Tuning detections issue while using wildcards - Sigma rules #13631
-
Version2.4.100 Installation MethodSecurity Onion ISO image Descriptionconfiguration Installation TypeStandalone Locationon-prem with Internet access Hardware SpecsMeets minimum requirements CPU4 RAM16 Storage for /98 Storage for /nsm192 Network Traffic Collectiontap Network Traffic SpeedsLess than 1Gbps StatusYes, all services on all nodes are running OK Salt StatusNo, there are no failures LogsNo, there are no additional clues DetailHello, I Found a bug (might be a bug) within the tuning section of the detection section of 2.4.100. I haven't tested this with all detections. As of currently, the only issue that I have right at the moment is the tuning part of a sigma rule. the sigma rule is called "Renamed ZOHO Dctask64 Execution". I am currently attempting to white list a specific file path. I tempted to use wild cards in place of a file path extensions because i have other users that use the same browser on their and preventing tuning fatigue. I tried using C:\Users*\AppData\Local\Mozilla\Firefox\Profiles* which resulted in a failure of 400 while importing this method, Which indicates that a specific file path did not exist because of the wildcard in place of the user name. I switched back to C:\Users\some_user\AppData\Local\Mozilla\Firefox\Profiles* which works perfectly. no errors. However the rule is still currently firing even that it has been excluded according to the tuning rules that was provided under the detection source > convert > test in Kibana. Now if I add additional slash to the output it works perfectly as shown below: When clicking on convert within the detection it shows this: I have attempted to add addition slashes to the output to the rule while tuning the path out and when I attempt to save it fails with error 400 bad request. This might be a bug with the security onion conversion, or something that was overlooked or it could be something that was intended, but i did check your channels and I couldn't find a video to where I can use wildcards appropriately. Guidelines
|
Beta Was this translation helpful? Give feedback.
Replies: 6 comments 3 replies
-
Beta Was this translation helpful? Give feedback.
-
Does this work for you? In detections tuning I added
which converts into
I think you might just be missing the keyword modifiers like |
Beta Was this translation helpful? Give feedback.
-
I attempted to use |endswith or |startswith variables but didn't work as expected. I was just missing |contains variable which will wrap the string as you have shown. Thank you for your help! |
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
The issue with the 400 error code, we were unable to track down what caused this error. However we did reimage Security Onion instance and the errors went away and should only receive error code 400 is when the artifacts was not found. While doing the suggestions that you have provided and we really appreciate it and does work after reimaging. Now when we force sync to make the changes to the tuning for the rules will fail due to rule mismatch error on elastalert side. We noticed that elastalert will still be sitting with rules mismatch for a couple days then go to OK status and then repeat itself. To remove the rules mismatch is to reboot Security Onion and then the detections will sync and once finished then elastalert returns with OK status. This discussion has been resolved. |
Beta Was this translation helpful? Give feedback.
Does this work for you?
In detections tuning I added
which converts into
I think you might just be missing the keyword modifiers like
|contains
or|endswith
contains would get you the string wrapped in*<string>*
endswith would you get you*<string>
https://sigmahq.io/docs/basics/modifiers.html