diff --git a/data/features.yaml b/data/features.yaml index 177ba8cdd1..ecbd1e1763 100644 --- a/data/features.yaml +++ b/data/features.yaml @@ -121,149 +121,145 @@ ssh_client_ipv4_addresses: query_string: 'reporter:"sshd"' attribute: 'message' store_as: 'client_ip' - re: '^\[sshd\] \[\d+\]: Connection from ((?:[0-9]{1,3}\.){3}[0-9]{1,3}) - port \d+ on (?:[0-9]{1,3}\.){3}[0-9]{1,3} port \d+(?: rdomain ? .*)?$' + re: 'Connection from ((?:[0-9]{1,3}\.){3}[0-9]{1,3}) port \d+ on (?:[0-9]{1,3}\.){3}[0-9]{1,3} port \d+(?: rdomain ? .*)?$' ssh_client_ipv4_addresses_2: query_string: 'reporter:"sshd"' attribute: 'message' store_as: 'client_ip' - re: '\[sshd, pid: \d+\] Connection [a-z]+ by - ((?:[0-9]{1,3}\.){3}[0-9]{1,3}) port \d+' + re: 'Connection [a-z]+ by ((?:[0-9]{1,3}\.){3}[0-9]{1,3}) port \d+' ssh_host_ipv4_addresses: query_string: 'reporter:"sshd"' attribute: 'message' store_as: 'host_ip' - re: '^\[sshd\] \[\d+\]: Connection from (?:[0-9]{1,3}\.){3}[0-9]{1,3} - port \d+ on ((?:[0-9]{1,3}\.){3}[0-9]{1,3}) port \d+(?: rdomain ? .*)?$' + re: '^\[sshd\] \[\d+\]: Connection from (?:[0-9]{1,3}\.){3}[0-9]{1,3} port \d+ on ((?:[0-9]{1,3}\.){3}[0-9]{1,3}) port \d+(?: rdomain ? .*)?$' ssh_client_password_ipv4_addresses: query_string: 'reporter:"sshd"' attribute: 'message' store_as: 'client_ip' - re: '^\[sshd, pid: \d+\] (?:Accepted|Failed) (?:password|publickey) for \w+ - from ((?:[0-9]{1,3}\.){3}[0-9]{1,3}) port \d+' + re: '(?:Accepted|Failed) (?:password|publickey) for \w+ from ((?:[0-9]{1,3}\.){3}[0-9]{1,3}) port \d+' ssh_disconnected_username: query_string: 'reporter:"sshd"' attribute: 'body' store_as: 'username' - re: '^Disconnected\s+from user (?P[^\s]+) [^\s]+ port \d+$' + re: 'Disconnected\s+from user (?P[^\s]+) [^\s]+ port \d+$' ssh_disconnected_ip_address: query_string: 'reporter:"sshd"' attribute: 'body' store_as: 'ip_address' - re: '^Disconnected from user [^\s]+ (?P[^\s]+) port \d+$' + re: 'Disconnected from user [^\s]+ (?P[^\s]+) port \d+$' ssh_disconnected_port: query_string: 'reporter:"sshd"' attribute: 'body' store_as: 'port' - re: '^Disconnected from user [^\s]+ [^\s]+ port (?P\d+)$' + re: 'Disconnected from user [^\s]+ [^\s]+ port (?P\d+)$' ssh_failed_username: query_string: 'reporter:"sshd"' attribute: 'body' store_as: 'username' - re: '^Failed password for (?:invalid user)?\s*(?P[^\s]+) from [^\s]+ port \d+ ssh\d' + re: 'Failed password for (?:invalid user)?\s*(?P[^\s]+) from [^\s]+ port \d+ ssh\d' ssh_failed_ip_address: query_string: 'reporter:"sshd"' attribute: 'body' store_as: 'ip_address' - re: '^Failed password for (?:invalid user)?\s*[^\s]+ from (?P[^\s]+) port \d+ ssh\d' + re: 'Failed password for (?:invalid user)?\s*[^\s]+ from (?P[^\s]+) port \d+ ssh\d' ssh_failed_port: query_string: 'reporter:"sshd"' attribute: 'body' store_as: 'port' - re: '^Failed password for (?:invalid user)?\s*[^\s]+ from [^\s]+ port (?P\d+) ssh\d' + re: 'Failed password for (?:invalid user)?\s*[^\s]+ from [^\s]+ port (?P\d+) ssh\d' ssh_failed_method: query_string: 'reporter:"sshd"' attribute: 'body' store_as: 'authentication_method' - re: '^Failed (?P[^\s]+) for .*ssh\d' + re: 'Failed (?P[^\s]+) for .*ssh\d' win_login_subject_username: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'subject_username' - re: '.*"SubjectUserName">(?P[^<]+)' + re: '"SubjectUserName">(?P[^<]+)' win_login_subject_domain: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'subject_domain' - re: '.*"SubjectDomainName">(?P[^<]+)' + re: '"SubjectDomainName">(?P[^<]+)' win_login_subject_logon_id: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'subject_logon_id' - re: '.*"SubjectLogonId">(?P[^<]+)' + re: '"SubjectLogonId">(?P[^<]+)' win_login_username: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'username' - re: '.*"TargetUserName">(?P[^<]+)' + re: '"TargetUserName">(?P[^<]+)' win_login_domain: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'domain' - re: '.*"TargetDomainName">(?P[^<]+)' + re: '"TargetDomainName">(?P[^<]+)' win_login_logon_id: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'logon_id' - re: '.*"TargetLogonId">(?P[^<]+)' + re: '"TargetLogonId">(?P[^<]+)' win_login_logon_type: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'logon_type' - re: '.*"LogonType">(?P[^<]+)' + re: '"LogonType">(?P[^<]+)' win_login_logon_process_name: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'logon_process_name' - re: '.*"LogonProcessName">(?P[^<]+)' + re: '"LogonProcessName">(?P[^<]+)' win_login_workstation_name: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'workstation_name' - re: '.*"WorkstationName">(?P[^<]+)' + re: '"WorkstationName">(?P[^<]+)' win_login_process_id: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'process_id' - re: '.*"ProcessId">(?P[^<]+)' + re: '"ProcessId">(?P[^<]+)' win_login_process_name: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'process_name' - re: '.*"ProcessName">(?P[^<]+)' + re: '"ProcessName">(?P[^<]+)' win_login_ip_address: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'ip_address' - re: '.*"IpAddress">(?P[^<]+)' + re: '"IpAddress">(?P[^<]+)' win_login_port: query_string: 'source_name:Microsoft-Windows-Security-Auditing AND (event_identifier:4624 OR event_identifier:4625)' attribute: 'xml_string' store_as: 'port' - re: '.*"IpPort">(?P[^<]+)' + re: '"IpPort">(?P[^<]+)' win_bits_client_ipv4_addresses: query_string: 'data_type:"windows:evtx:record" AND source_name:Microsoft-Windows-Bits-Client'