Files
sigma-rules/rules/windows
Jonhnathan 033a4b0646 [Rule Tuning] Remove "process_started" from Windows Rules (#2238)
* [Rule Tuning] Remove "process_started" from Windows Rules

* Additional, pending ones

* Update defense_evasion_code_injection_conhost.toml

Co-authored-by: Colson Wilhoit <48036388+DefSecSentinel@users.noreply.github.com>

Removed changes from:
- rules/windows/collection_email_powershell_exchange_mailbox.toml
- rules/windows/collection_winrar_encryption.toml
- rules/windows/command_and_control_rdp_tunnel_plink.toml
- rules/windows/command_and_control_remote_file_copy_desktopimgdownldr.toml
- rules/windows/credential_access_cmdline_dump_tool.toml
- rules/windows/credential_access_copy_ntds_sam_volshadowcp_cmdline.toml
- rules/windows/credential_access_dump_registry_hives.toml
- rules/windows/credential_access_iis_apppoolsa_pwd_appcmd.toml
- rules/windows/credential_access_iis_connectionstrings_dumping.toml
- rules/windows/credential_access_relay_ntlm_auth_via_http_spoolss.toml
- rules/windows/credential_access_saved_creds_vaultcmd.toml
- rules/windows/defense_evasion_adding_the_hidden_file_attribute_with_via_attribexe.toml
- rules/windows/defense_evasion_clearing_windows_event_logs.toml
- rules/windows/defense_evasion_delete_volume_usn_journal_with_fsutil.toml
- rules/windows/defense_evasion_disable_windows_firewall_rules_with_netsh.toml
- rules/windows/defense_evasion_disabling_windows_logs.toml
- rules/windows/defense_evasion_dotnet_compiler_parent_process.toml
- rules/windows/defense_evasion_enable_inbound_rdp_with_netsh.toml
- rules/windows/defense_evasion_execution_control_panel_suspicious_args.toml
- rules/windows/defense_evasion_execution_lolbas_wuauclt.toml
- rules/windows/defense_evasion_execution_msbuild_started_by_office_app.toml
- rules/windows/defense_evasion_execution_msbuild_started_by_system_process.toml
- rules/windows/defense_evasion_execution_msbuild_started_renamed.toml
- rules/windows/defense_evasion_execution_msbuild_started_unusal_process.toml
- rules/windows/defense_evasion_from_unusual_directory.toml
- rules/windows/defense_evasion_iis_httplogging_disabled.toml
- rules/windows/defense_evasion_installutil_beacon.toml
- rules/windows/defense_evasion_masquerading_as_elastic_endpoint_process.toml
- rules/windows/defense_evasion_masquerading_renamed_autoit.toml
- rules/windows/defense_evasion_masquerading_suspicious_werfault_childproc.toml
- rules/windows/defense_evasion_mshta_beacon.toml
- rules/windows/defense_evasion_network_connection_from_windows_binary.toml
- rules/windows/defense_evasion_proxy_execution_via_msdt.toml
- rules/windows/defense_evasion_rundll32_no_arguments.toml
- rules/windows/defense_evasion_suspicious_short_program_name.toml
- rules/windows/defense_evasion_suspicious_wmi_script.toml
- rules/windows/defense_evasion_suspicious_zoom_child_process.toml
- rules/windows/defense_evasion_unusual_network_connection_via_dllhost.toml
- rules/windows/defense_evasion_unusual_network_connection_via_rundll32.toml
- rules/windows/defense_evasion_unusual_system_vp_child_program.toml
- rules/windows/defense_evasion_via_filter_manager.toml
- rules/windows/defense_evasion_workfolders_control_execution.toml
- rules/windows/discovery_adfind_command_activity.toml
- rules/windows/discovery_admin_recon.toml
- rules/windows/discovery_command_system_account.toml
- rules/windows/discovery_enumerating_domain_trusts_via_nltest.toml
- rules/windows/discovery_net_view.toml
- rules/windows/discovery_peripheral_device.toml
- rules/windows/discovery_remote_system_discovery_commands_windows.toml
- rules/windows/discovery_security_software_wmic.toml
