normalize logsource

This commit is contained in:
frack113
2021-11-09 10:48:13 +01:00
parent 8f39ef9ed1
commit 6c19303aa4
5 changed files with 13 additions and 7 deletions
@@ -10,7 +10,7 @@ references:
- https://twitter.com/Cyb3rWard0g/status/1381642789369286662
logsource:
product: windows
service: Microsoft-ServiceBus-Client
service: microsoft-servicebus-client
detection:
selection:
EventID:
@@ -1,4 +1,4 @@
title: WMI Command Execution by Office Applications
title: EDR WMI Command Execution by Office Applications
id: 3ee1bba8-b9e2-4e35-bec5-7fb66b6b3815
description: Initial execution of malicious document calls wmic Win32_Process::Create to execute the file with regsvr32
references:
@@ -13,9 +13,10 @@ tags:
- attack.defense_evasion
status: experimental
date: 2021/08/23
modified: 2021/11/09
logsource:
product: EndPoint Detection Logs
category: process_creation
product: windows
category: edr
detection:
#useful_information: Add more office applications to the rule logic of choice
selection1:
+1 -1
View File
@@ -9,8 +9,8 @@ references:
- https://github.com/PowerShellMafia/PowerSploit/blob/master/Recon/PowerView.ps1
- https://github.com/BloodHoundAD/SharpHound3/blob/master/SharpHound3/LdapBuilder.cs
logsource:
category: ldap_query
product: windows
service: ldap_debug
definition: 'Requires Microsoft-Windows-LDAP-Client/Debug ETW logging'
detection:
generic_search:
@@ -5,7 +5,7 @@ related:
type: derived
description: Detects disabling Windows Defender threat protection
date: 2020/07/28
modified: 2021/09/21
modified: 2021/11/09
author: Ján Trenčanský, frack113
references:
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus
@@ -17,7 +17,7 @@ tags:
- attack.t1562.001
logsource:
product: windows
category: system
service: system
detection:
selection3:
EventID: 7036
@@ -100,6 +100,11 @@ logsources:
service: msexchange-management
conditions:
winlog.channel: 'MSExchange Management'
microsoft-servicebus-client:
product: windows
service: microsoft-servicebus-client
conditions:
winlog.channel: 'Microsoft-ServiceBus-Client'
defaultindex: winlogbeat-*
# Extract all field names with yq:
# yq -r '.detection | del(.condition) | map(keys) | .[][]' $(find sigma/rules/windows -name '*.yml') | sort -u | grep -v ^EventID$ | sed 's/^\(.*\)/ \1: winlog.event_data.\1/g'