Add: README.md

This commit is contained in:
itiB
2022-04-06 01:54:09 +09:00
parent 51f8d405f8
commit 52bc918cfb
3 changed files with 30 additions and 1 deletions
+15
View File
@@ -60,6 +60,7 @@ Hayabusa is a **Windows event log fast forensics timeline generator** and **thre
- [Hayabusa v.s. Converted Sigma Rules](#hayabusa-vs-converted-sigma-rules)
- [Detection Rule Tuning](#detection-rule-tuning)
- [Event ID Filtering](#event-id-filtering)
- [Detection Level Tuning](#detection-level-tuning)
- [Other Windows Event Log Analyzers and Related Projects](#other-windows-event-log-analyzers-and-related-projects)
- [Comparison To Other Similar Tools](#comparison-to-other-similar-tools)
- [Community Documentation](#community-documentation)
@@ -498,6 +499,20 @@ We have provided a sample ID filter list at [`config/target_eventids_sample.txt`
Please use this list if you want the best performance but be aware that there is a slight possibility for missing events (false negatives).
## Detection Level Tuning
The Hayabusa rule and Sigma rule determine the threat level when each author detects it.
To set the user to their own threat level, write the conversion information in `./config/level_tuning.txt` and execute` hayabusa --level-tuning` to rewrite the rule file.
Please note that the rule file will be rewritten directly.
`./config/level_tuning.txt` Sample
```
id,next_level
00000000-0000-0000-0000-000000000000,informational # sample leveltunig line
```
The threat level of the rule corresponding to `00000000-0000-0000-0000-000000000000` in the rules directory is rewritten to` informational`.
# Other Windows Event Log Analyzers and Related Projects
There is no "one tool to rule them all" and we have found that each has its own merits so we recommend checking out these other great tools and projects and seeing which ones you like.