auto_sigma_rule_generator/backend/templates/registry_modification.yaml

29 lines
No EOL
706 B
YAML

template_name: "Registry Modification Detection"
description: "Detects suspicious registry modifications based on PoC exploit indicators"
applicable_product_patterns:
- "registry"
- "windows"
- "microsoft"
template_content: |
title: {{TITLE}}
id: {{RULE_ID}}
status: experimental
description: {{DESCRIPTION}}
author: CVE-SIGMA Auto Generator
date: {{DATE}}
references:
{{REFERENCES}}
tags:
{{TAGS}}
logsource:
category: registry_event
product: windows
detection:
selection:
TargetObject|contains:
{{REGISTRY}}
condition: selection
falsepositives:
- Legitimate software configuration changes
- System updates
level: {{LEVEL}}