Dataset Viewer
prompt
stringlengths 544
2.39k
|
---|
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe DataExchange.dll<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.parent.executable: "*\excel.exe"
AND process.command_line: "*DataExchange.dll*"'
pre_detector:
case_condition: directly
id: 36222790-0d43-4fe8-86e4-674b27809543
mitre:
- attack.command_and_control
- attack.t1071
- attack.t1071.004
severity: critical
title: DNS Tunnel Technique from MuddyWater
sigma_fields: true
description: Detecting DNS tunnel activity for Muddywater actor<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe DataExch"ange.dll"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.parent.executable: "*\excel.exe"
AND process.command_line: "*DataExchange.dll*"'
pre_detector:
case_condition: directly
id: 36222790-0d43-4fe8-86e4-674b27809543
mitre:
- attack.command_and_control
- attack.t1071
- attack.t1071.004
severity: critical
title: DNS Tunnel Technique from MuddyWater
sigma_fields: true
description: Detecting DNS tunnel activity for Muddywater actor<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell DataExchange.dll<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.parent.executable: "*\excel.exe"
AND process.command_line: "*DataExchange.dll*"'
pre_detector:
case_condition: directly
id: 36222790-0d43-4fe8-86e4-674b27809543
mitre:
- attack.command_and_control
- attack.t1071
- attack.t1071.004
severity: critical
title: DNS Tunnel Technique from MuddyWater
sigma_fields: true
description: Detecting DNS tunnel activity for Muddywater actor<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe DataExchange.dll<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.parent.executable: "*\excel.exe"
AND process.command_line: "*DataExchange.dll*"'
pre_detector:
case_condition: directly
id: 36222790-0d43-4fe8-86e4-674b27809543
mitre:
- attack.command_and_control
- attack.t1071
- attack.t1071.004
severity: critical
title: DNS Tunnel Technique from MuddyWater
sigma_fields: true
description: Detecting DNS tunnel activity for Muddywater actor<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>-noni -ep bypass $<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*-noni -ep bypass $*"'
pre_detector:
case_condition: directly
id: 033fe7d6-66d1-4240-ac6b-28908009c71f
mitre:
- attack.execution
- attack.g0016
- attack.t1086
- attack.t1059
- attack.t1059.001
severity: critical
title: APT29
sigma_fields: true
description: This method detects a suspicious powershell command line combination
as used by APT29 in a campaign against US think tanks<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>-noni -ep "b""y""p""a""s""s" $<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*-noni -ep bypass $*"'
pre_detector:
case_condition: directly
id: 033fe7d6-66d1-4240-ac6b-28908009c71f
mitre:
- attack.execution
- attack.g0016
- attack.t1086
- attack.t1059
- attack.t1059.001
severity: critical
title: APT29
sigma_fields: true
description: This method detects a suspicious powershell command line combination
as used by APT29 in a campaign against US think tanks<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>-noni $ bypass -ep<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*-noni -ep bypass $*"'
pre_detector:
case_condition: directly
id: 033fe7d6-66d1-4240-ac6b-28908009c71f
mitre:
- attack.execution
- attack.g0016
- attack.t1086
- attack.t1059
- attack.t1059.001
severity: critical
title: APT29
sigma_fields: true
description: This method detects a suspicious powershell command line combination
as used by APT29 in a campaign against US think tanks<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\Win64.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* localgroup administrators admin /add" OR "*\Win64.exe*")'
pre_detector:
case_condition: directly
id: 0eb2107b-a596-422e-b123-b389d5594ed7
mitre:
- attack.privilege_escalation
- attack.g0009
- attack.t1068
severity: high
title: Hurricane Panda Activity
sigma_fields: true
description: Detects Hurricane Panda Activity<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\"\Win64.exe\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* localgroup administrators admin /add" OR "*\Win64.exe*")'
pre_detector:
case_condition: directly
id: 0eb2107b-a596-422e-b123-b389d5594ed7
mitre:
- attack.privilege_escalation
- attack.g0009
- attack.t1068
severity: high
title: Hurricane Panda Activity
sigma_fields: true
description: Detects Hurricane Panda Activity<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\Win64<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* localgroup administrators admin /add" OR "*\Win64.exe*")'
pre_detector:
case_condition: directly
id: 0eb2107b-a596-422e-b123-b389d5594ed7
mitre:
- attack.privilege_escalation
- attack.g0009
- attack.t1068
severity: high
title: Hurricane Panda Activity
sigma_fields: true
description: Detects Hurricane Panda Activity<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\Win64.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* localgroup administrators admin /add" OR "*\Win64.exe*")'
pre_detector:
case_condition: directly
id: 0eb2107b-a596-422e-b123-b389d5594ed7
mitre:
- attack.privilege_escalation
- attack.g0009
- attack.t1068
severity: high
title: Hurricane Panda Activity
sigma_fields: true
description: Detects Hurricane Panda Activity<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>ps.exe -accepteula<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "ps.exe -accepteula"'
pre_detector:
case_condition: directly
id: 18da1007-3f26-470f-875d-f77faf1cab31
mitre:
- attack.defense_evasion
- attack.g0035
- attack.t1036
- attack.t1036.003
- car.2013-05-009
severity: high
title: Ps.exe Renamed SysInternals Tool
sigma_fields: true
description: Detects renamed SysInternals tool execution with a binary named ps.exe
as used by Dragonfly APT group and documented in TA17-293A report<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>ps.exe \"-\"\"a\"\"c\"\"c\"\"e\"\"p\"\"t\"\"e\"\"u\"\"l\"\"a\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "ps.exe -accepteula"'
pre_detector:
case_condition: directly
id: 18da1007-3f26-470f-875d-f77faf1cab31
mitre:
- attack.defense_evasion
- attack.g0035
- attack.t1036
- attack.t1036.003
- car.2013-05-009
severity: high
title: Ps.exe Renamed SysInternals Tool
sigma_fields: true
description: Detects renamed SysInternals tool execution with a binary named ps.exe
as used by Dragonfly APT group and documented in TA17-293A report<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>ps -accepteula<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "ps.exe -accepteula"'
pre_detector:
case_condition: directly
id: 18da1007-3f26-470f-875d-f77faf1cab31
mitre:
- attack.defense_evasion
- attack.g0035
- attack.t1036
- attack.t1036.003
- car.2013-05-009
severity: high
title: Ps.exe Renamed SysInternals Tool
sigma_fields: true
description: Detects renamed SysInternals tool execution with a binary named ps.exe
as used by Dragonfly APT group and documented in TA17-293A report<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>ps.exe -accepteula<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "ps.exe -accepteula"'
pre_detector:
case_condition: directly
id: 18da1007-3f26-470f-875d-f77faf1cab31
mitre:
- attack.defense_evasion
- attack.g0035
- attack.t1036
- attack.t1036.003
- car.2013-05-009
severity: high
title: Ps.exe Renamed SysInternals Tool
sigma_fields: true
description: Detects renamed SysInternals tool execution with a binary named ps.exe
as used by Dragonfly APT group and documented in TA17-293A report<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bcdedit.exe set bootstatuspolicy ignoreallfailures<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\bcdedit.exe" AND process.command_line: "*set*" AND
((process.command_line: "*bootstatuspolicy*" AND process.command_line: "*ignoreallfailures*")
OR (process.command_line: "*recoveryenabled*" AND process.command_line: "*no*"))'
pre_detector:
case_condition: directly
id: 1444443e-6757-43e4-9ea4-c8fc705f79a2
mitre:
- attack.impact
- attack.t1490
severity: high
title: Modification of Boot Configuration
sigma_fields: true
description: Identifies use of the bcdedit command to delete boot configuration data.
This tactic is sometimes used as by malware or an attacker as a destructive technique.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bcdedit.exe set bootstatuspolicy "i""g""n""o""r""e""a""l""l""f""a""i""l""u""r""e""s"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\bcdedit.exe" AND process.command_line: "*set*" AND
((process.command_line: "*bootstatuspolicy*" AND process.command_line: "*ignoreallfailures*")
OR (process.command_line: "*recoveryenabled*" AND process.command_line: "*no*"))'
pre_detector:
case_condition: directly
id: 1444443e-6757-43e4-9ea4-c8fc705f79a2
mitre:
- attack.impact
- attack.t1490
severity: high
title: Modification of Boot Configuration
sigma_fields: true
description: Identifies use of the bcdedit command to delete boot configuration data.
This tactic is sometimes used as by malware or an attacker as a destructive technique.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bcdedit set bootstatuspolicy ignoreallfailures<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\bcdedit.exe" AND process.command_line: "*set*" AND
((process.command_line: "*bootstatuspolicy*" AND process.command_line: "*ignoreallfailures*")
OR (process.command_line: "*recoveryenabled*" AND process.command_line: "*no*"))'
pre_detector:
case_condition: directly
id: 1444443e-6757-43e4-9ea4-c8fc705f79a2
mitre:
- attack.impact
- attack.t1490
severity: high
title: Modification of Boot Configuration
sigma_fields: true
description: Identifies use of the bcdedit command to delete boot configuration data.
This tactic is sometimes used as by malware or an attacker as a destructive technique.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bcdedit.exe bootstatuspolicy set ignoreallfailures<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\bcdedit.exe" AND process.command_line: "*set*" AND
((process.command_line: "*bootstatuspolicy*" AND process.command_line: "*ignoreallfailures*")
OR (process.command_line: "*recoveryenabled*" AND process.command_line: "*no*"))'
pre_detector:
case_condition: directly
id: 1444443e-6757-43e4-9ea4-c8fc705f79a2
mitre:
- attack.impact
- attack.t1490
severity: high
title: Modification of Boot Configuration
sigma_fields: true
description: Identifies use of the bcdedit command to delete boot configuration data.
This tactic is sometimes used as by malware or an attacker as a destructive technique.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd /c assoc<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd*" AND process.command_line: "*/c*" AND process.command_line:
"*assoc*"'
pre_detector:
case_condition: directly
id: 3d3aa6cd-6272-44d6-8afc-7e88dfef7061
mitre:
- attack.persistence
- attack.t1546.001
- attack.t1042
severity: low
title: Change Default File Association
sigma_fields: true
description: When a file is opened, the default program used to open the file (also
called the file association or handler) is checked. File association selections
are stored in the Windows Registry and can be edited by users, administrators, or
programs that have Registry access or by administrators using the built-in assoc
utility. Applications can modify the file association for a given file extension
to call an arbitrary program when a file with the given extension is opened.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd -c assoc<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd*" AND process.command_line: "*/c*" AND process.command_line:
"*assoc*"'
pre_detector:
case_condition: directly
id: 3d3aa6cd-6272-44d6-8afc-7e88dfef7061
mitre:
- attack.persistence
- attack.t1546.001
- attack.t1042
severity: low
title: Change Default File Association
sigma_fields: true
description: When a file is opened, the default program used to open the file (also
called the file association or handler) is checked. File association selections
are stored in the Windows Registry and can be edited by users, administrators, or
programs that have Registry access or by administrators using the built-in assoc
utility. Applications can modify the file association for a given file extension
to call an arbitrary program when a file with the given extension is opened.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd /c assoc<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd*" AND process.command_line: "*/c*" AND process.command_line:
"*assoc*"'
pre_detector:
case_condition: directly
id: 3d3aa6cd-6272-44d6-8afc-7e88dfef7061
mitre:
- attack.persistence
- attack.t1546.001
- attack.t1042
severity: low
title: Change Default File Association
sigma_fields: true
description: When a file is opened, the default program used to open the file (also
called the file association or handler) is checked. File association selections
are stored in the Windows Registry and can be edited by users, administrators, or
programs that have Registry access or by administrators using the built-in assoc
utility. Applications can modify the file association for a given file extension
to call an arbitrary program when a file with the given extension is opened.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>/../../<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.command_line: "*cmd*/c*" AND process.command_line: "*/../../*"'
pre_detector:
case_condition: directly
id: 087790e3-3287-436c-bccf-cbd0184a7db1
mitre:
- attack.execution
- attack.t1059.003
- attack.t1059
severity: high
title: Cmd.exe CommandLine Path Traversal
sigma_fields: true
description: detects the usage of path traversal in cmd.exe indicating possible command/argument
confusion/hijacking<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>/../../<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.command_line: "*cmd*/c*" AND process.command_line: "*/../../*"'
pre_detector:
case_condition: directly
id: 087790e3-3287-436c-bccf-cbd0184a7db1
mitre:
- attack.execution
- attack.t1059.003
- attack.t1059
severity: high
title: Cmd.exe CommandLine Path Traversal
sigma_fields: true
description: detects the usage of path traversal in cmd.exe indicating possible command/argument
confusion/hijacking<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>/../../<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.command_line: "*cmd*/c*" AND process.command_line: "*/../../*"'
pre_detector:
case_condition: directly
id: 087790e3-3287-436c-bccf-cbd0184a7db1
mitre:
- attack.execution
- attack.t1059.003
- attack.t1059
severity: high
title: Cmd.exe CommandLine Path Traversal
sigma_fields: true
description: detects the usage of path traversal in cmd.exe indicating possible command/argument
confusion/hijacking<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net stop SuperBackupMan<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*shutdown /r /f /t 00*" OR "*net stop SuperBackupMan*")'
pre_detector:
case_condition: directly
id: 5325945e-f1f0-406e-97b8-65104d393fff
mitre:
- attack.execution
- attack.t1204
severity: critical
title: Snatch Ransomware
sigma_fields: true
description: Detects specific process characteristics of Snatch ransomware word document
droppers<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net stop \"SuperBackupMan\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*shutdown /r /f /t 00*" OR "*net stop SuperBackupMan*")'
pre_detector:
case_condition: directly
id: 5325945e-f1f0-406e-97b8-65104d393fff
mitre:
- attack.execution
- attack.t1204
severity: critical
title: Snatch Ransomware
sigma_fields: true
description: Detects specific process characteristics of Snatch ransomware word document
