Files
blue-team-tools/tools/config/crowdstrike.yml
T

31 lines
659 B
YAML
Raw Normal View History

2021-06-10 17:07:01 +02:00
title: Splunk used in Falcon Portal
2020-05-08 13:41:52 +03:00
order: 20
backends:
- crowdstrike
logsources:
windows-sysmon:
product: windows
service: sysmon
conditions:
EventID: 1
process_creation_1:
category: process_creation
product: windows
fieldmappings:
EventID: EventID
CommandLine: Commandline
Command_Line: Commandline
cmdline: Commandline
2020-05-08 13:41:52 +03:00
Image: ImageFileName
TargetFilename: TargetFilename
image: ImageFileName
image_path: ImageFileName
OriginalFileName: ImageFileName
sha1: SHA1HashData
user: UserName
TaskName: TaskName
ParentImage: ParentBaseFileName
parent_image: ParentBaseFileName
ServiceName: ServiceName