02:00
Florian Roth
81693d81b6
Merge pull request #295 from sbousseaden/master
...
Create win_atsvc_task.yml
2019-04-04 18:32:13 +02:00
sbousseaden
c4b8f75940
Update win_lm_namedpipe.yml
2019-04-04 18:22:50 +02:00
MadsRC
41b4d800c5
Update net_susp_dns_txt_exec_strings.yml
...
Fixed my botched YAML syntax...
2019-04-04 08:35:37 +02:00
sbousseaden
22958c45a3
Update win_GPO_scheduledtasks.yml
2019-04-03 21:50:55 +02:00
sbousseaden
b4ac9a432f
Update win_susp_psexec.yml
2019-04-03 21:50:25 +02:00
sbousseaden
353e457104
Update win_lm_namedpipe.yml
2019-04-03 21:49:58 +02:00
sbousseaden
d5818a417b
Update win_impacket_secretdump.yml
2019-04-03 21:49:30 +02:00
sbousseaden
9c5575d003
Update win_atsvc_task.yml
2019-04-03 21:48:38 +02:00
sbousseaden
edb98f2781
Update win_account_discovery.yml
2019-04-03 21:40:59 +02:00
MadsRC
d0d51b6601
Update net_susp_dns_txt_exec_strings.yml
...
The references indicate that this rule should apply to TXT records, but without specifying that the "record_type" must be "TXT" there's the potential for a lot of false positives.
"record_type" was chosen as that fits with Splunks "Network Resolution (DNS)" datamodel.
2019-04-03 20:31:31 +02:00
Florian Roth
2b814011cd
Merge pull request #287 from P4T12ICK/feature/lnx-clear-cmd-history-signature
...
Add new signature for linux clear command history
2019-04-03 19:45:06 +02:00
Florian Roth
13f86e9333
Merge pull request #296 from Karneades/patch-1
...
Remove backslashes in CommandLine for sticky key rule
2019-04-03 19:44:02 +02:00
Florian Roth
b4b7d810fc
Merge pull request #300 from yt0ng/development
...
Sqirrel packages manager, EmpireMonkey, WMI Spawning PowerShel
2019-04-03 19:20:46 +02:00
yt0ng
e0459cec1c
renamed file
2019-04-03 17:39:17 +02:00
christophetd
d32e5c10b8
Allow generating Elastalert rules with the http_post alert type without specifying a URL at generation time
2019-04-03 17:22:58 +02:00
t0x1c-1
7e058e611c
WMI spawning PowerShell seen in various attacks
2019-04-03 16:56:45 +02:00
Unknown
9ada22b8e0
adjusted link
2019-04-03 16:40:18 +02:00
Unknown
d2e605fc5c
Auto stash before rebase of "Neo23x0/master"
2019-04-03 16:25:18 +02:00
Karneades
865d971704
Remove backslashes in CommandLine for sticky key rule
...
Example command line is exactly "cmd.exe sethc.exe 211".
=> the detection with *\cmd.exe... would not match.
2019-04-03 16:16:18 +02:00
sbousseaden
eda5298457
Create win_account_backdoor_dcsync_rights.yml
2019-04-03 16:16:05 +02:00
sbousseaden
0756b00cdf
Create win_susp_psexec.yml
2019-04-03 15:59:46 +02:00
sbousseaden
9c1a5a5264
Create win_lm_namedpipe.yml
2019-04-03 15:48:42 +02:00
sbousseaden
56b68a0266
Create win_GPO_scheduledtasks.yml
2019-04-03 15:36:24 +02:00
sbousseaden
b941f6411f
Create win_impacket_secretdump.yml
2019-04-03 15:18:42 +02:00
sbousseaden
516c8f3ea1
Create win_account_discovery.yml
2019-04-03 14:41:11 +02:00
sbousseaden
3d69727332
Create sysmon_rdp_settings_hijack.yml
2019-04-03 14:16:25 +02:00
sbousseaden
016261cacf
Update sysmon_lsass_memdump.yml
2019-04-03 14:06:49 +02:00
sbousseaden
a85c668f6f
Update sysmon_lsass_memdump.yml
2019-04-03 14:00:51 +02:00
sbousseaden
d62bc41bfb
Create win_svcctl_remote_service.yml
2019-04-03 13:58:20 +02:00
sbousseaden
32c6b34746
Create sysmon_lsass_memdump.yml
2019-04-03 13:51:59 +02:00
sbousseaden
548145ce10
Create win_susp_raccess_sensitive_fext.yml
2019-04-03 13:22:42 +02:00
sbousseaden
ddb2d92a98
Create sysmon_tsclient_filewrite_startup.yml
2019-04-03 13:19:59 +02:00
sbousseaden
e3f99c323b
Create win_atsvc_task.yml
2019-04-03 13:08:12 +02:00
Florian Roth
6cc1770351
Merge pull request #294 from Pr0t3an/patch-3
...
Update lnx_shell_susp_rev_shells.yml
2019-04-03 01:07:07 +02:00
Florian Roth
b76925f838
Rule: extending rule with /dev/udp
2019-04-02 20:09:13 +02:00
Pr0t3an
d067087632
Update lnx_shell_susp_rev_shells.yml
...
added
- 'bash -i >& /dev/udp/'
- 'sh -I >$ /dev/udp/'
- 'sh -i >$ /dev/tcp/'
2019-04-02 18:22:18 +01:00
Florian Roth
5c5a16c4d5
Rule: adding xterm -display string to rule
2019-04-02 18:48:18 +02:00
Florian Roth
453bd10e6e
Rule: Suspicious reverse shell command lines
2019-04-02 17:03:57 +02:00
Thomas Patzke
8e854b06f6
Specified source to prevent EventID collisions
...
Issue #263
2019-04-01 23:45:55 +02:00
Thomas Patzke
0419ff215a
Fixed quoting of single quotes in grep backend
2019-04-01 23:22:05 +02:00
Florian Roth
d06a5431eb
Changes
2019-04-01 14:03:54 +02:00
Florian Roth
c7553dc8a1
Merge pull request #292 from yt0ng/development
...
Allow Incoming Connections by Port or Application on Windows Firewall
2019-04-01 14:02:10 +02:00
Florian Roth
e473efb7c3
Trying to fix ATT&CK framework tag
2019-04-01 10:36:35 +02:00
Florian Roth
3f2ce4b71f
Lowered level to medium
2019-04-01 09:47:14 +02:00
t0x1c-1
51c42a15a7
Allow Incoming Connections by Port or Application on Windows Firewall
2019-04-01 08:16:56 +02:00
patrick
0242c40360
Add new signature for linux clear command history
2019-03-24 10:10:14 +01:00
Nate Guagenti
60c4fed2e0
Create win_etw_trace_evasion.yml
...
there are two versions of clear and two variations of set that can be used with something like wevtutil
`wevtutil cl | wevtutil clear-log | wevtutil sl | wevtutil set-log `
Also, I am adding a `*` match at the end, because there are other parameters that could be placed on the end -- so unless this was used on a general search on a text/analyzed field then the `*` is necessary.
example `wevtutil set-log Microsoft-Windows-WMI-Activity/Trace /e:disable /q:true`
2019-03-22 11:36:55 -04:00
Florian Roth
ffac77fb37
Rule: extended LockerGoga description
2019-03-22 11:03:48 +01:00
Florian Roth
1adb040e0b
Rule: LockerGoga
2019-03-22 10:59:31 +01:00
Florian Roth
2ad2ba9589
fix: rule field fix in proc_creation rule
2019-03-22 10:59:18 +01:00
Thomas Patzke
140a32d8c9
Sigma tools release 0.10
2019-03-16 01:02:48 +01:00
Thomas Patzke
2dda9a7b77
Moved Sysmon schema XML from contrib directory into module
2019-03-16 00:59:29 +01:00
Thomas Patzke
be25aa2c37
Added CAR tags
2019-03-16 00:37:09 +01:00
Thomas Patzke
8512417de0
Incorporated MITRE CAR mapping from #55
2019-03-16 00:03:27 +01:00
Thomas Patzke
5c4d8bc2ca
Merge branch 'christophetd-backend-config-file'
2019-03-15 23:47:24 +01:00
Thomas Patzke
5e973a6321
Fixes and CI testing of --backend-config
2019-03-15 23:46:38 +01:00
Thomas Patzke
0864d05aa5
Merge branch 'backend-config-file' of https://github.com/christophetd/sigma into christophetd-backend-config-file
2019-03-15 23:35:11 +01:00
Thomas Patzke
9be6b8b1a5
Merge branch 'tuckner-master'
2019-03-15 23:27:40 +01:00
Thomas Patzke
3f7e08733a
Added backend option 'sysmon' for ala backend
2019-03-15 23:26:15 +01:00
Thomas Patzke
8d1723e65c
Merge branch 'master' of https://github.com/tuckner/sigma into tuckner-master
2019-03-15 23:06:08 +01:00
Thomas Patzke
5e3a25537e
Merge pull request #283 from LiamSennitt/master
...
Added and fixed tags on APT rules
2019-03-15 23:00:25 +01:00
Florian Roth
4650271117
Merge pull request #284 from krakow2600/master
...
added missed service
2019-03-14 08:20:48 +01:00
yugoslavskiy
33db032a16
added missed service
2019-03-14 00:44:26 +01:00
Liam Sennitt
bb026e4692
fixed tag typo on rules
2019-03-13 10:25:41 +00:00
Liam Sennitt
0aaac1a48e
add tags to crime fireball rule
2019-03-13 10:10:12 +00:00
Liam Sennitt
1e29c9c1ce
add tags to apt zxshell rule
2019-03-13 10:09:05 +00:00
Liam Sennitt
1f47dc1cdc
add tags to apt turla commands rule
2019-03-13 10:06:34 +00:00
Liam Sennitt
96492834c5
add tags to apt sofacy rule
2019-03-13 09:53:02 +00:00
Liam Sennitt
aca36c88cc
add tags to apt slingshot rule
2019-03-13 09:50:39 +00:00
Liam Sennitt
aac632bb41
add tags on apt equationgroup dll_u load rule
2019-03-13 09:48:27 +00:00
Liam Sennitt
5ffc027f22
fix tags in apt carbonpaper turla rule
2019-03-13 09:43:18 +00:00
Liam Sennitt
25b680bfec
fix and add tags to apt bear activity gtr19 rule
2019-03-13 09:40:28 +00:00
Liam Sennitt
3b193fb691
add tags to apt babyshark rule
2019-03-13 09:32:10 +00:00
Liam Sennitt
aee0d1dd67
fix tags on apt29 tor rule
2019-03-13 09:25:28 +00:00
Liam Sennitt
5dc229b590
add tags to apt29 thinktanks rule
2019-03-13 09:22:41 +00:00
Florian Roth
95b47972f0
fix: transformed rule to new proc_creation format
2019-03-12 09:03:30 +01:00
Florian Roth
c4003ff410
Merge pull request #264 from darkquasar/master
...
adding rule win-susp-mshta-execution.yml
2019-03-11 23:50:56 +01:00
Florian Roth
bd38cff042
Merge pull request #272 from LiamSennitt/master
...
fix tagging in turla png dropper service rule
2019-03-11 23:48:18 +01:00
Florian Roth
909c09f4ac
Merge pull request #282 from krakow2600/master
...
updated detection logic
2019-03-11 23:47:53 +01:00
Yugoslavskiy Daniil
5d54e9c8a1
nbstat.exe -> nbtstat.exe
2019-03-11 19:28:29 +01:00
Yugoslavskiy Daniil
c22265c655
updated detection logic
2019-03-11 16:58:57 +01:00
Florian Roth
8dd39a2653
Merge pull request #281 from TareqAlKhatib/oops
...
Migrated the last detections to process_creation
2019-03-09 19:40:25 +01:00
Tareq AlKhatib
783d8c4268
Reverting back to regular Sysmon 1 to fix CI test
2019-03-09 21:31:56 +03:00
Tareq AlKhatib
7f4557d183
Enabled check for process_creation
2019-03-09 21:00:11 +03:00
Tareq AlKhatib
075df83118
Converted to use the new process_creation data source
2019-03-09 20:57:59 +03:00
Tareq AlKhatib
c3b079990a
Properly end anchored the regex
2019-03-09 19:23:50 +03:00
Florian Roth
361f2ffa5f
Product Support - RANK VASA
2019-03-08 16:32:22 +01:00
Florian Roth
fe9e50167f
Rule: renamed bitsadmin rule
2019-03-08 16:25:16 +01:00
Florian Roth
49532438eb
Rule: Bitsadmin wot uncommon TLD
2019-03-08 16:20:10 +01:00
John Tuckner
a1ba04aec8
modified process creation logic
2019-03-08 00:01:43 -06:00
Thomas Patzke
082ee586bf
Merge branch 'christophetd-elastalert-alert-types'
2019-03-08 00:05:08 +01:00
Thomas Patzke
6d97c6d0bb
Extended elastalert CI testing
2019-03-08 00:04:43 +01:00
Thomas Patzke
a429f09cc1
Merge branch 'elastalert-alert-types' of https://github.com/christophetd/sigma into christophetd-elastalert-alert-types
2019-03-07 23:54:05 +01:00
Thomas Patzke
3c1948f089
Merge pull request #277 from megan201296/patch-18
...
Remove invalid link
2019-03-07 23:49:13 +01:00
Thomas Patzke
c235944a0c
Merge pull request #278 from krakow2600/master
...
fixed incorrect date format
2019-03-07 23:46:12 +01:00
tuckner
c97f0f097b
Merge branch 'master' of https://github.com/tuckner/sigma
2019-03-07 16:29:01 -06:00
tuckner
e9ddd933f8
more fixes for process creation
2019-03-07 16:28:35 -06:00
Yugoslavskiy Daniil
475113b1c1
fixed incorrect date format
2019-03-07 22:52:11 +01:00
megan201296
c2a16591af
Remove invalid link
...
Cybereason link was broken. Couldn't find anything with a super similar file path. The below link might be a valid replacement but went better safe than sorry and just removed it completely. https://www.cybereason.com/hubfs/Cybereason%20Labs%20Analysis%20Operation%20Cobalt%20Kitty-Part1.pdf
2019-03-07 14:22:29 -06:00
John Tuckner
1182ee2de2
added ala to makefile
2019-03-07 10:43:22 -06:00
John Tuckner
5a64f572e3
update
2019-03-07 10:32:59 -06:00
Florian Roth
a82ea0a022
Merge pull request #276 from krakow2600/master
...
ATC windows rules review
2019-03-06 17:16:32 +01:00
Florian Roth
83c0c71bc7
Reworked for process_creation rules
2019-03-06 17:09:43 +01:00
Florian Roth
d7c25adfb6
Merge pull request #274 from TareqAlKhatib/multifile_yamls
...
Updated to use the new process_creation logsource
2019-03-06 17:06:04 +01:00
Yugoslavskiy Daniil
cb7243de5d
fixed wrong tags
2019-03-06 06:18:38 +01:00
Yugoslavskiy Daniil
8bec627ff1
fixed multiple tags issue
2019-03-06 06:09:37 +01:00
Yugoslavskiy Daniil
5154460726
changed service to product
2019-03-06 05:57:01 +01:00
Yugoslavskiy Daniil
05cc7e455d
atc review
2019-03-06 05:25:12 +01:00
yugoslavskiy
725ab99e90
Merge pull request #1 from AverageS/master
...
Fix rules
2019-03-06 04:31:01 +01:00
John Tuckner
283bd278f4
added eventid to sysmon process creation
2019-03-05 20:58:23 -06:00
John Tuckner
971bd49071
accomodated process creation and slash escapes
2019-03-05 20:50:30 -06:00
Wydra Mateusz
534f250c35
Merge branch 'master' of https://github.com/krakow2600/sigma
2019-03-06 00:45:16 +01:00
Wydra Mateusz
bb95347745
rules update
2019-03-06 00:43:42 +01:00
mrblacyk
6232362f04
Missing tags
2019-03-06 00:16:40 +01:00
mrblacyk
07807837ee
Missing tags
2019-03-06 00:02:37 +01:00
mikhail
be108d95cc
Merge branch 'master' of https://github.com/AverageS/sigma
2019-03-06 01:57:38 +03:00
mikhail
40241c1fdf
Fix 4 rules
2019-03-06 01:56:05 +03:00
mrblacyk
99595a7f89
Added missing tags and some minor improvements
2019-03-05 23:25:49 +01:00
Tareq AlKhatib
879017818f
More conversions to the new process_creation logsource
2019-03-05 09:46:53 +03:00
tuckner
2c0cc87ab8
Added schema file checking
2019-03-04 11:57:30 -06:00
tuckner
cf186387af
Added schema file checking
2019-03-04 11:53:51 -06:00
tuckner
c5796d7853
Added Azure Log Analytics backend
2019-03-04 10:49:50 -06:00
tuckner
8179d182c4
added azure log analytics
2019-03-04 10:44:45 -06:00
Tareq AlKhatib
b2952b9f78
Fixing failed CI build - take 2
2019-03-04 16:51:39 +03:00
Tareq AlKhatib
c8be6e649b
Fixing failed CI build
2019-03-04 16:44:30 +03:00
Tareq AlKhatib
45458121c6
Updated to use the new process_creation logsource
2019-03-04 16:13:27 +03:00
Florian Roth
ae1541242c
New custom suspicious TLD in rule ".pw"
2019-03-03 10:58:12 +01:00
Thomas Patzke
17e9729ddd
Merge pull request #273 from TareqAlKhatib/process_create
...
