@panguard-ai/panguard-guard 0.2.6 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (806) hide show
  1. package/bundled-rules/sigma-rules/community/2010/Exploits/CVE-2010-5278/web_cve_2010_5278_exploitation_attempt.yml +26 -0
  2. package/bundled-rules/sigma-rules/community/2014/Exploits/CVE-2014-6287/web_cve_2014_6287_hfs_rce.yml +40 -0
  3. package/bundled-rules/sigma-rules/community/2014/TA/Axiom/proc_creation_win_apt_zxshell.yml +31 -0
  4. package/bundled-rules/sigma-rules/community/2014/TA/Turla/proc_creation_win_apt_turla_commands_critical.yml +32 -0
  5. package/bundled-rules/sigma-rules/community/2014/TA/Turla/proc_creation_win_apt_turla_comrat_may20.yml +35 -0
  6. package/bundled-rules/sigma-rules/community/2015/Exploits/CVE-2015-1641/proc_creation_win_exploit_cve_2015_1641.yml +26 -0
  7. package/bundled-rules/sigma-rules/community/2017/Exploits/CVE-2017-0261/proc_creation_win_exploit_cve_2017_0261.yml +28 -0
  8. package/bundled-rules/sigma-rules/community/2017/Exploits/CVE-2017-11882/proc_creation_win_exploit_cve_2017_11882.yml +29 -0
  9. package/bundled-rules/sigma-rules/community/2017/Exploits/CVE-2017-8759/proc_creation_win_exploit_cve_2017_8759.yml +29 -0
  10. package/bundled-rules/sigma-rules/community/2017/Malware/Adwind-RAT/proc_creation_win_malware_adwind.yml +30 -0
  11. package/bundled-rules/sigma-rules/community/2017/Malware/CosmicDuke/win_security_mal_cosmik_duke_persistence.yml +33 -0
  12. package/bundled-rules/sigma-rules/community/2017/Malware/Fireball/proc_creation_win_malware_fireball.yml +27 -0
  13. package/bundled-rules/sigma-rules/community/2017/Malware/Hancitor/proc_access_win_malware_verclsid_shellcode.yml +33 -0
  14. package/bundled-rules/sigma-rules/community/2017/Malware/NotPetya/proc_creation_win_malware_notpetya.yml +38 -0
  15. package/bundled-rules/sigma-rules/community/2017/Malware/PlugX/proc_creation_win_malware_plugx_susp_exe_locations.yml +96 -0
  16. package/bundled-rules/sigma-rules/community/2017/Malware/StoneDrill/win_system_apt_stonedrill.yml +28 -0
  17. package/bundled-rules/sigma-rules/community/2017/Malware/WannaCry/proc_creation_win_malware_wannacry.yml +44 -0
  18. package/bundled-rules/sigma-rules/community/2017/TA/APT10/proc_creation_win_apt_apt10_cloud_hopper.yml +29 -0
  19. package/bundled-rules/sigma-rules/community/2017/TA/Dragonfly/proc_creation_win_apt_ta17_293a_ps.yml +27 -0
  20. package/bundled-rules/sigma-rules/community/2017/TA/Equation-Group/net_firewall_apt_equationgroup_c2.yml +30 -0
  21. package/bundled-rules/sigma-rules/community/2017/TA/Lazarus/proc_creation_win_apt_lazarus_binary_masquerading.yml +29 -0
  22. package/bundled-rules/sigma-rules/community/2017/TA/Pandemic/registry_event_apt_pandemic.yml +24 -0
  23. package/bundled-rules/sigma-rules/community/2017/TA/Turla/pipe_created_apt_turla_named_pipes.yml +31 -0
  24. package/bundled-rules/sigma-rules/community/2017/TA/Turla/win_system_apt_carbonpaper_turla.yml +30 -0
  25. package/bundled-rules/sigma-rules/community/2017/TA/Turla/win_system_apt_turla_service_png.yml +27 -0
  26. package/bundled-rules/sigma-rules/community/2018/Exploits/CVE-2018-13379/web_cve_2018_13379_fortinet_preauth_read_exploit.yml +25 -0
  27. package/bundled-rules/sigma-rules/community/2018/Exploits/CVE-2018-15473/lnx_sshd_exploit_cve_2018_15473.yml +24 -0
  28. package/bundled-rules/sigma-rules/community/2018/Exploits/CVE-2018-2894/web_cve_2018_2894_weblogic_exploit.yml +26 -0
  29. package/bundled-rules/sigma-rules/community/2018/Malware/Elise-Backdoor/proc_creation_win_malware_elise.yml +37 -0
  30. package/bundled-rules/sigma-rules/community/2018/TA/APT27/proc_creation_win_apt_apt27_emissary_panda.yml +33 -0
  31. package/bundled-rules/sigma-rules/community/2018/TA/APT28/proc_creation_win_apt_sofacy.yml +40 -0
  32. package/bundled-rules/sigma-rules/community/2018/TA/APT29-CozyBear/file_event_win_apt_cozy_bear_phishing_campaign_indicators.yml +30 -0
  33. package/bundled-rules/sigma-rules/community/2018/TA/APT29-CozyBear/proc_creation_win_apt_apt29_phishing_campaign_indicators.yml +32 -0
  34. package/bundled-rules/sigma-rules/community/2018/TA/APT32-Oceanlotus/registry_event_apt_oceanlotus_registry.yml +44 -0
  35. package/bundled-rules/sigma-rules/community/2018/TA/MuddyWater/proc_creation_win_apt_muddywater_activity.yml +40 -0
  36. package/bundled-rules/sigma-rules/community/2018/TA/OilRig/proc_creation_win_apt_oilrig_mar18.yml +54 -0
  37. package/bundled-rules/sigma-rules/community/2018/TA/OilRig/registry_event_apt_oilrig_mar18.yml +41 -0
  38. package/bundled-rules/sigma-rules/community/2018/TA/OilRig/win_security_apt_oilrig_mar18.yml +42 -0
  39. package/bundled-rules/sigma-rules/community/2018/TA/OilRig/win_system_apt_oilrig_mar18.yml +43 -0
  40. package/bundled-rules/sigma-rules/community/2018/TA/Slingshot/proc_creation_win_apt_slingshot.yml +32 -0
  41. package/bundled-rules/sigma-rules/community/2018/TA/Slingshot/win_security_apt_slingshot.yml +31 -0
  42. package/bundled-rules/sigma-rules/community/2018/TA/TropicTrooper/proc_creation_win_apt_tropictrooper.yml +21 -0
  43. package/bundled-rules/sigma-rules/community/2019/Exploits/BearLPE-Exploit/proc_creation_win_exploit_other_bearlpe.yml +33 -0
  44. package/bundled-rules/sigma-rules/community/2019/Exploits/CVE-2019-0708/win_security_exploit_cve_2019_0708_scanner_poc.yml +27 -0
  45. package/bundled-rules/sigma-rules/community/2019/Exploits/CVE-2019-0708/win_system_exploit_cve_2019_0708.yml +30 -0
  46. package/bundled-rules/sigma-rules/community/2019/Exploits/CVE-2019-11510/web_cve_2019_11510_pulsesecure_exploit.yml +23 -0
  47. package/bundled-rules/sigma-rules/community/2019/Exploits/CVE-2019-1378/proc_creation_win_exploit_cve_2019_1378.yml +41 -0
  48. package/bundled-rules/sigma-rules/community/2019/Exploits/CVE-2019-1388/proc_creation_win_exploit_cve_2019_1388.yml +34 -0
  49. package/bundled-rules/sigma-rules/community/2019/Exploits/CVE-2019-14287/lnx_sudo_exploit_cve_2019_14287.yml +33 -0
  50. package/bundled-rules/sigma-rules/community/2019/Exploits/CVE-2019-14287/proc_creation_lnx_exploit_cve_2019_14287.yml +28 -0
  51. package/bundled-rules/sigma-rules/community/2019/Exploits/CVE-2019-19781/web_cve_2019_19781_citrix_exploit.yml +33 -0
  52. package/bundled-rules/sigma-rules/community/2019/Exploits/CVE-2019-3398/web_cve_2019_3398_confluence.yml +26 -0
  53. package/bundled-rules/sigma-rules/community/2019/Malware/BabyShark/proc_creation_win_malware_babyshark.yml +34 -0
  54. package/bundled-rules/sigma-rules/community/2019/Malware/Chafer/proxy_malware_chafer_url_pattern.yml +22 -0
  55. package/bundled-rules/sigma-rules/community/2019/Malware/Dridex/proc_creation_win_malware_dridex.yml +51 -0
  56. package/bundled-rules/sigma-rules/community/2019/Malware/Dtrack-RAT/proc_creation_win_malware_dtrack.yml +34 -0
  57. package/bundled-rules/sigma-rules/community/2019/Malware/Emotet/proc_creation_win_malware_emotet.yml +44 -0
  58. package/bundled-rules/sigma-rules/community/2019/Malware/Formbook/proc_creation_win_malware_formbook.yml +50 -0
  59. package/bundled-rules/sigma-rules/community/2019/Malware/LockerGoga/proc_creation_win_malware_lockergoga_ransomware.yml +25 -0
  60. package/bundled-rules/sigma-rules/community/2019/Malware/QBot/proc_creation_win_malware_qbot.yml +32 -0
  61. package/bundled-rules/sigma-rules/community/2019/Malware/Ryuk/proc_creation_win_malware_ryuk.yml +50 -0
  62. package/bundled-rules/sigma-rules/community/2019/Malware/Snatch/proc_creation_win_malware_snatch_ransomware.yml +24 -0
  63. package/bundled-rules/sigma-rules/community/2019/Malware/Ursnif/proxy_malware_ursnif_c2_url.yml +32 -0
  64. package/bundled-rules/sigma-rules/community/2019/Malware/Ursnif/proxy_malware_ursnif_download_url.yml +26 -0
  65. package/bundled-rules/sigma-rules/community/2019/Malware/Ursnif/registry_add_malware_ursnif.yml +26 -0
  66. package/bundled-rules/sigma-rules/community/2019/TA/APC-C-12/proc_creation_win_apt_aptc12_bluemushroom.yml +27 -0
  67. package/bundled-rules/sigma-rules/community/2019/TA/APT31/proc_creation_win_apt_apt31_judgement_panda.yml +39 -0
  68. package/bundled-rules/sigma-rules/community/2019/TA/APT40/proxy_apt_apt40_dropbox_tool_ua.yml +25 -0
  69. package/bundled-rules/sigma-rules/community/2019/TA/Bear-APT-Activity/proc_creation_win_apt_bear_activity_gtr19.yml +31 -0
  70. package/bundled-rules/sigma-rules/community/2019/TA/EmpireMonkey/proc_creation_win_apt_empiremonkey.yml +26 -0
  71. package/bundled-rules/sigma-rules/community/2019/TA/EquationGroup/proc_creation_win_apt_equationgroup_dll_u_load.yml +28 -0
  72. package/bundled-rules/sigma-rules/community/2019/TA/MustangPanda/proc_creation_win_apt_mustangpanda.yml +36 -0
  73. package/bundled-rules/sigma-rules/community/2019/TA/Operation-Wocao/README.md +9 -0
  74. package/bundled-rules/sigma-rules/community/2019/TA/Operation-Wocao/proc_creation_win_apt_wocao.yml +46 -0
  75. package/bundled-rules/sigma-rules/community/2019/TA/Operation-Wocao/win_security_apt_wocao.yml +35 -0
  76. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-0688/web_cve_2020_0688_exchange_exploit.yml +26 -0
  77. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-0688/web_cve_2020_0688_msexchange.yml +28 -0
  78. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-0688/win_vul_cve_2020_0688.yml +29 -0
  79. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-10148/web_cve_2020_10148_solarwinds_exploit.yml +37 -0
  80. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-10189/proc_creation_win_exploit_cve_2020_10189.yml +39 -0
  81. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-1048/proc_creation_win_exploit_cve_2020_1048.yml +32 -0
  82. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-1048/registry_set_exploit_cve_2020_1048_new_printer_port.yml +37 -0
  83. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-1350/proc_creation_win_exploit_cve_2020_1350.yml +33 -0
  84. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-1472/proc_creation_win_exploit_cve_2020_1472_zero_poc.yml +38 -0
  85. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-14882/web_cve_2020_14882_weblogic_exploit.yml +27 -0
  86. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-28188/web_cve_2020_28188_terramaster_rce_exploit.yml +35 -0
  87. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-3452/web_cve_2020_3452_cisco_asa_ftd.yml +34 -0
  88. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-5902/web_cve_2020_5902_f5_bigip.yml +32 -0
  89. package/bundled-rules/sigma-rules/community/2020/Exploits/CVE-2020-8193/web_cve_2020_8193_8195_citrix_exploit.yml +31 -0
  90. package/bundled-rules/sigma-rules/community/2020/Malware/Blue-Mockingbird/proc_creation_win_malware_blue_mockingbird.yml +35 -0
  91. package/bundled-rules/sigma-rules/community/2020/Malware/Blue-Mockingbird/registry_set_mal_blue_mockingbird.yml +29 -0
  92. package/bundled-rules/sigma-rules/community/2020/Malware/ComRAT/proxy_malware_comrat_network_indicators.yml +24 -0
  93. package/bundled-rules/sigma-rules/community/2020/Malware/Emotet/proc_creation_win_malware_emotet_rundll32_execution.yml +37 -0
  94. package/bundled-rules/sigma-rules/community/2020/Malware/FlowCloud/registry_event_malware_flowcloud_markers.yml +30 -0
  95. package/bundled-rules/sigma-rules/community/2020/Malware/Ke3chang-TidePool/proc_creation_win_malware_ke3chang_tidepool.yml +33 -0
  96. package/bundled-rules/sigma-rules/community/2020/Malware/Maze/proc_creation_win_malware_maze_ransomware.yml +39 -0
  97. package/bundled-rules/sigma-rules/community/2020/Malware/Trickbot/proc_creation_win_malware_trickbot_wermgr.yml +29 -0
  98. package/bundled-rules/sigma-rules/community/2020/TA/Evilnum/proc_creation_win_apt_evilnum_jul20.yml +29 -0
  99. package/bundled-rules/sigma-rules/community/2020/TA/GALLIUM/proc_creation_win_apt_gallium_iocs.yml +65 -0
  100. package/bundled-rules/sigma-rules/community/2020/TA/GALLIUM/win_dns_analytic_apt_gallium.yml +37 -0
  101. package/bundled-rules/sigma-rules/community/2020/TA/Greenbug/proc_creation_win_apt_greenbug_may20.yml +52 -0
  102. package/bundled-rules/sigma-rules/community/2020/TA/Lazarus/proc_creation_win_apt_lazarus_group_activity.yml +60 -0
  103. package/bundled-rules/sigma-rules/community/2020/TA/Leviathan/registry_event_apt_leviathan.yml +22 -0
  104. package/bundled-rules/sigma-rules/community/2020/TA/SolarWinds-Supply-Chain/README.md +1 -0
  105. package/bundled-rules/sigma-rules/community/2020/TA/SolarWinds-Supply-Chain/proc_creation_win_apt_unc2452_cmds.yml +56 -0
  106. package/bundled-rules/sigma-rules/community/2020/TA/SolarWinds-Supply-Chain/proc_creation_win_apt_unc2452_ps.yml +33 -0
  107. package/bundled-rules/sigma-rules/community/2020/TA/SolarWinds-Supply-Chain/proc_creation_win_apt_unc2452_vbscript_pattern.yml +31 -0
  108. package/bundled-rules/sigma-rules/community/2020/TA/SolarWinds-Supply-Chain/web_solarwinds_supernova_webshell.yml +28 -0
  109. package/bundled-rules/sigma-rules/community/2020/TA/TAIDOOR-RAT/proc_creation_win_apt_taidoor.yml +31 -0
  110. package/bundled-rules/sigma-rules/community/2020/TA/Winnti/proc_creation_win_apt_winnti_mal_hk_jan20.yml +40 -0
  111. package/bundled-rules/sigma-rules/community/2020/TA/Winnti/proc_creation_win_apt_winnti_pipemon.yml +32 -0
  112. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-1675/av_exploit_cve_2021_34527_print_nightmare.yml +29 -0
  113. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-1675/file_delete_win_exploit_cve_2021_1675_print_nightmare.yml +28 -0
  114. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-1675/file_event_win_exploit_cve_2021_1675_printspooler.yml +28 -0
  115. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-1675/image_load_exploit_cve_2021_1675_spoolsv_dll_load.yml +33 -0
  116. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-1675/registry_event_cve_2021_1675_mimikatz_printernightmare_drivers.yml +44 -0
  117. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-1675/win_exploit_cve_2021_1675_printspooler.yml +42 -0
  118. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-1675/win_exploit_cve_2021_1675_printspooler_operational.yml +29 -0
  119. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-1675/win_security_exploit_cve_2021_1675_printspooler_security.yml +29 -0
  120. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-1675/zeek_dce_rpc_exploit_cve_2021_1675_printnightmare_print_driver_install.yml +41 -0
  121. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-20090/web_cve_2021_20090_2021_20091_arcadyan_router_exploit.yml +42 -0
  122. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-2109/web_cve_2021_2109_weblogic_rce_exploit.yml +28 -0
  123. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-21972/web_cve_2021_21972_vsphere_unauth_rce_exploit.yml +26 -0