droppers<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net SuperBackupMan stop<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*shutdown /r /f /t 00*" OR "*net stop SuperBackupMan*")'
pre_detector:
case_condition: directly
id: 5325945e-f1f0-406e-97b8-65104d393fff
mitre:
- attack.execution
- attack.t1204
severity: critical
title: Snatch Ransomware
sigma_fields: true
description: Detects specific process characteristics of Snatch ransomware word document
droppers<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>rar.exe a<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\rar.exe" AND process.command_line: "* a *"'
pre_detector:
case_condition: directly
id: 6f3e2987-db24-4c78-a860-b4f4095a7095
mitre:
- attack.exfiltration
- attack.t1002
- attack.collection
- attack.t1560.001
severity: low
title: Data Compressed - rar.exe
sigma_fields: true
description: An adversary may compress data (e.g., sensitive documents) that is collected
prior to exfiltration in order to make it portable and minimize the amount of data
sent over the network<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>rar.exe "a"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\rar.exe" AND process.command_line: "* a *"'
pre_detector:
case_condition: directly
id: 6f3e2987-db24-4c78-a860-b4f4095a7095
mitre:
- attack.exfiltration
- attack.t1002
- attack.collection
- attack.t1560.001
severity: low
title: Data Compressed - rar.exe
sigma_fields: true
description: An adversary may compress data (e.g., sensitive documents) that is collected
prior to exfiltration in order to make it portable and minimize the amount of data
sent over the network<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>rar a<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\rar.exe" AND process.command_line: "* a *"'
pre_detector:
case_condition: directly
id: 6f3e2987-db24-4c78-a860-b4f4095a7095
mitre:
- attack.exfiltration
- attack.t1002
- attack.collection
- attack.t1560.001
severity: low
title: Data Compressed - rar.exe
sigma_fields: true
description: An adversary may compress data (e.g., sensitive documents) that is collected
prior to exfiltration in order to make it portable and minimize the amount of data
sent over the network<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>rar.exe a<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\rar.exe" AND process.command_line: "* a *"'
pre_detector:
case_condition: directly
id: 6f3e2987-db24-4c78-a860-b4f4095a7095
mitre:
- attack.exfiltration
- attack.t1002
- attack.collection
- attack.t1560.001
severity: low
title: Data Compressed - rar.exe
sigma_fields: true
description: An adversary may compress data (e.g., sensitive documents) that is collected
prior to exfiltration in order to make it portable and minimize the amount of data
sent over the network<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Add-PrinterPort -Name Generic / Text Only<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.command_line: "*Add-PrinterPort -Name*" AND process.command_line:
("*.exe*" OR "*.dll*" OR "*.bat*")) OR process.command_line: "*Generic / Text Only*"'
pre_detector:
case_condition: directly
id: cc08d590-8b90-413a-aff6-31d1a99678d7
mitre:
- attack.persistence
- attack.execution
- attack.t1059.001
- attack.t1086
severity: high
title: Suspicious PrinterPorts Creation (CVE-2020-1048)
sigma_fields: true
description: Detects new commands that add new printer port which point to suspicious
file<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Add-PrinterPort "-""N""a""m""e" Generic / Text Only<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.command_line: "*Add-PrinterPort -Name*" AND process.command_line:
("*.exe*" OR "*.dll*" OR "*.bat*")) OR process.command_line: "*Generic / Text Only*"'
pre_detector:
case_condition: directly
id: cc08d590-8b90-413a-aff6-31d1a99678d7
mitre:
- attack.persistence
- attack.execution
- attack.t1059.001
- attack.t1086
severity: high
title: Suspicious PrinterPorts Creation (CVE-2020-1048)
sigma_fields: true
description: Detects new commands that add new printer port which point to suspicious
file<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Add-PrinterPort -Name Generic / Only Text<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.command_line: "*Add-PrinterPort -Name*" AND process.command_line:
("*.exe*" OR "*.dll*" OR "*.bat*")) OR process.command_line: "*Generic / Text Only*"'
pre_detector:
case_condition: directly
id: cc08d590-8b90-413a-aff6-31d1a99678d7
mitre:
- attack.persistence
- attack.execution
- attack.t1059.001
- attack.t1086
severity: high
title: Suspicious PrinterPorts Creation (CVE-2020-1048)
sigma_fields: true
description: Detects new commands that add new printer port which point to suspicious
file<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd.exe /q /c chcp<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd.exe* /q /c chcp *"'
pre_detector:
case_condition: directly
id: 5cddf373-ef00-4112-ad72-960ac29bac34
mitre:
- attack.execution
- attack.t1059.003
- attack.t1059
- attack.t1059.005
- attack.t1059.007
- attack.t1064
severity: high
title: Koadic Execution
sigma_fields: true
description: Detects command line parameters used by Koadic hack tool<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd.exe /q /c "ch"cp<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd.exe* /q /c chcp *"'
pre_detector:
case_condition: directly
id: 5cddf373-ef00-4112-ad72-960ac29bac34
mitre:
- attack.execution
- attack.t1059.003
- attack.t1059
- attack.t1059.005
- attack.t1059.007
- attack.t1064
severity: high
title: Koadic Execution
sigma_fields: true
description: Detects command line parameters used by Koadic hack tool<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd.exe /q -c chcp<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd.exe* /q /c chcp *"'
pre_detector:
case_condition: directly
id: 5cddf373-ef00-4112-ad72-960ac29bac34
mitre:
- attack.execution
- attack.t1059.003
- attack.t1059
- attack.t1059.005
- attack.t1059.007
- attack.t1064
severity: high
title: Koadic Execution
sigma_fields: true
description: Detects command line parameters used by Koadic hack tool<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd /q /c chcp<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd.exe* /q /c chcp *"'
pre_detector:
case_condition: directly
id: 5cddf373-ef00-4112-ad72-960ac29bac34
mitre:
- attack.execution
- attack.t1059.003
- attack.t1059
- attack.t1059.005
- attack.t1059.007
- attack.t1064
severity: high
title: Koadic Execution
sigma_fields: true
description: Detects command line parameters used by Koadic hack tool<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd.exe /q /c chcp<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd.exe* /q /c chcp *"'
pre_detector:
case_condition: directly
id: 5cddf373-ef00-4112-ad72-960ac29bac34
mitre:
- attack.execution
- attack.t1059.003
- attack.t1059
- attack.t1059.005
- attack.t1059.007
- attack.t1064
severity: high
title: Koadic Execution
sigma_fields: true
description: Detects command line parameters used by Koadic hack tool<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>at.exe interactive<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\at.exe" AND process.command_line: "*interactive*"'
pre_detector:
case_condition: directly
id: 60fc936d-2eb0-4543-8a13-911c750a1dfc
mitre:
- attack.privilege_escalation
- attack.t1053.002
- attack.t1053
severity: high
title: Interactive AT Job
sigma_fields: true
