Skip to content

Commit 588a4e6

Browse files
authored
add highlighted fields
add highlighted fields
1 parent 8982711 commit 588a4e6

File tree

1 file changed

+19
-0
lines changed

1 file changed

+19
-0
lines changed

rules/integrations/aws/initial_access_kali_user_agent_detected_with_aws_cli.toml

Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -139,3 +139,22 @@ id = "TA0001"
139139
name = "Initial Access"
140140
reference = "https://attack.mitre.org/tactics/TA0001/"
141141

142+
[rule.investigation_fields]
143+
field_names = [
144+
"@timestamp",
145+
"user.name",
146+
"user_agent.original",
147+
"source.ip",
148+
"aws.cloudtrail.user_identity.arn",
149+
"aws.cloudtrail.user_identity.type",
150+
"aws.cloudtrail.user_identity.access_key_id",
151+
"aws.cloudtrail.resources.arn",
152+
"aws.cloudtrail.resources.type",
153+
"event.action",
154+
"event.outcome",
155+
"cloud.account.id",
156+
"cloud.region",
157+
"aws.cloudtrail.request_parameters",
158+
"aws.cloudtrail.response_elements"
159+
]
160+

0 commit comments

Comments
 (0)