Skip to content

Commit 5efd265

Browse files
authored
Branch was auto-updated.
2 parents 963f94f + 6f56a46 commit 5efd265

File tree

1 file changed

+16
-20
lines changed

1 file changed

+16
-20
lines changed

detections/endpoint/detect_remote_access_software_usage_registry.yml

Lines changed: 16 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Detect Remote Access Software Usage Registry
22
id: 33804986-25dd-43cf-bb6b-dc14956c7cbc
3-
version: 1
4-
date: '2024-11-21'
3+
version: 2
4+
date: '2025-01-10'
55
author: Steven Dick
66
status: production
77
type: Anomaly
@@ -39,6 +39,20 @@ drilldown_searches:
3939
search: '| from datamodel:Endpoint.Registry| search dest=$dest$ registry_path=$registry_path$'
4040
earliest_offset: $info_min_time$
4141
latest_offset: $info_max_time$
42+
rba:
43+
message: A process for a known remote access software [$signature$] was detected on $dest$
44+
risk_objects:
45+
- field: dest
46+
type: system
47+
score: 25
48+
- field: user
49+
type: user
50+
score: 25
51+
threat_objects:
52+
- field: registry_path
53+
type: registry_path
54+
- field: signature
55+
type: signature
4256
tags:
4357
analytic_story:
4458
- Insider Threat
@@ -49,26 +63,8 @@ tags:
4963
asset_type: Endpoint
5064
confidence: 50
5165
impact: 50
52-
message: A process for a known remote access software [$signature$] was detected on $dest$
5366
mitre_attack_id:
5467
- T1219
55-
observable:
56-
- name: dest
57-
type: Hostname
58-
role:
59-
- Victim
60-
- name: user
61-
type: User
62-
role:
63-
- Victim
64-
- name: registry_path
65-
type: Other
66-
role:
67-
- Attacker
68-
- name: signature
69-
type: Other
70-
role:
71-
- Attacker
7268
product:
7369
- Splunk Enterprise
7470
- Splunk Enterprise Security

0 commit comments

Comments
 (0)