- rules/windows/discovery_whoami_command_activity.toml
- rules/windows/execution_apt_solarwinds_backdoor_child_cmd_powershell.toml
- rules/windows/execution_apt_solarwinds_backdoor_unusual_child_processes.toml
- rules/windows/execution_com_object_xwizard.toml
- rules/windows/execution_command_shell_started_by_unusual_process.toml
- rules/windows/execution_enumeration_via_wmiprvse.toml
- rules/windows/execution_from_unusual_path_cmdline.toml
- rules/windows/execution_ms_office_written_file.toml
- rules/windows/execution_pdf_written_file.toml
- rules/windows/execution_suspicious_cmd_wmi.toml
- rules/windows/execution_suspicious_pdf_reader.toml
- rules/windows/execution_suspicious_psexesvc.toml
- rules/windows/execution_via_compiled_html_file.toml
- rules/windows/execution_via_hidden_shell_conhost.toml
- rules/windows/execution_via_xp_cmdshell_mssql_stored_procedure.toml
- rules/windows/impact_deleting_backup_catalogs_with_wbadmin.toml
- rules/windows/impact_modification_of_boot_config.toml
- rules/windows/impact_volume_shadow_copy_deletion_or_resized_via_vssadmin.toml
- rules/windows/impact_volume_shadow_copy_deletion_via_powershell.toml
- rules/windows/impact_volume_shadow_copy_deletion_via_wmic.toml
- rules/windows/initial_access_script_executing_powershell.toml
- rules/windows/initial_access_scripts_process_started_via_wmi.toml
- rules/windows/initial_access_suspicious_ms_office_child_process.toml
- rules/windows/initial_access_suspicious_ms_outlook_child_process.toml
- rules/windows/initial_access_via_explorer_suspicious_child_parent_args.toml
- rules/windows/lateral_movement_cmd_service.toml
- rules/windows/lateral_movement_dcom_hta.toml
- rules/windows/lateral_movement_dcom_mmc20.toml
- rules/windows/lateral_movement_dcom_shellwindow_shellbrowserwindow.toml
- rules/windows/lateral_movement_execution_from_tsclient_mup.toml
- rules/windows/lateral_movement_execution_via_file_shares_sequence.toml
- rules/windows/lateral_movement_incoming_wmi.toml
- rules/windows/lateral_movement_mount_hidden_or_webdav_share_net.toml
- rules/windows/lateral_movement_rdp_sharprdp_target.toml
- rules/windows/lateral_movement_remote_file_copy_hidden_share.toml
- rules/windows/lateral_movement_remote_services.toml
- rules/windows/persistence_app_compat_shim.toml
- rules/windows/persistence_powershell_exch_mailbox_activesync_add_device.toml
- rules/windows/persistence_priv_escalation_via_accessibility_features.toml
- rules/windows/persistence_runtime_run_key_startup_susp_procs.toml
- rules/windows/persistence_startup_folder_file_written_by_unsigned_process.toml
- rules/windows/persistence_system_shells_via_services.toml
- rules/windows/persistence_user_account_creation.toml
- rules/windows/persistence_via_application_shimming.toml
- rules/windows/persistence_via_telemetrycontroller_scheduledtask_hijack.toml
- rules/windows/persistence_via_windows_management_instrumentation_event_subscription.toml
- rules/windows/privilege_escalation_named_pipe_impersonation.toml
- rules/windows/privilege_escalation_uac_bypass_com_clipup.toml
- rules/windows/privilege_escalation_uac_bypass_com_ieinstal.toml
- rules/windows/privilege_escalation_uac_bypass_com_interface_icmluautil.toml
- rules/windows/privilege_escalation_uac_bypass_event_viewer.toml
- rules/windows/privilege_escalation_uac_bypass_mock_windir.toml
- rules/windows/privilege_escalation_uac_bypass_winfw_mmc_hijack.toml
- rules/windows/privilege_escalation_unusual_parentchild_relationship.toml
- rules/windows/privilege_escalation_unusual_svchost_childproc_childless.toml

(selectively cherry picked from commit d52c0d2257)
2022-09-19 18:07:30 +00:00
..