  124. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-21978/web_cve_2021_21978_vmware_view_planner_exploit.yml +28 -0
  125. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-22005/web_cve_2021_22005_vmware_file_upload.yml +25 -0
  126. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-22123/web_cve_2021_22123_fortinet_exploit.yml +28 -0
  127. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-22893/web_cve_2021_22893_pulse_secure_rce_exploit.yml +37 -0
  128. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-26084/proc_creation_win_exploit_cve_2021_26084_atlassian_confluence.yml +42 -0
  129. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-26084/web_cve_2021_26084_confluence_rce_exploit.yml +37 -0
  130. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-26814/web_cve_2021_26814_wzuh_rce.yml +24 -0
  131. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-26857/proc_creation_win_exploit_cve_2021_26857_msexchange.yml +28 -0
  132. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-26858/file_event_win_cve_2021_26858_msexchange.yml +34 -0
  133. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-26858/web_cve_2021_26858_iis_rce.yml +38 -0
  134. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-27905/web_cve_2021_27905_apache_solr_exploit.yml +38 -0
  135. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-28480/web_cve_2021_28480_exchange_exploit.yml +26 -0
  136. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-33766/web_cve_2021_33766_msexchange_proxytoken.yml +32 -0
  137. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-33771/file_event_win_cve_2021_31979_cve_2021_33771_exploits.yml +40 -0
  138. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-33771/registry_set_cve_2021_31979_cve_2021_33771_exploits.yml +36 -0
  139. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-35211/proc_creation_win_exploit_cve_2021_35211_servu.yml +31 -0
  140. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-38647/zeek_http_exploit_cve_2021_38647_omigod_no_auth_rce.yml +49 -0
  141. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-4034/lnx_auth_exploit_cve_2021_4034_pwnkit_lpe.yml +28 -0
  142. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-40444/file_event_win_exploit_cve_2021_40444.yml +35 -0
  143. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-40444/proc_creation_win_exploit_cve_2021_40444.yml +34 -0
  144. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-40444/proc_creation_win_exploit_cve_2021_40444_office_directory_traversal.yml +37 -0
  145. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-40539/web_cve_2021_40539_adselfservice.yml +26 -0
  146. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-40539/web_cve_2021_40539_manageengine_adselfservice_exploit.yml +31 -0
  147. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-41379/file_event_win_cve_2021_41379_msi_lpe.yml +27 -0
  148. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-41379/proc_creation_win_exploit_cve_2021_41379.yml +39 -0
  149. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-41379/win_vul_cve_2021_41379.yml +26 -0
  150. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-41773/web_cve_2021_41773_apache_path_traversal.yml +42 -0
  151. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-42237/web_cve_2021_42237_sitecore_report_ashx.yml +26 -0
  152. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-42278/win_system_exploit_cve_2021_42278.yml +35 -0
  153. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-42287/win_security_samaccountname_spoofing_cve_2021_42287.yml +30 -0
  154. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-42287/win_system_exploit_cve_2021_42287.yml +33 -0
  155. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-42321/win_exchange_cve_2021_42321.yml +29 -0
  156. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-43798/web_cve_2021_43798_grafana.yml +79 -0
  157. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-44077/file_event_win_cve_2021_44077_poc_default_files.yml +23 -0
  158. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-44228/proc_creation_win_exploit_cve_2021_44228_vmware_horizon_log4j.yml +30 -0
  159. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-44228/web_cve_2021_44228_log4j.yml +52 -0
  160. package/bundled-rules/sigma-rules/community/2021/Exploits/CVE-2021-44228/web_cve_2021_44228_log4j_fields.yml +126 -0
  161. package/bundled-rules/sigma-rules/community/2021/Exploits/ProxyShell-Exploit/web_exchange_proxyshell.yml +41 -0
  162. package/bundled-rules/sigma-rules/community/2021/Exploits/ProxyShell-Exploit/web_exchange_proxyshell_successful.yml +33 -0
  163. package/bundled-rules/sigma-rules/community/2021/Exploits/RazerInstaller-LPE-Exploit/proc_creation_win_exploit_other_razorinstaller_lpe.yml +30 -0
  164. package/bundled-rules/sigma-rules/community/2021/Exploits/SystemNightmare-Exploit/proc_creation_win_exploit_other_systemnightmare.yml +26 -0
  165. package/bundled-rules/sigma-rules/community/2021/Exploits/VisualDoor-Exploit/README.md +9 -0
  166. package/bundled-rules/sigma-rules/community/2021/Exploits/VisualDoor-Exploit/web_sonicwall_jarrewrite_exploit.yml +27 -0
  167. package/bundled-rules/sigma-rules/community/2021/Malware/BlackByte/proc_creation_win_malware_blackbyte_ransomware.yml +35 -0
  168. package/bundled-rules/sigma-rules/community/2021/Malware/BlackByte/registry_set_win_malware_blackbyte_privesc_registry.yml +32 -0
  169. package/bundled-rules/sigma-rules/community/2021/Malware/Conti/proc_creation_win_malware_conti.yml +25 -0
  170. package/bundled-rules/sigma-rules/community/2021/Malware/Conti/proc_creation_win_malware_conti_7zip.yml +26 -0
  171. package/bundled-rules/sigma-rules/community/2021/Malware/Conti/proc_creation_win_malware_conti_ransomware_commands.yml +31 -0
  172. package/bundled-rules/sigma-rules/community/2021/Malware/Conti/proc_creation_win_malware_conti_ransomware_database_dump.yml +35 -0
  173. package/bundled-rules/sigma-rules/community/2021/Malware/DarkSide/proc_creation_win_malware_darkside_ransomware.yml +30 -0
  174. package/bundled-rules/sigma-rules/community/2021/Malware/Devil-Bait/README.md +15 -0
  175. package/bundled-rules/sigma-rules/community/2021/Malware/Devil-Bait/file_event_win_malware_devil_bait_script_drop.yml +31 -0
  176. package/bundled-rules/sigma-rules/community/2021/Malware/Devil-Bait/proc_creation_win_malware_devil_bait_output_redirect.yml +40 -0
  177. package/bundled-rules/sigma-rules/community/2021/Malware/Devil-Bait/proxy_malware_devil_bait_c2_communication.yml +25 -0
  178. package/bundled-rules/sigma-rules/community/2021/Malware/FoggyWeb/image_load_malware_foggyweb_nobelium.yml +23 -0
  179. package/bundled-rules/sigma-rules/community/2021/Malware/Goofy-Guineapig/README.md +17 -0
  180. package/bundled-rules/sigma-rules/community/2021/Malware/Goofy-Guineapig/file_event_win_malware_goofy_guineapig_file_indicators.yml +26 -0
  181. package/bundled-rules/sigma-rules/community/2021/Malware/Goofy-Guineapig/proc_creation_win_malware_goofy_guineapig_broken_cmd.yml +21 -0
  182. package/bundled-rules/sigma-rules/community/2021/Malware/Goofy-Guineapig/proc_creation_win_malware_goofy_guineapig_googleupdate_uncommon_child_instance.yml +27 -0
  183. package/bundled-rules/sigma-rules/community/2021/Malware/Goofy-Guineapig/proxy_malware_goofy_gunieapig_c2_communication.yml +21 -0
  184. package/bundled-rules/sigma-rules/community/2021/Malware/Goofy-Guineapig/win_system_malware_goofy_guineapig_service_persistence.yml +27 -0
  185. package/bundled-rules/sigma-rules/community/2021/Malware/Moriya-Rootkit/file_event_win_moriya_rootkit.yml +27 -0
  186. package/bundled-rules/sigma-rules/community/2021/Malware/Netwire/registry_add_malware_netwire.yml +29 -0
  187. package/bundled-rules/sigma-rules/community/2021/Malware/Pingback/file_event_win_malware_pingback_backdoor.yml +32 -0
  188. package/bundled-rules/sigma-rules/community/2021/Malware/Pingback/image_load_malware_pingback_backdoor.yml +32 -0
  189. package/bundled-rules/sigma-rules/community/2021/Malware/Pingback/proc_creation_win_malware_pingback_backdoor.yml +36 -0
  190. package/bundled-rules/sigma-rules/community/2021/Malware/Small-Sieve/README.md +16 -0
  191. package/bundled-rules/sigma-rules/community/2021/Malware/Small-Sieve/file_event_win_malware_small_sieve_evasion_typo.yml +31 -0
  192. package/bundled-rules/sigma-rules/community/2021/Malware/Small-Sieve/proc_creation_win_malware_small_sieve_cli_arg.yml +24 -0
  193. package/bundled-rules/sigma-rules/community/2021/Malware/Small-Sieve/proxy_malware_small_sieve_telegram_communication.yml +24 -0
  194. package/bundled-rules/sigma-rules/community/2021/Malware/Small-Sieve/registry_set_malware_small_sieve_evasion_typo.yml +25 -0
  195. package/bundled-rules/sigma-rules/community/2021/TA/HAFNIUM/proc_creation_win_apt_hafnium.yml +79 -0
  196. package/bundled-rules/sigma-rules/community/2021/TA/HAFNIUM/web_exchange_exploitation_hafnium.yml +65 -0
  197. package/bundled-rules/sigma-rules/community/2021/TA/Kaseya-Supply-Chain/proc_creation_win_apt_revil_kaseya.yml +46 -0
  198. package/bundled-rules/sigma-rules/community/2021/TA/PRIVATELOG/image_load_usp_svchost_clfsw32.yml +25 -0
  199. package/bundled-rules/sigma-rules/community/2021/TA/SOURGUM/proc_creation_win_apt_sourgrum.yml +40 -0
  200. package/bundled-rules/sigma-rules/community/2021/TA/UNC2546/web_unc2546_dewmode_php_webshell.yml +30 -0
  201. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-21554/proc_creation_win_exploit_cve_2023_21554_queuejumper.yml +35 -0
  202. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-21587/web_cve_2022_21587_oracle_ebs.yml +30 -0
  203. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-21919/win_system_exploit_cve_2022_21919_or_cve_2021_34484.yml +28 -0
  204. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-22954/proc_creation_win_exploit_cve_2022_22954_vmware_workspace_one_rce.yml +33 -0
  205. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-24527/file_event_win_cve_2022_24527_lpe.yml +28 -0
  206. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-26134/proc_creation_lnx_exploit_cve_2022_26134_atlassian_confluence.yml +41 -0
  207. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-26809/proc_creation_win_exploit_cve_2022_26809_rpcss_child_process_anomaly.yml +31 -0
  208. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-27925/web_cve_2022_27925_exploit.yml +38 -0
  209. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-29072/proc_creation_win_exploit_cve_2022_29072_7zip.yml +47 -0
  210. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-29799/lnx_exploit_cve_2022_27999_cve_2022_27800.yml +29 -0
  211. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-30190/registry_set_exploit_cve_2022_30190_msdt_follina.yml +24 -0
  212. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-31656/web_cve_2022_31656_auth_bypass.yml +26 -0
  213. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-31659/web_cve_2022_31659_vmware_rce.yml +25 -0
  214. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-33891/proc_creation_lnx_exploit_cve_2022_33891_spark_shell_command_injection.yml +28 -0
  215. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-33891/web_cve_2022_33891_spark_shell_command_injection.yml +25 -0
  216. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-36804/web_cve_2022_36804_atlassian_bitbucket_command_injection.yml +29 -0
  217. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-37966/win_system_exploit_cve_2022_37966_kdcsvc_rc4_downgrade.yml +27 -0
  218. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-41082/proxy_cve_2022_36804_exchange_owassrf_exploitation.yml +34 -0
  219. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-41082/proxy_cve_2022_36804_exchange_owassrf_poc_exploitation.yml +29 -0
  220. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-41082/web_cve_2022_36804_exchange_owassrf_exploitation.yml +35 -0
  221. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-41082/web_cve_2022_36804_exchange_owassrf_poc_exploitation.yml +30 -0
  222. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-41120/proc_creation_win_exploit_cve_2022_41120_sysmon_eop.yml +46 -0
  223. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-42475/fortios_sslvpnd_exploit_cve_2022_42475_exploitation_indicators.yml +32 -0
  224. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-44877/web_cve_2022_44877_exploitation_attempt.yml +38 -0
  225. package/bundled-rules/sigma-rules/community/2022/Exploits/CVE-2022-46169/web_cve_2022_46169_cacti_exploitation_attempt.yml +41 -0
  226. package/bundled-rules/sigma-rules/community/2022/Malware/BlueSky-Ransomware/win_security_malware_bluesky_ransomware_files_indicators.yml +32 -0
  227. package/bundled-rules/sigma-rules/community/2022/Malware/Bumblebee/create_remote_thread_win_malware_bumblebee.yml +28 -0
  228. package/bundled-rules/sigma-rules/community/2022/Malware/ChromeLoader/proc_creation_win_malware_chrome_loader_execution.yml +32 -0
  229. package/bundled-rules/sigma-rules/community/2022/Malware/Emotet/proc_creation_win_malware_emotet_loader_execution.yml +38 -0
  230. package/bundled-rules/sigma-rules/community/2022/Malware/Hermetic-Wiper/proc_creation_win_malware_hermetic_wiper_activity.yml +32 -0
  231. package/bundled-rules/sigma-rules/community/2022/Malware/Raspberry-Robin/proc_creation_win_malware_raspberry_robin_execution.yml +40 -0
  232. package/bundled-rules/sigma-rules/community/2022/Malware/Raspberry-Robin/proc_creation_win_malware_raspberry_robin_external_drive_exec.yml +40 -0
  233. package/bundled-rules/sigma-rules/community/2022/Malware/Raspberry-Robin/proc_creation_win_malware_raspberry_robin_single_dot_ending_file.yml +25 -0
  234. package/bundled-rules/sigma-rules/community/2022/Malware/Serpent-Backdoor/proc_creation_win_malware_serpent_backdoor_payload_execution.yml +37 -0
  235. package/bundled-rules/sigma-rules/community/2022/Malware/SocGholish/proc_creation_win_malware_socgholish_fakeupdates_activity.yml +40 -0
  236. package/bundled-rules/sigma-rules/community/2022/Malware/win_mssql_sp_maggie.yml +25 -0
  237. package/bundled-rules/sigma-rules/community/2022/TA/ACTINIUM/proc_creation_win_apt_actinium_persistence.yml +30 -0
  238. package/bundled-rules/sigma-rules/community/2022/TA/MERCURY/proc_creation_win_apt_mercury.yml +26 -0
  239. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-1389/proxy_exploit_cve_2023_1389_unauth_command_injection_tplink_archer_ax21.yml +33 -0
  240. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-20198/cisco_syslog_cve_2023_20198_ios_xe_web_ui.yml +30 -0
  241. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-21554/win_cve_2023_21554_msmq_corrupted_packet.yml +23 -0
  242. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-22518/proc_creation_lnx_exploit_cve_2023_22518_confluence_java_child_proc.yml +41 -0
