regex rule implemented
This commit is contained in:
17
rules/deep_blue_cli/system/104.yml
Normal file
17
rules/deep_blue_cli/system/104.yml
Normal file
@@ -0,0 +1,17 @@
|
||||
title: The System log file was cleared
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Channel: System
|
||||
EventID: 104
|
||||
# condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: medium
|
||||
output: 'System Log Clear¥nThe System log was cleared.'
|
||||
creation_date: 2020/11/8
|
||||
uodated_date: 2020/11/8
|
||||
19
rules/deep_blue_cli/system/7030.yml
Normal file
19
rules/deep_blue_cli/system/7030.yml
Normal file
@@ -0,0 +1,19 @@
|
||||
title: This service may not function properly
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Channel: System
|
||||
EventID: 7030
|
||||
param1:
|
||||
regexes: ./regexes.txt
|
||||
# condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: low
|
||||
output: 'Interactive service warning¥nService name: %ServiceName%¥nMalware (and some third party software) trigger this warning'
|
||||
creation_date: 2020/11/8
|
||||
uodated_date: 2020/11/8
|
||||
19
rules/deep_blue_cli/system/7036.yml
Normal file
19
rules/deep_blue_cli/system/7036.yml
Normal file
@@ -0,0 +1,19 @@
|
||||
title: The ... service entered the stopped|running state
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Channel: System
|
||||
EventID: 7036
|
||||
param1:
|
||||
regexes: ./regexes.txt
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: low
|
||||
output: 'Suspicious Service Name¥nService name: %ServiceName%'
|
||||
creation_date: 2020/11/8
|
||||
uodated_date: 2020/11/8
|
||||
21
rules/deep_blue_cli/system/7040.yml
Normal file
21
rules/deep_blue_cli/system/7040.yml
Normal file
@@ -0,0 +1,21 @@
|
||||
title: The start type of the Windows Event Log service was changed from auto start to disabled
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Channel: System
|
||||
EventID: 7040
|
||||
param1: 'Windows Event Log'
|
||||
param2:
|
||||
- "disabled"
|
||||
- "auto start"
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: low
|
||||
output: 'Service name : %param1%¥nMessage : Event Log Service Stopped¥nResults: Selective event log manipulation may follow this event.'
|
||||
creation_date: 2020/11/8
|
||||
uodated_date: 2020/11/8
|
||||
22
rules/deep_blue_cli/system/7045.yml
Normal file
22
rules/deep_blue_cli/system/7045.yml
Normal file
@@ -0,0 +1,22 @@
|
||||
title: A service was installed in the system
|
||||
description: hogehoge
|
||||
enabled: true
|
||||
author: Yea
|
||||
logsource:
|
||||
product: windows
|
||||
detection:
|
||||
selection:
|
||||
Channel: System
|
||||
EventID: 7045
|
||||
ServiceName:
|
||||
regexes: ./regexes.txt
|
||||
ImagePath:
|
||||
min_length: 1000
|
||||
whitelist: ./whitelist.txt
|
||||
condition: selection
|
||||
falsepositives:
|
||||
- unknown
|
||||
level: low
|
||||
output: 'New Service Created¥n%ImagePath¥nService name: %ServiceName%'
|
||||
creation_date: 2020/11/8
|
||||
uodated_date: 2020/11/8
|
||||
Reference in New Issue
Block a user