fixed test
This commit is contained in:
@@ -1,5 +1,5 @@
|
|||||||
title: Sysmon Check command lines
|
title: Excluded Rule Test 1
|
||||||
id : 4fe151c2-ecf9-4fae-95ae-b88ec9c2fca6
|
id : 00000000-0000-0000-0000-000000000000
|
||||||
description: hogehoge
|
description: hogehoge
|
||||||
enabled: true
|
enabled: true
|
||||||
author: Yea
|
author: Yea
|
||||||
|
|||||||
@@ -1,13 +1,10 @@
|
|||||||
title: Possible Exploitation of Exchange RCE CVE-2021-42321
|
title: Excluded Rule 2
|
||||||
author: Florian Roth, @testanull
|
|
||||||
date: 2021/11/18
|
date: 2021/11/18
|
||||||
description: Detects log entries that appear in exploitation attempts against MS Exchange
|
|
||||||
RCE CVE-2021-42321
|
|
||||||
detection:
|
detection:
|
||||||
condition: 'Cmdlet failed. Cmdlet Get-App, '
|
condition: 'Cmdlet failed. Cmdlet Get-App, '
|
||||||
falsepositives:
|
falsepositives:
|
||||||
- Unknown, please report false positives via https://github.com/SigmaHQ/sigma/issues
|
- Unknown, please report false positives via https://github.com/SigmaHQ/sigma/issues
|
||||||
id: c92f1896-d1d2-43c3-92d5-7a5b35c217bb
|
id: 00000000-0000-0000-0000-000000000000
|
||||||
level: critical
|
level: critical
|
||||||
logsource:
|
logsource:
|
||||||
product: windows
|
product: windows
|
||||||
@@ -15,7 +12,4 @@ logsource:
|
|||||||
references:
|
references:
|
||||||
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42321
|
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-42321
|
||||||
status: experimental
|
status: experimental
|
||||||
tags:
|
|
||||||
- attack.lateral_movement
|
|
||||||
- attack.t1210
|
|
||||||
ruletype: SIGMA
|
ruletype: SIGMA
|
||||||
|
|||||||
@@ -1,8 +1,5 @@
|
|||||||
title: Hidden Local User Creation
|
title: Excluded Rule 3
|
||||||
author: Christian Burkard
|
|
||||||
date: 2021/05/03
|
date: 2021/05/03
|
||||||
description: Detects the creation of a local hidden user account which should not
|
|
||||||
happen for event ID 4720.
|
|
||||||
detection:
|
detection:
|
||||||
SELECTION_1:
|
SELECTION_1:
|
||||||
EventID: 4720
|
EventID: 4720
|
||||||
@@ -14,7 +11,7 @@ falsepositives:
|
|||||||
fields:
|
fields:
|
||||||
- EventCode
|
- EventCode
|
||||||
- AccountName
|
- AccountName
|
||||||
id: 7b449a5e-1db5-4dd0-a2dc-4e3a67282538
|
id: 00000000-0000-0000-0000-000000000000
|
||||||
level: high
|
level: high
|
||||||
logsource:
|
logsource:
|
||||||
product: windows
|
product: windows
|
||||||
@@ -22,7 +19,4 @@ logsource:
|
|||||||
references:
|
references:
|
||||||
- https://twitter.com/SBousseaden/status/1387743867663958021
|
- https://twitter.com/SBousseaden/status/1387743867663958021
|
||||||
status: experimental
|
status: experimental
|
||||||
tags:
|
|
||||||
- attack.persistence
|
|
||||||
- attack.t1136.001
|
|
||||||
ruletype: SIGMA
|
ruletype: SIGMA
|
||||||
|
|||||||
@@ -1,8 +1,5 @@
|
|||||||
title: User Added to Local Administrators
|
title: Excluded Rule 4
|
||||||
author: Florian Roth
|
|
||||||
date: 2017/03/14
|
date: 2017/03/14
|
||||||
description: This rule triggers on user accounts that are added to the local Administrators
|
|
||||||
group, which could be legitimate activity or a sign of privilege escalation activity
|
|
||||||
detection:
|
detection:
|
||||||
SELECTION_1:
|
SELECTION_1:
|
||||||
EventID: 4732
|
EventID: 4732
|
||||||
@@ -13,18 +10,11 @@ detection:
|
|||||||
SELECTION_4:
|
SELECTION_4:
|
||||||
SubjectUserName: '*$'
|
SubjectUserName: '*$'
|
||||||
condition: ((SELECTION_1 and (SELECTION_2 or SELECTION_3)) and not (SELECTION_4))
|
condition: ((SELECTION_1 and (SELECTION_2 or SELECTION_3)) and not (SELECTION_4))
|
||||||
falsepositives:
|
id: 00000000-0000-0000-0000-000000000000
|
||||||
- Legitimate administrative activity
|
|
||||||
id: c265cf08-3f99-46c1-8d59-328247057d57
|
|
||||||
level: medium
|
level: medium
|
||||||
logsource:
|
logsource:
|
||||||
product: windows
|
product: windows
|
||||||
service: security
|
service: security
|
||||||
modified: 2021/07/07
|
modified: 2021/07/07
|
||||||
status: stable
|
status: stable
|
||||||
tags:
|
|
||||||
- attack.privilege_escalation
|
|
||||||
- attack.t1078
|
|
||||||
- attack.persistence
|
|
||||||
- attack.t1098
|
|
||||||
ruletype: SIGMA
|
ruletype: SIGMA
|
||||||
|
|||||||
@@ -1,9 +1,5 @@
|
|||||||
title: Local User Creation
|
title: Excluded Rule 5
|
||||||
author: Patrick Bareiss
|
|
||||||
date: 2019/04/18
|
date: 2019/04/18
|
||||||
description: Detects local user creation on windows servers, which shouldn't happen
|
|
||||||
in an Active Directory environment. Apply this Sigma Use Case on your windows server
|
|
||||||
logs and not on your DC logs.
|
|
||||||
detection:
|
detection:
|
||||||
SELECTION_1:
|
SELECTION_1:
|
||||||
EventID: 4720
|
EventID: 4720
|
||||||
@@ -15,7 +11,7 @@ fields:
|
|||||||
- EventCode
|
- EventCode
|
||||||
- AccountName
|
- AccountName
|
||||||
- AccountDomain
|
- AccountDomain
|
||||||
id: 66b6be3d-55d0-4f47-9855-d69df21740ea
|
id: 00000000-0000-0000-0000-000000000000
|
||||||
level: low
|
level: low
|
||||||
logsource:
|
logsource:
|
||||||
product: windows
|
product: windows
|
||||||
@@ -24,8 +20,4 @@ modified: 2020/08/23
|
|||||||
references:
|
references:
|
||||||
- https://patrick-bareiss.com/detecting-local-user-creation-in-ad-with-sigma/
|
- https://patrick-bareiss.com/detecting-local-user-creation-in-ad-with-sigma/
|
||||||
status: experimental
|
status: experimental
|
||||||
tags:
|
|
||||||
- attack.persistence
|
|
||||||
- attack.t1136
|
|
||||||
- attack.t1136.001
|
|
||||||
ruletype: SIGMA
|
ruletype: SIGMA
|
||||||
|
|||||||
@@ -1,7 +1,5 @@
|
|||||||
title: WMI Event Subscription
|
title: Noisy Rule Test1
|
||||||
author: Tom Ueltschi (@c_APT_ure)
|
|
||||||
date: 2019/01/12
|
date: 2019/01/12
|
||||||
description: Detects creation of WMI event subscription persistence method
|
|
||||||
detection:
|
detection:
|
||||||
SELECTION_1:
|
SELECTION_1:
|
||||||
EventID: 19
|
EventID: 19
|
||||||
@@ -12,7 +10,7 @@ detection:
|
|||||||
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3)
|
condition: (SELECTION_1 or SELECTION_2 or SELECTION_3)
|
||||||
falsepositives:
|
falsepositives:
|
||||||
- exclude legitimate (vetted) use of WMI event subscription in your network
|
- exclude legitimate (vetted) use of WMI event subscription in your network
|
||||||
id: 0f06a3a5-6a09-413f-8743-e6cf35561297
|
id: 0090ea60-f4a2-43a8-8657-3a9a4ddcf547
|
||||||
level: high
|
level: high
|
||||||
logsource:
|
logsource:
|
||||||
category: wmi_event
|
category: wmi_event
|
||||||
|
|||||||
@@ -1,9 +1,6 @@
|
|||||||
title: Rare Schtasks Creations
|
title: Noisy Rule Test2
|
||||||
author: Florian Roth
|
|
||||||
date: 2017/03/23
|
date: 2017/03/23
|
||||||
description: Detects rare scheduled tasks creations that only appear a few times per
|
description: excluded rule
|
||||||
time frame and could reveal password dumpers, backdoor installs or other types of
|
|
||||||
malicious code
|
|
||||||
detection:
|
detection:
|
||||||
SELECTION_1:
|
SELECTION_1:
|
||||||
EventID: 4698
|
EventID: 4698
|
||||||
@@ -11,21 +8,6 @@ detection:
|
|||||||
falsepositives:
|
falsepositives:
|
||||||
- Software installation
|
- Software installation
|
||||||
- Software updates
|
- Software updates
|
||||||
id: b0d77106-7bb0-41fe-bd94-d1752164d066
|
id: 8b8db936-172e-4bb7-9f84-ccc954d51d93
|
||||||
level: low
|
level: low
|
||||||
logsource:
|
|
||||||
definition: The Advanced Audit Policy setting Object Access > Audit Other Object
|
|
||||||
Access Events has to be configured to allow this detection (not in the baseline
|
|
||||||
recommendations by Microsoft). We also recommend extracting the Command field
|
|
||||||
from the embedded XML in the event data.
|
|
||||||
product: windows
|
|
||||||
service: security
|
|
||||||
status: experimental
|
|
||||||
tags:
|
|
||||||
- attack.execution
|
|
||||||
- attack.privilege_escalation
|
|
||||||
- attack.persistence
|
|
||||||
- attack.t1053
|
|
||||||
- car.2013-08-001
|
|
||||||
- attack.t1053.005
|
|
||||||
ruletype: SIGMA
|
ruletype: SIGMA
|
||||||
|
|||||||
@@ -1,26 +1,13 @@
|
|||||||
title: Rare Service Installs
|
title: Noisy Rule Test 3
|
||||||
author: Florian Roth
|
|
||||||
date: 2017/03/08
|
date: 2017/03/08
|
||||||
description: Detects rare service installs that only appear a few times per time frame
|
|
||||||
and could reveal password dumpers, backdoor installs or other types of malicious
|
|
||||||
services
|
|
||||||
detection:
|
detection:
|
||||||
SELECTION_1:
|
SELECTION_1:
|
||||||
EventID: 7045
|
EventID: 7045
|
||||||
condition: SELECTION_1 | count() by ServiceFileName < 5
|
condition: SELECTION_1 | count() by ServiceFileName < 5
|
||||||
falsepositives:
|
id: 1703ba97-b2c2-4071-a241-a16d017d25d3
|
||||||
- Software installation
|
|
||||||
- Software updates
|
|
||||||
id: 66bfef30-22a5-4fcd-ad44-8d81e60922ae
|
|
||||||
level: low
|
level: low
|
||||||
logsource:
|
logsource:
|
||||||
product: windows
|
product: windows
|
||||||
service: system
|
service: system
|
||||||
status: experimental
|
status: experimental
|
||||||
tags:
|
|
||||||
- attack.persistence
|
|
||||||
- attack.privilege_escalation
|
|
||||||
- attack.t1050
|
|
||||||
- car.2013-09-005
|
|
||||||
- attack.t1543.003
|
|
||||||
ruletype: SIGMA
|
ruletype: SIGMA
|
||||||
|
|||||||
@@ -1,8 +1,5 @@
|
|||||||
title: Failed Logins with Different Accounts from Single Source System
|
title: Noisy Rule Test 4
|
||||||
author: Florian Roth
|
|
||||||
date: 2017/01/10
|
date: 2017/01/10
|
||||||
description: Detects suspicious failed logins with different user accounts from a
|
|
||||||
single source system
|
|
||||||
detection:
|
detection:
|
||||||
SELECTION_1:
|
SELECTION_1:
|
||||||
EventID: 529
|
EventID: 529
|
||||||
@@ -14,20 +11,11 @@ detection:
|
|||||||
WorkstationName: '*'
|
WorkstationName: '*'
|
||||||
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3 and SELECTION_4) | count(TargetUserName)
|
condition: ((SELECTION_1 or SELECTION_2) and SELECTION_3 and SELECTION_4) | count(TargetUserName)
|
||||||
by WorkstationName > 3
|
by WorkstationName > 3
|
||||||
falsepositives:
|
id: 9f5663ce-6205-4753-b486-fb8498d1fae5
|
||||||
- Terminal servers
|
|
||||||
- Jump servers
|
|
||||||
- Other multiuser systems like Citrix server farms
|
|
||||||
- Workstations with frequently changing users
|
|
||||||
id: e98374a6-e2d9-4076-9b5c-11bdb2569995
|
|
||||||
level: medium
|
level: medium
|
||||||
logsource:
|
logsource:
|
||||||
product: windows
|
product: windows
|
||||||
service: security
|
service: security
|
||||||
modified: 2021/09/21
|
modified: 2021/09/21
|
||||||
status: experimental
|
status: experimental
|
||||||
tags:
|
|
||||||
- attack.persistence
|
|
||||||
- attack.privilege_escalation
|
|
||||||
- attack.t1078
|
|
||||||
ruletype: SIGMA
|
ruletype: SIGMA
|
||||||
|
|||||||
@@ -1,8 +1,5 @@
|
|||||||
title: Failed Logins with Different Accounts from Single Source System
|
title: Noisy Rule Test 5
|
||||||
author: Florian Roth
|
|
||||||
date: 2017/01/10
|
date: 2017/01/10
|
||||||
description: Detects suspicious failed logins with different user accounts from a
|
|
||||||
single source system
|
|
||||||
detection:
|
detection:
|
||||||
SELECTION_1:
|
SELECTION_1:
|
||||||
EventID: 4776
|
EventID: 4776
|
||||||
@@ -12,23 +9,11 @@ detection:
|
|||||||
Workstation: '*'
|
Workstation: '*'
|
||||||
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3) | count(TargetUserName)
|
condition: (SELECTION_1 and SELECTION_2 and SELECTION_3) | count(TargetUserName)
|
||||||
by Workstation > 3
|
by Workstation > 3
|
||||||
falsepositives:
|
id: 3546ce10-19b4-4c4c-9658-f4f3b5d27ae9
|
||||||
- Terminal servers
|
|
||||||
- Jump servers
|
|
||||||
- Other multiuser systems like Citrix server farms
|
|
||||||
- Workstations with frequently changing users
|
|
||||||
id: 6309ffc4-8fa2-47cf-96b8-a2f72e58e538
|
|
||||||
level: medium
|
level: medium
|
||||||
logsource:
|
logsource:
|
||||||
product: windows
|
product: windows
|
||||||
service: security
|
service: security
|
||||||
modified: 2021/09/21
|
modified: 2021/09/21
|
||||||
related:
|
|
||||||
- id: e98374a6-e2d9-4076-9b5c-11bdb2569995
|
|
||||||
type: derived
|
|
||||||
status: experimental
|
status: experimental
|
||||||
tags:
|
|
||||||
- attack.persistence
|
|
||||||
- attack.privilege_escalation
|
|
||||||
- attack.t1078
|
|
||||||
ruletype: SIGMA
|
ruletype: SIGMA
|
||||||
|
|||||||
Reference in New Issue
Block a user