description: Detect an interactive AT job, which may be used as a form of privilege
escalation<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>at.exe \"i\"\"n\"\"t\"\"e\"\"r\"\"a\"\"c\"\"t\"\"i\"\"v\"\"e\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\at.exe" AND process.command_line: "*interactive*"'
pre_detector:
case_condition: directly
id: 60fc936d-2eb0-4543-8a13-911c750a1dfc
mitre:
- attack.privilege_escalation
- attack.t1053.002
- attack.t1053
severity: high
title: Interactive AT Job
sigma_fields: true
description: Detect an interactive AT job, which may be used as a form of privilege
escalation<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>at interactive<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\at.exe" AND process.command_line: "*interactive*"'
pre_detector:
case_condition: directly
id: 60fc936d-2eb0-4543-8a13-911c750a1dfc
mitre:
- attack.privilege_escalation
- attack.t1053.002
- attack.t1053
severity: high
title: Interactive AT Job
sigma_fields: true
description: Detect an interactive AT job, which may be used as a form of privilege
escalation<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>at.exe interactive<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\at.exe" AND process.command_line: "*interactive*"'
pre_detector:
case_condition: directly
id: 60fc936d-2eb0-4543-8a13-911c750a1dfc
mitre:
- attack.privilege_escalation
- attack.t1053.002
- attack.t1053
severity: high
title: Interactive AT Job
sigma_fields: true
description: Detect an interactive AT job, which may be used as a form of privilege
escalation<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -e* PAA*" OR "*JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ*"
OR "*QAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUA*" OR "*kAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlA*"
OR "*IgAoACcAKgAnACkAOwAkA*" OR "*IAKAAnACoAJwApADsAJA*" OR "*iACgAJwAqACcAKQA7ACQA*"
OR "*JABGAGwAeAByAGgAYwBmAGQ*")'
pre_detector:
case_condition: directly
id: d02e8cf5-6099-48cf-9bfc-1eec2d0c7b18
mitre:
- attack.execution
- attack.t1059.001
- attack.t1086
- attack.defense_evasion
- attack.t1027
severity: critical
title: Emotet Process Creation
sigma_fields: true
description: Detects all Emotet like process executions that are not covered by the
more generic rules<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -e* PAA*" OR "*JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ*"
OR "*QAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUA*" OR "*kAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlA*"
OR "*IgAoACcAKgAnACkAOwAkA*" OR "*IAKAAnACoAJwApADsAJA*" OR "*iACgAJwAqACcAKQA7ACQA*"
OR "*JABGAGwAeAByAGgAYwBmAGQ*")'
pre_detector:
case_condition: directly
id: d02e8cf5-6099-48cf-9bfc-1eec2d0c7b18
mitre:
- attack.execution
- attack.t1059.001
- attack.t1086
- attack.defense_evasion
- attack.t1027
severity: critical
title: Emotet Process Creation
sigma_fields: true
description: Detects all Emotet like process executions that are not covered by the
more generic rules<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -e* PAA*" OR "*JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ*"
OR "*QAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUA*" OR "*kAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlA*"
OR "*IgAoACcAKgAnACkAOwAkA*" OR "*IAKAAnACoAJwApADsAJA*" OR "*iACgAJwAqACcAKQA7ACQA*"
OR "*JABGAGwAeAByAGgAYwBmAGQ*")'
pre_detector:
case_condition: directly
id: d02e8cf5-6099-48cf-9bfc-1eec2d0c7b18
mitre:
- attack.execution
- attack.t1059.001
- attack.t1086
- attack.defense_evasion
- attack.t1027
severity: critical
title: Emotet Process Creation
sigma_fields: true
description: Detects all Emotet like process executions that are not covered by the
more generic rules<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>nltest.exe /domain_trusts /all_trusts<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\cmd.exe" AND process.executable: "*\nltest.exe"
AND process.command_line: "*/domain_trusts /all_trusts*"'
pre_detector:
case_condition: directly
id: 410ad193-a728-4107-bc79-4419789fcbf8
mitre:
- attack.discovery
- attack.t1482
severity: critical
title: Trickbot Malware Recon Activity
sigma_fields: true
description: Trickbot enumerates domain/network topology and executes certain commands
automatically every few minutes. This detectors attempts to identify that activity
based off a command rarely observed in an enterprise network.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>nltest /domain_trusts /all_trusts<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\cmd.exe" AND process.executable: "*\nltest.exe"
AND process.command_line: "*/domain_trusts /all_trusts*"'
pre_detector:
case_condition: directly
id: 410ad193-a728-4107-bc79-4419789fcbf8
mitre:
- attack.discovery
- attack.t1482
severity: critical
title: Trickbot Malware Recon Activity
sigma_fields: true
description: Trickbot enumerates domain/network topology and executes certain commands
automatically every few minutes. This detectors attempts to identify that activity
based off a command rarely observed in an enterprise network.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>nltest.exe /domain_trusts /all_trusts<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\cmd.exe" AND process.executable: "*\nltest.exe"
AND process.command_line: "*/domain_trusts /all_trusts*"'
pre_detector:
case_condition: directly
id: 410ad193-a728-4107-bc79-4419789fcbf8
mitre:
- attack.discovery
- attack.t1482
severity: critical
title: Trickbot Malware Recon Activity
sigma_fields: true
description: Trickbot enumerates domain/network topology and executes certain commands
automatically every few minutes. This detectors attempts to identify that activity
based off a command rarely observed in an enterprise network.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh firewall add<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*netsh*" AND process.command_line: "*firewall add*"'
pre_detector:
case_condition: directly
id: cd5cfd80-aa5f-44c0-9c20-108c4ae12e3c
mitre:
- attack.defense_evasion
- attack.t1089
- attack.t1562.004
severity: medium
title: Netsh Port or Application Allowed
sigma_fields: true
description: Allow Incoming Connections by Port or Application on Windows Firewall<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh firewall "a"dd<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*netsh*" AND process.command_line: "*firewall add*"'
pre_detector:
case_condition: directly
id: cd5cfd80-aa5f-44c0-9c20-108c4ae12e3c
mitre:
- attack.defense_evasion
- attack.t1089
- attack.t1562.004
severity: medium
title: Netsh Port or Application Allowed
sigma_fields: true
description: Allow Incoming Connections by Port or Application on Windows Firewall<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh trace start<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*netsh*" AND process.command_line: "*trace*" AND process.command_line:
"*start*"'
pre_detector:
case_condition: directly
id: d3c3861d-c504-4c77-ba55-224ba82d0118
mitre:
- attack.discovery
- attack.credential_access
- attack.t1040
severity: medium
title: Capture a Network Trace with netsh.exe
sigma_fields: true
description: Detects capture a network trace via netsh.exe trace functionality<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh trace \"st\"art<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*netsh*" AND process.command_line: "*trace*" AND process.command_line:
"*start*"'
pre_detector:
case_condition: directly
