Skip to content

Commit cb9655f

Browse files
authored
Merge pull request #3424 from splunk/default_match_lookup
Removing default match from lookups
2 parents 8d59758 + 70504b7 commit cb9655f

31 files changed

+2
-32
lines changed

lookups/3cx_ioc_domains.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ id: 65c25399-4081-4ef1-b791-86f497d3380d
55
author: Splunk Threat Research Team
66
lookup_type: csv
77
description: A list of domains from the 3CX supply chain attack.
8-
default_match: false
98
match_type:
109
- WILDCARD(domain)
1110
min_matches: 1

lookups/__mlspl_unusual_commandline_detection.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,4 +7,3 @@ lookup_type: mlmodel
77
description: An MLTK model for detecting malicious commandlines
88
case_sensitive_match: false
99
min_matches: 1
10-
default_match: false

lookups/advanced_audit_policy_guids.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ id: e2581a3a-1254-4b93-ae8f-ccde22362f0c
55
author: Splunk Threat Research Team
66
lookup_type: csv
77
description: List of GUIDs associated with Windows advanced audit policies
8-
default_match: false
98
match_type:
109
- WILDCARD(GUID)
1110
min_matches: 1

lookups/applockereventcodes.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ id: 2fd8cc84-f4c8-4ab6-bd57-596f714a315f
55
author: Splunk Threat Research Team
66
lookup_type: csv
77
description: A csv of the ID and rule name for AppLocker event codes.
8-
default_match: false
98
match_type:
109
- WILDCARD(AppLocker_Event_Code)
1110
min_matches: 1

lookups/asr_rules.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ id: 3886d687-ae77-4a61-99eb-e745083e391e
55
author: Splunk Threat Research Team
66
lookup_type: csv
77
description: A csv of the ID and rule name for ASR, Microsoft Attack Surface Reduction rules.
8-
default_match: false
98
match_type:
109
- WILDCARD(ASR_Rule)
1110
min_matches: 1

lookups/attacker_tools.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ id: 72620fe1-26cb-4cee-a6ee-8c6127056d81
55
author: Splunk Threat Research Team
66
lookup_type: csv
77
description: A list of tools used by attackers
8-
default_match: false
98
match_type:
109
- WILDCARD(attacker_tool_names)
1110
min_matches: 1

lookups/brandmonitoring_lookup.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ version: 2
44
id: 6fff763a-d654-42dc-8e56-92c8e255ac55
55
author: Splunk Threat Research Team
66
lookup_type: csv
7-
default_match: false
87
description: A file that contains look-a-like domains for brands that you want to
98
monitor
109
match_type:

lookups/browser_app_list.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,8 @@ version: 2
44
id: a80ccd19-e46f-4a12-9ad7-e653ad646347
55
author: Splunk Threat Research Team
66
lookup_type: csv
7-
default_match: false
87
description: A list of known browser application being targeted for credential extraction.
8+
default_match: false
99
match_type:
1010
- WILDCARD(browser_process_name)
1111
- WILDCARD(browser_object_path)

lookups/char_conversion_matrix.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@ id: 0177cf7b-8cf9-412a-9919-d1919b8d59dc
55
author: Splunk Threat Research Team
66
lookup_type: csv
77
description: A simple conversion matrix for converting to and from UTF8/16 base64/hex/decimal encoding. Created mosty from https://community.splunk.com/t5/Splunk-Search/base64-decoding-in-search/m-p/27572#M177741, with small modifications for UTF16LE parsing for powershell encoding.
8-
default_match: false
98
match_type:
109
- WILDCARD(data)
1110
min_matches: 1

lookups/cloud_instances_enough_data.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,6 @@ version: 2
44
id: 2aabac97-9782-4156-9dfd-7c1fb7aab2a6
55
author: Splunk Threat Research Team
66
lookup_type: kvstore
7-
default_match: false
87
description: A lookup to determine if you have a sufficient amount of time has passed to collect cloud instance data for behavioral searches
98
fields:
109
- _key

0 commit comments

Comments
 (0)