mirror of
https://github.com/Security-Onion-Solutions/securityonion.git
synced 2025-12-06 17:22:49 +01:00
Merge pull request #12482 from Security-Onion-Solutions/2.4/sigma-pipeline
2.4/sigma pipeline
This commit is contained in:
@@ -17,6 +17,35 @@ transformations:
|
||||
dst_ip: destination.ip.keyword
|
||||
dst_port: destination.port
|
||||
winlog.event_data.User: user.name
|
||||
# Maps "antivirus" category to Windows Defender logs shipped by Elastic Agent Winlog Integration
|
||||
# winlog.event_data.threat_name has to be renamed prior to ingestion, it is originally winlog.event_data.Threat Name
|
||||
- id: antivirus_field-mappings_windows-defender
|
||||
type: field_name_mapping
|
||||
mapping:
|
||||
Signature: winlog.event_data.threat_name
|
||||
rule_conditions:
|
||||
- type: logsource
|
||||
category: antivirus
|
||||
- id: antivirus_add-fields_windows-defender
|
||||
type: add_condition
|
||||
conditions:
|
||||
winlog.channel: 'Microsoft-Windows-Windows Defender/Operational'
|
||||
winlog.provider_name: 'Microsoft-Windows-Windows Defender'
|
||||
event.code: "1116"
|
||||
rule_conditions:
|
||||
- type: logsource
|
||||
category: antivirus
|
||||
# Drops the Hashes field which is specific to Sysmon logs
|
||||
# Ingested sysmon logs will have the Hashes field mapped to ECS specific fields
|
||||
- id: hashes_drop_sysmon-specific-field
|
||||
type: drop_detection_item
|
||||
field_name_conditions:
|
||||
- type: include_fields
|
||||
fields:
|
||||
- winlog.event_data.Hashes
|
||||
rule_conditions:
|
||||
- type: logsource
|
||||
product: windows
|
||||
- id: hashes_process-creation
|
||||
type: field_name_mapping
|
||||
mapping:
|
||||
|
||||
Reference in New Issue
Block a user