Dataset Viewer
Auto-converted to Parquet Duplicate
prompt
stringlengths
317
6.78k
task_name
stringclasses
1 value
filepath
stringlengths
81
170
rule
stringlengths
163
6.62k
description
stringclasses
1 value
configuration
stringclasses
1 value
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule suspicious_command_line_contains_azure_tokencachedat_as_argument_via_cmdline { events: (re.regex($selection.target.process.command_line, `.*TokenCache\.dat.*`) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/cloud_security/sysmon/suspicious_command_line_contains_azure_tokencache_dat_as_argument__via_cmdline.yaral
rule suspicious_command_line_contains_azure_tokencachedat_as_argument_via_cmdline { events: (re.regex($selection.target.process.command_line, `.*TokenCache\.dat.*`) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule the_gocgle_malicious_campaign { events: (($selection.principal.hostname = "gocgle-analytics.net" or $selection.principal.hostname = "googlo-analytics.com" or $selection.principal.hostname = "gocgletagmanager.com" or $selection.principal.hostname = "googlc-analytics.com" or $selection.principal.hostname = "gocgle-analytics.cm" or $selection.principal.hostname = "gocgletagmanager.cm" or $selection.principal.hostname = "gocgle-analytics.com" or $selection.principal.hostname = "analytic.is" or $selection.principal.hostname = "qdtf54y6eu7i87t.ga") or ($selection.target.ip = "5.188.9.61" or $selection.target.ip = "5.188.9.33" or $selection.target.ip = "5.188.9.40" or $selection.target.ip = "194.180.224.112")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/cloud_security/proxy/the_gocgle_malicious_campaign.yaral
rule the_gocgle_malicious_campaign { events: (($selection.principal.hostname = "gocgle-analytics.net" or $selection.principal.hostname = "googlo-analytics.com" or $selection.principal.hostname = "gocgletagmanager.com" or $selection.principal.hostname = "googlc-analytics.com" or $selection.principal.hostname = "gocgle-analytics.cm" or $selection.principal.hostname = "gocgletagmanager.cm" or $selection.principal.hostname = "gocgle-analytics.com" or $selection.principal.hostname = "analytic.is" or $selection.principal.hostname = "qdtf54y6eu7i87t.ga") or ($selection.target.ip = "5.188.9.61" or $selection.target.ip = "5.188.9.33" or $selection.target.ip = "5.188.9.40" or $selection.target.ip = "194.180.224.112")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule mshta_spwaned_by_svchost_as_seen_in_lethalhta_sysmon { events: ($selection.metadata.product_event_type = "1" and re.regex($selection.principal.process.file.full_path, `.*\\svchost\.exe`) and re.regex($selection.target.process.command_line, `.*/mshta\.exe`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/mshta_spwaned_by_svchost_as_seen_in_lethalhta__sysmon.yaral
rule mshta_spwaned_by_svchost_as_seen_in_lethalhta_sysmon { events: ($selection.metadata.product_event_type = "1" and re.regex($selection.principal.process.file.full_path, `.*\\svchost\.exe`) and re.regex($selection.target.process.command_line, `.*/mshta\.exe`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule powershell_download_sysmon { events: ($selection.metadata.product_event_type = "1" and $selection.target.process.file.full_path = "powershell.exe" and (re.regex($selection.target.process.command_line, `.*DownloadFile.*`) or re.regex($selection.target.process.command_line, `.*invoke-webrequest.*`) or re.regex($selection.target.process.command_line, `.*iwr`))) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/powershell_download__sysmon.yaral
rule powershell_download_sysmon { events: ($selection.metadata.product_event_type = "1" and $selection.target.process.file.full_path = "powershell.exe" and (re.regex($selection.target.process.command_line, `.*DownloadFile.*`) or re.regex($selection.target.process.command_line, `.*invoke-webrequest.*`) or re.regex($selection.target.process.command_line, `.*iwr`))) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule olympic_destroyer_detector { events: (($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "9bc365a16c63f25dfddcbe11da042974" or $selection.target.file.md5 = "da93e6651c5ba3e3e96f4ae2dd763d94" or $selection.target.file.md5 = "6ccd8133f250d4babefbd66b898739b9" or $selection.target.file.md5 = "abe771f280cdea6e7eaf19a26b1a9488" or $selection.target.file.md5 = "b60da65b8d3627a89481efb23d59713a" or $selection.target.file.md5 = "b94bdb63f0703d32c20f4b2e5500dbbe" or $selection.target.file.md5 = "bb5e8733a940fedfb1ef6b0e0ec3635c" or $selection.target.file.md5 = "97ddc336d7d92b7db17d098ec2ee6092" or $selection.target.file.md5 = "1d0cf431e623b21aeae8f2b8414d2a73" or $selection.target.file.md5 = "0e7b32d23fbd6d62a593c234bafa2311" or $selection.target.file.md5 = "e2e102291d259f054625cc85318b7ef5" or $selection.target.file.md5 = "0c6ddc3a722b865cc2d1185e27cef9b8" or $selection.target.file.md5 = "54b06b05b6b92a8f2ff02fdf47baad0e" or $selection.target.file.md5 = "4247901eca6d87f5f3af7df8249ea825")) or ($selection.metadata.product_event_type = "13" and (re.regex($selection.target.registry.registry_key, `.*\\Software\\Policies\\Microsoft\\Windows\\PowerShell\\ScriptBlockLogging\\EnableScriptBlockLogging`) or re.regex($selection.target.registry.registry_key, `.*\\Software\\Policies\\Microsoft\\Windows\\PowerShell\\ScriptBlockLogging\\EnableScriptBlockInvocationLogging`)) and $selection.metadata.description = "0" and $selection.metadata.event_type = "SetValue")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/olympic_destroyer_detector.yaral
rule olympic_destroyer_detector { events: (($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "9bc365a16c63f25dfddcbe11da042974" or $selection.target.file.md5 = "da93e6651c5ba3e3e96f4ae2dd763d94" or $selection.target.file.md5 = "6ccd8133f250d4babefbd66b898739b9" or $selection.target.file.md5 = "abe771f280cdea6e7eaf19a26b1a9488" or $selection.target.file.md5 = "b60da65b8d3627a89481efb23d59713a" or $selection.target.file.md5 = "b94bdb63f0703d32c20f4b2e5500dbbe" or $selection.target.file.md5 = "bb5e8733a940fedfb1ef6b0e0ec3635c" or $selection.target.file.md5 = "97ddc336d7d92b7db17d098ec2ee6092" or $selection.target.file.md5 = "1d0cf431e623b21aeae8f2b8414d2a73" or $selection.target.file.md5 = "0e7b32d23fbd6d62a593c234bafa2311" or $selection.target.file.md5 = "e2e102291d259f054625cc85318b7ef5" or $selection.target.file.md5 = "0c6ddc3a722b865cc2d1185e27cef9b8" or $selection.target.file.md5 = "54b06b05b6b92a8f2ff02fdf47baad0e" or $selection.target.file.md5 = "4247901eca6d87f5f3af7df8249ea825")) or ($selection.metadata.product_event_type = "13" and (re.regex($selection.target.registry.registry_key, `.*\\Software\\Policies\\Microsoft\\Windows\\PowerShell\\ScriptBlockLogging\\EnableScriptBlockLogging`) or re.regex($selection.target.registry.registry_key, `.*\\Software\\Policies\\Microsoft\\Windows\\PowerShell\\ScriptBlockLogging\\EnableScriptBlockInvocationLogging`)) and $selection.metadata.description = "0" and $selection.metadata.event_type = "SetValue")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule usb_file_stealer_usbguard_detector_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "050EB7D20EE8EF1E1DAEE2F421E5BF648FB645DF" or $selection.target.file.md5 = "069A919B3BC8070BB2D71D3E1AD9F7642D8ECF0F" or $selection.target.file.md5 = "0D265E0BDA9DF83815759ABCA64938EC0FF65733" or $selection.target.file.md5 = "0D7DF910D0FB7B100F084BFB8DFA0A9F2371171A" or $selection.target.file.md5 = "2FF3F5DA2960BE95E50B751680F450896AD1ED67" or $selection.target.file.md5 = "3200ECC7503F184F72AB9DA1DC3E1F8D43DDFD48" or $selection.target.file.md5 = "46D256EF277328E803D2B15CA7C188267059949D" or $selection.target.file.md5 = "524EE1B7269D02F725E55254A015200BB472463A" or $selection.target.file.md5 = "53A0EFD3D448DA8E32CFDDA5848312D3CF802B06" or $selection.target.file.md5 = "6FC150A9CAFA75813E7473C687935E7E4A5DCE24" or $selection.target.file.md5 = "70559245303F99630A27CB47B328C20C9666F0BB" or $selection.target.file.md5 = "7D8044A5CBEFE3B016F2132A5750C30BB647E599" or $selection.target.file.md5 = "8FD919D531A7A80615517E1AC13C2D0F050AF20D" or $selection.target.file.md5 = "9D22421DA9696B535C708178C72323F64D31FC80" or $selection.target.file.md5 = "BFD2DFA3D6AF31DF4B9CC2F6B31B239ADF1CECA1" or $selection.target.file.md5 = "C08A6222B59A187F3CF27A7BAE4CACFACC97DDEE" or $selection.target.file.md5 = "C2F6A65E14605828880927B9BA3C386507BD8161" or $selection.target.file.md5 = "C562006D2FA53B15052A4B80C94B86355CCA7427" or $selection.target.file.md5 = "CB43058D9EBB517832DF7058641AEDF6B303E736" or $selection.target.file.md5 = "CC8A9C28E884FDA0E1B3F6CEAB12805FEA17D3C1" or $selection.target.file.md5 = "D3CC27CA772E30C6260C5A3B6309D27F08A295CD" or $selection.target.file.md5 = "E7A2DE3776BA7D939711E620C7D6AB25946C9881" or $selection.target.file.md5 = "EE6EFA7A6A85A1B2FA6351787A1612F060086320" or $selection.target.file.md5 = "EF0ABB3A0CD1E65B33C0F109DD18F156FC0F0CDE" or $selection.target.file.md5 = "F63BE193C8A0FBB430F3B88CC8194D755BAD9CD1")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/usb_file_stealer__usbguard__detector__sysmon.yaral
rule usb_file_stealer_usbguard_detector_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "050EB7D20EE8EF1E1DAEE2F421E5BF648FB645DF" or $selection.target.file.md5 = "069A919B3BC8070BB2D71D3E1AD9F7642D8ECF0F" or $selection.target.file.md5 = "0D265E0BDA9DF83815759ABCA64938EC0FF65733" or $selection.target.file.md5 = "0D7DF910D0FB7B100F084BFB8DFA0A9F2371171A" or $selection.target.file.md5 = "2FF3F5DA2960BE95E50B751680F450896AD1ED67" or $selection.target.file.md5 = "3200ECC7503F184F72AB9DA1DC3E1F8D43DDFD48" or $selection.target.file.md5 = "46D256EF277328E803D2B15CA7C188267059949D" or $selection.target.file.md5 = "524EE1B7269D02F725E55254A015200BB472463A" or $selection.target.file.md5 = "53A0EFD3D448DA8E32CFDDA5848312D3CF802B06" or $selection.target.file.md5 = "6FC150A9CAFA75813E7473C687935E7E4A5DCE24" or $selection.target.file.md5 = "70559245303F99630A27CB47B328C20C9666F0BB" or $selection.target.file.md5 = "7D8044A5CBEFE3B016F2132A5750C30BB647E599" or $selection.target.file.md5 = "8FD919D531A7A80615517E1AC13C2D0F050AF20D" or $selection.target.file.md5 = "9D22421DA9696B535C708178C72323F64D31FC80" or $selection.target.file.md5 = "BFD2DFA3D6AF31DF4B9CC2F6B31B239ADF1CECA1" or $selection.target.file.md5 = "C08A6222B59A187F3CF27A7BAE4CACFACC97DDEE" or $selection.target.file.md5 = "C2F6A65E14605828880927B9BA3C386507BD8161" or $selection.target.file.md5 = "C562006D2FA53B15052A4B80C94B86355CCA7427" or $selection.target.file.md5 = "CB43058D9EBB517832DF7058641AEDF6B303E736" or $selection.target.file.md5 = "CC8A9C28E884FDA0E1B3F6CEAB12805FEA17D3C1" or $selection.target.file.md5 = "D3CC27CA772E30C6260C5A3B6309D27F08A295CD" or $selection.target.file.md5 = "E7A2DE3776BA7D939711E620C7D6AB25946C9881" or $selection.target.file.md5 = "EE6EFA7A6A85A1B2FA6351787A1612F060086320" or $selection.target.file.md5 = "EF0ABB3A0CD1E65B33C0F109DD18F156FC0F0CDE" or $selection.target.file.md5 = "F63BE193C8A0FBB430F3B88CC8194D755BAD9CD1")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule zebrocy_tool_apt28_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "7768fd2812ceff05db8f969a7bed1de5615bfc5a" or $selection.target.file.md5 = "da70c54a8b9fd236793bb2ab3f8a50e6cd37e2df" or $selection.target.file.md5 = "a225d457c3396e647ffc710cd1edd4c74dc57152" or $selection.target.file.md5 = "a659a765536d2099ecbde988d6763028ff92752e" or $selection.target.file.md5 = "20954fe36388ae8b1174424c8e4996ea2689f747" or $selection.target.file.md5 = "e0d8829d2e76e9bb02e3b375981181ae02462c43" or $selection.target.file.md5 = "d697160aecf152a81a89a6b5a7d9e1b8b5e121724038c676157ac72f20364edc" or $selection.target.file.md5 = "cba5ab65a24be52214736bc1a5bc984953a9c15d0a3826d5b15e94036e5497df" or $selection.target.file.md5 = "25f0d1cbcc53d8cfd6d848e12895ce376fbbfaf279be591774b28f70852a4fd8" or $selection.target.file.md5 = "115fd8c619fa173622c7a1e84efdf6fed08a25d3ca3095404dcbd5ac3deb1f03" or $selection.target.file.md5 = "f27836430742c9e014e1b080d89c47e43db299c2e00d0c0801a2830b41b57bc1" or $selection.target.file.md5 = "5b5e80f63c04402d0b282e95e32155b2f86cf604a6837853ab467111d4ac15e2" or $selection.target.file.md5 = "dd7e69e14c88972ac173132b90b3f4bfb2d1faec15cca256a256dd3a12b6e75d" or $selection.target.file.md5 = "15a866c3c18046022a810aa97eaf2e20f942b8293b9cb6b4d5fb7746242c25b7" or $selection.target.file.md5 = "602d2901d55c2720f955503456ac2f68" or $selection.target.file.md5 = "47a026d93ae8e0cc292e8d7a71ddc89e" or $selection.target.file.md5 = "26b213343bac2b4c69a261a2f5c00e89" or $selection.target.file.md5 = "672f85ee2031c1ff6295b17058e30e07" or $selection.target.file.md5 = "e49728cee1fdbbb957f657361fba3c9f" or $selection.target.file.md5 = "02c46f30f4c68a442cf7e13bebe8d3f8" or $selection.target.file.md5 = "6bc5f53d4082f12dd83aca45bae81e64")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/zebrocy_tool_apt28__sysmon.yaral
rule zebrocy_tool_apt28_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "7768fd2812ceff05db8f969a7bed1de5615bfc5a" or $selection.target.file.md5 = "da70c54a8b9fd236793bb2ab3f8a50e6cd37e2df" or $selection.target.file.md5 = "a225d457c3396e647ffc710cd1edd4c74dc57152" or $selection.target.file.md5 = "a659a765536d2099ecbde988d6763028ff92752e" or $selection.target.file.md5 = "20954fe36388ae8b1174424c8e4996ea2689f747" or $selection.target.file.md5 = "e0d8829d2e76e9bb02e3b375981181ae02462c43" or $selection.target.file.md5 = "d697160aecf152a81a89a6b5a7d9e1b8b5e121724038c676157ac72f20364edc" or $selection.target.file.md5 = "cba5ab65a24be52214736bc1a5bc984953a9c15d0a3826d5b15e94036e5497df" or $selection.target.file.md5 = "25f0d1cbcc53d8cfd6d848e12895ce376fbbfaf279be591774b28f70852a4fd8" or $selection.target.file.md5 = "115fd8c619fa173622c7a1e84efdf6fed08a25d3ca3095404dcbd5ac3deb1f03" or $selection.target.file.md5 = "f27836430742c9e014e1b080d89c47e43db299c2e00d0c0801a2830b41b57bc1" or $selection.target.file.md5 = "5b5e80f63c04402d0b282e95e32155b2f86cf604a6837853ab467111d4ac15e2" or $selection.target.file.md5 = "dd7e69e14c88972ac173132b90b3f4bfb2d1faec15cca256a256dd3a12b6e75d" or $selection.target.file.md5 = "15a866c3c18046022a810aa97eaf2e20f942b8293b9cb6b4d5fb7746242c25b7" or $selection.target.file.md5 = "602d2901d55c2720f955503456ac2f68" or $selection.target.file.md5 = "47a026d93ae8e0cc292e8d7a71ddc89e" or $selection.target.file.md5 = "26b213343bac2b4c69a261a2f5c00e89" or $selection.target.file.md5 = "672f85ee2031c1ff6295b17058e30e07" or $selection.target.file.md5 = "e49728cee1fdbbb957f657361fba3c9f" or $selection.target.file.md5 = "02c46f30f4c68a442cf7e13bebe8d3f8" or $selection.target.file.md5 = "6bc5f53d4082f12dd83aca45bae81e64")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule schtask_creation_sysmon { events: ($selection.metadata.product_event_type = "1" and $selection.target.process.file.full_path = "schtask.exe") condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/schtask_creation__sysmon.yaral
rule schtask_creation_sysmon { events: ($selection.metadata.product_event_type = "1" and $selection.target.process.file.full_path = "schtask.exe") condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule bcdedit_off_sysmon { events: ($selection.metadata.product_event_type = "1" and $selection.target.process.file.full_path = "bcdedit.exe" and re.regex($selection.target.process.command_line, `.*off`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/bcdedit_off__sysmon.yaral
rule bcdedit_off_sysmon { events: ($selection.metadata.product_event_type = "1" and $selection.target.process.file.full_path = "bcdedit.exe" and re.regex($selection.target.process.command_line, `.*off`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule pony_malware_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "2fdc22d8926db1b04dc3d62ff6da72236cb1c052b23553b644c7f18ea8496d8a" or $selection.target.file.md5 = "6bfa353f905c0fc5ded87e7f35dc939e7b757ea3f2f8372f81f0ac40edadd619" or $selection.target.file.md5 = "3f5240c924074995651c4ccac15ddfd0070beff93625dcea9db118ab32bad61d" or $selection.target.file.md5 = "3cfd8919f095e048e0f24a41c2f132328f0d0efe19581b308d9d2d3ffad40c29" or $selection.target.file.md5 = "36baccd2a4fc4f683c839283123a75de61b01ce93205f4a34975263e9c66aaed" or $selection.target.file.md5 = "42d0990daba69fa5068a6910d0eac487f3d308ce7e28799a959dace8d84125d7" or $selection.target.file.md5 = "d214c89af1929af1171ac40999b14a4f6fbcfd13b88cade392853a2c61057122" or $selection.target.file.md5 = "c7ef89222d760fc915690e6394c61c84176e618f7c9508beca30aa9a0f1b1991" or $selection.target.file.md5 = "2c79954335b579309957c22b1b7976359fd067691626f8beb99779143edaa69" or $selection.target.file.md5 = "82d4b6676bbff17626aba1a65a9c6ec10ab036c101c8dc5e6e697693ec5a013f" or $selection.target.file.md5 = "5c46fb082a683144092793529a0d10b6")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/pony_malware__sysmon.yaral
rule pony_malware_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "2fdc22d8926db1b04dc3d62ff6da72236cb1c052b23553b644c7f18ea8496d8a" or $selection.target.file.md5 = "6bfa353f905c0fc5ded87e7f35dc939e7b757ea3f2f8372f81f0ac40edadd619" or $selection.target.file.md5 = "3f5240c924074995651c4ccac15ddfd0070beff93625dcea9db118ab32bad61d" or $selection.target.file.md5 = "3cfd8919f095e048e0f24a41c2f132328f0d0efe19581b308d9d2d3ffad40c29" or $selection.target.file.md5 = "36baccd2a4fc4f683c839283123a75de61b01ce93205f4a34975263e9c66aaed" or $selection.target.file.md5 = "42d0990daba69fa5068a6910d0eac487f3d308ce7e28799a959dace8d84125d7" or $selection.target.file.md5 = "d214c89af1929af1171ac40999b14a4f6fbcfd13b88cade392853a2c61057122" or $selection.target.file.md5 = "c7ef89222d760fc915690e6394c61c84176e618f7c9508beca30aa9a0f1b1991" or $selection.target.file.md5 = "2c79954335b579309957c22b1b7976359fd067691626f8beb99779143edaa69" or $selection.target.file.md5 = "82d4b6676bbff17626aba1a65a9c6ec10ab036c101c8dc5e6e697693ec5a013f" or $selection.target.file.md5 = "5c46fb082a683144092793529a0d10b6")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule ta505_group_targets_the_us_retail_industry_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "9206f08916ab6f9708d81a6cf2f916e2f606fd048a6b2355a39db97e258d0883" or $selection.target.file.md5 = "06c637ac62cab511c5c42e142855ba0447a1c8ac8ee4b0f1f8b00faa5310fe9f" or $selection.target.file.md5 = "609b0a416f9b16a6df9b967dc32cd739402af31566e019a8fb8abdf3cb573e30")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/ta505_group_targets_the_us_retail_industry__sysmon.yaral
rule ta505_group_targets_the_us_retail_industry_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "9206f08916ab6f9708d81a6cf2f916e2f606fd048a6b2355a39db97e258d0883" or $selection.target.file.md5 = "06c637ac62cab511c5c42e142855ba0447a1c8ac8ee4b0f1f8b00faa5310fe9f" or $selection.target.file.md5 = "609b0a416f9b16a6df9b967dc32cd739402af31566e019a8fb8abdf3cb573e30")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule ryuk_ransomware_detector_sysmon_behavior { events: ($selection1.metadata.product_event_type = "11" and (re.regex($selection1.target.file.full_path, `.*\.ryk`) or $selection1.target.file.full_path = "RyukReadMe.html")) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/ryuk_ransomware_detector__sysmon_behavior.yaral
rule ryuk_ransomware_detector_sysmon_behavior { events: ($selection1.metadata.product_event_type = "11" and (re.regex($selection1.target.file.full_path, `.*\.ryk`) or $selection1.target.file.full_path = "RyukReadMe.html")) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule netwalker_ransomware_detection { events: (re.regex($selection.target.process.file.full_path, `.*vssadmin\.exe`) and re.regex($selection.principal.process.file.full_path, `.*qeSw\.exe`) and $selection.target.process.command_line = "vssadmin.exe delete shadows /all /quiet") condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/netwalker_ransomware_detection.yaral
rule netwalker_ransomware_detection { events: (re.regex($selection.target.process.file.full_path, `.*vssadmin\.exe`) and re.regex($selection.principal.process.file.full_path, `.*qeSw\.exe`) and $selection.target.process.command_line = "vssadmin.exe delete shadows /all /quiet") condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule keylogger_detector_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "21921864D2F1AB2761C36031A2E1D2C00C9B304A" or $selection.target.file.md5 = "3C2D0615BEF6F88FED6E308D4F45B6133080C74F" or $selection.target.file.md5 = "91E8346910E0E6783ACFC4F2B9A745C81BD7573A")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/keylogger_detector__sysmon.yaral
rule keylogger_detector_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "21921864D2F1AB2761C36031A2E1D2C00C9B304A" or $selection.target.file.md5 = "3C2D0615BEF6F88FED6E308D4F45B6133080C74F" or $selection.target.file.md5 = "91E8346910E0E6783ACFC4F2B9A745C81BD7573A")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule hawkeye_keylogger_file_creation_and_create_process_detector_sysmon_behavior { events: (re.regex($selection1.target.process.file.full_path, `C:\\Windows\\Microsoft\.NET\\Framework.*\\vbc\.exe`) and (($selection1.metadata.product_event_type = "11" and re.regex($selection1.target.file.full_path, `C:\\Users.*\\AppData\\Local\\Temp.*\.tmp`)) or ($selection1.metadata.product_event_type = "1" and re.regex($selection1.target.process.command_line, `.* /stext \"\"C:\\Users.*\\AppData\\Local\\Temp.*\.tmp`)))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/hawkeye_keylogger_file_creation_and_create_process_detector__sysmon_behavior.yaral
rule hawkeye_keylogger_file_creation_and_create_process_detector_sysmon_behavior { events: (re.regex($selection1.target.process.file.full_path, `C:\\Windows\\Microsoft\.NET\\Framework.*\\vbc\.exe`) and (($selection1.metadata.product_event_type = "11" and re.regex($selection1.target.file.full_path, `C:\\Users.*\\AppData\\Local\\Temp.*\.tmp`)) or ($selection1.metadata.product_event_type = "1" and re.regex($selection1.target.process.command_line, `.* /stext \"\"C:\\Users.*\\AppData\\Local\\Temp.*\.tmp`)))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule kingminer_cryptojacker_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "dea32433519c4628deeac802c0f1435a1b0d27d89f1ae5c1729ec7223f9eb04d" or $selection.target.file.md5 = "147d572d7f6664c8adf42ef92e4dbad06c5d21cc820a20163d814c77136cfbab" or $selection.target.file.md5 = "122b7906a359deb22bf777c602ac2619ca5ea156c4937dcdf96583210677db52" or $selection.target.file.md5 = "c5894d2afc946c064f8c2b58791fe64b48e26f0da5bdcc6ef9ba147f334f43f9" or $selection.target.file.md5 = "e61fbe58c28720ac4c0a1822d5da9a622a24f352d34e6c1cf5f704dbdd9b9b34" or $selection.target.file.md5 = "2b54329a13c4f79bea3886a21a7ba5fe19c4418596b774893fdef020e03ed07d" or $selection.target.file.md5 = "f128a63c107c3006ebf448d6ec743d11eb491ecb508e4ce63ba084f9792c25da" or $selection.target.file.md5 = "7357bdf70d042f246de1f830de783499d75e61388eed93d9ce74180ce06524d0" or $selection.target.file.md5 = "956a1231726503d840794af61fb6ac9bc326296597eff1c8da636f84e3c32874" or $selection.target.file.md5 = "8fa8cdb771d7c66406a7116e9c09ed18030afb1f94430c807782274f3847cb92" or $selection.target.file.md5 = "a3598d3301630ba64aa7663980296b59df243f5f17ed1b4fd56dcbcab599231c")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/kingminer_cryptojacker__sysmon.yaral
rule kingminer_cryptojacker_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "dea32433519c4628deeac802c0f1435a1b0d27d89f1ae5c1729ec7223f9eb04d" or $selection.target.file.md5 = "147d572d7f6664c8adf42ef92e4dbad06c5d21cc820a20163d814c77136cfbab" or $selection.target.file.md5 = "122b7906a359deb22bf777c602ac2619ca5ea156c4937dcdf96583210677db52" or $selection.target.file.md5 = "c5894d2afc946c064f8c2b58791fe64b48e26f0da5bdcc6ef9ba147f334f43f9" or $selection.target.file.md5 = "e61fbe58c28720ac4c0a1822d5da9a622a24f352d34e6c1cf5f704dbdd9b9b34" or $selection.target.file.md5 = "2b54329a13c4f79bea3886a21a7ba5fe19c4418596b774893fdef020e03ed07d" or $selection.target.file.md5 = "f128a63c107c3006ebf448d6ec743d11eb491ecb508e4ce63ba084f9792c25da" or $selection.target.file.md5 = "7357bdf70d042f246de1f830de783499d75e61388eed93d9ce74180ce06524d0" or $selection.target.file.md5 = "956a1231726503d840794af61fb6ac9bc326296597eff1c8da636f84e3c32874" or $selection.target.file.md5 = "8fa8cdb771d7c66406a7116e9c09ed18030afb1f94430c807782274f3847cb92" or $selection.target.file.md5 = "a3598d3301630ba64aa7663980296b59df243f5f17ed1b4fd56dcbcab599231c")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule turla_backdoor_sysmon { events: ($selection_hashes.metadata.product_event_type = "1" and ($selection_hashes.target.file.md5 = "fd898c5a4cd57c3e9cef41f6fd4f71a7" or $selection_hashes.target.file.md5 = "9dab3dd7b7e7f4980397da908fbc9ff7" or $selection_hashes.target.file.md5 = "3eb5f44492ce1147790450d950954a52")) condition: $selection_hashes } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/turla_backdoor__sysmon.yaral
rule turla_backdoor_sysmon { events: ($selection_hashes.metadata.product_event_type = "1" and ($selection_hashes.target.file.md5 = "fd898c5a4cd57c3e9cef41f6fd4f71a7" or $selection_hashes.target.file.md5 = "9dab3dd7b7e7f4980397da908fbc9ff7" or $selection_hashes.target.file.md5 = "3eb5f44492ce1147790450d950954a52")) condition: $selection_hashes }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule hworm_and_njrat_ratbackdoor_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "00df326eee18617fae2fdd3684ac1546" or $selection.target.file.md5 = "1488cdc5c5c9c87b4e0dae27ba3511cb" or $selection.target.file.md5 = "4543daa6936dde54dda8782b89d5daf1" or $selection.target.file.md5 = "80b1f909d1217313c14ea6d4d0b003dc" or $selection.target.file.md5 = "81c153256efd9161f4d89fe5fd7015bc" or $selection.target.file.md5 = "c6b53fc46427527a0739e6b6443ef72d" or $selection.target.file.md5 = "9e273220eb71f849ea99b923cbc1fae3" or $selection.target.file.md5 = "43309710ab8f87dc5d9842a5bca85f80" or $selection.target.file.md5 = "a40faab2f3f546aeb29aaefcb0f751d8" or $selection.target.file.md5 = "617a128b44671ac88df0b7180d9d0135" or $selection.target.file.md5 = "ae5c8ad09954a56f348a3b72ed824363" or $selection.target.file.md5 = "da3e2eeffd78d8c5ef472b8a09e9d325" or $selection.target.file.md5 = "0de41aef336f40a07ed6984db61b52ab" or $selection.target.file.md5 = "e081a42d6e09a3fcf049a33b2ecf0412" or $selection.target.file.md5 = "361c9d44809f788b92023b762e363449" or $selection.target.file.md5 = "c46a631f0bc82d8c2d46e9d8634cc50242987fa7749cac097439298d1d0c1d6e" or $selection.target.file.md5 = "25bc108a683d25a77efcac89b45f0478d9ddd281a9a2fb1f55fc6992a93aa830" or $selection.target.file.md5 = "b957911d7d5865e91851ab402189ae86" or $selection.target.file.md5 = "0ab40f5c7d9151742ec29d53fb224ad8")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/hworm_and_njrat_rat_backdoor__sysmon.yaral
rule hworm_and_njrat_ratbackdoor_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "00df326eee18617fae2fdd3684ac1546" or $selection.target.file.md5 = "1488cdc5c5c9c87b4e0dae27ba3511cb" or $selection.target.file.md5 = "4543daa6936dde54dda8782b89d5daf1" or $selection.target.file.md5 = "80b1f909d1217313c14ea6d4d0b003dc" or $selection.target.file.md5 = "81c153256efd9161f4d89fe5fd7015bc" or $selection.target.file.md5 = "c6b53fc46427527a0739e6b6443ef72d" or $selection.target.file.md5 = "9e273220eb71f849ea99b923cbc1fae3" or $selection.target.file.md5 = "43309710ab8f87dc5d9842a5bca85f80" or $selection.target.file.md5 = "a40faab2f3f546aeb29aaefcb0f751d8" or $selection.target.file.md5 = "617a128b44671ac88df0b7180d9d0135" or $selection.target.file.md5 = "ae5c8ad09954a56f348a3b72ed824363" or $selection.target.file.md5 = "da3e2eeffd78d8c5ef472b8a09e9d325" or $selection.target.file.md5 = "0de41aef336f40a07ed6984db61b52ab" or $selection.target.file.md5 = "e081a42d6e09a3fcf049a33b2ecf0412" or $selection.target.file.md5 = "361c9d44809f788b92023b762e363449" or $selection.target.file.md5 = "c46a631f0bc82d8c2d46e9d8634cc50242987fa7749cac097439298d1d0c1d6e" or $selection.target.file.md5 = "25bc108a683d25a77efcac89b45f0478d9ddd281a9a2fb1f55fc6992a93aa830" or $selection.target.file.md5 = "b957911d7d5865e91851ab402189ae86" or $selection.target.file.md5 = "0ab40f5c7d9151742ec29d53fb224ad8")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule quasar_rat_detector_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "0A4915B81D9A9ACF4E19181DEEEBBE244430C16B" or $selection.target.file.md5 = "323160C88A254127D9ADB2848AE044AFFF376A4D" or $selection.target.file.md5 = "395166835495B418773C9690227779D592F94F71" or $selection.target.file.md5 = "3EE410DD50FC64F39DFF0C4EE8CC676F0F7D5A74" or $selection.target.file.md5 = "5B665152F6596D4412267F9C490878455BA235F9" or $selection.target.file.md5 = "5FE8558EB8A3C244BE2DA8BE750221B9A9EE8539" or $selection.target.file.md5 = "61CB5E535F0AC90A1F904EC9937298F50E2B4974" or $selection.target.file.md5 = "6A1CD05F07B1024287CEA400237E1EA9D2FE1678" or $selection.target.file.md5 = "7676AFF05A3550E5BBFF78CF4D10C9E094447D72" or $selection.target.file.md5 = "86165F464EC1912A43445D80559D65C165E2CF76" or $selection.target.file.md5 = "AB3CD05BE6B0BA8567B84D10EDE28ABF87E115AC" or $selection.target.file.md5 = "BFD7158E1C2F6BA525E24F85ED8CCF8EF40FD370" or $selection.target.file.md5 = "CFEBEFC92DCDF1687FD0BC1B50457EBDEA8672A2" or $selection.target.file.md5 = "D21B8514990B0CEAC5EAE687DEAA60B447139B9D")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/quasar_rat_detector__sysmon.yaral
rule quasar_rat_detector_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "0A4915B81D9A9ACF4E19181DEEEBBE244430C16B" or $selection.target.file.md5 = "323160C88A254127D9ADB2848AE044AFFF376A4D" or $selection.target.file.md5 = "395166835495B418773C9690227779D592F94F71" or $selection.target.file.md5 = "3EE410DD50FC64F39DFF0C4EE8CC676F0F7D5A74" or $selection.target.file.md5 = "5B665152F6596D4412267F9C490878455BA235F9" or $selection.target.file.md5 = "5FE8558EB8A3C244BE2DA8BE750221B9A9EE8539" or $selection.target.file.md5 = "61CB5E535F0AC90A1F904EC9937298F50E2B4974" or $selection.target.file.md5 = "6A1CD05F07B1024287CEA400237E1EA9D2FE1678" or $selection.target.file.md5 = "7676AFF05A3550E5BBFF78CF4D10C9E094447D72" or $selection.target.file.md5 = "86165F464EC1912A43445D80559D65C165E2CF76" or $selection.target.file.md5 = "AB3CD05BE6B0BA8567B84D10EDE28ABF87E115AC" or $selection.target.file.md5 = "BFD7158E1C2F6BA525E24F85ED8CCF8EF40FD370" or $selection.target.file.md5 = "CFEBEFC92DCDF1687FD0BC1B50457EBDEA8672A2" or $selection.target.file.md5 = "D21B8514990B0CEAC5EAE687DEAA60B447139B9D")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule schtask_from_user_profile_sysmon { events: ($selection.metadata.product_event_type = "1" and (re.regex($selection.target.process.file.full_path, `.*schtask\.exe`) or re.regex($selection.target.process.file.full_path, `.*schtasks\.exe`)) and re.regex($selection.target.process.command_line, `.*\\appdata.*`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/schtask_from_user_profile__sysmon.yaral
rule schtask_from_user_profile_sysmon { events: ($selection.metadata.product_event_type = "1" and (re.regex($selection.target.process.file.full_path, `.*schtask\.exe`) or re.regex($selection.target.process.file.full_path, `.*schtasks\.exe`)) and re.regex($selection.target.process.command_line, `.*\\appdata.*`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule wsfjsejsvbavbe_file_execution_sysmon { events: ($selection.metadata.product_event_type = "1" and (re.regex($selection.target.process.file.full_path, `.*wscript\.exe`) or re.regex($selection.target.process.file.full_path, `.*cscript\.exe`)) and (re.regex($selection.target.process.command_line, `.*\.jse.*`) or re.regex($selection.target.process.command_line, `.*\.vbe.*`) or re.regex($selection.target.process.command_line, `.*\.js.*`) or re.regex($selection.target.process.command_line, `.*\.vba.*`))) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/wsf_jse_js_vba_vbe_file_execution__sysmon.yaral
rule wsfjsejsvbavbe_file_execution_sysmon { events: ($selection.metadata.product_event_type = "1" and (re.regex($selection.target.process.file.full_path, `.*wscript\.exe`) or re.regex($selection.target.process.file.full_path, `.*cscript\.exe`)) and (re.regex($selection.target.process.command_line, `.*\.jse.*`) or re.regex($selection.target.process.command_line, `.*\.vbe.*`) or re.regex($selection.target.process.command_line, `.*\.js.*`) or re.regex($selection.target.process.command_line, `.*\.vba.*`))) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule net_ipc_share_sysmon { events: ($selection.metadata.product_event_type = "1" and $selection.target.process.file.full_path = "net.exe" and re.regex($selection.target.process.command_line, `.*ipc$.*`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/net_ipc_share__sysmon.yaral
rule net_ipc_share_sysmon { events: ($selection.metadata.product_event_type = "1" and $selection.target.process.file.full_path = "net.exe" and re.regex($selection.target.process.command_line, `.*ipc$.*`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule vermin_backdoor_detector_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "028EBDBEBAC7239B41A1F4CE8D2CC61B1E09983B" or $selection.target.file.md5 = "07E1AF6D3F7B42D2E26DF12A217DEBACEDB8B1B9" or $selection.target.file.md5 = "09457ACB28C754AA419AB6A7E8B1940201EF3FFE" or $selection.target.file.md5 = "0EEE92EC2723ED9623F84082DAD962778F4CF776" or $selection.target.file.md5 = "10128AB8770FBDECD81B8894208A760A3C266D78" or $selection.target.file.md5 = "131F99A2E18A358B60F09FD61EE312E74B02C07C" or $selection.target.file.md5 = "14F69C7BFAF1DF16E755CCF754017089238B0E7B" or $selection.target.file.md5 = "1509F85DE302BE83A47D5AFAD9BEE2542BA317FC" or $selection.target.file.md5 = "170CEE6523B6620124F52201D943D7D9CA7B95E5" or $selection.target.file.md5 = "191159F855A0E580290871C945245E3597A5F25C" or $selection.target.file.md5 = "1F12C32A41D82E978DE333CD4E93FDAA1396BE94" or $selection.target.file.md5 = "22B17966B597568DB46B94B253CD37CBCF561321" or $selection.target.file.md5 = "2C7332D8247376842BD1B1BD5298844307649C99" or $selection.target.file.md5 = "2E08BA5DF30C0718C1733A7836B5F4D98D84905E" or $selection.target.file.md5 = "2EDF808F8252A4CBCB92F47A0AEDC1AAAE79A777" or $selection.target.file.md5 = "360F54B33AC960EE29CA0557A28F6BB8417EF409" or $selection.target.file.md5 = "431FCE6A47D0A48A57F699AA084C9FF175A9D15F" or $selection.target.file.md5 = "45438834FDC5C690DA3BC1F60722BE86B871280D" or $selection.target.file.md5 = "4A8A8188E3A7A137651B24780DF37CB6F610CC19" or $selection.target.file.md5 = "4C1E4E136B7922F9E28D1B38E9760E28929E4F0B" or $selection.target.file.md5 = "5B6EA57FFC09593C3B65D903368EA5F7FAA2EB68" or $selection.target.file.md5 = "61D366939FE36861B2FECB38A4DFF6D86C925A00" or $selection.target.file.md5 = "6A72366D8AE09F72F0466FB59E8ED372F8B460D7" or $selection.target.file.md5 = "6FECA622B0FB282064F7DE42BA472A8EC908D0D6" or $selection.target.file.md5 = "70A772485C5ED330C6876FA901BA722CD44CA05E" or $selection.target.file.md5 = "70D97367A3DBD5D45482B6AF8C78C58B64D3F3B3" or $selection.target.file.md5 = "7803FD9753930522705F2B6B4E73622887892C28" or $selection.target.file.md5 = "7B11A84B18DC4B5F1F2826E7925F0B2DC1B936AE" or $selection.target.file.md5 = "889FD0BEB3197DDD6C88F5C40D6B8E4D74A892CE" or $selection.target.file.md5 = "9B6FBABFA2A77FA633F7A2EB352979D5C68CEBC6" or $selection.target.file.md5 = "A451291F17489E3A59F440A1B693D691B053C531" or $selection.target.file.md5 = "A53D77E55A06CF131D670339BACEC5AC0F0C6D66" or $selection.target.file.md5 = "A925D0AFB5D4F5FAC65543C993BE4172F1DBF329" or $selection.target.file.md5 = "B5F81C804E47B76C74C38DF03A5CBE8A4FE69A9A" or $selection.target.file.md5 = "B99DE55043099E9506B304660B8E1374787AB195" or $selection.target.file.md5 = "C00C104FC3E9F5977D11C67EF0C8C671D4DFC412" or $selection.target.file.md5 = "CA0296FA9F48E83EA3F26988401B3F4C4E655F7A" or $selection.target.file.md5 = "D4C6540E789BD3839D65E7EDA5CCA8832493649E" or $selection.target.file.md5 = "D5EDE1BBB9A12757E24BE283AFC8D746ADC4A0D4" or $selection.target.file.md5 = "DEFBFD98C74BEFF839EEB189F0F6C385AD6BA19B" or $selection.target.file.md5 = "ECF152EB6417A069573F2C7D9A35B9CC31EC8F56" or $selection.target.file.md5 = "EE2D40825C77C8DFEF67999F0C521919E6672A10" or $selection.target.file.md5 = "EF09AC6BA08A116F2C4080CBEE8CEF9523E21265" or $selection.target.file.md5 = "F414C49CF502D1B6CC46E08F3AC97D7846B30732")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/vermin_backdoor_detector__sysmon.yaral
rule vermin_backdoor_detector_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "028EBDBEBAC7239B41A1F4CE8D2CC61B1E09983B" or $selection.target.file.md5 = "07E1AF6D3F7B42D2E26DF12A217DEBACEDB8B1B9" or $selection.target.file.md5 = "09457ACB28C754AA419AB6A7E8B1940201EF3FFE" or $selection.target.file.md5 = "0EEE92EC2723ED9623F84082DAD962778F4CF776" or $selection.target.file.md5 = "10128AB8770FBDECD81B8894208A760A3C266D78" or $selection.target.file.md5 = "131F99A2E18A358B60F09FD61EE312E74B02C07C" or $selection.target.file.md5 = "14F69C7BFAF1DF16E755CCF754017089238B0E7B" or $selection.target.file.md5 = "1509F85DE302BE83A47D5AFAD9BEE2542BA317FC" or $selection.target.file.md5 = "170CEE6523B6620124F52201D943D7D9CA7B95E5" or $selection.target.file.md5 = "191159F855A0E580290871C945245E3597A5F25C" or $selection.target.file.md5 = "1F12C32A41D82E978DE333CD4E93FDAA1396BE94" or $selection.target.file.md5 = "22B17966B597568DB46B94B253CD37CBCF561321" or $selection.target.file.md5 = "2C7332D8247376842BD1B1BD5298844307649C99" or $selection.target.file.md5 = "2E08BA5DF30C0718C1733A7836B5F4D98D84905E" or $selection.target.file.md5 = "2EDF808F8252A4CBCB92F47A0AEDC1AAAE79A777" or $selection.target.file.md5 = "360F54B33AC960EE29CA0557A28F6BB8417EF409" or $selection.target.file.md5 = "431FCE6A47D0A48A57F699AA084C9FF175A9D15F" or $selection.target.file.md5 = "45438834FDC5C690DA3BC1F60722BE86B871280D" or $selection.target.file.md5 = "4A8A8188E3A7A137651B24780DF37CB6F610CC19" or $selection.target.file.md5 = "4C1E4E136B7922F9E28D1B38E9760E28929E4F0B" or $selection.target.file.md5 = "5B6EA57FFC09593C3B65D903368EA5F7FAA2EB68" or $selection.target.file.md5 = "61D366939FE36861B2FECB38A4DFF6D86C925A00" or $selection.target.file.md5 = "6A72366D8AE09F72F0466FB59E8ED372F8B460D7" or $selection.target.file.md5 = "6FECA622B0FB282064F7DE42BA472A8EC908D0D6" or $selection.target.file.md5 = "70A772485C5ED330C6876FA901BA722CD44CA05E" or $selection.target.file.md5 = "70D97367A3DBD5D45482B6AF8C78C58B64D3F3B3" or $selection.target.file.md5 = "7803FD9753930522705F2B6B4E73622887892C28" or $selection.target.file.md5 = "7B11A84B18DC4B5F1F2826E7925F0B2DC1B936AE" or $selection.target.file.md5 = "889FD0BEB3197DDD6C88F5C40D6B8E4D74A892CE" or $selection.target.file.md5 = "9B6FBABFA2A77FA633F7A2EB352979D5C68CEBC6" or $selection.target.file.md5 = "A451291F17489E3A59F440A1B693D691B053C531" or $selection.target.file.md5 = "A53D77E55A06CF131D670339BACEC5AC0F0C6D66" or $selection.target.file.md5 = "A925D0AFB5D4F5FAC65543C993BE4172F1DBF329" or $selection.target.file.md5 = "B5F81C804E47B76C74C38DF03A5CBE8A4FE69A9A" or $selection.target.file.md5 = "B99DE55043099E9506B304660B8E1374787AB195" or $selection.target.file.md5 = "C00C104FC3E9F5977D11C67EF0C8C671D4DFC412" or $selection.target.file.md5 = "CA0296FA9F48E83EA3F26988401B3F4C4E655F7A" or $selection.target.file.md5 = "D4C6540E789BD3839D65E7EDA5CCA8832493649E" or $selection.target.file.md5 = "D5EDE1BBB9A12757E24BE283AFC8D746ADC4A0D4" or $selection.target.file.md5 = "DEFBFD98C74BEFF839EEB189F0F6C385AD6BA19B" or $selection.target.file.md5 = "ECF152EB6417A069573F2C7D9A35B9CC31EC8F56" or $selection.target.file.md5 = "EE2D40825C77C8DFEF67999F0C521919E6672A10" or $selection.target.file.md5 = "EF09AC6BA08A116F2C4080CBEE8CEF9523E21265" or $selection.target.file.md5 = "F414C49CF502D1B6CC46E08F3AC97D7846B30732")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule zombieboy_cryptomining_worm_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "049fc01447f15e02fff88a2b10f1518c8489e97b2c26006b4962ff5005e460dc" or $selection.target.file.md5 = "22f105dc2e2574ba3ea2ac4152391ce3bbaaa415a9660c251638281bbc5e8f33" or $selection.target.file.md5 = "2628242abba9b99baf26dadc071739fed2559bb7251d69ab81edc404d4bae602" or $selection.target.file.md5 = "27c5e2f35a5fb9272c3ed7c746927ce8c61b3ce02fed7551129dc2a32bf20773" or $selection.target.file.md5 = "27d4684511314ef9631e162e1bdc5170185689abf16f7f28ba5ae397ba601197" or $selection.target.file.md5 = "38d7d4f6a712bff4ab212848802f5f9c" or $selection.target.file.md5 = "5d33434111ee36d754155c1d236e65aa78eaa605587715a5931b1c1ed3a54745" or $selection.target.file.md5 = "5ea00496a4073982855f81e463a887d6a8ef263c87bb203161e2db3f50cfc8c0" or $selection.target.file.md5 = "65cd6ab10712cfeb82872d6d3648a99636c9e0fff5728a0fc34497142c952173" or $selection.target.file.md5 = "673bb55f781aaef382f4f9c9a748690d8b1045864151adaf67a4c0ab669e4700" or $selection.target.file.md5 = "6de21f2fd11d68b305b5e10d97b3f27e" or $selection.target.file.md5 = "7327ef046fe62a26e5571c36b5c2c417" or $selection.target.file.md5 = "785a7f6e1cd40b50ad788e5d7d3c8465" or $selection.target.file.md5 = "79c6ead6fa4f4addd7f2f019716dd6ca" or $selection.target.file.md5 = "7bb89b498beab4402d5cc8602c484a309ece50aa94c14f0a43f091f43b09f88f" or $selection.target.file.md5 = "7bc7d0fafd40438989c0445db8b3886868847da88979e35feebea9ff1b0655cb" or $selection.target.file.md5 = "842133ddc2d57fd0f78491b7ba39a34d" or $selection.target.file.md5 = "865cea806bc95acd56d215b2c3c3b892d9715495bdcf272b2bf2106326c13a30" or $selection.target.file.md5 = "876c2c8a45414c143e2fc5622d6cfe84050a45ae052ca9263beab280778ae380" or $selection.target.file.md5 = "8b532b41c25958f04495ca43d1f2a57f6d11fd3d6401f8d971e1299683828e52" or $selection.target.file.md5 = "91ebe2de7fcb922c794a891ff8987124" or $selection.target.file.md5 = "9a46a3ae2c3762964c5cbb63b62d7dee" or $selection.target.file.md5 = "a178196089fadecf8314e36fab17884f6894bdddd6e238652f99909a93db93a2" or $selection.target.file.md5 = "a3ae8a77a1f238e7b5ebd3dd3953912d9e5ae8fdf5cee6a536e7eba658ee2e1e" or $selection.target.file.md5 = "bb0a0a06f3bff97a1e7de8909d26c0ecb5161ea3882f587163d422042d9196a5" or $selection.target.file.md5 = "cc4a5ed98d8f4074ee700f5762ee0745f365605b90c62746990566413a7bf63e" or $selection.target.file.md5 = "dfc0ea5813e78492bc78d134d1d8372ca9d04ad563835d890614cd11b2555dd3" or $selection.target.file.md5 = "f1e23e2428f0f162c05bd259be133a1957438901a10041c128c3f63b72dd91d6" or $selection.target.file.md5 = "fd2c2cf66b166807470cbe2eafb3e0fab5947937f243fca87651d04bb6c9fd2d")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/zombieboy_cryptomining_worm__sysmon.yaral
rule zombieboy_cryptomining_worm_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "049fc01447f15e02fff88a2b10f1518c8489e97b2c26006b4962ff5005e460dc" or $selection.target.file.md5 = "22f105dc2e2574ba3ea2ac4152391ce3bbaaa415a9660c251638281bbc5e8f33" or $selection.target.file.md5 = "2628242abba9b99baf26dadc071739fed2559bb7251d69ab81edc404d4bae602" or $selection.target.file.md5 = "27c5e2f35a5fb9272c3ed7c746927ce8c61b3ce02fed7551129dc2a32bf20773" or $selection.target.file.md5 = "27d4684511314ef9631e162e1bdc5170185689abf16f7f28ba5ae397ba601197" or $selection.target.file.md5 = "38d7d4f6a712bff4ab212848802f5f9c" or $selection.target.file.md5 = "5d33434111ee36d754155c1d236e65aa78eaa605587715a5931b1c1ed3a54745" or $selection.target.file.md5 = "5ea00496a4073982855f81e463a887d6a8ef263c87bb203161e2db3f50cfc8c0" or $selection.target.file.md5 = "65cd6ab10712cfeb82872d6d3648a99636c9e0fff5728a0fc34497142c952173" or $selection.target.file.md5 = "673bb55f781aaef382f4f9c9a748690d8b1045864151adaf67a4c0ab669e4700" or $selection.target.file.md5 = "6de21f2fd11d68b305b5e10d97b3f27e" or $selection.target.file.md5 = "7327ef046fe62a26e5571c36b5c2c417" or $selection.target.file.md5 = "785a7f6e1cd40b50ad788e5d7d3c8465" or $selection.target.file.md5 = "79c6ead6fa4f4addd7f2f019716dd6ca" or $selection.target.file.md5 = "7bb89b498beab4402d5cc8602c484a309ece50aa94c14f0a43f091f43b09f88f" or $selection.target.file.md5 = "7bc7d0fafd40438989c0445db8b3886868847da88979e35feebea9ff1b0655cb" or $selection.target.file.md5 = "842133ddc2d57fd0f78491b7ba39a34d" or $selection.target.file.md5 = "865cea806bc95acd56d215b2c3c3b892d9715495bdcf272b2bf2106326c13a30" or $selection.target.file.md5 = "876c2c8a45414c143e2fc5622d6cfe84050a45ae052ca9263beab280778ae380" or $selection.target.file.md5 = "8b532b41c25958f04495ca43d1f2a57f6d11fd3d6401f8d971e1299683828e52" or $selection.target.file.md5 = "91ebe2de7fcb922c794a891ff8987124" or $selection.target.file.md5 = "9a46a3ae2c3762964c5cbb63b62d7dee" or $selection.target.file.md5 = "a178196089fadecf8314e36fab17884f6894bdddd6e238652f99909a93db93a2" or $selection.target.file.md5 = "a3ae8a77a1f238e7b5ebd3dd3953912d9e5ae8fdf5cee6a536e7eba658ee2e1e" or $selection.target.file.md5 = "bb0a0a06f3bff97a1e7de8909d26c0ecb5161ea3882f587163d422042d9196a5" or $selection.target.file.md5 = "cc4a5ed98d8f4074ee700f5762ee0745f365605b90c62746990566413a7bf63e" or $selection.target.file.md5 = "dfc0ea5813e78492bc78d134d1d8372ca9d04ad563835d890614cd11b2555dd3" or $selection.target.file.md5 = "f1e23e2428f0f162c05bd259be133a1957438901a10041c128c3f63b72dd91d6" or $selection.target.file.md5 = "fd2c2cf66b166807470cbe2eafb3e0fab5947937f243fca87651d04bb6c9fd2d")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule hidden_cobra_fastcash_malware_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "10ac312c8dd02e417dd24d53c99525c29d74dcbc84730351ad7a4e0a4b1a0eba" or $selection.target.file.md5 = "3a5ba44f140821849de2d82d5a137c3bb5a736130dddb86b296d94e6b421594c" or $selection.target.file.md5 = "4a740227eeb82c20286d9c112ef95f0c1380d0e90ffb39fc75c8456db4f60756" or $selection.target.file.md5 = "820ca1903a30516263d630c7c08f2b95f7b65dffceb21129c51c9e21cf9551c6" or $selection.target.file.md5 = "a9bc09a17d55fc790568ac864e3885434a43c33834551e027adb1896a463aafc" or $selection.target.file.md5 = "ab88f12f0a30b4601dc26dbae57646efb77d5c6382fb25522c529437e5428629" or $selection.target.file.md5 = "ca9ab48d293cc84092e8db8f0ca99cb155b30c61d32a1da7cd3687de454fe86c" or $selection.target.file.md5 = "d465637518024262c063f4a82d799a4e40ff3381014972f24ea18bc23c3b27ee" or $selection.target.file.md5 = "e03dc5f1447f243cf1f305c58d95000ef4e7dbcc5c4e91154daa5acd83fea9a8" or $selection.target.file.md5 = "f3e521996c85c0cdb2bfb3a0fd91eb03e25ba6feef2ba3a1da844f1b17278dd2" or $selection.target.file.md5 = "1f2cd2bc23556fb84a51467fedb89cbde7a5883f49e3cfd75a241a6f08a42d6d" or $selection.target.file.md5 = "9ddacbcd0700dc4b9babcd09ac1cebe23a0035099cb612e6c85ff4dffd087a26")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/hidden_cobra_fastcash_malware__sysmon.yaral
rule hidden_cobra_fastcash_malware_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "10ac312c8dd02e417dd24d53c99525c29d74dcbc84730351ad7a4e0a4b1a0eba" or $selection.target.file.md5 = "3a5ba44f140821849de2d82d5a137c3bb5a736130dddb86b296d94e6b421594c" or $selection.target.file.md5 = "4a740227eeb82c20286d9c112ef95f0c1380d0e90ffb39fc75c8456db4f60756" or $selection.target.file.md5 = "820ca1903a30516263d630c7c08f2b95f7b65dffceb21129c51c9e21cf9551c6" or $selection.target.file.md5 = "a9bc09a17d55fc790568ac864e3885434a43c33834551e027adb1896a463aafc" or $selection.target.file.md5 = "ab88f12f0a30b4601dc26dbae57646efb77d5c6382fb25522c529437e5428629" or $selection.target.file.md5 = "ca9ab48d293cc84092e8db8f0ca99cb155b30c61d32a1da7cd3687de454fe86c" or $selection.target.file.md5 = "d465637518024262c063f4a82d799a4e40ff3381014972f24ea18bc23c3b27ee" or $selection.target.file.md5 = "e03dc5f1447f243cf1f305c58d95000ef4e7dbcc5c4e91154daa5acd83fea9a8" or $selection.target.file.md5 = "f3e521996c85c0cdb2bfb3a0fd91eb03e25ba6feef2ba3a1da844f1b17278dd2" or $selection.target.file.md5 = "1f2cd2bc23556fb84a51467fedb89cbde7a5883f49e3cfd75a241a6f08a42d6d" or $selection.target.file.md5 = "9ddacbcd0700dc4b9babcd09ac1cebe23a0035099cb612e6c85ff4dffd087a26")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule powershell_encoded_command_sysmon { events: ($selection.metadata.product_event_type = "1" and re.regex($selection.target.process.file.full_path, `.*powershell\.exe`) and (re.regex($selection.target.process.command_line, `.*base64.*`) or re.regex($selection.target.process.command_line, `.*-enc.*`) or re.regex($selection.target.process.command_line, `.*-enco.*`) or re.regex($selection.target.process.command_line, `.*-encod.*`) or re.regex($selection.target.process.command_line, `.*-encode.*`) or re.regex($selection.target.process.command_line, `.*-encoded.*`) or re.regex($selection.target.process.command_line, `.*-ec.*`) or re.regex($selection.target.process.command_line, `.*-en.*`) or re.regex($selection.target.process.command_line, `.*-encodedC.*`) or re.regex($selection.target.process.command_line, `.*-encodedCo.*`) or re.regex($selection.target.process.command_line, `.*-encodedCom.*`) or re.regex($selection.target.process.command_line, `.*-encodedComm.*`) or re.regex($selection.target.process.command_line, `.*-encodedComma.*`) or re.regex($selection.target.process.command_line, `.*-encodedComman.*`) or re.regex($selection.target.process.command_line, `.*-encodedCommand.*`))) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/powershell_encoded_command__sysmon.yaral
rule powershell_encoded_command_sysmon { events: ($selection.metadata.product_event_type = "1" and re.regex($selection.target.process.file.full_path, `.*powershell\.exe`) and (re.regex($selection.target.process.command_line, `.*base64.*`) or re.regex($selection.target.process.command_line, `.*-enc.*`) or re.regex($selection.target.process.command_line, `.*-enco.*`) or re.regex($selection.target.process.command_line, `.*-encod.*`) or re.regex($selection.target.process.command_line, `.*-encode.*`) or re.regex($selection.target.process.command_line, `.*-encoded.*`) or re.regex($selection.target.process.command_line, `.*-ec.*`) or re.regex($selection.target.process.command_line, `.*-en.*`) or re.regex($selection.target.process.command_line, `.*-encodedC.*`) or re.regex($selection.target.process.command_line, `.*-encodedCo.*`) or re.regex($selection.target.process.command_line, `.*-encodedCom.*`) or re.regex($selection.target.process.command_line, `.*-encodedComm.*`) or re.regex($selection.target.process.command_line, `.*-encodedComma.*`) or re.regex($selection.target.process.command_line, `.*-encodedComman.*`) or re.regex($selection.target.process.command_line, `.*-encodedCommand.*`))) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule danabot_trojan_sysmon { events: ($selection.metadata.product_event_type = "1" and $selection.target.file.md5 = "76A64FD17CD1E7C59B8BDE7AA9209854") condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/danabot_trojan__sysmon.yaral
rule danabot_trojan_sysmon { events: ($selection.metadata.product_event_type = "1" and $selection.target.file.md5 = "76A64FD17CD1E7C59B8BDE7AA9209854") condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule bitsadmin_download_sysmon { events: ($selection.metadata.product_event_type = "1" and re.regex($selection.target.process.file.full_path, `.*\\bitsadmin\.exe`) and (re.regex($selection.target.process.command_line, `.*/transfer`) or re.regex($selection.target.process.command_line, `.*/download`))) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/bitsadmin_download__sysmon.yaral
rule bitsadmin_download_sysmon { events: ($selection.metadata.product_event_type = "1" and re.regex($selection.target.process.file.full_path, `.*\\bitsadmin\.exe`) and (re.regex($selection.target.process.command_line, `.*/transfer`) or re.regex($selection.target.process.command_line, `.*/download`))) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule suspicious_reconnaissance_activity_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.process.command_line = "net group \"domain admins\" /domain" or $selection.target.process.command_line = "net localgroup administrators")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/suspicious_reconnaissance_activity__sysmon.yaral
rule suspicious_reconnaissance_activity_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.process.command_line = "net group \"domain admins\" /domain" or $selection.target.process.command_line = "net localgroup administrators")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule roma225_campaign_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "4211e091dfb33523d675d273bdc109ddecf4ee1c1f5f29e8c82b9d0344dbb6a1" or $selection.target.file.md5 = "e8a765ec824881e1e78defd7c011da735f3e3b954aaf93a4282b6455a1b9afcc" or $selection.target.file.md5 = "702e5cc9462e464c8c29c832fe0d1ecd5cd7740cc2cbceecfd70e566da8194a1")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/roma225_campaign__sysmon.yaral
rule roma225_campaign_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "4211e091dfb33523d675d273bdc109ddecf4ee1c1f5f29e8c82b9d0344dbb6a1" or $selection.target.file.md5 = "e8a765ec824881e1e78defd7c011da735f3e3b954aaf93a4282b6455a1b9afcc" or $selection.target.file.md5 = "702e5cc9462e464c8c29c832fe0d1ecd5cd7740cc2cbceecfd70e566da8194a1")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule formbook_malware_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "d7f0f3fea2f9935c1dd7bda343ec1e3fb77457e68b16b9d51516a3d8c651d14f" or $selection.target.file.md5 = "05a945fc7a9eb4c9a4db8eb974333b3938c06d9299976075b2fc00a79cf0a129" or $selection.target.file.md5 = "91a471ba534219f05c31d204b3c5217cde7c67f70600aa3abba334888f628376" or $selection.target.file.md5 = "f7e97000615ee77093c4ec49f3cbe4b8cb3dc6feafc74ae8d59f01f05dc4280e" or $selection.target.file.md5 = "23c40f55797b07b2d9bf1e314ea928b1151af2b2e605aa520a715fe56e481528" or $selection.target.file.md5 = "1d706a3c85973fe96240a254abff52c0593b4aa0c283d3ecc28df6f8baed853b" or $selection.target.file.md5 = "e8f0136abc46b668d44586a6b5a394b470af6af8e9d91bddca4b70e3e66768d1" or $selection.target.file.md5 = "958ee876ebaab71ea2ef9fcda6a08598319578ccc1f4bd9baa3a54114b88abdc" or $selection.target.file.md5 = "b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766" or $selection.target.file.md5 = "667cc420816fd71ae54869b4c0f05129cc5972dbc47f7a98776fc63a72d77691" or $selection.target.file.md5 = "7db8273fd25088900cffa036eb631ffcee40302dd7b33a7d4f3e653e7ab091c0" or $selection.target.file.md5 = "3efdc8b15e324cd9323cdbd34fbd19979d6eeb95fe1120ed3a95dc24fab67397" or $selection.target.file.md5 = "189e2494b19773f9b72072774891378f5809c7bfb121dcba2cee13e6f91ed619" or $selection.target.file.md5 = "bd44861de18d5bbf71d2d64e29ff9f1d8495f97f5ba0b49eacb504b3768a89bb" or $selection.target.file.md5 = "e0282f51ac3bfba5774893c8b70c31600d7e4bd7f6d7231fd33315396cd18b78" or $selection.target.file.md5 = "83fa11d8711ef22437681e09a4be500cfaf49ac7cb29837ff6a42fb46b09d789" or $selection.target.file.md5 = "14ce215b561dc43104e400c0eb877d876f6e9be77c5b2994b9b8745b2132d914" or $selection.target.file.md5 = "226d38382415b935d849539c0b6305a4259c26dfa7317b944f8498cd3e65850f" or $selection.target.file.md5 = "dd1eeb128b1d1eb40e74281aec79828d7d7179a0375bda5e85ce5fd2fac064a2" or $selection.target.file.md5 = "a7422eddb437a33d730ab70bd1267d815fc3761d5eda9781de91d0bdeeb823ff" or $selection.target.file.md5 = "2a21f728282b33b89e6cbd99db52651931b534be9837d99eacf87cfd748c3cba" or $selection.target.file.md5 = "91b6219f4a8903773492fd83fe02e6aa8729e378f559c5cc9f115a2304f89e57" or $selection.target.file.md5 = "4f73923c23354ac5050f012f607342362eaf1d691ce1b64ea1e831038cc4236c" or $selection.target.file.md5 = "ebbed2fcd7fe4dc8a95cc60ab9c8e98609bcf3ba5696507252c65cc6be748b14" or $selection.target.file.md5 = "d1f9549943b936ba54d87a5befd2d241fcddac6f0caf8c786f6034ab18b8e61d" or $selection.target.file.md5 = "ae7cacc7a16cb48cb40473ad0269331c392f8eb0fef8ebe2d90f3592fccb306c" or $selection.target.file.md5 = "00cb817330768b33a30bcf7a6a67d0269aa32f8099aee3ecd18da0e31d096610" or $selection.target.file.md5 = "e93994bf78b13d3bdee1682faf6c6544246fbd6d95a0aa043ac175ad0b905646" or $selection.target.file.md5 = "822c1239203db0bfdde3d0b65f50e53f7ee155638d4743b14f58267fa3e76531" or $selection.target.file.md5 = "5aac259cb807a4c8e4986dbc1354ef566a12ced381b702a96474c0f8ff45f825" or $selection.target.file.md5 = "8f6813634cb08d6df72e045294bf63732c0753f79293f1c9b2765f686f699a72" or $selection.target.file.md5 = "82ce499994e4b2ee46e887946ef43f18b046639e81dfe1d23537ce6a530d8794" or $selection.target.file.md5 = "4c16046966a5fd06c84213aa67bfa37949800980915e9b511384ec17dc7eb7b1" or $selection.target.file.md5 = "04f093a3b867918dce921fe2ba40dcdae769b35dbce3047aacdb151e2208ea5c" or $selection.target.file.md5 = "59cf77148cbbf24d395d09192ce43ac5395087f3e499cda350e3a93f13e37de1" or $selection.target.file.md5 = "D83f874dda2fa3e4339399c786e9497c1b440019fa5ee5925738fc3afa67352c" or $selection.target.file.md5 = "35ea3d8272751d60bd3106e548444588b1959622dfdcf11be14b80786bdb25e6" or $selection.target.file.md5 = "5e9979a9676889a6656cbfa9ddc1aab2fa4b301155f5b55377a74257c9f9f583" or $selection.target.file.md5 = "0b0615eb8e4c91983fab37475ecc374f79c394768a33ea68c2208da1c03e5a43" or $selection.target.file.md5 = "Fccc874f4f741231673f5a3c0bdc4c6bfd07f1b1e93f7c64e2015c393966216e" or $selection.target.file.md5 = "13ce56581c8ad851fc44ad6c6789829e7c250b2c8af465c4a163b9a28c9b8a41" or $selection.target.file.md5 = "541ea322a3a6385211566f95cef333580a62341dac397e044a04504625acdd0d" or $selection.target.file.md5 = "062ae7152d8e8f3abb093e55c5a90213134dd278ac28cfeb18e81132232dcbe8" or $selection.target.file.md5 = "0ddf7e87957932650679c99ff2e2380e2be8a203d1142f19a22ad602047f372e" or $selection.target.file.md5 = "1debc4e22a40f4f87142e7e40094ce1a9aa10462f0c6d1c29aa272d7d6849205" or $selection.target.file.md5 = "701b1549152e2c460c8c67008c3bcc0e" or $selection.target.file.md5 = "6badb8ff9a65ad709ef8674bb78a8ec0497de536b35fe6b8c6e6d76d17926d54")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/formbook_malware__sysmon.yaral
rule formbook_malware_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "d7f0f3fea2f9935c1dd7bda343ec1e3fb77457e68b16b9d51516a3d8c651d14f" or $selection.target.file.md5 = "05a945fc7a9eb4c9a4db8eb974333b3938c06d9299976075b2fc00a79cf0a129" or $selection.target.file.md5 = "91a471ba534219f05c31d204b3c5217cde7c67f70600aa3abba334888f628376" or $selection.target.file.md5 = "f7e97000615ee77093c4ec49f3cbe4b8cb3dc6feafc74ae8d59f01f05dc4280e" or $selection.target.file.md5 = "23c40f55797b07b2d9bf1e314ea928b1151af2b2e605aa520a715fe56e481528" or $selection.target.file.md5 = "1d706a3c85973fe96240a254abff52c0593b4aa0c283d3ecc28df6f8baed853b" or $selection.target.file.md5 = "e8f0136abc46b668d44586a6b5a394b470af6af8e9d91bddca4b70e3e66768d1" or $selection.target.file.md5 = "958ee876ebaab71ea2ef9fcda6a08598319578ccc1f4bd9baa3a54114b88abdc" or $selection.target.file.md5 = "b031075b8ad2558ee3ee7f0749c2b24484dd6fab7252fad71548276514b9b766" or $selection.target.file.md5 = "667cc420816fd71ae54869b4c0f05129cc5972dbc47f7a98776fc63a72d77691" or $selection.target.file.md5 = "7db8273fd25088900cffa036eb631ffcee40302dd7b33a7d4f3e653e7ab091c0" or $selection.target.file.md5 = "3efdc8b15e324cd9323cdbd34fbd19979d6eeb95fe1120ed3a95dc24fab67397" or $selection.target.file.md5 = "189e2494b19773f9b72072774891378f5809c7bfb121dcba2cee13e6f91ed619" or $selection.target.file.md5 = "bd44861de18d5bbf71d2d64e29ff9f1d8495f97f5ba0b49eacb504b3768a89bb" or $selection.target.file.md5 = "e0282f51ac3bfba5774893c8b70c31600d7e4bd7f6d7231fd33315396cd18b78" or $selection.target.file.md5 = "83fa11d8711ef22437681e09a4be500cfaf49ac7cb29837ff6a42fb46b09d789" or $selection.target.file.md5 = "14ce215b561dc43104e400c0eb877d876f6e9be77c5b2994b9b8745b2132d914" or $selection.target.file.md5 = "226d38382415b935d849539c0b6305a4259c26dfa7317b944f8498cd3e65850f" or $selection.target.file.md5 = "dd1eeb128b1d1eb40e74281aec79828d7d7179a0375bda5e85ce5fd2fac064a2" or $selection.target.file.md5 = "a7422eddb437a33d730ab70bd1267d815fc3761d5eda9781de91d0bdeeb823ff" or $selection.target.file.md5 = "2a21f728282b33b89e6cbd99db52651931b534be9837d99eacf87cfd748c3cba" or $selection.target.file.md5 = "91b6219f4a8903773492fd83fe02e6aa8729e378f559c5cc9f115a2304f89e57" or $selection.target.file.md5 = "4f73923c23354ac5050f012f607342362eaf1d691ce1b64ea1e831038cc4236c" or $selection.target.file.md5 = "ebbed2fcd7fe4dc8a95cc60ab9c8e98609bcf3ba5696507252c65cc6be748b14" or $selection.target.file.md5 = "d1f9549943b936ba54d87a5befd2d241fcddac6f0caf8c786f6034ab18b8e61d" or $selection.target.file.md5 = "ae7cacc7a16cb48cb40473ad0269331c392f8eb0fef8ebe2d90f3592fccb306c" or $selection.target.file.md5 = "00cb817330768b33a30bcf7a6a67d0269aa32f8099aee3ecd18da0e31d096610" or $selection.target.file.md5 = "e93994bf78b13d3bdee1682faf6c6544246fbd6d95a0aa043ac175ad0b905646" or $selection.target.file.md5 = "822c1239203db0bfdde3d0b65f50e53f7ee155638d4743b14f58267fa3e76531" or $selection.target.file.md5 = "5aac259cb807a4c8e4986dbc1354ef566a12ced381b702a96474c0f8ff45f825" or $selection.target.file.md5 = "8f6813634cb08d6df72e045294bf63732c0753f79293f1c9b2765f686f699a72" or $selection.target.file.md5 = "82ce499994e4b2ee46e887946ef43f18b046639e81dfe1d23537ce6a530d8794" or $selection.target.file.md5 = "4c16046966a5fd06c84213aa67bfa37949800980915e9b511384ec17dc7eb7b1" or $selection.target.file.md5 = "04f093a3b867918dce921fe2ba40dcdae769b35dbce3047aacdb151e2208ea5c" or $selection.target.file.md5 = "59cf77148cbbf24d395d09192ce43ac5395087f3e499cda350e3a93f13e37de1" or $selection.target.file.md5 = "D83f874dda2fa3e4339399c786e9497c1b440019fa5ee5925738fc3afa67352c" or $selection.target.file.md5 = "35ea3d8272751d60bd3106e548444588b1959622dfdcf11be14b80786bdb25e6" or $selection.target.file.md5 = "5e9979a9676889a6656cbfa9ddc1aab2fa4b301155f5b55377a74257c9f9f583" or $selection.target.file.md5 = "0b0615eb8e4c91983fab37475ecc374f79c394768a33ea68c2208da1c03e5a43" or $selection.target.file.md5 = "Fccc874f4f741231673f5a3c0bdc4c6bfd07f1b1e93f7c64e2015c393966216e" or $selection.target.file.md5 = "13ce56581c8ad851fc44ad6c6789829e7c250b2c8af465c4a163b9a28c9b8a41" or $selection.target.file.md5 = "541ea322a3a6385211566f95cef333580a62341dac397e044a04504625acdd0d" or $selection.target.file.md5 = "062ae7152d8e8f3abb093e55c5a90213134dd278ac28cfeb18e81132232dcbe8" or $selection.target.file.md5 = "0ddf7e87957932650679c99ff2e2380e2be8a203d1142f19a22ad602047f372e" or $selection.target.file.md5 = "1debc4e22a40f4f87142e7e40094ce1a9aa10462f0c6d1c29aa272d7d6849205" or $selection.target.file.md5 = "701b1549152e2c460c8c67008c3bcc0e" or $selection.target.file.md5 = "6badb8ff9a65ad709ef8674bb78a8ec0497de536b35fe6b8c6e6d76d17926d54")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule password_stealer_pwdfetcher_detector_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "2A5C9D4DAE5E53B2962FBE2B7FA8798A127BC9A6" or $selection.target.file.md5 = "9B1586766AF9885EF960F05F8606D1230B36AC15" or $selection.target.file.md5 = "A2F0D5AF81D93752CFF1CF1E8BB9E6CAEE6D1B5E" or $selection.target.file.md5 = "CE18467B33161E39C36FC6C5B52F68D49ABCFC2A")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/password_stealer__pwdfetcher__detector__sysmon.yaral
rule password_stealer_pwdfetcher_detector_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "2A5C9D4DAE5E53B2962FBE2B7FA8798A127BC9A6" or $selection.target.file.md5 = "9B1586766AF9885EF960F05F8606D1230B36AC15" or $selection.target.file.md5 = "A2F0D5AF81D93752CFF1CF1E8BB9E6CAEE6D1B5E" or $selection.target.file.md5 = "CE18467B33161E39C36FC6C5B52F68D49ABCFC2A")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule mssql_server_backdoor_detection_vollgar { events: ($selection.metadata.product_event_type = "11" and ($selection.target.file.full_path = "C:\\ProgramData\\wget.vbs" or re.regex($selection.target.file.full_path, `.*\\SQLAGENTIDC\.exe`) or $selection.target.file.full_path = "C:\\RECYCLER\\wget.vbs" or $selection.target.file.full_path = "C:\\ProgramData\\emsda.vbs" or $selection.target.file.full_path = "C:\\RECYCLER\\emsda.vbs" or re.regex($selection.target.file.full_path, `.*\\SQLAGENTSWA\.exe`) or re.regex($selection.target.file.full_path, `.*\\SQLIOMDSD\.exe`) or re.regex($selection.target.file.full_path, `.*\\SQLSernsf\.exe`) or $selection.target.file.full_path = "C:\\Program Files (x86)\\Microsoft SQL Server\\SQLSerasi.exe" or $selection.target.file.full_path = "C:\\Users\\MSSQL~1\\AppData\\Local\\Temp\\startas.bat" or $selection.target.file.full_path = "C:\\Users\\MSSQLSERVER\\AppData\\Local\\Temp\\startas.bat" or $selection.target.file.full_path = "C:\\Windows\\Temp\\startas.bat" or $selection.target.file.full_path = "C:\\Windows\\ServiceProfiles\\NetworkService\\AppData\\Local\\Temp\\startas.bat" or $selection.target.file.full_path = "C:\\Users\\MSSQLSERVER\\AppData\\Local\\Temp\\startae.bat" or $selection.target.file.full_path = "C:\\Windows\\Temp\\startae.bat" or $selection.target.file.full_path = "C:\\Windows\\ServiceProfiles\\NetworkService\\AppData\\Local\\Temp\\startae.bat")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/ms_sql_server_backdoor_detection__vollgar.yaral
rule mssql_server_backdoor_detection_vollgar { events: ($selection.metadata.product_event_type = "11" and ($selection.target.file.full_path = "C:\\ProgramData\\wget.vbs" or re.regex($selection.target.file.full_path, `.*\\SQLAGENTIDC\.exe`) or $selection.target.file.full_path = "C:\\RECYCLER\\wget.vbs" or $selection.target.file.full_path = "C:\\ProgramData\\emsda.vbs" or $selection.target.file.full_path = "C:\\RECYCLER\\emsda.vbs" or re.regex($selection.target.file.full_path, `.*\\SQLAGENTSWA\.exe`) or re.regex($selection.target.file.full_path, `.*\\SQLIOMDSD\.exe`) or re.regex($selection.target.file.full_path, `.*\\SQLSernsf\.exe`) or $selection.target.file.full_path = "C:\\Program Files (x86)\\Microsoft SQL Server\\SQLSerasi.exe" or $selection.target.file.full_path = "C:\\Users\\MSSQL~1\\AppData\\Local\\Temp\\startas.bat" or $selection.target.file.full_path = "C:\\Users\\MSSQLSERVER\\AppData\\Local\\Temp\\startas.bat" or $selection.target.file.full_path = "C:\\Windows\\Temp\\startas.bat" or $selection.target.file.full_path = "C:\\Windows\\ServiceProfiles\\NetworkService\\AppData\\Local\\Temp\\startas.bat" or $selection.target.file.full_path = "C:\\Users\\MSSQLSERVER\\AppData\\Local\\Temp\\startae.bat" or $selection.target.file.full_path = "C:\\Windows\\Temp\\startae.bat" or $selection.target.file.full_path = "C:\\Windows\\ServiceProfiles\\NetworkService\\AppData\\Local\\Temp\\startae.bat")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule betabot_neurevt_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "b4576437f4b06d438a03a9f8f0776cde" or $selection.target.file.md5 = "a0763d3332bb87595ed6303ab3cdb8fff7dd1e976ee161003a62316fea332941")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/betabot__neurevt___sysmon.yaral
rule betabot_neurevt_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "b4576437f4b06d438a03a9f8f0776cde" or $selection.target.file.md5 = "a0763d3332bb87595ed6303ab3cdb8fff7dd1e976ee161003a62316fea332941")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule suspicious_svchost_process_sysmon { events: (($selection.metadata.product_event_type = "1" and $selection.target.process.file.full_path = "svchost.exe") and not ($selection.metadata.product_event_type = "1" and (re.regex($selection.target.process.command_line, `.*\\services\.exe`) or re.regex($selection.target.process.command_line, `.*\\MsMpEng\.exe`)))) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/windows/suspicious_svchost_process__sysmon.yaral
rule suspicious_svchost_process_sysmon { events: (($selection.metadata.product_event_type = "1" and $selection.target.process.file.full_path = "svchost.exe") and not ($selection.metadata.product_event_type = "1" and (re.regex($selection.target.process.command_line, `.*\\services\.exe`) or re.regex($selection.target.process.command_line, `.*\\MsMpEng\.exe`)))) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule fallout_rig_ek_delivers_raccoon_stealer { events: (((re.regex($selection1.target.process.file.full_path, `.*\\cvtres\.exe`) and re.regex($selection1.principal.process.file.full_path, `.*\\csc\.exe`)) or ($selection1.metadata.product_event_type = "1" and (re.regex($selection1.target.process.file.full_path, `.*\\csc\.exe`) or re.regex($selection1.target.process.file.full_path, `.*\\AyJWa1N0\.tmp`)) and re.regex($selection1.principal.process.file.full_path, `.*\\powershell\.exe`))) or (re.regex($selection1.target.process.file.full_path, `.*\\cmd\.exe`) and re.regex($selection1.principal.process.file.full_path, `.*\\AyJWa1N0\.tmp`))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/fallout_rig_ek_delivers_raccoon_stealer.yaral
rule fallout_rig_ek_delivers_raccoon_stealer { events: (((re.regex($selection1.target.process.file.full_path, `.*\\cvtres\.exe`) and re.regex($selection1.principal.process.file.full_path, `.*\\csc\.exe`)) or ($selection1.metadata.product_event_type = "1" and (re.regex($selection1.target.process.file.full_path, `.*\\csc\.exe`) or re.regex($selection1.target.process.file.full_path, `.*\\AyJWa1N0\.tmp`)) and re.regex($selection1.principal.process.file.full_path, `.*\\powershell\.exe`))) or (re.regex($selection1.target.process.file.full_path, `.*\\cmd\.exe`) and re.regex($selection1.principal.process.file.full_path, `.*\\AyJWa1N0\.tmp`))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule detects_malware_acrord32exe_execution_process { events: (($selection.metadata.product_event_type = "1" and re.regex($selection.target.process.file.full_path, `.*\\AcroRD32\.exe`)) and not (re.regex($selection.target.process.file.full_path, `.*\\Adobe\\Acrobat Reader DC\\Reader\\AcroRD32\.exe`))) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/detects_malware_acrord32_exe_execution_process.yaral
rule detects_malware_acrord32exe_execution_process { events: (($selection.metadata.product_event_type = "1" and re.regex($selection.target.process.file.full_path, `.*\\AcroRD32\.exe`)) and not (re.regex($selection.target.process.file.full_path, `.*\\Adobe\\Acrobat Reader DC\\Reader\\AcroRD32\.exe`))) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule psexec_process_has_terminated { events: ($selection.metadata.product_event_type = "5" and re.regex($selection.target.process.file.full_path, `.*\\psexec\.exe`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/psexec_process_has_terminated.yaral
rule psexec_process_has_terminated { events: ($selection.metadata.product_event_type = "5" and re.regex($selection.target.process.file.full_path, `.*\\psexec\.exe`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule modification_of_windows_defender_service_settings_sysmon { events: (($selection1.metadata.product_event_type = "13" and (re.regex($selection1.target.registry.registry_key, `.*\\SYSTEM\\ControlSet001\\services\\WinDefend`) or re.regex($selection1.target.registry.registry_key, `.*SOFTWARE\\Policies\\Microsoft\\Windows Defender`)) and $selection1.metadata.event_type = "SetValue") or ($selection1.target.process.file.full_path = "powershell.exe" and re.regex($selection1.target.process.command_line, `.* .*/c powershell Set-MpPreference -DisableRealtimeMonitoring $true .*`))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/modification_of_windows_defender_service_settings__sysmon.yaral
rule modification_of_windows_defender_service_settings_sysmon { events: (($selection1.metadata.product_event_type = "13" and (re.regex($selection1.target.registry.registry_key, `.*\\SYSTEM\\ControlSet001\\services\\WinDefend`) or re.regex($selection1.target.registry.registry_key, `.*SOFTWARE\\Policies\\Microsoft\\Windows Defender`)) and $selection1.metadata.event_type = "SetValue") or ($selection1.target.process.file.full_path = "powershell.exe" and re.regex($selection1.target.process.command_line, `.* .*/c powershell Set-MpPreference -DisableRealtimeMonitoring $true .*`))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule covid19_themed_malware_via_chm_file { events: (($selection1.target.process.file.full_path = "C:\\Windows\\System32\\cmd.exe" and $selection1.principal.process.file.full_path = "C:\\Windows\\hh.exe" and re.regex($selection1.target.process.command_line, `.*for %i in \(.*\.chm\) do \(hh -decompile %temp% %~i\)&&cmd /c %temp%/~tmp6\.cab`)) or ($selection1.principal.process.file.full_path = "C:\\Windows\\System32\\cmd.exe" and $selection1.target.process.file.full_path = "C:\\Windows\\hh.exe" and re.regex($selection1.target.process.command_line, `hh -decompile .*COVID-19\.chm.*`))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/covid_19_themed_malware_via_chm_file.yaral
rule covid19_themed_malware_via_chm_file { events: (($selection1.target.process.file.full_path = "C:\\Windows\\System32\\cmd.exe" and $selection1.principal.process.file.full_path = "C:\\Windows\\hh.exe" and re.regex($selection1.target.process.command_line, `.*for %i in \(.*\.chm\) do \(hh -decompile %temp% %~i\)&&cmd /c %temp%/~tmp6\.cab`)) or ($selection1.principal.process.file.full_path = "C:\\Windows\\System32\\cmd.exe" and $selection1.target.process.file.full_path = "C:\\Windows\\hh.exe" and re.regex($selection1.target.process.command_line, `hh -decompile .*COVID-19\.chm.*`))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule trickbot_behaviour_privilege_escalation_attack { events: (($selection1.metadata.product_event_type = "11" and (re.regex($selection1.target.file.full_path, `.* .*\\Microsoft\\Windows\\DRM.*`) or re.regex($selection1.target.file.full_path, `.* .*\\Microsoft\\Network\\Downloader.*`) or re.regex($selection1.target.file.full_path, `.* C:\\Users.*\\AppData\\Roaming\\CloudApp.*\.exe .*`))) or ($selection1.metadata.product_event_type = "13" and re.regex($selection1.target.registry.registry_key, `.* .*\\SYSTEM\\CurrentControlSet\\services\\SSDPSRV.*`) and $selection1.metadata.event_type = "SetValue")) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/trickbot_behaviour__privilege_escalation_attack.yaral
rule trickbot_behaviour_privilege_escalation_attack { events: (($selection1.metadata.product_event_type = "11" and (re.regex($selection1.target.file.full_path, `.* .*\\Microsoft\\Windows\\DRM.*`) or re.regex($selection1.target.file.full_path, `.* .*\\Microsoft\\Network\\Downloader.*`) or re.regex($selection1.target.file.full_path, `.* C:\\Users.*\\AppData\\Roaming\\CloudApp.*\.exe .*`))) or ($selection1.metadata.product_event_type = "13" and re.regex($selection1.target.registry.registry_key, `.* .*\\SYSTEM\\CurrentControlSet\\services\\SSDPSRV.*`) and $selection1.metadata.event_type = "SetValue")) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule darkgate_cryptocurrency_mining_and_ransomware_campaign_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "3340013b0f00fe0c9e99411f722f8f3f0baf9ae4f40ac78796a6d4d694b46d7b" or $selection.target.file.md5 = "0c3ef20ede53efbe5eebca50171a589731a17037147102838bdb4a41c33f94e5" or $selection.target.file.md5 = "3340013b0f00fe0c9e99411f722f8f3f0baf9ae4f40ac78796a6d4d694b46d7b" or $selection.target.file.md5 = "0c3ef20ede53efbe5eebca50171a589731a17037147102838bdb4a41c33f94e5" or $selection.target.file.md5 = "52c47a529e4ddd0778dde84b7f54e1aea326d9f8eeb4ba4961a87835a3d29866" or $selection.target.file.md5 = "b0542a719c6b2fc575915e9e4c58920cf999ba5c3f5345617818a9dc14a378b4" or $selection.target.file.md5 = "dadd0ec8806d506137889d7f1595b3b5447c1ea30159432b1952fa9551ecfba5" or $selection.target.file.md5 = "c88eab30fa03c44b567bcb4e659a60ee0fe5d98664816c70e3b6e8d79169cbea" or $selection.target.file.md5 = "2264c2f2c2d5a0d6d62c33cadb848305a8fff81cdd79c4d7560021cfb304a121" or $selection.target.file.md5 = "3c68facf01aede7bcd8c2aea853324a2e6a0ec8b026d95c7f50a46d77334c2d2" or $selection.target.file.md5 = "a146f84a0179124d96a707f192f4c06c07690e745cffaef521fcda9633766a44" or $selection.target.file.md5 = "abc35bb943462312437f0c4275b012e8ec03899ab86d353143d92cbefedd7f9d" or $selection.target.file.md5 = "908f2dfed6c122b46e946fe8839feb9218cb095f180f86c43659448e2f709fc7" or $selection.target.file.md5 = "3491bc6df27858257db26b913da8c35c83a0e48cf80de701a45a30a30544706d")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/darkgate_cryptocurrency_mining_and_ransomware_campaign__sysmon.yaral
rule darkgate_cryptocurrency_mining_and_ransomware_campaign_sysmon { events: ($selection.metadata.product_event_type = "1" and ($selection.target.file.md5 = "3340013b0f00fe0c9e99411f722f8f3f0baf9ae4f40ac78796a6d4d694b46d7b" or $selection.target.file.md5 = "0c3ef20ede53efbe5eebca50171a589731a17037147102838bdb4a41c33f94e5" or $selection.target.file.md5 = "3340013b0f00fe0c9e99411f722f8f3f0baf9ae4f40ac78796a6d4d694b46d7b" or $selection.target.file.md5 = "0c3ef20ede53efbe5eebca50171a589731a17037147102838bdb4a41c33f94e5" or $selection.target.file.md5 = "52c47a529e4ddd0778dde84b7f54e1aea326d9f8eeb4ba4961a87835a3d29866" or $selection.target.file.md5 = "b0542a719c6b2fc575915e9e4c58920cf999ba5c3f5345617818a9dc14a378b4" or $selection.target.file.md5 = "dadd0ec8806d506137889d7f1595b3b5447c1ea30159432b1952fa9551ecfba5" or $selection.target.file.md5 = "c88eab30fa03c44b567bcb4e659a60ee0fe5d98664816c70e3b6e8d79169cbea" or $selection.target.file.md5 = "2264c2f2c2d5a0d6d62c33cadb848305a8fff81cdd79c4d7560021cfb304a121" or $selection.target.file.md5 = "3c68facf01aede7bcd8c2aea853324a2e6a0ec8b026d95c7f50a46d77334c2d2" or $selection.target.file.md5 = "a146f84a0179124d96a707f192f4c06c07690e745cffaef521fcda9633766a44" or $selection.target.file.md5 = "abc35bb943462312437f0c4275b012e8ec03899ab86d353143d92cbefedd7f9d" or $selection.target.file.md5 = "908f2dfed6c122b46e946fe8839feb9218cb095f180f86c43659448e2f709fc7" or $selection.target.file.md5 = "3491bc6df27858257db26b913da8c35c83a0e48cf80de701a45a30a30544706d")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule rig_ek_delivers_predator_the_thiefbot_ransomware { events: ((((re.regex($selection1.target.process.file.full_path, `.*\\socks111atx\.exe`) and re.regex($selection1.principal.process.file.full_path, `.*\\radD8D54\.tmp\.exe`)) or ($selection1.metadata.product_event_type = "1" and re.regex($selection1.target.process.file.full_path, `.*\\regsvr32\.exe`) and (re.regex($selection1.target.process.command_line, `.*\\D5F4\.tmp\.dll`) or re.regex($selection1.target.process.command_line, `.*\\CD2D\.tmp\.dll`)))) or (re.regex($selection1.target.process.command_line, `.*ping 127\.0\.0\.1 && del.*`) and re.regex($selection1.principal.process.file.full_path, `.*\\radD8D54\.tmp\.exe`))) and (re.regex($selection1.target.process.file.full_path, `.*\\notepad\.exe`) and re.regex($selection1.target.process.command_line, `.*\\FILES ENCRYPTED\.txt`))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/rig_ek_delivers_predator_the_thief_bot_ransomware.yaral
rule rig_ek_delivers_predator_the_thiefbot_ransomware { events: ((((re.regex($selection1.target.process.file.full_path, `.*\\socks111atx\.exe`) and re.regex($selection1.principal.process.file.full_path, `.*\\radD8D54\.tmp\.exe`)) or ($selection1.metadata.product_event_type = "1" and re.regex($selection1.target.process.file.full_path, `.*\\regsvr32\.exe`) and (re.regex($selection1.target.process.command_line, `.*\\D5F4\.tmp\.dll`) or re.regex($selection1.target.process.command_line, `.*\\CD2D\.tmp\.dll`)))) or (re.regex($selection1.target.process.command_line, `.*ping 127\.0\.0\.1 && del.*`) and re.regex($selection1.principal.process.file.full_path, `.*\\radD8D54\.tmp\.exe`))) and (re.regex($selection1.target.process.file.full_path, `.*\\notepad\.exe`) and re.regex($selection1.target.process.command_line, `.*\\FILES ENCRYPTED\.txt`))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule diskshadow_and_vshadow_launch_detection { events: (re.regex($selection1.principal.process.file.full_path, `.*\\vshadow\.exe`) or re.regex($selection1.principal.process.file.full_path, `.*\\diskshadow\.exe`) or (re.regex($selection1.target.process.command_line, `.*vshadow\.exe -nw -exec=.*`) or re.regex($selection1.target.process.command_line, `.*diskshadow\.exe /s \?:\\\\.*`))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/diskshadow_and_vshadow_launch_detection.yaral
