Skip to content

Commit 598d29f

Browse files
authored
Merge PR #4950 from @nasbench - Comply With v2 Spec Changes
chore: change tags, date, modified fields to comply with v2 of the Sigma spec. chore: update the related type from `obsoletes` to `obsolete`. chore: update local json schema to the latest version.
1 parent c8a3761 commit 598d29f

File tree

3,405 files changed

+9146
-9125
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

3,405 files changed

+9146
-9125
lines changed

.github/workflows/sigma-test.yml

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,8 +75,7 @@ jobs:
7575
python-version: 3.11
7676
- name: Install dependencies
7777
run: |
78-
# pip install sigma-cli~=0.7.1
79-
pip install pysigma==0.11.9
78+
pip install pysigma
8079
pip install sigma-cli
8180
pip install pySigma-validators-sigmahq==0.7.0
8281
- name: Test Sigma Rule Syntax

other/godmode_sigma_rule.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,8 +18,8 @@ id: def6caac-a999-4fc9-8800-cfeff700ba98
1818
description: 'PoC rule to detect malicious activity - following the principle: if you had only one shot, what would you look for?'
1919
status: experimental
2020
author: Florian Roth (Nextron Systems)
21-
date: 2019/12/22
22-
modified: 2022/08/04
21+
date: 2019-12-22
22+
modified: 2022-08-04
2323
level: high
2424
action: global
2525
---

rules-emerging-threats/2010/Exploits/CVE-2010-5278/web_cve_2010_5278_exploitation_attempt.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ description: |
77
references:
88
- https://github.com/projectdiscovery/nuclei-templates
99
author: Subhash Popuri (@pbssubhash)
10-
date: 2021/08/25
11-
modified: 2023/01/02
10+
date: 2021-08-25
11+
modified: 2023-01-02
1212
tags:
13-
- attack.initial_access
13+
- attack.initial-access
1414
- attack.t1190
15-
- cve.2010.5278
16-
- detection.emerging_threats
15+
- cve.2010-5278
16+
- detection.emerging-threats
1717
logsource:
1818
category: webserver
1919
detection:

rules-emerging-threats/2014/Exploits/CVE-2014-6287/web_cve_2014_6287_hfs_rce.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,14 @@ references:
77
- https://www.exploit-db.com/exploits/39161
88
- https://github.com/Twigonometry/Cybersecurity-Notes/blob/c875b0f52df7d2c7a870e75e1f0c2679d417931d/Writeups/Hack%20the%20Box/Boxes/Optimum/10%20-%20Website.md
99
author: Nasreddine Bencherchali (Nextron Systems)
10-
date: 2022/07/19
11-
modified: 2023/01/02
10+
date: 2022-07-19
11+
modified: 2023-01-02
1212
tags:
13-
- attack.initial_access
13+
- attack.initial-access
1414
- attack.t1190
1515
- attack.t1505.003
16-
- cve.2014.6287
17-
- detection.emerging_threats
16+
- cve.2014-6287
17+
- detection.emerging-threats
1818
logsource:
1919
category: webserver
2020
detection:

rules-emerging-threats/2014/TA/Axiom/proc_creation_win_apt_zxshell.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,16 +6,16 @@ references:
66
- https://www.hybrid-analysis.com/sample/5d2a4cde9fa7c2fdbf39b2e2ffd23378d0c50701a3095d1e91e3cf922d7b0b16?environmentId=100
77
- https://pub-7cb8ac806c1b4c4383e585c474a24719.r2.dev/116309e7121bc8b0e66e4166c06f7b818e1d3629.pdf
88
author: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro
9-
date: 2017/07/20
10-
modified: 2021/11/27
9+
date: 2017-07-20
10+
modified: 2021-11-27
1111
tags:
1212
- attack.execution
1313
- attack.t1059.003
14-
- attack.defense_evasion
14+
- attack.defense-evasion
1515
- attack.t1218.011
1616
- attack.s0412
1717
- attack.g0001
18-
- detection.emerging_threats
18+
- detection.emerging-threats
1919
logsource:
2020
category: process_creation
2121
product: windows

