Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary of the Pull Request
Now pySigma can deal with KV haches , we can remove the fields we create for hash because of sigmac
Deprecated rules are updated only to avoid keeping these olds fields
Changelog
chore: test_logsource.py remove custom sigmac field
update: Usage Of Malicious POORTRY Signed Driver - remove custom field
update: Vulnerable AVAST Anti Rootkit Driver Load - remove custom field
update: Vulnerable Dell BIOS Update Driver Load - remove custom field
update: Vulnerable GIGABYTE Driver Load - remove custom field
update: Vulnerable HW Driver Load - remove custom field
update: Vulnerable Lenovo Driver Load - remove custom field
update: GALLIUM Artefacts - remove custom field
update: Renamed PaExec Execution - remove custom field
update: GALLIUM IOCs - remove custom field
update: Malicious DLL Load By Compromised 3CXDesktopApp - remove custom field
update: Potential Compromised 3CXDesktopApp Execution - remove custom field
update: HackTool Named File Stream Created - remove custom field
update: PUA - Process Hacker Driver Load - remove custom field
update: PUA - System Informer Driver Load - remove custom field
update: Vulnerable HackSys Extreme Vulnerable Driver Load - remove custom field
update: Vulnerable WinRing0 Driver Load - remove custom field
update: WinDivert Driver Load - remove custom field
update: HackTool - SharpEvtMute DLL Load - remove custom field
update: HackTool - CoercedPotato Execution - remove custom field
update: HackTool - CreateMiniDump Execution - remove custom field
update: Hacktool Execution - Imphash - remove custom field
update: HackTool - GMER Rootkit Detector and Remover Execution - remove custom field
update: HackTool - HandleKatz LSASS Dumper Execution - remove custom field
update: HackTool - Impersonate Execution - remove custom field
update: HackTool - LocalPotato Execution - remove custom field
update: HackTool - PCHunter Execution - remove custom field
update: HackTool - PPID Spoofing SelectMyParent Tool Execution - remove custom field
update: HackTool - Stracciatella Execution - remove custom field
update: HackTool - SysmonEOP Execution - remove custom field
update: HackTool - UACMe Akagi Execution - remove custom field
update: HackTool - Windows Credential Editor (WCE) Execution - remove custom field
update: MpiExec Lolbin - remove custom field
update: PUA - Fast Reverse Proxy (FRP) Execution - remove custom field
update: PUA- IOX Tunneling Tool Execution - remove custom field
update: PUA - Nimgrab Execution - remove custom field
update: PUA - NPS Tunneling Tool Execution - remove custom field
update: PUA - Process Hacker Execution - remove custom field
update: PUA - System Informer Execution - remove custom field
update: Remote Access Tool - NetSupport Execution From Unusual Location - remove custom field
update: Renamed AdFind Execution - remove custom field
update: Renamed AutoIt Execution - remove custom field
update: Renamed NetSupport RAT Execution - remove custom field
update: Renamed PAExec Execution - remove custom field
update: Potential SquiblyTwo Technique Execution - remove custom field
Example Log Event
Fixed Issues
SigmaHQ Rule Creation Conventions