id: d3c3861d-c504-4c77-ba55-224ba82d0118
mitre:
- attack.discovery
- attack.credential_access
- attack.t1040
severity: medium
title: Capture a Network Trace with netsh.exe
sigma_fields: true
description: Detects capture a network trace via netsh.exe trace functionality<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh start trace<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*netsh*" AND process.command_line: "*trace*" AND process.command_line:
"*start*"'
pre_detector:
case_condition: directly
id: d3c3861d-c504-4c77-ba55-224ba82d0118
mitre:
- attack.discovery
- attack.credential_access
- attack.t1040
severity: medium
title: Capture a Network Trace with netsh.exe
sigma_fields: true
description: Detects capture a network trace via netsh.exe trace functionality<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh interface portproxy add v4tov4<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "netsh interface portproxy add v4tov4 *"'
pre_detector:
case_condition: directly
id: 322ed9ec-fcab-4f67-9a34-e7c6aef43614
mitre:
- attack.lateral_movement
- attack.defense_evasion
- attack.command_and_control
- attack.t1090
severity: medium
title: Netsh Port Forwarding
sigma_fields: true
description: Detects netsh commands that configure a port forwarding<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh inte"rface" portproxy add v4tov4<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "netsh interface portproxy add v4tov4 *"'
pre_detector:
case_condition: directly
id: 322ed9ec-fcab-4f67-9a34-e7c6aef43614
mitre:
- attack.lateral_movement
- attack.defense_evasion
- attack.command_and_control
- attack.t1090
severity: medium
title: Netsh Port Forwarding
sigma_fields: true
description: Detects netsh commands that configure a port forwarding<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh portproxy interface add v4tov4<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "netsh interface portproxy add v4tov4 *"'
pre_detector:
case_condition: directly
id: 322ed9ec-fcab-4f67-9a34-e7c6aef43614
mitre:
- attack.lateral_movement
- attack.defense_evasion
- attack.command_and_control
- attack.t1090
severity: medium
title: Netsh Port Forwarding
sigma_fields: true
description: Detects netsh commands that configure a port forwarding<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>tshark.exe \tshark.exe -i<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\tshark.exe" AND process.command_line: "*-i*") OR
process.executable: "*\windump.exe"'
pre_detector:
case_condition: directly
id: ba1f7802-adc7-48b4-9ecb-81e227fddfd5
mitre:
- attack.credential_access
- attack.discovery
- attack.t1040
severity: low
title: Network Sniffing
sigma_fields: true
description: Network sniffing refers to using the network interface on a system to
monitor or capture information sent over a wired or wireless connection. An adversary
may place a network interface into promiscuous mode to passively access data in
transit over the network, or use span ports to capture a larger amount of data.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>tshark.exe "\tshark.exe" "-i"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\tshark.exe" AND process.command_line: "*-i*") OR
process.executable: "*\windump.exe"'
pre_detector:
case_condition: directly
id: ba1f7802-adc7-48b4-9ecb-81e227fddfd5
mitre:
- attack.credential_access
- attack.discovery
- attack.t1040
severity: low
title: Network Sniffing
sigma_fields: true
description: Network sniffing refers to using the network interface on a system to
monitor or capture information sent over a wired or wireless connection. An adversary
may place a network interface into promiscuous mode to passively access data in
transit over the network, or use span ports to capture a larger amount of data.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>tshark.exe -i \tshark.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\tshark.exe" AND process.command_line: "*-i*") OR
process.executable: "*\windump.exe"'
pre_detector:
case_condition: directly
id: ba1f7802-adc7-48b4-9ecb-81e227fddfd5
mitre:
- attack.credential_access
- attack.discovery
- attack.t1040
severity: low
title: Network Sniffing
sigma_fields: true
description: Network sniffing refers to using the network interface on a system to
monitor or capture information sent over a wired or wireless connection. An adversary
may place a network interface into promiscuous mode to passively access data in
transit over the network, or use span ports to capture a larger amount of data.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net.exe view<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line:
"*view*" AND NOT process.command_line: "*\\\\*"'
pre_detector:
case_condition: directly
id: 62510e69-616b-4078-b371-847da438cc03
mitre:
- attack.discovery
- attack.t1018
severity: low
title: Windows Network Enumeration
sigma_fields: true
description: Identifies attempts to enumerate hosts in a network using the built-in
Windows net.exe tool.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net.exe vi"ew"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line:
"*view*" AND NOT process.command_line: "*\\\\*"'
pre_detector:
case_condition: directly
id: 62510e69-616b-4078-b371-847da438cc03
mitre:
- attack.discovery
- attack.t1018
severity: low
title: Windows Network Enumeration
sigma_fields: true
description: Identifies attempts to enumerate hosts in a network using the built-in
Windows net.exe tool.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net view<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line:
"*view*" AND NOT process.command_line: "*\\\\*"'
pre_detector:
case_condition: directly
id: 62510e69-616b-4078-b371-847da438cc03
mitre:
- attack.discovery
- attack.t1018
severity: low
title: Windows Network Enumeration
sigma_fields: true
description: Identifies attempts to enumerate hosts in a network using the built-in
Windows net.exe tool.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net.exe view<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line:
"*view*" AND NOT process.command_line: "*\\\\*"'
pre_detector:
case_condition: directly
id: 62510e69-616b-4078-b371-847da438cc03
mitre:
- attack.discovery
- attack.t1018
severity: low
title: Windows Network Enumeration
sigma_fields: true
description: Identifies attempts to enumerate hosts in a network using the built-in
Windows net.exe tool.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net.exe user add<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line:
"*user*" AND process.command_line: "*add*"'
pre_detector:
case_condition: directly
id: cd219ff3-fa99-45d4-8380-a7d15116c6dc
mitre:
- attack.persistence
- attack.t1136
- attack.t1136.001
severity: medium
title: Net.exe User Account Creation
sigma_fields: true
description: Identifies creation of local users via the net.exe command<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net user add<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line:
"*user*" AND process.command_line: "*add*"'
pre_detector:
case_condition: directly
id: cd219ff3-fa99-45d4-8380-a7d15116c6dc
mitre:
- attack.persistence
- attack.t1136
- attack.t1136.001
severity: medium
title: Net.exe User Account Creation
sigma_fields: true
description: Identifies creation of local users via the net.exe command<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net.exe add user<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line:
"*user*" AND process.command_line: "*add*"'
pre_detector:
