File tree Expand file tree Collapse file tree 1 file changed +16
-20
lines changed
Expand file tree Collapse file tree 1 file changed +16
-20
lines changed Original file line number Diff line number Diff line change 11name : Detect Remote Access Software Usage Registry
22id : 33804986-25dd-43cf-bb6b-dc14956c7cbc
3- version : 1
4- date : ' 2024-11-21 '
3+ version : 2
4+ date : ' 2025-01-10 '
55author : Steven Dick
66status : production
77type : Anomaly
@@ -39,6 +39,20 @@ drilldown_searches:
3939 search : ' | from datamodel:Endpoint.Registry| search dest=$dest$ registry_path=$registry_path$'
4040 earliest_offset : $info_min_time$
4141 latest_offset : $info_max_time$
42+ rba :
43+ message : A process for a known remote access software [$signature$] was detected on $dest$
44+ risk_objects :
45+ - field : dest
46+ type : system
47+ score : 25
48+ - field : user
49+ type : user
50+ score : 25
51+ threat_objects :
52+ - field : registry_path
53+ type : registry_path
54+ - field : signature
55+ type : signature
4256tags :
4357 analytic_story :
4458 - Insider Threat
4963 asset_type : Endpoint
5064 confidence : 50
5165 impact : 50
52- message : A process for a known remote access software [$signature$] was detected on $dest$
5366 mitre_attack_id :
5467 - T1219
55- observable :
56- - name : dest
57- type : Hostname
58- role :
59- - Victim
60- - name : user
61- type : User
62- role :
63- - Victim
64- - name : registry_path
65- type : Other
66- role :
67- - Attacker
68- - name : signature
69- type : Other
70- role :
71- - Attacker
7268 product :
7369 - Splunk Enterprise
7470 - Splunk Enterprise Security
You can’t perform that action at this time.
0 commit comments