Files
spl/splunk_alert.md
2024-12-03 11:24:34 -05:00

1.2 KiB

index=* RuleName=T*
| eval hash_sha256= lower(hash_sha256),
mitre_technique_id="T1543",
mitre_technique="Create or Modify System Process",
mitre_subtechnique_id="T1543.001",
mitre_subtechnique="Launch Agent",
mitre_category="Persistence",
apt=mvappend("APT28", ""),
hunting_trigger="Look for unusual modifications to system processes.",
mitre_link="https://attack.mitre.org/techniques/T1543/",
creator="Cpl Iverson",
upload_date="",
last_modify_date="",
mitre_version="v16",
priority="High"
| `process_create_whitelist` 
| eval indextime = _indextime 
| convert ctime(indextime) 
| table _time indextime event_description hash_sha256 host_fqdn user_name original_file_name process_path process_guid process_parent_path process_id process_parent_id process_command_line process_parent_command_line process_parent_guid mitre_category mitre_technique mitre_technique_id mitre_subtechnique_id mitre_subtechnique apt hunting_trigger mitre_link upload_date last_modify_date mitre_version priority

Permissions

- Display For: App
- Read: Everyone
- Write: admin

Schedule

- Schedule: Run on Cron Schedule
- */15 * * * *
- Time Range: Since date time
- Schedule Priority: Default
- Schedule Window: Auto