Skip to content

Commit ca9e075

Browse files
fix[backend](rules): fixed rules definitions
1 parent 5f41514 commit ca9e075

File tree

1,419 files changed

+32699
-32547
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,419 files changed

+32699
-32547
lines changed

rules/SIGMA_DELTA_REPORT.md

Lines changed: 336 additions & 0 deletions
Large diffs are not rendered by default.
Lines changed: 39 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,39 @@
1-
- id: 1004
2-
dataTypes:
3-
- antivirus-bitdefender-gz
4-
name: Antivirus Service Stopped or Disabled
5-
impact:
6-
confidentiality: 2
7-
integrity: 3
8-
availability: 3
9-
category: System
10-
technique: "T1562.001 - Impair Defenses: Disable or Modify Tools"
11-
adversary: origin
12-
references:
13-
- https://www.bitdefender.com/business/support/en/77212-237089-event-types.html
14-
- https://attack.mitre.org/techniques/T1562/001/
15-
description: |
16-
Detects when the Bitdefender antivirus service or critical security modules are stopped, disabled, or experiencing failures. This is a critical security event that could indicate malicious tampering or system issues.
17-
18-
Next Steps:
19-
- Verify if the service was intentionally stopped by authorized personnel
20-
- Check system logs for any errors or crashes that may have caused the service to stop
21-
- Look for signs of malware or unauthorized access attempts around the time of the event
22-
- Review recent system changes or updates that might have affected the antivirus service
23-
- If tampering is suspected, isolate the affected system and perform a forensic analysis
24-
- Restart the Bitdefender service and ensure all modules are functioning properly
25-
- Monitor for recurring issues that might indicate persistent threats
26-
where: >
27-
(safe(log.eventType, "") == "modules" ||
28-
safe(log.eventType, "") == "Product ModulesStatus" ||
29-
safe(log.eventType, "") == "registration") &&
30-
(safe(log.severity, "") in ["high", "5"] ||
31-
safe(log.product, "").contains("disabled") ||
32-
safe(log.product, "").contains("stopped") ||
33-
safe(log.restData, "").contains("module") && safe(log.restData, "").contains("stopped") ||
34-
safe(log.restData, "").contains("module") && safe(log.restData, "").contains("disabled") ||
35-
safe(log.restData, "").contains("av") && safe(log.restData, "").contains("failure"))
36-
deduplicateBy:
37-
- lastEvent.log.hostId
38-
- lastEvent.log.eventType
1+
# Rule version v1.0.0
2+
3+
dataTypes:
4+
- antivirus-bitdefender-gz
5+
name: Antivirus Service Stopped or Disabled
6+
impact:
7+
confidentiality: 2
8+
integrity: 3
9+
availability: 3
10+
category: Defense Evasion
11+
technique: "T1562.001 - Impair Defenses: Disable or Modify Tools"
12+
adversary: origin
13+
references:
14+
- https://www.bitdefender.com/business/support/en/77212-237089-event-types.html
15+
- https://attack.mitre.org/techniques/T1562/001/
16+
description: |
17+
Detects when the Bitdefender antivirus service or critical security modules are stopped, disabled, or experiencing failures. This is a critical security event that could indicate malicious tampering or system issues.
18+
19+
Next Steps:
20+
- Verify if the service was intentionally stopped by authorized personnel
21+
- Check system logs for any errors or crashes that may have caused the service to stop
22+
- Look for signs of malware or unauthorized access attempts around the time of the event
23+
- Review recent system changes or updates that might have affected the antivirus service
24+
- If tampering is suspected, isolate the affected system and perform a forensic analysis
25+
- Restart the Bitdefender service and ensure all modules are functioning properly
26+
- Monitor for recurring issues that might indicate persistent threats
27+
where: |
28+
(equals("log.eventType", "modules") ||
29+
equals("log.eventType", "Product ModulesStatus") ||
30+
equals("log.eventType", "registration")) &&
31+
(oneOf("log.severity", ["high", "5"]) ||
32+
contains("log.product", "disabled") ||
33+
contains("log.product", "stopped") ||
34+
(contains("log.restData", "module") && contains("log.restData", "stopped")) ||
35+