Process create
2019-03-02 21:57:59 +01:00
Tareq AlKhatib
58c61430a2
updated to use process_creation
2019-03-02 21:05:15 +03:00
Tareq AlKhatib
be2ca8dc4d
Added checks for Sysmon 1 or EID 4688 instead of process_creation
2019-03-02 20:51:49 +03:00
Florian Roth
33e490e4fa
Titles in Examples
2019-03-02 12:23:44 +01:00
Florian Roth
7b3d67ae66
fix: bugfix in new proc creation rule
2019-03-02 11:28:13 +01:00
Florian Roth
9a3ceb8421
Sigmac Usage Examples
2019-03-02 10:58:02 +01:00
Liam Sennitt
bef5f03015
fix tagging in turla png dropper service rule
2019-03-02 09:01:00 +00:00
Florian Roth
1a583c158d
fixed typo as in pull request by @m0jtaba
2019-03-02 08:16:25 +01:00
Florian Roth
2188001f98
Extended filter list provided by @Ov3rflow
2019-03-02 08:13:29 +01:00
Florian Roth
bd4e61acd8
Merge pull request #271 from vburov/patch-4
...
Update win_susp_failed_logon_reasons.yml
2019-03-02 07:21:28 +01:00
Florian Roth
f80cf52982
Expired happens too often
...
Back then when we created this rule, we noticed that "logon attempt with expired account" happens pretty often, so we decided to not include it. All event codes in this rule did not appear in a 30 day time period and therefore the rule's "level" was set to "high".
2019-03-02 07:20:59 +01:00
Thomas Patzke
99b15edf8a
Sigma tools release 0.9
2019-03-02 00:47:03 +01:00
Thomas Patzke
56a1ed1eac
Merge branch 'project-1'
2019-03-02 00:26:10 +01:00
Thomas Patzke
7602309138
Increased indentation to 4
...
* Converted (to generic sigma) rules
* Converter outputs by default with indentation 4
2019-03-02 00:14:20 +01:00
Florian Roth
1aac9baaed
Merge pull request #270 from LiamSennitt/master
...
fix bug in chafer activity rule #269
2019-03-01 17:13:04 +01:00
Vasiliy Burov
7bebedbac1
Update win_susp_failed_logon_reasons.yml
...
Added descriptions for logon failure statuses and new logon failure status that may indicate suspicious logon.
2019-03-01 18:18:39 +03:00
Florian Roth
af6a1ff26a
Extended rule, modified timestamp
2019-03-01 13:36:54 +01:00
Florian Roth
f560e83886
Added modified date
2019-03-01 12:07:31 +01:00
Florian Roth
fc683ac7ee
Added error code for denied logon type
2019-03-01 12:06:54 +01:00
Liam Sennitt
2345cbf7bd
fix bug in chafer activity rule #269
2019-03-01 10:23:02 +00:00
Thomas Patzke
690807c846
Sigma tools release 0.8
2019-02-28 09:08:22 +01:00
Thomas Patzke
6bdb4ab78a
Merge cleanup
2019-02-27 22:05:27 +01:00
darkquasar
155e273a1c
adding rule win-susp-mshta-execution.yml
2019-02-27 15:55:39 +11:00
Florian Roth
8ce4b1530d
Rule: added SAM export
2019-02-26 09:00:47 +01:00
Thomas Patzke
c922f7d73f
Merge branch 'master' into project-1
2019-02-26 00:24:46 +01:00
Thomas Patzke
58a32f35d9
Merge pull request #246 from james0d0a/master
...
Added esentutl copy command to sysmon_susp_vssadmin_ntds_activity.yml
2019-02-24 16:53:49 +01:00
Florian Roth
f278a00174
Rule: certutil encode
2019-02-24 14:10:40 +01:00
Florian Roth
e7f5cbc22a
Rule: BabyShark activity
2019-02-24 14:04:44 +01:00
Florian Roth
a60b53a7df
fix: bugfix in BEAR activity rule
2019-02-24 14:04:44 +01:00
Florian Roth
8b7f0508a7
Merge pull request #262 from TareqAlKhatib/sysinternals
...
Added a detection path through process spawn
2019-02-24 09:19:00 +01:00
Tareq AlKhatib
7d3d819ea5
Added a detection path through process spawn
2019-02-24 10:29:58 +03:00
Florian Roth
bdf0dd8e21
Merge pull request #260 from TareqAlKhatib/malware_backconnect
...
Added private IP filter to reduce FPs
2019-02-23 22:47:14 +01:00
Tareq AlKhatib
a022333382
Added private IP filter to reduce FPs
2019-02-23 21:15:03 +03:00
Vasiliy Burov
f0c89239d3
Added some unusual paths.
2019-02-23 17:45:08 +03:00
christophetd
1a6faf385c
Add HTTP POST alert type to the Elastalert backend
2019-02-23 14:12:14 +01:00
christophetd
3a7160d52b
Accept backend options from a configuration file ( closes #213 )
2019-02-23 13:20:20 +01:00
Florian Roth
f25416bd65
chore: workaround Travis Python 3.5 problems
2019-02-23 07:43:41 +01:00
Florian Roth
afa18245bf
Merge pull request #254 from darkquasar/master
...
adding MPreter as McAfee classifies it
2019-02-23 07:34:04 +01:00
Thomas Patzke
c17f9d172f
Merge pull request #248 from megan201296/patch-17
...
Create win_mal_ursnif.yml
2019-02-22 21:30:49 +01:00
Thomas Patzke
02239fa288
Changed registry root key
...
According to [this](https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon#event-id-12-registryevent-object-create-and-delete ) it is abbreviated to HKU.
2019-02-22 21:30:30 +01:00
Thomas Patzke
18d012cc2e
Merge pull request #255 from vburov/patch-1
...
Update win_susp_process_creations.yml
2019-02-22 21:15:52 +01:00
Thomas Patzke
5c63ef17d2
Added further NirSoft tool parameters
2019-02-22 21:15:03 +01:00
vburov
bdf44be077
Update win_susp_process_creations.yml
2019-02-22 22:46:57 +03:00
darkquasar
87994ca46b
adding MPreter as McAfee classifies it
...
McAfee classifies some Meterpreter events with the "Mpreter" keyword
2019-02-22 15:22:10 +11:00
Florian Roth
d3b623e92a
Rule: suspicious pipes extended
...
https://github.com/Neo23x0/sigma/issues/253
2019-02-21 13:26:48 +01:00
Florian Roth
343a40ced7
Rule: extended exec location rule to support 4688 events
2019-02-21 13:26:48 +01:00
Florian Roth
c8701ac6e9
Merge pull request #252 from keepwatch/patch-1
...
Fixing yara condition
2019-02-21 10:17:09 +01:00
Florian Roth
8ae37f5d64
BEAR activity - CrowdStrike GTR 2019
...
https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/
2019-02-21 09:54:01 +01:00
Florian Roth
3a994d0d63
fix: bugfix in Judgement Panda rule
2019-02-21 09:50:49 +01:00
Florian Roth
5935eaa572
fix: added MITRE ATT&CK tags to APT rule
2019-02-21 09:27:59 +01:00
Florian Roth
aca470961a
fix: bugfix in Judgement Panda rule
2019-02-21 09:20:52 +01:00
Florian Roth
c474bfcae5
Judgement Panda - Crowdstrike GTR 2019
...
https://www.crowdstrike.com/resources/reports/2019-crowdstrike-global-threat-report/
2019-02-21 09:20:52 +01:00
Keep Watcher
07dec06222
Fixing yara condition
2019-02-20 10:57:24 -05:00
Thomas Patzke
9ef314486e
Grep backend escapes +
2019-02-19 14:49:06 +01:00
Florian Roth
eeae74e245
Merge pull request #249 from TareqAlKhatib/duplicate_filters
...
Duplicate Detections
2019-02-18 21:58:39 +01:00
Tareq AlKhatib
ae62acf3d2
Added a test for duplicate filters and a test for Source: Eventlog
2019-02-18 21:05:58 +03:00
Tareq AlKhatib
2e3a2b9ba6
Merged 'Eventlog Cleared' and 'Eventlog Cleared Experimental'
2019-02-18 21:03:53 +03:00
Florian Roth
f0a4aede24
Rule: RDP over Reverse SSH Tunnel
2019-02-16 19:36:13 +01:00
Florian Roth
08e00945aa
doc: SANS webcast link in README
2019-02-16 09:51:02 +01:00
megan201296
34f9d17b26
Create win_mal_ursnif.yml
2019-02-13 15:22:57 -06:00
Florian Roth
2e61233e31
Merge pull request #247 from TareqAlKhatib/duplicate_filters
...
Unnecessary 1/all of them
2019-02-13 20:30:53 +01:00
Tareq AlKhatib
97b28f4308
Added a test for unnecessary use of '1 of them' in condition
2019-02-13 21:27:27 +03:00
Tareq AlKhatib
cd3cdc9451
Removed unnecessary '1 of them' in condition
2019-02-13 21:26:02 +03:00
Florian Roth
8d819cfeea
Rule: fixed bug in Renamed PowerShell rule
2019-02-13 13:23:02 +01:00
Florian Roth
004497075d
fix: spark source config bug
2019-02-12 23:27:38 +01:00
Florian Roth
c2eda887fa
Rule: Suspicious Windows NT 9 UA
2019-02-12 10:33:33 +01:00
james dickenson
b16bb4bf9b
Added esentutl copy command to sysmon_susp_vssadmin_ntds_activity.yml
2019-02-11 21:10:49 -08:00
Florian Roth
be26ada875
Rule: Suspicious csc.exe parents
2019-02-11 13:50:51 +01:00
Florian Roth
74e3c79f40
Rule: Suspicious PowerShell keywords
2019-02-11 13:02:38 +01:00
Thomas Patzke
a5af134bfe
Merge branch 'neu5ron-patch-2'
2019-02-10 00:16:55 +01:00
Thomas Patzke
01570f88db
YAML fixes
2019-02-10 00:16:27 +01:00
Thomas Patzke
6dd4b4775a
Merge branch 'patch-2' of https://github.com/neu5ron/sigma into neu5ron-patch-2
2019-02-10 00:15:25 +01:00
Thomas Patzke
ff5081f186
Merge branch 'yt0ng-development'
2019-02-10 00:09:29 +01:00
Thomas Patzke
14769938e9
Fixed condition keyword
2019-02-10 00:07:30 +01:00
Thomas Patzke
d43e67a882
Merge branch 'development' of https://github.com/yt0ng/sigma into yt0ng-development
2019-02-10 00:00:45 +01:00
Thomas Patzke
3cd6de2864
Merge pull request #240 from neu5ron/master
...
new rule and updated false positive note
2019-02-09 23:57:39 +01:00
Thomas Patzke
01dfc23a26
Merge pull request #234 from juju4/devel-sumo
...
Sumologic support update
2019-02-09 23:54:23 +01:00
Thomas Patzke
d9aceeb7eb
Merge pull request #228 from keepwatch/ssp-regkey-detection
...
SSP added to LSA configuration
2019-02-09 23:44:55 +01:00
Thomas Patzke
5866d8eb71
Merge pull request #238 from sisecbe/patch-1
...
Adapt count function when aggfield not present
2019-02-09 23:38:20 +01:00
juju4
4429d7564f
remove 'escape' of '_' - not needed
2019-02-09 12:57:43 -05:00
juju4
a815b7eb9b
add custom cleanValue function for wildcards in keyvalue: OK with lists, NOK with string
2019-02-09 12:57:07 -05:00
Florian Roth
aab703a4b4
Suspicious calc.exe usage
2019-02-09 14:03:23 +01:00
Florian Roth
05424883dd
Added Info Graphic to README
2019-02-09 09:38:01 +01:00
Florian Roth
efb223b147
Merge pull request #245 from kpolley/master
...
2nd method to call downloadString or downloadFile in Powershell
2019-02-09 09:35:19 +01:00
Florian Roth
7e732a2a89
Merge pull request #232 from TareqAlKhatib/duplicate_filters
...
Duplicate filters
2019-02-09 09:23:57 +01:00
Florian Roth
d2743351e7
Minor fix: indentation
2019-02-09 09:19:40 +01:00
Kyle Polley
c8c06763b4
added keywords & source to sysmon_powershell_download.yml
2019-02-07 18:25:04 -08:00
Nate Guagenti
d151deaa29
Rename win_susp_bcdedit to win_susp_bcdedit.yml
2019-02-07 00:21:57 -05:00
Nate Guagenti
91862f284b
Create win_susp_bcdedit
...
This is a more general rule for possible boot/mbr value edits using bcdedit that I have seen in the wild.
It is different than https://github.com/Neo23x0/sigma/blob/3288f6425b1a868c66f6f0a255956f8f041bc666/rules/windows/malware/win_mal_wannacry.yml
because it is not specific to anyone family (of malware) and also has different CLI options
2019-02-07 00:19:38 -05:00
Kyle Polley
423fdca32c
Merge pull request #1 from Neo23x0/master
...
Get updates from head repo
2019-02-06 17:02:41 -08:00
Florian Roth
adb6690c80
Rule: Suspicious GUP.exe usage
2019-02-06 19:21:16 +01:00
Florian Roth
f0f0bdae40
Rule: fixed date - wrong year
2019-02-06 19:21:16 +01:00
Florian Roth
7192f149a3
Merge pull request #243 from keepwatch/broadening-suspicious-certutil
...
Added '/' prefix, -encode switch, better renamed certutil coverage
2019-02-06 16:58:27 +01:00
keepwatch
e6217928f3
Added '/' prefix, -encode switch, better renamed certutil coverage
2019-02-06 10:45:32 -05:00
Unknown
2f66ba25f0
adjusted MITRE ATTCK tag
2019-02-06 11:27:51 +01:00
Unknown
a9731d211d
removed my garbage
2019-02-06 11:16:40 +01:00
Unknown
4d048c71bb
adjusted spaces
2019-02-06 11:10:42 +01:00
Unknown
54ec01bcdd
adjusted space
2019-02-06 11:10:00 +01:00
Unknown
a0bac993ed
adjusted spaces
2019-02-06 11:07:09 +01:00
t0x1c-1
04f1edd171
added reverted base64 with dosfuscation
2019-02-06 10:59:09 +01:00
Unknown
22b67a67ac
Initial Commit Cobalt Malleable for OneDrive
2019-02-06 10:59:02 +01:00
Unknown
353f66dd7c
CobaltStrike Malleable OCSP) Profile with Typo (OSCP) in URL
2019-02-06 10:58:48 +01:00
t0x1c-1
150499d151
Detects Executables without FileVersion,Description,Product,Company likely created with py2exe
2019-02-06 10:58:37 +01:00
Unknown
c78ac9333c
adjusted formatting
2019-02-06 10:54:12 +01:00
t0x1c-1
21f34ab8ba
suspicious behaviour
2019-02-06 10:52:41 +01:00
neu5ron
35ebcff543
add new rule
2019-02-05 18:56:24 -05:00
neu5ron
65e4ba5aba
added false positive possibility
2019-02-05 18:45:53 -05:00
keepwatch
bad80ffa78
Update sysmon_ssp_added_lsa_config.yml
...
Syntax fix
2019-02-05 16:28:06 -05:00
Florian Roth
cc8a89b679
Merge pull request #239 from neu5ron/master
...
update helk config
2019-02-05 20:01:28 +01:00
neu5ron
046510f021
updated HELK Destination IP name
2019-02-05 13:11:06 -05:00
sisecbe
5d94b9f0bc
Changed stats to eventstats
...
Changed 'stats' to 'eventstats' when using aggregation, this keeps the original data of the event in the result.
2019-02-05 17:36:46 +01:00
Florian Roth
5092b1e603
Rule: removed overlapping strings in Linux rule
2019-02-05 16:12:07 +01:00
Florian Roth
32c098294f
Rule: extended suspicious command lines
2019-02-05 15:58:15 +01:00
Florian Roth
8f684ddd06
Rule: FP in WMI persistence with SCCM
2019-02-05 15:57:54 +01:00
sisecbe
2f5eb08b41
Adapt count function when aggfield not present
...
When no field is present, use "count" , when field is present use "dc(field)". As described in the Sigma specifications.
Splunk throws errors when using "count()" with empy fields. use "count" instead.
