Skip to content

Commit 4d1504d

Browse files
Sync Collecting Detection Rules: Wed May 20 00:25:21 UTC 2026
Signed-off-by: AboutCode Automation <automation@aboutcode.org>
1 parent 9e061b1 commit 4d1504d

75 files changed

Lines changed: 110341 additions & 110341 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

data/sigma/006d8a4d6e3ea24949907ea9c22f1d5b06467ceaa9e35c49aa44866c854c8901/rules-emerging-threats/2017/Exploits/CVE-2017-0261/proc_creation_win_exploit_cve_2017_0261.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
},
1212
"rule_text": "title: Exploit for CVE-2017-0261\nid: 864403a1-36c9-40a2-a982-4c9a45f7d833\nstatus: test\ndescription: Detects Winword starting uncommon sub process FLTLDR.exe as used in exploits\n for CVE-2017-0261 and CVE-2017-0262\nreferences:\n- https://www.fireeye.com/blog/threat-research/2017/05/eps-processing-zero-days.html\nauthor: Florian Roth (Nextron Systems)\ndate: 2018-02-22\nmodified: 2021-11-27\ntags:\n- attack.execution\n- attack.t1203\n- attack.t1204.002\n- attack.initial-access\n- attack.t1566.001\n- cve.2017-0261\n- detection.emerging-threats\nlogsource:\n category: process_creation\n product: windows\ndetection:\n selection:\n ParentImage|endswith: \\WINWORD.EXE\n Image|contains: \\FLTLDR.exe\n condition: selection\nfalsepositives:\n- Several false positives identified, check for suspicious file names or locations\n (e.g. Temp folders)\nlevel: medium\n",
1313
"vulnerabilities": [
14-
"CVE-2017-0261",
15-
"CVE-2017-0262"
14+
"CVE-2017-0262",
15+
"CVE-2017-0261"
1616
]
1717
}
1818
]

data/sigma/006d8a4d6e3ea24949907ea9c22f1d5b06467ceaa9e35c49aa44866c854c8901/rules-emerging-threats/2020/Exploits/CVE-2020-8193/web_cve_2020_8193_8195_citrix_exploit.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@
1111
},
1212
"rule_text": "title: Citrix ADS Exploitation CVE-2020-8193 CVE-2020-8195\nid: 0d0d9a8a-a49e-4e27-b061-7ce4b936cfb7\nstatus: test\ndescription: Detects exploitation attempt against Citrix Netscaler, Application Delivery\n Controller (ADS) and Citrix Gateway exploiting vulnerabilities reported as CVE-2020-8193\n and CVE-2020-8195\nreferences:\n- https://support.citrix.com/article/CTX276688\n- https://research.nccgroup.com/2020/07/10/rift-citrix-adc-vulnerabilities-cve-2020-8193-cve-2020-8195-and-cve-2020-8196-intelligence/\n- https://dmaasland.github.io/posts/citrix.html\nauthor: Florian Roth (Nextron Systems)\ndate: 2020-07-10\nmodified: 2023-01-02\ntags:\n- attack.initial-access\n- attack.t1190\n- cve.2020-8193\n- cve.2020-8195\n- detection.emerging-threats\nlogsource:\n category: webserver\ndetection:\n selection1:\n cs-uri-query|contains: /rapi/filedownload?filter=path:%2F\n selection2:\n cs-uri-query|contains|all:\n - /pcidss/report\n - type=all_signatures\n - sig_name=_default_signature_\n condition: 1 of selection*\nfalsepositives:\n- Unknown\nlevel: critical\n",
1313
"vulnerabilities": [
14-
"CVE-2020-8195",
14+
"CVE-2020-8193",
1515
"CVE-2020-8196",
16-
"CVE-2020-8193"
16+
"CVE-2020-8195"
1717
]
1818
}
1919
]

data/sigma/006d8a4d6e3ea24949907ea9c22f1d5b06467ceaa9e35c49aa44866c854c8901/rules-emerging-threats/2021/Exploits/CVE-2021-1675/image_load_exploit_cve_2021_1675_spoolsv_dll_load.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
},
1212
"rule_text": "title: Windows Spooler Service Suspicious Binary Load\nid: 02fb90de-c321-4e63-a6b9-25f4b03dfd14\nstatus: test\ndescription: 'Detect DLL Load from Spooler Service backup folder. This behavior has\n been observed during the exploitation of the Print Spooler Vulnerability CVE-2021-1675\n and CVE-2021-34527 (PrinterNightmare).\n\n '\nreferences:\n- https://web.archive.org/web/20210629055600/https://github.com/hhlxf/PrintNightmare/\n- https://github.com/ly4k/SpoolFool\nauthor: FPT.EagleEye, Thomas Patzke (improvements)\ndate: 2021-06-29\nmodified: 2022-06-02\ntags:\n- attack.persistence\n- attack.privilege-escalation\n- attack.execution\n- attack.stealth\n- attack.t1574\n- cve.2021-1675\n- cve.2021-34527\n- detection.emerging-threats\nlogsource:\n category: image_load\n product: windows\ndetection:\n selection:\n Image|endswith: \\spoolsv.exe\n ImageLoaded|contains:\n - \\Windows\\System32\\spool\\drivers\\x64\\3\\\n - \\Windows\\System32\\spool\\drivers\\x64\\4\\\n ImageLoaded|endswith: .dll\n condition: selection\nfalsepositives:\n- Loading of legitimate driver\nlevel: informational\n",
1313
"vulnerabilities": [
14-
"CVE-2021-1675",
15-
"CVE-2021-34527"
14+
"CVE-2021-34527",
15+
"CVE-2021-1675"
1616
]
1717
}
1818
]

data/sigma/006d8a4d6e3ea24949907ea9c22f1d5b06467ceaa9e35c49aa44866c854c8901/rules-emerging-threats/2021/Exploits/CVE-2021-1675/registry_event_cve_2021_1675_mimikatz_printernightmare_drivers.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
},
1212
"rule_text": "title: PrinterNightmare Mimikatz Driver Name\nid: ba6b9e43-1d45-4d3c-a504-1043a64c8469\nstatus: test\ndescription: Detects static QMS 810 and mimikatz driver name used by Mimikatz as exploited\n in CVE-2021-1675 and CVE-2021-34527\nreferences:\n- https://github.com/gentilkiwi/mimikatz/commit/c21276072b3f2a47a21e215a46962a17d54b3760\n- https://www.lexjansen.com/sesug/1993/SESUG93035.pdf\n- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/4464eaf0-f34f-40d5-b970-736437a21913\n- https://nvd.nist.gov/vuln/detail/cve-2021-1675\n- https://nvd.nist.gov/vuln/detail/cve-2021-34527\nauthor: Markus Neis, @markus_neis, Florian Roth\ndate: 2021-07-04\nmodified: 2023-06-12\ntags:\n- attack.execution\n- attack.t1204\n- cve.2021-1675\n- cve.2021-34527\n- detection.emerging-threats\nlogsource:\n product: windows\n category: registry_event\ndetection:\n selection:\n TargetObject|contains:\n - \\Control\\Print\\Environments\\Windows x64\\Drivers\\Version-3\\QMS 810\\\n - \\Control\\Print\\Environments\\Windows x64\\Drivers\\Version-3\\mimikatz\n selection_alt:\n TargetObject|contains|all:\n - legitprinter\n - \\Control\\Print\\Environments\\Windows\n selection_print:\n TargetObject|contains:\n - \\Control\\Print\\Environments\n - \\CurrentVersion\\Print\\Printers\n selection_kiwi:\n TargetObject|contains:\n - Gentil Kiwi\n - mimikatz printer\n - Kiwi Legit Printer\n condition: selection or selection_alt or (selection_print and selection_kiwi)\nfalsepositives:\n- Legitimate installation of printer driver QMS 810, Texas Instruments microLaser\n printer (unlikely)\nlevel: critical\n",
1313
"vulnerabilities": [
14-
"CVE-2021-1675",
15-
"CVE-2021-34527"
14+
"CVE-2021-34527",
15+
"CVE-2021-1675"
1616
]
1717
}
1818
]

data/sigma/006d8a4d6e3ea24949907ea9c22f1d5b06467ceaa9e35c49aa44866c854c8901/rules-emerging-threats/2021/Exploits/CVE-2021-1675/win_security_exploit_cve_2021_1675_printspooler_security.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
},
1212
"rule_text": "title: CVE-2021-1675 Print Spooler Exploitation IPC Access\nid: 8fe1c584-ee61-444b-be21-e9054b229694\nstatus: test\ndescription: Detects remote printer driver load from Detailed File Share in Security\n logs that are a sign of successful exploitation attempts against print spooler vulnerability\n CVE-2021-1675 and CVE-2021-34527\nreferences:\n- https://twitter.com/INIT_3/status/1410662463641731075\nauthor: INIT_6\ndate: 2021-07-02\nmodified: 2022-10-05\ntags:\n- attack.execution\n- attack.t1569\n- cve.2021-1675\n- cve.2021-34527\n- detection.emerging-threats\nlogsource:\n product: windows\n service: security\ndetection:\n selection:\n EventID: 5145\n ShareName: \\\\\\\\\\*\\\\IPC$\n RelativeTargetName: spoolss\n AccessMask: '0x3'\n ObjectType: File\n condition: selection\nfalsepositives:\n- Unknown\nlevel: critical\n",
1313
"vulnerabilities": [
14-
"CVE-2021-1675",
15-
"CVE-2021-34527"
14+
"CVE-2021-34527",
15+
"CVE-2021-1675"
1616
]
1717
}
1818
]

data/sigma/006d8a4d6e3ea24949907ea9c22f1d5b06467ceaa9e35c49aa44866c854c8901/rules-emerging-threats/2021/Exploits/CVE-2021-1675/zeek_dce_rpc_exploit_cve_2021_1675_printnightmare_print_driver_install.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@
1111
},
1212
"rule_text": "title: Possible PrintNightmare Print Driver Install - CVE-2021-1675\nid: 7b33baef-2a75-4ca3-9da4-34f9a15382d8\nrelated:\n- id: 53389db6-ba46-48e3-a94c-e0f2cefe1583\n type: derived\nstatus: stable\ndescription: 'Detects the remote installation of a print driver which is possible\n indication of the exploitation of PrintNightmare (CVE-2021-1675).\n\n The occurrence of print drivers being installed remotely via RPC functions should\n be rare, as print drivers are normally installed locally and or through group policy.\n\n '\nreferences:\n- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-par/93d1915d-4d9f-4ceb-90a7-e8f2a59adc29\n- https://github.com/zeek/zeek/blob/691b099de13649d6576c7b9d637f8213ff818832/scripts/base/protocols/dce-rpc/consts.zeek\n- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527\n- https://github.com/corelight/CVE-2021-1675\n- https://old.zeek.org/zeekweek2019/slides/bzar.pdf\n- https://www.crowdstrike.com/blog/cve-2021-1678-printer-spooler-relay-security-advisory/\nauthor: '@neu5ron (Nate Guagenti)'\ndate: 2021-08-23\nmodified: 2025-11-03\ntags:\n- attack.execution\n- cve.2021-1678\n- cve.2021-1675\n- cve.2021-34527\n- detection.emerging-threats\nlogsource:\n product: zeek\n service: dce_rpc\ndetection:\n selection:\n operation:\n - RpcAsyncInstallPrinterDriverFromPackage\n - RpcAsyncAddPrintProcessor\n - RpcAddPrintProcessor\n - RpcAddPrinterDriverEx\n - RpcAddPrinterDriver\n - RpcAsyncAddPrinterDriver\n condition: selection\nfalsepositives:\n- Legitimate remote alteration of a printer driver.\nlevel: medium\n",
1313
"vulnerabilities": [
14+
"CVE-2021-34527",
1415
"CVE-2021-1678",
15-
"CVE-2021-1675",
16-
"CVE-2021-34527"
16+
"CVE-2021-1675"
1717
]
1818
}
1919
]

data/sigma/006d8a4d6e3ea24949907ea9c22f1d5b06467ceaa9e35c49aa44866c854c8901/rules-emerging-threats/2021/Exploits/CVE-2021-26084/web_cve_2021_26084_confluence_rce_exploit.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
},
1212
"rule_text": "title: Potential CVE-2021-26084 Exploitation Attempt\nid: 38825179-3c78-4fed-b222-2e2166b926b1\nstatus: test\ndescription: Detects potential exploitation of CVE-2021-260841 a Confluence RCE using\n OGNL injection\nreferences:\n- https://github.com/TesterCC/exp_poc_library/blob/be61622600ec79d8fba2fa5f816a870715f0cb3b/exp_poc/CVE-2021-26084_Confluence_OGNL_injection/CVE-2021-26084.md\n- https://github.com/httpvoid/writeups/blob/62d3751945289d088ccfdf4d0ffbf61598a2cd7d/Confluence-RCE.md\n- https://confluence.atlassian.com/doc/confluence-security-advisory-2021-08-25-1077906215.html\n- https://mraddon.blog/2017/03/20/confluence-trick-to-create-pages-from-blueprint-templates/\nauthor: Sittikorn S, Nuttakorn T\ndate: 2022-12-13\nmodified: 2023-03-24\ntags:\n- attack.initial-access\n- attack.t1190\n- cve.2021-26084\n- detection.emerging-threats\nlogsource:\n category: webserver\n definition: 'Requirements: The POST request body data must be collected in order\n to make use of certain parts of this detection'\ndetection:\n selection_main:\n cs-method: POST\n sc-status: 200\n cs-username: anonymous\n selection_exploit_1:\n cs-uri-query|contains|all:\n - /pages/createpage-entervariables.action\n - SpaceKey=x\n selection_exploit_2_uri:\n cs-uri-query|contains: /doenterpagevariables.action\n selection_exploit_2_keyword:\n - u0027\n condition: selection_main and (selection_exploit_1 or all of selection_exploit_2_*)\nfalsepositives:\n- Unknown\nlevel: high\n",
1313
"vulnerabilities": [
14-
"CVE-2021-26084",
15-
"CVE-2021-260841"
14+
"CVE-2021-260841",
15+
"CVE-2021-26084"
1616
]
1717
}
1818
]

data/sigma/006d8a4d6e3ea24949907ea9c22f1d5b06467ceaa9e35c49aa44866c854c8901/rules-emerging-threats/2021/Exploits/CVE-2021-26858/web_cve_2021_26858_iis_rce.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
},
1212
"rule_text": "title: ProxyLogon Reset Virtual Directories Based On IIS Log\nid: effee1f6-a932-4297-a81f-acb44064fa3a\nstatus: test\ndescription: When exploiting this vulnerability with CVE-2021-26858, an SSRF attack\n is used to manipulate virtual directories\nreferences:\n- https://bi-zone.medium.com/hunting-down-ms-exchange-attacks-part-1-proxylogon-cve-2021-26855-26858-27065-26857-6e885c5f197c\nauthor: frack113\ndate: 2021-08-10\nmodified: 2023-05-08\ntags:\n- cve.2021-26858\n- detection.emerging-threats\n- attack.initial-access\n- attack.t1190\nlogsource:\n category: webserver\n definition: 'Requirements: The POST request body data must be collected in order\n to make use of this detection'\ndetection:\n selection:\n cs-method: POST\n sc-status: 200\n cs-uri-stem: /ecp/DDI/DDIService.svc/SetObject\n cs-uri-query|contains|all:\n - schema=Reset\n - VirtualDirectory\n cs-username|endswith: $\n keywords:\n '|all':\n - POST\n - 200\n - /ecp/DDI/DDIService.svc/SetObject\n - schema=Reset\n - VirtualDirectory\n - $\n condition: selection or keywords\nfalsepositives:\n- Unlikely\nlevel: critical\n",
1313
"vulnerabilities": [
14-
"CVE-2021-26855",
15-
"CVE-2021-26858"
14+
"CVE-2021-26858",
15+
"CVE-2021-26855"
1616
]
1717
}
1818
]

data/sigma/006d8a4d6e3ea24949907ea9c22f1d5b06467ceaa9e35c49aa44866c854c8901/rules-emerging-threats/2022/Exploits/CVE-2022-21919/win_system_exploit_cve_2022_21919_or_cve_2021_34484.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
},
1212
"rule_text": "title: Potential Exploitation of CVE-2022-21919 or CVE-2021-34484 for LPE\nid: 52a85084-6989-40c3-8f32-091e12e17692\nstatus: test\ndescription: 'Detects potential exploitation attempts of CVE-2022-21919 or CVE-2021-34484\n leading to local privilege escalation via the User Profile Service.\n\n During exploitation of this vulnerability, two logs (Provider_Name: Microsoft-Windows-User\n Profiles Service) with EventID 1511 and 1515 are created (EventID 1515 may generate\n many false positives).\n\n Additionally, the directory \\Users\\TEMP may be created during exploitation. This\n behavior was observed on Windows Server 2008.\n\n '\nreferences:\n- https://packetstormsecurity.com/files/166692/Windows-User-Profile-Service-Privlege-Escalation.html\nauthor: Cybex\ndate: 2022-08-16\nmodified: 2025-11-03\ntags:\n- attack.execution\n- detection.emerging-threats\n- cve.2022-21919\n- cve.2021-34484\nlogsource:\n product: windows\n service: application\ndetection:\n selection:\n EventID: 1511\n Provider_Name: Microsoft-Windows-User Profiles Service\n condition: selection\nfalsepositives:\n- Corrupted user profiles - https://social.technet.microsoft.com/wiki/contents/articles/3571.windows-user-profiles-service-event-1511-windows-cannot-find-the-local-profile-and-is-logging-you-on-with-a-temporary-profile.aspx\nlevel: low\n",
1313
"vulnerabilities": [
14-
"CVE-2022-21919",
15-
"CVE-2021-34484"
14+
"CVE-2021-34484",
15+
"CVE-2022-21919"
1616
]
1717
}
1818
]

data/sigma/006d8a4d6e3ea24949907ea9c22f1d5b06467ceaa9e35c49aa44866c854c8901/rules-emerging-threats/2022/Exploits/CVE-2022-41082/proxy_cve_2022_36804_exchange_owassrf_exploitation.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,8 @@
1111
},
1212
"rule_text": "title: Potential OWASSRF Exploitation Attempt - Proxy\nid: 1ddf4596-1908-43c9-add2-1d2c2fcc4797\nstatus: test\ndescription: Detects exploitation attempt of the OWASSRF variant targeting exchange\n servers It uses the OWA endpoint to access the powershell backend endpoint\nreferences:\n- https://www.crowdstrike.com/blog/owassrf-exploit-analysis-and-recommendations/\n- https://www.rapid7.com/blog/post/2022/12/21/cve-2022-41080-cve-2022-41082-rapid7-observed-exploitation-of-owassrf-in-exchange-for-rce/\nauthor: Nasreddine Bencherchali (Nextron Systems)\ndate: 2022-12-22\ntags:\n- attack.initial-access\n- attack.t1190\n- detection.emerging-threats\nlogsource:\n category: proxy\ndetection:\n selection:\n cs-method: POST\n sc-status: 200\n c-uri|contains|all:\n - /owa/\n - /powershell\n c-uri|contains:\n - '@'\n - '%40'\n filter_main_ua:\n c-useragent:\n - ClientInfo\n - Microsoft WinRM Client\n - Exchange BackEnd Probes\n condition: selection and not 1 of filter_main_*\nfalsepositives:\n- Web vulnerability scanners\nlevel: high\n",
1313
"vulnerabilities": [
14-
"CVE-2022-41082",
15-
"CVE-2022-41080"
14+
"CVE-2022-41080",
15+
"CVE-2022-41082"
1616
]
1717
}
1818
]

0 commit comments

Comments
 (0)