Skip to content

Commit

Permalink
All Rules use 'TargetFilename' instead of 'TargetFileName'.
Browse files Browse the repository at this point in the history
This commit fixes the incorrect spelling.
  • Loading branch information
svnscha committed Jun 3, 2020
1 parent 0cbc099 commit 4ed5120
Show file tree
Hide file tree
Showing 5 changed files with 6 additions and 6 deletions.
2 changes: 1 addition & 1 deletion other/godmode_sigma_rule.yml
Original file line number Diff line number Diff line change
Expand Up @@ -104,7 +104,7 @@ logsource:
detection:
selection_file_creation:
EventID: 11
TargetFileName|contains:
TargetFilename|contains:
- '.dmp' # dump process memory
- 'Desktop\how' # Ransomware
- 'Desktop\decrypt' # Ransomware
Expand Down
4 changes: 2 additions & 2 deletions rules-unsupported/sysmon_process_reimaging.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ description: Detects process reimaging defense evasion technique
# where
# selection1: ImageFileName != selection1: OriginalFileName
# selection1: ParentProcessGuid = selection2: ProcessGuid
# selection1: Image = selection2: TargetFileName
# selection1: Image = selection2: TargetFilename
# and new field ImageFileName is coming from enrichment
# selection1: Image = ^.+\\<ImageFileName>$
# Rule must trigger if selection1 and selection2 both occurs in timeframe of 120 sec.
Expand Down Expand Up @@ -45,4 +45,4 @@ detection:
EventID: 11
fields:
- ProcessGuid
- TargetFileName
- TargetFilename
2 changes: 1 addition & 1 deletion rules/windows/process_creation/win_hktl_createminidump.yml
Original file line number Diff line number Diff line change
Expand Up @@ -29,5 +29,5 @@ logsource:
detection:
selection:
EventID: 11
TargetFileName|contains: '*\lsass.dmp'
TargetFilename|contains: '*\lsass.dmp'
condition: 1 of them
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@ detection:
condition: selection
fields:
- ComputerName
- TargetFileName
- TargetFilename
falsepositives:
- Dumping lsass memory for forensic investigation purposes by legitimate incident responder or forensic invetigator
level: medium
Expand Down
2 changes: 1 addition & 1 deletion rules/windows/sysmon/sysmon_tsclient_filewrite_startup.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ detection:
selection:
EventID: 11
Image: '*\mstsc.exe'
TargetFileName: '*\Microsoft\Windows\Start Menu\Programs\Startup\\*'
TargetFilename: '*\Microsoft\Windows\Start Menu\Programs\Startup\\*'
condition: selection
falsepositives:
- unknown
Expand Down

0 comments on commit 4ed5120

Please sign in to comment.