2019-02-05 15:44:05 +01:00
Florian Roth
a276d3083d
DHCP log source in sigmac configs
2019-02-05 14:35:23 +01:00
Florian Roth
dfd4ce878f
Rule: limiting rule to DHCP log
2019-02-05 14:35:23 +01:00
Florian Roth
5b92790e3f
Rule: WMI Persistence - FPs
2019-02-05 14:35:23 +01:00
Florian Roth
abf5a5088e
Rule: more malicious UAs
2019-02-05 14:35:23 +01:00
juju4
98a18fd4a2
add sigma2sumologic.py as test/example script
2019-02-03 12:54:03 -05:00
juju4
7d159fb980
sumologic backend: review with inspiration from arcsight
2019-02-03 12:53:58 -05:00
Thomas Patzke
3ef930b094
Escaped '\*' to '\\*' where required
2019-02-03 00:24:57 +01:00
Thomas Patzke
9c44bb04a7
Added mail address to CI fail notification
2019-02-02 23:52:54 +01:00
Thomas Patzke
9403128aef
Merge branch 'master' of https://github.com/Neo23x0/sigma
2019-02-02 23:52:06 +01:00
Thomas Patzke
6215a694a8
Remove escaping from '\\*' in es-dsl backend
2019-02-02 23:51:11 +01:00
Florian Roth
37e13c9f41
Notify me
2019-02-02 08:56:00 +01:00
Thomas Patzke
8a0784ad33
Fixed escaping of \\*
2019-02-02 00:18:58 +01:00
Thomas Patzke
6440bc962b
CACTUSTORCH detection
2019-02-01 23:27:53 +01:00
Thomas Patzke
6436cb3ae1
Added missing conditions
2019-02-01 23:02:03 +01:00
Florian Roth
27c2684a0f
Rule: Chafer malware proxy pattern
2019-01-31 12:31:48 +01:00
Florian Roth
a8d1e7c62b
Rule: Fixed ntdsutil rule field in 4688 events
2019-01-29 15:59:39 +01:00
Florian Roth
6c8d08942e
Rule: Fixed field in RDP rule
2019-01-29 15:17:29 +01:00
Florian Roth
f61b44efa8
Rule: Netsh port forwarding
2019-01-29 14:04:48 +01:00
Florian Roth
086e62a495
Rule: Netsh RDP port forwarding rule
2019-01-29 14:04:28 +01:00
Florian Roth
a2eac623a6
Rule: Adjusted RDP login from localhost rule level
2019-01-29 14:04:10 +01:00
Florian Roth
c9ec469180
style: cosmetics - removed empty lines at file end
2019-01-29 12:54:07 +01:00
Thomas Patzke
516bfc88ff
Added rule: RDP login from localhost
2019-01-28 22:43:22 +01:00
Tareq AlKhatib
cd2af196e3
Corrected path to rules
2019-01-25 12:25:51 +03:00
Tareq AlKhatib
96220e776f
Added a test to check for duplicate filters in rules
2019-01-25 12:22:28 +03:00
Tareq AlKhatib
7e4bb1d21a
Removed duplicate filters
2019-01-25 12:21:57 +03:00
Thomas Patzke
3c7f46a6cd
Added rule test to CI testing
2019-01-23 23:31:36 +01:00
Thomas Patzke
9ce7d18712
Merge pull request #231 from TareqAlKhatib/rule_testing_framework
...
Rule testing framework
2019-01-23 23:16:46 +01:00
Tareq AlKhatib
ecffe28933
Correct MITRE tag
2019-01-22 21:26:07 +03:00
Tareq AlKhatib
e3d61047bb
Added two tests. One for MITRE and another for file extension.
2019-01-22 21:25:13 +03:00
Florian Roth
90e8eba530
rule: false positive reduction in PowerShell rules
2019-01-22 16:37:36 +01:00
Florian Roth
cc6e0baef1
rule: extended certutil rule to include verifyctl and allows renamed certutil
...
https://twitter.com/egre55/status/1087685529016193025
2019-01-22 16:20:06 +01:00
Florian Roth
b1ea976f66
fix: fixed bug inntdsutil rule that included a white space
2019-01-22 16:18:43 +01:00
Florian Roth
8c4b21f063
Rule: Apache threading errors
2019-01-22 08:49:10 +01:00
keepwatch
f99df33b01
SSP added to LSA configuration
2019-01-18 14:05:21 -05:00
Thomas Patzke
3eaf83cf5a
Improved configurations
...
Added Security/4688 field mappings
2019-01-16 23:37:18 +01:00
Thomas Patzke
96eb460944
Converted Sysmon/1 and Security/4688 to generic process creation rules
2019-01-16 23:36:31 +01:00
Thomas Patzke
ba64f485ac
Added generic Windows audit log configuration
2019-01-16 22:41:42 +01:00
Thomas Patzke
4bc4c94a91
sigma2genericsigma: preserve dict order
2019-01-16 22:37:32 +01:00
Florian Roth
5645c75576
Rule: updated relevant AV signatures - exploiting
...
https://twitter.com/haroldogden/status/1085556071891173376
2019-01-16 18:43:28 +01:00
Florian Roth
f759e8b07c
Rule: Suspicious Program Location Process Starts
2019-01-15 15:40:51 +01:00
Thomas Patzke
7622b17415
Moved test rule to final location/naming scheme
2019-01-14 23:58:25 +01:00
Thomas Patzke
2fd88c837d
Added generic sigma rule support to WDATP backend
...
* Process creation rules
2019-01-14 23:54:05 +01:00
Thomas Patzke
4e83bfeb16
Fixed merge bugs
2019-01-14 22:54:26 +01:00
Thomas Patzke
a9cf14438c
Merge branch 'master' into project-1
2019-01-14 22:36:15 +01:00
Thomas Patzke
8336b47530
Merge branch 'master' of https://github.com/Neo23x0/sigma
2019-01-14 22:12:37 +01:00
Thomas Patzke
cc4b806b94
Sigma tools release 0.7.1
2019-01-14 00:26:03 +01:00
Thomas Patzke
5cba0b9946
Merge pull request #223 from m0jtaba/master
...
extending the qradar backend to allow for timeframe query
2019-01-13 23:55:55 +01:00
Thomas Patzke
ed1ee80f2d
Merge pull request #221 from adrienverge/fix/yamllint
...
Fix yamllint config
2019-01-13 23:55:14 +01:00
Thomas Patzke
7634128143
Generate list of converted file in conversion to generic rules
2019-01-13 23:53:11 +01:00
Thomas Patzke
e585858128
Optimization in conversion to generic rules
...
* only create necessary output files in directory output mode
* delete empty detections and empty detection sections
* Merge equal documents
* Merge reduced collections into one YAML document in common case
2019-01-13 23:45:11 +01:00
Florian Roth
9a6b3b5389
Rule: PowerShell script run in AppData folders
2019-01-12 12:03:36 +01:00
Florian Roth
604d88cf1e
Rule: WMI Event Subscription
2019-01-12 12:03:36 +01:00
Florian Roth
63f96d58b4
Rule: Renamed PowerShell.exe
2019-01-12 12:03:36 +01:00
Florian Roth
b7eb79f8da
Rule: UserInitMprLogonScript persistence method
2019-01-12 12:03:36 +01:00
Florian Roth
d4a1fe786a
Rule: Dridex pattern
2019-01-12 12:03:36 +01:00
Mo Amiri
aa37ef2559
extending the qradar backend to allow for timeframe query
2019-01-11 03:33:49 +00:00
Adrien Vergé
44f18db80d
Fix YAML errors reported by yamllint
...
Especially the config for ArcSight, that was invalid:
tools/config/arcsight.yml
89:5 error duplication of key "product" in mapping (key-duplicates)
90:5 error duplication of key "conditions" in mapping (key-duplicates)
rules/windows/builtin/win_susp_commands_recon_activity.yml
10:9 error too many spaces after colon (colons)
2019-01-10 09:51:39 +01:00
Adrien Vergé
b5531be4bf
Really run yamllint (it wasn't checking any rule)
...
Fix the yamllint config in `.yamllint` to "extend" the default rule.
Previously, it didn't extend anything and only disabled a rule, which
means no rule at all were checked.
Also disable some rules in this file, because they report many errors in
the Sigma code base.
In the future, I suggest fixing these errors and re-enabling standard
rules like `trailing-spaces` or `indentation`.
Fixes #220 .
2019-01-10 09:51:33 +01:00
Thomas Patzke
9f56b9e99b
Output all YAML documents if one changed
...
Some Sigma rule collections contain YAML documents that reduce to almost
nothing because they only contain EventID definitions. Previous behavior
would filter the part with the remaining selection.
2019-01-08 23:27:16 +01:00
Thomas Patzke
bf9a567afd
Fixed issues in converter
2019-01-06 23:57:09 +01:00
Thomas Patzke
faeaf1dfef
Added first version of generic sigma rules conversion tool
2019-01-06 23:46:23 +01:00
Florian Roth
0c3b0e25a8
Merge pull request #217 from TareqAlKhatib/private_ips
...
Corrected class B private IP range to prevent false negatives
2019-01-04 12:11:25 +01:00
Tareq AlKhatib
8b94860ee6
Corrected class B private IP range to prevent false negatives
2019-01-04 12:50:41 +03:00
Florian Roth
ee417dd2ea
Merge pull request #216 from TareqAlKhatib/duplicate_outlook
...
Removed Outlook detection which is a subset of the Office one
2019-01-02 22:56:59 +01:00
Tareq AlKhatib
925ffae9b8
Removed Outlook detection which is a subset of the Office one
2019-01-02 07:47:44 +03:00
Florian Roth
55f8993a96
Merge pull request #215 from TareqAlKhatib/ole_vs_rc
...
Fixed the RC section to use rc.exe instead of oleview.exe
2019-01-01 14:01:42 +01:00
Tareq AlKhatib
0a5e79b1e0
Fixed the RC section to use rc.exe instead of oleview.exe
2019-01-01 13:30:26 +03:00
Florian Roth
4e21289bdc
Merge pull request #214 from TareqAlKhatib/reference_vs_references
...
Corrected reference to references as per Sigma's standard
2018-12-28 10:55:30 +01:00
Tareq AlKhatib
f318f328d6
Corrected reference to references as per Sigma's standard
2018-12-25 16:25:12 +03:00
Thomas Patzke
f7e53929fa
Added Python 3.7 to CI testing
2018-12-21 14:17:02 +01:00
Thomas Patzke
73b0c3a25b
Fixed wildcard issue for es-dsl backend
...
Moved field mapping code into mixin shared by es-qs and es-dsl.
2018-12-21 14:10:45 +01:00
Florian Roth
c8c419f205
Rule: Hacktool Rubeus
2018-12-19 09:31:22 +01:00
Thomas Patzke
75c7d65240
Merge pull request #211 from Cyb3rWard0g/master
...
Field-Index Mapping File & SIGMA Rules Field names fix
2018-12-19 00:38:06 +01:00
Thomas Patzke
ffd43823cf
Fixed wildcard issue in es-qs backend and depending
...
See GitHub issue #194 . Fix for es-dsl is pending.
2018-12-19 00:33:12 +01:00
Florian Roth
a7fa20546a
Rule: proxy user agents updated with MacControl user agent
2018-12-17 14:18:03 +01:00
Florian Roth
99f773dcf6
Rule: false positive reduction in rule
2018-12-17 10:02:55 +01:00
Florian Roth
172236e130
Rule: updated ATT&CK tags in MavInject rule
2018-12-12 09:17:58 +01:00
Florian Roth
188d3a83b8
Rule: docs: reference update in MavInject rule
2018-12-12 08:37:00 +01:00
Florian Roth
6206692bce
Merge pull request #212 from Neo23x0/commandline-issue
...
Bugfix: wrong field for 4688 process creation events
2018-12-12 08:24:07 +01:00
Florian Roth
49eb03cda8
Rule: MavInject process injection
2018-12-12 08:18:43 +01:00
Florian Roth
b0cb0abc01
Bugfix: wrong field for 4688 process creation events
2018-12-11 16:10:15 +01:00
Florian Roth
b5d78835b6
Removed overlapping rule with sysmon_office_shell.yml
2018-12-11 13:37:47 +01:00
Roberto Rodriguez
a0486edeea
Field-Index Mapping File & SIGMA Rules Field names fix
...
+ Updated HELK field-index mapping file
+ After going through all the fields with 'fieldlist' output, I found a few rules that fixed.
2018-12-11 09:27:26 +03:00
Thomas Patzke
68866433e8
Merge branch 'juju4-devel-sumo'
2018-12-10 22:37:58 +01:00
Thomas Patzke
4175d0cdd5
Fixed config and added index field
...
* Added index field _index to backend implementation
* Fixed index values in config
2018-12-10 22:37:39 +01:00
Thomas Patzke
b520897176
Added CI testing for SumoLogic backend
2018-12-10 22:36:08 +01:00
Thomas Patzke
4e3f6c366b
Merge pull request #208 from Cyb3rWard0g/master
...
Elastalert-HELK integration Updates
2018-12-10 22:13:37 +01:00
Roberto Rodriguez
93d1d700d4
Merge remote-tracking branch 'upstream/master'
2018-12-10 07:04:30 +03:00
juju4
1f707cb37c
Adding Sumologic backend
2018-12-09 17:55:51 -05:00
Thomas Patzke
2091c90538
Fixed ElastAlert *_key options
...
* Always use .keyword field instead of analyzed one
* Fixed 'null' value if group field was not set
2018-12-09 22:33:23 +01:00
Roberto Rodriguez
9567ce588d
Merge remote-tracking branch 'upstream/master'
2018-12-09 09:27:43 +03:00
Roberto Rodriguez
8c577a329f
Improve Rule & Updated HELK SIGMA Standardization Config
...
Rule should be focusing on the 'process_command_line' field and not just on any value of any event generated by powershell.exe.
SIGMA HELK standardization config updated to match latest HELK Common Information Model
2018-12-08 11:30:21 +03:00
Roberto Rodriguez
a35f945c71
Update win_disable_event_logging.yml
...
Description value breaking SIGMA Elastalert Backend
2018-12-06 05:09:41 +03:00
Florian Roth
2e5a739c6c
fix: fixed author string (cannot be list according to sigma specs)
2018-12-05 11:59:10 +01:00
Florian Roth
9b15b64a9a
fix: fixed author string (cannot be list according to sigma specs)
2018-12-05 11:44:20 +01:00
Thomas Patzke
abc941b57c
Merge pull request #204 from Cyb3rWard0g/master
...
Elastalert Integration Updates to SIGMA Rules
2018-12-05 09:33:40 +01:00
Thomas Patzke
246ad7c59a
Revert "Fixed wildcards in es-qs backend"
...
This reverts commit 49d464f979 .
The partial fix for issue #194 broke the generation of many other rules,
see #203 .
2018-12-05 09:07:07 +01:00
Roberto Rodriguez
87ce07088f
Update sysmon_plugx_susp_exe_locations.yml
...
Duplicate rule title: https://github.com/Neo23x0/sigma/search?q=Executable+used+by+PlugX+in+Uncommon+Location&unscoped_q=Executable+used+by+PlugX+in+Uncommon+Location
This impats Elastalert integration since you cannot have two rules with the same name
2018-12-05 07:58:13 +03:00
Roberto Rodriguez
bff7ec52db
Update av_relevant_files.yml
...
Duplicate rule title: https://github.com/Neo23x0/sigma/search?q=Antivirus+Exploitation+Framework+Detection&unscoped_q=Antivirus+Exploitation+Framework+Detection
This affetcs Elastalert integration
2018-12-05 07:53:53 +03:00
Roberto Rodriguez
104ee6c33b
Update win_susp_commands_recon_activity.yml
...
Rule missing "by CommandLine" which marchs the query_key value of the elastalert format to NULL.
2018-12-05 05:55:36 +03:00
Roberto Rodriguez
328762ed67
Update powershell_xor_commandline.yml
...
Ducplicate names again for https://github.com/Neo23x0/sigma/search?q=Suspicious+Encoded+PowerShell+Command+Line&unscoped_q=Suspicious+Encoded+PowerShell+Command+Line . This brakes elastalert integration since each rule needs to have its own unique name.
2018-12-05 05:51:41 +03:00
Roberto Rodriguez
6dc36c8749
Update win_eventlog_cleared.yml
...
Experimental Rule is a duplicate of https://github.com/Neo23x0/sigma/blob/bfc7012043317632265a897c8a4901f266cda992/rules/windows/builtin/win_susp_eventlog_cleared.yml . I renamed it experimental just in case. I believe one of them should be removed. I caught it while transforming every rule to elastalert format
2018-12-05 05:40:00 +03:00
Roberto Rodriguez
c8990962d2
Update win_rare_service_installs.yml
...
same count() by ServiceFileName < 5 aded to make sigmac work with elastalert integration
2018-12-05 05:33:56 +03:00
Roberto Rodriguez
f0b23af10d
Update win_rare_schtasks_creations.yml
...
Count(taskName) not being taken by elastalert integration with Sigmac
2018-12-05 05:10:08 +03:00
Thomas Patzke
f9d9d653dc
Merge pull request #199 from sisecbe/patch-1
...
Distinct count in aggragation function
2018-12-04 23:42:16 +01:00
Thomas Patzke
3288f6425b
Merge branch 'SherifEldeeb-master'
2018-12-04 23:38:02 +01:00
Thomas Patzke
900db72557
Merge branch 'master' of https://github.com/SherifEldeeb/sigma into SherifEldeeb-master
2018-12-04 23:35:23 +01:00
Florian Roth
3861dd5912
Rule: APT29 campaign against US think tanks
...
https://cloudblogs.microsoft.com/microsoftsecure/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/
2018-12-04 17:04:03 +01:00
Florian Roth
2bf0170956
Merge pull request #202 from tuckner/master
...
Fixed backslash escape
2018-12-03 22:22:53 +01:00
tuckner
2c5c92ab0a
fixed backslash escape
2018-12-03 15:09:29 -06:00
Florian Roth
a805d18bba
Merge pull request #198 from kpolley/consistent_filetype
...
changed .yaml files to .yml for consistency
2018-12-03 09:00:14 +01:00
Florian Roth
7e05b2546a
Merge pull request #201 from 41thexplorer/master
...
Adding new rules detecting recently active APTs
2018-12-03 08:59:46 +01:00
AL
9f1df6164b
adding new rules detecting recently active APTs
2018-12-03 09:42:29 +02:00
Florian Roth
2ebbdebe46
rule: Cobalt Strike beacon detection via Remote Threat Creation
...
https://medium.com/@olafhartong/cobalt-strike-remote-threads-detection-206372d11d0f
2018-11-30 10:25:05 +01:00
Thomas Patzke
e502550d76
Merge branch 'lsoumille-master'
2018-11-29 00:03:12 +01:00
Thomas Patzke
f6ad36f530
Fixed rule
2018-11-29 00:00:18 +01:00
Thomas Patzke
1118b80288
Added elastalert backend to CI testing
2018-11-29 00:00:00 +01:00
Thomas Patzke
0a5caae5df
Merge branch 'master' of https://github.com/lsoumille/sigma into lsoumille-master
2018-11-28 23:53:15 +01:00
Florian Roth
99e0a4defb
fix: SPARK config duplicate identifier
2018-11-27 14:05:13 +01:00
lsoumille
50c74b94bc
add elastalert backend support
2018-11-23 20:39:15 +01:00
sisecbe
c848c473a3
Error when empty fields attribute
2018-11-23 15:37:42 +01:00
sisecbe
31eae25756
Indentation error
2018-11-23 15:20:17 +01:00
sisecbe
e43909678e
Added the fields attribute parser
...
Make a table with the fields present in the fields attribute
2018-11-23 15:11:12 +01:00
sisecbe
c2eb87133d
Distinct count in aggragation function
...
Added dc() instead of count() when group-by field is present. Because count() doesn't do a distinct count in Splunk. Must be the dc() function instead.
2018-11-23 15:04:08 +01:00
Florian Roth
7ba1fe4309
Turla PNG Dropper Service Name
2018-11-23 08:46:20 +01:00
Florian Roth
e7762c71ce
Merge remote-tracking branch 'origin/master'
2018-11-22 19:14:12 +01:00
Florian Roth
ec83ab5e13
APT28 Zebrocy rule
...
https://app.any.run/tasks/54acca9a-394e-4384-a0c8-91a96d36c81d
2018-11-22 19:14:07 +01:00
Thomas Patzke
aa1a953a65
Moved node dumping code to generic location
2018-11-21 23:22:38 +01:00
Thomas Patzke
26d888aec3
Removed "not null" handling code
...
Feature was removed some time ago.
2018-11-21 22:56:48 +01:00
Thomas Patzke
a1940c6eaa
Simplified rule
2018-11-21 22:34:04 +01:00
Thomas Patzke
9e28669c33
Backend es-qs return quotes on empty or whitespace-only string
2018-11-21 22:29:12 +01:00
Kyle Polley
60538e2e12
changed .yaml files to .yml for consistency
2018-11-20 21:07:36 -08:00
Thomas Patzke
49d464f979
Fixed wildcards in es-qs backend
2018-11-20 23:23:54 +01:00
Florian Roth
a31acd6571
fix: fixed procdump rule
2018-11-17 09:10:26 +01:00
Florian Roth
fd06cde641
Rule: Detect base64 encoded PowerShell shellcode
...
https://twitter.com/cyb3rops/status/1063072865992523776
2018-11-17 09:10:09 +01:00
Sherif Eldeeb
23eddafb39
Replace "logsource: description" with "definition" to match the specs
2018-11-15 09:00:06 +03:00
Sherif Eldeeb
cd5950749e
revert to upstream
2018-11-15 08:45:25 +03:00
Sherif Eldeeb
742192b452
Merge pull request #4 from Neo23x0/master
...
fetch updates from upstream
2018-11-15 08:32:33 +03:00
Florian Roth
b92c032c2d
Linux JexBoss back connect shell
2018-11-08 23:21:36 +01:00
Florian Roth
fc7a750f0f
Added RSA NetWitness to the supported targets
2018-11-07 22:56:51 +01:00
Thomas Patzke
102b56dfe3
Merge branch 'tuckner-master'
2018-11-07 22:53:15 +01:00
Thomas Patzke
396a030ed1
Removed duplicate code
2018-11-07 22:52:12 +01:00
Thomas Patzke
6b8ddd6ac0
Added CI test for NetWitness backend
2018-11-07 22:36:34 +01:00
Thomas Patzke
116a0e9f03
Merge branch 'master' of https://github.com/tuckner/sigma into tuckner-master
2018-11-07 22:27:41 +01:00
Thomas Patzke
fe79be894b
Merge branch 'master' of https://github.com/Neo23x0/sigma
2018-11-07 14:01:21 +01:00
Thomas Patzke
5053cc4e95
Fixed optimizing of not conditions with subexpressions
...
Optimization pass traversal is cut at ConditionNOT nodes.
2018-11-07 13:54:45 +01:00
Thomas Patzke
a88b1e81ec
Optimizer debugging code cleanup
...
* Removed commented debugging code
* Output to stdin
* Coverage exception for _dumpNode
2018-11-07 13:49:08 +01:00
Florian Roth
0ee515db47
Merge pull request #192 from neu5ron/patch-2
...
Update win_alert_ad_user_backdoors.yml
2018-11-07 08:34:16 +01:00
Nate Guagenti
9bfdcba400
Update win_alert_ad_user_backdoors.yml
...
add another detection rule for delegation via the attack described in harmj0y's blog:
https://www.harmj0y.net/blog/redteaming/another-word-on-delegation/
2018-11-05 21:08:19 -05:00
Thomas Patzke
42ed8acec9
Improved test coverage
...
* Adding tests
* Removal of coverage measurement for debugging code
2018-11-04 23:28:40 +01:00
Thomas Patzke
418f8d10a3
Wrap conditions generated by mappings into sub-expression
2018-11-04 23:00:04 +01:00
Thomas Patzke
0e4842962b
Added tests
2018-11-04 22:16:20 +01:00
tuckner
bd5b823725
Removed specific NetWintess config from test
2018-10-31 14:32:13 -05:00
tuckner
ca6ba4a85b
Added NetWitness backend and tests
2018-10-31 14:24:14 -05:00
tuckner
26f73d60fa
Added NetWitness backend and tests
2018-10-31 14:07:59 -05:00
Florian Roth
37294d023f
Suspicious svchost.exe executions
2018-10-30 09:37:40 +01:00
Florian Roth
580692aab4
Improved procdump on lsass rule
2018-10-30 09:37:40 +01:00
Thomas Patzke
eacfaa7460
Check for forbidden null values in list items in Splunk backend
2018-10-27 01:07:03 +02:00
Thomas Patzke
423a73efd5
Dropped .py suffix
2018-10-22 23:02:05 +02:00
Thomas Patzke
1b1f22c5c2
Added sigma2misp to README
2018-10-22 23:02:05 +02:00
Thomas Patzke
b2d6d73034
Added requirements
2018-10-22 22:43:59 +02:00
Thomas Patzke
16e3838a90
Renamed script
2018-10-19 21:23:33 +02:00
Thomas Patzke
6b14930302
Recursive path traversal
2018-10-19 21:21:33 +02:00
Thomas Patzke
67b416379f
Improved import of multiple rules
2018-10-19 19:53:00 +02:00
Thomas Patzke
60b6f5d50a
Merge branch 'samsson-patch-9'
2018-10-18 16:21:11 +02:00
Thomas Patzke
ff98991c80
Fixed rule
2018-10-18 16:20:51 +02:00
Thomas Patzke
a2da73053d
Merge branch 'patch-9' of https://github.com/samsson/sigma into samsson-patch-9
2018-10-18 16:16:57 +02:00
Thomas Patzke
96d6d520b7
Merge branch 'pivotforensics-master'
2018-10-18 16:14:53 +02:00
Thomas Patzke
0fd8b986fd
Added CI tests
2018-10-18 16:14:16 +02:00
Thomas Patzke
0cc8b77307
Merge branch 'master' of https://github.com/pivotforensics/sigma into pivotforensics-master
2018-10-18 15:56:26 +02:00
Thomas Patzke
732de3458f
Merge pull request #186 from megan201296/patch-15
...
Update sysmon_cmstp_com_object_access.yml
2018-10-18 15:49:06 +02:00
Thomas Patzke
fdd0823e07
Merge pull request #187 from megan201296/patch-16
...
Additional MITRE ATT&CK Tagging
2018-10-18 15:38:11 +02:00
Thomas Patzke
60765d903a
Merge branch 'ntim-master'
2018-10-18 15:34:34 +02:00
Thomas Patzke
5609728a8a
included XPack Watcher JSON output in CI tests
2018-10-18 14:56:21 +02:00
ntim
e501c4a5b9
Added additional output type 'json' to the xpack-watcher backend which prints each watcher as compress json, one watcher per line
2018-10-17 10:38:56 +02:00
Thomas Patzke
44ff9d154e
Increased test coverage for mapping corner cases
2018-10-16 14:53:12 +02:00
Thomas Patzke
265ce115a0
Fixed conditional field mapping usage in mapping chains
2018-10-16 13:57:51 +02:00
Thomas Patzke
a61b3d352a
Added test cases
...
* Generic log sources
* Splunk index queries
2018-10-15 15:24:18 +02:00
Michael H
5b33713ef8
Quick fix for string formatting bug
2018-10-13 20:21:37 -05:00
Michael H
38ec257f7e
Re-doing LogName formatting
2018-10-13 20:18:57 -05:00
Michael H
9f48265eb1
Adding re.sub for LogName that accounts for expression grouping
2018-10-13 20:09:54 -05:00
Michael H
7e184f01c6
Removing invalid fieldmapping
2018-10-13 19:53:39 -05:00
Michael H
ab2ebae6b0
Merge branch 'master' of https://github.com/Neo23x0/sigma
2018-10-13 19:41:18 -05:00
Florian Roth
3c3b14a26b
rule: new malware UA
2018-10-10 15:27:58 +02:00
Florian Roth
fd34437575
fix: fixed date in rule
2018-10-10 15:27:58 +02:00
megan201296
fdd264d946
Update sysmon_susp_powershell_rundll32.yml
2018-10-09 19:11:47 -05:00
megan201296
440b0ddffe
Update sysmon_susp_powershell_parent_combo.yml
2018-10-09 19:11:17 -05:00
megan201296
b0983047eb
Update sysmon_powersploit_schtasks.yml
2018-10-09 19:10:37 -05:00
megan201296
2f533c54b3
Update sysmon_powershell_network_connection.yml
2018-10-09 19:10:17 -05:00
megan201296
1b92a158b5
Add MITRE ATT&CK Tagging
2018-10-09 19:09:19 -05:00
megan201296
ffbb968fcd
Update sysmon_cmstp_com_object_access.yml
...
Edit tule logic for `and` instead of `or
2018-10-09 19:03:30 -05:00
Florian Roth
182781229c
Merge pull request #184 from megan201296/patch-14
...
Remove duplicate value
2018-10-09 09:37:54 +02:00
megan201296
7997cb3001
Remove duplicate value
2018-10-08 13:00:59 -05:00
Michael H
bbb67fbba4
Adding support for reading sigma rule from stdin in sigmac
2018-10-07 10:11:47 -05:00
Michael H
aabaa0257b
Merge branch 'master' of https://github.com/Neo23x0/sigma
2018-10-06 20:12:15 -05:00
Michael H
4b85a34b34
Added CSV option to powershell backend
2018-10-06 20:08:20 -05:00
Thomas Patzke
e28bc35cad
Apply field mappings in generation of log source condition
2018-10-06 23:38:35 +02:00
Florian Roth
54678fcb36
Rule: CertUtil UA
...
https://twitter.com/ItsReallyNick/status/1047151134501216258
2018-10-06 16:47:37 +02:00
Thomas Patzke
4eeb07a736
Merge pull request #181 from droe/optimizer-comments
...
Improve the comments on the optimizer
2018-10-03 23:11:10 +02:00
Daniel Roethlisberger
fc45df144c
Improve the comments on the optimizer
2018-10-03 13:44:03 +02:00
Thomas Patzke
143f8644c6
Merge pull request #180 from droe/refactor-optimizer
...
Move optimizer to sigma.parser.condition to enable it for all backends
2018-10-03 00:34:14 +02:00
Daniel Roethlisberger
87aa1b5521
Move optimizer to sigma.parser.condition to enable it for all backends
2018-10-03 00:24:31 +02:00
Thomas Patzke
2ac19d32a1
Merge pull request #178 from droe/ast_optimizer
...
Optimize the boolean expressions in the AST before generating output
2018-10-02 23:06:55 +02:00
Daniel Roethlisberger
cd3661b60c
Fix optimization of NOT corner cases
2018-10-02 22:48:33 +02:00
Thomas Patzke
14c5dcf413
Merge pull request #179 from droe/tempfile-mktemp
...
Use mktemp if tempfile is not available, fixes `make` for macOS
2018-10-02 22:44:48 +02:00
Daniel Roethlisberger
85ad10d558
Use mktemp if tempfile is not available, fixes make for macOS
2018-10-02 22:17:03 +02:00
Daniel Roethlisberger
bed88cf813
Make uniq work for lists within definitions
2018-10-02 22:12:54 +02:00
Daniel Roethlisberger
7165128fa5
Remove None from AST - fixes None-related test failures
2018-10-02 21:44:37 +02:00
Daniel Roethlisberger
2242fc5ac8
Optimize the boolean expressions in the AST before generating output
...
Add code optimizing the boolean expressions in the abstract syntax tree
before generating output using the backend.
The main idea behind optimizing the AST is that less repeated terms is
generally better for backend performance. This is especially relevant
to backends that do not perform any query language optimization down
the road, such as those that generate code.
The following optimizations are currently performed:
- Removal of empty OR(), AND()
- OR(X), AND(X) => X
- OR(X, X, ...), AND(X, X, ...) => OR(X, ...), AND(X, ...)
- OR(X, OR(Y)) => OR(X, Y)
- OR(AND(X, ...), AND(X, ...)) => AND(X, OR(AND(...), AND(...)))
- NOT(NOT(X)) => X
A common example for when these suboptimal rules actually occur in
practice is when a rule has multiple alternative detections that are
OR'ed together in the condition, and all of the detections include a
common element, such as the same EventID.
This implementation is not optimized for performance and will perform
poorly on very large expressions.
2018-10-02 21:14:25 +02:00
Florian Roth
85f0ddd188
Delete win_alert_LSASS_access.yml
2018-10-02 16:48:09 +02:00
Florian Roth
19e2bad96e
Delete sysmon_powershell_DLL_execution.yml
2018-10-02 08:56:09 +02:00
Florian Roth
daddec9217
Delete sysmon_powershell_AMSI_bypass.yml
2018-10-02 08:55:48 +02:00
Florian Roth
aafe9c6dae
Delete sysmon_lethalHTA.yml
2018-10-02 08:55:19 +02:00
Florian Roth
f29ffc0697
Merge pull request #174 from esebese/patch-1
...
sysmon_susp_run_key_img_folder.yml - Rule simplification
2018-10-01 14:24:54 +02:00
Florian Roth
bbddcd0f9a
Merge pull request #176 from Karneades/fix-missing-list-handling
...
Add missing event id list handling in PowerShell backend
2018-10-01 14:23:48 +02:00
Karneades
468af42de5
Add missing event id list handling in PowerShell backend
2018-09-29 14:43:28 +02:00
Florian Roth
f2d83a5a00
Merge pull request #175 from Karneades/fix-powershell-backend
...
Improve default field handling in PowerShell backend
2018-09-29 14:08:30 +02:00
Karneades
c289484c5c
Improve default field handling in PowerShell backend
2018-09-29 12:29:44 +02:00
Ensar Şamil
dec7568d4c
Rule simplification
...
Two selection fields are reduced to one. HKCU and HKLM registry value changes are considered, thus wildcards are added. No change at details.
2018-09-28 10:58:50 +03:00
Florian Roth
1c2431f33b
Merge pull request #169 from Karneades/fix-aggregation-exeption
...
