Skip to content

Commit 5b9b5ab

Browse files
authored
Update windows_system_remote_discovery_with_query.yml
update to v5 yaml spec update search yaml for better readability / remove single quote in SPL issues
1 parent e36e9d5 commit 5b9b5ab

File tree

1 file changed

+18
-25
lines changed

1 file changed

+18
-25
lines changed

detections/endpoint/windows_system_remote_discovery_with_query.yml

Lines changed: 18 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -10,11 +10,12 @@ data_source:
1010
- Sysmon Event ID 1
1111
- Windows Security Event ID 4688
1212
- CrowdStrike ProcessRollup2
13-
search: '| tstats `security_content_summariesonly` values(Processes.process_current_directory) as Processes.process_current_directory values(Processes.process_id) as Processes.process_id values(Processes.process) as Processes.process values(Processes.parent_process_id) as Processes.parent_process_id values(Processes.parent_process) as Processes.parent_process count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where (Processes.process_name="query.exe" OR Processes.original_file_name="query.exe") AND (Processes.process=*/server*) by Processes.dest Processes.user Processes.process_name Processes.parent_process_name
14-
| `drop_dm_object_name(Processes)`
15-
| `security_content_ctime(firstTime)`
16-
| `security_content_ctime(lastTime)`
17-
| `windows_system_remote_discovery_with_query_filter`'
13+
search: |-
14+
| tstats `security_content_summariesonly` values(Processes.process_current_directory) as Processes.process_current_directory values(Processes.process_id) as Processes.process_id values(Processes.process) as Processes.process values(Processes.parent_process_id) as Processes.parent_process_id values(Processes.parent_process) as Processes.parent_process count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where (Processes.process_name="query.exe" OR Processes.original_file_name="query.exe") AND (Processes.process=*/server*) by Processes.dest Processes.user Processes.process_name Processes.parent_process_name
15+
| `drop_dm_object_name(Processes)`
16+
| `security_content_ctime(firstTime)`
17+
| `security_content_ctime(lastTime)`
18+
| `windows_system_remote_discovery_with_query_filter`
1819
how_to_implement: The detection is based on data that originates from Endpoint Detection and Response (EDR) agents. These agents are designed to provide security-related telemetry from the endpoints where the agent is installed. To implement this search, you must ingest logs that contain the process GUID, process name, and parent process. Additionally, you must ingest complete command-line executions. These logs must be processed using the appropriate Splunk Technology Add-ons that are specific to the EDR product. The logs must also be mapped to the `Processes` node of the `Endpoint` data model. Use the Splunk Common Information Model (CIM) to normalize the field names and speed up the data modeling process.
1920
known_false_positives: Administrators or power users may use this command for troubleshooting.
2021
references:
@@ -32,36 +33,28 @@ drilldown_searches:
3233
search: '| from datamodel:Endpoint.Processes | search dest=$dest$ process_name = $process_name|s$'
3334
earliest_offset: $info_min_time$
3435
latest_offset: $info_max_time$
36+
rba:
37+
message: The user $user$ ran the Query command to enumerate the remote system $dest$
38+
risk_objects:
39+
- field: user
40+
type: user
41+
score: 25
42+
- field: dest
43+
type: system
44+
score: 25
45+
threat_objects:
46+
- field: process_name
47+
type: process_name
3548
tags:
3649
analytic_story:
3750
- Active Directory Discovery
3851
asset_type: Endpoint
39-
confidence: 49
40-
impact: 49
41-
message: The user $user$ ran the Query command to query information from a remote system from $dest$
4252
mitre_attack_id:
4353
- T1033
44-
observable:
45-
- name: dest
46-
type: Hostname
47-
role:
48-
- Victim
49-
- name: user
50-
type: User
51-
role:
52-
- Victim
5354
product:
5455
- Splunk Enterprise
5556
- Splunk Enterprise Security
5657
- Splunk Cloud
57-
required_fields:
58-
- _time
59-
- Processes.dest
60-
- Processes.user
61-
- Processes.process
62-
- Processes.process_name
63-
- Processes.parent_process_name
64-
risk_score: 24
6558
security_domain: endpoint
6659
tests:
6760
- name: True Positive Test

0 commit comments

Comments
 (0)