(contains("log.restData", "module") && contains("log.restData", "disabled")) ||
36+
(contains("log.restData", "av") && contains("log.restData", "failure")))
37+
groupBy:
38+
- lastEvent.log.eventType
39+
- lastEvent.log.hostId
Lines changed: 41 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -1,54 +1,41 @@
1-
- id: 1013
2-
dataTypes:
3-
- antivirus-bitdefender-gz
4-
name: Advanced Persistent Threat (APT) Detection
5-
impact:
6-
confidentiality: 3
7-
integrity: 3
8-
availability: 2
9-
category: Intrusion
10-
technique: "TA0011 - Command and Control"
11-
adversary: origin
12-
references:
13-
- https://www.bitdefender.com/business/support/en/77212-237089-event-types.html
14-
- https://attack.mitre.org/tactics/TA0011/
15-
description: |
16-
Detects indicators of Advanced Persistent Threats including targeted attacks, sophisticated malware, and persistent threats detected by Bitdefender GravityZone's HyperDetect module.
17-
18-
Next Steps:
19-
- Investigate the affected endpoint to determine the scope of compromise
20-
- Review process execution history and network connections from the affected system
21-
- Check for lateral movement by examining authentication logs from the same source IP
22-
- Isolate the affected system if active threat is confirmed
23-
- Collect forensic artifacts including memory dumps and event logs
24-
- Search for similar malware indicators across the environment
25-
- Review user account activities for signs of credential compromise
26-
- Contact security operations center if threat actors match known APT groups
27-
where: |
28-
safe(log.product, "") == "Bitdefender GravityZone" &&
29-
safe(log.severity, 0) >= 8 &&
30-
(
31-
contains(lower(safe(log.eventType, "")), "apt") ||
32-
contains(lower(safe(log.eventType, "")), "targeted") ||
33-
contains(lower(safe(log.eventType, "")), "advanced") ||
34-
contains(lower(safe(log.eventType, "")), "persistent") ||
35-
contains(lower(safe(log.eventType, "")), "hyperdetect") ||
36-
contains(lower(safe(log.restData, "")), "apt") ||
37-
contains(lower(safe(log.restData, "")), "targeted attack") ||
38-
contains(lower(safe(log.restData, "")), "advanced persistent") ||
39-
contains(lower(safe(log.restData, "")), "lazarus") ||
40-
contains(lower(safe(log.restData, "")), "equation") ||
41-
contains(lower(safe(log.restData, "")), "sofacy") ||
42-
contains(lower(safe(log.restData, "")), "cozy bear") ||
43-
contains(lower(safe(log.restData, "")), "fancy bear") ||
44-
contains(lower(safe(log.restData, "")), "panda") ||
45-
contains(lower(safe(log.restData, "")), "kitten") ||
46-
contains(lower(safe(log.restData, "")), "carbanak") ||
47-
contains(lower(safe(log.restData, "")), "fin7") ||
48-
contains(lower(safe(log.restData, "")), "fileless") ||
49-
safe(log.signatureID, "") == "hyperdetect"
50-
) &&
51-
safe(log.hostId, "") != ""
52-
deduplicateBy:
53-
- log.hostId
54-
- log.eventType
1+
# Rule version v1.0.0
2+
3+
dataTypes:
4+
- antivirus-bitdefender-gz
5+
name: Advanced Persistent Threat (APT) Detection
6+
impact:
7+
confidentiality: 3
8+
integrity: 3
9+
availability: 2
10+
category: Command and Control
11+
technique: "TA0011 - Application Layer Protocol"
12+
adversary: origin
13+
references:
14+
- https://www.bitdefender.com/business/support/en/77212-237089-event-types.html
15+
- https://attack.mitre.org/tactics/TA0011/
16+
description: |
17+
Detects indicators of Advanced Persistent Threats including targeted attacks, sophisticated malware, and persistent threats detected by Bitdefender GravityZone's HyperDetect module.
18+
19+
Next Steps:
20+
- Investigate the affected endpoint to determine the scope of compromise
21+
- Review process execution history and network connections from the affected system
22+
- Check for lateral movement by examining authentication logs from the same source IP
23+
- Isolate the affected system if active threat is confirmed
24+
- Collect forensic artifacts including memory dumps and event logs
25+
- Search for similar malware indicators across the environment
26+
- Review user account activities for signs of credential compromise
27+
- Contact security operations center if threat actors match known APT groups
28+
