Skip to content

teddy-ROxPin/TA_Sigma_Searches

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

80 Commits
 
 
 
 
 
 

Repository files navigation

TA_Sigma_Searches

A Splunk app that contains Florian Roth's Sigma rules converted to Splunk searches.

  • Up-to-date as of 2023-02-02 with Sigma commit: 6c153bf

Inspiration from TA-Sigma-Searches.

Currently includes the rules from: sigma/rules/windows/

  • builtin
  • powershell
  • process_creation
  • sysmon

The rules that were previously in the 'sysmon' folder seem to have spread throughout the following new folders, though some still remain in 'sysmon':

  • driver_load, file_event, image_load, network_connection, process_access, registry_event

For now, I'm treating them as if they were still in the 'sysmon' folder so the search name will still have the postfix '- sysmon'

Search Naming Convention: $SigmaTitle - $source

  • Examples:
    • builtin
      • Security Eventlog Cleared - builtin
    • powershell
      • Alternate PowerShell Hosts - powershell
    • process_creation
      • Application Whitelisting Bypass via Bginfo - winevent
      • Application Whitelisting Bypass via Bginfo - sysmon
    • sysmon
      • Executable in ADS - sysmon

Access the searches from 'Reports' within the app

  • default time of -24 hours

OR

via a savedsearch:

| savedsearch "Security Eventlog Cleared - builtin"

About

Sigma rules converted to Splunk savedsearches

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published