File tree Expand file tree Collapse file tree 1 file changed +13
-13
lines changed Expand file tree Collapse file tree 1 file changed +13
-13
lines changed Original file line number Diff line number Diff line change @@ -37,25 +37,26 @@ drilldown_searches:
37
37
search : ' | from datamodel:Endpoint.Processes | search dest=$dest|s$ process_name=$process_name$ "*$match$*"'
38
38
earliest_offset : $info_min_time$
39
39
latest_offset : $info_max_time$
40
+ rba :
41
+ message : The user $user$ ran a known malicious PowerShell string matching *$match$* on $dest$
42
+ risk_objects :
43
+ - field : user
44
+ type : user
45
+ score : 70
46
+ - field : dest
47
+ type : system
48
+ score : 70
49
+ threat_objects :
50
+ - field : process_name
51
+ type : process_name
40
52
tags :
41
53
analytic_story :
42
54
- Malicious PowerShell
43
55
asset_type : Endpoint
44
- confidence : 90
45
- impact : 80
46
- message : The user $user$ ran a known malicious PowerShell string matching *$match$* on $dest$
56
+ message :
47
57
mitre_attack_id :
48
58
- T1059
49
59
- T1059.001
50
- observable :
51
- - name : dest
52
- type : Hostname
53
- role :
54
- - Victim
55
- - name : user
56
- type : User
57
- role :
58
- - Victim
59
60
product :
60
61
- Splunk Enterprise
61
62
- Splunk Enterprise Security
66
67
- Processes.process_name
67
68
- Processes.process
68
69
- Processes.parent_process_name
69
- risk_score : 72
70
70
security_domain : threat
71
71
tests :
72
72
- name : True Positive Test
You can’t perform that action at this time.
0 commit comments