Hello,
Since there is a lot of Ransomware activity going on, I would like to implement this list of know ramsomware extensions:
https://fsrm.experiant.ca/
to be compared with the paths that my file server reports to Graylog as been written, read, or modified.
I created a CSV containing the extension list and other column with “Ransomware ALERT” so if I lookup for the extension the alert appears.
The problem is, the way lookup works is as far I understand “search for the message value on the CSV”, while the thing I want to do is “Look if any of the extensions in the lookup table appears on the path”.
Do you have any idea on how that can be implemented in graylog? I think it could be a powerful ransomware notification system!