-
-
Notifications
You must be signed in to change notification settings - Fork 2.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[OSCD Sprint #1] Final Pull Request / Summary #554
Conversation
…operation.yml, win_syskey_registry_access.yml
…library.yml, sysmon_rdp_registry_modification.yml; modified win_account_backdoor_dcsync_rights.yml
win_non_interactive_powershell.yml win_remote_powershell_session.yml win_wmiprvse_spawning_process.yml powershell_alternate_powershell_hosts.yml powershell_remote_powershell_session.yml sysmon_alternate_powershell_hosts_moduleload.yml sysmon_alternate_powershell_hosts_pipe.yml sysmon_non_interactive_powershell_execution.yml sysmon_powershell_execution_moduleload.yml sysmon_powershell_execution_pipe.yml sysmon_remote_powershell_session_network.yml sysmon_remote_powershell_session_process.yml sysmon_wmi_module_load.yml sysmon_wmiprvse_spawning_process.yml
Added: 1. Additional tags for techniques as defined by Atomic Blue. 2. Detection for OriginalFileName as net.exe can easily be renamed. Part of oscd.community effort.
Updated tags to pass Travis CI checks.
…missions_weakness
fix some typos and remove redundant references
found in multiple internally analyzed malicious scripts (in the wild and as result of engagements)
- new rules: + rules/windows/builtin/win_susp_lsass_dump_generic.yml + rules/windows/builtin/win_transferring_files_with_credential_data_via_ne twork_shares.yml + rules/windows/builtin/win_remote_registry_management_using_reg_utility.y ml + rules/windows/sysmon/sysmon_unsigned_image_loaded_into_lsass.yml + rules/windows/sysmon/sysmon_lsass_memory_dump_file_creation.yml + rules/windows/sysmon/sysmon_raw_disk_access_using_illegitimate_tools.yml + rules/windows/sysmon/sysmon_cred_dump_tools_dropped_files.yml + rules/windows/sysmon/sysmon_cred_dump_tools_named_pipes.yml + rules/windows/process_creation/process_creation_shadow_copies_creation.y ml + rules/windows/process_creation/process_creation_shadow_copies_deletion.y ml + rules/windows/process_creation/process_creation_copying_sensitive_files_ with_credential_data.yml + rules/windows/process_creation/process_creation_shadow_copies_access_sym link.yml + rules/windows/process_creation/process_creation_grabbing_sensitive_hives _via_reg.yml + rules/windows/process_creation/process_creation_mimikatz_command_line.ym l + rules/windows/unsupported_logic/builtin/dumping_ntds.dit_via_dcsync.yml + rules/windows/unsupported_logic/builtin/dumping_ntds.dit_via_netsync.yml .yml - updated rules: + rules/windows/builtin/win_susp_raccess_sensitive_fext.yml + rules/windows/builtin/win_mal_creddumper.yml + rules/windows/builtin/win_mal_service_installs.yml + rules/windows/process_creation/win_susp_process_creations.yml + rules/windows/sysmon/sysmon_powershell_exploit_scripts.yml + rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml - deprecated rules: + rules/windows/process_creation/win_susp_vssadmin_ntds_activity.yml
Hello @thomaspatzke ! I see you've deleted rules/windows/process_creation/win_whoami_as_system.yml, developed by Teymur Kheirkhabarov, due to deduplication reasons. He presented this detection logic back in November 2018, and pushed the Sigma rule 2 month before it was added by @Neo23x0 . Would you mind if I will add this information to this rule? Please don't get me wrong, I am talking about adding the info, not replacing. |
Definitely deleted the wrong one by accident, I readd it. |
@yugoslavskiy thanks for your comments! I will incorporate the changes at the weekend and also give an answer on your comment regarding unsupported rules. |
I understand your point there. Generally the idea of the Sigma rule repository was that the rules are directly actionable. On the other side generating queries for an environment anyways requires some work (configuration, mapping, enabling log source, configuring security settings etc.) so why not. @Neo23x0 what do you think about it?
This can be accomplished by mapping the Imphash field to Hashes (already possible) and put wildcards around it (planned, very easy to implement). Therefore we decided shortly to keep the specific hash field to prevent that this important information about the hash type is lost in the rule. |
This reverts commit ba83b88.
From suggestions of @yugoslavskiy in issue #554.
Suggested changes implemented. Now need to make CI tests added meanwhile to master passing again. |
Made tests pass the new CI tests. Added further allowed lower case words in rule test.
Finally...it's merged! 😃 To all contributors: thanks a lot for this great contribution and sorry for the long qa delay! |
The last set of Sigma rules developed during the first OSCD sprint.
Summary
Tom Kern (NIL SOC) 🇸🇮
added 1 rule:
James Pemberton, @4A616D6573 (Hydro Tasmania) 🇦🇺
improved 2 rules:
Ian Davis (Tieto SOC) 🇨🇿
added 2 new rules:
Daniel Bohannon, @danielhbohannon (FireEye) 🇺🇸
added 3 rules:
Diego Perez, @darkquassar (Independent Researcher) 🇦🇷
added 3 new rules:
improved 1 rule:
Victor Sergeev, @stvetro (Help AG) 🇦🇪
added 4 new rules:
Teymur Kheirkhabarov, @HeirhabarovT (BI.ZONE SOC) 🇷🇺
added 6 new rules:
Jakob Weinzettl, @mrblacyk (Tieto SOC) 🇵🇱
added 7 new rules:
Rules shared by (Tieto SOC) 🇨🇿
added 9 new rules:
improved 1 rule:
Denis Beyu, (Independent Researcher) 🇷🇺
added 11 new rules:
Ilyas Ochkov, @CatSchrodinger (Independent Researcher) 🇷🇺
added 13 new rules:
BSI 🇩🇪
added 17 new rules:
improved 4 rules:
Daniil Yugoslavskiy, @yugoslavskiy (Atomic Threat Coverage) 🏳️
added 43 new rules:
improved 9 rules:
deprecated 2 rules: