Add correlation rules from AT project
Summary of the Pull Request
Adding three new correlation rules that reduce false positives in the detection of ambiguous attack techniques.
Changelog
new: Domain Account Discovery Correlation - Multiple discovery command usage new: File and Directory Discovery Correlation - Discovery indicative of ransomware using Bitlocker new: Archive Collected Data Correlation - Multiple instances of archiving activity observed
Example Log Event
Detailed info on analytic development can be found at the following links:
- https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/analytics/domain_account_discovery/
- https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/analytics/file_directory_discovery/
- https://center-for-threat-informed-defense.github.io/summiting-the-pyramid/analytics/archive_collected_data/
Fixed Issues
SigmaHQ Rule Creation Conventions
- If your PR adds new rules, please consider following and applying these conventions
Hi @tonifef, we are not ready to integrate Sigma v2 correlation rules to the rules repo yet. We will keep this PR open until we are ready to do so and then start working on integrating it.
Will be migrated as part of the correlation support coming next year