ET Intelligence
Emerging Threat (ET) Intelligence delivers the most timely and accurate threat intelligence. Our fully verified provides deeper context and integrates seamlessly with your security tools to enhance the network threat decision-making automatically .
Knowing what types of threats exist is no longer enough to protect your people, data, and brand. Emerging Threat (ET) intelligence helps prevent attacks and reduce risk by helping you understand the historical context of where these threats originated, who is behind them, when have they attacked, what methods they used, and what they're after. Get on-demand access to current and historical metadata on IPs, domains, and other related threat intelligence to help research threats and investigate incidents.
In addition to reputation intel, you get condemnation evidence, deep context, history, and detection information. It's all searchable in an easy-to-use threat intelligence portal that includes:
- Trends and timestamps of when a threat was seen and the associated category
- Type of threat and exploit kit names when available
- Related samples used in associated or related attacks.
the general intent of each ruleset category
Each major category of rules is there for general organization. We don't recommend that you turn on and off sets of rules purely by the category name. You MUST take a look at the entire rule sets. But you should only have to do this once, or on regular reviews.
To assist though here's a basic explanation of each category and the intent to help you find a rule you're looking for:
Attack-Response Rules
These are designed to catch the results of a successful attack. Things like "id=root", or error messages that indicate a compromise may have happened. Note: Trojan and virus post-infection activity is included generally in the VIRUS rule set, not here.
BotCC Rules
These are auto generated from several sources of known and confirmed active Botnet and other Command and Control hosts. Updated daily, primary data source is Shadowserver.org.
Compromised Rules
This is a list of known compromised hosts, confirmed and updated daily as well. This set varied from a hundred to several hunderd rules depending on the data sources. This is a compilation of several private but highly reliable data sources. Warming: Snort does not handle IP matches well load-wise. If your sensor is already pushed to the limits this set will add significant load. We recommend staying with just the BotCC rules in a high load case.
Current_Events Rules
These are rules that we don't intend to keep in the ruleset for long, or that need to be tested before they are considered for inclusion. Most often these will be simple sigs for the Storm binary URL of the day, sigs to catch CLSID's of newly found vulnerable apps where we don't have any detail on the exploit, etc. Useful sigs, but not for the long term.
DOS Rules
Intended to catch inbound DOS activity, and outbound indications. Relatively self-explanatory.
DROP Rules
This is a daily updated list of the Spamhaus DROP (Don't Route or Peer) list. Primarily known professional spammers. More info at http://www.spamhaus.org
DShield Rules
Daily updated list of the DShield top attackers list. Also very reliable. More indo at http://www.dshield.org
Exploit Rules
Rules to detect direct exploits. Generally if you're looking for a windows exploit, Veritas, etc, they'll be here. Things like SQL injection and the like, whie they are exploits, have their own category.
Game Rules
World of Warcraft, Starcraft, and other popular online games have sigs here. We don't intend to label these things evil, just that they're not appropriate for all environments.
Inappropriate Rules
Porn, Kiddy porn, sites you shouldn't visit at work, etc. Warning: These are generally quite Regex heavy and thus high load and frequent false positives. Only run these if you're really interested.
Malware Rules
My personal favorite. This set was originally intended to be just spyware. That's enough to several rule categories really. The line between spyware and outright malicious bad stuff has blurred to much since we originally started this set. There is more than just spyware in here, but rest assured nothing in here is something you want running on your net or PC. There are URL hooks for known update schemed, User-Agent strings of known malware, and a load of other goodies. If you can only run one ruleset to jsutify your IDS infrastructure, this is it!
P2P Rules
Peer to Peer stuff. Bittorrent, Gnutella, Limewire, you name it. We're not labeling these things Bad(tm), just not appropriate for all networks and environments.
Policy Rules
Rules for things that are often disallowed by company or organizational policy. Myspace, Ebay, that kind of thing.
Scan Rules
Things to detect reconnaissance and probing. Nessus, Nikto, port scanning, etc. Early warning stuff.
VOIP Rules
A new and emerging rule set. Small at the moment, but we expect it to grow soon.
Web Rules
Some SQL Injection, web server overflows, vulnerable web apps, that kind of thing. Very important if you're running web servers, and pretty reasonable load.
Web-SQL-Injection Rules
This is a large ruleset that intends to catch specific attacks on specific applications. There are some general SQL injection rules that work pretty well to catch most of what's covered here. But these rules are much more specific to apps and web servers. Run this if you run a highly critical web farm, or are interested in having exact information about incoming web attacks.
Malware Docs
- BackdoorWin32Assasin
- DropperWin32VBcn
- EJihadHackTool
- GrooveNet
- GzipdPOST
- OdeRoor
- TrojanBandook
- TrojanDropper497
- TrojanUniversal1337
- Win32AgentALT
- Win32Looked
- Win32Medbod
- Win32Turkojan
- WinPEHeaders
- Windows98UA
- WormPyks