Add rule filename to "not implemented" exception output
2018-09-26 11:50:25 +02:00
Florian Roth
451c18628d
Merge pull request #170 from Karneades/fix-suspicious-cli
...
Add group by to windows multiple suspicious cli rule
2018-09-26 11:49:57 +02:00
Florian Roth
38d17e5169
Merge pull request #173 from b2az/patch-1
...
Missing Character
2018-09-26 11:49:17 +02:00
Florian Roth
a2c6f344ba
Lower case T
2018-09-26 11:44:12 +02:00
Braz
f35308a4d3
Missing Character
...
Parsed the MITRE ATT&CK informations from the rules. My script crashed because the identifier "T" was missing.
Thanks for your work Flo & Tom!
2018-09-26 11:40:24 +02:00
Florian Roth
815236449b
Added PowerShell as target, updated project list
2018-09-24 13:44:14 +02:00
Florian Roth
d0a527af5e
Merge pull request #172 from Karneades/powershell-backend
...
Add initial version of the PowerShell backend
2018-09-24 13:30:24 +02:00
Florian Roth
14337a2aac
Tests: PowerShell backend tests
2018-09-24 13:23:38 +02:00
Florian Roth
2766d8f881
Merge pull request #171 from Karneades/fix-certutil
...
Fix CommandLine in rule sysmon_susp_certutil_command
2018-09-24 07:51:07 +02:00
Karneades
c66b00356d
Add initial version of PowerShell backend
...
* Add PowerShell backend
* Add PowerShell config file
State: Work in progress :)
See https://github.com/Neo23x0/sigma/issues/94
2018-09-23 21:41:48 +02:00
Florian Roth
edf8dde958
Include cases in which certutil.exe is used
2018-09-23 20:57:34 +02:00
Karneades
c73a9e4164
Fix CommandLine in rule sysmon/sysmon_susp_certutil_command
...
Below is an example of a test - the command line does not
include the path nor the .exe. I think this comes from the
initial detection on the Image path and the later switch to
command line.
We could also use both the Image path and the Command Line.
Message : Process Create:
Image: C:\Windows\SysWOW64\certutil.exe
CommandLine: certutil xx -decode xxx
Hashes: SHA1=8186D64DD28CD63CA883B1D3CE5F07AEABAD67C0
ParentImage: C:\Windows\System32\cmd.exe
ParentCommandLine: "C:\Windows\system32\cmd.exe"
2018-09-23 20:28:56 +02:00
Karneades
cc82207882
Add group by to win multiple suspicious cli rule
...
* For the detection it's important that these cli
tools are started on the same machine for alerting.
2018-09-23 19:38:23 +02:00
Karneades
fe6f4c7475
Add rule filename to exception output for unsupported aggregation
2018-09-23 19:12:50 +02:00
Thomas Patzke
81515b530c
ATT&CK tagging QA
2018-09-20 12:44:44 +02:00
Thomas Patzke
1d12fc290c
Added Winlogbeat configuration
2018-09-20 12:08:11 +02:00
Thomas Patzke
2fbf17ff34
Addition and resolution of field mapping chains explicitely checks for list
2018-09-13 16:22:29 +02:00
Thomas Patzke
41a8ef2fd9
Implemented resolve_fieldname in FieldMappingChain
2018-09-13 14:56:31 +02:00
Thomas Patzke
2330306db1
Added merged field mapping and log sources dict to config chain
2018-09-13 14:55:05 +02:00
Thomas Patzke
ba76f04fe6
Merging of raw configurations in configuration chains
2018-09-13 13:49:36 +02:00
Thomas Patzke
d81946df39
Stacked configurations
...
- Added log source rewriting
- Removed log source merging condition type setting
- Simplified SigmaLogsourceConfiguration constructor
- Condition is generated in SigmaParser instead of SigmaLogsourceConfiguration
Missing:
- Merging of raw config dict for backends that rely on this (es-dsl)
2018-09-12 23:40:22 +02:00
Thomas Patzke
210f7ac044
Rewrote logsource definition merging to set generator
2018-09-12 22:29:51 +02:00
Florian Roth
13276ecf31
Rule: AV alerts - webshells
2018-09-09 11:04:27 +02:00
Florian Roth
e5c7dd18de
Rule: AV alerts - relevant files
2018-09-09 11:04:27 +02:00
Florian Roth
7311d727ba
Rule: AV alerts - password dumper
2018-09-09 11:04:27 +02:00
Florian Roth
84b8eb5154
Rule: AV alerts - exploiting frameworks
2018-09-09 11:04:27 +02:00
Florian Roth
82916f0cff
Merge pull request #159 from t0x1c-1/t0x1c-devel
...
Suspicious SYSVOL Domain Group Policy Access
2018-09-08 15:56:54 +02:00
Florian Roth
1294af4a71
Merge pull request #166 from yt0ng/master
...
Malleable Amazon Profile
2018-09-08 15:56:22 +02:00
yt0ng
48254f7a7e
Merge pull request #1 from yt0ng/apt/rules
...
Malleable Amazon Profile
2018-09-08 11:54:29 +02:00
Florian Roth
6f5a73b2e2
style: renamed rule files to all lower case
2018-09-08 10:27:19 +02:00
Florian Roth
68896d9294
style: renamed rule files to all lower case
2018-09-08 10:25:20 +02:00
Florian Roth
788678feb8
Merge pull request #165 from JohnLaTwC/patch-1
...
Create win_susp_powershell_hidden_b64_cmd.yml
2018-09-08 10:23:05 +02:00
Florian Roth
5d714ab44e
Rule: Added malware UA
2018-09-08 10:22:26 +02:00
Florian Roth
d0f2fbb6d6
Merge pull request #161 from megan201296/patch-12
...
Fix typo
2018-09-08 10:21:20 +02:00
Florian Roth
3f444b5fc2
Merge pull request #162 from megan201296/patch-13
...
Added .yml extension and fix typo
2018-09-08 10:21:00 +02:00
Florian Roth
69e65c0bdc
Merge pull request #164 from yt0ng/apt/rules
...
Adding CMStar user-agent "O/9.27 (W; U; Z)"
2018-09-08 10:19:41 +02:00
Unknown
7a74e86819
Merge remote-tracking branch 'origin/apt/rules' into apt/rules
2018-09-08 09:35:57 +02:00
Unknown
863736587c
Adding ATTCK
2018-09-08 09:34:27 +02:00
Unknown
4bb01a8c24
ATTCK Tags
2018-09-08 09:29:54 +02:00
John Lambert
7ce5b3515b
Create win_susp_powershell_hidden_b64_cmd.yml
...
Look in process creation events for powershell commands with base64 encoded content containing suspicious keywords. Require hidden flag to reduce FP.
2018-09-07 20:23:11 -07:00
Unknown
d866097c07
CobaltStrike Malleable Amazon browsing traffic profile
2018-09-07 19:52:35 +02:00
Unknown
cf48a77d5a
Adding CMStar user-agent "O/9.27 (W; U; Z)"
2018-09-07 09:07:24 +02:00
megan201296
3154be82f3
Added .yml extension and fix typo
2018-09-06 20:28:22 -05:00
megan201296
525326d15f
Fix typo
2018-09-06 20:20:11 -05:00
Thomas Patzke
13e41f29d6
Added CI test for tag filtering
2018-09-06 01:05:31 +02:00
Thomas Patzke
f3c60a6309
Added tag filtering to sigmac
2018-09-06 00:57:54 +02:00
Thomas Patzke
7f875af1ca
Fixed WDATP backend
...
It never generated any output due to missing return in generate()
method.
2018-09-06 00:31:40 +02:00
Florian Roth
ec1bd77f2e
Rule: Proxy UA rule update - from Kaspersky report
...
https://securelist.com/attacks-on-industrial-enterprises-using-rms-and-teamviewer/87104/
2018-09-05 20:39:19 +02:00
Lurkkeli
30fc4bd030
powershell xor commandline
...
New rule to detect -bxor usage in a powershell commandline.
2018-09-05 09:21:15 +02:00
Florian Roth
49f7da6412
style: changed title casing and minor fixes
2018-09-04 16:15:41 +02:00
Florian Roth
3c240be8a8
fix: more duplicate 'tag' keys in rules
2018-09-04 16:15:02 +02:00
Florian Roth
9c878bef79
fix: duplicate 'tag' key in rule
2018-09-04 16:05:21 +02:00
t0x1c-1
afadda8c04
Suspicious SYSVOL Domain Group Policy Access
2018-09-04 15:52:25 +02:00
Florian Roth
d94c1d2046
fix: duplicate 'tag' key in rule
2018-09-04 14:56:55 +02:00
Florian Roth
1c87f77223
Rule: Fixed false positive in suspicious UA rule
2018-09-04 11:33:05 +02:00
Florian Roth
9cb78558d3
Rule: excluded false positives in rule
2018-09-03 12:02:42 +02:00
Florian Roth
b57f3ded64
Rule: GRR false positives
2018-09-03 11:50:34 +02:00
Florian Roth
2a0fcf6bea
Rule: PowerShell encoded command JAB
2018-09-03 10:08:29 +02:00
Florian Roth
7a3890ad76
Rule: SysInternals EULA accept improved and renamed
2018-08-30 13:16:28 +02:00
Florian Roth
d83f124f5f
Rule: Suspicious communication endpoints
2018-08-30 10:12:12 +02:00
Florian Roth
e70395744b
Rule: Improved Github communication rule
2018-08-30 10:12:12 +02:00
Thomas Patzke
d17cc5c07d
Merge pull request #157 from yt0ng/development
...
Added Detection of Sysinternals Tools via eulaaccepted registry key
2018-08-28 22:37:00 +02:00
Unknown
75d72344ca
Added Detection of Sysinternals Tools via eulaaccepted registry key
2018-08-28 17:36:22 +02:00
Thomas Patzke
a722fcd2b0
Merge pull request #156 from yt0ng/yt0ng-devel
...
Adding LSASS Access Detected via Attack Surface Reduction
2018-08-27 23:50:42 +02:00
Thomas Patzke
ee15b451b4
Fixed log source name
2018-08-27 23:45:30 +02:00
Thomas Patzke
f2fd3b9443
Merge branch 'master' of https://github.com/Neo23x0/sigma
2018-08-27 23:41:41 +02:00
Thomas Patzke
6e7208553a
Revert "removing for new pull request"
...
This reverts commit ca7e8d6468 .
2018-08-27 23:39:29 +02:00
Unknown
2f256aa1ef
Adding LSASS Access Detected via Attack Surface Reduction
2018-08-27 10:38:45 +02:00
Thomas Patzke
1d7722c1cb
Added configuration and field mapping chains
...
Missing: field name mapping of log source conditions.
2018-08-27 00:17:27 +02:00
Thomas Patzke
8308cd6c1a
Rule fix
2018-08-26 22:35:35 +02:00
Thomas Patzke
87e39b8768
Fixed rules
2018-08-26 22:30:47 +02:00
Thomas Patzke
60a5922582
Merge branch 'master' of https://github.com/yt0ng/sigma into yt0ng-master
2018-08-26 22:12:19 +02:00
Florian Roth
5b3175d1d6
Rule: Suspicious procdump use on lsass process
2018-08-26 19:53:57 +02:00
yt0ng
df9f6688eb
Added Deskop Location, RunOnce and ATTCK
...
Added C:\Users\tst01\Desktop\unprotected.vbs as seen by FIN7
2018-08-25 17:32:34 +02:00
yt0ng
eda6f3b9ca
rules/windows/sysmon/sysmon_powershell_DLL_execution.yml
2018-08-25 16:33:54 +02:00
Florian Roth
6bde2cd08f
Update lnx_buffer_overflows.yml
2018-08-25 00:20:34 +02:00
Florian Roth
234a48af19
rule: Linux SSHD exploit CVE-2018-15473
...
https://github.com/Rhynorater/CVE-2018-15473-Exploit
2018-08-24 16:40:41 +02:00
yt0ng
c7d4b4853d
removing sysmon_powershell_AMSI_bypass.yml
2018-08-23 10:17:19 +02:00
Florian Roth
f47a5c2206
fix: Author list to string
2018-08-23 09:40:28 +02:00
Thomas Patzke
49af499353
Merge pull request #151 from nikseetharaman/workflow_compiler
...
Add Microsoft Workflow Compiler Sysmon Detection
2018-08-23 08:24:35 +02:00
Thomas Patzke
9235175e26
Fixed rule
...
* Added condition
* Replaced Description wirh Image attribute and improved search pattern
2018-08-23 08:20:28 +02:00
Thomas Patzke
96cedc31f9
Merge pull request #152 from james0d0a/master
...
Qradar backend: added aggregation and AQL database flow support
2018-08-23 08:14:56 +02:00
Thomas Patzke
73535e58a5
Merge pull request #153 from megan201296/patch-10
...
Add ATT&CK Matrix tags
2018-08-23 08:06:58 +02:00
Thomas Patzke
d647a7de07
Merge pull request #154 from megan201296/patch-11
...
Add MITRE ATT&CK tagging
2018-08-23 08:06:39 +02:00
Florian Roth
5de3cd71a4
Merge pull request #149 from yt0ng/development
...
Detects Request to amsiInitFailed that can be used to disable AMSI Scanning
2018-08-22 17:19:10 +02:00
Florian Roth
040ba0338d
fix: Added Event ID in second selection
2018-08-22 17:03:13 +02:00
Florian Roth
0c729d1eea
Already used in different rule
2018-08-22 17:02:03 +02:00
Florian Roth
6ee31f6cd1
Update win_susp_commands_recon_activity.yml
...
Merged recon commands from @yt0ng's rule
2018-08-22 17:00:00 +02:00
megan201296
3f5c32c6da
Add MITRE ATT&CK tagging
2018-08-22 09:35:06 -05:00
megan201296
76aabe7e05
Add ATT&CK Matrix tags
2018-08-22 09:30:55 -05:00
James Dickenson
29bed766dd
removed re-introduced output class from qradar backend. fixed list handling error.
2018-08-21 22:45:12 -07:00
James Dickenson
468f040c0a
Merge branch 'qradar-dev'
2018-08-20 21:54:30 -07:00
Nik Seetharaman
e371d945ed
Add Microsoft Workflow Compiler Sysmon Detection
2018-08-18 00:53:28 -05:00
yt0ng
ca7e8d6468
removing for new pull request
2018-08-17 18:42:10 +02:00
yt0ng
5bb6f566ba
::Merge remote-tracking branch 'upstream/master'
2018-08-17 18:39:36 +02:00
yt0ng
8ecf167e85
Powershell AMSI Bypass via .NET Reflection
...
[Ref].Assembly.GetType('http://System.Management .Automation.AmsiUtils').GetField('amsiInitFailed','NonPublic,Static').SetValue($null,$true)
seen in recent activity https://www.hybrid-analysis.com/sample/0ced17419e01663a0cd836c9c2eb925e3031ffb5b18ccf35f4dea5d586d0203e?environmentId=120
2018-08-17 18:26:04 +02:00
James Dickenson
9a61f40cef
added support flor flow data in qradar backend
2018-08-16 21:44:17 -07:00
yt0ng
07e411fe6b
Oilrig Information gathering
...
whoami & hostname & ipconfig /all & net user /domain 2>&1 & net group /domain 2>&1 & net group "domain admins" /domain 2>&1 & net group "Exchange Trusted Subsystem" /domain 2>&1 & net accounts /domain 2>&1 & net user 2>&1 & net localgroup administrators 2>&1 & netstat -an 2>&1 & tasklist 2>&1 & sc query 2>&1 & systeminfo 2>&1 & reg query "HKEY_CURRENT_USER\Software\Microsoft\Terminal Server Client\Default" 2>&1
2018-08-15 14:29:59 +02:00
Florian Roth
4e91462838
fix: Bugfix in Adwind rule
2018-08-15 12:33:03 +02:00
Florian Roth
92dc08a304
rule: Added recon command
2018-08-15 12:33:03 +02:00
Florian Roth
7c05b85bcd
rule: Added malware UA
2018-08-15 12:33:03 +02:00
Thomas Patzke
320bb9f8c4
Added rewrite config to generic sysmon configuration
2018-08-14 21:34:54 +02:00
Thomas Patzke
430972231f
Added generic sysmon configuration with process_execution config
2018-08-14 21:34:54 +02:00
Thomas Patzke
2715c44173
Converted first Sysmon rule to generic process_execution rule
2018-08-14 21:34:54 +02:00
James Dickenson
a8d1831382
Added aggregation support for qradar backend
2018-08-13 23:04:10 -07:00
Thomas Patzke
dce4b4825d
Fixed aggregations without field name
...
Generated query contained field name "None".
2018-08-10 15:07:07 +02:00
Thomas Patzke
2c0e76be3d
Escaped * where required
2018-08-10 13:53:08 +02:00
Thomas Patzke
e0b3f91b2a
Removed empty line
2018-08-08 23:15:13 +02:00
Thomas Patzke
5b02695b13
Merge pull request #146 from samsson/patch-8
...
