diff --git a/Atomic_Threat_Coverage/Data_Needed/DN_0050_1102_audit_log_was_cleared.md b/Atomic_Threat_Coverage/Data_Needed/DN_0050_1102_audit_log_was_cleared.md index 1fcbaf1..f71b510 100644 --- a/Atomic_Threat_Coverage/Data_Needed/DN_0050_1102_audit_log_was_cleared.md +++ b/Atomic_Threat_Coverage/Data_Needed/DN_0050_1102_audit_log_was_cleared.md @@ -1,8 +1,8 @@ | Title | DN_0050_1102_audit_log_was_cleared | |:-------------------|:------------------| -| **Description** | This event generates every time Windows Security audit log was cleared | +| **Description** | Event 1102 is created whenever the Security log is cleared, REGARDLESS of the status of the Audit System Events audit policy | | **Logging Policy** | | -| **References** | | +| **References** | | | **Platform** | Windows | | **Type** | Windows Log | | **Channel** | Security | diff --git a/Atomic_Threat_Coverage/Detection_Rules/powershell_suspicious_download.md b/Atomic_Threat_Coverage/Detection_Rules/powershell_suspicious_download.md index a013b38..0f0d8ad 100644 --- a/Atomic_Threat_Coverage/Detection_Rules/powershell_suspicious_download.md +++ b/Atomic_Threat_Coverage/Detection_Rules/powershell_suspicious_download.md @@ -26,15 +26,20 @@ tags: - attack.t1086 author: Florian Roth date: 2017/03/05 +modified: 2020/03/25 logsource: product: windows service: powershell detection: - keywords: - Message: - - '*System.Net.WebClient).DownloadString(*' - - '*system.net.webclient).downloadfile(*' - condition: keywords + downloadfile: + Message|contains|all: + - 'System.Net.WebClient' + - '.DownloadFile(' + downloadstring: + Message|contains|all: + - 'System.Net.WebClient' + - '.DownloadString(' + condition: downloadfile or downloadstring falsepositives: - PowerShell scripts that download content from the Internet level: medium @@ -48,42 +53,42 @@ level: medium ### es-qs ``` -Message.keyword:(*System.Net.WebClient\\).DownloadString\\(* OR *system.net.webclient\\).downloadfile\\(*) +(Message.keyword:*System.Net.WebClient* AND (Message.keyword:*.DownloadFile\\(* OR Message.keyword:*.DownloadString\\(*)) ``` ### xpack-watcher ``` -curl -s -XPUT -H \'Content-Type: application/json\' --data-binary @- localhost:9200/_watcher/watch/65531a81-a694-4e31-ae04-f8ba5bc33759 <