-
Notifications
You must be signed in to change notification settings - Fork 443
Outlook writing zip #3877
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: develop
Are you sure you want to change the base?
Outlook writing zip #3877
Conversation
patel-bhavin
commented
Jan 23, 2026
- updated to production
- updates to the query to join on guid
- added new dataset
| tests: | ||
| - name: True Positive Test | ||
| attack_data: | ||
| - data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1566.001/outlook_writing_zip/outlook_writing_zip.log |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The dataset is missing EventID 11 for the file creation. You grabbed EID 15 instead.
| attack_data: | ||
| - data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1566.001/outlook_writing_zip/outlook_writing_zip.log | ||
| source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational | ||
| sourcetype: XmlWinEventLog |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| sourcetype: XmlWinEventLog | |
| sourcetype: XmlWinEventLog | |
| - field: file_name | ||
| type: file_name |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
File path is as important if not more than file_name
| - field: file_name | |
| type: file_name | |
| - field: file_name | |
| type: file_name | |
| - field: file_path | |
| type: file_path |
| malicious_id outlook_id dest file_path file_name file_hash count file_id] | table | ||
| firstTime lastTime user malicious_id outlook_id process_name parent_process_name | ||
| file_name file_path | where file_name != "" | `detect_outlook_exe_writing_a_zip_file_filter`' | ||
| - Sysmon EventID 1 AND Sysmon EventID 15 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It should EID 11 for file creation
| - Sysmon EventID 1 AND Sysmon EventID 15 | |
| - Sysmon EventID 1 AND Sysmon EventID 11 |
| | join malicious_id | ||
| type=inner | ||
| [| tstats `security_content_summariesonly` count values(Filesystem.file_path) | ||
| as file_path values(Filesystem.file_name) as file_name FROM datamodel=Endpoint.Filesystem |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As discussed its also best to have action=created for better perf