Skip to content

Commit

Permalink
update others_compliance mappings (#302) (#347)
Browse files Browse the repository at this point in the history
Signed-off-by: Grant Haywood <[email protected]>
  • Loading branch information
opensearch-trigger-bot[bot] authored Feb 21, 2023
1 parent 41f8a7f commit 36892bf
Show file tree
Hide file tree
Showing 2 changed files with 17 additions and 25 deletions.
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# this file provides pre-defined mappings for Sigma fields defined for all Sigma rules under compliance log group to their corresponding ECS Fields.
fieldmappings:
EventID: event_uid
HiveName: unmapped.HiveName
fieldB: mappedB
fieldA1: mappedA
host.scan.vuln: vulnerability-id
EventID: winlog-event_id
host.scan.vuln_name: vulnerability-enumeration
destination.port: netflow-tcp_destination_port
creationTime: timestamp
34 changes: 13 additions & 21 deletions src/main/resources/OSMapping/others_compliance/mappings.json
Original file line number Diff line number Diff line change
@@ -1,32 +1,24 @@
{
"properties": {
"windows-event_data-CommandLine": {
"type": "alias",
"path": "CommandLine"
},
"event_uid": {
"type": "alias",
"path": "EventID"
},
"windows-hostname": {
"type": "alias",
"path": "HostName"
"vulnerability-id": {
"path": "vulnerability.id",
"type": "alias"
},
"windows-message": {
"type": "alias",
"path": "Message"
"winlog-event_id": {
"path": "winlog.event_id",
"type": "alias"
},
"windows-provider-name": {
"type": "alias",
"path": "Provider_Name"
"vulnerability-enumeration": {
"path": "vulnerability.enumeration",
"type": "alias"
},
"windows-servicename": {
"type": "alias",
"path": "ServiceName"
"netflow-tcp_destination_port": {
"path": "netflow.tcp_destination_port",
"type": "alias"
},
"timestamp": {
"path": "creationTime",
"type": "alias"
}
}
}
}

0 comments on commit 36892bf

Please sign in to comment.