mirror of
https://github.com/valitydev/SigmaHQ.git
synced 2024-11-07 09:48:58 +00:00
6f05e33feb
Correct a number of rules where message or keyword were incorrectly used as field names in events (typically windows event logs). However, neither field actually exists and as such these strings could never match. |
||
---|---|---|
.. | ||
sysmon_abusing_windows_telemetry_for_persistence.yml | ||
sysmon_accessing_winapi_in_powershell_credentials_dumping.yml | ||
sysmon_config_modification.yml | ||
sysmon_cve_2021_31979_cve_2021_33771_exploits.yml | ||
sysmon_dcom_iertutil_dll_hijack.yml | ||
sysmon_dns_hybridconnectionmgr_servicebus.yml | ||
sysmon_pingback_backdoor.yml | ||
sysmon_wmiprvse_wbemcomn_dll_hijack.yml |