Skip to content

Conversation

@patel-bhavin
Copy link
Contributor

  • updated to production
  • updates to the query to join on guid
  • added new dataset

tests:
- name: True Positive Test
attack_data:
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1566.001/outlook_writing_zip/outlook_writing_zip.log
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The dataset is missing EventID 11 for the file creation. You grabbed EID 15 instead.

attack_data:
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1566.001/outlook_writing_zip/outlook_writing_zip.log
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
sourcetype: XmlWinEventLog
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
sourcetype: XmlWinEventLog
sourcetype: XmlWinEventLog

Comment on lines +87 to +88
- field: file_name
type: file_name
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

File path is as important if not more than file_name

Suggested change
- field: file_name
type: file_name
- field: file_name
type: file_name
- field: file_path
type: file_path

malicious_id outlook_id dest file_path file_name file_hash count file_id] | table
firstTime lastTime user malicious_id outlook_id process_name parent_process_name
file_name file_path | where file_name != "" | `detect_outlook_exe_writing_a_zip_file_filter`'
- Sysmon EventID 1 AND Sysmon EventID 15
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It should EID 11 for file creation

Suggested change
- Sysmon EventID 1 AND Sysmon EventID 15
- Sysmon EventID 1 AND Sysmon EventID 11

@nasbench nasbench added this to the v5.21.0 milestone Jan 23, 2026
| join malicious_id
type=inner
[| tstats `security_content_summariesonly` count values(Filesystem.file_path)
as file_path values(Filesystem.file_name) as file_name FROM datamodel=Endpoint.Filesystem
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As discussed its also best to have action=created for better perf

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants