SigmaHQ/tools/config/crowdstrike.yml
2021-06-10 17:07:01 +02:00

20 lines
363 B
YAML

title: Splunk used in Falcon Portal
order: 20
backends:
- crowdstrike
logsources:
windows-sysmon:
product: windows
service: sysmon
conditions:
EventID: 1
process_creation_1:
category: process_creation
product: windows
fieldmappings:
EventID: EventID
CommandLine: Commandline
Command_Line: Commandline
Image: ImageFileName