forked from SigmaHQ/sigma
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
chore: move rules to new folders (SigmaHQ#4205)
- Loading branch information
Showing
203 changed files
with
145 additions
and
32 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
# Operation Wocao | ||
|
||
## Summary | ||
|
||
Operation Wocao (我操, “Wǒ cāo”, used as “shit” or “damn”) is the name that Fox-IT uses to describe the hacking activities of a Chinese based hacking group. | ||
|
||
You can find more information on the threat in the following articles: | ||
|
||
- [Operation Wocao Shining a light on one of China’s hidden hacking groups](https://web.archive.org/web/20200215212348/https://resources.fox-it.com/rs/170-CAK-271/images/201912_Report_Operation_Wocao.pdf) |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
1 change: 1 addition & 0 deletions
1
rules-emerging-threats/2020/TA/SolarWinds-Supply-Chain/README.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
# SolarWinds’ Orion Supply Chain |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
9 changes: 9 additions & 0 deletions
9
rules-emerging-threats/2021/Exploits/VisualDoor-Exploit/README.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
# VisualDoor: SonicWall SSL-VPN Exploit | ||
|
||
## Summary | ||
|
||
SonicWall "Virtual Office" SSL-VPN Products ship an old version of Bash that's vulnerable to ShellShock, and are therefore vulnerable to an unauthenticated remote code execution (as a “nobody” user) via the `/cgi-bin/jarrewrite.sh` URL. | ||
|
||
## Rules | ||
|
||
- [SonicWall SSL/VPN Jarrewrite Exploitation](./web_sonicwall_jarrewrite_exploit.yml) |
7 changes: 4 additions & 3 deletions
7
...eric/web_sonicwall_jarrewrite_exploit.yml → ...loit/web_sonicwall_jarrewrite_exploit.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
Empty file.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1,9 @@ | ||
TBD | ||
# Emerging Threats Rules | ||
|
||
This folder contains rules that belongs to the "emerging-threats" category of SIGMA. This category aims to cover specific threats that are timely and relevant for certain periods of time. These threats include specific APT campaigns, exploitation of Zero-Day vulnerabilities, specific malware used during an attack,...etc. | ||
|
||
The folder structure is split by year and every folder can contain two sub-folders | ||
|
||
- `Exploits`: Contains specific rules that cover exploitation of vulnerabilities. | ||
- `Malware`: Contains specific rules that cover malware, ransomware and any type of suspicious software used by Threat Actors or malicious actors | ||
- `TA`: Contains specific rules that cover APT, Threat Actor and malware activities. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
6 changes: 3 additions & 3 deletions
6
...urity/win_security_access_token_abuse.yml → ...ement/win_security_access_token_abuse.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
27 changes: 27 additions & 0 deletions
27
...n/security/account_management/win_security_member_added_security_enabled_global_group.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
title: A Member Was Added to a Security-Enabled Global Group | ||
id: c43c26be-2e87-46c7-8661-284588c5a53e | ||
related: | ||
- id: 9cf01b6c-e723-4841-a868-6d7f8245ca6e | ||
type: obsoletes | ||
status: stable | ||
description: Detects activity when a member is added to a security-enabled global group | ||
references: | ||
- https://www.cisecurity.org/controls/cis-controls-list/ | ||
- https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf | ||
- https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf | ||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4728 | ||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=632 | ||
author: Alexandr Yampolskyi, SOC Prime | ||
date: 2023/04/26 | ||
logsource: | ||
product: windows | ||
service: security | ||
detection: | ||
selection: | ||
EventID: | ||
- 4728 # A member was added to a security-enabled global group | ||
- 632 # Security Enabled Global Group Member Added | ||
condition: selection | ||
falsepositives: | ||
- Unknown | ||
level: low |
27 changes: 27 additions & 0 deletions
27
...security/account_management/win_security_member_removed_security_enabled_global_group.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
title: A Member Was Removed From a Security-Enabled Global Group | ||
id: 02c39d30-02b5-45d2-b435-8aebfe5a8629 | ||
related: | ||
- id: 9cf01b6c-e723-4841-a868-6d7f8245ca6e | ||
type: obsoletes | ||
status: stable | ||
description: Detects activity when a member is removed from a security-enabled global group | ||
references: | ||
- https://www.cisecurity.org/controls/cis-controls-list/ | ||
- https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf | ||
- https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf | ||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4729 | ||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=633 | ||
author: Alexandr Yampolskyi, SOC Prime | ||
date: 2023/04/26 | ||
logsource: | ||
product: windows | ||
service: security | ||
detection: | ||
selection: | ||
EventID: | ||
- 633 # Security Enabled Global Group Member Removed | ||
- 4729 # A member was removed from a security-enabled global group | ||
condition: selection | ||
falsepositives: | ||
- Unknown | ||
level: low |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
27 changes: 27 additions & 0 deletions
27
...uiltin/security/account_management/win_security_security_enabled_global_group_deleted.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
title: A Security-Enabled Global Group Was Deleted | ||
id: b237c54b-0f15-4612-a819-44b735e0de27 | ||
related: | ||
- id: 9cf01b6c-e723-4841-a868-6d7f8245ca6e | ||
type: obsoletes | ||
status: stable | ||
description: Detects activity when a security-enabled global group is deleted | ||
references: | ||
- https://www.cisecurity.org/controls/cis-controls-list/ | ||
- https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf | ||
- https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf | ||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4730 | ||
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=634 | ||
author: Alexandr Yampolskyi, SOC Prime | ||
date: 2023/04/26 | ||
logsource: | ||
product: windows | ||
service: security | ||
detection: | ||
selection: | ||
EventID: | ||
- 4730 # A security-enabled global group was deleted | ||
- 634 # Security Enabled Global Group Deleted | ||
condition: selection | ||
falsepositives: | ||
- Unknown | ||
level: low |
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters