Skip to content

Latest commit

 

History

History
47 lines (46 loc) · 2.32 KB

pC_microsoftsentinelsk4alerttriggersuccessloganalytics.md

File metadata and controls

47 lines (46 loc) · 2.32 KB

Parser Content

{
Name = microsoft-sentinel-sk4-alert-trigger-success-loganalytics
  ParserVersion = v1.0.0
  Vendor = Microsoft
  Product = Microsoft Sentinel
  TimeFormat = "yyyy-MM-dd'T'HH:mm:ssZ"
  start_timeFormat = ["yyyy-MM-dd'T'HH:mm:ssZ"]
  end_timeFormat = ["yyyy-MM-dd'T'HH:mm:ssZ"]
  processing_end_timeFormat = ["yyyy-MM-dd'T'HH:mm:ssZ"]
  Conditions = [ """"ProductName":"Azure Sentinel"""", """"VendorName":"Microsoft"""", """"AlertSeverity":"""", """"Type":"SecurityAlert"""" ]
  Fields=[
    """"+AlertName"+:"+({alert_name}[^"]+)""",
    """"+AlertSeverity"+:"+({alert_severity}[^"]+)""",
    """"+SystemAlertId"+:"+({alert_id}[^"]+)""",
    """"+Description"+:"+({additional_info}.+?)\s*"""",
    """"+RemediationSteps"+:"+\[({remediation_steps}[^\]]+)""",
    """"+AlertType"+:"+({alert_type}[^"]+)""",
    """"+TimeGenerated"+:"+({time}[^"]+)""",
    """"+StartTime"+:"+({start_time}\d\d\d\d-\d\d-\d\dT\d\d:\d\d:\d\dZ)""",
    """"+EndTime"+:"+({end_time}\d\d\d\d-\d\d-\d\dT\d\d:\d\d:\d\dZ)""",
    """"IsIncident"+:({is_incident}[^,]+)""",
    """"ProcessingEndTime"+:"+({processing_end_time}\d\d\d\d-\d\d-\d\dT\d\d:\d\d:\d\dZ)""",
    """"Machine Name\\"+:\s*\\"({src_host}[^"]+)\\""",
    """"Process Name\\*"+:\s*\\*"(({process_path}({process_dir}[^.]+)\\({process_name}[^"]+))\\)""",
    """"Command Line\\*"+:\s*\\*"+\\*"+({process_command_line}.*?)\\+"""",
    """"User SID\\*"+:\s*\\*"+({user_sid}.*?)\\"""",
    """"Account Logon Id\\*"+:\s*\\*"+({login_id}[^"]+)\\""",
    """"Account\\":\s*\\"+({domain}[^\\]*?)\\{1,25}({user}[\w\.\-\!\#\^\~]{1,40}\$?)\\",""",
    """"ActionTaken\\":\s*\\"+({action}.*?)\\*"""",
    """"DnsDomain\\":\s*\\"+(\s*|({dns_domain}.*?))\\*"""",
    """"NTDomain\\":\s*\\"+(\s*|({nt_domain}.*?))\\*"""",
    """"IsDomainJoined\\"+:\s*({domain_join}\w+)""",
    """"AlertLink":"({malware_url}[^"]+)""",
    """"HostName\\"+:\s*\\"({host}.*?)\\*"""",
    ]
   SOAR {
    IncidentType = "malware"
    DupFields = ["time->startedDate", "vendor->source", "rawLog->sourceInfo", "alert_name->malwareName", "alert_type->malwareCategory", "src_host->malwareVictimHost","malware_url->malwareAttackerFile"]
    NameTemplate = """Microsoft azure security Alert ${alert_name} found"""
    ProjectName = "SOC"
    EntityFields = [
      {EntityType="device", Name ="src_address", Fields=["src_host->host_name"]

}