Files
hayabusa/rules/sigma/other/win_defender_history_delete.yml
DustInDark 0cfa806baf Feature/addruletype to sigma rule#230 (#235)
* added ruletype to SIGMA rule #230

* added ruletype to SIGMA rule converter tool #231
2021-11-28 18:14:51 +09:00

32 lines
927 B
YAML

title: Windows Defender Malware Detection History Deletion
author: Cian Heasley
date: 2020/08/13
description: Windows Defender logs when the history of detected infections is deleted.
Log file will contain the message "Windows Defender Antivirus has removed history
of malware and other potentially unwanted software".
detection:
SELECTION_1:
EventID: 1013
SELECTION_2:
EventType: 4
condition: (SELECTION_1 and SELECTION_2)
falsepositives:
- Deletion of Defender malware detections history for legitimate reasons
fields:
- EventID
- EventType
id: 2afe6582-e149-11ea-87d0-0242ac130003
level: high
logsource:
product: windows
service: windefend
modified: 2021/05/30
references:
- https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus
status: experimental
tags:
- attack.defense_evasion
- attack.t1070.001
ruletype: SIGMA