Skip to content

Commit 5c91769

Browse files
authored
Merge pull request SigmaHQ#4104 from YamatoSecurity/move-multi-line-condition-to-single-line
moved multi-line condition to single line for rules that use `count`
2 parents 2a1124e + 7c79441 commit 5c91769

6 files changed

+12
-18
lines changed

rules/windows/builtin/security/win_security_susp_failed_logons_single_process.yml

+2-3
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ references:
77
- https://www.trimarcsecurity.com/single-post/2018/05/06/trimarc-research-detecting-password-spraying-with-security-event-auditing
88
author: Mauricio Velazco
99
date: 2021/06/01
10-
modified: 2022/10/09
10+
modified: 2023/03/13
1111
tags:
1212
- attack.t1110.003
1313
- attack.initial_access
@@ -22,8 +22,7 @@ detection:
2222
filter:
2323
ProcessName: '-'
2424
timeframe: 24h
25-
condition:
26-
- selection1 and not filter | count(TargetUserName) by ProcessName > 10
25+
condition: 'selection1 and not filter | count(TargetUserName) by ProcessName > 10'
2726
falsepositives:
2827
- Terminal servers
2928
- Jump servers

rules/windows/builtin/security/win_security_susp_failed_logons_single_source_kerberos.yml

+2-3
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying
77
author: Mauricio Velazco, frack113
88
date: 2021/06/01
9-
modified: 2022/10/09
9+
modified: 2023/03/13
1010
tags:
1111
- attack.t1110.003
1212
- attack.initial_access
@@ -21,8 +21,7 @@ detection:
2121
filter_computer:
2222
TargetUserName|endswith: '$'
2323
timeframe: 24h
24-
condition:
25-
- selection and not filter_computer | count(TargetUserName) by IpAddress > 10
24+
condition: 'selection and not filter_computer | count(TargetUserName) by IpAddress > 10'
2625
falsepositives:
2726
- Vulnerability scanners
2827
- Misconfigured systems

rules/windows/builtin/security/win_security_susp_failed_logons_single_source_kerberos2.yml

+2-3
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying
77
author: Mauricio Velazco, frack113
88
date: 2021/06/01
9-
modified: 2022/10/09
9+
modified: 2023/03/13
1010
tags:
1111
- attack.t1110.003
1212
- attack.initial_access
@@ -21,8 +21,7 @@ detection:
2121
filter_computer:
2222
TargetUserName|endswith: '$'
2323
timeframe: 24h
24-
condition:
25-
- selection and not filter_computer | count(TargetUserName) by IpAddress > 10
24+
condition: 'selection and not filter_computer | count(TargetUserName) by IpAddress > 10'
2625
falsepositives:
2726
- Vulnerability scanners
2827
- Misconfigured systems

rules/windows/builtin/security/win_security_susp_failed_logons_single_source_kerberos3.yml

+2-3
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying
77
author: Mauricio Velazco, frack113
88
date: 2021/06/01
9-
modified: 2022/10/09
9+
modified: 2023/03/13
1010
tags:
1111
- attack.t1110.003
1212
- attack.initial_access
@@ -21,8 +21,7 @@ detection:
2121
filter_computer:
2222
TargetUserName|endswith: '$'
2323
timeframe: 24h
24-
condition:
25-
- selection and not filter_computer | count(TargetUserName) by IpAddress > 10
24+
condition: 'selection and not filter_computer | count(TargetUserName) by IpAddress > 10'
2625
falsepositives:
2726
- Vulnerability scanners
2827
- Misconfigured systems

rules/windows/builtin/security/win_security_susp_failed_logons_single_source_ntlm.yml

+2-3
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying
77
author: Mauricio Velazco
88
date: 2021/06/01
9-
modified: 2022/10/09
9+
modified: 2023/03/13
1010
tags:
1111
- attack.t1110.003
1212
- attack.initial_access
@@ -21,8 +21,7 @@ detection:
2121
filter:
2222
TargetUserName: '*$'
2323
timeframe: 24h
24-
condition:
25-
- selection1 and not filter | count(TargetUserName) by Workstation > 10
24+
condition: 'selection1 and not filter | count(TargetUserName) by Workstation > 10'
2625
falsepositives:
2726
- Terminal servers
2827
- Jump servers

rules/windows/builtin/security/win_security_susp_failed_logons_single_source_ntlm2.yml

+2-3
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ references:
66
- https://docs.splunk.com/Documentation/ESSOC/3.22.0/stories/UseCase#Active_directory_password_spraying
77
author: Mauricio Velazco
88
date: 2021/06/01
9-
modified: 2022/10/09
9+
modified: 2023/03/13
1010
tags:
1111
- attack.t1110.003
1212
- attack.initial_access
@@ -21,8 +21,7 @@ detection:
2121
filter:
2222
TargetUserName: '*$'
2323
timeframe: 24h
24-
condition:
25-
- selection1 and not filter | count(TargetUserName) by Workstation > 10
24+
condition: 'selection1 and not filter | count(TargetUserName) by Workstation > 10'
2625
falsepositives:
2726
- Terminal servers
2827
- Jump servers

0 commit comments

Comments
 (0)