case_condition: directly
id: cd219ff3-fa99-45d4-8380-a7d15116c6dc
mitre:
- attack.persistence
- attack.t1136
- attack.t1136.001
severity: medium
title: Net.exe User Account Creation
sigma_fields: true
description: Identifies creation of local users via the net.exe command<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe new-service<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\sc.exe" AND process.command_line: "*create*" AND
process.command_line: "*binpath*") OR (process.executable: "*\powershell.exe" AND
process.command_line: "*new-service*")'
pre_detector:
case_condition: directly
id: 7fe71fc9-de3b-432a-8d57-8c809efc10ab
mitre:
- attack.persistence
- attack.privilege_escalation
- attack.t1050
- attack.t1543.003
severity: low
title: New Service Creation
sigma_fields: true
description: Detects creation of a new service<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe new-s"ervice"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\sc.exe" AND process.command_line: "*create*" AND
process.command_line: "*binpath*") OR (process.executable: "*\powershell.exe" AND
process.command_line: "*new-service*")'
pre_detector:
case_condition: directly
id: 7fe71fc9-de3b-432a-8d57-8c809efc10ab
mitre:
- attack.persistence
- attack.privilege_escalation
- attack.t1050
- attack.t1543.003
severity: low
title: New Service Creation
sigma_fields: true
description: Detects creation of a new service<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell new-service<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\sc.exe" AND process.command_line: "*create*" AND
process.command_line: "*binpath*") OR (process.executable: "*\powershell.exe" AND
process.command_line: "*new-service*")'
pre_detector:
case_condition: directly
id: 7fe71fc9-de3b-432a-8d57-8c809efc10ab
mitre:
- attack.persistence
- attack.privilege_escalation
- attack.t1050
- attack.t1543.003
severity: low
title: New Service Creation
sigma_fields: true
description: Detects creation of a new service<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe new-service<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\sc.exe" AND process.command_line: "*create*" AND
process.command_line: "*binpath*") OR (process.executable: "*\powershell.exe" AND
process.command_line: "*new-service*")'
pre_detector:
case_condition: directly
id: 7fe71fc9-de3b-432a-8d57-8c809efc10ab
mitre:
- attack.persistence
- attack.privilege_escalation
- attack.t1050
- attack.t1543.003
severity: low
title: New Service Creation
sigma_fields: true
description: Detects creation of a new service<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\installutil.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*\msdt.exe*" OR "*\installutil.exe*" OR "*\regsvcs.exe*"
OR "*\regasm.exe*" OR "*\msbuild.exe*" OR "*\ieexec.exe*")'
pre_detector:
case_condition: directly
id: 82a19e3a-2bfe-4a91-8c0d-5d4c98fbb719
mitre:
- attack.defense_evasion
- attack.t1118
- attack.t1218.004
- attack.t1121
- attack.t1218.009
- attack.t1127
- attack.t1127.001
- attack.t1170
- attack.t1218.005
- attack.t1218
severity: low
title: Possible Applocker Bypass
sigma_fields: true
description: Detects execution of executables that can be used to bypass Applocker
whitelisting<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\"i""n""s""t""a""l""l""u""t""i""l"".""e""x""e"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*\msdt.exe*" OR "*\installutil.exe*" OR "*\regsvcs.exe*"
OR "*\regasm.exe*" OR "*\msbuild.exe*" OR "*\ieexec.exe*")'
pre_detector:
case_condition: directly
id: 82a19e3a-2bfe-4a91-8c0d-5d4c98fbb719
mitre:
- attack.defense_evasion
- attack.t1118
- attack.t1218.004
- attack.t1121
- attack.t1218.009
- attack.t1127
- attack.t1127.001
- attack.t1170
- attack.t1218.005
- attack.t1218
severity: low
title: Possible Applocker Bypass
sigma_fields: true
description: Detects execution of executables that can be used to bypass Applocker
whitelisting<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\installutil<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*\msdt.exe*" OR "*\installutil.exe*" OR "*\regsvcs.exe*"
OR "*\regasm.exe*" OR "*\msbuild.exe*" OR "*\ieexec.exe*")'
pre_detector:
case_condition: directly
id: 82a19e3a-2bfe-4a91-8c0d-5d4c98fbb719
mitre:
- attack.defense_evasion
- attack.t1118
- attack.t1218.004
- attack.t1121
- attack.t1218.009
- attack.t1127
- attack.t1127.001
- attack.t1170
- attack.t1218.005
- attack.t1218
severity: low
title: Possible Applocker Bypass
sigma_fields: true
description: Detects execution of executables that can be used to bypass Applocker
whitelisting<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\installutil.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*\msdt.exe*" OR "*\installutil.exe*" OR "*\regsvcs.exe*"
OR "*\regasm.exe*" OR "*\msbuild.exe*" OR "*\ieexec.exe*")'
pre_detector:
case_condition: directly
id: 82a19e3a-2bfe-4a91-8c0d-5d4c98fbb719
mitre:
- attack.defense_evasion
- attack.t1118
- attack.t1218.004
- attack.t1121
- attack.t1218.009
- attack.t1127
- attack.t1127.001
- attack.t1170
- attack.t1218.005
- attack.t1218
severity: low
title: Possible Applocker Bypass
sigma_fields: true
description: Detects execution of executables that can be used to bypass Applocker
whitelisting<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>System.Management.Automation.AmsiUtils amsiInitFailed<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*System.Management.Automation.AmsiUtils*" AND process.command_line:
"*amsiInitFailed*"'
pre_detector:
case_condition: directly
id: 30edb182-aa75-42c0-b0a9-e998bb29067c
mitre:
- attack.defense_evasion
- attack.t1089
- attack.t1562.001
severity: high
title: Powershell AMSI Bypass via .NET Reflection
sigma_fields: true
description: Detects Request to amsiInitFailed that can be used to disable AMSI Scanning<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe Start-BitsTransfer<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.command_line: "*Start-BitsTransfer*"'
pre_detector:
case_condition: directly
id: f67dbfce-93bc-440d-86ad-a95ae8858c90
mitre:
- attack.defense_evasion
- attack.persistence
- attack.t1197
severity: medium
title: Suspicious Bitsadmin Job via PowerShell
sigma_fields: true
description: Detect download by BITS jobs via PowerShell<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe Start-Bit"sTransfer"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.command_line: "*Start-BitsTransfer*"'
pre_detector:
case_condition: directly
id: f67dbfce-93bc-440d-86ad-a95ae8858c90
mitre:
- attack.defense_evasion
- attack.persistence
- attack.t1197
severity: medium
title: Suspicious Bitsadmin Job via PowerShell
sigma_fields: true
description: Detect download by BITS jobs via PowerShell<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell Start-BitsTransfer<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.command_line: "*Start-BitsTransfer*"'
pre_detector:
case_condition: directly
id: f67dbfce-93bc-440d-86ad-a95ae8858c90
mitre:
- attack.defense_evasion
- attack.persistence
- attack.t1197
severity: medium
title: Suspicious Bitsadmin Job via PowerShell
sigma_fields: true
description: Detect download by BITS jobs via PowerShell<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe Start-BitsTransfer<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.command_line: "*Start-BitsTransfer*"'
pre_detector:
case_condition: directly
id: f67dbfce-93bc-440d-86ad-a95ae8858c90
mitre:
- attack.defense_evasion
- attack.persistence
- attack.t1197
