fix: more duplicate 'tag' keys in rules

This commit is contained in:
Florian Roth 2018-09-04 16:15:02 +02:00
parent 9c878bef79
commit 3c240be8a8
4 changed files with 2 additions and 13 deletions

View File

@ -3,15 +3,13 @@ description: This rule detects a suspicious crash of the Microsoft Malware Prote
tags:
- attack.defense_evasion
- attack.t1089
- attack.t1211
status: experimental
date: 2017/05/09
references:
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1252&desc=5
- https://technet.microsoft.com/en-us/library/security/4022344
author: Florian Roth
tags:
- attack.defense_evasion
- attack.t1211
logsource:
product: windows
service: application

View File

@ -5,11 +5,9 @@ references:
- https://www.trimarcsecurity.com/single-post/TrimarcResearch/Detecting-Kerberoasting-Activity
tags:
- attack.credential_dumping
- attack.T1208
description: Detects service ticket requests using RC4 encryption type
tags:
- attack.credential_access
- attack.t1208
description: Detects service ticket requests using RC4 encryption type
logsource:
product: windows
service: security

View File

@ -11,10 +11,6 @@ tags:
- attack.execution
- attack.t1085
author: juju4
tags:
- attack.execution
- attack.defense_evasion
- attack.t1085
detection:
selection:
CommandLine:

View File

@ -4,9 +4,6 @@ tags:
- attack.defense_evasion
- attack.t1070
author: Florian Roth
tags:
- attack.defense_evasion
- attack.t1070
logsource:
product: windows
service: security