Skip to content

Commit e27f42b

Browse files
committed
more output field fixes
1 parent e4c733a commit e27f42b

File tree

2 files changed

+14
-4
lines changed

2 files changed

+14
-4
lines changed

detections/endpoint/dllhost_with_no_command_line_arguments_with_network.yml

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,14 @@ data_source:
1717
- Sysmon EventID 1 AND Sysmon EventID 3
1818
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
1919
as lastTime FROM datamodel=Endpoint.Processes where Processes.process_name=dllhost.exe
20-
Processes.action!="blocked" by host _time span=1h Processes.process_id Processes.process_name
21-
Processes.dest Processes.process_path Processes.process Processes.parent_process_name
22-
Processes.parent_process Processes.user | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)`
20+
Processes.action!="blocked" by host _time span=1h
21+
Processes.action Processes.dest Processes.original_file_name
22+
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
23+
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
24+
Processes.process Processes.process_exec Processes.process_guid Processes.process_hash
25+
Processes.process_id Processes.process_integrity_level Processes.process_name Processes.process_path
26+
Processes.user Processes.user_id Processes.vendor_product
27+
| `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)`
2328
| `security_content_ctime(lastTime)` | regex process="(?i)(dllhost\.exe.{0,4}$)"
2429
| rename dest as src | join host process_id [| tstats `security_content_summariesonly`
2530
count latest(All_Traffic.dest) as dest latest(All_Traffic.dest_ip) as dest_ip latest(All_Traffic.dest_port)

detections/endpoint/windows_rundll32_webdav_with_network_connection.yml

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,12 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
2828
[ | tstats `security_content_summariesonly` count latest(All_Traffic.dest) as dest
2929
latest(All_Traffic.dest_ip) as dest_ip latest(All_Traffic.dest_port) as dest_port
3030
FROM datamodel=Network_Traffic.All_Traffic where All_Traffic.dest_port!=0 NOT (All_Traffic.dest_ip
31-
IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16)) by host All_Traffic.process_id
31+
IN (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16))
32+
by host All_Traffic.action All_Traffic.app All_Traffic.bytes All_Traffic.bytes_in All_Traffic.bytes_out
33+
All_Traffic.dest All_Traffic.dest_ip All_Traffic.dest_port All_Traffic.dvc All_Traffic.protocol
34+
All_Traffic.protocol_version All_Traffic.src All_Traffic.src_ip All_Traffic.src_port
35+
All_Traffic.transport All_Traffic.user All_Traffic.vendor_product All_Traffic.direction
36+
All_Traffic.process_id
3237
| `drop_dm_object_name(All_Traffic)`] | `windows_rundll32_webdav_with_network_connection_filter`'
3338
how_to_implement: The detection is based on data that originates from Endpoint Detection
3439
and Response (EDR) agents. These agents are designed to provide security-related

0 commit comments

Comments
 (0)