/etc/prelude-lml/ruleset/rishi.rules is in prelude-lml 1.0.0-5.3.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 | #####
#
# Copyright (C) 2007 Bjoern Weiland <bjoern-dot-weiland-at-web-dot-de>
# All Rights Reserved
#
# This file is part of the Prelude-LML program.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2, or (at your option)
# any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; see the file COPYING. If not, write to
# the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
#
#####
## Ruleset for the Rishi Project, Identifying Bot Contaminated Hosts
## by IRC Nickname Evaluation
#IRC Connections with fairly high value (>= 5 and <= 10)
#LOG:2007-05-20 12:49:57,644 INFO srcIP: 129.13.x.y srcPort: 1312 dstIP: 80.64.x.y dstPort: 6666 Nick: myFunnyNick Value: 5
regex=INFO srcIP: (\S+)\s+srcPort: (\d+)\s+dstIP: (\S+)\s+dstPort: (\d+)\s+Nick: (\S+)\s+Value: (?!0|1|2|3|4)(\d)$; \
classification.text=Possible IRC bot connection; \
id=30000; \
revision=1; \
analyzer(0).name=Rishi; \
analyzer(0).manufacturer=http://zero.ram.rwth-aachen.de/rishi/; \
analyzer(0).class=NIDS; \
source(0).node.address(0).address=$1; \
source(0).service.port=$2; \
target(0).node.address(0).address=$3; \
target(0).service.port=$4; \
target(0).user.category=application; \
target(0).user.user_id(0).type=target-user; \
target(0).user.user_id(0).name=$5; \
assessment.impact.completion=succeeded; \
assessment.impact.type=user; \
assessment.impact.severity=medium; \
assessment.impact.description=A yet unknown bot might have initiated a connection to a C&C Server, investigation required; \
additional_data(0).type=integer; \
additional_data(0).meaning=Calculated Value; \
additional_data(0).data=$6; \
last;
#Connections to a non-standard port with a low value (< 5)
#LOG:2007-05-20 12:49:57,644 INFO srcIP: 129.13.x.y srcPort: 1312 dstIP: 80.64.x.y dstPort: 1501 Nick: myFunnyNick Value: 3
regex=INFO srcIP: (\S+)\s+srcPort: (\d+)\s+dstIP: (\S+)\s+dstPort: (?!6665|6666|6667|6668)(\d+)\s+Nick: (\S+)\s+Value: (0|1|2|3|4)$; \
classification.text=IRC Connection to non-standard port; \
id=30001; \
revision=1; \
analyzer(0).name=Rishi; \
analyzer(0).manufacturer=http://zero.ram.rwth-aachen.de/rishi/; \
analyzer(0).class=NIDS; \
source(0).node.address(0).address=$1; \
source(0).service.port=$2; \
target(0).node.address(0).address=$3; \
target(0).service.port=$4; \
target(0).user.category=application; \
target(0).user.user_id(0).type=target-user; \
target(0).user.user_id(0).name=$5; \
assessment.impact.completion=succeeded; \
assessment.impact.type=user; \
assessment.impact.severity=low; \
assessment.impact.description=To be investigated, probably false positive that needs to be whitelisted; \
additional_data(0).type=integer; \
additional_data(0).meaning=Calculated Value; \
additional_data(0).data=$6; \
last;
#Connection with a very high value (>= 10)
#LOG:2007-05-20 12:49:57,644 INFO srcIP: 129.13.x.y srcPort: 1312 dstIP: 80.64.x.y dstPort: 4545 Nick: [LsasS]213242344 Value: 11
regex=INFO srcIP: (\S+)\s+srcPort: (\d+)\s+dstIP: (\S+)\s+dstPort: (\d+)\s+Nick: (\S+)\s+Value: (?!0$|1$|2$|3$|4$|5$|6$|7$|8$|9$)(\d+); \
classification.text=Possible IRC Bot identified; \
id=30002; \
revision=1; \
analyzer(0).name=Rishi; \
analyzer(0).manufacturer=http://zero.ram.rwth-aachen.de/rishi/; \
analyzer(0).class=NIDS; \
source(0).node.address(0).address=$1; \
source(0).service.port=$2; \
target(0).node.address(0).address=$3; \
target(0).service.port=$4; \
target(0).user.category=application; \
target(0).user.user_id(0).type=target-user; \
target(0).user.user_id(0).name=$5; \
assessment.impact.completion=succeeded; \
assessment.impact.type=user; \
assessment.impact.severity=high; \
assessment.impact.description=Possible bot contaminated host identified; \
additional_data(0).type=integer; \
additional_data(0).meaning=Calculated Value; \
additional_data(0).data=$6; \
last;
|