Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

optional actions/CoA field? #8

Closed
juju4 opened this issue Mar 6, 2017 · 2 comments
Closed

optional actions/CoA field? #8

juju4 opened this issue Mar 6, 2017 · 2 comments

Comments

@juju4
Copy link
Contributor

juju4 commented Mar 6, 2017

Hello,

Any plans for suggested actions in the schema?
I know it's pretty broad and environment dependent but it could be an interesting optional field
for example

  • retrieve executable on lnx_buffer_overflows and validate hash against VT/MHR
  • retrieve process tree
  • dump full memory
  • kill process
  • change network vlan or any other containment actions

Depending on implementation, it could be leveraged to automate part of the incident response with tools like ansible, puppet & co
Also LimaCharlie (https://github.com/refractionPOINT/limacharlie) is doing automated response based on python

kind of related to CoA mentionned on MISP project perspective issue.

Thanks a lot for this great contribution!

@athiasjerome
Copy link

That would be a nice feature. Also I would suggest implementation compatible with OpenC2
Ref. https://github.com/OpenC2-org

@thomaspatzke
Copy link
Member

We would keep the Sigma core format focused and therefore don't plan such an extension. But feel free to extend your Sigma rules with additional fields, the tools from this repository only care about defined fields and ignore custom ones.

neu5ron pushed a commit to neu5ron/sigma that referenced this issue May 2, 2020
rtkdmasse pushed a commit to rtkdmasse/sigma that referenced this issue Dec 23, 2020
Fix application rule by splitting into two rules
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants