Files
hayabusa/rules/Sigma/win_av_relevant_match.yml
2021-11-14 11:00:56 +09:00

24 lines
874 B
YAML

title: Relevant Anti-Virus Event
author: Florian Roth
date: 2017/02/19
description: This detection method points out highly relevant Antivirus events
detection:
condition: ((HTool- or Hacktool or ASP/Backdoor or JSP/Backdoor or PHP/Backdoor
or Backdoor.ASP or Backdoor.JSP or Backdoor.PHP or Webshell or Portscan or
Mimikatz or WinCred or PlugX or Korplug or Pwdump or Chopper or WmiExec or
Xscan or Clearlog or ASPXSpy) and not (Keygen or Crack))
falsepositives:
- Some software piracy tools (key generators, cracks) are classified as hack tools
id: 78bc5783-81d9-4d73-ac97-59f6db4f72a8
level: high
logsource:
product: windows
service: application
modified: 2021/07/28
tags:
- attack.resource_development
- attack.t1588
yml_filename: win_av_relevant_match.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/builtin