where: |
29+
equals("log.product", "Bitdefender GravityZone") &&
30+
greaterOrEqual("log.severity", 8) &&
31+
(
32+
contains("log.eventType", ["apt", "targeted", "advanced", "persistent", "hyperdetect"]) ||
33+
contains("log.restData", ["apt", "targeted attack", "advanced persistent",
34+
"lazarus", "equation", "sofacy", "cozy bear", "fancy bear",
35+
"panda", "kitten", "carbanak", "fin7", "fileless"]) ||
36+
equals("log.signatureID", "hyperdetect")
37+
) &&
38+
exists("log.hostId")
39+
groupBy:
40+
- lastEvent.log.eventType
41+
- lastEvent.log.hostId
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
# Rule version v1.0.0
2+
3+
dataTypes:
4+
- antivirus-bitdefender-gz
5+
name: Bitdefender Console Used for Lateral Movement
6+
impact:
7+
confidentiality: 3
8+
integrity: 3
9+
availability: 3
10+
category: Lateral Movement
11+
technique: "T1072 - Software Deployment Tools"
12+
adversary: origin
13+
references:
14+
- https://attack.mitre.org/techniques/T1072/
15+
- https://www.bitdefender.com/business/support/en/77212-237089-event-types.html
16+
description: |
17+
Detects when the Bitdefender GravityZone management console is potentially being used to push malicious policies, scripts, or tasks to managed endpoints, indicating a compromised admin account being leveraged for lateral movement.
18+
19+
Next Steps:
20+
1. Review all recent task and policy deployments from the console
21+
2. Identify the admin account used and verify its legitimacy
22+
3. Check for unusual login patterns to the GravityZone console
23+
4. Review the content of pushed policies for malicious configurations
24+
5. Suspend the admin account if compromise is suspected
25+
6. Audit all managed endpoints for signs of compromise
26+
where: |
27+
(contains("log.message", ["remote task", "deploy", "push policy", "execute script"]) ||
28+
(contains("log.message", "task") && contains("log.message", "created") &&
29+
(contains("log.message", "scan") || contains("log.message", "install") ||
30+
contains("log.message", "uninstall") || contains("log.message", "execute")))) &&
31+
exists("log.severity")
32+
afterEvents:
33+
- indexPattern: v11-log-antivirus-bitdefender-gz-*
34+
with:
35+
- field: log.hostId
36+
operator: filter_term
37+
value: '{{.log.hostId}}'
38+
within: now-30m
39+
count: 10
40+
groupBy:
41+
- lastEvent.log.eventType
42+
- lastEvent.log.hostId
Lines changed: 43 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,43 @@
1+
# Rule version v1.0.0
2+
3+
dataTypes:
4+
- antivirus-bitdefender-gz
5+
name: Bitdefender AV Policy Weakened
6+
impact:
7+
confidentiality: 3
8+
integrity: 3
9+
availability: 2
10+
category: Defense Evasion
11+
technique: "T1562.001 - Impair Defenses: Disable or Modify Tools"
12+
adversary: origin
13+
references:
14+
- https://www.bitdefender.com/business/support/en/77212-237089-event-types.html
15+
- https://attack.mitre.org/techniques/T1562/001/
16+
description: |
17+
Detects when Bitdefender GravityZone antivirus policies are weakened by administrators, such as disabling real-time protection, reducing scan aggressiveness, or adding broad exclusions. This could indicate a compromised admin account or insider threat.
18+
19+
Next Steps:
20+
1. Identify the administrator who modified the policy
21+
2. Verify the policy change was authorized through change management
22+
3. Review the specific settings that were weakened
23+
4. Check for concurrent suspicious activity on managed endpoints
24+
5. Restore the previous policy configuration if unauthorized
25+
6. Review admin account access logs for compromise indicators
26+
where: |
27+
(contains("log.message", ["policy", "configuration", "setting"]) &&
28+
(contains("log.message", ["disabled", "weakened", "reduced", "lowered", "excluded"]) ||
29+
(contains("log.message", "real-time") && contains("log.message", "off")) ||
30+
(contains("log.message", "exclusion") && contains("log.message", "added")) ||
31+
(contains("log.message", "protection") && contains("log.message", "disabled")))) &&
32+
exists("log.severity")
33+
afterEvents:
34+
- indexPattern: v11-log-antivirus-bitdefender-gz-*
35+
with:
36+
- field: log.hostId
37+
operator: filter_term
38+
value: '{{.log.hostId}}'
39+
within: now-1h
40+
count: 3
41+
groupBy:
42+
- lastEvent.log.eventType
43+
- lastEvent.log.hostId
Lines changed: 39 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -1,46 +1,39 @@
1-
- id: 1016
2-
dataTypes:
3-
- antivirus-bitdefender-gz
4-
name: Bootkit/UEFI Threat Detection
5-
impact:
6-
confidentiality: 3
7-
integrity: 3
8-
availability: 3
9-
category: Malware
10-
technique: "T1542.001 - Boot or Logon Autostart Execution: System Firmware"
11-
adversary: origin
12-
references:
13-
- https://attack.mitre.org/techniques/T1542/001/
14-
- https://www.bitdefender.com/business/support/en/77209-135324-event-types.html
15-
description: |
16-
Detects bootkit or UEFI-level threats that attempt to persist at the firmware level and compromise the boot process. These threats can survive system reinstalls and bypass traditional security measures by infecting the system firmware.
17-
18-
Next Steps:
19-
- Isolate the affected system immediately to prevent spread
20-
- Review system boot logs and firmware settings for modifications
21-
- Check for other malware detections on the same host in the past 24-48 hours
22-
- Verify system integrity using offline scanning tools
23-
- Consider reimaging the system and updating firmware/UEFI
24-
- Enable Secure Boot if not already enabled
25-
- Review user activity and recently installed software on the affected system
26-
- Document the infection for incident response reporting
27-
- Check if other systems with similar hardware/firmware versions are affected
28-
where: |
29-
safe(log.eventType, "") == "av" &&
30-
safe(log.severity, 0) >= 8 &&
31-
(
32-
(safe(log.requested, "").contains("boot") ||
33-
safe(log.requested, "").contains("uefi") ||
34-
safe(log.requested, "").contains("rootkit") ||
35-
safe(log.requested, "").contains("firmware")) ||
36-
(safe(log.restData, "").contains("boot") ||
37-
safe(log.restData, "").contains("uefi") ||
38-
safe(log.restData, "").contains("rootkit") ||
39-
safe(log.restData, "").contains("firmware") ||
40-
safe(log.restData, "").contains("\\EFI\\") ||
41-
safe(log.restData, "").contains("/EFI/") ||
42-
safe(log.restData, "").contains("\\boot\\") ||
43-
safe(log.restData, "").contains("/boot/"))
44-
)
45-
deduplicateBy:
46-
- log.hostId
1+
# Rule version v1.0.0
2+
3+
dataTypes:
4+
- antivirus-bitdefender-gz
5+
name: Bootkit/UEFI Threat Detection
6+
impact:
7+
confidentiality: 3
8+
integrity: 3
9+
availability: 3
10+
category: Defense Evasion, Persistence
11+
technique: "T1542.001 - Boot or Logon Autostart Execution: System Firmware"
12+
adversary: origin
13+
references:
14+
- https://attack.mitre.org/techniques/T1542/001/
15+
- https://www.bitdefender.com/business/support/en/77209-135324-event-types.html
16+
description: |
17+
Detects bootkit or UEFI-level threats that attempt to persist at the firmware level and compromise the boot process. These threats can survive system reinstalls and bypass traditional security measures by infecting the system firmware.
18+
19+
Next Steps:
20+
- Isolate the affected system immediately to prevent spread
21+
- Review system boot logs and firmware settings for modifications
22+
- Check for other malware detections on the same host in the past 24-48 hours
23+
- Verify system integrity using offline scanning tools
24+
- Consider reimaging the system and updating firmware/UEFI
25+
- Enable Secure Boot if not already enabled
26+
- Review user activity and recently installed software on the affected system
27+
- Document the infection for incident response reporting
28+
- Check if other systems with similar hardware/firmware versions are affected
29+
where: |
30+
equals("log.eventType", "av") &&
31+
greaterOrEqual("log.severity", 8) &&
32+
(
33+
contains("log.requested", ["boot", "uefi", "rootkit", "firmware"]) ||
34+
contains("log.restData", ["boot", "uefi", "rootkit", "firmware",
35+
"\\EFI\\", "/EFI/", "\\boot\\", "/boot/"])
36+
)
37+
groupBy:
38+
- lastEvent.log.hostId
39+
- lastEvent.log.severity

rules/antivirus/bitdefender_gz/critical_threat_detection.yml

Lines changed: 0 additions & 32 deletions
This file was deleted.

0 commit comments

Comments
 (0)