Skip to content

Commit e4c733a

Browse files
committed
update output fields
1 parent a62ddcc commit e4c733a

6 files changed

+20
-11
lines changed

detections/cloud/asl_aws_new_mfa_method_registered_for_user.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ rba:
4949
type: user
5050
score: 64
5151
threat_objects:
52-
- field: src_ip
52+
- field: src
5353
type: ip_address
5454
tags:
5555
analytic_story:

detections/endpoint/dllhost_with_no_command_line_arguments_with_network.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1919
as lastTime FROM datamodel=Endpoint.Processes where Processes.process_name=dllhost.exe
2020
Processes.action!="blocked" by host _time span=1h Processes.process_id Processes.process_name
2121
Processes.dest Processes.process_path Processes.process Processes.parent_process_name
22-
Processes.parent_process | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)`
22+
Processes.parent_process Processes.user | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)`
2323
| `security_content_ctime(lastTime)` | regex process="(?i)(dllhost\.exe.{0,4}$)"
2424
| rename dest as src | join host process_id [| tstats `security_content_summariesonly`
2525
count latest(All_Traffic.dest) as dest latest(All_Traffic.dest_ip) as dest_ip latest(All_Traffic.dest_port)
@@ -64,7 +64,7 @@ rba:
6464
type: system
6565
score: 49
6666
threat_objects:
67-
- field: parent_image
67+
- field: parent_process_name
6868
type: process
6969
- field: process_name
7070
type: process_name

detections/endpoint/windows_ad_privileged_group_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ data_source:
1010
description: Detect users added to privileged AD Groups.
1111
search: '`wineventlog_security` EventCode IN (4728) | stats min(_time) as _time dc(user)
1212
as usercount, values(user) as user values(user_category) as user_category values(src_user_category)
13-
as src_user_category values(dvc) as dvc by signature, Group_Name,src_user | lookup
13+
as src_user_category values(dvc) as dvc by signature, Group_Name,src_user dest | lookup
1414
admon_groups_def cn as Group_Name OUTPUT category | where category="privileged"
1515
| `windows_ad_privileged_group_modification_filter`'
1616
how_to_implement: This analytic requires eventCode 4728 to be ingested along with

detections/endpoint/windows_ad_suspicious_gpo_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ search: "`wineventlog_security` EventCode=5145 ShareName=\"\\\\\\\\*\\\\SYSVOL\"
2626
$gpo_guid$\" \n | stats min(_time) as _time values(eval(if(OperationType==\"%%14675\"\
2727
,AttributeValue,null))) as old_value values(eval(if(OperationType==\"%%14674\",AttributeValue,null)))
2828
as new_value values(OperationType) as OperationType by ObjectClass ObjectDN OpCorrelationID
29-
src_user SubjectLogonId \n | rex field=old_value max_match=10000 \"(?P<old_values>\\\
29+
src_user SubjectLogonId dest \n | rex field=old_value max_match=10000 \"(?P<old_values>\\\
3030
{.*?\\})\" \n | rex field=new_value max_match=10000 \"(?P<new_values>\\{.*?\\})\"\
3131
\ \n | rex field=ObjectDN max_match=10000 \"CN=(?P<policy_guid>\\{.*?\\})\" \n\
3232
\ | mvexpand new_values \n | where NOT new_values IN (old_values,\"{00000000-0000-0000-0000-000000000000}\"\

detections/endpoint/windows_moveit_transfer_writing_aspx.yml

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,12 @@ description: The following analytic detects the creation of new ASPX files in th
1616
data, including user credentials and file metadata, posing a severe risk to the
1717
organization's security.
1818
search: '| tstats `security_content_summariesonly` count FROM datamodel=Endpoint.Processes
19-
where Processes.process_name=System by _time span=1h Processes.process_id Processes.process_name
20-
Processes.dest | `drop_dm_object_name(Processes)` | join process_guid, _time [|
19+
where Processes.process_name=System by _time span=1h by Processes.action Processes.dest Processes.original_file_name
20+
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
21+
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
22+
Processes.process Processes.process_exec Processes.process_guid Processes.process_hash
23+
Processes.process_id Processes.process_integrity_level Processes.process_name Processes.process_path
24+
Processes.user Processes.user_id Processes.vendor_product | `drop_dm_object_name(Processes)` | join process_guid, _time [|
2125
tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
2226
as lastTime FROM datamodel=Endpoint.Filesystem where Filesystem.file_path IN ("*\\MOVEitTransfer\\wwwroot\\*")
2327
Filesystem.file_name IN("*.aspx", "*.ashx", "*.asp*") OR Filesystem.file_name IN

detections/endpoint/windows_rundll32_webdav_with_network_connection.yml

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,8 @@ date: '2025-06-10'
55
author: Michael Haag, Splunk
66
type: TTP
77
status: production
8-
data_source: []
8+
data_source:
9+
- Sysmon EventID 1 AND Sysmon EventID 3
910
description: The following analytic detects the execution of rundll32.exe with command-line
1011
arguments loading davclnt.dll and the davsetcookie function to access a remote WebDav
1112
instance. It uses data from Endpoint Detection and Response (EDR) agents, correlating
@@ -16,9 +17,13 @@ description: The following analytic detects the execution of rundll32.exe with c
1617
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
1718
as lastTime FROM datamodel=Endpoint.Processes where Processes.parent_process_name=svchost.exe
1819
`process_rundll32` Processes.process IN ("*\\windows\\system32\\davclnt.dll,*davsetcookie*",
19-
"*\\windows\\syswow64\\davclnt.dll,*davsetcookie*") by host _time span=1h Processes.process_id
20-
Processes.process_name Processes.dest Processes.process_path Processes.process Processes.parent_process_name
21-
Processes.parent_process | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)`
20+
"*\\windows\\syswow64\\davclnt.dll,*davsetcookie*") by host _time span=1h
21+
by Processes.action Processes.dest Processes.original_file_name Processes.parent_process Processes.parent_process_exec
22+
Processes.parent_process_guid Processes.parent_process_id Processes.parent_process_name
23+
Processes.parent_process_path Processes.process Processes.process_exec Processes.process_guid Processes.process_hash
24+
Processes.process_id Processes.process_integrity_level Processes.process_name Processes.process_path
25+
Processes.user Processes.user_id Processes.vendor_product
26+
| `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)`
2227
| `security_content_ctime(lastTime)` | rename dest as src | join host process_id
2328
[ | tstats `security_content_summariesonly` count latest(All_Traffic.dest) as dest
2429
latest(All_Traffic.dest_ip) as dest_ip latest(All_Traffic.dest_port) as dest_port

0 commit comments

Comments
 (0)