From c5d2a55f6d4644dfbf3a7f9f579818f4d25ea271 Mon Sep 17 00:00:00 2001 From: G Y <35021368+leegengyu@users.noreply.github.com> Date: Tue, 6 Jul 2021 20:36:38 +0800 Subject: [PATCH 1/2] powershell_data_compressed.yml - Update selection Changed to ScriptBlockText (due to PowerShell logging-specific context). --- rules/windows/powershell/powershell_data_compressed.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/rules/windows/powershell/powershell_data_compressed.yml b/rules/windows/powershell/powershell_data_compressed.yml index fd9bd0ae..1d9b3346 100644 --- a/rules/windows/powershell/powershell_data_compressed.yml +++ b/rules/windows/powershell/powershell_data_compressed.yml @@ -13,7 +13,7 @@ logsource: detection: selection: EventID: 4104 - keywords|contains|all: + ScriptBlockText|contains|all: - '-Recurse' - '|' - 'Compress-Archive' From 3594b10d74682ca1f090180d5dedd55e4756d813 Mon Sep 17 00:00:00 2001 From: leegengyu Date: Tue, 6 Jul 2021 20:56:31 +0800 Subject: [PATCH 2/2] Insert modified date --- rules/windows/powershell/powershell_data_compressed.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/rules/windows/powershell/powershell_data_compressed.yml b/rules/windows/powershell/powershell_data_compressed.yml index 1d9b3346..ada73d64 100644 --- a/rules/windows/powershell/powershell_data_compressed.yml +++ b/rules/windows/powershell/powershell_data_compressed.yml @@ -4,6 +4,7 @@ status: experimental description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network. author: Timur Zinniatullin, oscd.community date: 2019/10/21 +modified: 2021/07/06 references: - https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560/T1560.md logsource: