This commit is contained in:
James
2021-09-13 23:26:15 +09:00
committed by GitHub
parent a469e6e60b
commit 403844ae45
25 changed files with 6 additions and 26 deletions

View File

@@ -1,6 +1,5 @@
title: BitsJob
description: Adversaries may abuse BITS jobs to persistently execute or clean up after malicious payloads.
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: PowerShell Execution Pipeline
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: PowerShell Execution Remote Command
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: The Audit log file was cleared
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: Sensitive Privilede Use (Mimikatz)
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: An Operation was attempted on a privileged object
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: Command Line Logging
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: A user account was created.
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: A member was added to a security-enabled global group.
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: A member was added to a security-enabled local group.
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: A member was added to a security-enabled universal group.
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,6 @@
title: An account failed to log on
description: hogehoge
enabled: false
ignore: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,6 @@
title: An account failed to log on
description: hogehoge
enabled: false
ignore: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,6 @@
title: Command Line Logging
description: hogehoge
enabled: false
ignore: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: Sysmon Check command lines
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: Check for unsigned EXEs/DLLs
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: The System log file was cleared
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: This service may not function properly
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: The ... service entered the stopped|running state
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: The start type of the Windows Event Log service was changed from auto start to disabled
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: A service was installed in the system
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: AS-REP Roasting
description: For each account found without preauthentication, an adversary may send an AS-REQ message without the encrypted timestamp and receive an AS-REP message with TGT data which may be encrypted with an insecure algorithm such as RC4.
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: Kerberoasting
description: Adversaries may abuse a valid Kerberos ticket-granting ticket (TGT) or sniff network traffic to obtain a ticket-granting service (TGS) ticket that may be vulnerable to Brute Force.
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -1,6 +1,5 @@
title: PowerShell DownGradeAttack
description: hogehoge
enabled: true
author: Yea
logsource:
product: windows

View File

@@ -43,9 +43,10 @@ impl ParseYaml {
Ok(docs) => {
for i in docs {
// If there is no "enabled" it does not load
if i["enabled"].as_bool().unwrap_or(false) {
&self.files.push(i);
if i["ignore"].as_bool().unwrap_or(false) {
continue;
}
&self.files.push(i);
}
}
Err(e) => {