@@ -105,8 +105,9 @@ questions:
105105 - question : What files did this process create or modify?
106106 context : |
107107 File creation and modification patterns reveal the process's actual behavior and potential impact.
108- Look for sensitive data access, configuration changes, or payload drops.
109- range : +30m
108+ Look for sensitive data access, configuration changes, or payload drops. The query looks for file events
109+ made by both the process and its parent.
110+ range : +/-15m
110111 answer_sources :
111112 - file_event
112113 query : |
@@ -115,8 +116,8 @@ questions:
115116 category: file_event
116117 detection:
117118 selection:
118- hostname|expand: '%hostname%'
119119 ProcessGuid|expand: '%ProcessGuid%'
120+ ParentProcessGuid|expand: '%ParentProcessGuid%'
120121 condition: selection
121122 fields:
122123 - EventType
@@ -125,7 +126,7 @@ questions:
125126 - question : What network connections did this process make?
126127 context : |
127128 Network activity can reveal command and control, data exfiltration, or lateral
128- movement attempts.
129+ movement attempts. Pivoting on the Community ID can help identify related network events.
129130 range : +/-15m
130131 answer_sources :
131132 - network_connection
@@ -135,7 +136,6 @@ questions:
135136 category: network_connection
136137 detection:
137138 selection:
138- hostname|expand: '%hostname%'
139139 ProcessGuid|expand: '%ProcessGuid%'
140140 condition: selection
141141 fields:
@@ -144,11 +144,12 @@ questions:
144144 - destination.ip
145145 - destination.port
146146 - network.initiated
147+ - community_id
147148
148149 - question : What registry changes did this process make?
149150 context : |
150151 On Windows systems, registry activity can reveal further intent.
151- The query looks for registry changes made by both the process and its parent.
152+ The query looks for registry changes made by the process and its parent.
152153 range : +/-15m
153154 answer_sources :
154155 - registry_event
@@ -158,7 +159,6 @@ questions:
158159 category: registry_event
159160 detection:
160161 selection:
161- hostname|expand: '%hostname%'
162162 ProcessGuid|expand: '%ProcessGuid%'
163163 ParentProcessGuid|expand: '%ParentProcessGuid%'
164164 condition: selection
@@ -188,4 +188,5 @@ questions:
188188 fields:
189189 - hostname
190190 - User
191- - Image
191+ - Image
192+ - CommandLine
0 commit comments