Skip to content

Commit

Permalink
Merge branch 'main' into feat/AddAutomationModulesToFormats
Browse files Browse the repository at this point in the history
  • Loading branch information
squioc committed Dec 16, 2024
2 parents 2889ddd + f9a0e7a commit 24f74ac
Show file tree
Hide file tree
Showing 331 changed files with 12,007 additions and 465 deletions.
1 change: 1 addition & 0 deletions AWS/aws-cloudtrail/ingest/parser.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,7 @@ pipeline:
external:
name: grok.match
properties:
raise_errors: false
input_field: json_event.message.sourceIPAddress
output_field: source
pattern: "(%{IP:ip}|%{HOSTNAME:domain})"
Expand Down
1 change: 1 addition & 0 deletions AWS/aws-guardduty/ingest/parser.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,7 @@ pipeline:
external:
name: grok.match
properties:
raise_errors: false
input_field: json_event.message.type
output_field: finding
pattern: "%{DATA:threat_purpose}:%{DATA:affected_resource_type}/%{WORD:threat_family_name}(.%{DATA:detection_mecanism})?(!%{DATA:artifact})?"
Expand Down
1 change: 1 addition & 0 deletions Azure/azure-network-watcher/ingest/parser.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,7 @@ pipeline:
external:
name: grok.match
properties:
raise_errors: false
input_field: "{{json_event.message.get('flow.0')}}"
output_field: result
pattern: "%{NUMBER:timestamp},%{IP:source_ip},%{IP:destination_ip},%{NUMBER:source_port},%{NUMBER:destination_port},%{PROTOCOL:protocol},%{TRAFFICFLOW:traffic_flow},%{TRAFFICDECISION:traffic_decision}(|,(%{FLOWSTATE:flow_state}|),(%{INT:source_packets}|),(%{INT:source_bytes}|),(%{INT:destination_packets}|),(%{INT:destination_bytes}|))"
Expand Down
2 changes: 2 additions & 0 deletions Azure/azure-windows/ingest/parser.yml
Original file line number Diff line number Diff line change
Expand Up @@ -24,6 +24,7 @@ pipeline:
external:
name: grok.match
properties:
raise_errors: false
input_field: "{{parse_windows_event.message.EventData.SubjectUserName or parse_windows_event.message.EventData.User}}"
output_field: result
pattern: "(%{USER_WITH_DOMAIN}|%{GREEDYDATA:user_name})"
Expand All @@ -36,6 +37,7 @@ pipeline:
external:
name: kv.parse-kv
properties:
raise_errors: false
input_field: "{{parse_windows_event.message.EventData.Hashes | lower}}"
output_field: result
value_sep: "="
Expand Down
Loading

0 comments on commit 24f74ac

Please sign in to comment.