File tree Expand file tree Collapse file tree 1 file changed +17
-36
lines changed Expand file tree Collapse file tree 1 file changed +17
-36
lines changed Original file line number Diff line number Diff line change @@ -43,57 +43,38 @@ drilldown_searches:
43
43
search : ' | from datamodel:Endpoint.Processes | search dest=$dest$ process_current_directory=$object_handle$*'
44
44
earliest_offset : $info_min_time$
45
45
latest_offset : $info_max_time$
46
+ rba :
47
+ message : The process [$process_name$] was launched using files on a removable storage device named [$object_name$] by [$user$] on $dest$
48
+ risk_objects :
49
+ - field : user
50
+ type : user
51
+ score : 35
52
+ - field : dest
53
+ type : system
54
+ score : 35
55
+ threat_objects :
56
+ - field : process_name
57
+ type : process_name
58
+ - field : object_name
59
+ type : registry_value_name
60
+ - field : object_handle
61
+ type : registry_value_text
46
62
tags :
47
63
analytic_story :
48
64
- Data Protection
49
65
asset_type : Endpoint
50
- confidence : 50
51
- impact : 70
52
- message : The process [$process_name$] was launched using files on a removable storage device named [$object_name$] by [$user$] on $dest$
53
66
mitre_attack_id :
54
67
- T1200
55
68
- T1025
56
69
- T1091
57
- observable :
58
- - name : dest
59
- type : Hostname
60
- role :
61
- - Victim
62
- - name : user
63
- type : User
64
- role :
65
- - Victim
66
- - name : object_name
67
- type : Other
68
- role :
69
- - Attacker
70
- - name : object_handle
71
- type : Other
72
- role :
73
- - Attacker
74
- - name : process_name
75
- type : Process Name
76
- role :
77
- - Attacker
78
70
product :
79
71
- Splunk Enterprise
80
72
- Splunk Enterprise Security
81
73
- Splunk Cloud
82
- required_fields :
83
- - Processes.dest
84
- - Processes.user
85
- - Processes.process_name
86
- - Processes.parent_process_name
87
- - Processes.process_current_directory
88
- - Registry.registry_path
89
- - Registry.registry_value_name
90
- - Registry.dest
91
- - Registry.registry_value_data
92
- risk_score : 35
93
74
security_domain : endpoint
94
75
tests :
95
76
- name : True Positive Test
96
77
attack_data :
97
78
- data : https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1200/sysmon_usb_use_execution/sysmon_usb_use_execution.log
98
79
source : XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
99
- sourcetype : XmlWinEventLog
80
+ sourcetype : XmlWinEventLog
You can’t perform that action at this time.
0 commit comments