mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-06 01:15:17 +00:00
Add yamllint to GHA
Signed-off-by: Gábor Lipták <gliptak@gmail.com>
This commit is contained in:
parent
7cacc57313
commit
d2592ee0b6
10
.github/workflows/sigma-test.yml
vendored
10
.github/workflows/sigma-test.yml
vendored
@ -8,7 +8,9 @@ on:
|
||||
branches:
|
||||
- "*"
|
||||
pull_request:
|
||||
branches: [ master, oscd ]
|
||||
branches:
|
||||
- master
|
||||
- oscd
|
||||
|
||||
jobs:
|
||||
test-sigma:
|
||||
@ -31,3 +33,9 @@ jobs:
|
||||
- name: Test SQL(ite) Backend
|
||||
run: |
|
||||
pipenv run make test-backend-sql
|
||||
yamllint:
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v2
|
||||
- name: yaml-lint
|
||||
uses: ibiqlik/action-yamllint@v3
|
||||
|
4
Makefile
4
Makefile
@ -104,7 +104,7 @@ test-sigmac:
|
||||
$(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml -o $(TMPOUT) - < tests/collection_repeat.yml > /dev/null
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t xpack-watcher -c tools/config/winlogbeat.yml -O output=foobar -O es=es -O foobar rules/windows/builtin/win_susp_failed_logons_single_source.yml > /dev/null
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/not_existing.yml > /dev/null
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_yaml.yml > /dev/null
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_yaml.badyml > /dev/null
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-no_identifiers.yml > /dev/null
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-no_condition.yml > /dev/null
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml tests/invalid_sigma-invalid_identifier_reference.yml > /dev/null
|
||||
@ -113,7 +113,7 @@ test-sigmac:
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml rules/windows/builtin/win_susp_failed_logons_single_source.yml
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tools/config/winlogbeat.yml -o /not_possible rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c not_existing rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tests/invalid_yaml.yml rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tests/invalid_yaml.badyml rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
! $(COVERAGE) run -a --include=$(COVSCOPE) tools/sigmac -t es-qs -c tests/invalid_config.yml rules/windows/sysmon/sysmon_mimikatz_detection_lsass.yml
|
||||
|
||||
test-merge:
|
||||
|
@ -13,7 +13,7 @@ tags:
|
||||
logsource:
|
||||
product: windows
|
||||
category: process_creation
|
||||
definition : Works only if Enrich Sysmon events with additional information about process in ParentOfParentImage check enrichment section
|
||||
definition: Works only if Enrich Sysmon events with additional information about process in ParentOfParentImage check enrichment section
|
||||
detection:
|
||||
parent_image:
|
||||
ParentImage|endswith:
|
||||
|
@ -35,7 +35,7 @@ fields:
|
||||
- IntegrityLevel
|
||||
- User
|
||||
- Image
|
||||
ParentProcessGuid
|
||||
- ParentProcessGuid
|
||||
falsepositives:
|
||||
- System administrator usage
|
||||
- Penetration test
|
||||
|
@ -12,7 +12,7 @@ date: 2019/06/03
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
definition : Works only if Enrich Sysmon events with additional information about process in ParentIntegrityLevel check enrichment section
|
||||
definition: Works only if Enrich Sysmon events with additional information about process in ParentIntegrityLevel check enrichment section
|
||||
detection:
|
||||
selection:
|
||||
ParentIntegrityLevel: Medium
|
||||
|
@ -15,7 +15,7 @@ modified: 2020/09/01
|
||||
logsource:
|
||||
category: process_creation
|
||||
product: windows
|
||||
definition : Works only if Enrich Sysmon events with additional information about process in ParentUser check enrichment section
|
||||
definition: Works only if Enrich Sysmon events with additional information about process in ParentUser check enrichment section
|
||||
detection:
|
||||
selection:
|
||||
ParentUser:
|
||||
|
@ -458,7 +458,7 @@ fieldmappings:
|
||||
#service=http:
|
||||
#service=sip:
|
||||
msg:
|
||||
- 'message'
|
||||
- 'message'
|
||||
#service=notice:
|
||||
#service=pop3:
|
||||
name:
|
||||
@ -832,7 +832,7 @@ fieldmappings:
|
||||
#password:
|
||||
pending: message
|
||||
#status: message
|
||||
successful_commands: message
|
||||
successful_commands: message
|
||||
#username: sourceUserName
|
||||
# Radius
|
||||
connect_info: message
|
||||
|
@ -1,4 +1,4 @@
|
||||
title: Elastic Auditbeat (from 7.x) index pattern and field mapping following Elastic enabled Modules
|
||||
title: Elastic Auditbeat (from 7.x) index pattern and field mapping following Elastic enabled Modules
|
||||
order: 20
|
||||
backends:
|
||||
- es-qs
|
||||
@ -70,7 +70,6 @@ fieldmappings:
|
||||
data: data
|
||||
default-context: default-context
|
||||
dev: dev
|
||||
dev: dev
|
||||
device: device
|
||||
dir: dir
|
||||
direction: direction
|
||||
@ -92,7 +91,6 @@ fieldmappings:
|
||||
feature: feature
|
||||
fi: fi
|
||||
fp: fp
|
||||
fp: fp
|
||||
format: format
|
||||
fsgid: fsgid
|
||||
fsuid: fsuid
|
||||
@ -169,7 +167,6 @@ fieldmappings:
|
||||
ogid: ogid
|
||||
ocomm: ocomm
|
||||
old: old
|
||||
old: old
|
||||
old-auid: old-auid
|
||||
old-chardev: old-chardev
|
||||
old-disk: old-disk
|
||||
|
@ -1,4 +1,4 @@
|
||||
title: Elastic filebeat (from 7.x) index pattern and field mapping following Elastic Common Schema
|
||||
title: Elastic filebeat (from 7.x) index pattern and field mapping following Elastic Common Schema
|
||||
order: 20
|
||||
backends:
|
||||
- es-qs
|
||||
|
@ -1,71 +1,71 @@
|
||||
---
|
||||
title: LogRhythm Windows EventID Field Mapping
|
||||
|
||||
order: 20
|
||||
backends:
|
||||
- es-qs-lr
|
||||
|
||||
logsources:
|
||||
eventlogs:
|
||||
product: windows
|
||||
conditions:
|
||||
logSourceTypeName: 'MS Windows Event Logging XML - Security'
|
||||
|
||||
fieldmappings:
|
||||
EventID: vendorMessageID
|
||||
TicketOptions: object
|
||||
TicketEncryptionType: sessionType
|
||||
ServiceName: processName
|
||||
TargetUserName:
|
||||
- originUser
|
||||
- impactedUser
|
||||
Workstation: originHostname
|
||||
SubjectUserName: originUser
|
||||
LogonType: command
|
||||
LogonProcessName: processName
|
||||
WorkstationName:
|
||||
- originHostname
|
||||
- impactedHostname
|
||||
SubjectLogonId: session
|
||||
SubStatus: status
|
||||
IpPort: originPort
|
||||
IpAddress:
|
||||
- originIp
|
||||
- impactedIp
|
||||
ErrorCode: responseCode
|
||||
Task: vendorInfo
|
||||
PrivilegeList: subject
|
||||
SamAccountName: impactedUser
|
||||
PrimaryGroupId: group
|
||||
StatusCode: responseCode
|
||||
Level: severity
|
||||
SubjectDomainName: domainOrigin
|
||||
DSName: domainImpacted
|
||||
ObjectDN: objectName
|
||||
ObjectGUID: object
|
||||
ObjectClass: objectType
|
||||
OperationType: action
|
||||
Computer: impactedHostname
|
||||
CategoryId: policy
|
||||
SubcategoryId: objectName
|
||||
SubCategoryGuid: object
|
||||
AuditPolicyChanges: action
|
||||
ObjectCollectionName: objectType
|
||||
CountOfCredentialsReturned: quantity
|
||||
AlgorithmName: policy
|
||||
KeyName: objectName
|
||||
KeyType: objectType
|
||||
KeyFilePath: object
|
||||
Operation: action
|
||||
ReturnCode: responseCode
|
||||
ChannelType: objectType
|
||||
DomainName: domainImpacted
|
||||
ExecutionProcessId: processId
|
||||
processName: process
|
||||
ProviderName: vendorInfo
|
||||
SChannelName: objectName
|
||||
SecureChannelName: objectName
|
||||
ThreadId: session
|
||||
UserName:
|
||||
- originUser
|
||||
---
|
||||
title: LogRhythm Windows EventID Field Mapping
|
||||
|
||||
order: 20
|
||||
backends:
|
||||
- es-qs-lr
|
||||
|
||||
logsources:
|
||||
eventlogs:
|
||||
product: windows
|
||||
conditions:
|
||||
logSourceTypeName: 'MS Windows Event Logging XML - Security'
|
||||
|
||||
fieldmappings:
|
||||
EventID: vendorMessageID
|
||||
TicketOptions: object
|
||||
TicketEncryptionType: sessionType
|
||||
ServiceName: processName
|
||||
TargetUserName:
|
||||
- originUser
|
||||
- impactedUser
|
||||
Workstation: originHostname
|
||||
SubjectUserName: originUser
|
||||
LogonType: command
|
||||
LogonProcessName: processName
|
||||
WorkstationName:
|
||||
- originHostname
|
||||
- impactedHostname
|
||||
SubjectLogonId: session
|
||||
SubStatus: status
|
||||
IpPort: originPort
|
||||
IpAddress:
|
||||
- originIp
|
||||
- impactedIp
|
||||
ErrorCode: responseCode
|
||||
Task: vendorInfo
|
||||
PrivilegeList: subject
|
||||
SamAccountName: impactedUser
|
||||
PrimaryGroupId: group
|
||||
StatusCode: responseCode
|
||||
Level: severity
|
||||
SubjectDomainName: domainOrigin
|
||||
DSName: domainImpacted
|
||||
ObjectDN: objectName
|
||||
ObjectGUID: object
|
||||
ObjectClass: objectType
|
||||
OperationType: action
|
||||
Computer: impactedHostname
|
||||
CategoryId: policy
|
||||
SubcategoryId: objectName
|
||||
SubCategoryGuid: object
|
||||
AuditPolicyChanges: action
|
||||
ObjectCollectionName: objectType
|
||||
CountOfCredentialsReturned: quantity
|
||||
AlgorithmName: policy
|
||||
KeyName: objectName
|
||||
KeyType: objectType
|
||||
KeyFilePath: object
|
||||
Operation: action
|
||||
ReturnCode: responseCode
|
||||
ChannelType: objectType
|
||||
DomainName: domainImpacted
|
||||
ExecutionProcessId: processId
|
||||
processName: process
|
||||
ProviderName: vendorInfo
|
||||
SChannelName: objectName
|
||||
SecureChannelName: objectName
|
||||
ThreadId: session
|
||||
UserName:
|
||||
- originUser
|
||||
- impactedUser
|
@ -225,7 +225,6 @@ fieldmappings:
|
||||
Accesses: winlog.event_data.Accesses
|
||||
AccessList: winlog.event_data.AccessList
|
||||
AttributeValue: winlog.event_data.AttributeValue
|
||||
AttributeValue: winlog.event_data.AttributeValue
|
||||
AuditSourceName: winlog.event_data.AuditSourceName
|
||||
AuthenticationPackage: winlog.event_data.AuthenticationPackageName
|
||||
CallerProcessName: winlog.event_data.CallerProcessName
|
||||
@ -279,4 +278,4 @@ fieldmappings:
|
||||
TaskName: winlog.event_data.TaskName
|
||||
# UserName => smbclient-security eventid:31017
|
||||
UserName: winlog.event_data.UserName
|
||||
Workstation : winlog.event_data.Workstation
|
||||
Workstation: winlog.event_data.Workstation
|
||||
|
@ -203,8 +203,6 @@ fieldmappings:
|
||||
ContextInfo: winlog.event_data.ContextInfo
|
||||
# from here missing field at 20210706
|
||||
Accesses: winlog.event_data.Accesses
|
||||
AccessList: winlog.event_data.AccessList
|
||||
AttributeValue: winlog.event_data.AttributeValue
|
||||
AttributeValue: winlog.event_data.AttributeValue
|
||||
AuditSourceName: winlog.event_data.AuditSourceName
|
||||
AuthenticationPackage: winlog.event_data.AuthenticationPackageName
|
||||
@ -214,7 +212,6 @@ fieldmappings:
|
||||
Company: winlog.event_data.Company
|
||||
DestAddress: winlog.event_data.DestAddress
|
||||
Destination: winlog.event_data.Destination
|
||||
DestinationIsIpv6: winlog.event_data.DestinationIsIpv6
|
||||
DestPort: winlog.event_data.DestPort
|
||||
Device: winlog.event_data.Device
|
||||
DeviceDescription: winlog.event_data.DeviceDescription
|
||||
@ -258,4 +255,4 @@ fieldmappings:
|
||||
TaskName: winlog.event_data.TaskName
|
||||
# UserName => smbclient-security eventid:31017
|
||||
UserName: winlog.event_data.UserName
|
||||
Workstation : winlog.event_data.Workstation
|
||||
Workstation: winlog.event_data.Workstation
|
||||
|
Loading…
Reference in New Issue
Block a user