-
Notifications
You must be signed in to change notification settings - Fork 208
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
added prompt that the user which sigma rules they want to enable by default #1191
added prompt that the user which sigma rules they want to enable by default #1191
Conversation
Codecov ReportAttention:
Additional details and impacted files@@ Coverage Diff @@
## main #1191 +/- ##
==========================================
- Coverage 83.76% 83.50% -0.26%
==========================================
Files 26 26
Lines 23463 23696 +233
==========================================
+ Hits 19653 19788 +135
- Misses 3810 3908 +98
☔ View full report in Codecov by Sentry. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@hitenkoku
When Core/Core+/Core++/All alert rules
is selected by default as shown below, it seems that med
, low
, and info
levels are also detected. Could you please confirm?
% ./hayabusa csv-timeline -d ../hayabusa-sample-evtx -o t-new-core.csv -C -q
Start time: 2023/10/19 00:20
Total event log files: 583
Total file size: 137.1 MB
Detection rule sets:
✔ Which set of detection rules would you like to load? · 1. Core ( status: testing, stable | level: high, critical )
✔ Include Emerging Threats rules?(Y/n): · yes
✔ Include Threat Hunting rules?(y/N): · no
Loading detection rules. Please wait.
Excluded rules: 197
Noisy rules: 12 (Disabled)
Deprecated rules: 182 (7.64%) (Disabled)
Experimental rules: 905 (38.01%)
Stable rules: 179 (7.52%)
Test rules: 1297 (54.47%)
Unsupported rules: 45 (1.89%) (Disabled)
Hayabusa rules: 159
Sigma rules: 2222
Total enabled detection rules: 2381
Output profile: standard
Scanning in progress. Please wait.
[00:00:04] 583 / 583 [========================================] 100%
Scanning finished. Please wait while the results are being saved.
...
Results Summary:
Events with hits / Total events: 19,650 / 47,465 (Data reduction: 27,815 events (58.60%))
Total | Unique detections: 32,231 | 566
Total | Unique critical detections: 53 (0.16%) | 19 (3.36%)
Total | Unique high detections: 5,936 (18.42%) | 236 (41.70%)
Total | Unique medium detections: 1,970 (6.11%) | 194 (34.28%)
Total | Unique low detections: 6,044 (18.75%) | 62 (10.95%)
Total | Unique informational detections: 18,228 (56.55%) | 55 (9.72%)
Dates with most total detections:
critical: 2019-07-19 (12), high: 2016-09-20 (3,652), medium: 2019-05-19 (167), low: 2016-09-20 (3,708), informational: 2016-08-19 (2,104)
Top 5 computers with most unique detections:
critical: MSEDGEWIN10 (7), IEWIN7 (3), FS03.offsec.lan (2), IE10Win7 (2), rootdc1.offsec.lan (2)
high: MSEDGEWIN10 (116), IEWIN7 (69), fs03vuln.offsec.lan (26), FS03.offsec.lan (26), IE10Win7 (23)
medium: MSEDGEWIN10 (82), IEWIN7 (49), FS03.offsec.lan (23), fs03vuln.offsec.lan (20), rootdc1.offsec.lan (16)
low: MSEDGEWIN10 (37), FS03.offsec.lan (19), IEWIN7 (17), fs03vuln.offsec.lan (17), fs01.offsec.lan (11)
informational: IEWIN7 (17), MSEDGEWIN10 (17), PC01.example.corp (15), fs01.offsec.lan (15), FS03.offsec.lan (13)
╭─────────────────────────────────────────────────────────────────────────────────────────────────────────────────╮
│ Top critical alerts: Top high alerts: │
├╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌┤
│ Sticky Key Like Backdoor Usage - Registry (8) Metasploit SMB Authentication (3,562) │
│ CobaltStrike Service Installations - System (6) Malicious Svc Possibly Installed (271) │
│ Active Directory Replication from Non Machine Account (6) Susp Svc Installed (257) │
│ Meterpreter or Cobalt Strike Getsystem Service Instal... (6) Suspicious Service Installation Script (250) │
│ Defender Alert (Severe) (4) PowerShell Scripts Installed as Services (250) │
├╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌┤
│ Top medium alerts: Top low alerts: │
├╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌┤
│ Potentially Malicious PwSh (235) Logon Failure (Wrong Password) (3,564) │
│ Proc Injection (104) Susp CmdLine (Possible LOLBIN) (1,418) │
│ Reg Key Value Set (Sysmon Alert) (103) Non Interactive PowerShell Process Spawned (325) │
│ Remote Thread Creation Via PowerShell (93) Proc Access (156) │
│ Log File Cleared (87) DLL Loaded (Sysmon Alert) (108) │
├╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌┤
│ Top informational alerts: │
├╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌╌┤
│ Proc Exec (11,173) Svc Installed (331) │
│ NetShare File Access (2,564) Explicit Logon (304) │
│ PwSh Scriptblock (789) New Non-USB PnP Device (268) │
│ PwSh Pipeline Exec (680) Net Conn (243) │
│ NetShare Access (433) File Created (210) │
╰──────────────────────────────────────────────────────────────╌──────────────────────────────────────────────────╯
Saved file: t-new-core.csv (31.4 MB)
Elapsed time: 00:00:10.164
@hitenkoku The prompt looks great! Better than what I was imagining. One small thing: When a user chooses 1-3 there is a space before
But if the user chooses 4 or 5, then there is no space:
Can you add a space like this:
and
|
@fukusuket Thanks for your check. Could you check it?
|
@YamatoSecurity Thanks for your review. I fixed new line position in df6e009. Could you check it? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@hitenkoku
I confirmed that options 1 ~ 5 filter as expected. LGTM!!🚀
@hitenkoku
I tried to change
Can you fix this?
|
@YamatoSecurity Thanks for your review. I fixed following your point out. Could you check it?
I fixed in 5225290.
I fixed in eab295a.
I agree you. |
@hitenkoku Thank you! I checked that those are fixed.
|
Yes, maybe in a different issue we can add this. |
I created issue to following comment in #1195.
|
@YamatoSecurity Thank you for your comment.
|
LGTM! thank you! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
…-by-default-1' into add-include-and-exclude-tag-in-pivot-keywords-list#1195
…-tag-in-pivot-keywords-list#1195 Add `--include-tag` and `--exclude-tag` options in `pivot-keywords-list` command
@fukusuket @YamatoSecurity I appriciate your continuous review. since already checked in #1196, I will merge it. |
What Changed
-a, --no-asking
optionI would appreciate it if you could review when you have time.