rule diskshadow_and_vshadow_launch_detection { events: (re.regex($selection1.principal.process.file.full_path, `.*\\vshadow\.exe`) or re.regex($selection1.principal.process.file.full_path, `.*\\diskshadow\.exe`) or (re.regex($selection1.target.process.command_line, `.*vshadow\.exe -nw -exec=.*`) or re.regex($selection1.target.process.command_line, `.*diskshadow\.exe /s \?:\\\\.*`))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule apt28_zekapabzebrocycannon_implant_sysmonfirewallproxy_part2 { events: ((((((((((((($selectionSysmon3_emanueledelucia.target.url = "https://beatguitar.com/n2qqsy/hpse0/sy/yasfy8/msayzp/lw.sip/?n=vxl0bnijnmttnsficoq=" or $selectionSysmon3_emanueledelucia.target.url = "beatguitar.com" or $selectionSysmon3_emanueledelucia.target.ip = "185.99.133.72") or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "549726b8bfb1919a343ac764d48fdc81")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "43d7ffd611932cf51d7150b176ecfc29")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "3" and $selectionSysmon3_emanueledelucia.target.ip = "185.99.133.72")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "13" and $selectionSysmon3_emanueledelucia.target.registry.registry_key = "Software\\Microsoft\\Windows\\CurrentVersion\\Run\\UIMgr")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "02c46f30f4c68a442cf7e13bebe8d3f8")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "1aedaa67e7613594c135177f2973e2c7")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "602d2901d55c2720f955503456ac2f68")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "602d2901d55c2720f955503456ac2f68")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and ($selectionSysmon3_emanueledelucia.target.file.md5 = "3eaf97b9c6b44f0447f2bd1c7acb8c96" or $selectionSysmon3_emanueledelucia.target.file.md5 = "6bc5f53d4082f12dd83aca45bae81e64" or $selectionSysmon3_emanueledelucia.target.file.md5 = "333d2b9e99b36fb42f9e79a2833fad9c")) or $selectionSysmon3_emanueledelucia.target.ip = "89.37.226.123" or $selectionSysmon3_emanueledelucia.target.url = "/advance/portable_version/service.php") or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and ($selectionSysmon3_emanueledelucia.target.file.md5 = "84352ccad3cfa152d98cf76b08623b92" or $selectionSysmon3_emanueledelucia.target.file.md5 = "fe0da70a592d25ddbfbd47b22f88542f" or $selectionSysmon3_emanueledelucia.target.file.md5 = "4384c701308a9d3aa92f49615ec74b2d" or $selectionSysmon3_emanueledelucia.target.file.md5 = "26b213343bac2b4c69a261a2f5c00e89" or $selectionSysmon3_emanueledelucia.target.file.md5 = "47a026d93ae8e0cc292e8d7a71ddc89e"))) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "11" and ($selectionSysmon3_emanueledelucia.target.file.full_path = "C:\\Users\\Public\\dset.ini" or $selectionSysmon3_emanueledelucia.target.file.full_path = "C:\\Users\\Public\\boot.ini" or $selectionSysmon3_emanueledelucia.target.file.full_path = "C:\\Users\\Public\\kla.bin" or $selectionSysmon3_emanueledelucia.target.file.full_path = "C:\\Users\\Public\\officeexcp.bin" or $selectionSysmon3_emanueledelucia.target.file.full_path = "C:\\Users\\Public\\dset.ini"))) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and ($selectionSysmon3_emanueledelucia.target.file.md5 = "ea553c3de3fffbfa047e8e0eb2557b8b" or $selectionSysmon3_emanueledelucia.target.file.md5 = "8da56a4b1a5ff8e4643421a5fefb5dc4" or $selectionSysmon3_emanueledelucia.target.file.md5 = "a225d457c3396e647ffc710cd1edd4c74dc57152"))) condition: $selectionSysmon3_emanueledelucia } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/apt28_zekapab_zebrocy_cannon_implant__sysmon_firewall_proxy___part_2.yaral
rule apt28_zekapabzebrocycannon_implant_sysmonfirewallproxy_part2 { events: ((((((((((((($selectionSysmon3_emanueledelucia.target.url = "https://beatguitar.com/n2qqsy/hpse0/sy/yasfy8/msayzp/lw.sip/?n=vxl0bnijnmttnsficoq=" or $selectionSysmon3_emanueledelucia.target.url = "beatguitar.com" or $selectionSysmon3_emanueledelucia.target.ip = "185.99.133.72") or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "549726b8bfb1919a343ac764d48fdc81")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "43d7ffd611932cf51d7150b176ecfc29")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "3" and $selectionSysmon3_emanueledelucia.target.ip = "185.99.133.72")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "13" and $selectionSysmon3_emanueledelucia.target.registry.registry_key = "Software\\Microsoft\\Windows\\CurrentVersion\\Run\\UIMgr")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "02c46f30f4c68a442cf7e13bebe8d3f8")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "1aedaa67e7613594c135177f2973e2c7")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "602d2901d55c2720f955503456ac2f68")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and $selectionSysmon3_emanueledelucia.target.file.md5 = "602d2901d55c2720f955503456ac2f68")) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and ($selectionSysmon3_emanueledelucia.target.file.md5 = "3eaf97b9c6b44f0447f2bd1c7acb8c96" or $selectionSysmon3_emanueledelucia.target.file.md5 = "6bc5f53d4082f12dd83aca45bae81e64" or $selectionSysmon3_emanueledelucia.target.file.md5 = "333d2b9e99b36fb42f9e79a2833fad9c")) or $selectionSysmon3_emanueledelucia.target.ip = "89.37.226.123" or $selectionSysmon3_emanueledelucia.target.url = "/advance/portable_version/service.php") or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and ($selectionSysmon3_emanueledelucia.target.file.md5 = "84352ccad3cfa152d98cf76b08623b92" or $selectionSysmon3_emanueledelucia.target.file.md5 = "fe0da70a592d25ddbfbd47b22f88542f" or $selectionSysmon3_emanueledelucia.target.file.md5 = "4384c701308a9d3aa92f49615ec74b2d" or $selectionSysmon3_emanueledelucia.target.file.md5 = "26b213343bac2b4c69a261a2f5c00e89" or $selectionSysmon3_emanueledelucia.target.file.md5 = "47a026d93ae8e0cc292e8d7a71ddc89e"))) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "11" and ($selectionSysmon3_emanueledelucia.target.file.full_path = "C:\\Users\\Public\\dset.ini" or $selectionSysmon3_emanueledelucia.target.file.full_path = "C:\\Users\\Public\\boot.ini" or $selectionSysmon3_emanueledelucia.target.file.full_path = "C:\\Users\\Public\\kla.bin" or $selectionSysmon3_emanueledelucia.target.file.full_path = "C:\\Users\\Public\\officeexcp.bin" or $selectionSysmon3_emanueledelucia.target.file.full_path = "C:\\Users\\Public\\dset.ini"))) or ($selectionSysmon3_emanueledelucia.metadata.product_event_type = "1" and ($selectionSysmon3_emanueledelucia.target.file.md5 = "ea553c3de3fffbfa047e8e0eb2557b8b" or $selectionSysmon3_emanueledelucia.target.file.md5 = "8da56a4b1a5ff8e4643421a5fefb5dc4" or $selectionSysmon3_emanueledelucia.target.file.md5 = "a225d457c3396e647ffc710cd1edd4c74dc57152"))) condition: $selectionSysmon3_emanueledelucia }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule registry_explorer_tool_detector { events: ($selection.metadata.product_event_type = "1" and re.regex($selection.target.process.file.full_path, `.*\\RECmd\.exe`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/registry_explorer_tool_detector.yaral
rule registry_explorer_tool_detector { events: ($selection.metadata.product_event_type = "1" and re.regex($selection.target.process.file.full_path, `.*\\RECmd\.exe`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule psexec_detector { events: ($selection.metadata.product_event_type = "1" and re.regex($selection.target.process.file.full_path, `.*\\PsExec\.exe`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/sysmon/psexec_detector.yaral
rule psexec_detector { events: ($selection.metadata.product_event_type = "1" and re.regex($selection.target.process.file.full_path, `.*\\PsExec\.exe`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule remote_system_discovery__ping_sweep { events: ($selection1.target.process.file.full_path = "ping.exe" and (re.regex($selection1.target.process.command_line, `.* for /l %i in \(1,1,254\) do ping -n 1 -w 100 192\.168\.1\.%i .*`) or re.regex($selection1.target.process.command_line, `.*for /l %i in \(1,1,254\) do ping -n 1 -w 100 .*\..*\..*\.%i.*`)) and ($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1")) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/process_creation/remote_system_discovery___ping_sweep.yaral
rule remote_system_discovery__ping_sweep { events: ($selection1.target.process.file.full_path = "ping.exe" and (re.regex($selection1.target.process.command_line, `.* for /l %i in \(1,1,254\) do ping -n 1 -w 100 192\.168\.1\.%i .*`) or re.regex($selection1.target.process.command_line, `.*for /l %i in \(1,1,254\) do ping -n 1 -w 100 .*\..*\..*\.%i.*`)) and ($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1")) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule wastedlocker_ransomware_hunting_initial_access_and_compromise { events: ($selection1.target.process.file.full_path = "wscript.exe" and re.regex($selection1.target.process.command_line, `wscript\.exe C:\\Users.*\\AppData\\Local\\Temp\\Temp1_Chrome\.Update\.b343b0\.zip\\Chrome\.Update\.c9a747\.js`) and ($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1")) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/process_creation/wastedlocker_ransomware_hunting__initial_access_and_compromise.yaral
rule wastedlocker_ransomware_hunting_initial_access_and_compromise { events: ($selection1.target.process.file.full_path = "wscript.exe" and re.regex($selection1.target.process.command_line, `wscript\.exe C:\\Users.*\\AppData\\Local\\Temp\\Temp1_Chrome\.Update\.b343b0\.zip\\Chrome\.Update\.c9a747\.js`) and ($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1")) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule possible_privilege_escalation_attack_using_dllhostexe { events: (re.regex($selection.target.process.file.full_path, `.*dllhost\.exe`) and (re.regex($selection.target.process.command_line, `.*Windows\\.*\\DllHost\.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}.*`) or re.regex($selection.target.process.command_line, `.*Windows\\.*\\DllHost\.exe /Processid:{D2E7041B-2927-42fb-8E9F-7CE93B6DC937}.*`)) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/process_creation/possible_privilege_escalation_attack_using_dllhost_exe.yaral
rule possible_privilege_escalation_attack_using_dllhostexe { events: (re.regex($selection.target.process.file.full_path, `.*dllhost\.exe`) and (re.regex($selection.target.process.command_line, `.*Windows\\.*\\DllHost\.exe /Processid:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}.*`) or re.regex($selection.target.process.command_line, `.*Windows\\.*\\DllHost\.exe /Processid:{D2E7041B-2927-42fb-8E9F-7CE93B6DC937}.*`)) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule apt10_behavior { events: (($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1") and (($selection1.target.process.file.full_path = "cmd.exe" and (re.regex($selection1.target.process.command_line, `.*/c certutil -decode C:\\ProgramData\\padre1\.txt C:\\ProgramData.*\\GUP\.txt.*`) or re.regex($selection1.target.process.command_line, `.*/c certutil -decode C:\\ProgramData\\padre2\.txt C:\\ProgramData.*\\libcurl\.txt.*`) or re.regex($selection1.target.process.command_line, `.* /c certutil -decode C:\\ProgramData\\padre3\.txt C:\\ProgramData.*\\3F2E3AB9 .*`))) or ($selection1.target.process.file.full_path = "esentutl.exe" and (re.regex($selection1.target.process.command_line, `.* /y C:\\ProgramData.*\\GUP\.txt /d C:\\ProgramData\\GUP\.exe /o .*`) or re.regex($selection1.target.process.command_line, `.* /y C:\\ProgramData.*\\libcurl\.txt /d C:\\ProgramData\\libcurl\.dll /o .*`))))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/process_creation/apt10_behavior.yaral
rule apt10_behavior { events: (($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1") and (($selection1.target.process.file.full_path = "cmd.exe" and (re.regex($selection1.target.process.command_line, `.*/c certutil -decode C:\\ProgramData\\padre1\.txt C:\\ProgramData.*\\GUP\.txt.*`) or re.regex($selection1.target.process.command_line, `.*/c certutil -decode C:\\ProgramData\\padre2\.txt C:\\ProgramData.*\\libcurl\.txt.*`) or re.regex($selection1.target.process.command_line, `.* /c certutil -decode C:\\ProgramData\\padre3\.txt C:\\ProgramData.*\\3F2E3AB9 .*`))) or ($selection1.target.process.file.full_path = "esentutl.exe" and (re.regex($selection1.target.process.command_line, `.* /y C:\\ProgramData.*\\GUP\.txt /d C:\\ProgramData\\GUP\.exe /o .*`) or re.regex($selection1.target.process.command_line, `.* /y C:\\ProgramData.*\\libcurl\.txt /d C:\\ProgramData\\libcurl\.dll /o .*`))))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule lazarus_attack_variant { events: (($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1") and (($selection1.target.process.file.full_path = "move.exe" and ($selection1.target.process.command_line = "move \"c:\\perflogs\\1.dat\" \"c:\\programdata\\microsoft\\sqcsvc\\sqcsvc6.ldx\"" or $selection1.target.process.command_line = "move \"c:\\perflogs\\1.dll\" \"c:\\windows\\system32\\sqcsvc.dll\"" or $selection1.target.process.command_line = "move \"c:\\perflogs\\1.dll.mui\" \"c:\\windows\\system32\\sqcsvc.dll.mui\"")) or ($selection1.target.process.file.full_path = "reg.exe" and ($selection1.target.process.command_line = "reg add \"HKLM\\SYSTEM\\ControlSet001\\Services\\sqcsvc\\Parameters\" /v ServiceDll /t REG_EXPAND_SZ /d \"%SystemRoot%\\System32\\sqcsvc.dll\"" or $selection1.target.process.command_line = "reg add \"HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Svchost\" /v sqcsvc /t REG_ MULTI_SZ /d sqcsvc")))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/process_creation/lazarus_attack_variant.yaral
rule lazarus_attack_variant { events: (($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1") and (($selection1.target.process.file.full_path = "move.exe" and ($selection1.target.process.command_line = "move \"c:\\perflogs\\1.dat\" \"c:\\programdata\\microsoft\\sqcsvc\\sqcsvc6.ldx\"" or $selection1.target.process.command_line = "move \"c:\\perflogs\\1.dll\" \"c:\\windows\\system32\\sqcsvc.dll\"" or $selection1.target.process.command_line = "move \"c:\\perflogs\\1.dll.mui\" \"c:\\windows\\system32\\sqcsvc.dll.mui\"")) or ($selection1.target.process.file.full_path = "reg.exe" and ($selection1.target.process.command_line = "reg add \"HKLM\\SYSTEM\\ControlSet001\\Services\\sqcsvc\\Parameters\" /v ServiceDll /t REG_EXPAND_SZ /d \"%SystemRoot%\\System32\\sqcsvc.dll\"" or $selection1.target.process.command_line = "reg add \"HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Svchost\" /v sqcsvc /t REG_ MULTI_SZ /d sqcsvc")))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule wastedlocker_ransomware_hunting_credential_dumping { events: ($selection1.target.process.file.full_path = "reg.exe" and ($selection1.target.process.command_line = "reg save HKLM\\SAM C:\\programdata\\SamBkup.hiv" or $selection1.target.process.command_line = "reg save HKLM\\SYSTEM C:\\programdata\\FileName.hiv") and ($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1")) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/process_creation/wastedlocker_ransomware_hunting__credential_dumping.yaral
rule wastedlocker_ransomware_hunting_credential_dumping { events: ($selection1.target.process.file.full_path = "reg.exe" and ($selection1.target.process.command_line = "reg save HKLM\\SAM C:\\programdata\\SamBkup.hiv" or $selection1.target.process.command_line = "reg save HKLM\\SYSTEM C:\\programdata\\FileName.hiv") and ($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1")) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule netwire_rat_detection_via_wscript { events: ((re.regex($selection.target.process.file.full_path, `.*\\wscript\.exe`) and (re.regex($selection.target.process.command_line, `.* C:\\Users\\.*\.vbs .*`) or re.regex($selection.target.process.command_line, `.* C:\\Users\\admin\\AppData\\.*\.vbs .*`) or re.regex($selection.target.process.command_line, `.* C:\\Users\\admin\\AppData\\OneDrive\.vbs .*`)) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1")) and not (re.regex($selection.principal.process.file.full_path, `.*\\winrar.*`))) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/process_creation/netwire_rat_detection_via_wscript.yaral
rule netwire_rat_detection_via_wscript { events: ((re.regex($selection.target.process.file.full_path, `.*\\wscript\.exe`) and (re.regex($selection.target.process.command_line, `.* C:\\Users\\.*\.vbs .*`) or re.regex($selection.target.process.command_line, `.* C:\\Users\\admin\\AppData\\.*\.vbs .*`) or re.regex($selection.target.process.command_line, `.* C:\\Users\\admin\\AppData\\OneDrive\.vbs .*`)) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1")) and not (re.regex($selection.principal.process.file.full_path, `.*\\winrar.*`))) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule t1214__credentials_in_registry { events: ($selection1.target.process.file.full_path = "reg.exe" and ($selection1.target.process.command_line = "reg query HKLM /f password /t REG_SZ /s" or $selection1.target.process.command_line = "reg query HKCU /f password /t REG_SZ /s") and ($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1")) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/process_creation/t1214___credentials_in_registry.yaral
rule t1214__credentials_in_registry { events: ($selection1.target.process.file.full_path = "reg.exe" and ($selection1.target.process.command_line = "reg query HKLM /f password /t REG_SZ /s" or $selection1.target.process.command_line = "reg query HKCU /f password /t REG_SZ /s") and ($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1")) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule fileless_attack_via_regsvr32exe { events: (re.regex($selection.target.process.command_line, `.*regsvr32.*`) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1") and re.regex($selection.target.process.command_line, `.*/s.*`) and re.regex($selection.target.process.command_line, `.*/i.*`) and (re.regex($selection.target.process.command_line, `.*\.txt.*`) or re.regex($selection.target.process.command_line, `.*\.dll.*`))) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/process_creation/fileless_attack_via_regsvr32_exe.yaral
rule fileless_attack_via_regsvr32exe { events: (re.regex($selection.target.process.command_line, `.*regsvr32.*`) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1") and re.regex($selection.target.process.command_line, `.*/s.*`) and re.regex($selection.target.process.command_line, `.*/i.*`) and (re.regex($selection.target.process.command_line, `.*\.txt.*`) or re.regex($selection.target.process.command_line, `.*\.dll.*`))) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule wastedlocker_ransomware_hunting_defense_evasion { events: (($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1") and ((($selection1.target.process.file.full_path = "cvtres.exe" and re.regex($selection1.target.process.command_line, `.*cvtres\.exe /NOLOGO /READONLY /MACHINE:.* /OUT:C:\\Users.*\\AppData\\Local\\Temp\\RESF8F4\.tmp c:\\Users.*\\AppData\\Local\\Temp\\h4bie4kg\\CSC81E10858D57A44649763EE5728D5E87\.TMP.*`)) or ($selection1.target.process.file.full_path = "PsExec.exe.exe" and re.regex($selection1.target.process.command_line, `PsExec\.exe -s .* cmd /c for /F tokens=.* %1 in \('wevtutil\.exe el'\) DO wevtutil\.exe cl %1`))) or ($selection1.target.process.file.full_path = "csc.exe" and re.regex($selection1.target.process.command_line, `csc\.exe /noconfig /fullpaths @C:\\Users.*\\AppData\\Local\\Temp\\h4bie4kg\\h4bie4kg\.cmdline`)))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/process_creation/wastedlocker_ransomware_hunting__defense_evasion.yaral
rule wastedlocker_ransomware_hunting_defense_evasion { events: (($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1") and ((($selection1.target.process.file.full_path = "cvtres.exe" and re.regex($selection1.target.process.command_line, `.*cvtres\.exe /NOLOGO /READONLY /MACHINE:.* /OUT:C:\\Users.*\\AppData\\Local\\Temp\\RESF8F4\.tmp c:\\Users.*\\AppData\\Local\\Temp\\h4bie4kg\\CSC81E10858D57A44649763EE5728D5E87\.TMP.*`)) or ($selection1.target.process.file.full_path = "PsExec.exe.exe" and re.regex($selection1.target.process.command_line, `PsExec\.exe -s .* cmd /c for /F tokens=.* %1 in \('wevtutil\.exe el'\) DO wevtutil\.exe cl %1`))) or ($selection1.target.process.file.full_path = "csc.exe" and re.regex($selection1.target.process.command_line, `csc\.exe /noconfig /fullpaths @C:\\Users.*\\AppData\\Local\\Temp\\h4bie4kg\\h4bie4kg\.cmdline`)))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule system_information_gathering_via_wmicexe { events: (re.regex($selection1.target.process.file.full_path, `.*wmic\.exe`) and (re.regex($selection1.target.process.command_line, `.* .* DESKTOPMONITOR get pnpdeviceid .*`) or re.regex($selection1.target.process.command_line, `.* .* SOUNDDEV get pnpdeviceid .*`) or re.regex($selection1.target.process.command_line, `.* .* bios get serialnumber .*`) or re.regex($selection1.target.process.command_line, `.* .* baseboard get serialnumber .*`) or re.regex($selection1.target.process.command_line, `.* .* diskdrive get pnpdeviceid .*`) or re.regex($selection1.target.process.command_line, `.* .* cpu get processorid .*`)) and ($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1")) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/process_creation/system_information_gathering_via_wmic_exe.yaral
rule system_information_gathering_via_wmicexe { events: (re.regex($selection1.target.process.file.full_path, `.*wmic\.exe`) and (re.regex($selection1.target.process.command_line, `.* .* DESKTOPMONITOR get pnpdeviceid .*`) or re.regex($selection1.target.process.command_line, `.* .* SOUNDDEV get pnpdeviceid .*`) or re.regex($selection1.target.process.command_line, `.* .* bios get serialnumber .*`) or re.regex($selection1.target.process.command_line, `.* .* baseboard get serialnumber .*`) or re.regex($selection1.target.process.command_line, `.* .* diskdrive get pnpdeviceid .*`) or re.regex($selection1.target.process.command_line, `.* .* cpu get processorid .*`)) and ($selection1.metadata.product_event_type = "4688" or $selection1.metadata.product_event_type = "1")) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule antivirus_password_dumper_detection { events: (re.regex($selection.target.registry.registry_value_data, `.*DumpCreds.*`) or re.regex($selection.target.registry.registry_value_data, `.*Mimikatz.*`) or re.regex($selection.target.registry.registry_value_data, `.*PWCrack.*`) or $selection.target.registry.registry_value_data = "HTool/WCE" or re.regex($selection.target.registry.registry_value_data, `.*PSWtool.*`) or re.regex($selection.target.registry.registry_value_data, `.*PWDump.*`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/antivirus/antivirus_password_dumper_detection.yaral
rule antivirus_password_dumper_detection { events: (re.regex($selection.target.registry.registry_value_data, `.*DumpCreds.*`) or re.regex($selection.target.registry.registry_value_data, `.*Mimikatz.*`) or re.regex($selection.target.registry.registry_value_data, `.*PWCrack.*`) or $selection.target.registry.registry_value_data = "HTool/WCE" or re.regex($selection.target.registry.registry_value_data, `.*PSWtool.*`) or re.regex($selection.target.registry.registry_value_data, `.*PWDump.*`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule solarwinds_backdoor_c2_host_name_detected_via_dns { events: (re.regex($selection.network.dns.questions.name, `.*avsvmcloud\.com`) or re.regex($selection.network.dns.questions.name, `.*databasegalore\.com`) or re.regex($selection.network.dns.questions.name, `.*deftsecurity\.com`) or re.regex($selection.network.dns.questions.name, `.*freescanonline\.com`) or re.regex($selection.network.dns.questions.name, `.*panhardware\.com`) or re.regex($selection.network.dns.questions.name, `.*thedoccloud\.com`) or re.regex($selection.network.dns.questions.name, `.*incomeupdate\.com`) or re.regex($selection.network.dns.questions.name, `.*zupertech\.com`) or re.regex($selection.network.dns.questions.name, `.*digitalcollege\.org`) or re.regex($selection.network.dns.questions.name, `.*virtualdataserver\.com`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/dns/solarwinds_backdoor_c2_host_name_detected___via_dns.yaral
rule solarwinds_backdoor_c2_host_name_detected_via_dns { events: (re.regex($selection.network.dns.questions.name, `.*avsvmcloud\.com`) or re.regex($selection.network.dns.questions.name, `.*databasegalore\.com`) or re.regex($selection.network.dns.questions.name, `.*deftsecurity\.com`) or re.regex($selection.network.dns.questions.name, `.*freescanonline\.com`) or re.regex($selection.network.dns.questions.name, `.*panhardware\.com`) or re.regex($selection.network.dns.questions.name, `.*thedoccloud\.com`) or re.regex($selection.network.dns.questions.name, `.*incomeupdate\.com`) or re.regex($selection.network.dns.questions.name, `.*zupertech\.com`) or re.regex($selection.network.dns.questions.name, `.*digitalcollege\.org`) or re.regex($selection.network.dns.questions.name, `.*virtualdataserver\.com`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule flawedammyy_rat_detection_proxy { events: (($selectionSRC.target.url = "chimachinenow.com" or $selectionSRC.target.url = "highlandfamily.org" or $selectionSRC.target.url = "intra.cfecgcaquitaine.com" or $selectionSRC.target.url = "motifahsap.com" or $selectionSRC.target.url = "sittalhaphedver.com" or $selectionSRC.target.url = "wassronledorhad.in" or $selectionSRC.target.url = "balzantruck.com" or $selectionSRC.target.url = "buyviagraoverthecounterusabb.net" or $selectionSRC.target.url = "fifa2018start.info" or $selectionSRC.target.url = "buyviagraoverthecounterusabb.net/documents/B123456789012.js" or $selectionSRC.target.url = "chimachinenow.com/kjdhc783" or $selectionSRC.target.url = "highlandfamily.org/kjdhc783" or $selectionSRC.target.url = "intra.cfecgcaquitaine.com/kjdhc783" or $selectionSRC.target.url = "motifahsap.com/kjdhc783" or $selectionSRC.target.url = "sittalhaphedver.com/p66/kjdhc783" or $selectionSRC.target.url = "wassronledorhad.in/q2/index.php" or $selectionSRC.target.url = "balzantruck.com/45rt.exe") or ($selectionSRC.principal.ip = "179.60.146.3" or $selectionSRC.principal.ip = "185.176.221.54" or $selectionSRC.principal.ip = "179.60.146.3" or $selectionSRC.principal.ip = "194.165.16.11") or ($selectionSRC.target.ip = "179.60.146.3" or $selectionSRC.target.ip = "185.176.221.54" or $selectionSRC.target.ip = "179.60.146.3" or $selectionSRC.target.ip = "194.165.16.11")) condition: $selectionSRC } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/flawedammyy_rat_detection__proxy.yaral
rule flawedammyy_rat_detection_proxy { events: (($selectionSRC.target.url = "chimachinenow.com" or $selectionSRC.target.url = "highlandfamily.org" or $selectionSRC.target.url = "intra.cfecgcaquitaine.com" or $selectionSRC.target.url = "motifahsap.com" or $selectionSRC.target.url = "sittalhaphedver.com" or $selectionSRC.target.url = "wassronledorhad.in" or $selectionSRC.target.url = "balzantruck.com" or $selectionSRC.target.url = "buyviagraoverthecounterusabb.net" or $selectionSRC.target.url = "fifa2018start.info" or $selectionSRC.target.url = "buyviagraoverthecounterusabb.net/documents/B123456789012.js" or $selectionSRC.target.url = "chimachinenow.com/kjdhc783" or $selectionSRC.target.url = "highlandfamily.org/kjdhc783" or $selectionSRC.target.url = "intra.cfecgcaquitaine.com/kjdhc783" or $selectionSRC.target.url = "motifahsap.com/kjdhc783" or $selectionSRC.target.url = "sittalhaphedver.com/p66/kjdhc783" or $selectionSRC.target.url = "wassronledorhad.in/q2/index.php" or $selectionSRC.target.url = "balzantruck.com/45rt.exe") or ($selectionSRC.principal.ip = "179.60.146.3" or $selectionSRC.principal.ip = "185.176.221.54" or $selectionSRC.principal.ip = "179.60.146.3" or $selectionSRC.principal.ip = "194.165.16.11") or ($selectionSRC.target.ip = "179.60.146.3" or $selectionSRC.target.ip = "185.176.221.54" or $selectionSRC.target.ip = "179.60.146.3" or $selectionSRC.target.ip = "194.165.16.11")) condition: $selectionSRC }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule njrat_ratbackdoor_proxy { events: ($selectionURL.target.url = "http://ghancommercialbank.com/msn/newclient.exe" or $selectionURL.target.url = "http://f.top4top.net/p_3667b75e1.png" or $selectionURL.target.url = "http://f.top4top.net/p_42526hb61.png" or $selectionURL.target.url = "http://cdn.discordapp.com/attachments/482228034632548363/506077641061826561/doublepumpcheck.exe" or $selectionURL.target.url = "http://cdn.discordapp.com/attachments/482925954109276160/507526114491498496/photoshop.exe" or $selectionURL.target.url = "https://cdn.discordapp.com/attachments/436298448665575427/481620773501534208/111111111.exe" or $selectionURL.target.url = "http://ldrldr.icu/njr.exe" or $selectionURL.target.url = "http://kapitanbomba.hopto.org/file.exe" or $selectionURL.target.url = "https://s3.us-east-2.amazonaws.com/qued/xwizard.exe" or $selectionURL.target.url = "https://cdn.discordapp.com/attachments/498525611422121996/507533173954183170/Server.exe") condition: $selectionURL } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/njrat_rat_backdoor__proxy.yaral
rule njrat_ratbackdoor_proxy { events: ($selectionURL.target.url = "http://ghancommercialbank.com/msn/newclient.exe" or $selectionURL.target.url = "http://f.top4top.net/p_3667b75e1.png" or $selectionURL.target.url = "http://f.top4top.net/p_42526hb61.png" or $selectionURL.target.url = "http://cdn.discordapp.com/attachments/482228034632548363/506077641061826561/doublepumpcheck.exe" or $selectionURL.target.url = "http://cdn.discordapp.com/attachments/482925954109276160/507526114491498496/photoshop.exe" or $selectionURL.target.url = "https://cdn.discordapp.com/attachments/436298448665575427/481620773501534208/111111111.exe" or $selectionURL.target.url = "http://ldrldr.icu/njr.exe" or $selectionURL.target.url = "http://kapitanbomba.hopto.org/file.exe" or $selectionURL.target.url = "https://s3.us-east-2.amazonaws.com/qued/xwizard.exe" or $selectionURL.target.url = "https://cdn.discordapp.com/attachments/498525611422121996/507533173954183170/Server.exe") condition: $selectionURL }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule detecting_phishing_domains_proxy { events: (($selection_URLs_1.target.url = "com-managers-updateds-notifications-accounts.com" or $selection_URLs_1.target.url = "com-updated-manager-notifications-accounts.info" or $selection_URLs_1.target.url = "com-index-managers-updateds-notifications-accounts.com" or $selection_URLs_1.target.url = "com-notice-index-managers-review-accounts.com" or $selection_URLs_1.target.url = "appleid.com-notice-index-managers-review-accounts.com" or $selection_URLs_1.target.url = "appleid.com-index-managers-updateds-notifications-accounts.com" or $selection_URLs_1.target.url = "appleid.com-updated-manager-notifications-accounts.info" or $selection_URLs_1.target.url = "appleid.com-manager-updateds-account-notifeds.com" or $selection_URLs_1.target.url = "com-manager-updateds-account-notifeds.com" or $selection_URLs_1.target.url = "appleid.com-managers-updateds-notifications-accounts.com" or $selection_URLs_1.target.url = "appleid.com-index-managers-updateds-notifications-accounts.info" or $selection_URLs_1.target.url = "com-index-managers-updateds-notifications-accounts.info") or ($selection_URLs_1.target.url = "com-authenticationid-account-id-291175.com" or $selection_URLs_1.target.url = "com-authentication-account-id-67800.com" or $selection_URLs_1.target.url = "account-signinid.com-authentication-account-id-67800.com" or $selection_URLs_1.target.url = "com-reviewid-account-authenticationid-11250.com" or $selection_URLs_1.target.url = "com-authentication-account-id-67991.com" or $selection_URLs_1.target.url = "accountid-signin.com-authenticationid-account-id-291175.com") or ($selection_URLs_1.target.url = "reverify-id-apple.com" or $selection_URLs_1.target.url = "re-verify-id-apple.com" or $selection_URLs_1.target.url = "reverify-id-apple.com" or $selection_URLs_1.target.url = "un-verify-id-apple.com" or $selection_URLs_1.target.url = "unverify-id-apple.com" or $selection_URLs_1.target.url = "re-verify-id-apple.com" or $selection_URLs_1.target.url = "unverify-id-apple.com" or $selection_URLs_1.target.url = "www.unverify-id-apple.com" or $selection_URLs_1.target.url = "un-verify-id-apple.com" or $selection_URLs_1.target.url = "wazze-design.com" or $selection_URLs_1.target.url = "www.wazze-design.com" or $selection_URLs_1.target.url = "www.re-verify-id-apple.com" or $selection_URLs_1.target.url = "www.reverify-id-apple.com" or $selection_URLs_1.target.url = "www.un-verify-id-apple.com" or $selection_URLs_1.target.url = "ns1.stitis.com" or $selection_URLs_1.target.url = "ns2.stitis.com" or $selection_URLs_1.target.url = "disable-id-apple.com" or $selection_URLs_1.target.url = "www.support-id-icloud.com" or $selection_URLs_1.target.url = "apple.com-verif-id.app") or ($selection_URLs_1.target.url = "pages-secure.com-verifications-account-webservices-appleid.com" or $selection_URLs_1.target.url = "com-verifications-account-webservices-appleid.com" or $selection_URLs_1.target.url = "com-verifications-account-webservices-appleid.com" or $selection_URLs_1.target.url = "com-page-secure-webmail-supportcenter.com" or $selection_URLs_1.target.url = "identification-account.com-page-secure-webmail-supportcenter.com" or $selection_URLs_1.target.url = "www.com-page-secure-webmail-supportcenter.com" or $selection_URLs_1.target.url = "com-page-secure-webmail-supportcenter.com")) condition: $selection_URLs_1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/detecting_phishing_domains__proxy.yaral
rule detecting_phishing_domains_proxy { events: (($selection_URLs_1.target.url = "com-managers-updateds-notifications-accounts.com" or $selection_URLs_1.target.url = "com-updated-manager-notifications-accounts.info" or $selection_URLs_1.target.url = "com-index-managers-updateds-notifications-accounts.com" or $selection_URLs_1.target.url = "com-notice-index-managers-review-accounts.com" or $selection_URLs_1.target.url = "appleid.com-notice-index-managers-review-accounts.com" or $selection_URLs_1.target.url = "appleid.com-index-managers-updateds-notifications-accounts.com" or $selection_URLs_1.target.url = "appleid.com-updated-manager-notifications-accounts.info" or $selection_URLs_1.target.url = "appleid.com-manager-updateds-account-notifeds.com" or $selection_URLs_1.target.url = "com-manager-updateds-account-notifeds.com" or $selection_URLs_1.target.url = "appleid.com-managers-updateds-notifications-accounts.com" or $selection_URLs_1.target.url = "appleid.com-index-managers-updateds-notifications-accounts.info" or $selection_URLs_1.target.url = "com-index-managers-updateds-notifications-accounts.info") or ($selection_URLs_1.target.url = "com-authenticationid-account-id-291175.com" or $selection_URLs_1.target.url = "com-authentication-account-id-67800.com" or $selection_URLs_1.target.url = "account-signinid.com-authentication-account-id-67800.com" or $selection_URLs_1.target.url = "com-reviewid-account-authenticationid-11250.com" or $selection_URLs_1.target.url = "com-authentication-account-id-67991.com" or $selection_URLs_1.target.url = "accountid-signin.com-authenticationid-account-id-291175.com") or ($selection_URLs_1.target.url = "reverify-id-apple.com" or $selection_URLs_1.target.url = "re-verify-id-apple.com" or $selection_URLs_1.target.url = "reverify-id-apple.com" or $selection_URLs_1.target.url = "un-verify-id-apple.com" or $selection_URLs_1.target.url = "unverify-id-apple.com" or $selection_URLs_1.target.url = "re-verify-id-apple.com" or $selection_URLs_1.target.url = "unverify-id-apple.com" or $selection_URLs_1.target.url = "www.unverify-id-apple.com" or $selection_URLs_1.target.url = "un-verify-id-apple.com" or $selection_URLs_1.target.url = "wazze-design.com" or $selection_URLs_1.target.url = "www.wazze-design.com" or $selection_URLs_1.target.url = "www.re-verify-id-apple.com" or $selection_URLs_1.target.url = "www.reverify-id-apple.com" or $selection_URLs_1.target.url = "www.un-verify-id-apple.com" or $selection_URLs_1.target.url = "ns1.stitis.com" or $selection_URLs_1.target.url = "ns2.stitis.com" or $selection_URLs_1.target.url = "disable-id-apple.com" or $selection_URLs_1.target.url = "www.support-id-icloud.com" or $selection_URLs_1.target.url = "apple.com-verif-id.app") or ($selection_URLs_1.target.url = "pages-secure.com-verifications-account-webservices-appleid.com" or $selection_URLs_1.target.url = "com-verifications-account-webservices-appleid.com" or $selection_URLs_1.target.url = "com-verifications-account-webservices-appleid.com" or $selection_URLs_1.target.url = "com-page-secure-webmail-supportcenter.com" or $selection_URLs_1.target.url = "identification-account.com-page-secure-webmail-supportcenter.com" or $selection_URLs_1.target.url = "www.com-page-secure-webmail-supportcenter.com" or $selection_URLs_1.target.url = "com-page-secure-webmail-supportcenter.com")) condition: $selection_URLs_1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule lojax_malware_proxyfirewall { events: (($SelectionSRC.principal.ip = "185.77.129.106" or $SelectionSRC.principal.ip = "185.144.82.239" or $SelectionSRC.principal.ip = "93.113.131.103" or $SelectionSRC.principal.ip = "185.86.149.54" or $SelectionSRC.principal.ip = "185.86.151.104" or $SelectionSRC.principal.ip = "103.41.177.43" or $SelectionSRC.principal.ip = "185.86.148.184" or $SelectionSRC.principal.ip = "185.94.191.65" or $SelectionSRC.principal.ip = "86.106.131.54" or $SelectionSRC.principal.ip = "169.239.12.133" or $SelectionSRC.principal.ip = "185.86.151.2") or ($SelectionSRC.target.ip = "185.77.129.106" or $SelectionSRC.target.ip = "185.144.82.239" or $SelectionSRC.target.ip = "93.113.131.103" or $SelectionSRC.target.ip = "185.86.149.54" or $SelectionSRC.target.ip = "185.86.151.104" or $SelectionSRC.target.ip = "103.41.177.43" or $SelectionSRC.target.ip = "185.86.148.184" or $SelectionSRC.target.ip = "185.94.191.65" or $SelectionSRC.target.ip = "86.106.131.54" or $SelectionSRC.target.ip = "169.239.12.133" or $SelectionSRC.target.ip = "185.86.151.2") or (re.regex($SelectionSRC.target.hostname, `.*secao\.org.*`) or re.regex($SelectionSRC.target.hostname, `.*ikmtrust\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*sysanalyticweb\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*lxwo\.org.*`) or re.regex($SelectionSRC.target.hostname, `.*jflynci\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*remotepx\.net.*`) or re.regex($SelectionSRC.target.hostname, `.*rdsnets\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*rpcnetconnect\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*webstp\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*elaxo\.org.*`))) condition: $SelectionSRC } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/lojax_malware__proxy_firewall.yaral
rule lojax_malware_proxyfirewall { events: (($SelectionSRC.principal.ip = "185.77.129.106" or $SelectionSRC.principal.ip = "185.144.82.239" or $SelectionSRC.principal.ip = "93.113.131.103" or $SelectionSRC.principal.ip = "185.86.149.54" or $SelectionSRC.principal.ip = "185.86.151.104" or $SelectionSRC.principal.ip = "103.41.177.43" or $SelectionSRC.principal.ip = "185.86.148.184" or $SelectionSRC.principal.ip = "185.94.191.65" or $SelectionSRC.principal.ip = "86.106.131.54" or $SelectionSRC.principal.ip = "169.239.12.133" or $SelectionSRC.principal.ip = "185.86.151.2") or ($SelectionSRC.target.ip = "185.77.129.106" or $SelectionSRC.target.ip = "185.144.82.239" or $SelectionSRC.target.ip = "93.113.131.103" or $SelectionSRC.target.ip = "185.86.149.54" or $SelectionSRC.target.ip = "185.86.151.104" or $SelectionSRC.target.ip = "103.41.177.43" or $SelectionSRC.target.ip = "185.86.148.184" or $SelectionSRC.target.ip = "185.94.191.65" or $SelectionSRC.target.ip = "86.106.131.54" or $SelectionSRC.target.ip = "169.239.12.133" or $SelectionSRC.target.ip = "185.86.151.2") or (re.regex($SelectionSRC.target.hostname, `.*secao\.org.*`) or re.regex($SelectionSRC.target.hostname, `.*ikmtrust\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*sysanalyticweb\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*lxwo\.org.*`) or re.regex($SelectionSRC.target.hostname, `.*jflynci\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*remotepx\.net.*`) or re.regex($SelectionSRC.target.hostname, `.*rdsnets\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*rpcnetconnect\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*webstp\.com.*`) or re.regex($SelectionSRC.target.hostname, `.*elaxo\.org.*`))) condition: $SelectionSRC }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule solarwinds_backdoor_c2_host_name_detected_via_proxy { events: (re.regex($selection.target.hostname, `.*avsvmcloud\.com`) or re.regex($selection.target.hostname, `.*databasegalore\.com`) or re.regex($selection.target.hostname, `.*deftsecurity\.com`) or re.regex($selection.target.hostname, `.*freescanonline\.com`) or re.regex($selection.target.hostname, `.*panhardware\.com`) or re.regex($selection.target.hostname, `.*thedoccloud\.com`) or re.regex($selection.target.hostname, `.*incomeupdate\.com`) or re.regex($selection.target.hostname, `.*zupertech\.com`) or re.regex($selection.target.hostname, `.*digitalcollege\.org`) or re.regex($selection.target.hostname, `.*virtualdataserver\.com`) or re.regex($selection.target.hostname, `.*lcomputers\.com`) or re.regex($selection.target.hostname, `.*webcodez\.com`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/solarwinds_backdoor_c2_host_name_detected___via_proxy.yaral
