packet-noir/sig_sum

GitHub: packet-noir/sig_sum

对指定目录中的 Sigma 规则文件进行自动汇总,提取关键元信息以简化规则管理与分析。

Stars: 0 | Forks: 0

# sig_sum 接受包含 Sigma 规则的目录路径,并对这些规则进行汇总。 ## 依赖 - Python >=3.10 - 第三方模块 'requests' - 第三方模块 'pyyaml' ## 用法 ``` python sig_sum.py /absolute/path/to/directory ``` ## 示例输出 ``` title: File And SubFolder Enumeration Via Dir Command severity: low source: process_creation from windows Mitre Tags: ['discovery', 't1217'] Mitre Technique Name(s): ['Browser Information Discovery'] Detection: {'selection_cmd': [{'Image|endswith': '\\cmd.exe'}, {'OriginalFileName': 'Cmd.Exe'}], 'selection_cli': {'CommandLine|contains|windash': 'dir*-s'}, 'condition': 'all of selection_*'} title: Potential Product Reconnaissance Via Wmic.EXE severity: medium source: process_creation from windows Mitre Tags: ['execution', 't1047'] Mitre Technique Name(s): ['Windows Management Instrumentation'] Detection: {'selection_img': [{'Image|endswith': '\\wmic.exe'}, {'OriginalFileName': 'wmic.exe'}], 'selection_cli': {'CommandLine|contains': 'Product'}, 'filter_main_call_operations': {'CommandLine|contains': [' uninstall', ' install']}, 'condition': 'all of selection_* and not 1 of filter_main_*'} title: PUA - NirCmd Execution As LOCAL SYSTEM severity: high source: process_creation from windows Mitre Tags: ['execution', 't1569.002', 's0029'] Mitre Technique Name(s): ['Service Execution'] Detection: {'selection': {'CommandLine|contains': ' runassystem '}, 'condition': 'selection'} ```
标签:AMSI绕过, ATT&CK框架, Cloudflare, MITRE ATT&CK, pyyaml, requests, Sigma规则, Windows端点, 依赖管理, 命令行检测, 威胁检测, 安全开发生命周期, 目标导入, 端点检测, 自动化分析, 规则汇总, 跨站脚本, 逆向工具