forked from SigmaHQ/sigma
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Florian Roth
committed
Feb 10, 2017
1 parent
97847a2
commit a2adb1d
Showing
17 changed files
with
165 additions
and
4 deletions.
There are no files selected for viewing
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
title: Webshell Detection by Keyword | ||
description: Detects webshells that use GET requests by keyword sarches in URL strings | ||
detection: | ||
selection: | ||
- log: | ||
- access.log | ||
- error.log | ||
keywords: | ||
- '=whoami' | ||
- '=net%20user' | ||
- '=cmd%20/c%20' | ||
condition: selection and keywords | ||
falsepositives: | ||
- Web sites like wikis with articles on os commands and pages that include the os commands in the URLs | ||
- User searches in search boxes of the respective website | ||
level: 70 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
title: Kerberos Manipulation | ||
description: This method triggers on rare Kerberos Failure Codes caused by manipulations of Kerberos messages | ||
detection: | ||
selection: | ||
- EventLog: Security | ||
EventID: | ||
- 675 | ||
- 4768 | ||
- 4769 | ||
- 4771 | ||
FailureCode: | ||
- '0x9' | ||
- '0xA' | ||
- '0xB' | ||
- '0xF' | ||
- '0x10' | ||
- '0x11' | ||
- '0x13' | ||
- '0x14' | ||
- '0x1A' | ||
- '0x1F' | ||
- '0x21' | ||
- '0x22' | ||
- '0x23' | ||
- '0x24' | ||
- '0x26' | ||
- '0x27' | ||
- '0x28' | ||
- '0x29' | ||
- '0x2C' | ||
- '0x2D' | ||
- '0x2E' | ||
- '0x2F' | ||
- '0x31' | ||
- '0x32' | ||
- '0x3E' | ||
- '0x3F' | ||
- '0x40' | ||
- '0x41' | ||
- '0x43' | ||
- '0x44' | ||
condition: selection | ||
falsepositives: | ||
- Faulty legacy applications | ||
level: 70 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
title: Kerberos Manipulation | ||
description: This method triggers on rare Kerberos Failure Codes caused by manipulations of Kerberos messages | ||
detection: | ||
selection: | ||
- EventLog: Security | ||
EventID: | ||
- 675 | ||
- 4768 | ||
- 4769 | ||
- 4771 | ||
FailureCode: | ||
- '0x9' | ||
- '0xA' | ||
- '0xB' | ||
- '0xF' | ||
- '0x10' | ||
- '0x11' | ||
- '0x13' | ||
- '0x14' | ||
- '0x1A' | ||
- '0x1F' | ||
- '0x21' | ||
- '0x22' | ||
- '0x23' | ||
- '0x24' | ||
- '0x26' | ||
- '0x27' | ||
- '0x28' | ||
- '0x29' | ||
- '0x2C' | ||
- '0x2D' | ||
- '0x2E' | ||
- '0x2F' | ||
- '0x31' | ||
- '0x32' | ||
- '0x3E' | ||
- '0x3F' | ||
- '0x40' | ||
- '0x41' | ||
- '0x43' | ||
- '0x44' | ||
condition: selection | ||
falsepositives: | ||
- Faulty legacy applications | ||
level: 70 |
File renamed without changes.
35 changes: 35 additions & 0 deletions
35
rules/windows/sysmon/sysmon_mimikatz_inmemory_detection.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
title: Mimikatz In-Memory Detection | ||
status: experimental | ||
description: Detects certain DLL loads when Mimikatz gets executed | ||
reference: https://securityriskadvisors.com/blog/post/detecting-in-memory-mimikatz/ | ||
detection: | ||
dllload1: | ||
- EventLog: Microsoft-Windows-Sysmon/Operational | ||
- EventID: 7 | ||
- Image: 'C:\Windows\System32\rundll32.exe' | ||
- ImageLoaded: '*\vaultcli.dll' | ||
dllload2: | ||
- EventLog: Microsoft-Windows-Sysmon/Operational | ||
- EventID: 7 | ||
- Image: 'C:\Windows\System32\rundll32.exe' | ||
- ImageLoaded: '*\wlanapi.dll' | ||
exclusion: | ||
- EventLog: Microsoft-Windows-Sysmon/Operational | ||
- EventID: 7 | ||
- Image: 'C:\Windows\System32\rundll32.exe' | ||
- ImageLoaded: | ||
- 'ntdsapi.dll' | ||
- 'netapi32.dll' | ||
- 'imm32.dll' | ||
- 'samlib.dll' | ||
- 'combase.dll' | ||
- 'srvcli.dll' | ||
- 'shcore.dll' | ||
- 'ntasn1.dll' | ||
- 'cryptdll.dll' | ||
- 'logoncli.dll' | ||
timeframe: last 30s | ||
condition: ( dllload1 and dllload2 ) and not exclusion | ||
falsepositives: | ||
- unknown | ||
level: 50 |
File renamed without changes.
3 changes: 1 addition & 2 deletions
3
...dows/sysmon/vul_java_remote_debugging.yml → ...smon/sysmon_vul_java_remote_debugging.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
title: Webshell Detection With Command Line Keywords | ||
description: Detects certain command line parameters often used during reconnissaince activity via web shells | ||
detection: | ||
selection: | ||
- EventLog: Microsoft-Windows-Sysmon/Operational | ||
EventID: 1 | ||
ParentImage: | ||
- '*\apache*' | ||
- '*\tomcat*' | ||
CommandLine: | ||
- 'whoami' | ||
- 'net user' | ||
- 'ping -n' | ||
condition: selection | ||
falsepositives: | ||
- unknown | ||
level: 70 |