Dataset Viewer
Auto-converted to Parquet
prompt
stringlengths
544
2.39k
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe DataExchange.dll<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.parent.executable: "*\excel.exe" AND process.command_line: "*DataExchange.dll*"' pre_detector: case_condition: directly id: 36222790-0d43-4fe8-86e4-674b27809543 mitre: - attack.command_and_control - attack.t1071 - attack.t1071.004 severity: critical title: DNS Tunnel Technique from MuddyWater sigma_fields: true description: Detecting DNS tunnel activity for Muddywater actor<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe DataExch"ange.dll"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.parent.executable: "*\excel.exe" AND process.command_line: "*DataExchange.dll*"' pre_detector: case_condition: directly id: 36222790-0d43-4fe8-86e4-674b27809543 mitre: - attack.command_and_control - attack.t1071 - attack.t1071.004 severity: critical title: DNS Tunnel Technique from MuddyWater sigma_fields: true description: Detecting DNS tunnel activity for Muddywater actor<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell DataExchange.dll<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.parent.executable: "*\excel.exe" AND process.command_line: "*DataExchange.dll*"' pre_detector: case_condition: directly id: 36222790-0d43-4fe8-86e4-674b27809543 mitre: - attack.command_and_control - attack.t1071 - attack.t1071.004 severity: critical title: DNS Tunnel Technique from MuddyWater sigma_fields: true description: Detecting DNS tunnel activity for Muddywater actor<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe DataExchange.dll<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.parent.executable: "*\excel.exe" AND process.command_line: "*DataExchange.dll*"' pre_detector: case_condition: directly id: 36222790-0d43-4fe8-86e4-674b27809543 mitre: - attack.command_and_control - attack.t1071 - attack.t1071.004 severity: critical title: DNS Tunnel Technique from MuddyWater sigma_fields: true description: Detecting DNS tunnel activity for Muddywater actor<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>-noni -ep bypass $<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*-noni -ep bypass $*"' pre_detector: case_condition: directly id: 033fe7d6-66d1-4240-ac6b-28908009c71f mitre: - attack.execution - attack.g0016 - attack.t1086 - attack.t1059 - attack.t1059.001 severity: critical title: APT29 sigma_fields: true description: This method detects a suspicious powershell command line combination as used by APT29 in a campaign against US think tanks<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>-noni -ep "b""y""p""a""s""s" $<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*-noni -ep bypass $*"' pre_detector: case_condition: directly id: 033fe7d6-66d1-4240-ac6b-28908009c71f mitre: - attack.execution - attack.g0016 - attack.t1086 - attack.t1059 - attack.t1059.001 severity: critical title: APT29 sigma_fields: true description: This method detects a suspicious powershell command line combination as used by APT29 in a campaign against US think tanks<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>-noni $ bypass -ep<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*-noni -ep bypass $*"' pre_detector: case_condition: directly id: 033fe7d6-66d1-4240-ac6b-28908009c71f mitre: - attack.execution - attack.g0016 - attack.t1086 - attack.t1059 - attack.t1059.001 severity: critical title: APT29 sigma_fields: true description: This method detects a suspicious powershell command line combination as used by APT29 in a campaign against US think tanks<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\Win64.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* localgroup administrators admin /add" OR "*\Win64.exe*")' pre_detector: case_condition: directly id: 0eb2107b-a596-422e-b123-b389d5594ed7 mitre: - attack.privilege_escalation - attack.g0009 - attack.t1068 severity: high title: Hurricane Panda Activity sigma_fields: true description: Detects Hurricane Panda Activity<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\"\Win64.exe\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* localgroup administrators admin /add" OR "*\Win64.exe*")' pre_detector: case_condition: directly id: 0eb2107b-a596-422e-b123-b389d5594ed7 mitre: - attack.privilege_escalation - attack.g0009 - attack.t1068 severity: high title: Hurricane Panda Activity sigma_fields: true description: Detects Hurricane Panda Activity<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\Win64<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* localgroup administrators admin /add" OR "*\Win64.exe*")' pre_detector: case_condition: directly id: 0eb2107b-a596-422e-b123-b389d5594ed7 mitre: - attack.privilege_escalation - attack.g0009 - attack.t1068 severity: high title: Hurricane Panda Activity sigma_fields: true description: Detects Hurricane Panda Activity<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\Win64.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* localgroup administrators admin /add" OR "*\Win64.exe*")' pre_detector: case_condition: directly id: 0eb2107b-a596-422e-b123-b389d5594ed7 mitre: - attack.privilege_escalation - attack.g0009 - attack.t1068 severity: high title: Hurricane Panda Activity sigma_fields: true description: Detects Hurricane Panda Activity<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>ps.exe -accepteula<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "ps.exe -accepteula"' pre_detector: case_condition: directly id: 18da1007-3f26-470f-875d-f77faf1cab31 mitre: - attack.defense_evasion - attack.g0035 - attack.t1036 - attack.t1036.003 - car.2013-05-009 severity: high title: Ps.exe Renamed SysInternals Tool sigma_fields: true description: Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documented in TA17-293A report<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>ps.exe \"-\"\"a\"\"c\"\"c\"\"e\"\"p\"\"t\"\"e\"\"u\"\"l\"\"a\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "ps.exe -accepteula"' pre_detector: case_condition: directly id: 18da1007-3f26-470f-875d-f77faf1cab31 mitre: - attack.defense_evasion - attack.g0035 - attack.t1036 - attack.t1036.003 - car.2013-05-009 severity: high title: Ps.exe Renamed SysInternals Tool sigma_fields: true description: Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documented in TA17-293A report<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>ps -accepteula<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "ps.exe -accepteula"' pre_detector: case_condition: directly id: 18da1007-3f26-470f-875d-f77faf1cab31 mitre: - attack.defense_evasion - attack.g0035 - attack.t1036 - attack.t1036.003 - car.2013-05-009 severity: high title: Ps.exe Renamed SysInternals Tool sigma_fields: true description: Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documented in TA17-293A report<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>ps.exe -accepteula<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "ps.exe -accepteula"' pre_detector: case_condition: directly id: 18da1007-3f26-470f-875d-f77faf1cab31 mitre: - attack.defense_evasion - attack.g0035 - attack.t1036 - attack.t1036.003 - car.2013-05-009 severity: high title: Ps.exe Renamed SysInternals Tool sigma_fields: true description: Detects renamed SysInternals tool execution with a binary named ps.exe as used by Dragonfly APT group and documented in TA17-293A report<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bcdedit.exe set bootstatuspolicy ignoreallfailures<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\bcdedit.exe" AND process.command_line: "*set*" AND ((process.command_line: "*bootstatuspolicy*" AND process.command_line: "*ignoreallfailures*") OR (process.command_line: "*recoveryenabled*" AND process.command_line: "*no*"))' pre_detector: case_condition: directly id: 1444443e-6757-43e4-9ea4-c8fc705f79a2 mitre: - attack.impact - attack.t1490 severity: high title: Modification of Boot Configuration sigma_fields: true description: Identifies use of the bcdedit command to delete boot configuration data. This tactic is sometimes used as by malware or an attacker as a destructive technique.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bcdedit.exe set bootstatuspolicy "i""g""n""o""r""e""a""l""l""f""a""i""l""u""r""e""s"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\bcdedit.exe" AND process.command_line: "*set*" AND ((process.command_line: "*bootstatuspolicy*" AND process.command_line: "*ignoreallfailures*") OR (process.command_line: "*recoveryenabled*" AND process.command_line: "*no*"))' pre_detector: case_condition: directly id: 1444443e-6757-43e4-9ea4-c8fc705f79a2 mitre: - attack.impact - attack.t1490 severity: high title: Modification of Boot Configuration sigma_fields: true description: Identifies use of the bcdedit command to delete boot configuration data. This tactic is sometimes used as by malware or an attacker as a destructive technique.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bcdedit set bootstatuspolicy ignoreallfailures<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\bcdedit.exe" AND process.command_line: "*set*" AND ((process.command_line: "*bootstatuspolicy*" AND process.command_line: "*ignoreallfailures*") OR (process.command_line: "*recoveryenabled*" AND process.command_line: "*no*"))' pre_detector: case_condition: directly id: 1444443e-6757-43e4-9ea4-c8fc705f79a2 mitre: - attack.impact - attack.t1490 severity: high title: Modification of Boot Configuration sigma_fields: true description: Identifies use of the bcdedit command to delete boot configuration data. This tactic is sometimes used as by malware or an attacker as a destructive technique.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bcdedit.exe bootstatuspolicy set ignoreallfailures<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\bcdedit.exe" AND process.command_line: "*set*" AND ((process.command_line: "*bootstatuspolicy*" AND process.command_line: "*ignoreallfailures*") OR (process.command_line: "*recoveryenabled*" AND process.command_line: "*no*"))' pre_detector: case_condition: directly id: 1444443e-6757-43e4-9ea4-c8fc705f79a2 mitre: - attack.impact - attack.t1490 severity: high title: Modification of Boot Configuration sigma_fields: true description: Identifies use of the bcdedit command to delete boot configuration data. This tactic is sometimes used as by malware or an attacker as a destructive technique.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd /c assoc<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd*" AND process.command_line: "*/c*" AND process.command_line: "*assoc*"' pre_detector: case_condition: directly id: 3d3aa6cd-6272-44d6-8afc-7e88dfef7061 mitre: - attack.persistence - attack.t1546.001 - attack.t1042 severity: low title: Change Default File Association sigma_fields: true description: When a file is opened, the default program used to open the file (also called the file association or handler) is checked. File association selections are stored in the Windows Registry and can be edited by users, administrators, or programs that have Registry access or by administrators using the built-in assoc utility. Applications can modify the file association for a given file extension to call an arbitrary program when a file with the given extension is opened.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd -c assoc<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd*" AND process.command_line: "*/c*" AND process.command_line: "*assoc*"' pre_detector: case_condition: directly id: 3d3aa6cd-6272-44d6-8afc-7e88dfef7061 mitre: - attack.persistence - attack.t1546.001 - attack.t1042 severity: low title: Change Default File Association sigma_fields: true description: When a file is opened, the default program used to open the file (also called the file association or handler) is checked. File association selections are stored in the Windows Registry and can be edited by users, administrators, or programs that have Registry access or by administrators using the built-in assoc utility. Applications can modify the file association for a given file extension to call an arbitrary program when a file with the given extension is opened.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd /c assoc<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd*" AND process.command_line: "*/c*" AND process.command_line: "*assoc*"' pre_detector: case_condition: directly id: 3d3aa6cd-6272-44d6-8afc-7e88dfef7061 mitre: - attack.persistence - attack.t1546.001 - attack.t1042 severity: low title: Change Default File Association sigma_fields: true description: When a file is opened, the default program used to open the file (also called the file association or handler) is checked. File association selections are stored in the Windows Registry and can be edited by users, administrators, or programs that have Registry access or by administrators using the built-in assoc utility. Applications can modify the file association for a given file extension to call an arbitrary program when a file with the given extension is opened.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>/../../<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.command_line: "*cmd*/c*" AND process.command_line: "*/../../*"' pre_detector: case_condition: directly id: 087790e3-3287-436c-bccf-cbd0184a7db1 mitre: - attack.execution - attack.t1059.003 - attack.t1059 severity: high title: Cmd.exe CommandLine Path Traversal sigma_fields: true description: detects the usage of path traversal in cmd.exe indicating possible command/argument confusion/hijacking<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>/../../<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.command_line: "*cmd*/c*" AND process.command_line: "*/../../*"' pre_detector: case_condition: directly id: 087790e3-3287-436c-bccf-cbd0184a7db1 mitre: - attack.execution - attack.t1059.003 - attack.t1059 severity: high title: Cmd.exe CommandLine Path Traversal sigma_fields: true description: detects the usage of path traversal in cmd.exe indicating possible command/argument confusion/hijacking<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>/../../<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.command_line: "*cmd*/c*" AND process.command_line: "*/../../*"' pre_detector: case_condition: directly id: 087790e3-3287-436c-bccf-cbd0184a7db1 mitre: - attack.execution - attack.t1059.003 - attack.t1059 severity: high title: Cmd.exe CommandLine Path Traversal sigma_fields: true description: detects the usage of path traversal in cmd.exe indicating possible command/argument confusion/hijacking<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net stop SuperBackupMan<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*shutdown /r /f /t 00*" OR "*net stop SuperBackupMan*")' pre_detector: case_condition: directly id: 5325945e-f1f0-406e-97b8-65104d393fff mitre: - attack.execution - attack.t1204 severity: critical title: Snatch Ransomware sigma_fields: true description: Detects specific process characteristics of Snatch ransomware word document droppers<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net stop \"SuperBackupMan\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*shutdown /r /f /t 00*" OR "*net stop SuperBackupMan*")' pre_detector: case_condition: directly id: 5325945e-f1f0-406e-97b8-65104d393fff mitre: - attack.execution - attack.t1204 severity: critical title: Snatch Ransomware sigma_fields: true description: Detects specific process characteristics of Snatch ransomware word document droppers<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net SuperBackupMan stop<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*shutdown /r /f /t 00*" OR "*net stop SuperBackupMan*")' pre_detector: case_condition: directly id: 5325945e-f1f0-406e-97b8-65104d393fff mitre: - attack.execution - attack.t1204 severity: critical title: Snatch Ransomware sigma_fields: true description: Detects specific process characteristics of Snatch ransomware word document droppers<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>rar.exe a<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\rar.exe" AND process.command_line: "* a *"' pre_detector: case_condition: directly id: 6f3e2987-db24-4c78-a860-b4f4095a7095 mitre: - attack.exfiltration - attack.t1002 - attack.collection - attack.t1560.001 severity: low title: Data Compressed - rar.exe sigma_fields: true description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>rar.exe "a"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\rar.exe" AND process.command_line: "* a *"' pre_detector: case_condition: directly id: 6f3e2987-db24-4c78-a860-b4f4095a7095 mitre: - attack.exfiltration - attack.t1002 - attack.collection - attack.t1560.001 severity: low title: Data Compressed - rar.exe sigma_fields: true description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>rar a<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\rar.exe" AND process.command_line: "* a *"' pre_detector: case_condition: directly id: 6f3e2987-db24-4c78-a860-b4f4095a7095 mitre: - attack.exfiltration - attack.t1002 - attack.collection - attack.t1560.001 severity: low title: Data Compressed - rar.exe sigma_fields: true description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>rar.exe a<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\rar.exe" AND process.command_line: "* a *"' pre_detector: case_condition: directly id: 6f3e2987-db24-4c78-a860-b4f4095a7095 mitre: - attack.exfiltration - attack.t1002 - attack.collection - attack.t1560.001 severity: low title: Data Compressed - rar.exe sigma_fields: true description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Add-PrinterPort -Name Generic / Text Only<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.command_line: "*Add-PrinterPort -Name*" AND process.command_line: ("*.exe*" OR "*.dll*" OR "*.bat*")) OR process.command_line: "*Generic / Text Only*"' pre_detector: case_condition: directly id: cc08d590-8b90-413a-aff6-31d1a99678d7 mitre: - attack.persistence - attack.execution - attack.t1059.001 - attack.t1086 severity: high title: Suspicious PrinterPorts Creation (CVE-2020-1048) sigma_fields: true description: Detects new commands that add new printer port which point to suspicious file<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Add-PrinterPort "-""N""a""m""e" Generic / Text Only<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.command_line: "*Add-PrinterPort -Name*" AND process.command_line: ("*.exe*" OR "*.dll*" OR "*.bat*")) OR process.command_line: "*Generic / Text Only*"' pre_detector: case_condition: directly id: cc08d590-8b90-413a-aff6-31d1a99678d7 mitre: - attack.persistence - attack.execution - attack.t1059.001 - attack.t1086 severity: high title: Suspicious PrinterPorts Creation (CVE-2020-1048) sigma_fields: true description: Detects new commands that add new printer port which point to suspicious file<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Add-PrinterPort -Name Generic / Only Text<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.command_line: "*Add-PrinterPort -Name*" AND process.command_line: ("*.exe*" OR "*.dll*" OR "*.bat*")) OR process.command_line: "*Generic / Text Only*"' pre_detector: case_condition: directly id: cc08d590-8b90-413a-aff6-31d1a99678d7 mitre: - attack.persistence - attack.execution - attack.t1059.001 - attack.t1086 severity: high title: Suspicious PrinterPorts Creation (CVE-2020-1048) sigma_fields: true description: Detects new commands that add new printer port which point to suspicious file<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd.exe /q /c chcp<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd.exe* /q /c chcp *"' pre_detector: case_condition: directly id: 5cddf373-ef00-4112-ad72-960ac29bac34 mitre: - attack.execution - attack.t1059.003 - attack.t1059 - attack.t1059.005 - attack.t1059.007 - attack.t1064 severity: high title: Koadic Execution sigma_fields: true description: Detects command line parameters used by Koadic hack tool<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd.exe /q /c "ch"cp<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd.exe* /q /c chcp *"' pre_detector: case_condition: directly id: 5cddf373-ef00-4112-ad72-960ac29bac34 mitre: - attack.execution - attack.t1059.003 - attack.t1059 - attack.t1059.005 - attack.t1059.007 - attack.t1064 severity: high title: Koadic Execution sigma_fields: true description: Detects command line parameters used by Koadic hack tool<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd.exe /q -c chcp<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd.exe* /q /c chcp *"' pre_detector: case_condition: directly id: 5cddf373-ef00-4112-ad72-960ac29bac34 mitre: - attack.execution - attack.t1059.003 - attack.t1059 - attack.t1059.005 - attack.t1059.007 - attack.t1064 severity: high title: Koadic Execution sigma_fields: true description: Detects command line parameters used by Koadic hack tool<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd /q /c chcp<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd.exe* /q /c chcp *"' pre_detector: case_condition: directly id: 5cddf373-ef00-4112-ad72-960ac29bac34 mitre: - attack.execution - attack.t1059.003 - attack.t1059 - attack.t1059.005 - attack.t1059.007 - attack.t1064 severity: high title: Koadic Execution sigma_fields: true description: Detects command line parameters used by Koadic hack tool<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>cmd.exe /q /c chcp<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*cmd.exe* /q /c chcp *"' pre_detector: case_condition: directly id: 5cddf373-ef00-4112-ad72-960ac29bac34 mitre: - attack.execution - attack.t1059.003 - attack.t1059 - attack.t1059.005 - attack.t1059.007 - attack.t1064 severity: high title: Koadic Execution sigma_fields: true description: Detects command line parameters used by Koadic hack tool<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>at.exe interactive<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\at.exe" AND process.command_line: "*interactive*"' pre_detector: case_condition: directly id: 60fc936d-2eb0-4543-8a13-911c750a1dfc