Skip to content

Commit 0a3ed8b

Browse files
XSUP-55372 - microsoft_windows_raw - enhance regex extraction (#41364)
* update xif * update rn * update metadata
1 parent 3290480 commit 0a3ed8b

File tree

3 files changed

+12
-4
lines changed

3 files changed

+12
-4
lines changed

Packs/MicrosoftWindowsEvents/ModelingRules/MicrosoftWindowsEvents_1_3/MicrosoftWindowsEvents_1_3.xif

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ filter channel in ("System", "Application","Directory Service") or provider_name
2424
event_fwlink = event_data->["FWLink"],
2525
execution_name = event_data -> ["Execution Name"],
2626
SubjectKeyIdentifier = event_data -> SubjectKeyIdentifier,
27-
event_name = arrayindex(regextract(message, "([^\.]+)\."), 0),
27+
event_name = arrayindex(regextract(message, "^([^:.(]+)"), 0),
2828
TicketEncryptionType = to_string(event_data -> TicketEncryptionType),
2929
IpPort = coalesce(event_data -> IpPort, event_data -> SourcePort),
3030
IpAddress = coalesce(event_data -> IpAddress, event_data -> SourceAddress),
@@ -59,7 +59,7 @@ filter channel in ("System", "Application","Directory Service") or provider_name
5959
threat_id = if(provider_name = "Microsoft-Windows-Windows Defender" and ((event_id_num >= 1006 and event_id_num <= 1012) or event_id_num = 1015 or (event_id_num >= 1116 and event_id_num <= 1119)), arrayindex(regextract(message, "ID:\s*(\w+)\s+\w+:"), 0)),
6060
threat_category = if(provider_name = "Microsoft-Windows-Windows Defender" and ((event_id_num >= 1006 and event_id_num <= 1012) or event_id_num = 1015 or (event_id_num >= 1116 and event_id_num <= 1119)), arrayindex(regextract(message, "Category:\s*(.+?)\s+\w+:"), 0)),
6161
threat_name = if(provider_name = "Microsoft-Windows-Windows Defender" and ((event_id_num >= 1006 and event_id_num <= 1012) or event_id_num = 1015 or (event_id_num >= 1116 and event_id_num <= 1119)), arrayindex(regextract(message, "Name:\s*(.+?)\s+ID:"), 0)),
62-
user_domain = coalesce(user -> domain, event_data -> Domain, event_data -> SubjectDomainName, user_data -> SubjectDomainName, arrayindex(regextract(message, "User:\s*([^\\]+)"), 0)),
62+
user_domain = coalesce(user -> domain, event_data -> Domain, if(event_data -> SubjectDomainName in ("-", " - "), null, event_data -> SubjectDomainName), if(user_data -> SubjectDomainName in ("-", " - "), null, user_data -> SubjectDomainName)),
6363
user_name = coalesce(user -> name, event_data -> User, event_data -> SubjectUserName, user_data -> SubjectUserName, arrayindex(regextract(message, "User:\s*(?:[^\\]+\\)*(\S+)"), 0), arrayindex(regextract(message, "User \"([^\"]+)\""), 0), if(channel="Application" and event_data -> param3 contains "*\\*", event_data -> param3),event_data -> ["Detection User"],event_data -> ["Requester"]),
6464
user_sid = coalesce(event_data -> SID, event_data -> SubjectUserSid, user -> identifier, user -> SubjectUserSid, event_data -> UserSid, if(provider_name = "Microsoft-Windows-Windows Firewall With Advanced Security", arrayindex(regextract(message, "Modifying\s*User\:\s+(.*)\b\s+Modifying\s+Application:"), 0))),
6565
user_type = user -> type
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
2+
#### Modeling Rules
3+
4+
##### MicrosoftWindowsEvents
5+
6+
- Updated the MicrosoftWindowsEvents modeling rule to enhance extraction coverage for xdm.source.user.domain and xdm.event.original_event_type.

Packs/MicrosoftWindowsEvents/pack_metadata.json

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"name": "Microsoft Windows Event Logs",
33
"description": "The Windows event log is a detailed record of system, security and application notifications stored by the Windows operating system.",
44
"support": "xsoar",
5-
"currentVersion": "1.1.19",
5+
"currentVersion": "1.1.20",
66
"author": "Cortex XSOAR",
77
"url": "https://www.paloaltonetworks.com/cortex",
88
"email": "",
@@ -15,7 +15,9 @@
1515
"Network",
1616
"IT"
1717
],
18-
"useCases": [],
18+
"useCases": [
19+
"Network Security"
20+
],
1921
"keywords": [
2022
"microsoft",
2123
"windows"

0 commit comments

Comments
 (0)