SigmaHQ/tools/config/crowdstrike.yml

20 lines
371 B
YAML
Raw Normal View History

2020-05-08 10:41:52 +00:00
title: Splunk Windows log source conditions
order: 20
backends:
- crowdstrike
logsources:
windows-sysmon:
product: windows
service: sysmon
conditions:
EventID: 1
process_creation_1:
category: process_creation
product: windows
fieldmappings:
EventID: EventID
CommandLine: Commandline
Command_Line: Commandline
Image: ImageFileName