mitre: - attack.privilege_escalation - attack.t1053.002 - attack.t1053 severity: high title: Interactive AT Job sigma_fields: true description: Detect an interactive AT job, which may be used as a form of privilege escalation<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>at.exe \"i\"\"n\"\"t\"\"e\"\"r\"\"a\"\"c\"\"t\"\"i\"\"v\"\"e\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\at.exe" AND process.command_line: "*interactive*"' pre_detector: case_condition: directly id: 60fc936d-2eb0-4543-8a13-911c750a1dfc mitre: - attack.privilege_escalation - attack.t1053.002 - attack.t1053 severity: high title: Interactive AT Job sigma_fields: true description: Detect an interactive AT job, which may be used as a form of privilege escalation<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>at interactive<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\at.exe" AND process.command_line: "*interactive*"' pre_detector: case_condition: directly id: 60fc936d-2eb0-4543-8a13-911c750a1dfc mitre: - attack.privilege_escalation - attack.t1053.002 - attack.t1053 severity: high title: Interactive AT Job sigma_fields: true description: Detect an interactive AT job, which may be used as a form of privilege escalation<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>at.exe interactive<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\at.exe" AND process.command_line: "*interactive*"' pre_detector: case_condition: directly id: 60fc936d-2eb0-4543-8a13-911c750a1dfc mitre: - attack.privilege_escalation - attack.t1053.002 - attack.t1053 severity: high title: Interactive AT Job sigma_fields: true description: Detect an interactive AT job, which may be used as a form of privilege escalation<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -e* PAA*" OR "*JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ*" OR "*QAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUA*" OR "*kAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlA*" OR "*IgAoACcAKgAnACkAOwAkA*" OR "*IAKAAnACoAJwApADsAJA*" OR "*iACgAJwAqACcAKQA7ACQA*" OR "*JABGAGwAeAByAGgAYwBmAGQ*")' pre_detector: case_condition: directly id: d02e8cf5-6099-48cf-9bfc-1eec2d0c7b18 mitre: - attack.execution - attack.t1059.001 - attack.t1086 - attack.defense_evasion - attack.t1027 severity: critical title: Emotet Process Creation sigma_fields: true description: Detects all Emotet like process executions that are not covered by the more generic rules<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -e* PAA*" OR "*JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ*" OR "*QAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUA*" OR "*kAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlA*" OR "*IgAoACcAKgAnACkAOwAkA*" OR "*IAKAAnACoAJwApADsAJA*" OR "*iACgAJwAqACcAKQA7ACQA*" OR "*JABGAGwAeAByAGgAYwBmAGQ*")' pre_detector: case_condition: directly id: d02e8cf5-6099-48cf-9bfc-1eec2d0c7b18 mitre: - attack.execution - attack.t1059.001 - attack.t1086 - attack.defense_evasion - attack.t1027 severity: critical title: Emotet Process Creation sigma_fields: true description: Detects all Emotet like process executions that are not covered by the more generic rules<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -e* PAA*" OR "*JABlAG4AdgA6AHUAcwBlAHIAcAByAG8AZgBpAGwAZQ*" OR "*QAZQBuAHYAOgB1AHMAZQByAHAAcgBvAGYAaQBsAGUA*" OR "*kAGUAbgB2ADoAdQBzAGUAcgBwAHIAbwBmAGkAbABlA*" OR "*IgAoACcAKgAnACkAOwAkA*" OR "*IAKAAnACoAJwApADsAJA*" OR "*iACgAJwAqACcAKQA7ACQA*" OR "*JABGAGwAeAByAGgAYwBmAGQ*")' pre_detector: case_condition: directly id: d02e8cf5-6099-48cf-9bfc-1eec2d0c7b18 mitre: - attack.execution - attack.t1059.001 - attack.t1086 - attack.defense_evasion - attack.t1027 severity: critical title: Emotet Process Creation sigma_fields: true description: Detects all Emotet like process executions that are not covered by the more generic rules<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>nltest.exe /domain_trusts /all_trusts<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\cmd.exe" AND process.executable: "*\nltest.exe" AND process.command_line: "*/domain_trusts /all_trusts*"' pre_detector: case_condition: directly id: 410ad193-a728-4107-bc79-4419789fcbf8 mitre: - attack.discovery - attack.t1482 severity: critical title: Trickbot Malware Recon Activity sigma_fields: true description: Trickbot enumerates domain/network topology and executes certain commands automatically every few minutes. This detectors attempts to identify that activity based off a command rarely observed in an enterprise network.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>nltest /domain_trusts /all_trusts<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\cmd.exe" AND process.executable: "*\nltest.exe" AND process.command_line: "*/domain_trusts /all_trusts*"' pre_detector: case_condition: directly id: 410ad193-a728-4107-bc79-4419789fcbf8 mitre: - attack.discovery - attack.t1482 severity: critical title: Trickbot Malware Recon Activity sigma_fields: true description: Trickbot enumerates domain/network topology and executes certain commands automatically every few minutes. This detectors attempts to identify that activity based off a command rarely observed in an enterprise network.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>nltest.exe /domain_trusts /all_trusts<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\cmd.exe" AND process.executable: "*\nltest.exe" AND process.command_line: "*/domain_trusts /all_trusts*"' pre_detector: case_condition: directly id: 410ad193-a728-4107-bc79-4419789fcbf8 mitre: - attack.discovery - attack.t1482 severity: critical title: Trickbot Malware Recon Activity sigma_fields: true description: Trickbot enumerates domain/network topology and executes certain commands automatically every few minutes. This detectors attempts to identify that activity based off a command rarely observed in an enterprise network.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh firewall add<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*netsh*" AND process.command_line: "*firewall add*"' pre_detector: case_condition: directly id: cd5cfd80-aa5f-44c0-9c20-108c4ae12e3c mitre: - attack.defense_evasion - attack.t1089 - attack.t1562.004 severity: medium title: Netsh Port or Application Allowed sigma_fields: true description: Allow Incoming Connections by Port or Application on Windows Firewall<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh firewall "a"dd<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*netsh*" AND process.command_line: "*firewall add*"' pre_detector: case_condition: directly id: cd5cfd80-aa5f-44c0-9c20-108c4ae12e3c mitre: - attack.defense_evasion - attack.t1089 - attack.t1562.004 severity: medium title: Netsh Port or Application Allowed sigma_fields: true description: Allow Incoming Connections by Port or Application on Windows Firewall<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh trace start<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*netsh*" AND process.command_line: "*trace*" AND process.command_line: "*start*"' pre_detector: case_condition: directly id: d3c3861d-c504-4c77-ba55-224ba82d0118 mitre: - attack.discovery - attack.credential_access - attack.t1040 severity: medium title: Capture a Network Trace with netsh.exe sigma_fields: true description: Detects capture a network trace via netsh.exe trace functionality<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh trace \"st\"art<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*netsh*" AND process.command_line: "*trace*" AND process.command_line: "*start*"' pre_detector: case_condition: directly id: d3c3861d-c504-4c77-ba55-224ba82d0118 mitre: - attack.discovery - attack.credential_access - attack.t1040 severity: medium title: Capture a Network Trace with netsh.exe sigma_fields: true description: Detects capture a network trace via netsh.exe trace functionality<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh start trace<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*netsh*" AND process.command_line: "*trace*" AND process.command_line: "*start*"' pre_detector: case_condition: directly id: d3c3861d-c504-4c77-ba55-224ba82d0118 mitre: - attack.discovery - attack.credential_access - attack.t1040 severity: medium title: Capture a Network Trace with netsh.exe sigma_fields: true description: Detects capture a network trace via netsh.exe trace functionality<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh interface portproxy add v4tov4<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "netsh interface portproxy add v4tov4 *"' pre_detector: case_condition: directly id: 322ed9ec-fcab-4f67-9a34-e7c6aef43614 mitre: - attack.lateral_movement - attack.defense_evasion - attack.command_and_control - attack.t1090 severity: medium title: Netsh Port Forwarding sigma_fields: true description: Detects netsh commands that configure a port forwarding<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh inte"rface" portproxy add v4tov4<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "netsh interface portproxy add v4tov4 *"' pre_detector: case_condition: directly id: 322ed9ec-fcab-4f67-9a34-e7c6aef43614 mitre: - attack.lateral_movement - attack.defense_evasion - attack.command_and_control - attack.t1090 severity: medium title: Netsh Port Forwarding sigma_fields: true description: Detects netsh commands that configure a port forwarding<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>netsh portproxy interface add v4tov4<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "netsh interface portproxy add v4tov4 *"' pre_detector: case_condition: directly id: 322ed9ec-fcab-4f67-9a34-e7c6aef43614 mitre: - attack.lateral_movement - attack.defense_evasion - attack.command_and_control - attack.t1090 severity: medium title: Netsh Port Forwarding sigma_fields: true description: Detects netsh commands that configure a port forwarding<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>tshark.exe \tshark.exe -i<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\tshark.exe" AND process.command_line: "*-i*") OR process.executable: "*\windump.exe"' pre_detector: case_condition: directly id: ba1f7802-adc7-48b4-9ecb-81e227fddfd5 mitre: - attack.credential_access - attack.discovery - attack.t1040 severity: low title: Network Sniffing sigma_fields: true description: Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>tshark.exe "\tshark.exe" "-i"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\tshark.exe" AND process.command_line: "*-i*") OR process.executable: "*\windump.exe"' pre_detector: case_condition: directly id: ba1f7802-adc7-48b4-9ecb-81e227fddfd5 mitre: - attack.credential_access - attack.discovery - attack.t1040 severity: low title: Network Sniffing sigma_fields: true description: Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>tshark.exe -i \tshark.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\tshark.exe" AND process.command_line: "*-i*") OR process.executable: "*\windump.exe"' pre_detector: case_condition: directly id: ba1f7802-adc7-48b4-9ecb-81e227fddfd5 mitre: - attack.credential_access - attack.discovery - attack.t1040 severity: low title: Network Sniffing sigma_fields: true description: Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection. An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net.exe view<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line: "*view*" AND NOT process.command_line: "*\\\\*"' pre_detector: case_condition: directly id: 62510e69-616b-4078-b371-847da438cc03 mitre: - attack.discovery - attack.t1018 severity: low title: Windows Network Enumeration sigma_fields: true description: Identifies attempts to enumerate hosts in a network using the built-in Windows net.exe tool.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net.exe vi"ew"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line: "*view*" AND NOT process.command_line: "*\\\\*"' pre_detector: case_condition: directly id: 62510e69-616b-4078-b371-847da438cc03 mitre: - attack.discovery - attack.t1018 severity: low title: Windows Network Enumeration sigma_fields: true description: Identifies attempts to enumerate hosts in a network using the built-in Windows net.exe tool.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net view<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line: "*view*" AND NOT process.command_line: "*\\\\*"' pre_detector: case_condition: directly id: 62510e69-616b-4078-b371-847da438cc03 mitre: - attack.discovery - attack.t1018 severity: low title: Windows Network Enumeration sigma_fields: true description: Identifies attempts to enumerate hosts in a network using the built-in Windows net.exe tool.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net.exe view<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line: "*view*" AND NOT process.command_line: "*\\\\*"' pre_detector: case_condition: directly id: 62510e69-616b-4078-b371-847da438cc03 mitre: - attack.discovery - attack.t1018 severity: low title: Windows Network Enumeration sigma_fields: true description: Identifies attempts to enumerate hosts in a network using the built-in Windows net.exe tool.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net.exe user add<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line: "*user*" AND process.command_line: "*add*"' pre_detector: case_condition: directly id: cd219ff3-fa99-45d4-8380-a7d15116c6dc mitre: - attack.persistence - attack.t1136 - attack.t1136.001 severity: medium title: Net.exe User Account Creation sigma_fields: true description: Identifies creation of local users via the net.exe command<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net user add<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line: "*user*" AND process.command_line: "*add*"' pre_detector: case_condition: directly id: cd219ff3-fa99-45d4-8380-a7d15116c6dc mitre: - attack.persistence - attack.t1136 - attack.t1136.001 severity: medium title: Net.exe User Account Creation sigma_fields: true description: Identifies creation of local users via the net.exe command<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>net.exe add user<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: ("*\net.exe" OR "*\net1.exe") AND process.command_line: "*user*" AND process.command_line: "*add*"' pre_detector: case_condition: directly id: cd219ff3-fa99-45d4-8380-a7d15116c6dc mitre: - attack.persistence - attack.t1136 - attack.t1136.001 severity: medium title: Net.exe User Account Creation sigma_fields: true description: Identifies creation of local users via the net.exe command<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe new-service<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\sc.exe" AND process.command_line: "*create*" AND process.command_line: "*binpath*") OR (process.executable: "*\powershell.exe" AND process.command_line: "*new-service*")' pre_detector: case_condition: directly id: 7fe71fc9-de3b-432a-8d57-8c809efc10ab mitre: - attack.persistence - attack.privilege_escalation - attack.t1050 - attack.t1543.003 severity: low title: New Service Creation sigma_fields: true description: Detects creation of a new service<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe new-s"ervice"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\sc.exe" AND process.command_line: "*create*" AND process.command_line: "*binpath*") OR (process.executable: "*\powershell.exe" AND process.command_line: "*new-service*")' pre_detector: case_condition: directly id: 7fe71fc9-de3b-432a-8d57-8c809efc10ab mitre: - attack.persistence - attack.privilege_escalation - attack.t1050 - attack.t1543.003 severity: low title: New Service Creation sigma_fields: true description: Detects creation of a new service<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell new-service<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\sc.exe" AND process.command_line: "*create*" AND process.command_line: "*binpath*") OR (process.executable: "*\powershell.exe" AND process.command_line: "*new-service*")' pre_detector: case_condition: directly id: 7fe71fc9-de3b-432a-8d57-8c809efc10ab mitre: - attack.persistence - attack.privilege_escalation - attack.t1050 - attack.t1543.003 severity: low title: New Service Creation sigma_fields: true description: Detects creation of a new service<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe new-service<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\sc.exe" AND process.command_line: "*create*" AND process.command_line: "*binpath*") OR (process.executable: "*\powershell.exe" AND process.command_line: "*new-service*")' pre_detector: case_condition: directly id: 7fe71fc9-de3b-432a-8d57-8c809efc10ab mitre: - attack.persistence - attack.privilege_escalation - attack.t1050 - attack.t1543.003 severity: low title: New Service Creation sigma_fields: true description: Detects creation of a new service<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\installutil.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*\msdt.exe*" OR "*\installutil.exe*" OR "*\regsvcs.exe*" OR "*\regasm.exe*" OR "*\msbuild.exe*" OR "*\ieexec.exe*")' pre_detector: case_condition: directly id: 82a19e3a-2bfe-4a91-8c0d-5d4c98fbb719 mitre: - attack.defense_evasion - attack.t1118 - attack.t1218.004 - attack.t1121 - attack.t1218.009 - attack.t1127 - attack.t1127.001 - attack.t1170 - attack.t1218.005 - attack.t1218 severity: low title: Possible Applocker Bypass sigma_fields: true description: Detects execution of executables that can be used to bypass Applocker whitelisting<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\"i""n""s""t""a""l""l""u""t""i""l"".""e""x""e"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*\msdt.exe*" OR "*\installutil.exe*" OR "*\regsvcs.exe*" OR "*\regasm.exe*" OR "*\msbuild.exe*" OR "*\ieexec.exe*")' pre_detector: case_condition: directly id: 82a19e3a-2bfe-4a91-8c0d-5d4c98fbb719 mitre: - attack.defense_evasion - attack.t1118 - attack.t1218.004 - attack.t1121 - attack.t1218.009 - attack.t1127 - attack.t1127.001 - attack.t1170 - attack.t1218.005 - attack.t1218 severity: low title: Possible Applocker Bypass sigma_fields: true description: Detects execution of executables that can be used to bypass Applocker whitelisting<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\installutil<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*\msdt.exe*" OR "*\installutil.exe*" OR "*\regsvcs.exe*" OR "*\regasm.exe*" OR "*\msbuild.exe*" OR "*\ieexec.exe*")' pre_detector: case_condition: directly id: 82a19e3a-2bfe-4a91-8c0d-5d4c98fbb719 mitre: - attack.defense_evasion - attack.t1118 - attack.t1218.004 - attack.t1121 - attack.t1218.009 - attack.t1127 - attack.t1127.001 - attack.t1170 - attack.t1218.005 - attack.t1218 severity: low title: Possible Applocker Bypass sigma_fields: true description: Detects execution of executables that can be used to bypass Applocker whitelisting<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>\installutil.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*\msdt.exe*" OR "*\installutil.exe*" OR "*\regsvcs.exe*" OR "*\regasm.exe*" OR "*\msbuild.exe*" OR "*\ieexec.exe*")' pre_detector: case_condition: directly id: 82a19e3a-2bfe-4a91-8c0d-5d4c98fbb719 mitre: - attack.defense_evasion - attack.t1118 - attack.t1218.004 - attack.t1121 - attack.t1218.009 - attack.t1127 - attack.t1127.001 - attack.t1170 - attack.t1218.005 - attack.t1218 severity: low title: Possible Applocker Bypass sigma_fields: true description: Detects execution of executables that can be used to bypass Applocker whitelisting<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>System.Management.Automation.AmsiUtils amsiInitFailed<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: "*System.Management.Automation.AmsiUtils*" AND process.command_line: "*amsiInitFailed*"' pre_detector: case_condition: directly id: 30edb182-aa75-42c0-b0a9-e998bb29067c mitre: - attack.defense_evasion - attack.t1089 - attack.t1562.001 severity: high title: Powershell AMSI Bypass via .NET Reflection sigma_fields: true description: Detects Request to amsiInitFailed that can be used to disable AMSI Scanning<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe Start-BitsTransfer<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.command_line: "*Start-BitsTransfer*"' pre_detector: case_condition: directly id: f67dbfce-93bc-440d-86ad-a95ae8858c90 mitre: - attack.defense_evasion - attack.persistence - attack.t1197 severity: medium title: Suspicious Bitsadmin Job via PowerShell sigma_fields: true description: Detect download by BITS jobs via PowerShell<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe Start-Bit"sTransfer"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.command_line: "*Start-BitsTransfer*"' pre_detector: case_condition: directly id: f67dbfce-93bc-440d-86ad-a95ae8858c90 mitre: - attack.defense_evasion - attack.persistence - attack.t1197 severity: medium title: Suspicious Bitsadmin Job via PowerShell sigma_fields: true description: Detect download by BITS jobs via PowerShell<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell Start-BitsTransfer<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.command_line: "*Start-BitsTransfer*"' pre_detector: case_condition: directly id: f67dbfce-93bc-440d-86ad-a95ae8858c90 mitre: - attack.defense_evasion - attack.persistence - attack.t1197 severity: medium title: Suspicious Bitsadmin Job via PowerShell sigma_fields: true description: Detect download by BITS jobs via PowerShell<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe Start-BitsTransfer<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\powershell.exe" AND process.command_line: "*Start-BitsTransfer*"' pre_detector: case_condition: directly id: f67dbfce-93bc-440d-86ad-a95ae8858c90 mitre: - attack.defense_evasion - attack.persistence - attack.t1197 severity: medium title: Suspicious Bitsadmin Job via PowerShell sigma_fields: true description: Detect download by BITS jobs via PowerShell<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe -version 2<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -version 2 *" OR "* -versio 2 *" OR "* -versi 2 *" OR "* -vers 2 *" OR "* -ver 2 *" OR "* -ve 2 *") AND process.executable: "*\powershell.exe"' pre_detector: case_condition: directly id: b3512211-c67e-4707-bedc-66efc7848863 mitre: - attack.defense_evasion - attack.execution - attack.t1086 - attack.t1059.001 severity: medium title: PowerShell Downgrade Attack sigma_fields: true description: Detects PowerShell downgrade attack by comparing the host versions with the actually used engine version 2.0<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe -version \"2\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -version 2 *" OR "* -versio 2 *" OR "* -versi 2 *" OR "* -vers 2 *" OR "* -ver 2 *" OR "* -ve 2 *") AND process.executable: "*\powershell.exe"' pre_detector: case_condition: directly id: b3512211-c67e-4707-bedc-66efc7848863 mitre: - attack.defense_evasion - attack.execution - attack.t1086 - attack.t1059.001 severity: medium title: PowerShell Downgrade Attack sigma_fields: true description: Detects PowerShell downgrade attack by comparing the host versions with the actually used engine version 2.0<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell -version 2<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -version 2 *" OR "* -versio 2 *" OR "* -versi 2 *" OR "* -vers 2 *" OR "* -ver 2 *" OR "* -ve 2 *") AND process.executable: "*\powershell.exe"' pre_detector: case_condition: directly id: b3512211-c67e-4707-bedc-66efc7848863 mitre: - attack.defense_evasion - attack.execution - attack.t1086 - attack.t1059.001 severity: medium title: PowerShell Downgrade Attack sigma_fields: true description: Detects PowerShell downgrade attack by comparing the host versions with the actually used engine version 2.0<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>powershell.exe 2 -version<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("* -version 2 *" OR "* -versio 2 *" OR "* -versi 2 *" OR "* -vers 2 *" OR "* -ver 2 *" OR "* -ve 2 *") AND process.executable: "*\powershell.exe"' pre_detector: case_condition: directly id: b3512211-c67e-4707-bedc-66efc7848863 mitre: - attack.defense_evasion - attack.execution - attack.t1086 - attack.t1059.001 severity: medium title: PowerShell Downgrade Attack sigma_fields: true description: Detects PowerShell downgrade attack by comparing the host versions with the actually used engine version 2.0<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Powershell.exe -windowstyle h<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\Powershell.exe" AND process.command_line: ("* -windowstyle h *" OR "* -windowstyl h*" OR "* -windowsty h*" OR "* -windowst h*" OR "* -windows h*" OR "* -windo h*" OR "* -wind h*" OR "* -win h*" OR "* -wi h*" OR "* -win h *" OR "* -win hi *" OR "* -win hid *" OR "* -win hidd *" OR "* -win hidde *" OR "* -NoPr *" OR "* -NoPro *" OR "* -NoProf *" OR "* -NoProfi *" OR "* -NoProfil *" OR "* -nonin *" OR "* -nonint *" OR "* -noninte *" OR "* -noninter *" OR "* -nonintera *" OR "* -noninterac *" OR "* -noninteract *" OR "* -noninteracti *" OR "* -noninteractiv *" OR "* -ec *" OR "* -encodedComman *" OR "* -encodedComma *" OR "* -encodedComm *" OR "* -encodedCom *" OR "* -encodedCo *" OR "* -encodedC *" OR "* -encoded *" OR "* -encode *" OR "* -encod *" OR "* -enco *" OR "* -en *")' pre_detector: case_condition: directly id: 36210e0d-5b19-485d-a087-c096088885f0 mitre: - attack.execution - attack.t1086 - attack.t1059.001 severity: high title: Suspicious PowerShell Parameter Substring sigma_fields: true description: Detects suspicious PowerShell invocation with a parameter substring<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Powershell.exe "-""w""i""n""d""o""w""s""t""y""l""e" h<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\Powershell.exe" AND process.command_line: ("* -windowstyle h *" OR "* -windowstyl h*" OR "* -windowsty h*" OR "* -windowst h*" OR "* -windows h*" OR "* -windo h*" OR "* -wind h*" OR "* -win h*" OR "* -wi h*" OR "* -win h *" OR "* -win hi *" OR "* -win hid *" OR "* -win hidd *" OR "* -win hidde *" OR "* -NoPr *" OR "* -NoPro *" OR "* -NoProf *" OR "* -NoProfi *" OR "* -NoProfil *" OR "* -nonin *" OR "* -nonint *" OR "* -noninte *" OR "* -noninter *" OR "* -nonintera *" OR "* -noninterac *" OR "* -noninteract *" OR "* -noninteracti *" OR "* -noninteractiv *" OR "* -ec *" OR "* -encodedComman *" OR "* -encodedComma *" OR "* -encodedComm *" OR "* -encodedCom *" OR "* -encodedCo *" OR "* -encodedC *" OR "* -encoded *" OR "* -encode *" OR "* -encod *" OR "* -enco *" OR "* -en *")' pre_detector: case_condition: directly id: 36210e0d-5b19-485d-a087-c096088885f0 mitre: - attack.execution - attack.t1086 - attack.t1059.001 severity: high title: Suspicious PowerShell Parameter Substring sigma_fields: true description: Detects suspicious PowerShell invocation with a parameter substring<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Powershell -windowstyle h<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\Powershell.exe" AND process.command_line: ("* -windowstyle h *" OR "* -windowstyl h*" OR "* -windowsty h*" OR "* -windowst h*" OR "* -windows h*" OR "* -windo h*" OR "* -wind h*" OR "* -win h*" OR "* -wi h*" OR "* -win h *" OR "* -win hi *" OR "* -win hid *" OR "* -win hidd *" OR "* -win hidde *" OR "* -NoPr *" OR "* -NoPro *" OR "* -NoProf *" OR "* -NoProfi *" OR "* -NoProfil *" OR "* -nonin *" OR "* -nonint *" OR "* -noninte *" OR "* -noninter *" OR "* -nonintera *" OR "* -noninterac *" OR "* -noninteract *" OR "* -noninteracti *" OR "* -noninteractiv *" OR "* -ec *" OR "* -encodedComman *" OR "* -encodedComma *" OR "* -encodedComm *" OR "* -encodedCom *" OR "* -encodedCo *" OR "* -encodedC *" OR "* -encoded *" OR "* -encode *" OR "* -encod *" OR "* -enco *" OR "* -en *")' pre_detector: case_condition: directly id: 36210e0d-5b19-485d-a087-c096088885f0 mitre: - attack.execution - attack.t1086 - attack.t1059.001 severity: high title: Suspicious PowerShell Parameter Substring sigma_fields: true description: Detects suspicious PowerShell invocation with a parameter substring<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>Powershell.exe h -windowstyle<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.executable: "*\Powershell.exe" AND process.command_line: ("* -windowstyle h *" OR "* -windowstyl h*" OR "* -windowsty h*" OR "* -windowst h*" OR "* -windows h*" OR "* -windo h*" OR "* -wind h*" OR "* -win h*" OR "* -wi h*" OR "* -win h *" OR "* -win hi *" OR "* -win hid *" OR "* -win hidd *" OR "* -win hidde *" OR "* -NoPr *" OR "* -NoPro *" OR "* -NoProf *" OR "* -NoProfi *" OR "* -NoProfil *" OR "* -nonin *" OR "* -nonint *" OR "* -noninte *" OR "* -noninter *" OR "* -nonintera *" OR "* -noninterac *" OR "* -noninteract *" OR "* -noninteracti *" OR "* -noninteractiv *" OR "* -ec *" OR "* -encodedComman *" OR "* -encodedComma *" OR "* -encodedComm *" OR "* -encodedCom *" OR "* -encodedCo *" OR "* -encodedC *" OR "* -encoded *" OR "* -encode *" OR "* -encod *" OR "* -enco *" OR "* -en *")' pre_detector: case_condition: directly id: 36210e0d-5b19-485d-a087-c096088885f0 mitre: - attack.execution - attack.t1086 - attack.t1059.001 severity: high title: Suspicious PowerShell Parameter Substring sigma_fields: true description: Detects suspicious PowerShell invocation with a parameter substring<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>schtasks /Create /SC Updater /TN Updater /TR powershell<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\powershell.exe" AND process.command_line: ("*schtasks*/Create*/SC *ONLOGON*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *DAILY*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *ONIDLE*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *Updater*/TN *Updater*/TR *powershell*")' pre_detector: case_condition: directly id: 56c217c3-2de2-479b-990f-5c109ba8458f mitre: - attack.execution - attack.persistence - attack.privilege_escalation - attack.t1053 - attack.t1086 - attack.s0111 - attack.g0022 - attack.g0060 - car.2013-08-001 - attack.t1053.005 - attack.t1059.001 severity: high title: Default PowerSploit and Empire Schtasks Persistence sigma_fields: true description: Detects the creation of a schtask via PowerSploit or Empire Default Configuration.