  243. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-22518/proc_creation_win_exploit_cve_2023_22518_confluence_tomcat_child_proc.yml +43 -0
  244. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-22518/proxy_exploit_cve_2023_22518_confluence_auth_bypass.yml +42 -0
  245. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-22518/web_exploit_cve_2023_22518_confluence_auth_bypass.yml +42 -0
  246. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-2283/lnx_sshd_exploit_cve_2023_2283_libssh_authentication_bypass.yml +27 -0
  247. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-23397/registry_set_exploit_cve_2023_23397_outlook_reminder_trigger.yml +29 -0
  248. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-23397/win_security_exploit_cve_2023_23397_outlook_remote_file_query.yml +36 -0
  249. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-23397/win_smbclient_connectivity_exploit_cve_2023_23397_outlook_remote_file.yml +91 -0
  250. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-23752/web_cve_2023_23752_joomla_exploit_attempt.yml +26 -0
  251. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-25157/web_cve_2023_25157_geoserver_sql_injection.yml +46 -0
  252. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-25717/web_cve_2023_25717_ruckus_wireless_admin_exploit_attempt.yml +30 -0
  253. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-27363/file_event_win_cve_2023_27363_foxit_rce.yml +27 -0
  254. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-27997/web_cve_2023_27997_pre_authentication_rce.yml +34 -0
  255. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-34362-MOVEit-Transfer-Exploit/README.md +18 -0
  256. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-34362-MOVEit-Transfer-Exploit/file_event_win_exploit_cve_2023_34362_moveit_transfer.yml +64 -0
  257. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-34362-MOVEit-Transfer-Exploit/proc_creation_win_exploit_cve_2023_34362_moveit_transfer_exploitation_activity.yml +33 -0
  258. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-34362-MOVEit-Transfer-Exploit/web_cve_2023_34362_known_payload_request.yml.yml +27 -0
  259. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-36874/file_event_win_exploit_cve_2023_36874_report_creation.yml +32 -0
  260. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-36874/file_event_win_exploit_cve_2023_36874_wermgr_creation.yml +34 -0
  261. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-36874/proc_creation_win_exploit_cve_2023_36874_fake_wermgr.yml +27 -0
  262. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-36884/file_event_win_exploit_cve_2023_36884_office_windows_html_rce_file_patterns.yml +27 -0
  263. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-36884/proxy_exploit_cve_2023_36884_office_windows_html_rce.yml +23 -0
  264. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-36884/proxy_exploit_cve_2023_36884_office_windows_html_rce_extenstion_ip_pattern_traffic.yml +25 -0
  265. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-36884/proxy_exploit_cve_2023_36884_office_windows_html_rce_traffic.yml +33 -0
  266. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-36884/proxy_exploit_cve_2023_36884_office_windows_html_rce_url_marker_traffic.yml +22 -0
  267. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-36884/win_security_exploit_cve_2023_36884_office_windows_html_rce_share_access_pattern.yml +29 -0
  268. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-38831/file_event_win_exploit_cve_2023_38331_winrar_susp_double_ext.yml +28 -0
  269. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-38831/proc_creation_win_exploit_cve_2023_38831_winrar_child_proc.yml +46 -0
  270. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-40477/file_event_win_exploit_cve_2023_40477_winrar_rev_file_abuse.yml +27 -0
  271. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-40477/win_application_exploit_cve_2023_40477_winrar_crash.yml +34 -0
  272. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-43261/proxy_exploit_cve_2023_43261_milesight_information_disclosure.yml +33 -0
  273. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-43261/web_exploit_cve_2023_43261_milesight_information_disclosure.yml +34 -0
  274. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-46214/web_cve_2023_46214_rce_splunk_enterprise.yml +35 -0
  275. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-46214/web_cve_2023_46214_rce_splunk_enterprise_poc.yml +43 -0
  276. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-46747/proxy_cve_2023_46747_f5_remote_code_execution.yml +38 -0
  277. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-46747/web_cve_2023_46747_f5_remote_code_execution.yml +38 -0
  278. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-4966/proxy_exploit_cve_2023_4966_citrix_sensitive_information_disclosure_exploit.yml +35 -0
  279. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-4966/proxy_exploit_cve_2023_4966_citrix_sensitive_information_disclosure_exploit_attempt.yml +35 -0
  280. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-4966/web_exploit_cve_2023_4966_citrix_sensitive_information_disclosure_exploit.yml +35 -0
  281. package/bundled-rules/sigma-rules/community/2023/Exploits/CVE-2023-4966/web_exploit_cve_2023_4966_citrix_sensitive_information_disclosure_exploit_attempt.yml +35 -0
  282. package/bundled-rules/sigma-rules/community/2023/Exploits/Windows-Server-Unknown-Exploit/proc_creation_win_exploit_other_win_server_undocumented_rce.yml +31 -0
  283. package/bundled-rules/sigma-rules/community/2023/Malware/COLDSTEEL/README.md +20 -0
  284. package/bundled-rules/sigma-rules/community/2023/Malware/COLDSTEEL/file_event_win_malware_coldsteel_renamed_cmd.yml +22 -0
  285. package/bundled-rules/sigma-rules/community/2023/Malware/COLDSTEEL/file_event_win_malware_coldsteel_service_dll_creation.yml +23 -0
  286. package/bundled-rules/sigma-rules/community/2023/Malware/COLDSTEEL/image_load_malware_coldsteel_persistence_service_dll.yml +24 -0
  287. package/bundled-rules/sigma-rules/community/2023/Malware/COLDSTEEL/proc_creation_win_malware_coldsteel_anonymous_process.yml +25 -0
  288. package/bundled-rules/sigma-rules/community/2023/Malware/COLDSTEEL/proc_creation_win_malware_coldsteel_cleanup.yml +31 -0
  289. package/bundled-rules/sigma-rules/community/2023/Malware/COLDSTEEL/proc_creation_win_malware_coldsteel_service_persistence.yml +26 -0
  290. package/bundled-rules/sigma-rules/community/2023/Malware/COLDSTEEL/registry_set_malware_coldsteel_created_users.yml +27 -0
  291. package/bundled-rules/sigma-rules/community/2023/Malware/COLDSTEEL/win_system_malware_coldsteel_persistence_service.yml +28 -0
  292. package/bundled-rules/sigma-rules/community/2023/Malware/DarkGate/README.md +16 -0
  293. package/bundled-rules/sigma-rules/community/2023/Malware/DarkGate/file_event_win_malware_darkgate_autoit3_binary_creation.yml +36 -0
  294. package/bundled-rules/sigma-rules/community/2023/Malware/DarkGate/proc_creation_win_malware_darkgate_autoit3_from_susp_parent_and_location.yml +37 -0
  295. package/bundled-rules/sigma-rules/community/2023/Malware/DarkGate/proc_creation_win_malware_darkgate_net_user_creation.yml +31 -0
  296. package/bundled-rules/sigma-rules/community/2023/Malware/Griffon/proc_creation_win_malware_griffon_patterns.yml +24 -0
  297. package/bundled-rules/sigma-rules/community/2023/Malware/GuLoader/proc_creation_win_malware_guloader_execution.yml +30 -0
  298. package/bundled-rules/sigma-rules/community/2023/Malware/IcedID/proc_creation_win_malware_icedid_rundll32_dllregisterserver.yml +26 -0
  299. package/bundled-rules/sigma-rules/community/2023/Malware/Pikabot/net_connection_win_malware_pikabot_rundll32_activity.yml +37 -0
  300. package/bundled-rules/sigma-rules/community/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_combined_commands_execution.yml +46 -0
  301. package/bundled-rules/sigma-rules/community/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_discovery.yml +38 -0
  302. package/bundled-rules/sigma-rules/community/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_rundll32_hollowing.yml +38 -0
  303. package/bundled-rules/sigma-rules/community/2023/Malware/Pikabot/proc_creation_win_malware_pikabot_rundll32_uncommon_extension.yml +58 -0
  304. package/bundled-rules/sigma-rules/community/2023/Malware/Qakbot/README.md +19 -0
  305. package/bundled-rules/sigma-rules/community/2023/Malware/Qakbot/proc_creation_win_malware_qakbot_regsvr32_calc_pattern.yml +25 -0
  306. package/bundled-rules/sigma-rules/community/2023/Malware/Qakbot/proc_creation_win_malware_qakbot_rundll32_execution.yml +39 -0
  307. package/bundled-rules/sigma-rules/community/2023/Malware/Qakbot/proc_creation_win_malware_qakbot_rundll32_exports.yml +67 -0
  308. package/bundled-rules/sigma-rules/community/2023/Malware/Qakbot/proc_creation_win_malware_qakbot_rundll32_fake_dll_execution.yml +39 -0
  309. package/bundled-rules/sigma-rules/community/2023/Malware/Qakbot/proc_creation_win_malware_qakbot_uninstaller_cleanup.yml +30 -0
  310. package/bundled-rules/sigma-rules/community/2023/Malware/Rhadamanthys/proc_creation_win_malware_rhadamanthys_stealer_dll_launch.yml +31 -0
  311. package/bundled-rules/sigma-rules/community/2023/Malware/Rorschach/proc_creation_win_malware_rorschach_ransomware_activity.yml +32 -0
  312. package/bundled-rules/sigma-rules/community/2023/Malware/SNAKE/README.md +23 -0
  313. package/bundled-rules/sigma-rules/community/2023/Malware/SNAKE/file_event_win_malware_snake_encrypted_payload_ioc.yml +21 -0
  314. package/bundled-rules/sigma-rules/community/2023/Malware/SNAKE/file_event_win_malware_snake_installers_ioc.yml +23 -0
  315. package/bundled-rules/sigma-rules/community/2023/Malware/SNAKE/file_event_win_malware_snake_werfault_creation.yml +28 -0
  316. package/bundled-rules/sigma-rules/community/2023/Malware/SNAKE/proc_creation_win_malware_snake_installer_cli_args.yml +25 -0
  317. package/bundled-rules/sigma-rules/community/2023/Malware/SNAKE/proc_creation_win_malware_snake_installer_exec.yml +33 -0
  318. package/bundled-rules/sigma-rules/community/2023/Malware/SNAKE/proc_creation_win_malware_snake_service_execution.yml +23 -0
  319. package/bundled-rules/sigma-rules/community/2023/Malware/SNAKE/registry_event_malware_snake_covert_store_key.yml +19 -0
  320. package/bundled-rules/sigma-rules/community/2023/Malware/SNAKE/registry_set_malware_snake_encrypted_key.yml +25 -0
  321. package/bundled-rules/sigma-rules/community/2023/Malware/SNAKE/win_system_malware_snake_persistence_service.yml +25 -0
  322. package/bundled-rules/sigma-rules/community/2023/Malware/Ursnif/proc_creation_win_malware_ursnif_cmd_redirection.yml +27 -0
  323. package/bundled-rules/sigma-rules/community/2023/Malware/dns_query_win_malware_socgholish_second_stage_c2.yml +25 -0
  324. package/bundled-rules/sigma-rules/community/2023/TA/3CX-Supply-Chain/README.md +26 -0
  325. package/bundled-rules/sigma-rules/community/2023/TA/3CX-Supply-Chain/dns_query_win_malware_3cx_compromise.yml +59 -0
  326. package/bundled-rules/sigma-rules/community/2023/TA/3CX-Supply-Chain/image_load_malware_3cx_compromise_susp_dll.yml +53 -0
  327. package/bundled-rules/sigma-rules/community/2023/TA/3CX-Supply-Chain/net_connection_win_malware_3cx_compromise_beaconing_activity.yml +59 -0
  328. package/bundled-rules/sigma-rules/community/2023/TA/3CX-Supply-Chain/proc_creation_win_malware_3cx_compromise_execution.yml +72 -0
  329. package/bundled-rules/sigma-rules/community/2023/TA/3CX-Supply-Chain/proc_creation_win_malware_3cx_compromise_susp_children.yml +49 -0
  330. package/bundled-rules/sigma-rules/community/2023/TA/3CX-Supply-Chain/proc_creation_win_malware_3cx_compromise_susp_update.yml +43 -0
  331. package/bundled-rules/sigma-rules/community/2023/TA/3CX-Supply-Chain/proxy_malware_3cx_compromise_c2_beacon_activity.yml +57 -0
  332. package/bundled-rules/sigma-rules/community/2023/TA/3CX-Supply-Chain/proxy_malware_3cx_compromise_susp_ico_requests.yml +38 -0
  333. package/bundled-rules/sigma-rules/community/2023/TA/Cozy-Bear/image_load_apt_cozy_bear_graphical_proton_dlls.yml +39 -0
  334. package/bundled-rules/sigma-rules/community/2023/TA/Cozy-Bear/win_security_apt_cozy_bear_scheduled_tasks_name.yml +48 -0
  335. package/bundled-rules/sigma-rules/community/2023/TA/Cozy-Bear/win_taskscheduler_apt_cozy_bear_graphical_proton_task_names.yml +49 -0
  336. package/bundled-rules/sigma-rules/community/2023/TA/Diamond-Sleet/README.md +18 -0
  337. package/bundled-rules/sigma-rules/community/2023/TA/Diamond-Sleet/dns_query_win_apt_diamond_steel_indicators.yml +25 -0
  338. package/bundled-rules/sigma-rules/community/2023/TA/Diamond-Sleet/file_event_win_apt_diamond_sleet_indicators.yml +28 -0
  339. package/bundled-rules/sigma-rules/community/2023/TA/Diamond-Sleet/image_load_apt_diamond_sleet_side_load.yml +28 -0
  340. package/bundled-rules/sigma-rules/community/2023/TA/Diamond-Sleet/proc_creation_win_apt_diamond_sleet_indicators.yml +21 -0
  341. package/bundled-rules/sigma-rules/community/2023/TA/Diamond-Sleet/registry_event_apt_diamond_sleet_scheduled_task.yml +25 -0
  342. package/bundled-rules/sigma-rules/community/2023/TA/Diamond-Sleet/win_security_apt_diamond_sleet_scheduled_task.yml +28 -0
  343. package/bundled-rules/sigma-rules/community/2023/TA/EquationGroup/net_dns_apt_equation_group_triangulation_c2_coms.yml +40 -0
  344. package/bundled-rules/sigma-rules/community/2023/TA/EquationGroup/proxy_apt_equation_group_triangulation_c2_coms.yml +40 -0
  345. package/bundled-rules/sigma-rules/community/2023/TA/FIN7/README.md +16 -0
  346. package/bundled-rules/sigma-rules/community/2023/TA/FIN7/file_event_win_apt_fin7_powershell_scripts_naming_convention.yml +23 -0
  347. package/bundled-rules/sigma-rules/community/2023/TA/FIN7/posh_ps_apt_fin7_powerhold.yml +28 -0
  348. package/bundled-rules/sigma-rules/community/2023/TA/FIN7/posh_ps_apt_fin7_powertrash_execution.yml +30 -0
  349. package/bundled-rules/sigma-rules/community/2023/TA/FIN7/proc_creation_win_apt_fin7_powertrash_lateral_movement.yml +30 -0
  350. package/bundled-rules/sigma-rules/community/2023/TA/Lace-Tempest/README.md +17 -0
  351. package/bundled-rules/sigma-rules/community/2023/TA/Lace-Tempest/file_event_win_apt_lace_tempest_indicators.yml +25 -0
  352. package/bundled-rules/sigma-rules/community/2023/TA/Lace-Tempest/posh_ps_apt_lace_tempest_eraser_script.yml +30 -0
  353. package/bundled-rules/sigma-rules/community/2023/TA/Lace-Tempest/posh_ps_apt_lace_tempest_malware_launcher.yml +29 -0
  354. package/bundled-rules/sigma-rules/community/2023/TA/Lace-Tempest/proc_creation_win_apt_lace_tempest_cobalt_strike_download.yml +23 -0
  355. package/bundled-rules/sigma-rules/community/2023/TA/Lace-Tempest/proc_creation_win_apt_lace_tempest_loader_execution.yml +23 -0
  356. package/bundled-rules/sigma-rules/community/2023/TA/Lazarus/README.md +16 -0
  357. package/bundled-rules/sigma-rules/community/2023/TA/Lazarus/image_load_apt_lazarus_side_load_activity.yml +36 -0
  358. package/bundled-rules/sigma-rules/community/2023/TA/Mint-Sandstorm/README.md +17 -0
  359. package/bundled-rules/sigma-rules/community/2023/TA/Mint-Sandstorm/proc_creation_win_apt_mint_sandstorm_aspera_faspex_susp_child_process.yml +117 -0
  360. package/bundled-rules/sigma-rules/community/2023/TA/Mint-Sandstorm/proc_creation_win_apt_mint_sandstorm_log4j_wstomcat_execution.yml +24 -0
  361. package/bundled-rules/sigma-rules/community/2023/TA/Mint-Sandstorm/proc_creation_win_apt_mint_sandstorm_manage_engine_susp_child_process.yml +123 -0
  362. package/bundled-rules/sigma-rules/community/2023/TA/Mustang-Panda-Australia-Campaign/README.md +15 -0
  363. package/bundled-rules/sigma-rules/community/2023/TA/Mustang-Panda-Australia-Campaign/proc_creation_win_apt_mustang_panda_indicators.yml +30 -0
  364. package/bundled-rules/sigma-rules/community/2023/TA/Okta-Support-System-Breach/README.md +15 -0
  365. package/bundled-rules/sigma-rules/community/2023/TA/Okta-Support-System-Breach/okta_apt_suspicious_user_creation.yml +27 -0
  366. package/bundled-rules/sigma-rules/community/2023/TA/Onyx-Sleet/README.md +11 -0
  367. package/bundled-rules/sigma-rules/community/2023/TA/Onyx-Sleet/file_event_win_apt_onyx_sleet_indicators.yml +21 -0
  368. package/bundled-rules/sigma-rules/community/2023/TA/PaperCut-Print-Management-Exploitation/README.md +15 -0
  369. package/bundled-rules/sigma-rules/community/2023/TA/PaperCut-Print-Management-Exploitation/proc_creation_win_papercut_print_management_exploitation_indicators.yml +35 -0
  370. package/bundled-rules/sigma-rules/community/2023/TA/PaperCut-Print-Management-Exploitation/proc_creation_win_papercut_print_management_exploitation_pc_app.yml +41 -0
  371. package/bundled-rules/sigma-rules/community/2023/TA/Peach-Sandstorm/proc_creation_win_apt_peach_sandstorm_indicators.yml +22 -0
  372. package/bundled-rules/sigma-rules/community/2023/TA/Peach-Sandstorm/proxy_apt_peach_sandstorm_falsefont_backdoor_c2_coms.yml +24 -0
  373. package/bundled-rules/sigma-rules/community/2023/TA/UNC4841-Barracuda-ESG-Zero-Day-Exploitation/README.md +23 -0
  374. package/bundled-rules/sigma-rules/community/2023/TA/UNC4841-Barracuda-ESG-Zero-Day-Exploitation/file_event_lnx_apt_unc4841_exfil_mail_pattern.yml +23 -0
  375. package/bundled-rules/sigma-rules/community/2023/TA/UNC4841-Barracuda-ESG-Zero-Day-Exploitation/file_event_lnx_apt_unc4841_file_indicators.yml +65 -0
  376. package/bundled-rules/sigma-rules/community/2023/TA/UNC4841-Barracuda-ESG-Zero-Day-Exploitation/proc_creation_lnx_apt_unc4841_openssl_connection.yml +30 -0
  377. package/bundled-rules/sigma-rules/community/2023/TA/UNC4841-Barracuda-ESG-Zero-Day-Exploitation/proc_creation_lnx_apt_unc4841_wget_download_compressed_file_tmep_sh.yml +26 -0
  378. package/bundled-rules/sigma-rules/community/2023/TA/UNC4841-Barracuda-ESG-Zero-Day-Exploitation/proc_creation_lnx_apt_unc4841_wget_download_tar_files_direct_ip.yml +48 -0
  379. package/bundled-rules/sigma-rules/community/2023/TA/UNC4841-Barracuda-ESG-Zero-Day-Exploitation/proc_creation_lnx_atp_unc4841_seaspy_execution.yml +24 -0
  380. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-1212/web_exploit_cve_2024_1212_.yml +33 -0
  381. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-1708/file_event_win_exploit_cve_2024_1708_screenconnect.yml +33 -0
  382. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-1708/win_security_exploit_cve_2024_1708_screenconnect.yml +39 -0
  383. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-1709/file_event_win_exploit_cve_2024_1709_user_database_modification_screenconnect.yml +33 -0
  384. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-1709/web_exploit_cve_2024_1709_screenconnect.yml +25 -0
  385. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-1709/win_security_exploit_cve_2024_1709_user_database_modification_screenconnect.yml +38 -0
  386. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-3094/proc_creation_lnx_exploit_cve_2024_3094_sshd_child_process.yml +28 -0
  387. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-3400/file_event_paloalto_globalprotect_exploit_cve_2024_3400_command_inject_file_creation.yml +33 -0
  388. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-3400/paloalto_globalprotect_exploit_cve_2024_3400_command_injection.yml +48 -0
  389. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-35250/image_load_exploit_cve_2024_35250_privilege_escalation.yml +46 -0
  390. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-37085/proc_creation_win_exploit_cve_2024_37085_esxi_admins_group_creation.yml +47 -0
  391. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-37085/win_security_exploit_cve_2024_37085_esxi_admins_group.yml +34 -0
  392. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-49113/win_application_error_exploit_cve_2024_49113_ldap_nightmare.yml +30 -0
  393. package/bundled-rules/sigma-rules/community/2024/Exploits/CVE-2024-50623/proc_creation_win_exploit_cve_2024_50623_cleo.yml +36 -0
  394. package/bundled-rules/sigma-rules/community/2024/Malware/CSharp-Streamer/image_load_malware_csharp_streamer_dotnet_load.yml +24 -0
  395. package/bundled-rules/sigma-rules/community/2024/Malware/DarkGate/file_event_win_malware_darkgate_autoit3_save_temp.yml +31 -0
  396. package/bundled-rules/sigma-rules/community/2024/Malware/Generic/file_event_win_malware_generic_creation_configuration_rats.yml +35 -0
  397. package/bundled-rules/sigma-rules/community/2024/Malware/KamiKakaBot/proc_creation_win_malware_kamikakabot_lnk_lure_execution.yml +29 -0
  398. package/bundled-rules/sigma-rules/community/2024/Malware/KamiKakaBot/proc_creation_win_malware_kamikakabot_schtasks_persistence.yml +32 -0
  399. package/bundled-rules/sigma-rules/community/2024/Malware/KamiKakaBot/registry_set_malware_kamikakabot_winlogon_persistence.yml +29 -0
  400. package/bundled-rules/sigma-rules/community/2024/Malware/Lummac-Stealer/proc_creation_win_malware_lummac_more_vbc.yml +33 -0
  401. package/bundled-rules/sigma-rules/community/2024/Malware/Raspberry-Robin/image_load_malware_raspberry_robin_side_load_aclui_oleview.yml +38 -0
  402. package/bundled-rules/sigma-rules/community/2024/Malware/Raspberry-Robin/proc_creation_win_malware_raspberry_robin_rundll32_shell32_cpl_exection.yml +39 -0
  403. package/bundled-rules/sigma-rules/community/2024/Malware/Raspberry-Robin/registry_set_malware_raspberry_robin_internet_settings_zonemap_tamper.yml +49 -0
  404. package/bundled-rules/sigma-rules/community/2024/Malware/kapeka/Kapeka.md +17 -0
  405. package/bundled-rules/sigma-rules/community/2024/Malware/kapeka/file_event_win_malware_kapeka_backdoor_indicators.yml +31 -0
  406. package/bundled-rules/sigma-rules/community/2024/Malware/kapeka/image_load_malware_kapeka_backdoor_wll.yml +31 -0
  407. package/bundled-rules/sigma-rules/community/2024/Malware/kapeka/proc_creation_win_malware_kapeka_backdoor_persistence.yml +51 -0
  408. package/bundled-rules/sigma-rules/community/2024/Malware/kapeka/proc_creation_win_malware_kapeka_backdoor_rundll32_execution.yml +38 -0
  409. package/bundled-rules/sigma-rules/community/2024/Malware/kapeka/registry_set_malware_kapeka_backdoor_autorun_persistence.yml +34 -0
  410. package/bundled-rules/sigma-rules/community/2024/Malware/kapeka/registry_set_malware_kapeka_backdoor_configuration.yml +29 -0
  411. package/bundled-rules/sigma-rules/community/2024/Malware/kapeka/win_security_malware_kapeka_backdoor_scheduled_task_creation.yml +44 -0
  412. package/bundled-rules/sigma-rules/community/2024/TA/DPRK/dns_query_win_apt_dprk_malicious_domains.yml +23 -0
  413. package/bundled-rules/sigma-rules/community/2024/TA/FIN7/proc_creation_win_apt_fin7_exploitation_indicators.yml +29 -0
  414. package/bundled-rules/sigma-rules/community/2024/TA/Forest-Blizzard/README.md +17 -0
  415. package/bundled-rules/sigma-rules/community/2024/TA/Forest-Blizzard/file_event_win_apt_forest_blizzard_activity.yml +50 -0
  416. package/bundled-rules/sigma-rules/community/2024/TA/Forest-Blizzard/file_event_win_apt_forest_blizzard_constrained_js.yml +25 -0
  417. package/bundled-rules/sigma-rules/community/2024/TA/Forest-Blizzard/proc_creation_win_apt_forest_blizzard_activity.yml +49 -0
  418. package/bundled-rules/sigma-rules/community/2024/TA/Forest-Blizzard/registry_set_apt_forest_blizzard_custom_protocol_handler.yml +26 -0
  419. package/bundled-rules/sigma-rules/community/2024/TA/Forest-Blizzard/registry_set_apt_forest_blizzard_custom_protocol_handler_dll.yml +26 -0
  420. package/bundled-rules/sigma-rules/community/2024/TA/SlashAndGrab-Exploitation-In-Wild/file_event_win_apt_unknown_exploitation_indicators.yml +35 -0
  421. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-10035/proc_creation_win_exploit_cve_2025_10035.yml +78 -0
  422. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-20333/proxy_exploit_cve_2025_20333.yml +28 -0
  423. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-24054/file_event_win_exploit_cve_2025_24054_library_ms.yml +31 -0
  424. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-30406/proc_creation_win_exploit_cve_2025_30406_centrestack_portal_child_process.yml +31 -0
  425. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-31161/proc_creation_win_crushftp_susp_child_processes.yml +45 -0
  426. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-31324/file_event_lnx_sap_netweaver_webshell_creation.yml +37 -0
  427. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-31324/file_event_win_sap_netweaver_webshell_creation.yml +37 -0
  428. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-31324/proc_creation_lnx_sap_netweaver_susp_child_process.yml +60 -0
  429. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-31324/proc_creation_win_sap_netweaver_susp_child_process.yml +49 -0
  430. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-31324/web_lnx_exploit_cve_2025_31324_sap_netviewer_webshell.yml +47 -0
  431. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-31324/web_lnx_exploit_cve_2025_31324_sap_netviewer_webshell_uploaded.yml +32 -0
  432. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-32463/file_event_lnx_exploit_cve_2025_32463.yml +29 -0
  433. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-33053/image_load_win_exploit_cve_2025_33053.yml +45 -0
  434. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-33053/proc_access_win_exploit_cve_2025_33053.yml +52 -0
  435. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-33053/proc_creation_win_exploit_cve_2025_33053.yml +58 -0
  436. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-40551/proc_creation_win_exploit_cve_2025_40551.yml +49 -0
  437. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-4427/web_invanti_epmm_cve_2025_4427_and_cve_2025_4428.yml +50 -0
  438. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-49144/proc_creation_win_exploit_cve_2025_49144.yml +35 -0
  439. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-53770/file_event_win_exploit_cve_2025_53770.yml +37 -0
  440. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-53770/proc_creation_win_exploit_cve_2025_53770_indicators.yml +39 -0
  441. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-53770/web_win_iis_exploit_cve_2025_53770.yml +33 -0
  442. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-54309/proc_creation_win_exploit_cve_2025_54309.yml +54 -0
  443. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-55182/proc_creation_lnx_exploit_cve_2025_55182_susp_nodejs_server_child_process.yml +129 -0
  444. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-55182/proc_creation_win_exploit_cve_2025_55182_susp_nodejs_server_child_process.yml +142 -0
  445. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-57788/proc_creation_win_exploit_cve_2025_57788.yml +32 -0
  446. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-57790/proc_creation_win_exploit_cve_2025_57790.yml +32 -0
  447. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-57791/proc_creation_win_exploit_cve_2025_57791.yml +30 -0
  448. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-59287/proc_creation_win_exploit_cve_2025_59287.yml +38 -0
  449. package/bundled-rules/sigma-rules/community/2025/Exploits/CVE-2025-59287/win_wsus_exploit_cve_2025_59287.yml +37 -0
  450. package/bundled-rules/sigma-rules/community/2025/Malware/Atomic-MacOS-Stealer/file_event_macos_malware_amos_persistence.yml +32 -0
  451. package/bundled-rules/sigma-rules/community/2025/Malware/Atomic-MacOS-Stealer/proc_creation_macos_malware_amos_curl_post.yml +40 -0
  452. package/bundled-rules/sigma-rules/community/2025/Malware/Grixba/proc_creation_win_malware_grixba_recon.yml +50 -0
  453. package/bundled-rules/sigma-rules/community/2025/Malware/Katz-Stealer/dns_query_win_katz_stealer_domain.yml +32 -0
  454. package/bundled-rules/sigma-rules/community/2025/Malware/Katz-Stealer/image_load_win_katz_stealer_payloads.yml +27 -0
  455. package/bundled-rules/sigma-rules/community/2025/Malware/Katz-Stealer/net_dns_katz_stealer_domain.yml +31 -0
  456. package/bundled-rules/sigma-rules/community/2025/Malware/Katz-Stealer/zeek_http_katz_stealer_susp_useragent.yml +23 -0
  457. package/bundled-rules/sigma-rules/community/2025/Malware/Shai-Hulud/file_event_lnx_mal_shai_hulud_workflow.yml +25 -0
  458. package/bundled-rules/sigma-rules/community/2025/Malware/Shai-Hulud/github_mal_shai_hulud_npm_attack.yml +24 -0
  459. package/bundled-rules/sigma-rules/community/2025/Malware/Shai-Hulud/proc_creation_lnx_mal_shai_hululd_exfiltration.yml +28 -0
  460. package/bundled-rules/sigma-rules/community/2025/Malware/file_event_win_malware_funklocker_ransomware_extension.yml +23 -0
  461. package/bundled-rules/sigma-rules/community/2025/Malware/proc_creation_win_malware_kalambur_curl_socks_tor.yml +34 -0
  462. package/bundled-rules/sigma-rules/community/VERSION +3 -3
  463. package/bundled-rules/sigma-rules/community/cloud/aws/cloudtrail/aws_cloudtrail_console_login_success_from_susp_locations.yml +32 -0
  464. package/bundled-rules/sigma-rules/community/cloud/azure/audit_logs/azure_ad_account_created_deleted_nonapproved_user.yml +30 -0
  465. package/bundled-rules/sigma-rules/community/cloud/azure/signin_logs/azure_ad_account_signin_outside_hours.yml +29 -0
  466. package/bundled-rules/sigma-rules/community/cloud/azure/signin_logs/azure_privileged_account_no_saw_paw.yml +35 -0
  467. package/bundled-rules/sigma-rules/community/cloud/azure/signin_logs/azure_privileged_account_sigin_expected_controls.yml +31 -0
  468. package/bundled-rules/sigma-rules/community/cloud/azure/signin_logs/azure_privileged_account_signin_outside_hours.yml +31 -0
  469. package/bundled-rules/sigma-rules/community/cloud/m365/audit/microsoft365_susp_email_forwarding_activity.yml +49 -0
  470. package/bundled-rules/sigma-rules/community/cloud/m365/audit/microsoft365_susp_inbox_rule_creation_or_update_activity.yml +38 -0
  471. package/bundled-rules/sigma-rules/community/cloud/okta/okta_password_health_report_query.yml +25 -0
  472. package/bundled-rules/sigma-rules/community/linux/file/file_event/file_event_lnx_python_path_configuration_files.yml +33 -0
  473. package/bundled-rules/sigma-rules/community/linux/file/file_event/file_event_lnx_susp_long_filename_pattern.yml +32 -0
  474. package/bundled-rules/sigma-rules/community/linux/process_creation/proc_creation_lnx_susp_process_termination_via_kill.yml +29 -0
  475. package/bundled-rules/sigma-rules/community/linux/process_creation/proc_creation_lnx_susp_running_process_discovery.yml +32 -0
  476. package/bundled-rules/sigma-rules/community/macos/file/file_event/file_event_macos_python_path_configuration_files.yml +33 -0
  477. package/bundled-rules/sigma-rules/community/macos/process_creation/proc_creation_macos_pbpaste_execution.yml +30 -0
  478. package/bundled-rules/sigma-rules/community/network/net_dns_low_reputation_etld.yml +42 -0
  479. package/bundled-rules/sigma-rules/community/other/netflow_cleartext_protocols.yml +83 -0
  480. package/bundled-rules/sigma-rules/community/product/qualys/qualys_default_credentials_usage.yml +112 -0
  481. package/bundled-rules/sigma-rules/community/product/qualys/qualys_host_without_firewall.yml +31 -0
  482. package/bundled-rules/sigma-rules/community/web/proxy_generic/proxy_susp_class_extension_request.yml +23 -0
  483. package/bundled-rules/sigma-rules/community/windows/builtin/appxdeployment_server/win_appxpackaging_server_successful_package_installation.yml +25 -0
  484. package/bundled-rules/sigma-rules/community/windows/builtin/bits_client/win_bits_client_new_transfer_via_uncommon_tld.yml +2 -1
  485. package/bundled-rules/sigma-rules/community/windows/builtin/code_integrity/win_codeintegrity_attempted_dll_load.yml +6 -2
  486. package/bundled-rules/sigma-rules/community/windows/builtin/firewall_as/win_firewall_as_change_rule.yml +38 -0
  487. package/bundled-rules/sigma-rules/community/windows/builtin/security/account_management/win_security_scrcons_remote_wmi_scripteventconsumer.yml +31 -0
  488. package/bundled-rules/sigma-rules/community/windows/builtin/security/win_security_admin_logon.yml +34 -0
  489. package/bundled-rules/sigma-rules/community/windows/builtin/security/win_security_exploit_cve_2020_1472.yml +29 -0
  490. package/bundled-rules/sigma-rules/community/windows/builtin/security/win_security_file_access_browser_credential.yml +56 -0
  491. package/bundled-rules/sigma-rules/community/windows/builtin/security/win_security_potential_pass_the_hash.yml +33 -0
  492. package/bundled-rules/sigma-rules/community/windows/builtin/security/win_security_remote_registry_management_via_reg.yml +31 -0
  493. package/bundled-rules/sigma-rules/community/windows/builtin/security/win_security_scheduled_task_deletion.yml +32 -0
  494. package/bundled-rules/sigma-rules/community/windows/builtin/security/win_security_susp_interactive_logons.yml +37 -0
  495. package/bundled-rules/sigma-rules/community/windows/create_remote_thread/create_remote_thread_win_loadlibrary.yml +25 -0
  496. package/bundled-rules/sigma-rules/community/windows/create_remote_thread/create_remote_thread_win_powershell_generic.yml +30 -0
  497. package/bundled-rules/sigma-rules/community/windows/create_remote_thread/create_remote_thread_win_susp_target_shell_application.yml +38 -0
  498. package/bundled-rules/sigma-rules/community/windows/dns_query/dns_query_win_wscript_cscript_resolution.yml +42 -0
  499. package/bundled-rules/sigma-rules/community/windows/file/file_access/file_access_win_browsers_chromium_sensitive_files.yml +46 -0
  500. package/bundled-rules/sigma-rules/community/windows/file/file_access/file_access_win_browsers_credential.yml +63 -0
  501. package/bundled-rules/sigma-rules/community/windows/file/file_access/file_access_win_office_outlook_mail_credential.yml +52 -0
  502. package/bundled-rules/sigma-rules/community/windows/file/file_access/file_access_win_susp_gpo_access_uncommon_process.yml +33 -0
  503. package/bundled-rules/sigma-rules/community/windows/file/file_access/file_access_win_susp_reg_and_hive.yml +33 -0
  504. package/bundled-rules/sigma-rules/community/windows/file/file_access/file_access_win_susp_unattend_xml.yml +25 -0
  505. package/bundled-rules/sigma-rules/community/windows/file/file_change/file_change_win_date_changed_to_another_year.yml +60 -0
  506. package/bundled-rules/sigma-rules/community/windows/file/file_delete/file_delete_win_zone_identifier_ads.yml +25 -0
  507. package/bundled-rules/sigma-rules/community/windows/file/file_event/file_event_win_bloodhound_collection.yml +2 -2
  508. package/bundled-rules/sigma-rules/community/windows/file/file_event/file_event_win_comodo_itsm_potentially_suspicious_file_creation.yml +46 -0
  509. package/bundled-rules/sigma-rules/community/windows/file/file_event/file_event_win_creation_system_file.yml +2 -1
  510. package/bundled-rules/sigma-rules/community/windows/file/file_event/file_event_win_dump_file_creation.yml +24 -0
  511. package/bundled-rules/sigma-rules/community/windows/file/file_event/file_event_win_pfx_file_creation.yml +49 -0
  512. package/bundled-rules/sigma-rules/community/windows/file/file_event/file_event_win_python_path_configuration_files.yml +38 -0
  513. package/bundled-rules/sigma-rules/community/windows/file/file_event/file_event_win_scheduled_task_creation.yml +30 -0
  514. package/bundled-rules/sigma-rules/community/windows/file/file_event/file_event_win_susp_binary_dropper.yml +123 -0
  515. package/bundled-rules/sigma-rules/community/windows/file/file_event/file_event_win_vscode_tunnel_indicators.yml +23 -0
  516. package/bundled-rules/sigma-rules/community/windows/file/file_event/file_event_win_wdac_policy_creation_in_codeintegrity_folder.yml +29 -0
  517. package/bundled-rules/sigma-rules/community/windows/file/file_event/file_event_win_webdav_tmpfile_creation.yml +41 -0
  518. package/bundled-rules/sigma-rules/community/windows/file/file_rename/file_rename_win_non_dll_to_dll_ext.yml +47 -0
  519. package/bundled-rules/sigma-rules/community/windows/image_load/image_load_dll_amsi_uncommon_process.yml +51 -0
  520. package/bundled-rules/sigma-rules/community/windows/image_load/image_load_dll_bitsproxy_load_by_uncommon_process.yml +41 -0
  521. package/bundled-rules/sigma-rules/community/windows/image_load/image_load_dll_dbghelp_dbgcore_susp_load.yml +74 -0
  522. package/bundled-rules/sigma-rules/community/windows/image_load/image_load_dll_system_drawing_load.yml +24 -0
  523. package/bundled-rules/sigma-rules/community/windows/image_load/image_load_dll_taskschd_by_process_in_potentially_suspicious_location.yml +37 -0
  524. package/bundled-rules/sigma-rules/community/windows/image_load/image_load_office_excel_xll_load.yml +23 -0
  525. package/bundled-rules/sigma-rules/community/windows/image_load/image_load_office_word_wll_load.yml +25 -0
  526. package/bundled-rules/sigma-rules/community/windows/image_load/image_load_side_load_cpl_from_non_system_location.yml +18 -9
  527. package/bundled-rules/sigma-rules/community/windows/image_load/image_load_wmi_module_load_by_uncommon_process.yml +61 -0
  528. package/bundled-rules/sigma-rules/community/windows/network_connection/net_connection_win_dfsvc_non_local_ip.yml +34 -0
  529. package/bundled-rules/sigma-rules/community/windows/network_connection/net_connection_win_dfsvc_uncommon_ports.yml +33 -0
  530. package/bundled-rules/sigma-rules/community/windows/network_connection/net_connection_win_dllhost_non_local_ip.yml +51 -0
  531. package/bundled-rules/sigma-rules/community/windows/network_connection/net_connection_win_hh_http_connection.yml +31 -0
  532. package/bundled-rules/sigma-rules/community/windows/network_connection/net_connection_win_msiexec_http.yml +31 -0
  533. package/bundled-rules/sigma-rules/community/windows/network_connection/net_connection_win_powershell_network_connection.yml +48 -0
  534. package/bundled-rules/sigma-rules/community/windows/network_connection/net_connection_win_susp_azurefd_connection.yml +49 -0
  535. package/bundled-rules/sigma-rules/community/windows/network_connection/net_connection_win_susp_initaited_public_folder.yml +31 -0
  536. package/bundled-rules/sigma-rules/community/windows/network_connection/net_connection_win_susp_rdp_from_domain_controller.yml +26 -0
  537. package/bundled-rules/sigma-rules/community/windows/pipe_created/pipe_created_sysinternals_psexec_default_pipe.yml +29 -0
  538. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_classic/posh_pc_alternate_powershell_hosts.yml +42 -0
  539. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_classic/posh_pc_bxor_operator_usage.yml +29 -0
  540. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_module/posh_pm_susp_netfirewallrule_recon.yml +31 -0
  541. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_compress_archive_usage.yml +27 -0
  542. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_email_forwarding_activity.yml +43 -0
  543. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_inbox_rule_creation_or_update_activity.yml +42 -0
  544. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_mailbox_access.yml +23 -0
  545. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_new_netfirewallrule_allow.yml +29 -0
  546. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_new_smbmapping_quic.yml +30 -0
  547. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_registry_reconnaissance.yml +28 -0
  548. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_remove_item_path.yml +32 -0
  549. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_send_mailmessage.yml +28 -0
  550. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_token_obfuscation.yml +48 -0
  551. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_win_api_functions_access.yml +38 -0
  552. package/bundled-rules/sigma-rules/community/windows/powershell/powershell_script/posh_ps_win_api_library_access.yml +69 -0
  553. package/bundled-rules/sigma-rules/community/windows/process_access/proc_access_win_lsass_powershell_access.yml +31 -0
  554. package/bundled-rules/sigma-rules/community/windows/process_access/proc_access_win_lsass_susp_source_process.yml +137 -0
  555. package/bundled-rules/sigma-rules/community/windows/process_access/proc_access_win_lsass_uncommon_access_flag.yml +110 -0
  556. package/bundled-rules/sigma-rules/community/windows/process_access/proc_access_win_susp_potential_shellcode_injection.yml +56 -0
  557. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_7zip_password_extraction.yml +35 -0
  558. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_attrib_system.yml +31 -0
  559. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_boinc_execution.yml +26 -0
  560. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_cmd_redirect.yml +36 -0
  561. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_cmd_set_prompt_abuse.yml +34 -0
  562. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_comodo_ssh_shellhost_cmd_spawn.yml +36 -0
  563. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_conhost_headless_execution.yml +30 -0
  564. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_csc_compilation.yml +29 -0
  565. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_curl_download.yml +36 -0
  566. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_curl_execution.yml +28 -0
  567. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_curl_fileupload.yml +40 -0
  568. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_curl_useragent.yml +30 -0
  569. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_dfsvc_child_processes.yml +23 -0
  570. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_diskshadow_child_process.yml +37 -0
  571. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_diskshadow_script_mode.yml +40 -0
  572. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_explorer_child_of_shell_process.yml +33 -0
  573. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_extexport_execution.yml +32 -0
  574. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_findstr_password_recon.yml +35 -0
  575. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_iexpress_execution.yml +36 -0
  576. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_microsoft_workflow_compiler_execution.yml +29 -0
  577. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_mode_codepage_change.yml +36 -0
  578. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_net_execution.yml +53 -0
  579. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_net_quic.yml +33 -0
  580. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_office_svchost_parent.yml +34 -0
  581. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_powershell_abnormal_commandline_size.yml +32 -0
  582. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_powershell_crypto_namespace.yml +45 -0
  583. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_powershell_import_module.yml +39 -0
  584. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_powershell_new_netfirewallrule_allow.yml +39 -0
  585. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_powershell_non_interactive_execution.yml +3 -1
  586. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_powershell_susp_child_processes.yml +59 -0
  587. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_reg_system_language_discovery.yml +35 -0
  588. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_regsvr32_dllregisterserver_exec.yml +54 -0
  589. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_remote_access_tools_action1_code_exec_and_remote_sessions.yml +49 -0
  590. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_remote_access_tools_ammyy_admin_execution.yml +23 -0
  591. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_remote_access_tools_anyviewer_shell_exec.yml +25 -0
  592. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_remote_access_tools_screenconnect_child_proc.yml +29 -0
  593. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_rundll32_by_ordinal.yml +48 -0
  594. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_rundll32_dllregisterserver.yml +38 -0
  595. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_sc_query.yml +29 -0
  596. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_schtasks_creation_from_susp_parent.yml +39 -0
  597. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_cli_obfuscation_unicode.yml +49 -0
  598. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_compression_params.yml +37 -0
  599. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_elevated_system_shell.yml +43 -0
  600. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_event_log_query.yml +48 -0
  601. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_execution_from_guid_folder_names.yml +48 -0
  602. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_execution_path_webserver.yml +34 -0
  603. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_exfil_and_tunneling_tool_execution.yml +30 -0
  604. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_file_permission_modifications.yml +53 -0
  605. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_ntfs_short_name_path_use_cli.yml +71 -0
  606. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_open_html_file_from_download_folder.yml +39 -0
  607. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_parent_execute_itself.yml +61 -0
  608. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_script_exec_from_compressed_parent.yml +57 -0
  609. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_susp_system_exe_anomaly.yml +2 -0
  610. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_svchost_masqueraded_execution.yml +1 -0
  611. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_taskkill_execution.yml +39 -0
  612. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_tasklist_basic_execution.yml +25 -0
  613. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_userdomain_variable_enumeration.yml +24 -0
  614. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_webdav_process_execution.yml +29 -0
  615. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_winscp_command_open_ftp.yml +28 -0
  616. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_winscp_portable_execution.yml +25 -0
  617. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_wmic_recon_system_info.yml +66 -0
  618. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_wscript_cscript_script_exec.yml +43 -0
  619. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_wsl_arbitrary_command_execution.yml +52 -0
  620. package/bundled-rules/sigma-rules/community/windows/process_creation/proc_creation_win_wusa_cab_files_extraction.yml +27 -0
  621. package/bundled-rules/sigma-rules/community/windows/registry/registry_event/registry_event_scheduled_task_creation.yml +29 -0
  622. package/bundled-rules/sigma-rules/community/windows/registry/registry_set/registry_set_office_trusted_location.yml +35 -0
  623. package/bundled-rules/sigma-rules/community/windows/registry/registry_set/registry_set_powershell_crypto_namespace.yml +46 -0
  624. package/bundled-rules/sigma-rules/community/windows/registry/registry_set/registry_set_runmru_command_execution.yml +47 -0
  625. package/bundled-rules/sigma-rules/community/windows/registry/registry_set/registry_set_service_image_path_user_controlled_folder.yml +51 -0
  626. package/bundled-rules/sigma-rules/community/windows/registry/registry_set/registry_set_shell_context_menu_tampering.yml +24 -0
  627. package/bundled-rules/yara-rules/auto-generated/code-injection-panguard_code_injection_nvd_CVE-.yar +23 -0
  628. package/bundled-rules/yara-rules/auto-generated/command-injection-panguard_command_injection_nvd_CVE-.yar +22 -0
  629. package/bundled-rules/yara-rules/auto-generated/file-upload-panguard_file_upload_nvd_CVE-.yar +23 -0
  630. package/bundled-rules/yara-rules/auto-generated/information-disclosure-panguard_information_disclosure_nvd_CVE-.yar +22 -0
  631. package/bundled-rules/yara-rules/community/VERSION +5 -5
  632. package/bundled-rules/yara-rules/community/albertzsigovits/backdoor_shamanic.yar +36 -0
  633. package/bundled-rules/yara-rules/community/albertzsigovits/botnet_gafgyt.yar +19 -0
  634. package/bundled-rules/yara-rules/community/albertzsigovits/botnet_mirai.yar +23 -0
  635. package/bundled-rules/yara-rules/community/albertzsigovits/crypter_titancrypt.yar +15 -0
  636. package/bundled-rules/yara-rules/community/albertzsigovits/debug_dotnet.yar +76 -0
  637. package/bundled-rules/yara-rules/community/albertzsigovits/debug_lnk.yar +41 -0
  638. package/bundled-rules/yara-rules/community/albertzsigovits/infostealer_redline.yar +64 -0
  639. package/bundled-rules/yara-rules/community/albertzsigovits/linux_shdownloader.yar +31 -0
  640. package/bundled-rules/yara-rules/community/albertzsigovits/loader_cruloader.yar +48 -0
  641. package/bundled-rules/yara-rules/community/albertzsigovits/msil_tinydownloader.yar +124 -0
  642. package/bundled-rules/yara-rules/community/albertzsigovits/pe_signed.yar +17 -0
  643. package/bundled-rules/yara-rules/community/albertzsigovits/programlangs.yar +137 -0
  644. package/bundled-rules/yara-rules/community/albertzsigovits/ransomware_blackbasta.yar +42 -0
  645. package/bundled-rules/yara-rules/community/albertzsigovits/ransomware_blackcocaine.yar +21 -0
  646. package/bundled-rules/yara-rules/community/albertzsigovits/ransomware_cl0p.yar +46 -0
  647. package/bundled-rules/yara-rules/community/albertzsigovits/ransomware_darkbit.yar +127 -0
  648. package/bundled-rules/yara-rules/community/albertzsigovits/ransomware_esxiargs.yar +41 -0
  649. package/bundled-rules/yara-rules/community/albertzsigovits/ransomware_kangaroo.yar +51 -0
  650. package/bundled-rules/yara-rules/community/albertzsigovits/ransomware_royal.yar +28 -0
  651. package/bundled-rules/yara-rules/community/albertzsigovits/rat_rokrat.yar +46 -0
  652. package/bundled-rules/yara-rules/community/albertzsigovits/rat_toxiceye.yar +206 -0
  653. package/bundled-rules/yara-rules/community/albertzsigovits/trojan_fakepdf.yar +23 -0
  654. package/bundled-rules/yara-rules/community/baderj/agent_tesla.yar +36 -0
  655. package/bundled-rules/yara-rules/community/baderj/amadey.yar +27 -0
  656. package/bundled-rules/yara-rules/community/baderj/async_rat.yar +39 -0
  657. package/bundled-rules/yara-rules/community/baderj/aurora_stealer.yar +77 -0
  658. package/bundled-rules/yara-rules/community/baderj/danabot.yar +25 -0
  659. package/bundled-rules/yara-rules/community/baderj/discord_pws.yar +27 -0
  660. package/bundled-rules/yara-rules/community/baderj/erbium_stealer.yar +27 -0
  661. package/bundled-rules/yara-rules/community/baderj/ffdroider.yar +49 -0
  662. package/bundled-rules/yara-rules/community/baderj/gcleaner.yar +45 -0
  663. package/bundled-rules/yara-rules/community/baderj/imminent_rat.yar +50 -0
  664. package/bundled-rules/yara-rules/community/baderj/laplas_clipper.yar +55 -0
  665. package/bundled-rules/yara-rules/community/baderj/lime_rat.yar +21 -0
  666. package/bundled-rules/yara-rules/community/baderj/lu0bot_loader.yar +53 -0
  667. package/bundled-rules/yara-rules/community/baderj/matiex_keylogger.yar +106 -0
  668. package/bundled-rules/yara-rules/community/baderj/modern_loader.yar +58 -0
  669. package/bundled-rules/yara-rules/community/baderj/neshta.yar +16 -0
  670. package/bundled-rules/yara-rules/community/baderj/nj_rat.yar +133 -0
  671. package/bundled-rules/yara-rules/community/baderj/origin_logger.yar +90 -0
  672. package/bundled-rules/yara-rules/community/baderj/phorpiex.yar +69 -0
  673. package/bundled-rules/yara-rules/community/baderj/quasar_rat.yar +91 -0
  674. package/bundled-rules/yara-rules/community/baderj/rekoobe.yar +41 -0
  675. package/bundled-rules/yara-rules/community/baderj/shai-hulud.yar +37 -0
  676. package/bundled-rules/yara-rules/community/baderj/vidar.yar +52 -0
  677. package/bundled-rules/yara-rules/community/baderj/win_bitcoin_genesis_b9.yara +49 -0
  678. package/bundled-rules/yara-rules/community/baderj/ws_rat.yar +28 -0
  679. package/bundled-rules/yara-rules/community/baderj/xfiles_loader.yar +40 -0
  680. package/bundled-rules/yara-rules/community/baderj/xworm.yar +53 -0
  681. package/bundled-rules/yara-rules/community/barrosleo/forensics_rule1.yar +16 -0
  682. package/bundled-rules/yara-rules/community/barrosleo/malware_rule1.yar +16 -0
  683. package/bundled-rules/yara-rules/community/barrosleo/malware_rule2.yar +16 -0
  684. package/bundled-rules/yara-rules/community/jpcert/BlackTech/blacktech.yara +37 -0
  685. package/bundled-rules/yara-rules/community/jpcert/Kimsuky/Kimsuky.yara +57 -0
  686. package/bundled-rules/yara-rules/community/jpcert/UNC5174/unc5174.yara +38 -0
  687. package/bundled-rules/yara-rules/community/jpcert/other/Atlas.yara +42 -0
  688. package/bundled-rules/yara-rules/community/jpcert/other/fortinet.yara +59 -0
  689. package/bundled-rules/yara-rules/community/jpcert/other/phantomstealer.yara +17 -0
  690. package/bundled-rules/yara-rules/community/jpcert/other/snakekeylogger.yara +16 -0
  691. package/dist/agent/atr-action-handlers.d.ts.map +1 -1
  692. package/dist/agent/atr-action-handlers.js +5 -3
  693. package/dist/agent/atr-action-handlers.js.map +1 -1
  694. package/dist/agent/respond/action-manifest.d.ts +26 -0
  695. package/dist/agent/respond/action-manifest.d.ts.map +1 -0
  696. package/dist/agent/respond/action-manifest.js +89 -0
  697. package/dist/agent/respond/action-manifest.js.map +1 -0
  698. package/dist/agent/respond/action-rate-limiter.d.ts +40 -0
  699. package/dist/agent/respond/action-rate-limiter.d.ts.map +1 -0
  700. package/dist/agent/respond/action-rate-limiter.js +93 -0
  701. package/dist/agent/respond/action-rate-limiter.js.map +1 -0
  702. package/dist/agent/respond/escalation-tracker.d.ts +17 -0
  703. package/dist/agent/respond/escalation-tracker.d.ts.map +1 -0
  704. package/dist/agent/respond/escalation-tracker.js +38 -0
  705. package/dist/agent/respond/escalation-tracker.js.map +1 -0
  706. package/dist/agent/respond/evidence-extractor.d.ts +18 -0
  707. package/dist/agent/respond/evidence-extractor.d.ts.map +1 -0
  708. package/dist/agent/respond/evidence-extractor.js +59 -0
  709. package/dist/agent/respond/evidence-extractor.js.map +1 -0
  710. package/dist/agent/respond/index.d.ts +13 -0
  711. package/dist/agent/respond/index.d.ts.map +1 -0
  712. package/dist/agent/respond/index.js +11 -0
  713. package/dist/agent/respond/index.js.map +1 -0
  714. package/dist/agent/respond/os-actions.d.ts +23 -0
  715. package/dist/agent/respond/os-actions.d.ts.map +1 -0
  716. package/dist/agent/respond/os-actions.js +414 -0
  717. package/dist/agent/respond/os-actions.js.map +1 -0
  718. package/dist/agent/respond/safety-rules.d.ts +20 -0
  719. package/dist/agent/respond/safety-rules.d.ts.map +1 -0
  720. package/dist/agent/respond/safety-rules.js +35 -0
  721. package/dist/agent/respond/safety-rules.js.map +1 -0
  722. package/dist/agent/respond/types.d.ts +26 -0
  723. package/dist/agent/respond/types.d.ts.map +1 -0
  724. package/dist/agent/respond/types.js +6 -0
  725. package/dist/agent/respond/types.js.map +1 -0
  726. package/dist/agent/respond-agent.d.ts +22 -109
  727. package/dist/agent/respond-agent.d.ts.map +1 -1
  728. package/dist/agent/respond-agent.js +172 -866
  729. package/dist/agent/respond-agent.js.map +1 -1
  730. package/dist/cli/index.d.ts.map +1 -1
  731. package/dist/cli/index.js +40 -2
  732. package/dist/cli/index.js.map +1 -1
  733. package/dist/config.d.ts.map +1 -1
  734. package/dist/config.js +76 -1
  735. package/dist/config.js.map +1 -1
  736. package/dist/dashboard/index.d.ts +0 -1
  737. package/dist/dashboard/index.d.ts.map +1 -1
  738. package/dist/dashboard/index.js +81 -79
  739. package/dist/dashboard/index.js.map +1 -1
  740. package/dist/engines/atr-engine.d.ts.map +1 -1
  741. package/dist/engines/atr-engine.js +52 -3
  742. package/dist/engines/atr-engine.js.map +1 -1
  743. package/dist/engines/skill-whitelist.d.ts.map +1 -1
  744. package/dist/engines/skill-whitelist.js +4 -1
  745. package/dist/engines/skill-whitelist.js.map +1 -1
  746. package/dist/event-processor.d.ts +58 -0
  747. package/dist/event-processor.d.ts.map +1 -0
  748. package/dist/event-processor.js +304 -0
  749. package/dist/event-processor.js.map +1 -0
  750. package/dist/guard-context.d.ts +90 -0
  751. package/dist/guard-context.d.ts.map +1 -0
  752. package/dist/guard-context.js +49 -0
  753. package/dist/guard-context.js.map +1 -0
  754. package/dist/guard-engine.d.ts +23 -57
  755. package/dist/guard-engine.d.ts.map +1 -1
  756. package/dist/guard-engine.js +256 -944
  757. package/dist/guard-engine.js.map +1 -1
  758. package/dist/llm-detect.d.ts +16 -0
  759. package/dist/llm-detect.d.ts.map +1 -0
  760. package/dist/llm-detect.js +119 -0
  761. package/dist/llm-detect.js.map +1 -0
  762. package/dist/metrics.d.ts.map +1 -1
  763. package/dist/metrics.js +18 -0
  764. package/dist/metrics.js.map +1 -1
  765. package/dist/monitors/git-watcher.d.ts +111 -0
  766. package/dist/monitors/git-watcher.d.ts.map +1 -0
  767. package/dist/monitors/git-watcher.js +384 -0
  768. package/dist/monitors/git-watcher.js.map +1 -0
  769. package/dist/monitors/index.d.ts +2 -0
  770. package/dist/monitors/index.d.ts.map +1 -1
  771. package/dist/monitors/index.js +1 -0
  772. package/dist/monitors/index.js.map +1 -1
  773. package/dist/response-engine.d.ts +39 -0
  774. package/dist/response-engine.d.ts.map +1 -0
  775. package/dist/response-engine.js +78 -0
  776. package/dist/response-engine.js.map +1 -0
  777. package/dist/rule-loader.d.ts +60 -0
  778. package/dist/rule-loader.d.ts.map +1 -0
  779. package/dist/rule-loader.js +277 -0
  780. package/dist/rule-loader.js.map +1 -0
  781. package/dist/rule-sync.d.ts +58 -0
  782. package/dist/rule-sync.d.ts.map +1 -0
  783. package/dist/rule-sync.js +205 -0
  784. package/dist/rule-sync.js.map +1 -0
  785. package/dist/threat-cloud/index.d.ts.map +1 -1
  786. package/dist/threat-cloud/index.js +12 -22
  787. package/dist/threat-cloud/index.js.map +1 -1
  788. package/dist/types.d.ts +16 -0
  789. package/dist/types.d.ts.map +1 -1
  790. package/dist/watchers/dependency-watcher.d.ts +93 -0
  791. package/dist/watchers/dependency-watcher.d.ts.map +1 -0
  792. package/dist/watchers/dependency-watcher.js +379 -0
  793. package/dist/watchers/dependency-watcher.js.map +1 -0
  794. package/dist/watchers/index.d.ts +10 -0
  795. package/dist/watchers/index.d.ts.map +1 -0
  796. package/dist/watchers/index.js +8 -0
  797. package/dist/watchers/index.js.map +1 -0
  798. package/dist/watchers/process-watcher.d.ts +119 -0
  799. package/dist/watchers/process-watcher.d.ts.map +1 -0
  800. package/dist/watchers/process-watcher.js +494 -0
  801. package/dist/watchers/process-watcher.js.map +1 -0
  802. package/dist/watchers/secret-watcher.d.ts +94 -0
  803. package/dist/watchers/secret-watcher.d.ts.map +1 -0
  804. package/dist/watchers/secret-watcher.js +336 -0
  805. package/dist/watchers/secret-watcher.js.map +1 -0
  806. package/package.json +6 -3
@@ -0,0 +1,26 @@
1
+ title: CVE-2010-5278 Exploitation Attempt
2
+ id: a4a899e8-fd7a-49dd-b5a8-7044def72d61
3
+ status: test
4
+ description: |
5
+ MODx manager - Local File Inclusion:Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier,
6
+ when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter.