severity: medium
title: Suspicious Bitsadmin Job via PowerShell
sigma_fields: true
description: Detect download by BITS jobs via PowerShell<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe -version 2<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -version 2 *" OR "* -versio 2 *" OR "* -versi 2
*" OR "* -vers 2 *" OR "* -ver 2 *" OR "* -ve 2 *") AND process.executable: "*\powershell.exe"'
pre_detector:
case_condition: directly
id: b3512211-c67e-4707-bedc-66efc7848863
mitre:
- attack.defense_evasion
- attack.execution
- attack.t1086
- attack.t1059.001
severity: medium
title: PowerShell Downgrade Attack
sigma_fields: true
description: Detects PowerShell downgrade attack by comparing the host versions with
the actually used engine version 2.0<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe -version \"2\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -version 2 *" OR "* -versio 2 *" OR "* -versi 2
*" OR "* -vers 2 *" OR "* -ver 2 *" OR "* -ve 2 *") AND process.executable: "*\powershell.exe"'
pre_detector:
case_condition: directly
id: b3512211-c67e-4707-bedc-66efc7848863
mitre:
- attack.defense_evasion
- attack.execution
- attack.t1086
- attack.t1059.001
severity: medium
title: PowerShell Downgrade Attack
sigma_fields: true
description: Detects PowerShell downgrade attack by comparing the host versions with
the actually used engine version 2.0<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell -version 2<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -version 2 *" OR "* -versio 2 *" OR "* -versi 2
*" OR "* -vers 2 *" OR "* -ver 2 *" OR "* -ve 2 *") AND process.executable: "*\powershell.exe"'
pre_detector:
case_condition: directly
id: b3512211-c67e-4707-bedc-66efc7848863
mitre:
- attack.defense_evasion
- attack.execution
- attack.t1086
- attack.t1059.001
severity: medium
title: PowerShell Downgrade Attack
sigma_fields: true
description: Detects PowerShell downgrade attack by comparing the host versions with
the actually used engine version 2.0<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe 2 -version<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -version 2 *" OR "* -versio 2 *" OR "* -versi 2
*" OR "* -vers 2 *" OR "* -ver 2 *" OR "* -ve 2 *") AND process.executable: "*\powershell.exe"'
pre_detector:
case_condition: directly
id: b3512211-c67e-4707-bedc-66efc7848863
mitre:
- attack.defense_evasion
- attack.execution
- attack.t1086
- attack.t1059.001
severity: medium
title: PowerShell Downgrade Attack
sigma_fields: true
description: Detects PowerShell downgrade attack by comparing the host versions with
the actually used engine version 2.0<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Powershell.exe -windowstyle h<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\Powershell.exe" AND process.command_line: ("* -windowstyle
h *" OR "* -windowstyl h*" OR "* -windowsty h*" OR "* -windowst h*" OR "* -windows
h*" OR "* -windo h*" OR "* -wind h*" OR "* -win h*" OR "* -wi h*" OR "* -win h *"
OR "* -win hi *" OR "* -win hid *" OR "* -win hidd *" OR "* -win hidde *" OR "*
-NoPr *" OR "* -NoPro *" OR "* -NoProf *" OR "* -NoProfi *" OR "* -NoProfil *" OR
"* -nonin *" OR "* -nonint *" OR "* -noninte *" OR "* -noninter *" OR "* -nonintera
*" OR "* -noninterac *" OR "* -noninteract *" OR "* -noninteracti *" OR "* -noninteractiv
*" OR "* -ec *" OR "* -encodedComman *" OR "* -encodedComma *" OR "* -encodedComm
*" OR "* -encodedCom *" OR "* -encodedCo *" OR "* -encodedC *" OR "* -encoded *"
OR "* -encode *" OR "* -encod *" OR "* -enco *" OR "* -en *")'
pre_detector:
case_condition: directly
id: 36210e0d-5b19-485d-a087-c096088885f0
mitre:
- attack.execution
- attack.t1086
- attack.t1059.001
severity: high
title: Suspicious PowerShell Parameter Substring
sigma_fields: true
description: Detects suspicious PowerShell invocation with a parameter substring<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Powershell.exe "-""w""i""n""d""o""w""s""t""y""l""e" h<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\Powershell.exe" AND process.command_line: ("* -windowstyle
h *" OR "* -windowstyl h*" OR "* -windowsty h*" OR "* -windowst h*" OR "* -windows
h*" OR "* -windo h*" OR "* -wind h*" OR "* -win h*" OR "* -wi h*" OR "* -win h *"
OR "* -win hi *" OR "* -win hid *" OR "* -win hidd *" OR "* -win hidde *" OR "*
-NoPr *" OR "* -NoPro *" OR "* -NoProf *" OR "* -NoProfi *" OR "* -NoProfil *" OR
"* -nonin *" OR "* -nonint *" OR "* -noninte *" OR "* -noninter *" OR "* -nonintera
*" OR "* -noninterac *" OR "* -noninteract *" OR "* -noninteracti *" OR "* -noninteractiv
*" OR "* -ec *" OR "* -encodedComman *" OR "* -encodedComma *" OR "* -encodedComm
*" OR "* -encodedCom *" OR "* -encodedCo *" OR "* -encodedC *" OR "* -encoded *"
OR "* -encode *" OR "* -encod *" OR "* -enco *" OR "* -en *")'
pre_detector:
case_condition: directly
id: 36210e0d-5b19-485d-a087-c096088885f0
mitre:
- attack.execution
- attack.t1086
- attack.t1059.001
severity: high
title: Suspicious PowerShell Parameter Substring
sigma_fields: true
description: Detects suspicious PowerShell invocation with a parameter substring<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Powershell -windowstyle h<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\Powershell.exe" AND process.command_line: ("* -windowstyle
h *" OR "* -windowstyl h*" OR "* -windowsty h*" OR "* -windowst h*" OR "* -windows
h*" OR "* -windo h*" OR "* -wind h*" OR "* -win h*" OR "* -wi h*" OR "* -win h *"
OR "* -win hi *" OR "* -win hid *" OR "* -win hidd *" OR "* -win hidde *" OR "*
-NoPr *" OR "* -NoPro *" OR "* -NoProf *" OR "* -NoProfi *" OR "* -NoProfil *" OR
"* -nonin *" OR "* -nonint *" OR "* -noninte *" OR "* -noninter *" OR "* -nonintera
*" OR "* -noninterac *" OR "* -noninteract *" OR "* -noninteracti *" OR "* -noninteractiv
*" OR "* -ec *" OR "* -encodedComman *" OR "* -encodedComma *" OR "* -encodedComm
*" OR "* -encodedCom *" OR "* -encodedCo *" OR "* -encodedC *" OR "* -encoded *"
OR "* -encode *" OR "* -encod *" OR "* -enco *" OR "* -en *")'
pre_detector:
case_condition: directly
id: 36210e0d-5b19-485d-a087-c096088885f0
mitre:
- attack.execution
- attack.t1086
- attack.t1059.001
severity: high
title: Suspicious PowerShell Parameter Substring
sigma_fields: true
description: Detects suspicious PowerShell invocation with a parameter substring<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Powershell.exe h -windowstyle<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\Powershell.exe" AND process.command_line: ("* -windowstyle
h *" OR "* -windowstyl h*" OR "* -windowsty h*" OR "* -windowst h*" OR "* -windows
h*" OR "* -windo h*" OR "* -wind h*" OR "* -win h*" OR "* -wi h*" OR "* -win h *"
OR "* -win hi *" OR "* -win hid *" OR "* -win hidd *" OR "* -win hidde *" OR "*
-NoPr *" OR "* -NoPro *" OR "* -NoProf *" OR "* -NoProfi *" OR "* -NoProfil *" OR
"* -nonin *" OR "* -nonint *" OR "* -noninte *" OR "* -noninter *" OR "* -nonintera
*" OR "* -noninterac *" OR "* -noninteract *" OR "* -noninteracti *" OR "* -noninteractiv
*" OR "* -ec *" OR "* -encodedComman *" OR "* -encodedComma *" OR "* -encodedComm
*" OR "* -encodedCom *" OR "* -encodedCo *" OR "* -encodedC *" OR "* -encoded *"
OR "* -encode *" OR "* -encod *" OR "* -enco *" OR "* -en *")'
pre_detector:
case_condition: directly
id: 36210e0d-5b19-485d-a087-c096088885f0
mitre:
- attack.execution
- attack.t1086
- attack.t1059.001
severity: high
title: Suspicious PowerShell Parameter Substring
sigma_fields: true
