Skip to content

Commit 5a1a26b

Browse files
committed
adding DataTypes
1 parent a4c86f1 commit 5a1a26b

File tree

63 files changed

+63
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

63 files changed

+63
-0
lines changed

windows/user_account_disabled.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@
1212
or account-related policies."
1313
category: "Persistence"
1414
tactic: "Account Manipulation"
15+
dataTypes: ["wineventlog"]
1516
reference:
1617
- "https://attack.mitre.org/tactics/TA0003/"
1718
- "https://attack.mitre.org/techniques/T1098/"

windows/user_account_enabled_or_created.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@
1212
or account-related policies."
1313
category: "Persistence"
1414
tactic: "Account Manipulation"
15+
dataTypes: ["wineventlog"]
1516
reference:
1617
- "https://attack.mitre.org/tactics/TA0003/"
1718
- "https://attack.mitre.org/techniques/T1098/"

windows/user_account_locked.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@
77
Use multi-factor authentication. Where possible, also enable multi-factor authentication on externally facing services."
88
category: "Potentially Malicious Activity"
99
tactic: "Brute Force"
10+
dataTypes: ["wineventlog"]
1011
reference:
1112
- "https://attack.mitre.org/techniques/T1110/"
1213
frequency: 60

windows/volume_shadow_copy_deletion_or_resized_via_vssadmin.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector."
2121
category: "Impact"
2222
tactic: "Inhibit System Recovery"
23+
dataTypes: ["wineventlog"]
2324
reference:
2425
- "https://attack.mitre.org/tactics/TA0040/"
2526
- "https://attack.mitre.org/techniques/T1490/"

windows/volume_shadow_copy_deletion_via_powershell.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector."
2121
category: "Impact"
2222
tactic: "Inhibit System Recovery"
23+
dataTypes: ["wineventlog"]
2324
reference:
2425
- "https://attack.mitre.org/tactics/TA0040/"
2526
- "https://attack.mitre.org/techniques/T1490/"

windows/volume_shadow_copy_deletion_via_wmic.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector."
2121
category: "Impact"
2222
tactic: "Inhibit System Recovery"
23+
dataTypes: ["wineventlog"]
2324
reference:
2425
- "https://attack.mitre.org/tactics/TA0040/"
2526
- "https://attack.mitre.org/techniques/T1490/"

windows/volume_shadow_copy_service.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010
Limit privileges of user accounts and groups so that only authorized administrators can interact with service changes and service configurations."
1111
category: "Potentially Malicious Activity"
1212
tactic: "Create or Modify System Process: Windows Service"
13+
dataTypes: ["wineventlog"]
1314
reference:
1415
- "https://attack.mitre.org/techniques/T1543/003/"
1516
frequency: 60

windows/webshell_detection.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@
1515
Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector."
1616
category: "Persistence"
1717
tactic: "Web Shell"
18+
dataTypes: ["wineventlog"]
1819
reference:
1920
- "https://attack.mitre.org/tactics/TA0003/"
2021
- "https://attack.mitre.org/techniques/T1505/003/"

windows/whoami_command_activity..yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@
1111
Determine the initial vector abused by the attacker and take action to prevent reinfection through the same vector."
1212
category: "Discovery"
1313
tactic: "System Owner/User Discovery"
14+
dataTypes: ["wineventlog"]
1415
reference:
1516
- "https://attack.mitre.org/tactics/TA0007/"
1617
- "https://attack.mitre.org/techniques/T1033/"

windows/windows_defender_code_async_call_pending.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_actions_failed.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_active_threats.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_action.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_configuration.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_database.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_db_content.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_db_header.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_db_not_signed.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_db_old_engine.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_db_open.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_ehandle.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_global_storage.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_init_modules.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_input_data.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_scan_id.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_ufs.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_bad_user_db_version.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_callisto_required.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_code_already_shutdown.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_code_bad_regexp.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_code_cancelled.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_code_o_targetos.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_duplicate_scan_id.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_full_scan_required.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_lua_cancellation.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_manual_steps_required.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_no_engine.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_no_internet_connection.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_no_memory.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_no_more_items.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_not_found.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_not_supported.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_obsolete.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_platform_outdated.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_quarantine_failed.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_reboot_required.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_relo_kernel_noit_loaded.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_remove_failed.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_remove_low_medium_disabled.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

windows/windows_defender_error_remove_not_supported.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
severity: "High"
55
category: "Potentially Compromised System"
66
frequency: 60
7+
dataTypes: ["wineventlog"]
78
cache:
89
- allOf:
910
- field: "logx.wineventlog.log_name"

0 commit comments

Comments
 (0)