Hiding files with attrib.exe sysmon rule
2018-08-08 22:57:30 +02:00
Lurkkeli
7cdc13ef11
Update
2018-08-08 17:05:51 +02:00
Lurkkeli
392351af25
Adding ATT&CK tag
2018-08-08 16:43:54 +02:00
Lurkkeli
4d721f1803
Updating fps
2018-08-08 16:42:26 +02:00
Lurkkeli
b9f433414d
hiding files with attrib.exe
2018-08-08 16:19:39 +02:00
Thomas Patzke
01215a645e
Merge pull request #145 from yt0ng/master
...
DNS TXT Answer with possible execution strings
2018-08-08 15:58:34 +02:00
Thomas Patzke
58afccb2f3
Fixed ATT&CK tagging
2018-08-08 15:58:19 +02:00
yt0ng
e44b4f450e
DNS TXT Answer with possible execution strings
...
https://twitter.com/stvemillertime/status/1024707932447854592
2018-08-08 15:51:56 +02:00
Thomas Patzke
92c0e0321a
Merge pull request #144 from samsson/patch-7
...
Added att&ck tags
2018-08-07 11:19:36 +02:00
Lurkkeli
a245820519
added att&ck tag
2018-08-07 08:54:53 +02:00
Lurkkeli
294677a2cc
added att&ck tag
2018-08-07 08:50:01 +02:00
Lurkkeli
a57e87b345
added att&ck tag
2018-08-07 08:49:05 +02:00
Lurkkeli
99253763af
added att&ck tag
2018-08-07 08:45:58 +02:00
Lurkkeli
0bff27ec21
added att&ck tactic
...
added att&ck tactic, no specific techniques applicable
2018-08-07 08:37:51 +02:00
Lurkkeli
198cb63182
added att&ck tactic
...
added att&ck tactic, no specific techniques applicable
2018-08-07 08:36:53 +02:00
Thomas Patzke
518e21fcd2
Merge pull request #134 from nikseetharaman/sysmon_cmstp_com_object_access
...
Add CMSTP UAC Bypass via COM Object Access
2018-08-07 08:33:33 +02:00
Thomas Patzke
b9fdf07926
Extended tagging
2018-08-07 08:33:18 +02:00
Lurkkeli
b50c13dd1f
Update att&ck tag
2018-08-07 08:27:24 +02:00
Thomas Patzke
5d5d42eb9b
Merge pull request #140 from yt0ng/master
...
Possible Shim Database Persistence via sdbinst.exe
2018-08-07 08:22:32 +02:00
Thomas Patzke
80eaedab8b
Fixed tag and date
2018-08-07 08:22:11 +02:00
Thomas Patzke
3509fbd201
Merge pull request #142 from samsson/patch-5
...
Added ATT&CK tag
2018-08-07 08:20:22 +02:00
Thomas Patzke
b049210641
Fixed tags
2018-08-07 08:20:09 +02:00
Lurkkeli
3456f9a74d
Update sysmon_susp_wmi_execution.yml
2018-08-07 08:19:58 +02:00
Thomas Patzke
b9d0e3172f
Merge pull request #143 from samsson/patch-6
...
Added ATT&CK tag
2018-08-07 08:19:01 +02:00
Thomas Patzke
64fa3b162d
Tag fixes
2018-08-07 08:18:16 +02:00
Lurkkeli
6472be5e19
Update sysmon_uac_bypass_sdclt.yml
2018-08-07 08:08:53 +02:00
Lurkkeli
21bee17ffd
Update sysmon_uac_bypass_eventvwr.yml
2018-08-07 08:07:49 +02:00
yt0ng
fc091fe3d7
Added ATTCK Mapping
2018-08-05 14:00:22 +02:00
yt0ng
b65cb5eaca
Possible Shim Database Persistence via sdbinst.exe
2018-08-05 13:55:04 +02:00
Thomas Patzke
f8246e9f49
Removed "not implemented" hints for available options in sigmac
2018-08-04 23:31:29 +02:00
Thomas Patzke
0e986cae4d
Fixed log source and field names
2018-08-04 22:58:19 +02:00
Thomas Patzke
e6c3313168
Merge branch 'master' of https://github.com/Neo23x0/sigma
2018-08-02 22:45:25 +02:00
Thomas Patzke
af9f636199
Removal of backend output classes
...
Breaking change: Instead of feeding the output class with the results,
they are now returned as strings (*Backend.generate()) or list
(SigmaCollectionParser.generate()). Users of the library must now take
care of the output to the terminal, files or wherever Sigma rules should
be pushed to.
2018-08-02 22:41:32 +02:00
Florian Roth
acfdb591d0
fiox: Typo in description fixed
2018-07-29 16:22:39 +02:00
Florian Roth
1f845aa1d9
fix: Changed suspicious process creation rule to avoid FPs
2018-07-29 16:22:09 +02:00
Thomas Patzke
1c9d0a176e
Moved const_start into class definition
2018-07-28 23:51:33 +02:00
Thomas Patzke
8ceebba0d2
Merging split of config
2018-07-27 23:56:18 +02:00
Thomas Patzke
df74460629
Fixed imports after config split
2018-07-27 23:54:18 +02:00
Thomas Patzke
e02af9aa37
Merge config split branches
2018-07-27 23:16:50 +02:00
Thomas Patzke
eb440b3357
Split config - code removal from configuration
2018-07-27 23:02:35 +02:00
Thomas Patzke
36ada66007
Split config - Copy configuration
2018-07-27 23:01:41 +02:00
Thomas Patzke
920c4b061d
Split config - code removal from filter
2018-07-27 22:35:30 +02:00
Nik Seetharaman
b938fdb0a3
Add CMSTP UAC Bypass via COM Object Access
2018-07-27 02:28:28 -05:00
Thomas Patzke
db07648f33
Merge pull request #133 from james0d0a/attack_tags
...
added a few mitre attack tags to windows sysmon rules
2018-07-27 07:55:56 +02:00
James Dickenson
5fc118dcac
added a few mitre attack tags to windows sysmon rules
2018-07-26 21:15:07 -07:00
Thomas Patzke
d235a9e017
Split config - Copy filter
2018-07-27 00:23:22 +02:00
Thomas Patzke
50a6a92d20
Split config - code removal from exceptions
2018-07-27 00:17:35 +02:00
Thomas Patzke
405bc4a0d1
Split config - Copy exception
2018-07-27 00:17:13 +02:00
Thomas Patzke
096bc35447
Split config - code removal from mapping
2018-07-27 00:15:14 +02:00
Thomas Patzke
4ffbb25960
Split config - Copy mapping
2018-07-27 00:13:19 +02:00
Thomas Patzke
cad6e8d314
Merge parser split branch
2018-07-27 00:02:59 +02:00
Thomas Patzke
1c4c67053c
Fixes for parser split
...
* Fixed imports
* Rename
2018-07-27 00:02:07 +02:00
Thomas Patzke
88a4a5d36a
Merge parser split branches
2018-07-26 23:42:09 +02:00
Thomas Patzke
595327ace4
Split parser - code removal from condition
2018-07-26 23:40:22 +02:00
Thomas Patzke
c8043368bd
Split parser - code removal from rule
2018-07-26 22:43:49 +02:00
Florian Roth
a9fcecab88
Merge pull request #130 from samsson/patch-4
...
Fixed typo / Created a rule
2018-07-26 22:34:46 +02:00
Thomas Patzke
294ca20350
Split parser - code removal from collection
2018-07-26 22:28:33 +02:00
Thomas Patzke
3a0de01bad
Split parser - code removal from base
2018-07-26 22:22:21 +02:00
Thomas Patzke
b9425d13df
Split parser - code removal from exceptions
2018-07-26 22:18:21 +02:00
Thomas Patzke
e550bf5c3b
Split parser - Copy base
2018-07-26 22:15:04 +02:00
Thomas Patzke
a2329de03c
Split parser - Copy rule
2018-07-26 22:07:38 +02:00
Florian Roth
016b15a2a9
Added quotation marks
...
I've added quotation marks to make it clearer (leading dash looks weird)
2018-07-26 18:10:21 +02:00
Lurkkeli
7796492c2b
Update powershell_NTFS_Alternate_Data_Streams
2018-07-26 08:54:08 -07:00
Thomas Patzke
5e3211928f
Merge pull request #132 from dspautz/master
...
Add tags to APT rules
2018-07-25 09:57:35 +02:00
David Spautz
f039f95f4d
Add tags to APT rules
2018-07-25 09:50:01 +02:00
Florian Roth
089498b0b3
Merge pull request #131 from yt0ng/master
...
Possible SafetyKatz Dump of debug.bin
2018-07-25 07:41:38 +02:00
Florian Roth
dd857c4470
Cosmetics
...
If it's only 1 value we write it like this to avoid it being interpreted as a list with 1 element and to avoid an extra line.
2018-07-25 07:37:17 +02:00
Florian Roth
cf7f5c7473
Changes
...
I think that this is what you've wanted, right? If both keywords appear in a single log entry, right?
Don't you think that this still causes false positives? Could "set-content" and "stream" be more common than expected?
2018-07-25 07:35:59 +02:00
yt0ng
b415fc8d42
Possible SafetyKatz Dump of debug.bin
...
https://github.com/GhostPack/SafetyKatz
2018-07-24 23:51:46 +02:00
Lurkkeli
db82322d17
Update powershell_NTFS_Alternate_Data_Streams
2018-07-24 20:03:07 +02:00
Lurkkeli
0e9c5bb14a
Update sysmon_rundll32_net_connections.yml
2018-07-24 20:01:47 +02:00
Lurkkeli
fd8c5c5bf6
Update powershell_NTFS_Alternate_Data_Streams
2018-07-24 20:00:21 +02:00
Lurkkeli
ad580635ea
Create powershell_NTFS_Alternate_Data_Streams
2018-07-24 19:49:08 +02:00
Thomas Patzke
afe8bd6a57
Merge pull request #129 from nbareil/patch-1
...
use yaml.safe_load()
2018-07-24 11:22:24 +02:00
Nicolas Bareil
6728a5ccaa
use yaml.safe_load()
2018-07-24 11:14:01 +02:00
Thomas Patzke
0fa914139c
Merge pull request #128 from ntim/master
...
Tagged windows powershell, other and malware rules.
2018-07-24 11:05:50 +02:00
ntim
c99dc9f643
Tagged windows powershell, other and malware rules.
2018-07-24 10:56:41 +02:00
Thomas Patzke
bfc7012043
Merge pull request #127 from dspautz/master
...
Add tags to windows builtin rules
2018-07-24 08:24:39 +02:00
Thomas Patzke
0d8bc922a3
Merge branch 'master' into master
2018-07-24 08:23:37 +02:00
Thomas Patzke
1601b00862
Merge pull request #125 from james0d0a/attack_tags
...
windows builtin mitre attack tags
2018-07-24 08:18:47 +02:00
Thomas Patzke
01e7675e24
Merge pull request #124 from samsson/patch-1
...
ATT&CK tagging
2018-07-24 07:58:50 +02:00
Thomas Patzke
30d255ab6f
Fixed tag
2018-07-24 07:58:25 +02:00
Thomas Patzke
baaf8006bc
Merge pull request #123 from yt0ng/sysmon
...
added additional binaries and attack tactics/techniques
2018-07-24 07:57:30 +02:00
Thomas Patzke
ee330bf7fb
Merge pull request #121 from sekuryti/sekuryti-CVE-2018-2894--rule-changes
...
Update web_cve_2018_2894_weblogic_exploit.yml
2018-07-24 07:56:53 +02:00
David Spautz
e275d44462
Add tags to windows builtin rules
2018-07-24 07:50:32 +02:00
James Dickenson
c4edc26267
windows builtin mitre attack tags
2018-07-23 21:34:20 -07:00
Thomas Patzke
1abb13c5d9
Split parser - Copy condition
2018-07-24 00:13:37 +02:00
Thomas Patzke
a8501cb446
Split parser - Copy exceptions
2018-07-24 00:08:23 +02:00
Thomas Patzke
983ee6eeb9
Splitting parser - copying collections
2018-07-24 00:06:02 +02:00
Thomas Patzke
54f5870658
Removed debugging code
2018-07-24 00:04:24 +02:00
Thomas Patzke
b76fa884ec
Changed copyright notices accordingly
2018-07-24 00:01:16 +02:00
Lurkkeli
1898157df5
ATT&CK tagging
...
Added tag for technique t1015
2018-07-23 23:57:15 +02:00
yt0ng
16160dfc80
added additional binaries and attack tactics/techniques
2018-07-23 15:47:56 +02:00
Florian Roth
1134051fba
Update web_cve_2018_2894_weblogic_exploit.yml
...
Ah, we could do it this way *.js*
2018-07-23 06:19:25 -06:00
Florian Roth
03a64cca74
Update web_cve_2018_2894_weblogic_exploit.yml
...
We try to avoid false positives
2018-07-23 06:18:38 -06:00
MATTHEW CARR
dfb77e936d
Update web_cve_2018_2894_weblogic_exploit.yml
...
To detect all possible extensions .jspx, .jsw, .jsv, and .jspf
2018-07-23 07:41:47 +02:00
Florian Roth
0f1b440b91
Rule: widened the CVE-2018-2894 WebLogic rule
...
https://twitter.com/lo_security/status/1021148314308358144
2018-07-22 20:36:10 -06:00
Florian Roth
ffb0cf5ed5
Rule: CVE-2018-2894 Oracle WebLogic exploit and webshell drop
2018-07-22 15:09:45 -06:00
Florian Roth
5f48fa64ff
Merge pull request #120 from suleymanozarslan/master
...
Further ATT&CK tagging
2018-07-22 12:11:31 -06:00
Suleyman Ozarslan
e6cbc17c12
ATT&CK tagging of Scheduled Task Creation
2018-07-22 15:56:47 +03:00
Suleyman Ozarslan
8d9b12be07
ATT&CK tagging of Default PowerSploit Schtasks Persistence
2018-07-22 15:53:56 +03:00
Süleyman Özarslan
28705b3790
Merge pull request #2 from Neo23x0/master
...
merge
2018-07-22 15:47:36 +03:00
Thomas Patzke
fbde251ebc
Added missing exception import in ES backend
2018-07-22 09:26:25 +02:00
Thomas Patzke
91e6b8ca6b
Merging refactoring changes into master
2018-07-22 09:23:07 +02:00
Thomas Patzke
cf175d7b7e
Removal from sigma.backends.qradar
2018-07-22 09:14:50 +02:00
Thomas Patzke
097660c678
Splitting backends - Copy qradar.py
2018-07-22 09:12:29 +02:00
Thomas Patzke
c8e21b3f24
Fixing after split
...
* Fixing imports
* Discovery in new sub modules
2018-07-21 01:09:02 +02:00
Thomas Patzke
b85aec6157
Merging backend split branches
2018-07-21 00:59:50 +02:00
Thomas Patzke
3e2184ac61
Removal from sigma.backends.elasticsearch
2018-07-21 00:37:36 +02:00
Thomas Patzke
408a961e59
Merge pull request #119 from suleymanozarslan/master
...
Further ATT&CK tagging
2018-07-20 09:06:20 +02:00
Suleyman Ozarslan
080892b5ab
ATT&CK tagging of MSHTA Spawning Windows Shell
2018-07-20 09:53:55 +03:00
Suleyman Ozarslan
76f277d5fe
ATT&CK tagging of Malicious Named Pipe rule
2018-07-20 09:41:54 +03:00
Suleyman Ozarslan
7e74527344
ATT&CK software tag is added to Bitsadmin Download rule
2018-07-20 09:35:35 +03:00
Süleyman Özarslan
9f607a7c43
Merge pull request #1 from Neo23x0/master
...
mere forks
2018-07-20 09:33:37 +03:00
Florian Roth
1e61adfad1
rule: Changed Registry persistence Explorer RUN key rule
2018-07-19 16:27:19 -06:00
Florian Roth
83d6f12ce3
rule: Registry persistence in Explorer RUN key pointing to suspicious folder
2018-07-19 16:27:19 -06:00
Thomas Patzke
f98158f5ad
Further ATT&CK tagging
2018-07-19 23:36:13 +02:00
Florian Roth
fc08077086
Merge pull request #116 from suleymanozarslan/master
...
ATT&CK tagging of Suspicious Certutil Command rule
2018-07-19 08:25:50 -06:00
Suleyman Ozarslan
05b91847cd
ATT&CK tagging of Suspicious Certutil Command rule
2018-07-19 16:42:39 +03:00
Florian Roth
cea2dcbd89
docs: Info Graphic version 0.1 LQ / HQ
2018-07-17 19:25:37 -06:00
Florian Roth
9767f22756
docs: Info Graphic version 0.1 - fix
2018-07-17 19:14:40 -06:00
Florian Roth
f27252bfaa
docs: Info Graphic version 0.1
2018-07-17 19:12:56 -06:00
Thomas Patzke
bdea097b80
ATT&CK tagging
2018-07-17 23:58:11 +02:00
Thomas Patzke
926dc7d56b
Updated backends in README
2018-07-17 23:34:53 +02:00
Thomas Patzke
a9257c32c6
Sigma tools release 0.6
2018-07-17 23:12:23 +02:00
Thomas Patzke
63f9093896
Merge of SOC Prime QRadar backend
2018-07-17 22:57:54 +02:00
Thomas Patzke
52e4910ab6
Added QRadar backend to CI testing
2018-07-17 22:56:31 +02:00
Thomas Patzke
5bd898ed1d
Merge branch 'master' of https://github.com/socprime/sigma
2018-07-17 22:45:21 +02:00
Florian Roth
9e92b97661
Merge pull request #111 from nikseetharaman/cmstp_execution
...