7
+ references:
8
+ - https://github.com/projectdiscovery/nuclei-templates
9
+ author: Subhash Popuri (@pbssubhash)
10
+ date: 2021-08-25
11
+ modified: 2023-01-02
12
+ tags:
13
+ - attack.initial-access
14
+ - attack.t1190
15
+ - cve.2010-5278
16
+ - detection.emerging-threats
17
+ logsource:
18
+ category: webserver
19
+ detection:
20
+ selection:
21
+ cs-uri-query|contains: /manager/controllers/default/resource/tvs.php?class_key=../../../../../../../../../../windows/win.ini%00
22
+ condition: selection
23
+ falsepositives:
24
+ - Scanning from Nuclei
25
+ - Unknown
26
+ level: critical
@@ -0,0 +1,40 @@
1
+ title: Rejetto HTTP File Server RCE
2
+ id: a133193c-2daa-4a29-8022-018695fcf0ae
3
+ status: test
4
+ description: Detects attempts to exploit a Rejetto HTTP File Server (HFS) via CVE-2014-6287
5
+ references:
6
+ - https://vk9-sec.com/hfs-code-execution-cve-2014-6287/
7
+ - https://www.exploit-db.com/exploits/39161
8
+ - https://github.com/Twigonometry/Cybersecurity-Notes/blob/c875b0f52df7d2c7a870e75e1f0c2679d417931d/Writeups/Hack%20the%20Box/Boxes/Optimum/10%20-%20Website.md
9
+ author: Nasreddine Bencherchali (Nextron Systems)
10
+ date: 2022-07-19
11
+ modified: 2023-01-02
12
+ tags:
13
+ - attack.persistence
14
+ - attack.initial-access
15
+ - attack.t1190
16
+ - attack.t1505.003
17
+ - cve.2014-6287
18
+ - detection.emerging-threats
19
+ logsource:
20
+ category: webserver
21
+ detection:
22
+ selection_search:
23
+ cs-uri-query|contains: '?search=%00{.'
24
+ selection_payload:
25
+ cs-uri-query|contains:
26
+ - 'save|' # Indication of saving a file which shouldn't be tested by vuln scanners
27
+ - 'powershell'
28
+ - 'cmd.exe'
29
+ - 'cmd /c'
30
+ - 'cmd /r'
31
+ - 'cmd /k'
32
+ - 'cscript'
33
+ - 'wscript'
34
+ - 'python'
35
+ - 'C:\Users\Public\'
36
+ - '%comspec%'
37
+ condition: all of selection_*
38
+ falsepositives:
39
+ - Unknown
40
+ level: high
@@ -0,0 +1,31 @@
1
+ title: ZxShell Malware
2
+ id: f0b70adb-0075-43b0-9745-e82a1c608fcc
3
+ status: test
4
+ description: Detects a ZxShell start by the called and well-known function name
5
+ references:
6
+ - https://www.hybrid-analysis.com/sample/5d2a4cde9fa7c2fdbf39b2e2ffd23378d0c50701a3095d1e91e3cf922d7b0b16?environmentId=100
7
+ - https://pub-7cb8ac806c1b4c4383e585c474a24719.r2.dev/116309e7121bc8b0e66e4166c06f7b818e1d3629.pdf
8
+ author: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro
9
+ date: 2017-07-20
10
+ modified: 2021-11-27
11
+ tags:
12
+ - attack.execution
13
+ - attack.t1059.003
14
+ - attack.defense-evasion
15
+ - attack.t1218.011
16
+ - attack.s0412
17
+ - attack.g0001
18
+ - detection.emerging-threats
19
+ logsource:
20
+ category: process_creation
21
+ product: windows
22
+ detection:
23
+ selection:
24
+ Image|endswith: '\rundll32.exe'
25
+ CommandLine|contains:
26
+ - 'zxFunction'
27
+ - 'RemoteDiskXXXXX'
28
+ condition: selection
29
+ falsepositives:
30
+ - Unlikely
31
+ level: critical
@@ -0,0 +1,32 @@
1
+ title: Turla Group Lateral Movement
2
+ id: c601f20d-570a-4cde-a7d6-e17f99cb8e7f
3
+ status: test
4
+ description: Detects automated lateral movement by Turla group
5
+ references:
6
+ - https://securelist.com/the-epic-turla-operation/65545/
7
+ author: Markus Neis
8
+ date: 2017-11-07
9
+ modified: 2022-10-09
10
+ tags:
11
+ - attack.g0010
12
+ - attack.execution
13
+ - attack.t1059
14
+ - attack.lateral-movement
15
+ - attack.t1021.002
16
+ - attack.discovery
17
+ - attack.t1083
18
+ - attack.t1135
19
+ - detection.emerging-threats
20
+ logsource:
21
+ category: process_creation
22
+ product: windows
23
+ detection:
24
+ selection:
25
+ CommandLine:
26
+ - 'net use \\\\%DomainController%\C$ "P@ssw0rd" *'
27
+ - 'dir c:\\*.doc* /s'
28
+ - 'dir %TEMP%\\*.exe'
29
+ condition: selection
30
+ falsepositives:
31
+ - Unknown
32
+ level: critical
@@ -0,0 +1,35 @@
1
+ title: Turla Group Commands May 2020
2
+ id: 9e2e51c5-c699-4794-ba5a-29f5da40ac0c
3
+ status: test
4
+ description: Detects commands used by Turla group as reported by ESET in May 2020
5
+ references:
6
+ - https://www.welivesecurity.com/wp-content/uploads/2020/05/ESET_Turla_ComRAT.pdf
7
+ author: Florian Roth (Nextron Systems)
8
+ date: 2020-05-26
9
+ modified: 2025-10-19
10
+ tags:
11
+ - attack.privilege-escalation
12
+ - attack.persistence
13
+ - attack.defense-evasion
14
+ - attack.g0010
15
+ - attack.execution
16
+ - attack.t1059.001
17
+ - attack.t1053.005
18
+ - attack.t1027
19
+ - detection.emerging-threats
20
+ logsource:
21
+ category: process_creation
22
+ product: windows
23
+ detection:
24
+ selection_cli_1:
25
+ CommandLine|contains:
26
+ - 'tracert -h 10 yahoo.com'
27
+ - '.WSqmCons))|iex;'
28
+ - 'Fr`omBa`se6`4Str`ing'
29
+ selection_cli_2:
30
+ CommandLine|re: 'net\s+use\s+https://docs.live.net'
31
+ CommandLine|contains: '@aol.co.uk'
32
+ condition: 1 of selection_*
33
+ falsepositives:
34
+ - Unknown
35
+ level: critical
@@ -0,0 +1,26 @@
1
+ title: Exploit for CVE-2015-1641
2
+ id: 7993792c-5ce2-4475-a3db-a3a5539827ef
3
+ status: stable
4
+ description: Detects Winword starting uncommon sub process MicroScMgmt.exe as used in exploits for CVE-2015-1641
5
+ references:
6
+ - https://www.virustotal.com/en/file/5567408950b744c4e846ba8ae726883cb15268a539f3bb21758a466e47021ae8/analysis/
7
+ - https://www.hybrid-analysis.com/sample/5567408950b744c4e846ba8ae726883cb15268a539f3bb21758a466e47021ae8?environmentId=100
8
+ author: Florian Roth (Nextron Systems)
9
+ date: 2018-02-22
10
+ modified: 2021-11-27
11
+ tags:
12
+ - attack.defense-evasion
13
+ - attack.t1036.005
14
+ - cve.2015-1641
15
+ - detection.emerging-threats
16
+ logsource:
17
+ category: process_creation
18
+ product: windows
19
+ detection:
20
+ selection:
21
+ ParentImage|endswith: '\WINWORD.EXE'
22
+ Image|endswith: '\MicroScMgmt.exe'
23
+ condition: selection
24
+ falsepositives:
25
+ - Unknown
26
+ level: critical
@@ -0,0 +1,28 @@
1
+ title: Exploit for CVE-2017-0261
2
+ id: 864403a1-36c9-40a2-a982-4c9a45f7d833
3
+ status: test
4
+ description: Detects Winword starting uncommon sub process FLTLDR.exe as used in exploits for CVE-2017-0261 and CVE-2017-0262
5
+ references:
6
+ - https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html
7
+ author: Florian Roth (Nextron Systems)
8
+ date: 2018-02-22
9
+ modified: 2021-11-27
10
+ tags:
11
+ - attack.execution
12
+ - attack.t1203
13
+ - attack.t1204.002
14
+ - attack.initial-access
15
+ - attack.t1566.001
16
+ - cve.2017-0261
17
+ - detection.emerging-threats
18
+ logsource:
19
+ category: process_creation
20
+ product: windows
21
+ detection:
22
+ selection:
23
+ ParentImage|endswith: '\WINWORD.EXE'
24
+ Image|contains: '\FLTLDR.exe'
25
+ condition: selection
26
+ falsepositives:
27
+ - Several false positives identified, check for suspicious file names or locations (e.g. Temp folders)
28
+ level: medium
@@ -0,0 +1,29 @@
1
+ title: Droppers Exploiting CVE-2017-11882
2
+ id: 678eb5f4-8597-4be6-8be7-905e4234b53a
3
+ status: stable
4
+ description: Detects exploits that use CVE-2017-11882 to start EQNEDT32.EXE and other sub processes like mshta.exe
5
+ references:
6
+ - https://www.hybrid-analysis.com/sample/2a4ae284c76f868fc51d3bb65da8caa6efacb707f265b25c30f34250b76b7507?environmentId=100
7
+ - https://www.linkedin.com/pulse/exploit-available-dangerous-ms-office-rce-vuln-called-thebenygreen-
8
+ - https://github.com/embedi/CVE-2017-11882
9
+ author: Florian Roth (Nextron Systems)
10
+ date: 2017-11-23
11
+ modified: 2021-11-27
12
+ tags:
13
+ - attack.execution
14
+ - attack.t1203
15
+ - attack.t1204.002
16
+ - attack.initial-access
17
+ - attack.t1566.001
18
+ - cve.2017-11882
19
+ - detection.emerging-threats
20
+ logsource:
21
+ category: process_creation
22
+ product: windows
23
+ detection:
24
+ selection:
25
+ ParentImage|endswith: '\EQNEDT32.EXE'
26
+ condition: selection
27
+ falsepositives:
28
+ - Unknown
29
+ level: critical
@@ -0,0 +1,29 @@
1
+ title: Exploit for CVE-2017-8759
2
+ id: fdd84c68-a1f6-47c9-9477-920584f94905
3
+ status: test
4
+ description: Detects Winword starting uncommon sub process csc.exe as used in exploits for CVE-2017-8759
5
+ references:
6
+ - https://www.hybrid-analysis.com/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
7
+ - https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
8
+ author: Florian Roth (Nextron Systems)
9
+ date: 2017-09-15
10
+ modified: 2021-11-27
11
+ tags:
12
+ - attack.execution
13
+ - attack.t1203
14
+ - attack.t1204.002
15
+ - attack.initial-access
16
+ - attack.t1566.001
17
+ - cve.2017-8759
18
+ - detection.emerging-threats
19
+ logsource:
20
+ category: process_creation
21
+ product: windows
22
+ detection:
23
+ selection:
24
+ ParentImage|endswith: '\WINWORD.EXE'
25
+ Image|endswith: '\csc.exe'
26
+ condition: selection
27
+ falsepositives:
28
+ - Unknown
29
+ level: critical
@@ -0,0 +1,30 @@
1
+ title: Adwind RAT / JRAT
2
+ id: 1fac1481-2dbc-48b2-9096-753c49b4ec71
3
+ status: test
4
+ description: Detects javaw.exe in AppData folder as used by Adwind / JRAT
5
+ references:
6
+ - https://www.hybrid-analysis.com/sample/ba86fa0d4b6af2db0656a88b1dd29f36fe362473ae8ad04255c4e52f214a541c?environmentId=100
7
+ - https://www.first.org/resources/papers/conf2017/Advanced-Incident-Detection-and-Threat-Hunting-using-Sysmon-and-Splunk.pdf
8
+ author: Florian Roth (Nextron Systems), Tom Ueltschi, Jonhnathan Ribeiro, oscd.community
9
+ date: 2017-11-10
10
+ modified: 2022-10-09
11
+ tags:
12
+ - attack.execution
13
+ - attack.t1059.005
14
+ - attack.t1059.007
15
+ - detection.emerging-threats
16
+ logsource:
17
+ category: process_creation
18
+ product: windows
19
+ detection:
20
+ selection:
21
+ - CommandLine|contains|all:
22
+ - '\AppData\Roaming\Oracle'
23
+ - '\java'
24
+ - '.exe '
25
+ - CommandLine|contains|all:
26
+ - 'cscript.exe'
27
+ - 'Retrive'
28
+ - '.vbs '
29
+ condition: selection
30
+ level: high
@@ -0,0 +1,33 @@
1
+ title: CosmicDuke Service Installation
2
+ id: cb062102-587e-4414-8efa-dbe3c7bf19c6
3
+ related:
4
+ - id: 2cfe636e-317a-4bee-9f2c-1066d9f54d1a
5
+ type: derived
6
+ status: test
7
+ description: |
8
+ Detects the installation of a service named "javamtsup" on the system.
