Windows securityproduct: windows
service: security
EventID = 4624|4662|4104|4698
name: KUMA windows
priority: 30
transformations:
### Windows process_creation mapping
- id: MAPPING_logsource_windows_process_creation
type: field_name_mapping
mapping:
ParentImage: SourceProcessName
Image: DestinationProcessName
CommandLine: DeviceCustomString4
rule_conditions:
- type: logsource
product: windows
category: process_creation
- id: DEFAULT_FOR_logsource_windows_process_creation
type: add_condition
conditions:
DeviceVendor: Microsoft
DeviceProduct: Windows
DeviceEventClassID: '4688'
rule_conditions:
- type: logsource
product: windows
category: process_creation
### Windows sysmon EventID=11 mapping
- id: DEFAULT_FOR_logsource_windows_sysmon
type: add_condition
conditions:
DeviceVendor: Microsoft
DeviceProduct: Sysmon
rule_conditions:
- type: logsource
product: windows
service: Sysmon
- id: MAPPING_logsource_windows_sysmon
type: field_name_mapping
mapping:
EventID: DeviceEventClassID
Image: OldFilePath
CommandLine: DeviceCustomString4
TargetFilename: FilePath
rule_conditions:
- type: logsource
product: windows
service: Sysmon
### Windows security mapping
- id: DEFAULT_FOR_logsource_windows_security
type: add_condition
conditions:
DeviceVendor: Microsoft
DeviceProduct: Windows
rule_conditions:
- type: logsource
product: windows
service: security
- id: DEFAULT_MAPPING_FOR_logsource_windows_security
type: field_name_mapping
mapping:
Computer: DestinationHostName
LogonID: FlexString1
rule_conditions:
- type: logsource
product: windows
service: security
- id: 4624_CONDITIONAL_MAPPING_logsource_windows_security
type: field_name_mapping
mapping:
EventID: DeviceEventClassID
LogonType: DeviceCustomNumber1
SourceIP: SourceAddress
rule_conditions:
- type: contains_detection_item
field: "EventID"
value: 4624
- id: 4662_CONDITIONAL_MAPPING_logsource_windows_security
type: field_name_mapping
mapping:
EventID: DeviceEventClassID
Properties: FilePermission
rule_conditions:
- type: contains_detection_item
field: "EventID"
value: 4662
- id: 4104_CONDITIONAL_MAPPING_logsource_windows_security
type: field_name_mapping
mapping:
EventID: DeviceEventClassID
ScriptBlockText: Message
rule_conditions:
- type: contains_detection_item
field: "EventID"
value: 4104
- id: 4698_CONDITIONAL_MAPPING_logsource_windows_security
type: field_name_mapping
mapping:
EventID: DeviceEventClassID
TaskName: SourceProcessName
rule_conditions:
- type: contains_detection_item
field: "EventID"
value: '4698'