ET / ETPRO INFO rules that does not have severity "Informational"

Hi ET Team :slight_smile: ,

could you consider to change the serverity of these rules to match the category (“Informational” and sev:3+ )? This will make life easier on the SOC to filter out these signatures until further investigating a possible compromise.

Signature sid Severity
ET INFO Observed DNS Query to .cloud TLD 2027865 Major
ET INFO Observed DNS Query to .biz TLD 2027863 Major
ET INFO Observed DNS Query to .world TLD 2027870 Major
ET INFO Observed DNS Query to .life TLD 2027867 Major
ET INFO DNS Query for Suspicious .icu Domain 2026888 Minor
ET INFO [eSentire] Possible Kali Linux Updates 2025627 Minor
ET INFO Observed DNS Query to .work TLD 2027868 Major
ETPRO INFO Dynamic DNS Provider DNS Lookup (gotdns .ch) 2833171 Major
ETPRO INFO DNS TXT Response Contains URL 2823117 Major
ETPRO INFO .moe Domain in TLS SNI 2827579 Major
ET INFO Observed DNS Query to .fit TLD 2027871 Major
ETPRO INFO HTTP Request with Lowercase accept Header Observed 2838132 Minor
ET INFO Peer-to-Peer File Sharing Service Domain in DNS Lookup (ipfs .io) 2036873 Major
ETPRO INFO DNS Query to server.com (Possible Misconfiguration) 2822354 Minor
ET INFO Suspicious Domain (*.icu) in TLS SNI 2026889 Minor
ET INFO Observed DNS Query to .desi TLD 2027866 Major
ET INFO HTTP Request to Suspicious *.world Domain 2027879 Minor
ETPRO INFO HTTP Request with Lowercase connection Header Observed 2838131 Minor
ET INFO infinityfree .net Domain in DNS Lookup 2035538 Major
ET INFO Dotted Quad Host PDF Request 2027265 Minor
ETPRO INFO AdGuard DNS Over HTTPS Certificate Inbound 2851070 Major
ET INFO HTTP Request to a *.top domain 2023882 Major
ET INFO HTTP Request to Suspicious *.cloud Domain 2027874 Minor
ET INFO Image Hosting Domain in DNS Lookup (hizliresim .com) 2035655 Major
ET INFO Custom Logo Domain Domain in DNS Lookup (logodownload .org) 2037269 Major
ET INFO URL Shortener Service Domain in DNS Lookup (vk .sv) 2035227 Major
ET INFO Possible Rogue LoJack Asset Tracking Agent 2025553 Minor
ET INFO Observed File Sharing Domain (roamresearch .com in TLS SNI) 2037763 Major
ET INFO External Host Probing for ChromeCast Devices 2026758 Minor
ET INFO Observed DNS Query to Commonly Abused Preview Domain (preview-domain .com) 2034561 Major
ET INFO JAR Containing Executable Downloaded 2016379 Major
ET INFO Unconfigured nginx Access 2023668 Major
ET INFO Python BaseHTTP ServerBanner 2034635 Minor
ET INFO webhook .site in TLS SNI 2034634 Minor
ET INFO Observed DNS Query to .okinawa TLD 2027864 Major
ETPRO INFO Suspicious Registrar Nameservers in DNS Response (internet .bs) 2834878 Minor
ET INFO HTTP Request to Suspicious *.work Domain 2027877 Minor
ET INFO HTTP Request to Suspicious *.life Domain 2027876 Minor
ET INFO URL Shortening Service Domain in DNS Lookup (www .temporary-url .com) 2038741 Major
ET INFO PowerShell NoProfile Command Received In Powershell Stagers 2026988 Minor
ET INFO PowerShell DownloadString Command Common In Powershell Stagers 2026995 Major
ET INFO Dotted Quad Host DOC Request 2027251 Minor

Thanks for the report @netcrawlr! I went ahead and set all of these to an “Informational” severity and this update should go out in today’s release!

1 Like

Thank you, highly appreciated :slight_smile:

More signatures with the category INFO and none or other than informational for metadata.signature_severity. Can you consider to change the category for most of these to Misc Activity also?

alert.signature_id alert.metadata.signature_severity alert.signature alert.category
2031071 - ET INFO Microsoft Connection Test Potentially Bad Traffic
2012758 - ET INFO DYNAMIC_DNS Query to *.dyndns. Domain Misc activity
2013744 - ET INFO DYNAMIC_DNS HTTP Request to a no-ip Domain Potentially Bad Traffic
2845391 - ETPRO INFO HTTP Request with Lowercase user-agent Header Observed Potentially Bad Traffic
2035466 - ET INFO Observed Discord Domain in DNS Lookup (discordapp .com) Misc activity
2031502 - ET INFO Request to Hidden Environment File Misc Attack
2017515 - ET INFO User-Agent (python-requests) Inbound to Webserver Attempted Information Leak
2013097 - ET INFO DYNAMIC_DNS HTTP Request to a .dyndns. domain Potentially Bad Traffic
2014819 - ET INFO Packed Executable Download Misc activity
2022918 - ET INFO DYNAMIC_DNS Query to *.duckdns. Domain Misc activity
2025105 - ET INFO DNS Query for Suspicious .ga Domain Potentially Bad Traffic
2014520 - ET INFO EXE - Served Attached HTTP Misc activity
2013743 - ET INFO DYNAMIC_DNS Query to a Suspicious no-ip Domain Potentially Bad Traffic
2031231 - ET INFO Observed ZeroSSL SSL/TLS Certificate Potentially Bad Traffic
2035465 - ET INFO Observed Discord Domain in DNS Lookup (discord .com) Misc activity
2035463 - ET INFO Observed Discord Domain (discord .com in TLS SNI) Misc activity
2851162 - ETPRO INFO Observed DNS Query for Ukraine Domain (.ua) Potential Corporate Privacy Violation
2025106 - ET INFO DNS Query for Suspicious .ml Domain Potentially Bad Traffic
2031228 - ET INFO Observed ZeroSSL Certificate for Suspicious TLD (.xyz) Potentially Bad Traffic
2016777 - ET INFO HTTP Request to a *.pw domain Potentially Bad Traffic
2035464 - ET INFO Observed Discord Domain (discordapp .com in TLS SNI) Misc activity
2025107 - ET INFO DNS Query for Suspicious .cf Domain Potentially Bad Traffic
2025109 - ET INFO Suspicious Domain (*.ga) in TLS SNI Potentially Bad Traffic
2025110 - ET INFO Suspicious Domain (*.ml) in TLS SNI Potentially Bad Traffic
2851484 - ETPRO INFO SMB/DCERPC Bind_ack with Endian Flipped Misc activity
2834877 Minor ETPRO INFO Suspicious Registrar Nameservers in DNS Response (internet .bs) Potential Corporate Privacy Violation
2031501 - ET INFO Netlink GPON Login Attempt (GET) Attempted Administrator Privilege Gain
2025111 - ET INFO Suspicious Domain (*.cf) in TLS SNI Potentially Bad Traffic
2015744 - ET INFO EXE IsDebuggerPresent (Used in Malware Anti-Debugging) Misc activity
2840581 - ETPRO INFO Inbound Base64 Encoded Wide PowerShell Keyword (DownloadFile) Potentially Bad Traffic

Awesome. I’ll take a look at these and make some changes! Will update you once I’ve completed.

1 Like

I got all these moved assigned to “information” severity, some applied with misc-activity, and at least one moved over to HUNTING. Should all come out with today’s release!

Thanks for the suggestion!

1 Like