A Splunk app that contains Florian Roth's Sigma rules converted to Splunk searches.
- Up-to-date as of 2023-02-02 with Sigma commit: 6c153bf
Inspiration from TA-Sigma-Searches.
- builtin
- powershell
- process_creation
- sysmon
The rules that were previously in the 'sysmon' folder seem to have spread throughout the following new folders, though some still remain in 'sysmon':
- driver_load, file_event, image_load, network_connection, process_access, registry_event
For now, I'm treating them as if they were still in the 'sysmon' folder so the search name will still have the postfix '- sysmon'
- Examples:
- builtin
- Security Eventlog Cleared - builtin
- powershell
- Alternate PowerShell Hosts - powershell
- process_creation
- Application Whitelisting Bypass via Bginfo - winevent
- Application Whitelisting Bypass via Bginfo - sysmon
- sysmon
- Executable in ADS - sysmon
- builtin
- default time of -24 hours
| savedsearch "Security Eventlog Cleared - builtin"