OtunbaAde001/soc-detection-rules

GitHub: OtunbaAde001/soc-detection-rules

Stars: 0 | Forks: 0

# SOC 检测规则 本项目包含 Microsoft Sentinel KQL 查询、Sigma 检测规则以及 MITRE ATT&CK 映射 ``` SigninLogs | where ResultType != "0" // Filter for failed sign-ins | summarize Count = count() by UserPrincipalName, bin(TimeGenerated, 1h) | order by Count desc ``` ``` DeviceNetworkEvents | summarize count() by RemoteIP | order by count_ desc ``` ``` let startTime = ago(30d); let endTime = now(); let suspiciousExtensions = dynamic([".locked", ".encrypted", ".crypt"]); let massFileModifications = DeviceNetworkEvents | where Timestamp between (startTime .. endTime) | where ActionType == "FileModified" | summarize Count = count() by FileName, DeviceId | where Count > 100; // Example threshold for mass modifications let highVolumeRenames = DeviceNetworkEvents | where Timestamp between (startTime .. endTime) | where ActionType == "FileRenamed" | summarize Count = count() by FileName, DeviceId | where Count > 100; // Example threshold for high-volume renames let knownRansomwareProcesses = DeviceNetworkEvents | where Timestamp between (startTime .. endTime) | where ProcessName in ("vssadmin.exe", "wbadmin.exe", "bcdedit.exe", "cipher.exe") | summarize Count = count() by ProcessName, DeviceId; let shadowCopyDeletions = DeviceNetworkEvents | where Timestamp between (startTime .. endTime) | where ActionType == "ShadowCopyDeleted" | summarize Count = count() by DeviceId; union massFileModifications, highVolumeRenames, knownRansomwareProcesses, shadowCopyDeletions | summarize TotalCount = sum(Count) by DeviceId | order by TotalCount desc ```
标签:AMSI绕过, EDR, IP 地址批量处理, KQL, M365 Defender, Microsoft Sentinel, 勒索软件, 威胁检测, 安全运营, 影子副本删除, 扫描框架, 文件加密检测, 检测规则, 登录失败分析, 网络安全, 网络流量分析, 网络资产发现, 脆弱性评估, 速率限制, 隐私保护