From 143a6639f82607627fdf9c66827a70221baa66ca Mon Sep 17 00:00:00 2001 From: Conor Richard Date: Tue, 4 Oct 2022 06:50:59 -0400 Subject: [PATCH] Adding .gitattributes file, fixing template/checks (#253) --- .gitattributes | 1 + .github/workflows/yaml-linting.yml | 5 +++++ YML-Template.yml | 18 ++++++++---------- 3 files changed, 14 insertions(+), 10 deletions(-) create mode 100644 .gitattributes diff --git a/.gitattributes b/.gitattributes new file mode 100644 index 0000000..c68529d --- /dev/null +++ b/.gitattributes @@ -0,0 +1 @@ +*.yml text eol=lf diff --git a/.github/workflows/yaml-linting.yml b/.github/workflows/yaml-linting.yml index 70d7678..120daa8 100644 --- a/.github/workflows/yaml-linting.yml +++ b/.github/workflows/yaml-linting.yml @@ -13,6 +13,11 @@ jobs: no_warnings: true file_or_dir: yml/**/*.yml config_file: .github/.yamllint + - name: Validate Template Schema + uses: cketti/action-pykwalify@v0.3-temp-fix + with: + files: YML-Template.yml + schema: YML-Schema.yml - name: Validate OSBinaries YAML Schema uses: cketti/action-pykwalify@v0.3-temp-fix with: diff --git a/YML-Template.yml b/YML-Template.yml index a9ff5b3..bae43db 100644 --- a/YML-Template.yml +++ b/YML-Template.yml @@ -4,12 +4,10 @@ Description: Something general about the binary Aliases: # Optional field if any common aliases exist of the binary with nearly the same functionality, - Alias: Binary64.exe # but for example, is built for different architecture. Author: The name of the person that created this file -Created: YYYY-MM-DD (date the person created this file) +Created: 1970-01-01 # YYYY-MM-DD (date the person created this file) Commands: - Command: The command Description: Description of the command - Aliases: - - An alias for the command (example: ProcDump.exe & ProcDump64.exe) Usecase: A description of the usecase Category: Execute Privileges: Required privs @@ -26,19 +24,19 @@ Full_Path: - Path: c:\windows\system32\bin.exe - Path: c:\windows\syswow64\bin.exe Code_Sample: - - Code: http://url.com/git.txt + - Code: http://example.com/git.txt Detection: - IOC: Event ID 10 - IOC: binary.exe spawned - - Analysis: https://link/to/blog/gist/writeup/if/applicable - - Sigma: https://link/to/sigma/rule/if/applicable - - Elastic: https://link/to/elastic/rule/if/applicable - - Splunk: https://link/to/splunk/rule/if/applicable - - BlockRule: https://link/to/microsoft/block/rules/if/applicable + - Analysis: https://example.com/to/blog/gist/writeup/if/applicable + - Sigma: https://example.com/to/sigma/rule/if/applicable + - Elastic: https://example.com/to/elastic/rule/if/applicable + - Splunk: https://example.com/to/splunk/rule/if/applicable + - BlockRule: https://example.com/to/microsoft/block/rules/if/applicable Resources: - Link: http://blogpost.com - Link: http://twitter.com/something - - Link: Threatintelreport... + - Link: http://example.com/Threatintelreport Acknowledgement: - Person: John Doe Handle: '@johndoe'