This SRU number: 2014-03-19-001
Previous SRU number: 2014-03-17-001
Applies to:
This SEU number: 1069
Previous SEU: 1068
Applies to:
This is the complete list of rules added in SRU 2014-03-19-001 and SEU 1069.
The format of the file is:
GID - SID - Rule Group - Rule Message - Policy State
The Policy State refers to each default Sourcefire policy, Connectivity, Balanced and Security.
The default passive policy state is the same as the Balanced policy state with the exception of alert being used instead of drop.
Note: Unless stated explicitly, the rules are for the series of products listed above.
| GID | SID | Rule Group | Rule Message | Policy State | ||
|---|---|---|---|---|---|---|
| Con. | Bal. | Sec. | ||||
| 1 | 30221 | INDICATOR-SHELLCODE | Metasploit linux/x86 reverse_tcp stager transfer attempt | off | off | off |
| 1 | 30222 | INDICATOR-SHELLCODE | Metasploit shellcode linux/x86/meterpreter stage transfer attempt | off | off | off |
| 1 | 30223 | INDICATOR-SHELLCODE | Metasploit shellcode linux/x86/shell stage transfer attempt | off | off | off |
| 1 | 30224 | INDICATOR-SHELLCODE | Metasploit shellcode linux/x86/shell_reverse_tcp single stage transfer attempt | off | off | off |
| 1 | 30225 | INDICATOR-SHELLCODE | possible /bin/sh shellcode transfer attempt | off | off | off |
| 1 | 30226 | INDICATOR-SHELLCODE | Metasploit windows/meterpreter stage transfer attempt | off | off | off |
| 1 | 30227 | INDICATOR-SHELLCODE | Metasploit windows/reverse_tcp stager transfer attempt | off | off | off |
| 1 | 30228 | INDICATOR-SHELLCODE | Metasploit windows/shell stage transfer attempt | off | off | off |
| 1 | 30229 | INDICATOR-SHELLCODE | Metasploit windows/shell stage transfer attempt | off | off | off |
| 1 | 30230 | INDICATOR-COMPROMISE | suspicious test for public IP - www.dawhois.com | off | drop | drop |
| 1 | 30231 | MALWARE-CNC | Win.Trojan.Eybog variant outbound connection | off | drop | drop |
| 1 | 30232 | OS-WINDOWS | Microsoft Anti-Cross Site Scripting library bypass attempt | off | off | off |
| 1 | 30233 | OS-WINDOWS | Microsoft Anti-Cross Site Scripting library bypass attempt | off | off | off |
| 1 | 30234 | MALWARE-CNC | Win.Trojan.Eybog variant outbound connection | off | drop | drop |
Updated rules can be found at this link.