9
+ The CosmicDuke info stealer uses Windows services typically named "javamtsup" for persistence.
10
+ references:
11
+ - https://blog.f-secure.com/wp-content/uploads/2019/10/CosmicDuke.pdf
12
+ author: Florian Roth (Nextron Systems), Daniil Yugoslavskiy, oscd.community (update)
13
+ date: 2017-03-27
14
+ modified: 2022-10-09
15
+ tags:
16
+ - attack.privilege-escalation
17
+ - attack.execution
18
+ - attack.persistence
19
+ - attack.t1543.003
20
+ - attack.t1569.002
21
+ - detection.emerging-threats
22
+ logsource:
23
+ product: windows
24
+ service: security
25
+ definition: The 'System Security Extension' audit subcategory need to be enabled to log the EID 4697
26
+ detection:
27
+ selection:
28
+ EventID: 4697
29
+ ServiceName: 'javamtsup'
30
+ condition: selection
31
+ falsepositives:
32
+ - Unlikely
33
+ level: critical
@@ -0,0 +1,27 @@
1
+ title: Fireball Archer Install
2
+ id: 3d4aebe0-6d29-45b2-a8a4-3dfde586a26d
3
+ status: test
4
+ description: Detects Archer malware invocation via rundll32
5
+ references:
6
+ - https://www.virustotal.com/en/file/9b4971349ae85aa09c0a69852ed3e626c954954a3927b3d1b6646f139b930022/analysis/
7
+ - https://www.hybrid-analysis.com/sample/9b4971349ae85aa09c0a69852ed3e626c954954a3927b3d1b6646f139b930022?environmentId=100
8
+ author: Florian Roth (Nextron Systems)
9
+ date: 2017-06-03
10
+ modified: 2021-11-27
11
+ tags:
12
+ - attack.execution
13
+ - attack.defense-evasion
14
+ - attack.t1218.011
15
+ - detection.emerging-threats
16
+ logsource:
17
+ category: process_creation
18
+ product: windows
19
+ detection:
20
+ selection:
21
+ CommandLine|contains|all:
22
+ - 'rundll32.exe'
23
+ - 'InstallArcherSvc'
24
+ condition: selection
25
+ falsepositives:
26
+ - Unknown
27
+ level: high
@@ -0,0 +1,33 @@
1
+ title: Malware Shellcode in Verclsid Target Process
2
+ id: b7967e22-3d7e-409b-9ed5-cdae3f9243a1
3
+ status: test
4
+ description: Detects a process access to verclsid.exe that injects shellcode from a Microsoft Office application / VBA macro
5
+ references:
6
+ - https://twitter.com/JohnLaTwC/status/837743453039534080
7
+ author: John Lambert (tech), Florian Roth (Nextron Systems)
8
+ date: 2017-03-04
9
+ modified: 2021-11-27
10
+ tags:
11
+ - attack.defense-evasion
12
+ - attack.privilege-escalation
13
+ - attack.t1055
14
+ - detection.emerging-threats
15
+ logsource:
16
+ category: process_access
17
+ product: windows
18
+ definition: 'Requirements: The following config is required to generate the necessary Event ID 10 Process Access events: <ProcessAccess onmatch="include"><CallTrace condition="contains">VBE7.DLL</CallTrace></ProcessAccess><ProcessAccess onmatch="exclude"><CallTrace condition="excludes">UNKNOWN</CallTrace></ProcessAccess>'
19
+ detection:
20
+ selection_target:
21
+ TargetImage|endswith: '\verclsid.exe'
22
+ GrantedAccess: '0x1FFFFF'
23
+ selection_calltrace_1:
24
+ CallTrace|contains|all:
25
+ - '|UNKNOWN('
26
+ - 'VBE7.DLL'
27
+ selection_calltrace_2:
28
+ SourceImage|contains: '\Microsoft Office\'
29
+ CallTrace|contains: '|UNKNOWN'
30
+ condition: selection_target and 1 of selection_calltrace_*
31
+ falsepositives:
32
+ - Unknown
33
+ level: high
@@ -0,0 +1,38 @@
1
+ title: NotPetya Ransomware Activity
2
+ id: 79aeeb41-8156-4fac-a0cd-076495ab82a1
3
+ status: test
4
+ description: Detects NotPetya ransomware activity in which the extracted passwords are passed back to the main module via named pipe, the file system journal of drive C is deleted and Windows eventlogs are cleared using wevtutil
5
+ references:
6
+ - https://securelist.com/schroedingers-petya/78870/
7
+ - https://www.hybrid-analysis.com/sample/64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1?environmentId=100
8
+ author: Florian Roth (Nextron Systems), Tom Ueltschi
9
+ date: 2019-01-16
10
+ modified: 2022-12-15
11
+ tags:
12
+ - attack.defense-evasion
13
+ - attack.t1218.011
14
+ - attack.t1070.001
15
+ - attack.credential-access
16
+ - attack.t1003.001
17
+ - car.2016-04-002
18
+ - detection.emerging-threats
19
+ logsource:
20
+ category: process_creation
21
+ product: windows
22
+ detection:
23
+ selection_specific_pattern:
24
+ CommandLine|contains:
25
+ - 'wevtutil cl Application & fsutil usn deletejournal /D C:'
26
+ - 'dllhost.dat %WINDIR%\ransoms'
27
+ selection_rundll32:
28
+ Image|endswith: '\rundll32.exe'
29
+ CommandLine|endswith:
30
+ - '.dat,#1'
31
+ - '.dat #1' # Sysmon removes comma
32
+ - '.zip.dll",#1'
33
+ selection_perfc_keyword:
34
+ - '\perfc.dat'
35
+ condition: 1 of selection_*
36
+ falsepositives:
37
+ - Unknown
38
+ level: critical
@@ -0,0 +1,96 @@
1
+ title: Potential PlugX Activity
2
+ id: aeab5ec5-be14-471a-80e8-e344418305c2
3
+ status: test
4
+ description: Detects the execution of an executable that is typically used by PlugX for DLL side loading starting from an uncommon location
5
+ references:
6
+ - http://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/
7
+ - https://countuponsecurity.com/2017/06/07/threat-hunting-in-the-enterprise-with-appcompatprocessor/
8
+ author: Florian Roth (Nextron Systems)
9
+ date: 2017-06-12
10
+ modified: 2023-02-03
11
+ tags:
12
+ - attack.privilege-escalation
13
+ - attack.persistence
14
+ - attack.s0013
15
+ - attack.defense-evasion
16
+ - attack.t1574.001
17
+ - detection.emerging-threats
18
+ logsource:
19
+ category: process_creation
20
+ product: windows
21
+ detection:
22
+ selection_cammute:
23
+ Image|endswith: '\CamMute.exe'
24
+ filter_cammute:
25
+ Image|contains:
26
+ - '\Lenovo\Communication Utility\'
27
+ - '\Lenovo\Communications Utility\'
28
+ selection_chrome_frame:
29
+ Image|endswith: '\chrome_frame_helper.exe'
30
+ filter_chrome_frame:
31
+ Image|contains: '\Google\Chrome\application\'
32
+ selection_devemu:
33
+ Image|endswith: '\dvcemumanager.exe'
34
+ filter_devemu:
35
+ Image|contains: '\Microsoft Device Emulator\'
36
+ selection_gadget:
37
+ Image|endswith: '\Gadget.exe'
38
+ filter_gadget:
39
+ Image|contains: '\Windows Media Player\'
40
+ selection_hcc:
41
+ Image|endswith: '\hcc.exe'
42
+ filter_hcc:
43
+ Image|contains: '\HTML Help Workshop\'
44
+ selection_hkcmd:
45
+ Image|endswith: '\hkcmd.exe'
46
+ filter_hkcmd:
47
+ Image|contains:
48
+ - '\System32\'
49
+ - '\SysNative\'
50
+ - '\SysWow64\'
51
+ selection_mc:
52
+ Image|endswith: '\Mc.exe'
53
+ filter_mc:
54
+ Image|contains:
55
+ - '\Microsoft Visual Studio'
56
+ - '\Microsoft SDK'
57
+ - '\Windows Kit'
58
+ selection_msmpeng:
59
+ Image|endswith: '\MsMpEng.exe'
60
+ filter_msmpeng:
61
+ Image|contains:
62
+ - '\Microsoft Security Client\'
63
+ - '\Windows Defender\'
64
+ - '\AntiMalware\'
65
+ selection_msseces:
66
+ Image|endswith: '\msseces.exe'
67
+ filter_msseces:
68
+ Image|contains:
69
+ - '\Microsoft Security Center\'
70
+ - '\Microsoft Security Client\'
71
+ - '\Microsoft Security Essentials\'
72
+ selection_oinfo:
73
+ Image|endswith: '\OInfoP11.exe'
74
+ filter_oinfo:
75
+ Image|contains: '\Common Files\Microsoft Shared\'
76
+ selection_oleview:
77
+ Image|endswith: '\OleView.exe'
78
+ filter_oleview:
79
+ Image|contains:
80
+ - '\Microsoft Visual Studio'
81
+ - '\Microsoft SDK'
82
+ - '\Windows Kit'
83
+ - '\Windows Resource Kit\'
84
+ selection_rc:
85
+ Image|endswith: '\rc.exe'
86
+ filter_rc:
87
+ Image|contains:
88
+ - '\Microsoft Visual Studio'
89
+ - '\Microsoft SDK'
90
+ - '\Windows Kit'
91
+ - '\Windows Resource Kit\'
92
+ - '\Microsoft.NET\'
93
+ condition: ( selection_cammute and not filter_cammute ) or ( selection_chrome_frame and not filter_chrome_frame ) or ( selection_devemu and not filter_devemu ) or ( selection_gadget and not filter_gadget ) or ( selection_hcc and not filter_hcc ) or ( selection_hkcmd and not filter_hkcmd ) or ( selection_mc and not filter_mc ) or ( selection_msmpeng and not filter_msmpeng ) or ( selection_msseces and not filter_msseces ) or ( selection_oinfo and not filter_oinfo ) or ( selection_oleview and not filter_oleview ) or ( selection_rc and not filter_rc )
94
+ falsepositives:
95
+ - Unknown
96
+ level: high
@@ -0,0 +1,28 @@
1
+ title: StoneDrill Service Install
2
+ id: 9e987c6c-4c1e-40d8-bd85-dd26fba8fdd6
3
+ status: test
4
+ description: This method detects a service install of the malicious Microsoft Network Realtime Inspection Service service described in StoneDrill report by Kaspersky
5
+ references:
6
+ - https://securelist.com/blog/research/77725/from-shamoon-to-stonedrill/
7
+ author: Florian Roth (Nextron Systems)
8
+ date: 2017-03-07
9
+ modified: 2021-11-30
10
+ tags:
11
+ - attack.privilege-escalation
12
+ - attack.persistence
13
+ - attack.g0064
14
+ - attack.t1543.003
15
+ - detection.emerging-threats
16
+ logsource:
17
+ product: windows
18
+ service: system
19
+ detection:
20
+ selection:
21
+ Provider_Name: 'Service Control Manager'
22
+ EventID: 7045
23
+ ServiceName: NtsSrv
24
+ ImagePath|endswith: ' LocalService'
25
+ condition: selection
26
+ falsepositives:
27
+ - Unlikely
28
+ level: high
@@ -0,0 +1,44 @@
1
+ title: WannaCry Ransomware Activity
2
+ id: 41d40bff-377a-43e2-8e1b-2e543069e079
3
+ status: test
4
+ description: Detects WannaCry ransomware activity
5
+ references:
6
+ - https://www.hybrid-analysis.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa?environmentId=100
7
+ - https://x.com/nas_bench/status/1868639048484425963
8
+ author: Florian Roth (Nextron Systems), Tom U. @c_APT_ure (collection), oscd.community, Jonhnathan Ribeiro
9
+ date: 2019-01-16
10
+ modified: 2025-10-18
11
+ tags:
12
+ - attack.lateral-movement
13
+ - attack.t1210
14
+ - attack.discovery
15
+ - attack.t1083
16
+ - attack.defense-evasion
17
+ - attack.t1222.001
18
+ - attack.impact
19
+ - attack.t1486
20
+ - attack.t1490
21
+ - detection.emerging-threats
22
+ logsource:
23
+ category: process_creation
24
+ product: windows
25
+ detection:
26
+ selection_img:
27
+ - Image|endswith:
28
+ - '\tasksche.exe'
29
+ - '\mssecsvc.exe'
30
+ - '\taskdl.exe'
31
+ - '\taskhsvc.exe'
32
+ - '\taskse.exe'
33
+ - '\111.exe'
34
+ - '\lhdfrgui.exe'
35
+ # - '\diskpart.exe' # cannot be used in a rule of level critical
36
+ - '\linuxnew.exe'
37
+ - '\wannacry.exe'
38
+ - Image|contains: 'WanaDecryptor'
39
+ selection_cmd:
40
+ CommandLine|contains: '@Please_Read_Me@.txt'
41
+ condition: 1 of selection_*
42
+ falsepositives:
43
+ - Unknown
44
+ level: critical
@@ -0,0 +1,29 @@
1
+ title: Potential APT10 Cloud Hopper Activity
2
+ id: 966e4016-627f-44f7-8341-f394905c361f
3
+ status: test
4
+ description: Detects potential process and execution activity related to APT10 Cloud Hopper operation
5
+ references:
6
+ - https://web.archive.org/web/20180725233601/https://www.pwc.co.uk/cyber-security/pdf/cloud-hopper-annex-b-final.pdf
7
+ author: Florian Roth (Nextron Systems)
8
+ date: 2017-04-07
9
+ modified: 2023-03-08
10
+ tags:
11
+ - attack.execution
12
+ - attack.g0045
13
+ - attack.t1059.005
14
+ - detection.emerging-threats
15
+ logsource:
16
+ category: process_creation
17
+ product: windows
18
+ detection:
19
+ selection_cscript:
20
+ Image|endswith: '\cscript.exe'
21
+ CommandLine|contains: '.vbs /shell '
22
+ selection_csvde:
23
+ CommandLine|contains|all:
24
+ - 'csvde -f C:\windows\web\'
25
+ - '.log'
26
+ condition: 1 of selection_*
27
+ falsepositives:
28
+ - Unlikely
29
+ level: high