rules-emerging-threats/2014/TA/Turla/proc_creation_win_apt_turla_commands_critical.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,18 +5,18 @@ description: Detects automated lateral movement by Turla group
55
references:
66
- https://securelist.com/the-epic-turla-operation/65545/
77
author: Markus Neis
8-
date: 2017/11/07
9-
modified: 2022/10/09
8+
date: 2017-11-07
9+
modified: 2022-10-09
1010
tags:
1111
- attack.g0010
1212
- attack.execution
1313
- attack.t1059
14-
- attack.lateral_movement
14+
- attack.lateral-movement
1515
- attack.t1021.002
1616
- attack.discovery
1717
- attack.t1083
1818
- attack.t1135
19-
- detection.emerging_threats
19+
- detection.emerging-threats
2020
logsource:
2121
category: process_creation
2222
product: windows

rules-emerging-threats/2014/TA/Turla/proc_creation_win_apt_turla_comrat_may20.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@ description: Detects commands used by Turla group as reported by ESET in May 202
55
references:
66
- https://www.welivesecurity.com/wp-content/uploads/2020/05/ESET_Turla_ComRAT.pdf
77
author: Florian Roth (Nextron Systems)
8-
date: 2020/05/26
9-
modified: 2021/11/27
8+
date: 2020-05-26
9+
modified: 2021-11-27
1010
tags:
1111
- attack.g0010
1212
- attack.execution
1313
- attack.t1059.001
1414
- attack.t1053.005
1515
- attack.t1027
16-
- detection.emerging_threats
16+
- detection.emerging-threats
1717
logsource:
1818
category: process_creation
1919
product: windows

rules-emerging-threats/2015/Exploits/CVE-2015-1641/proc_creation_win_exploit_cve_2015_1641.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,13 +6,13 @@ references:
66
- https://www.virustotal.com/en/file/5567408950b744c4e846ba8ae726883cb15268a539f3bb21758a466e47021ae8/analysis/
77
- https://www.hybrid-analysis.com/sample/5567408950b744c4e846ba8ae726883cb15268a539f3bb21758a466e47021ae8?environmentId=100
88
author: Florian Roth (Nextron Systems)
9-
date: 2018/02/22
10-
modified: 2021/11/27
9+
date: 2018-02-22
10+
modified: 2021-11-27
1111
tags:
12-
- attack.defense_evasion
12+
- attack.defense-evasion
1313
- attack.t1036.005
14-
- cve.2015.1641
15-
- detection.emerging_threats
14+
- cve.2015-1641
15+
- detection.emerging-threats
1616
logsource:
1717
category: process_creation
1818
product: windows

rules-emerging-threats/2017/Exploits/CVE-2017-0261/proc_creation_win_exploit_cve_2017_0261.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,16 @@ description: Detects Winword starting uncommon sub process FLTLDR.exe as used in
55
references:
66
- https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html
77
author: Florian Roth (Nextron Systems)
8-
date: 2018/02/22
9-
modified: 2021/11/27
8+
date: 2018-02-22
9+
modified: 2021-11-27
1010
tags:
1111
- attack.execution
1212
- attack.t1203
1313
- attack.t1204.002
14-
- attack.initial_access
14+
- attack.initial-access
1515
- attack.t1566.001
16-
- cve.2017.0261
17-
- detection.emerging_threats
16+
- cve.2017-0261
17+
- detection.emerging-threats
1818
logsource:
1919
category: process_creation
2020
product: windows

rules-emerging-threats/2017/Exploits/CVE-2017-11882/proc_creation_win_exploit_cve_2017_11882.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,16 +7,16 @@ references:
77
- https://www.linkedin.com/pulse/exploit-available-dangerous-ms-office-rce-vuln-called-thebenygreen-
88
- https://github.com/embedi/CVE-2017-11882
99
author: Florian Roth (Nextron Systems)
10-
date: 2017/11/23
11-
modified: 2021/11/27
10+
date: 2017-11-23
11+
modified: 2021-11-27
1212
tags:
1313
- attack.execution
1414
- attack.t1203
1515
- attack.t1204.002
16-
- attack.initial_access
16+
- attack.initial-access
1717
- attack.t1566.001
18-
- cve.2017.11882
19-
- detection.emerging_threats
18+
- cve.2017-11882
19+
- detection.emerging-threats
2020
logsource:
2121
category: process_creation
2222
product: windows

0 commit comments

Comments
 (0)