Add sysmon_cmstp_execution
2018-07-17 14:39:56 -06:00
nikotin
88a1e2a365
Merge remote-tracking branch 'origin/master'
2018-07-17 15:25:27 +03:00
nikotin
b5f27d75be
Added Qradar backend
2018-07-17 15:25:06 +03:00
Florian Roth
3f0040b983
Removed duplicate status field
2018-07-16 15:55:31 -06:00
Florian Roth
429474b6d6
Merge pull request #113 from megan201296/patch-9
...
fixed typo
2018-07-16 15:38:52 -06:00
Florian Roth
e184f3f5b9
Merge pull request #112 from megan201296/patch-8
...
fixed typo
2018-07-16 15:38:19 -06:00
megan201296
02ea2cf923
fixed typo
2018-07-16 16:20:33 -05:00
megan201296
60310e94c6
fixed typo
2018-07-16 16:13:24 -05:00
socprime
eee5a1b1df
Merge pull request #2 from Neo23x0/master
...
Pull updates
2018-07-16 18:49:16 +03:00
Nik Seetharaman
3630386230
Add sysmon_cmstp_execution
2018-07-16 02:53:41 +03:00
Florian Roth
7a031709bb
Merge pull request #108 from megan201296/patch-5
...
fixed typo
2018-07-14 18:31:40 -06:00
Florian Roth
70ab83eb65
Merge pull request #109 from megan201296/patch-6
...
Fixed typo
2018-07-14 18:31:21 -06:00
Florian Roth
be77c893c2
Merge pull request #110 from megan201296/patch-7
...
typo fix
2018-07-14 18:31:07 -06:00
megan201296
be7a3b0774
Update sysmon_susp_mmc_source.yml
2018-07-13 18:49:08 -05:00
megan201296
a6455cc612
typo fix
2018-07-13 18:48:36 -05:00
megan201296
8944be1efd
Update sysmon_susp_driver_load.yml
2018-07-13 18:36:12 -05:00
megan201296
a169723005
fixed typo
2018-07-13 13:53:21 -05:00
socprime
86cbab5190
Merge pull request #1 from Neo23x0/master
...
Pull updates
2018-07-11 15:01:43 +03:00
Thomas Patzke
c2b1a58813
Removal from sigma.backends.wdatp
2018-07-10 23:49:39 +02:00
Thomas Patzke
45782c6328
Removal from sigma.backends.splunk
2018-07-10 23:48:47 +02:00
Thomas Patzke
46f29d2eb2
Removal from sigma.backends.output
2018-07-10 23:47:41 +02:00
Thomas Patzke
2d4145cfe8
Removal from sigma.backends.discovery
2018-07-10 23:46:52 +02:00
Thomas Patzke
83acff6859
Splitting backends - Copy discovery.py
2018-07-10 23:46:16 +02:00
Thomas Patzke
d340487e94
Removal from sigma.backends.base
2018-07-10 23:44:14 +02:00
Thomas Patzke
2e7d366da5
Removal from sigma.backends.mixins
2018-07-10 23:42:38 +02:00
Thomas Patzke
bb78c1428e
Removal from sigma.backends.logpoint
2018-07-10 23:41:15 +02:00
Thomas Patzke
2edeaee748
Removal from sigma.backends.graylog
2018-07-10 23:40:17 +02:00
Thomas Patzke
e5baca0ac4
Removal from sigma.backends.qualys
2018-07-10 23:39:18 +02:00
Thomas Patzke
fdfe346adc
Removal from sigma.backends.exceptions
2018-07-10 23:37:59 +02:00
Thomas Patzke
7fbc3a35a3
Removal from sigma.backends.cli
2018-07-10 23:33:40 +02:00
Thomas Patzke
881f72e418
Removal from sigma.backends.tools
2018-07-10 23:32:42 +02:00
Thomas Patzke
09ac41949c
Removal from sigma.backends.archsight
2018-07-10 23:22:36 +02:00
Thomas Patzke
04b89befce
Splitting backends - Copy elasticsearch.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
bb9bef4deb
Splitting backends - Copy wdatp.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
72480d304b
Splitting backends - Copy splunk.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
c5d5c52850
Splitting backends - Copy output.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
0c93040da5
Splitting backends - Copy base.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
a8e19bb4ba
Splitting backends - Copy mixins.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
116fe16512
Splitting backends - Copy logpoint.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
b621e9c3a8
Splitting backends - Copy graylog.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
a2ee36eac7
Splitting backends - Copy qualys.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
32c70b26d8
Splitting backends - Copy exceptions.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
43d951b173
Splitting backends - Copy cli.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
a6cd7a3d6b
Splitting backends - Copy tools.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
7a2b1ae790
Splitting backends - Copy arcsight.py
2018-07-10 23:15:04 +02:00
Thomas Patzke
2dc5295abf
Removed redundant attribute from rule
2018-07-10 22:50:02 +02:00
Thomas Patzke
d064d24fbe
Sigmac WDATP backend: renamed action types
2018-07-10 22:49:38 +02:00
Florian Roth
57727d2397
Merge pull request #107 from megan201296/typo-fixes
...
Typo fixes
2018-07-10 10:29:10 -06:00
megan201296
24d2d0b258
Fixed typo
2018-07-10 09:14:37 -05:00
megan201296
d6ea0a49fc
Fixed typoes
2018-07-10 09:14:07 -05:00
megan201296
3ec67393cd
Fixed typo
2018-07-10 09:13:41 -05:00
Florian Roth
66481c27a9
Merge pull request #106 from megan201296/patch-4
...
Fixed typo
2018-07-09 12:43:39 -06:00
megan201296
b0bc3b66ed
Fixed typo
2018-07-09 13:32:16 -05:00
Florian Roth
a030db2c94
Merge pull request #105 from megan201296/patch-3
...
removed duplicates
2018-07-09 12:18:32 -06:00
megan201296
120479abb7
removed duplicates
2018-07-09 12:32:41 -05:00
Florian Roth
aed6939411
Merge pull request #104 from megan201296/patch-2
...
Fixed typo
2018-07-09 11:07:48 -06:00
megan201296
c4bd267151
Fixed typo
2018-07-09 12:02:42 -05:00
Florian Roth
1574f1ea47
Merge pull request #103 from megan201296/patch-1
...
Fixed spelling mistake
2018-07-09 08:32:09 -06:00
megan201296
a7ccfcb50d
Fixed spelling mistake
2018-07-09 09:13:31 -05:00
Florian Roth
c8fef4d093
fix: removed unnecessary lists
2018-07-07 15:43:56 -06:00
Florian Roth
dea019f89d
fix: some threat levels adjusted
2018-07-07 13:00:23 -06:00
Florian Roth
9ce8630a27
Merge pull request #102 from yt0ng/patch-4
...
MSHTA spwaned by SVCHOST as seen in LethalHTA
2018-07-07 12:59:00 -06:00
yt0ng
6a014a3dc8
MSHTA spwaned by SVCHOST as seen in LethalHTA
...
"Furthermore it can be detected by an mshta.exe process spawned by svchost.exe."
2018-07-06 19:52:58 +02:00
Florian Roth
ed470feb21
Merge pull request #99 from yt0ng/master
...
Detects ImageLoad by uncommon Image
2018-07-06 10:11:02 -06:00
yt0ng
b21afc3bc8
user subTee was removed from Twitter
2018-07-04 17:29:05 +02:00
yt0ng
f84c33d005
Known powershell scripts names for exploitation
...
Detects the creation of known powershell scripts for exploitation
2018-07-04 17:24:18 +02:00
Florian Roth
7867838540
fix: typo in rule description
2018-07-03 05:05:44 -06:00
Florian Roth
e7465d299f
fix: false positive with MsMpEng.exe and svchost.exe as child process
2018-07-03 05:05:44 -06:00
Thomas Patzke
0cdfc776de
Sigma tools release 0.5
2018-07-03 00:07:43 +02:00
Thomas Patzke
3e40a48ce1
Merge branch 'SaltyHash123-master'
2018-07-02 23:31:43 +02:00
Thomas Patzke
0bacba05aa
Added backend 'splunkxml' to CI tests
2018-07-02 23:20:02 +02:00
Thomas Patzke
67158ba1d2
Merge branch 'master' of https://github.com/SaltyHash123/sigma into SaltyHash123-master
2018-07-02 23:14:04 +02:00
yt0ng
42941ee105
Detects ImageLoad by uncommon Image
...
Process Hollowing Described by SubTee using notepad https://twitter.com/subTee/status/1012657434702123008
2018-07-01 15:47:17 +02:00
Florian Roth
48582a1c93
Bugfix in Flash Downloader Rule
2018-06-30 23:39:38 +02:00
Florian Roth
2a74a62c67
Config file for SPARK scanner
2018-06-29 16:42:16 +02:00
Florian Roth
c3bf968462
High FP Rule
2018-06-29 16:01:46 +02:00
Florian Roth
c26c3ee426
Trying to fix rule
2018-06-28 16:39:47 +02:00
Florian Roth
fa98595ad6
Added SPARK Sigma rule scan feature to list
2018-06-28 16:28:07 +02:00
Florian Roth
9e0abc5f0b
Adjusted rules to the new specs reg "not null" usage
2018-06-28 09:30:31 +02:00
Florian Roth
336f4c83e0
Merge pull request #97 from scherma/patch-1
...
False positive circumstance
2018-06-27 23:18:56 +02:00
scherma
19ba5df207
False positive circumstance
2018-06-27 21:14:38 +01:00
Florian Roth
86e6518764
Changed (any) statements to (not null) to comply with the newest specs
2018-06-27 20:57:58 +02:00
Florian Roth
a61052fc0a
Rule fixes
2018-06-27 18:47:52 +02:00
Florian Roth
9705366060
Adjusted some rules
2018-06-27 16:54:44 +02:00
Florian Roth
fc72bd16af
Fixed bugs
2018-06-27 09:20:41 +02:00
Thomas Patzke
c3d582bc13
Cleanup
2018-06-26 23:37:21 +02:00
Florian Roth
5843fe2590
Update README.md
2018-06-25 18:59:36 +02:00
Florian Roth
467b8c80f4
Update README.md
2018-06-25 18:58:05 +02:00
Florian Roth
2ae57166ac
Updated README
2018-06-25 18:29:02 +02:00
Florian Roth
3283c52c0f
Added WDATP in the list of supported backends
2018-06-25 18:09:21 +02:00
Florian Roth
f4b150def8
Rule: Powershell remote thread creation in Rundll32
2018-06-25 15:23:19 +02:00
Florian Roth
1a1011b0ad
Merge pull request #96 from yt0ng/master
...
Detects the creation of a schtask via PowerSploit Default Configuration
2018-06-23 17:15:14 +02:00
yt0ng
c59d0c7dca
Added additional options
2018-06-23 15:54:31 +02:00
yt0ng
cc3fd9f5d0
Detects the creation of a schtask via PowerSploit Default Configuration
...
https://github.com/0xdeadbeefJERKY/PowerSploit/blob/8690399ef70d2cad10213575ac67e8fa90ddf7c3/Persistence/Persistence.psm1
2018-06-23 15:45:58 +02:00
Roey
14464f8c79
Added support of splunk dashboards (xml)
2018-06-22 14:17:58 +02:00
Florian Roth
28a7e64212
Rule: Sysprep on AppData folder
2018-06-22 14:02:55 +02:00
Thomas Patzke
7d1b801858
Merge branch 'devel-sigmac-wdatp'
2018-06-22 00:43:23 +02:00
Thomas Patzke
d8e036f737
sigmac: Parameter for ignoring "not supported" errors
...
Used to pass tests with complete rule set that would fail for backends
which target systems don't support required features.
2018-06-22 00:23:59 +02:00
Thomas Patzke
31727b3b25
Added Windows Defender ATP backend
...
Missing:
* Aggregations
2018-06-22 00:03:10 +02:00
Thomas Patzke
df6ad82770
Removed redundant attribute from rule
...
EventID 4657 already implies the modification.
2018-06-21 23:59:55 +02:00
Thomas Patzke
e72c0d5de4
SingleTextQueryBackend ignores empty components in composed queries
...
Example: one component of a AND-composition is ignored if invoked
generate* call returns None.
2018-06-21 23:59:41 +02:00
Thomas Patzke
d8a7bcad39
Reordered rule generation
...
Generation of query parts before and after main query gives access to
information possibly gathered while main query generation.
2018-06-21 23:50:13 +02:00
Florian Roth
b05856eae1
Rule: Update suspicious TLD downloads
2018-06-13 00:08:46 +02:00
Florian Roth
3d52030391
Changed help text for -r flag
2018-06-13 00:08:46 +02:00
Florian Roth
946c946366
Rule: NTLM logon
2018-06-13 00:08:46 +02:00
Florian Roth
7edd95744a
Windows NTLM
2018-06-13 00:08:46 +02:00
Florian Roth
e23cdafb85
Rule: Fixed missing description
2018-06-13 00:08:46 +02:00
Florian Roth
c9658074dd
Removed "not yet implemented" comment from -r flag
2018-06-13 00:08:46 +02:00
Florian Roth
df2745ec6c
Merge pull request #92 from yt0ng/patch-2
...
Update proxy_ua_apt.yml
2018-06-10 10:29:16 +02:00
Florian Roth
f6f718c54f
Cosmetics
2018-06-10 10:28:59 +02:00
yt0ng
3166bf5b05
Update proxy_ua_apt.yml
...
user Agent seen in https://www.hybrid-analysis.com/sample/a80e29c0757bee05338fd5c22a542d852ad86c477068e3eb4aacc1c3e59e2eef?environmentId=100
2018-06-10 10:17:02 +02:00
Thomas Patzke
dbc25b6bfa
Integrated Qualys backend to CI testing
2018-06-07 23:33:47 +02:00
Thomas Patzke
f6d5e5dd99
Sigmac parameter -I now ignores all backend errors
...
New backends introduced further exceptions and the intention of -I is to
get a successful run.
2018-06-07 23:33:12 +02:00
Thomas Patzke
8ddb369df3
Integration of Qualys backend
...
* Changed description text to one-liner
* Output to intended class
* Minor code optimizations
2018-06-07 23:31:09 +02:00
Thomas Patzke
ce9db548ff
Integration of ArcSight backend
...
* Rename
* Changed description to one line to beautify output of backend list
* Small bugfix in handling of numeric values
2018-06-07 23:04:36 +02:00
Thomas Patzke
17c894005c
Merge branch 'master' of https://github.com/socprime/sigma into socprime-backends
2018-06-07 22:18:51 +02:00
nikotin
d13e8d7bd3
Added ArcSight & Qualys backends
2018-06-07 16:18:23 +03:00
Florian Roth
bd61f223ee
Sofacy Zebrocy samples
2018-06-06 23:24:18 +02:00
Florian Roth
667b3b4935
Rule: Added 2 more Sofacy User-Agents
2018-06-06 22:38:50 +02:00
Florian Roth
9640806678
Rules: Telegram Bot API access
2018-06-05 16:25:43 +02:00
Florian Roth
9c817a493b
Rule: DCSync
2018-06-03 16:00:57 +02:00
Florian Roth
d1d4473505
Rule: ADS with executable
...
https://twitter.com/0xrawsec/status/1002478725605273600
2018-06-03 02:08:57 +02:00
Florian Roth
4eabc5ea5c
Sigmac Usage
2018-06-01 10:33:11 +02:00
Florian Roth
8e500d2caa
Bugfix in rule
2018-05-29 14:11:12 +02:00
Florian Roth
0d97522b5a
Merge pull request #88 from noraj/patch-1
...
enhance web server paths
2018-05-29 11:54:46 +02:00
Alexandre ZANNI
74da324d8f
remove old public_html
...
remove old public_html
2018-05-29 11:44:38 +02:00
Alexandre ZANNI
a1de770b64
enhance web server paths
...
- specify when it is apache only
- add Per-user path
- add archlinux paths
2018-05-29 11:41:36 +02:00
Florian Roth
f9596c1ae0
MISP added
2018-05-28 09:15:48 +02:00
Florian Roth
fc8a21fac5
Evt2Sigma
2018-05-28 09:13:08 +02:00
Florian Roth
51c6d0a767
Rule: Proxy User-Agent VPNFilter
2018-05-24 00:34:07 +02:00
Florian Roth
65cc78f9e8
Windows Config Update - DNS logs
2018-05-22 16:59:58 +02:00
Florian Roth
2db00b8559
Rule: whoami execution
2018-05-22 16:59:58 +02:00
Thomas Patzke
bd23946f06
Merge of Graylog backend pull request
2018-05-18 15:55:02 +02:00
Thomas Patzke
21040f04cc
Added CI test for Graylog backend
2018-05-18 15:53:25 +02:00
Thomas Patzke
b28480495e
Merge branch 'master' of https://github.com/DefenceLogic/sigma into DefenceLogic-master
2018-05-18 15:49:19 +02:00
Thomas Patzke
079c04f28d
Fixed rule scope
2018-05-18 14:23:52 +02:00
Paul Dutot
715a88542d
Graylog backend added
2018-05-17 15:51:25 +01:00
Paul Dutot
05e108a4d1
Merge pull request #1 from Neo23x0/master
...
Updating Fork
2018-05-17 10:49:54 +01:00
Florian Roth
1fd4172832
Merge pull request #84 from mgreen27/patch-1
...
Update_WebDAV
2018-05-17 09:40:32 +02:00
Florian Roth
57dc02aa9f
Merge pull request #85 from HacknowledgeCH/es-dsl-patch
...
patched es-dsl
2018-05-17 09:39:55 +02:00
milkmix
37ee355a77
patched es-dsl
2018-05-17 08:44:50 +02:00
Matthew Green
16365b7793
Update_WebDAV
...
Made the name a bit generic as WebDAV can be used by several download cradles.
Added in HttpMethod as a select as GET requests makes for a great filter point with much less false positives.
2018-05-16 13:05:15 +10:00
Thomas Patzke
33ffd2683e
Disabled failing pypy3 build
2018-05-13 22:52:25 +02:00
Thomas Patzke
738d03c751
Fixed position of line separation if rulecomment and verbose is active
2018-05-13 22:36:51 +02:00
Thomas Patzke
6a3fcdc68c
Unified 0x values with other rules
2018-05-13 22:28:43 +02:00
Florian Roth
429ae0729a
README Update
2018-05-12 08:33:31 +02:00
Florian Roth
1aaed07dd7
Rule: Suspicious base64 encoded part of DNS query
2018-05-10 14:08:52 +02:00
Florian Roth
62b490396d
Rule: Cobalt Strike DNS Beaconing
2018-05-10 14:08:52 +02:00
Thomas Patzke
f60e7e125f
Sigma tools release 0.4
...
* Various bug fixes in quoting of specific characters
* New backend es-dsl
2018-05-01 00:50:07 +02:00
Thomas Patzke
7647587a8b
Fixed quoting of backslashes in generated queries
2018-05-01 00:45:59 +02:00
Thomas Patzke
de2ed08695
Merge branch 'ci-es'
2018-05-01 00:34:11 +02:00
Thomas Patzke
a1c32123f1
Setup ES 6.2.4 in Travis CI
2018-05-01 00:23:48 +02:00
Thomas Patzke
e411039b56
Fixed escaping of \u in Elasticsearch Query String queries
2018-05-01 00:05:16 +02:00
Florian Roth
ae6df590a9
Delphi downloader https://goo.gl/rMVUSM
2018-04-24 23:23:21 +02:00
Florian Roth
49877a6ed0
Moved and renamed rule
2018-04-18 16:53:11 +02:00
Florian Roth
3c1c9d2b31
Merge pull request #81 from yt0ng/sigma-yt0ng
...
added SquiblyTwo Detection
2018-04-18 16:39:37 +02:00
Florian Roth
8420d3174a
Reordered
2018-04-18 16:34:16 +02:00
yt0ng
c637c2e590
Adding Detections for renamed wmic and format
...
https://subt0x11.blogspot.ch/2018/04/wmicexe-whitelisting-bypass-hacking.html
https://twitter.com/mattifestation/status/986280382042595328
2018-04-18 15:02:52 +02:00
Florian Roth
9b8df865b1
Extended rule
2018-04-18 12:13:45 +02:00
yt0ng
a4fb39a336
also for http
2018-04-18 08:19:47 +02:00
yt0ng
169a4404c2
added SquiblyTwo Detection
2018-04-17 21:33:26 +02:00
Florian Roth
6d293d498d
Merge pull request #80 from marvi/marvi-patch-1
...
"author" should be a string and not a list.
2018-04-17 08:27:29 +02:00
Markus Härnvi
cf237cf658
"author" should be a string and not a list, according to the specification
2018-04-16 23:42:51 +02:00
Florian Roth
d8bbf26f2c
Added msiexec to rule in order to cover new threats
...
https://twitter.com/DissectMalware/status/984252467474026497
2018-04-12 09:12:50 +02:00
Thomas Patzke
15a6c5efb5
Detailed error messages for failed queries
2018-04-12 00:20:54 +02:00
Thomas Patzke
aeda30a389
Python rewrite of es-qs query test
2018-04-11 23:59:44 +02:00
Florian Roth
58517907ad
Improved rule to provide support for for old sysmon \REGISTRY syntax
2018-04-11 20:15:17 +02:00
Florian Roth
0ffd226293
Moved new rule to sysmon folder
2018-04-11 20:11:54 +02:00
Florian Roth
52d405bb1b
Improved shell spawning rule
2018-04-11 20:09:42 +02:00
Florian Roth
ef7fb4cff1
Merge pull request #78 from Karneades/patch-1
...
Add rule for Windows registry persistence mechanisms
2018-04-11 19:35:55 +02:00
Florian Roth
b065c2c35c
Simplified rule
2018-04-11 19:03:35 +02:00
Karneades
fa6677a41d
Remove @ in author
...
Be nice to Travis: "error syntax error: found character '@' that cannot start any token"
2018-04-11 15:21:42 +02:00
Karneades
be3c27981f
Add rule for Windows registry persistence mechanisms
2018-04-11 15:13:00 +02:00
Thomas Patzke
788111f174
Fixes for Elasticsearch query correctness CI tests
...
* Quoting in rule
* Reading queries without special processing of backslashes
Unfortunately, backslashes still cause breaks caused by Bash handling of
them.
2018-04-09 22:33:29 +02:00
Florian Roth
56172ae174
Corrected CrackMapExec rule
2018-04-09 08:40:03 +02:00
Florian Roth
a9c7fe202e
Rule: Windows shell spawning suspicious program
2018-04-09 08:37:30 +02:00
Florian Roth
8ddd40e18e
PowerShell Cradle - WebDAV UA
2018-04-09 08:37:30 +02:00
Florian Roth
e53826e167
Extended Sysmon Office Shell rule
2018-04-09 08:37:30 +02:00
Florian Roth
6eb8cdfeab
TSCookie UA
2018-04-09 08:37:30 +02:00
Thomas Patzke
05928d4f8f
Merge pull request #76 from HacknowledgeCH/es-dsl
...
es-dsl backend
2018-04-08 23:39:23 +02:00
Thomas Patzke
f113832c04
Merge pull request #69 from jmallette/rules
...
Create cmdkey recon rule
2018-04-08 23:23:30 +02:00
Thomas Patzke
35d43c5ed9
Merge pull request #77 from yt0ng/sigma-yt0ng
...
added NCSC CrackMapExecWin Description in apt_dragonfly.yml
2018-04-08 23:21:49 +02:00
root
69671733a8
added NCSC CrackMapExecWin Description in apt_dragonfly.yml
2018-04-08 17:10:00 +02:00
milkmix
0b3b0c3aaf
imported es-dsl code from repo
2018-04-06 17:36:11 +02:00
Thomas Patzke
24d94d39b8
CI: Testing backend es-qs against Elasticsearch
2018-04-04 00:32:48 +02:00
Thomas Patzke
4183b1b59e
Sigma tools release 0.3.3
2018-03-29 11:17:03 +02:00
Thomas Patzke
22ee6f4521
sigmac: escaped wildcards (\* and \?) are passed in generated query
2018-03-29 11:15:20 +02:00
Thomas Patzke
17c1c1adff
Added field name mappings to HELK configuration
2018-03-27 14:41:02 +02:00
Thomas Patzke
a3e02ea70f
Various rule fixes
...
* Field name: LogonProcess -> LogonProcessName
* Field name: Message -> AuditPolicyChanges
* Field name: ProcessCommandLine -> CommandLine
* Removed Type match in Kerberos RC4 encryption rule
Problematic because text representation not unified and audit failures are possibly interesting events
* Removed field 'Severity' from rules (Redundant)
* Rule decomposition of win_susp_failed_logons_single_source) because of different field names
* Field name: SubjectAccountName -> SubjectUserName
* Field name: TargetProcess -> TargetImage
* Field name: TicketEncryption -> TicketEncryptionType
* Field name: TargetFileName -> TargetFilename
2018-03-27 14:35:49 +02:00
Thomas Patzke
b1bfa64231
Removed redundant 'EventLog' conditions
2018-03-26 00:36:40 +02:00
Thomas Patzke
f68af2a5da
Added reference to Kerberos RC4 rule
2018-03-25 23:19:01 +02:00
Thomas Patzke
dacc6ae3d3
Fieldname case: Commandline -> CommandLine
2018-03-25 23:08:28 +02:00
Florian Roth
e141a834ff
Rule: Ping hex IP address
...
https://github.com/vysec/Aggressor-VYSEC/blob/master/ping.cna
2018-03-23 17:00:00 +01:00
Florian Roth
c10da5b734
Improved Chafer activity rule
2018-03-23 10:50:40 +01:00
Florian Roth
a797a281ac
Rule: Chafer / OilRig activity Mar 18
...
https://nyotron.com/nyotron-discovers-next-generation-oilrig-attacks/
2018-03-23 08:59:16 +01:00
Thomas Patzke
3962520848
Merge branch 'devel-sigmac'
2018-03-22 00:05:51 +01:00
Thomas Patzke
5f8b60cc24
sigmac: Improved fieldlist backend
...
* Unique list of fields for multiple rules
* Aggregation support
2018-03-22 00:03:51 +01:00
Florian Roth
f220e61adc
Fixed second selection in rule
2018-03-21 10:47:14 +01:00
Florian Roth
70c2f973a3
Rule: Smbexec.py Service Installation
2018-03-21 10:44:37 +01:00
Florian Roth
3c968d4ec6
Fixed rule for any ControlSets
2018-03-21 10:44:37 +01:00
Thomas Patzke
5c0f811f4a
Sigma tools release 0.3.2
2018-03-21 01:15:19 +01:00
Thomas Patzke
0018503501
sigmac: Fixed rulecommend backend option
2018-03-21 01:13:10 +01:00
Thomas Patzke
7360a68741
Sigma tools release 0.3.1
2018-03-21 00:59:23 +01:00
Thomas Patzke
4a9849b161
sigmac: improved backend options
...
* parsing in main class
* help
2018-03-21 00:53:44 +01:00
Thomas Patzke
bd20ffdad9
sigmac/kibana: curl URL quoted
2018-03-21 00:22:00 +01:00
Thomas Patzke
177e2acf8e
Updated README
2018-03-20 23:54:00 +01:00
Florian Roth
97204d8dc0
Renamed rule
2018-03-20 15:04:11 +01:00
Florian Roth
e9fcfcba7f
Improved NetNTLM downgrade rule
2018-03-20 15:03:55 +01:00
Florian Roth
a7eb4d3e34
Renamed rule
2018-03-20 11:12:35 +01:00
Florian Roth
b84bbd327b
Rule: NetNTLM Downgrade Attack
...
https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
2018-03-20 11:07:21 +01:00
Florian Roth
a6d293e31d
Improved tscon rule
2018-03-20 10:54:04 +01:00
Florian Roth
8fb6bc7a8a
Rule: Suspicious taskmgr as LOCAL_SYSTEM
2018-03-19 16:36:39 +01:00
Florian Roth
af8be8f064
Several rule updates
2018-03-19 16:36:15 +01:00
Florian Roth
648ac5a52e
Rules: tscon.exe anomalies
...
http://www.korznikov.com/2017/03/0-day-or-feature-privilege-escalation.html
https://medium.com/@networksecurity/rdp-hijacking-how-to-hijack-rds-and-remoteapp-sessions-transparently-to-move-through-an-da2a1e73a5f6
2018-03-17 19:14:13 +01:00
Thomas Patzke
3f5f3a8d50
sigmac: Remove problematic characters from rule identifiers
2018-03-17 00:44:50 +01:00
Thomas Patzke
f6858c436a
sigmac: Kibana curl output generates one index pattern line per pattern
2018-03-16 23:53:12 +01:00
Thomas Patzke
578118315c
Merge branch 'devel-sigmac' into helk
2018-03-16 23:48:13 +01:00
Thomas Patzke
e162ba0155
Added HELK configuration
2018-03-16 23:42:31 +01:00
Florian Roth
ff45901ea3
Merge pull request #71 from Karneades/patch-1
...
Add missing binaries
2018-03-16 11:49:37 +01:00
Karneades
49c12f1df8
Add missing binaries
2018-03-16 10:52:43 +01:00
Florian Roth
a257b7d9d7
Rule: Stickykey improved
2018-03-16 09:10:07 +01:00
Florian Roth
8b31767d31
Rule: PsExec usage
2018-03-15 19:54:22 +01:00
Florian Roth
0460e7f18a
Rule: Suspicious process started from taskmgr
2018-03-15 19:54:03 +01:00
Florian Roth
f5494c6f5f
Rule: StickyKey-ike backdoor usage
2018-03-15 19:53:34 +01:00
Florian Roth
d9d27fec74
Improved EquationGroup dll load rule
2018-03-11 01:22:04 +01:00
Thomas Patzke
d8bd65f9ff
sigmac: Added testcase for Kibana curl script output
2018-03-11 00:30:20 +01:00
Thomas Patzke
13ec4c3e3b
sigmac: Kibana curl importer script
2018-03-11 00:25:12 +01:00
Florian Roth
74c2f91a7d
Extended the Slingshot APT rule
2018-03-10 16:44:18 +01:00
Florian Roth
66d52cfeef
Rule: Defrag deactivation
2018-03-10 15:49:50 +01:00
Florian Roth
ef75f2a248
Minor adjustment in: EquationGroup dll_u load
2018-03-10 12:24:49 +01:00
Florian Roth
e9d16bfae1
Bugfix in: EquationGroup dll_u load
2018-03-10 12:22:53 +01:00
Florian Roth
5ae5c9de19
Rule: Outlook spawning shells to detect Turla like C&C via Outlook
2018-03-10 09:04:11 +01:00
Florian Roth
6a65a7a1bf
EquationGroup dll_u load
2018-03-10 09:04:11 +01:00
jmallette
aff46be8a3
Create cmdkey recon rule
2018-03-08 13:25:05 -05:00
Thomas Patzke
ada1ca94ea
JPCERT rules
...
* Addition of ntdsutil.exe rule
* Added new link to existing rules
2018-03-08 00:10:19 +01:00
Thomas Patzke
8ee24bf150
WMI persistence rules derived from blog article
...
https://www.eideon.com/2018-03-02-THL03-WMIBackdoors/#so-to-summarize
2018-03-07 23:05:10 +01:00
Thomas Patzke
1dc3ae1a8e
Fixed merge_sigma failing test
2018-03-07 00:20:35 +01:00
Thomas Patzke
54d9e52527
Sigma tools release 0.3
2018-03-06 23:21:13 +01:00
Thomas Patzke
3b8b04fe09
Merge branch 'devel-sigmac'
2018-03-06 23:19:45 +01:00
Thomas Patzke
8041f77abd
Merged similar rules
2018-03-06 23:19:11 +01:00
Thomas Patzke
84645f4e59
Simplified rule conditions with new condition constructs
2018-03-06 23:14:43 +01:00
Thomas Patzke
7141729ffc
sigma/parser: Introduced new conditions
...
* Any definition: 1 of them
* All definitions: all of them
* Any of selected definitions: 1 of def* (wildcard)
* All of selected definitions: all of def* (wildcard)
2018-03-06 23:13:42 +01:00
Florian Roth
b9102d0b0a
Improved sigma2elastalert
2018-03-05 12:05:47 +01:00
Florian Roth
1ecfd83a6a
Missing separator
2018-03-05 11:30:01 +01:00
Thomas Patzke
6b69f423da
Merging sigma2elastalert
2018-03-04 23:27:23 +01:00
Thomas Patzke
17e8f06161
Added notice regarding contributed tools
2018-03-04 23:26:38 +01:00
David ROUTIN
00177560ca
Added sigma2elastalert.py
2018-03-04 23:26:06 +01:00
Sherif Eldeeb
376d0414d8
Condition is a str, not a list
...
To be consistent with schema and all the other rules:
- `condition` should be a `str`
- if an `or` condition needs to be applied, use parentheses and literal `or` instead of a `list`
2018-01-28 16:16:00 +03:00
Sherif Eldeeb
90a8cc9d40
Merge pull request #3 from Neo23x0/master
...
Merge pull request #64 from SherifEldeeb/master
2018-01-28 16:11:19 +03:00