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>schtasks /Create /SC Updater /TN Updater /TR power\"shell\"<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\powershell.exe" AND process.command_line: ("*schtasks*/Create*/SC *ONLOGON*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *DAILY*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *ONIDLE*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *Updater*/TN *Updater*/TR *powershell*")' pre_detector: case_condition: directly id: 56c217c3-2de2-479b-990f-5c109ba8458f mitre: - attack.execution - attack.persistence - attack.privilege_escalation - attack.t1053 - attack.t1086 - attack.s0111 - attack.g0022 - attack.g0060 - car.2013-08-001 - attack.t1053.005 - attack.t1059.001 severity: high title: Default PowerSploit and Empire Schtasks Persistence sigma_fields: true description: Detects the creation of a schtask via PowerSploit or Empire Default Configuration.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>schtasks /Create /SC Updater /TN Updater /TR powershell<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.parent.executable: "*\powershell.exe" AND process.command_line: ("*schtasks*/Create*/SC *ONLOGON*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *DAILY*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *ONIDLE*/TN *Updater*/TR *powershell*" OR "*schtasks*/Create*/SC *Updater*/TN *Updater*/TR *powershell*")' pre_detector: case_condition: directly id: 56c217c3-2de2-479b-990f-5c109ba8458f mitre: - attack.execution - attack.persistence - attack.privilege_escalation - attack.t1053 - attack.t1086 - attack.s0111 - attack.g0022 - attack.g0060 - car.2013-08-001 - attack.t1053.005 - attack.t1059.001 severity: high title: Default PowerSploit and Empire Schtasks Persistence sigma_fields: true description: Detects the creation of a schtask via PowerSploit or Empire Default Configuration.<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bitsadmin.exe /transfer copy bitsadmin.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\bitsadmin.exe" AND process.command_line: "* /transfer *") OR process.command_line: "*copy bitsadmin.exe*"' pre_detector: case_condition: directly id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede mitre: - attack.defense_evasion - attack.persistence - attack.t1197 - attack.s0190 - attack.t1036.003 severity: medium title: Bitsadmin Download sigma_fields: true description: Detects usage of bitsadmin downloading a file<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bitsadmin.exe /transfer "c""o""p""y" bitsadmin.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\bitsadmin.exe" AND process.command_line: "* /transfer *") OR process.command_line: "*copy bitsadmin.exe*"' pre_detector: case_condition: directly id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede mitre: - attack.defense_evasion - attack.persistence - attack.t1197 - attack.s0190 - attack.t1036.003 severity: medium title: Bitsadmin Download sigma_fields: true description: Detects usage of bitsadmin downloading a file<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bitsadmin.exe --transfer copy bitsadmin.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\bitsadmin.exe" AND process.command_line: "* /transfer *") OR process.command_line: "*copy bitsadmin.exe*"' pre_detector: case_condition: directly id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede mitre: - attack.defense_evasion - attack.persistence - attack.t1197 - attack.s0190 - attack.t1036.003 severity: medium title: Bitsadmin Download sigma_fields: true description: Detects usage of bitsadmin downloading a file<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bitsadmin /transfer copy bitsadmin<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\bitsadmin.exe" AND process.command_line: "* /transfer *") OR process.command_line: "*copy bitsadmin.exe*"' pre_detector: case_condition: directly id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede mitre: - attack.defense_evasion - attack.persistence - attack.t1197 - attack.s0190 - attack.t1036.003 severity: medium title: Bitsadmin Download sigma_fields: true description: Detects usage of bitsadmin downloading a file<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>bitsadmin.exe /transfer copy bitsadmin.exe<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: '(process.executable: "*\bitsadmin.exe" AND process.command_line: "* /transfer *") OR process.command_line: "*copy bitsadmin.exe*"' pre_detector: case_condition: directly id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede mitre: - attack.defense_evasion - attack.persistence - attack.t1197 - attack.s0190 - attack.t1036.003 severity: medium title: Bitsadmin Download sigma_fields: true description: Detects usage of bitsadmin downloading a file<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>comsvcs.dll,MiniDump<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*comsvcs.dll,#24*" OR "*comsvcs.dll,MiniDump*")' pre_detector: case_condition: directly id: 646ea171-dded-4578-8a4d-65e9822892e3 mitre: - attack.defense_evasion - attack.t1036 - attack.credential_access - attack.t1003 - car.2013-05-009 - attack.t1003.001 severity: high title: Process Dump via Rundll32 and Comsvcs.dll sigma_fields: true description: Detects a process memory dump performed via ordinal function 24 in comsvcs.dll<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>comsvcs.dll,MiniDump<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*comsvcs.dll,#24*" OR "*comsvcs.dll,MiniDump*")' pre_detector: case_condition: directly id: 646ea171-dded-4578-8a4d-65e9822892e3 mitre: - attack.defense_evasion - attack.t1036 - attack.credential_access - attack.t1003 - car.2013-05-009 - attack.t1003.001 severity: high title: Process Dump via Rundll32 and Comsvcs.dll sigma_fields: true description: Detects a process memory dump performed via ordinal function 24 in comsvcs.dll<|eot_id|>
<|begin_of_text|><|start_header_id|>system<|end_header_id|>Write Sigma rule to detect payload:<|eot_id|><|start_header_id|>user<|end_header_id|>comsvcs.dll,MiniDump<|eot_id|><|start_header_id|>assistant<|end_header_id|>filter: 'process.command_line: ("*comsvcs.dll,#24*" OR "*comsvcs.dll,MiniDump*")' pre_detector: case_condition: directly id: 646ea171-dded-4578-8a4d-65e9822892e3 mitre: - attack.defense_evasion - attack.t1036 - attack.credential_access - attack.t1003 - car.2013-05-009 - attack.t1003.001 severity: high title: Process Dump via Rundll32 and Comsvcs.dll sigma_fields: true description: Detects a process memory dump performed via ordinal function 24 in comsvcs.dll<|eot_id|>
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
64