description: Detects suspicious PowerShell invocation with a parameter substring<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>schtasks /Create /SC Updater /TN Updater /TR powershell<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\powershell.exe" AND process.command_line: ("*schtasks*/Create*/SC
*ONLOGON*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *DAILY*/TN *Updater*/TR
*powershell*" OR "*schtasks*/Create*/SC *ONIDLE*/TN *Updater*/TR *powershell*" OR
"*schtasks*/Create*/SC *Updater*/TN *Updater*/TR *powershell*")'
pre_detector:
case_condition: directly
id: 56c217c3-2de2-479b-990f-5c109ba8458f
mitre:
- attack.execution
- attack.persistence
- attack.privilege_escalation
- attack.t1053
- attack.t1086
- attack.s0111
- attack.g0022
- attack.g0060
- car.2013-08-001
- attack.t1053.005
- attack.t1059.001
severity: high
title: Default PowerSploit and Empire Schtasks Persistence
sigma_fields: true
description: Detects the creation of a schtask via PowerSploit or Empire Default Configuration.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>schtasks /Create /SC Updater /TN Updater /TR power\"shell\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\powershell.exe" AND process.command_line: ("*schtasks*/Create*/SC
*ONLOGON*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *DAILY*/TN *Updater*/TR
*powershell*" OR "*schtasks*/Create*/SC *ONIDLE*/TN *Updater*/TR *powershell*" OR
"*schtasks*/Create*/SC *Updater*/TN *Updater*/TR *powershell*")'
pre_detector:
case_condition: directly
id: 56c217c3-2de2-479b-990f-5c109ba8458f
mitre:
- attack.execution
- attack.persistence
- attack.privilege_escalation
- attack.t1053
- attack.t1086
- attack.s0111
- attack.g0022
- attack.g0060
- car.2013-08-001
- attack.t1053.005
- attack.t1059.001
severity: high
title: Default PowerSploit and Empire Schtasks Persistence
sigma_fields: true
description: Detects the creation of a schtask via PowerSploit or Empire Default Configuration.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>schtasks /Create /SC Updater /TN Updater /TR powershell<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\powershell.exe" AND process.command_line: ("*schtasks*/Create*/SC
*ONLOGON*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *DAILY*/TN *Updater*/TR
*powershell*" OR "*schtasks*/Create*/SC *ONIDLE*/TN *Updater*/TR *powershell*" OR
"*schtasks*/Create*/SC *Updater*/TN *Updater*/TR *powershell*")'
pre_detector:
case_condition: directly
id: 56c217c3-2de2-479b-990f-5c109ba8458f
mitre:
- attack.execution
- attack.persistence
- attack.privilege_escalation
- attack.t1053
- attack.t1086
- attack.s0111
- attack.g0022
- attack.g0060
- car.2013-08-001
- attack.t1053.005
- attack.t1059.001
severity: high
title: Default PowerSploit and Empire Schtasks Persistence
sigma_fields: true
description: Detects the creation of a schtask via PowerSploit or Empire Default Configuration.<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bitsadmin.exe /transfer copy bitsadmin.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\bitsadmin.exe" AND process.command_line: "* /transfer
*") OR process.command_line: "*copy bitsadmin.exe*"'
pre_detector:
case_condition: directly
id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede
mitre:
- attack.defense_evasion
- attack.persistence
- attack.t1197
- attack.s0190
- attack.t1036.003
severity: medium
title: Bitsadmin Download
sigma_fields: true
description: Detects usage of bitsadmin downloading a file<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bitsadmin.exe /transfer "c""o""p""y" bitsadmin.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\bitsadmin.exe" AND process.command_line: "* /transfer
*") OR process.command_line: "*copy bitsadmin.exe*"'
pre_detector:
case_condition: directly
id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede
mitre:
- attack.defense_evasion
- attack.persistence
- attack.t1197
- attack.s0190
- attack.t1036.003
severity: medium
title: Bitsadmin Download
sigma_fields: true
description: Detects usage of bitsadmin downloading a file<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bitsadmin.exe --transfer copy bitsadmin.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\bitsadmin.exe" AND process.command_line: "* /transfer
*") OR process.command_line: "*copy bitsadmin.exe*"'
pre_detector:
case_condition: directly
id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede
mitre:
- attack.defense_evasion
- attack.persistence
- attack.t1197
- attack.s0190
- attack.t1036.003
severity: medium
title: Bitsadmin Download
sigma_fields: true
description: Detects usage of bitsadmin downloading a file<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bitsadmin /transfer copy bitsadmin<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\bitsadmin.exe" AND process.command_line: "* /transfer
*") OR process.command_line: "*copy bitsadmin.exe*"'
pre_detector:
case_condition: directly
id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede
mitre:
- attack.defense_evasion
- attack.persistence
- attack.t1197
- attack.s0190
- attack.t1036.003
severity: medium
title: Bitsadmin Download
sigma_fields: true
description: Detects usage of bitsadmin downloading a file<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bitsadmin.exe /transfer copy bitsadmin.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\bitsadmin.exe" AND process.command_line: "* /transfer
*") OR process.command_line: "*copy bitsadmin.exe*"'
pre_detector:
case_condition: directly
id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede
mitre:
- attack.defense_evasion
- attack.persistence
- attack.t1197
- attack.s0190
- attack.t1036.003
severity: medium
title: Bitsadmin Download
sigma_fields: true
description: Detects usage of bitsadmin downloading a file<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>comsvcs.dll,MiniDump<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*comsvcs.dll,#24*" OR "*comsvcs.dll,MiniDump*")'
pre_detector:
case_condition: directly
id: 646ea171-dded-4578-8a4d-65e9822892e3
mitre:
- attack.defense_evasion
- attack.t1036
- attack.credential_access
- attack.t1003
- car.2013-05-009
- attack.t1003.001
severity: high
title: Process Dump via Rundll32 and Comsvcs.dll
sigma_fields: true
description: Detects a process memory dump performed via ordinal function 24 in comsvcs.dll<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>comsvcs.dll,MiniDump<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*comsvcs.dll,#24*" OR "*comsvcs.dll,MiniDump*")'
pre_detector:
case_condition: directly
id: 646ea171-dded-4578-8a4d-65e9822892e3
mitre:
- attack.defense_evasion
- attack.t1036
- attack.credential_access
- attack.t1003
- car.2013-05-009
- attack.t1003.001
severity: high
title: Process Dump via Rundll32 and Comsvcs.dll
sigma_fields: true
description: Detects a process memory dump performed via ordinal function 24 in comsvcs.dll<|eot_id|> |
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>comsvcs.dll,MiniDump<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*comsvcs.dll,#24*" OR "*comsvcs.dll,MiniDump*")'
pre_detector:
case_condition: directly
id: 646ea171-dded-4578-8a4d-65e9822892e3
mitre:
- attack.defense_evasion
- attack.t1036
- attack.credential_access
- attack.t1003
- car.2013-05-009
- attack.t1003.001
severity: high
title: Process Dump via Rundll32 and Comsvcs.dll
sigma_fields: true
description: Detects a process memory dump performed via ordinal function 24 in comsvcs.dll<|eot_id|> |
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 64