rule solarwinds_backdoor_c2_host_name_detected_via_proxy { events: (re.regex($selection.target.hostname, `.*avsvmcloud\.com`) or re.regex($selection.target.hostname, `.*databasegalore\.com`) or re.regex($selection.target.hostname, `.*deftsecurity\.com`) or re.regex($selection.target.hostname, `.*freescanonline\.com`) or re.regex($selection.target.hostname, `.*panhardware\.com`) or re.regex($selection.target.hostname, `.*thedoccloud\.com`) or re.regex($selection.target.hostname, `.*incomeupdate\.com`) or re.regex($selection.target.hostname, `.*zupertech\.com`) or re.regex($selection.target.hostname, `.*digitalcollege\.org`) or re.regex($selection.target.hostname, `.*virtualdataserver\.com`) or re.regex($selection.target.hostname, `.*lcomputers\.com`) or re.regex($selection.target.hostname, `.*webcodez\.com`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule burp_suite_scanner_and_burp_collaborator_detected_via_proxy { events: re.regex($selection.target.url, `.*burpcollaborator.*`) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/burp_suite_scanner_and_burp_collaborator_detected_via_proxy.yaral
rule burp_suite_scanner_and_burp_collaborator_detected_via_proxy { events: re.regex($selection.target.url, `.*burpcollaborator.*`) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule detecting_gamaredon_groups_cc_servers_ip_addresses_and_domains_proxy { events: (($selection1.principal.ip = "95.142.45.86" or $selection1.principal.ip = "95.142.45.58" or $selection1.principal.ip = "95.142.45.57" or $selection1.principal.ip = "95.142.45.48" or $selection1.principal.ip = "95.142.45.44" or $selection1.principal.ip = "95.142.45.185" or $selection1.principal.ip = "95.142.45.142" or $selection1.principal.ip = "95.142.45.13" or $selection1.principal.ip = "95.142.45.118" or $selection1.principal.ip = "94.130.217.187" or $selection1.principal.ip = "80.211.167.231" or $selection1.principal.ip = "5.23.55.212" or $selection1.principal.ip = "46.148.20.31" or $selection1.principal.ip = "185.231.155.12" or $selection1.principal.ip = "185.231.154.25" or $selection1.principal.ip = "185.231.154.154" or $selection1.principal.ip = "185.158.115.137") or ($selection1.target.ip = "95.142.45.86" or $selection1.target.ip = "95.142.45.58" or $selection1.target.ip = "95.142.45.57" or $selection1.target.ip = "95.142.45.48" or $selection1.target.ip = "95.142.45.44" or $selection1.target.ip = "95.142.45.185" or $selection1.target.ip = "95.142.45.142" or $selection1.target.ip = "95.142.45.13" or $selection1.target.ip = "95.142.45.118" or $selection1.target.ip = "94.130.217.187" or $selection1.target.ip = "80.211.167.231" or $selection1.target.ip = "5.23.55.212" or $selection1.target.ip = "46.148.20.31" or $selection1.target.ip = "185.231.155.12" or $selection1.target.ip = "185.231.154.25" or $selection1.target.ip = "185.231.154.154" or $selection1.target.ip = "185.158.115.137") or ($selection1.target.url = "natos-drp.ddns.net" or $selection1.target.url = "nato-drp.ddns.net" or $selection1.target.url = "updates-spreadwork.pw" or $selection1.target.url = "ukraine-news.ddns.net" or $selection1.target.url = "ukraina-drp.ddns.net" or $selection1.target.url = "tovar-es.ddns.net" or $selection1.target.url = "start-usb.ddns.net" or $selection1.target.url = "sovetkirov.ddns.net" or $selection1.target.url = "singles-office.ddns.net" or $selection1.target.url = "single-office.ddns.net" or $selection1.target.url = "yousister.ddns.net" or $selection1.target.url = "wq03.ddns.net" or $selection1.target.url = "wq02.ddns.net" or $selection1.target.url = "wq01.ddns.net" or $selection1.target.url = "werdikt.ddns.net" or $selection1.target.url = "wareface.ddns.net" or $selection1.target.url = "vnc-new.ddns.net" or $selection1.target.url = "ut03.ddns.net" or $selection1.target.url = "ut02.ddns.net" or $selection1.target.url = "ut01.ddns.net" or $selection1.target.url = "us03.ddns.net" or $selection1.target.url = "us02.ddns.net" or $selection1.target.url = "us01.ddns.net" or $selection1.target.url = "topline.myftp.org" or $selection1.target.url = "sushi-bar.ddns.net" or $selection1.target.url = "po03.ddns.net" or $selection1.target.url = "po02.ddns.net" or $selection1.target.url = "po01.ddns.net" or $selection1.target.url = "pk03.ddns.net" or $selection1.target.url = "pk02.ddns.net" or $selection1.target.url = "pk01.ddns.net" or $selection1.target.url = "orizoh88.ddns.net" or $selection1.target.url = "optima-se.ddns.net" or $selection1.target.url = "new-club.ddns.net" or $selection1.target.url = "mykarina.ddns.net" or $selection1.target.url = "microsoft-single.ddns.net" or $selection1.target.url = "metro-exodus.ddns.net" or $selection1.target.url = "marishka.ddns.net" or $selection1.target.url = "macdocs.ddns.net" or $selection1.target.url = "karasto01.ddns.net" or $selection1.target.url = "gr03.ddns.net" or $selection1.target.url = "gr02.ddns.net" or $selection1.target.url = "gr01.ddns.net" or $selection1.target.url = "connect-updates.ddns.net" or $selection1.target.url = "chrome-update.ddns.net" or $selection1.target.url = "samotsvety.com.ua" or $selection1.target.url = "admin-ru.ru" or $selection1.target.url = "adobe.update-service.net" or $selection1.target.url = "apploadapp.webhop.me" or $selection1.target.url = "brokbridge.com" or $selection1.target.url = "cat.gotdns.ch" or $selection1.target.url = "check-update.ru" or $selection1.target.url = "childrights.in.ua" or $selection1.target.url = "conhost.myftp.org" or $selection1.target.url = "docdownload.ddns.net" or $selection1.target.url = "downloads.email-attachments.ru" or $selection1.target.url = "downloads.file-attachments.ru" or $selection1.target.url = "dyndownload.serveirc.com" or $selection1.target.url = "e.muravej.ua" or $selection1.target.url = "email-attachments.ru" or $selection1.target.url = "file-attachments.ru" or $selection1.target.url = "freefiles.myftp.biz" or $selection1.target.url = "getmyfile.webhop.me" or $selection1.target.url = "googlefiles.serveftp.com" or $selection1.target.url = "grom56.ddns.net" or $selection1.target.url = "grom90.ddns.net" or $selection1.target.url = "hrome-update.ru" or $selection1.target.url = "hrome-updater.ru" or $selection1.target.url = "loaderskypetm.webhop.me" or $selection1.target.url = "loadsoulip.serveftp.com" or $selection1.target.url = "mail.file-attachments.ru" or $selection1.target.url = "mails.redirectme.net" or $selection1.target.url = "mars-ru.ru" or $selection1.target.url = "msrestore.ru" or $selection1.target.url = "oficialsite.webhop.me" or $selection1.target.url = "parkingdoma.webhop.me" or $selection1.target.url = "poligjong.webhop.me" or $selection1.target.url = "polistar.ddns.net" or $selection1.target.url = "proxy-spread.ru" or $selection1.target.url = "rms.admin-ru.ru" or $selection1.target.url = "skypeemocache.ru" or $selection1.target.url = "skypeupdate.ru" or $selection1.target.url = "spbpool.ddns.net" or $selection1.target.url = "spread-service.ru" or $selection1.target.url = "spread-ss.ru" or $selection1.target.url = "spread-updates.ru" or $selection1.target.url = "stor.tainfo.com.ua" or $selection1.target.url = "tortilla.sytes.net" or $selection1.target.url = "ukrnet.serveftp.com" or $selection1.target.url = "ukrway.galaktion.ru" or $selection1.target.url = "umachka.ua" or $selection1.target.url = "update-service.net" or $selection1.target.url = "updatesp.ddns.net" or $selection1.target.url = "updateviber.sytes.net" or $selection1.target.url = "webclidie.webhop.me" or $selection1.target.url = "win-restore.ru" or $selection1.target.url = "winloaded.sytes.net" or $selection1.target.url = "winupdateloader.ru" or $selection1.target.url = "www.file-attachments.ru" or $selection1.target.url = "www.win-restore.ru" or $selection1.target.url = "yfperoliz.webhop.me" or $selection1.target.url = "prestigeclub.frantov.com.ua" or $selection1.target.url = "viberload.ddns.net")) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/detecting_gamaredon_group_s_c_c_servers_ip_addresses_and_domains__proxy.yaral
rule detecting_gamaredon_groups_cc_servers_ip_addresses_and_domains_proxy { events: (($selection1.principal.ip = "95.142.45.86" or $selection1.principal.ip = "95.142.45.58" or $selection1.principal.ip = "95.142.45.57" or $selection1.principal.ip = "95.142.45.48" or $selection1.principal.ip = "95.142.45.44" or $selection1.principal.ip = "95.142.45.185" or $selection1.principal.ip = "95.142.45.142" or $selection1.principal.ip = "95.142.45.13" or $selection1.principal.ip = "95.142.45.118" or $selection1.principal.ip = "94.130.217.187" or $selection1.principal.ip = "80.211.167.231" or $selection1.principal.ip = "5.23.55.212" or $selection1.principal.ip = "46.148.20.31" or $selection1.principal.ip = "185.231.155.12" or $selection1.principal.ip = "185.231.154.25" or $selection1.principal.ip = "185.231.154.154" or $selection1.principal.ip = "185.158.115.137") or ($selection1.target.ip = "95.142.45.86" or $selection1.target.ip = "95.142.45.58" or $selection1.target.ip = "95.142.45.57" or $selection1.target.ip = "95.142.45.48" or $selection1.target.ip = "95.142.45.44" or $selection1.target.ip = "95.142.45.185" or $selection1.target.ip = "95.142.45.142" or $selection1.target.ip = "95.142.45.13" or $selection1.target.ip = "95.142.45.118" or $selection1.target.ip = "94.130.217.187" or $selection1.target.ip = "80.211.167.231" or $selection1.target.ip = "5.23.55.212" or $selection1.target.ip = "46.148.20.31" or $selection1.target.ip = "185.231.155.12" or $selection1.target.ip = "185.231.154.25" or $selection1.target.ip = "185.231.154.154" or $selection1.target.ip = "185.158.115.137") or ($selection1.target.url = "natos-drp.ddns.net" or $selection1.target.url = "nato-drp.ddns.net" or $selection1.target.url = "updates-spreadwork.pw" or $selection1.target.url = "ukraine-news.ddns.net" or $selection1.target.url = "ukraina-drp.ddns.net" or $selection1.target.url = "tovar-es.ddns.net" or $selection1.target.url = "start-usb.ddns.net" or $selection1.target.url = "sovetkirov.ddns.net" or $selection1.target.url = "singles-office.ddns.net" or $selection1.target.url = "single-office.ddns.net" or $selection1.target.url = "yousister.ddns.net" or $selection1.target.url = "wq03.ddns.net" or $selection1.target.url = "wq02.ddns.net" or $selection1.target.url = "wq01.ddns.net" or $selection1.target.url = "werdikt.ddns.net" or $selection1.target.url = "wareface.ddns.net" or $selection1.target.url = "vnc-new.ddns.net" or $selection1.target.url = "ut03.ddns.net" or $selection1.target.url = "ut02.ddns.net" or $selection1.target.url = "ut01.ddns.net" or $selection1.target.url = "us03.ddns.net" or $selection1.target.url = "us02.ddns.net" or $selection1.target.url = "us01.ddns.net" or $selection1.target.url = "topline.myftp.org" or $selection1.target.url = "sushi-bar.ddns.net" or $selection1.target.url = "po03.ddns.net" or $selection1.target.url = "po02.ddns.net" or $selection1.target.url = "po01.ddns.net" or $selection1.target.url = "pk03.ddns.net" or $selection1.target.url = "pk02.ddns.net" or $selection1.target.url = "pk01.ddns.net" or $selection1.target.url = "orizoh88.ddns.net" or $selection1.target.url = "optima-se.ddns.net" or $selection1.target.url = "new-club.ddns.net" or $selection1.target.url = "mykarina.ddns.net" or $selection1.target.url = "microsoft-single.ddns.net" or $selection1.target.url = "metro-exodus.ddns.net" or $selection1.target.url = "marishka.ddns.net" or $selection1.target.url = "macdocs.ddns.net" or $selection1.target.url = "karasto01.ddns.net" or $selection1.target.url = "gr03.ddns.net" or $selection1.target.url = "gr02.ddns.net" or $selection1.target.url = "gr01.ddns.net" or $selection1.target.url = "connect-updates.ddns.net" or $selection1.target.url = "chrome-update.ddns.net" or $selection1.target.url = "samotsvety.com.ua" or $selection1.target.url = "admin-ru.ru" or $selection1.target.url = "adobe.update-service.net" or $selection1.target.url = "apploadapp.webhop.me" or $selection1.target.url = "brokbridge.com" or $selection1.target.url = "cat.gotdns.ch" or $selection1.target.url = "check-update.ru" or $selection1.target.url = "childrights.in.ua" or $selection1.target.url = "conhost.myftp.org" or $selection1.target.url = "docdownload.ddns.net" or $selection1.target.url = "downloads.email-attachments.ru" or $selection1.target.url = "downloads.file-attachments.ru" or $selection1.target.url = "dyndownload.serveirc.com" or $selection1.target.url = "e.muravej.ua" or $selection1.target.url = "email-attachments.ru" or $selection1.target.url = "file-attachments.ru" or $selection1.target.url = "freefiles.myftp.biz" or $selection1.target.url = "getmyfile.webhop.me" or $selection1.target.url = "googlefiles.serveftp.com" or $selection1.target.url = "grom56.ddns.net" or $selection1.target.url = "grom90.ddns.net" or $selection1.target.url = "hrome-update.ru" or $selection1.target.url = "hrome-updater.ru" or $selection1.target.url = "loaderskypetm.webhop.me" or $selection1.target.url = "loadsoulip.serveftp.com" or $selection1.target.url = "mail.file-attachments.ru" or $selection1.target.url = "mails.redirectme.net" or $selection1.target.url = "mars-ru.ru" or $selection1.target.url = "msrestore.ru" or $selection1.target.url = "oficialsite.webhop.me" or $selection1.target.url = "parkingdoma.webhop.me" or $selection1.target.url = "poligjong.webhop.me" or $selection1.target.url = "polistar.ddns.net" or $selection1.target.url = "proxy-spread.ru" or $selection1.target.url = "rms.admin-ru.ru" or $selection1.target.url = "skypeemocache.ru" or $selection1.target.url = "skypeupdate.ru" or $selection1.target.url = "spbpool.ddns.net" or $selection1.target.url = "spread-service.ru" or $selection1.target.url = "spread-ss.ru" or $selection1.target.url = "spread-updates.ru" or $selection1.target.url = "stor.tainfo.com.ua" or $selection1.target.url = "tortilla.sytes.net" or $selection1.target.url = "ukrnet.serveftp.com" or $selection1.target.url = "ukrway.galaktion.ru" or $selection1.target.url = "umachka.ua" or $selection1.target.url = "update-service.net" or $selection1.target.url = "updatesp.ddns.net" or $selection1.target.url = "updateviber.sytes.net" or $selection1.target.url = "webclidie.webhop.me" or $selection1.target.url = "win-restore.ru" or $selection1.target.url = "winloaded.sytes.net" or $selection1.target.url = "winupdateloader.ru" or $selection1.target.url = "www.file-attachments.ru" or $selection1.target.url = "www.win-restore.ru" or $selection1.target.url = "yfperoliz.webhop.me" or $selection1.target.url = "prestigeclub.frantov.com.ua" or $selection1.target.url = "viberload.ddns.net")) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule yispecter_malware_detection { events: ($selection.target.hostname = "bb800.com" or $selection.target.hostname = "ad.bb800.com" or $selection.target.hostname = "down.bb800.com" or $selection.target.hostname = "ty1.bb800.com" or $selection.target.hostname = "iosnoico.bb800.com" or $selection.target.hostname = "qvod.bb800.com" or $selection.target.hostname = "qvios.od.bb800.com" or $selection.target.hostname = "dp.bb800.com" or $selection.target.hostname = "iosads.cdn.bb800.com") condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/yispecter_malware_detection.yaral
rule yispecter_malware_detection { events: ($selection.target.hostname = "bb800.com" or $selection.target.hostname = "ad.bb800.com" or $selection.target.hostname = "down.bb800.com" or $selection.target.hostname = "ty1.bb800.com" or $selection.target.hostname = "iosnoico.bb800.com" or $selection.target.hostname = "qvod.bb800.com" or $selection.target.hostname = "qvios.od.bb800.com" or $selection.target.hostname = "dp.bb800.com" or $selection.target.hostname = "iosads.cdn.bb800.com") condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule roma225_campaign_firewallproxy { events: (($SelectionSRC.principal.ip = "138.36.3.228" or $SelectionSRC.principal.ip = "184.75.209.169" or $SelectionSRC.principal.ip = "177.85.98.242") or ($SelectionSRC.target.ip = "138.36.3.228" or $SelectionSRC.target.ip = "184.75.209.169" or $SelectionSRC.target.ip = "177.85.98.242") or ($SelectionSRC.target.url = "https://minhacasaminhavidacdt.blogspot.com" or $SelectionSRC.target.url = "https://pocasideiascdt.blogspot.com" or $SelectionSRC.target.url = "http://cdtmaster.com.br") or (re.regex($SelectionSRC.target.hostname, `.*office365update\.duckdns\.org.*`) or re.regex($SelectionSRC.target.hostname, `.*systen32\.ddns\.net.*`))) condition: $SelectionSRC } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/roma225_campaign__firewall_proxy.yaral
rule roma225_campaign_firewallproxy { events: (($SelectionSRC.principal.ip = "138.36.3.228" or $SelectionSRC.principal.ip = "184.75.209.169" or $SelectionSRC.principal.ip = "177.85.98.242") or ($SelectionSRC.target.ip = "138.36.3.228" or $SelectionSRC.target.ip = "184.75.209.169" or $SelectionSRC.target.ip = "177.85.98.242") or ($SelectionSRC.target.url = "https://minhacasaminhavidacdt.blogspot.com" or $SelectionSRC.target.url = "https://pocasideiascdt.blogspot.com" or $SelectionSRC.target.url = "http://cdtmaster.com.br") or (re.regex($SelectionSRC.target.hostname, `.*office365update\.duckdns\.org.*`) or re.regex($SelectionSRC.target.hostname, `.*systen32\.ddns\.net.*`))) condition: $SelectionSRC }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule lojack_doubleagent_communication { events: ($selection.target.hostname = "sysanalyticweb.com" or $selection.target.hostname = "elaxo.org" or $selection.target.hostname = "ikmtrust.com" or $selection.target.hostname = "lxwo.org") condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/lojack_double_agent_communication.yaral
rule lojack_doubleagent_communication { events: ($selection.target.hostname = "sysanalyticweb.com" or $selection.target.hostname = "elaxo.org" or $selection.target.hostname = "ikmtrust.com" or $selection.target.hostname = "lxwo.org") condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule sofacy__apt_c2_domain_communication { events: ($selection.target.hostname = "myinvestgroup.com" or $selection.target.hostname = "netmediaresources.com" or $selection.target.hostname = "webviewres.net" or $selection.target.hostname = "adfs.senate.group" or $selection.target.hostname = "adfs-senate.email" or $selection.target.hostname = "adfs-senate.services" or $selection.target.hostname = "adfs.senate.qov.info" or $selection.target.hostname = "chmail.ir.udelivered.tk" or $selection.target.hostname = "webmail-ibsf.org" or $selection.target.hostname = "fil-luge.com" or $selection.target.hostname = "biathlovvorld.com" or $selection.target.hostname = "mail-ibu.eu" or $selection.target.hostname = "fisski.ca" or $selection.target.hostname = "iihf.eu" or $selection.target.hostname = "Cdnverify.net" or $selection.target.hostname = "osce-press.com" or $selection.target.hostname = "electronicfrontierfoundation.org" or $selection.target.hostname = "baltichost.org" or $selection.target.hostname = "checkmalware.org" or $selection.target.hostname = "kavkazcentr.info" or $selection.target.hostname = "login-osce.org" or $selection.target.hostname = "malwarecheck.info" or $selection.target.hostname = "n0vinite.com" or $selection.target.hostname = "nato.nshq.in" or $selection.target.hostname = "natoexhibitionff14.com" or $selection.target.hostname = "novinitie.com" or $selection.target.hostname = "poczta.mon.q0v.pl" or $selection.target.hostname = "q0v.pl" or $selection.target.hostname = "qov.hu.com" or $selection.target.hostname = "rnil.am" or $selection.target.hostname = "scanmalware.info" or $selection.target.hostname = "smigroup-online.co.uk" or $selection.target.hostname = "standartnevvs.com" or $selection.target.hostname = "updatecenter.name" or $selection.target.hostname = "securitypractic.com" or $selection.target.hostname = "drivers-update.info" or $selection.target.hostname = "nato-press.com") condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/sofacy___apt_c2_domain_communication.yaral
rule sofacy__apt_c2_domain_communication { events: ($selection.target.hostname = "myinvestgroup.com" or $selection.target.hostname = "netmediaresources.com" or $selection.target.hostname = "webviewres.net" or $selection.target.hostname = "adfs.senate.group" or $selection.target.hostname = "adfs-senate.email" or $selection.target.hostname = "adfs-senate.services" or $selection.target.hostname = "adfs.senate.qov.info" or $selection.target.hostname = "chmail.ir.udelivered.tk" or $selection.target.hostname = "webmail-ibsf.org" or $selection.target.hostname = "fil-luge.com" or $selection.target.hostname = "biathlovvorld.com" or $selection.target.hostname = "mail-ibu.eu" or $selection.target.hostname = "fisski.ca" or $selection.target.hostname = "iihf.eu" or $selection.target.hostname = "Cdnverify.net" or $selection.target.hostname = "osce-press.com" or $selection.target.hostname = "electronicfrontierfoundation.org" or $selection.target.hostname = "baltichost.org" or $selection.target.hostname = "checkmalware.org" or $selection.target.hostname = "kavkazcentr.info" or $selection.target.hostname = "login-osce.org" or $selection.target.hostname = "malwarecheck.info" or $selection.target.hostname = "n0vinite.com" or $selection.target.hostname = "nato.nshq.in" or $selection.target.hostname = "natoexhibitionff14.com" or $selection.target.hostname = "novinitie.com" or $selection.target.hostname = "poczta.mon.q0v.pl" or $selection.target.hostname = "q0v.pl" or $selection.target.hostname = "qov.hu.com" or $selection.target.hostname = "rnil.am" or $selection.target.hostname = "scanmalware.info" or $selection.target.hostname = "smigroup-online.co.uk" or $selection.target.hostname = "standartnevvs.com" or $selection.target.hostname = "updatecenter.name" or $selection.target.hostname = "securitypractic.com" or $selection.target.hostname = "drivers-update.info" or $selection.target.hostname = "nato-press.com") condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule muddywater_apt_proxy { events: ($selectionURL.target.url = "https://savephotos.net/e6N0RQ80" or $selectionURL.target.url = "http://sagawa-zz.com/sagawa.apk" or re.regex($selectionURL.target.url, `http://59\.105\.6\.230//servlet/.*`) or $selectionURL.target.url = "http://118.160.115.74/admin/index.jsp") condition: $selectionURL } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/ioc_sigma/proxy/muddywater_apt__proxy.yaral
rule muddywater_apt_proxy { events: ($selectionURL.target.url = "https://savephotos.net/e6N0RQ80" or $selectionURL.target.url = "http://sagawa-zz.com/sagawa.apk" or re.regex($selectionURL.target.url, `http://59\.105\.6\.230//servlet/.*`) or $selectionURL.target.url = "http://118.160.115.74/admin/index.jsp") condition: $selectionURL }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule suspicious_schtasks_creation_possible_windows_0day_lpe_aka_polarbear_by_sandboxescaper { events: (($selection.metadata.product_event_type = "1" or $selection.metadata.product_event_type = "4688") and $selection.target.process.command_line = "schtasks" and $selection.target.process.command_line = "/change" and $selection.target.process.command_line = "/TN" and $selection.target.process.command_line = "/RU" and $selection.target.process.command_line = "/RP") condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/microsoft_sysmon/suspicious_schtasks_creation__possible_windows_0day_lpe_aka__polarbear__by_sandboxescaper.yaral
rule suspicious_schtasks_creation_possible_windows_0day_lpe_aka_polarbear_by_sandboxescaper { events: (($selection.metadata.product_event_type = "1" or $selection.metadata.product_event_type = "4688") and $selection.target.process.command_line = "schtasks" and $selection.target.process.command_line = "/change" and $selection.target.process.command_line = "/TN" and $selection.target.process.command_line = "/RU" and $selection.target.process.command_line = "/RP") condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule possible_abusing_ads { events: (re.regex($selection0.target.process.file.full_path, `.*:.*`) or re.regex($selection0.principal.process.file.full_path, `.*:.*`)) condition: $selection0 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/microsoft_sysmon/possible_abusing_ads.yaral
rule possible_abusing_ads { events: (re.regex($selection0.target.process.file.full_path, `.*:.*`) or re.regex($selection0.principal.process.file.full_path, `.*:.*`)) condition: $selection0 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule netsh_rdp_port_forwarding { events: (re.regex($selection.target.process.command_line, `netsh i.* p.*=3389 c.*`) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/microsoft_sysmon/netsh_rdp_port_forwarding.yaral
rule netsh_rdp_port_forwarding { events: (re.regex($selection.target.process.command_line, `netsh i.* p.*=3389 c.*`) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1")) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule fireeye_red_team_tool__execavatorexe_via_registry { events: ($selection.metadata.event_type = "SetValue" and re.regex($selection.target.registry.registry_key, `.*CurrentControlSet\\services\\iphlpsvc6\\ImagePath`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/registry_event/fireeye_red_team_tool___execavator_exe__via_registry.yaral
rule fireeye_red_team_tool__execavatorexe_via_registry { events: ($selection.metadata.event_type = "SetValue" and re.regex($selection.target.registry.registry_key, `.*CurrentControlSet\\services\\iphlpsvc6\\ImagePath`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule fireeye_red_team_tool__modified_impacket_smbexec_via_registry { events: ((re.regex($selection1.target.registry.registry_key, `.*ImagePath.*`) and re.regex($selection1.metadata.description, `.*%COMSPEC%.*`) and re.regex($selection1.metadata.description, `.*/q.*`) and re.regex($selection1.metadata.description, `.*/k.*`) and re.regex($selection1.metadata.description, `.*echo.*`)) or ($selection1.metadata.event_type = "SetValue" and re.regex($selection1.target.registry.registry_key, `.*CurrentControlSet\\Services.*`) and (re.regex($selection1.target.registry.registry_key, `.*Windows Update Control Service.*`) or re.regex($selection1.target.registry.registry_key, `.*Windows 10 Defender.*`) or re.regex($selection1.target.registry.registry_key, `.*Windows License Key Activation.*`) or re.regex($selection1.target.registry.registry_key, `.*Office 365 Proxy.*`) or re.regex($selection1.target.registry.registry_key, `.*Microsoft Security Center.*`) or re.regex($selection1.target.registry.registry_key, `.*Windows Update.*`) or re.regex($selection1.target.registry.registry_key, `.*Secure Token Messaging Service.*`) or re.regex($selection1.target.registry.registry_key, `.*Background Action Manager.*`) or re.regex($selection1.target.registry.registry_key, `.*OneDrive Sync Center.*`)))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/registry_event/fireeye_red_team_tool___modified_impacket_smbexec__via_registry.yaral
rule fireeye_red_team_tool__modified_impacket_smbexec_via_registry { events: ((re.regex($selection1.target.registry.registry_key, `.*ImagePath.*`) and re.regex($selection1.metadata.description, `.*%COMSPEC%.*`) and re.regex($selection1.metadata.description, `.*/q.*`) and re.regex($selection1.metadata.description, `.*/k.*`) and re.regex($selection1.metadata.description, `.*echo.*`)) or ($selection1.metadata.event_type = "SetValue" and re.regex($selection1.target.registry.registry_key, `.*CurrentControlSet\\Services.*`) and (re.regex($selection1.target.registry.registry_key, `.*Windows Update Control Service.*`) or re.regex($selection1.target.registry.registry_key, `.*Windows 10 Defender.*`) or re.regex($selection1.target.registry.registry_key, `.*Windows License Key Activation.*`) or re.regex($selection1.target.registry.registry_key, `.*Office 365 Proxy.*`) or re.regex($selection1.target.registry.registry_key, `.*Microsoft Security Center.*`) or re.regex($selection1.target.registry.registry_key, `.*Windows Update.*`) or re.regex($selection1.target.registry.registry_key, `.*Secure Token Messaging Service.*`) or re.regex($selection1.target.registry.registry_key, `.*Background Action Manager.*`) or re.regex($selection1.target.registry.registry_key, `.*OneDrive Sync Center.*`)))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule malicious_service_installations { events: ($selection.metadata.product_event_type = "7045" and (($selection.target.process.command_line = "WCESERVICE" or $selection.target.process.command_line = "WCE SERVICE") or re.regex($selection.target.process.command_line, `.*\\PAExec.*`) or re.regex($selection.target.process.command_line, `winexesvc\.exe.*`) or re.regex($selection.target.process.command_line, `.*\\DumpSvc\.exe`) or $selection.target.process.command_line = "mssecsvc2.0" or re.regex($selection.target.process.command_line, `.* net user .*`) or (re.regex($selection.target.process.command_line, `pwdump.*`) or re.regex($selection.target.process.command_line, `gsecdump.*`) or re.regex($selection.target.process.command_line, `cachedump.*`)))) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/windows/malicious_service_installations.yaral
rule malicious_service_installations { events: ($selection.metadata.product_event_type = "7045" and (($selection.target.process.command_line = "WCESERVICE" or $selection.target.process.command_line = "WCE SERVICE") or re.regex($selection.target.process.command_line, `.*\\PAExec.*`) or re.regex($selection.target.process.command_line, `winexesvc\.exe.*`) or re.regex($selection.target.process.command_line, `.*\\DumpSvc\.exe`) or $selection.target.process.command_line = "mssecsvc2.0" or re.regex($selection.target.process.command_line, `.* net user .*`) or (re.regex($selection.target.process.command_line, `pwdump.*`) or re.regex($selection.target.process.command_line, `gsecdump.*`) or re.regex($selection.target.process.command_line, `cachedump.*`)))) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule password_dumper_activity_on_lsass { events: ($selection.metadata.product_event_type = "4656" and $selection.target.process.file.full_path = "C:\\Windows\\System32\\lsass.exe" and $selection.target.process.access_mask = "0x705" and $selection.principal.user.user_display_name = "SAM_DOMAIN") condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/windows/password_dumper_activity_on_lsass.yaral
rule password_dumper_activity_on_lsass { events: ($selection.metadata.product_event_type = "4656" and $selection.target.process.file.full_path = "C:\\Windows\\System32\\lsass.exe" and $selection.target.process.access_mask = "0x705" and $selection.principal.user.user_display_name = "SAM_DOMAIN") condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule possible_system_owneruser_discovery_sysmonwindows_logs { events: (($selection0.target.process.command_line = "wmic" or $selection0.target.process.command_line = "useraccount get /ALL" or $selection0.target.process.command_line = "whoami") or ($selection0.target.process.file.full_path = "whoami.exe" or $selection0.target.process.file.full_path = "qwinsta.exe" or $selection0.target.process.file.full_path = "quser.exe")) condition: $selection0 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/windows/possible_system_owner_user_discovery__sysmon_windows_logs.yaral
rule possible_system_owneruser_discovery_sysmonwindows_logs { events: (($selection0.target.process.command_line = "wmic" or $selection0.target.process.command_line = "useraccount get /ALL" or $selection0.target.process.command_line = "whoami") or ($selection0.target.process.file.full_path = "whoami.exe" or $selection0.target.process.file.full_path = "qwinsta.exe" or $selection0.target.process.file.full_path = "quser.exe")) condition: $selection0 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule suspicious_psexec_execution { events: (($selection1.metadata.product_event_type = "5145" and re.regex($selection1.target.resource.name, `.*\\IPC$`) and (re.regex($selection1.target.file.full_path, `.*-stdin`) or re.regex($selection1.target.file.full_path, `.*-stdout`) or re.regex($selection1.target.file.full_path, `.*-stderr`))) and not ($selection1.metadata.product_event_type = "5145" and re.regex($selection1.target.resource.name, `.*\\IPC$`) and re.regex($selection1.target.file.full_path, `PSEXESVC.*`))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/windows/suspicious_psexec_execution.yaral
rule suspicious_psexec_execution { events: (($selection1.metadata.product_event_type = "5145" and re.regex($selection1.target.resource.name, `.*\\IPC$`) and (re.regex($selection1.target.file.full_path, `.*-stdin`) or re.regex($selection1.target.file.full_path, `.*-stdout`) or re.regex($selection1.target.file.full_path, `.*-stderr`))) and not ($selection1.metadata.product_event_type = "5145" and re.regex($selection1.target.resource.name, `.*\\IPC$`) and re.regex($selection1.target.file.full_path, `PSEXESVC.*`))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule ad_privileged_users_or_groups_reconnaissance { events: ($selection.metadata.product_event_type = "4661" and ($selection.principal.user.user_display_name = "SAM_USER" or $selection.principal.user.user_display_name = "SAM_GROUP") and ((re.regex($selection.target.registry.registry_value_data, `.*-512`) or re.regex($selection.target.registry.registry_value_data, `.*-502`) or re.regex($selection.target.registry.registry_value_data, `.*-500`) or re.regex($selection.target.registry.registry_value_data, `.*-505`) or re.regex($selection.target.registry.registry_value_data, `.*-519`) or re.regex($selection.target.registry.registry_value_data, `.*-520`) or re.regex($selection.target.registry.registry_value_data, `.*-544`) or re.regex($selection.target.registry.registry_value_data, `.*-551`) or re.regex($selection.target.registry.registry_value_data, `.*-555`) or re.regex($selection.target.registry.registry_value_data, `.*admin.*`)) or (re.regex($selection.target.file.full_path, `.*-512`) or re.regex($selection.target.file.full_path, `.*-502`) or re.regex($selection.target.file.full_path, `.*-500`) or re.regex($selection.target.file.full_path, `.*-505`) or re.regex($selection.target.file.full_path, `.*-519`) or re.regex($selection.target.file.full_path, `.*-520`) or re.regex($selection.target.file.full_path, `.*-544`) or re.regex($selection.target.file.full_path, `.*-551`) or re.regex($selection.target.file.full_path, `.*-555`) or re.regex($selection.target.file.full_path, `.*admin.*`)))) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/windows/ad_privileged_users_or_groups_reconnaissance.yaral
rule ad_privileged_users_or_groups_reconnaissance { events: ($selection.metadata.product_event_type = "4661" and ($selection.principal.user.user_display_name = "SAM_USER" or $selection.principal.user.user_display_name = "SAM_GROUP") and ((re.regex($selection.target.registry.registry_value_data, `.*-512`) or re.regex($selection.target.registry.registry_value_data, `.*-502`) or re.regex($selection.target.registry.registry_value_data, `.*-500`) or re.regex($selection.target.registry.registry_value_data, `.*-505`) or re.regex($selection.target.registry.registry_value_data, `.*-519`) or re.regex($selection.target.registry.registry_value_data, `.*-520`) or re.regex($selection.target.registry.registry_value_data, `.*-544`) or re.regex($selection.target.registry.registry_value_data, `.*-551`) or re.regex($selection.target.registry.registry_value_data, `.*-555`) or re.regex($selection.target.registry.registry_value_data, `.*admin.*`)) or (re.regex($selection.target.file.full_path, `.*-512`) or re.regex($selection.target.file.full_path, `.*-502`) or re.regex($selection.target.file.full_path, `.*-500`) or re.regex($selection.target.file.full_path, `.*-505`) or re.regex($selection.target.file.full_path, `.*-519`) or re.regex($selection.target.file.full_path, `.*-520`) or re.regex($selection.target.file.full_path, `.*-544`) or re.regex($selection.target.file.full_path, `.*-551`) or re.regex($selection.target.file.full_path, `.*-555`) or re.regex($selection.target.file.full_path, `.*admin.*`)))) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule admin_user_rdp { events: ($selection.metadata.product_event_type = "4624" and $selection.extensions.auth.mechanism = "10" and $selection.principal.application = "Negotiate" and re.regex($selection.principal.user.user_display_name, `Admin-.*`)) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/windows/admin_user_rdp.yaral
rule admin_user_rdp { events: ($selection.metadata.product_event_type = "4624" and $selection.extensions.auth.mechanism = "10" and $selection.principal.application = "Negotiate" and re.regex($selection.principal.user.user_display_name, `Admin-.*`)) condition: $selection }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule guildma_malware_detector_sysmon_behavior { events: (($selection1.metadata.product_event_type = "11" and (re.regex($selection1.target.file.full_path, `C:\\Users\\Public\\Librarires\\awsvideos.*`) or re.regex($selection1.target.file.full_path, `C:\\Users \\Public\\Librarires\\awsvideos.*`) or re.regex($selection1.target.file.full_path, `C:\\Users\\Public\\Libraries\\raptor.*`) or re.regex($selection1.target.file.full_path, `.*rakpat0.*`))) or ($selection1.metadata.product_event_type = "1" and ($selection1.target.process.command_line = "cmd /k shutdown -r -t 0 -f" or $selection1.target.process.command_line = "cmd /k shutdown -r -t 1 -f" or $selection1.target.process.command_line = "taskkill /f /im regsvr32.exe" or $selection1.target.process.command_line = "taskkill /f /im unins000.exe" or $selection1.target.process.command_line = "taskkill /f /im aswRunDll.exe" or $selection1.target.process.command_line = "cmd /k del /q /s /f C:\\ProgramData\\sysdirb & exit" or $selection1.target.process.command_line = "cmd /k del /q /s /f C:\\ProgramData\\nulls & exit" or $selection1.target.process.command_line = "cmd /k del /q /s /f C:\\ProgramData\\xnull & exit" or $selection1.target.process.command_line = "cmd /k del /q /s /f C:\\ProgramData\\libs & exit" or $selection1.target.process.command_line = "cmd /k rd /s /q C:\\ProgramData\\sysdirb & exit" or $selection1.target.process.command_line = "cmd /k rd /s /q C:\\ProgramData\\nulls & exit" or $selection1.target.process.command_line = "cmd /k rd /s /q C:\\ProgramData\\xnull & exit" or $selection1.target.process.command_line = "cmd /k rd /s /q C:\\ProgramData\\libs & exit"))) condition: $selection1 } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/windows/guildma_malware_detector__sysmon_behavior.yaral
rule guildma_malware_detector_sysmon_behavior { events: (($selection1.metadata.product_event_type = "11" and (re.regex($selection1.target.file.full_path, `C:\\Users\\Public\\Librarires\\awsvideos.*`) or re.regex($selection1.target.file.full_path, `C:\\Users \\Public\\Librarires\\awsvideos.*`) or re.regex($selection1.target.file.full_path, `C:\\Users\\Public\\Libraries\\raptor.*`) or re.regex($selection1.target.file.full_path, `.*rakpat0.*`))) or ($selection1.metadata.product_event_type = "1" and ($selection1.target.process.command_line = "cmd /k shutdown -r -t 0 -f" or $selection1.target.process.command_line = "cmd /k shutdown -r -t 1 -f" or $selection1.target.process.command_line = "taskkill /f /im regsvr32.exe" or $selection1.target.process.command_line = "taskkill /f /im unins000.exe" or $selection1.target.process.command_line = "taskkill /f /im aswRunDll.exe" or $selection1.target.process.command_line = "cmd /k del /q /s /f C:\\ProgramData\\sysdirb & exit" or $selection1.target.process.command_line = "cmd /k del /q /s /f C:\\ProgramData\\nulls & exit" or $selection1.target.process.command_line = "cmd /k del /q /s /f C:\\ProgramData\\xnull & exit" or $selection1.target.process.command_line = "cmd /k del /q /s /f C:\\ProgramData\\libs & exit" or $selection1.target.process.command_line = "cmd /k rd /s /q C:\\ProgramData\\sysdirb & exit" or $selection1.target.process.command_line = "cmd /k rd /s /q C:\\ProgramData\\nulls & exit" or $selection1.target.process.command_line = "cmd /k rd /s /q C:\\ProgramData\\xnull & exit" or $selection1.target.process.command_line = "cmd /k rd /s /q C:\\ProgramData\\libs & exit"))) condition: $selection1 }
yaral
Input: Translate the following yaral configuration for chronicle detection rules into concise natural language instructions for rule generation: rule apt29 { events: (re.regex($selection.target.process.command_line, `.*-noni -ep bypass $.*`) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1")) condition: $selection } Output:
chronicle
/chronicle/detection-rules/soc_prime_rules/threat_hunting/windows/apt29_part_1.yaral
rule apt29 { events: (re.regex($selection.target.process.command_line, `.*-noni -ep bypass $.*`) and ($selection.metadata.product_event_type = "4688" or $selection.metadata.product_event_type = "1")) condition: $selection }
yaral
End of preview. Expand in Data Studio

Dataset Card for "rule_learning_data_v0_test"

More Information needed

Downloads last month
9