Skip to content

Commit

Permalink
Merge pull request #3300 from splunk/5.0_fixes
Browse files Browse the repository at this point in the history
Remove falcon data
  • Loading branch information
nasbench authored Jan 29, 2025
2 parents ed60538 + bd608b0 commit 7316314
Show file tree
Hide file tree
Showing 2 changed files with 1 addition and 6 deletions.
2 changes: 1 addition & 1 deletion detections/endpoint/suspicious_process_file_path.yml
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
"*\\windows\\temp\\*", "*\\users\\public\\*", "*\\windows\\debug\\*", "*\\Users\\Administrator\\Music\\*",
"*\\Windows\\servicing\\*", "*\\Users\\Default\\*", "*Recycle.bin*", "*\\Windows\\Media\\*", "\\Windows\\repair\\*",
"*\\temp\\*" , "*\\PerfLogs\\*","*\\windows\\tasks\\*", "*:\\programdata\\*") by
Processes.parent_process_name Processes.parent_process Processes.process_path Processes.dest
Processes.parent_process_name Processes.parent_process Processes.process_name Processes.process_path Processes.dest
Processes.user | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)` | `suspicious_process_file_path_filter`'
how_to_implement: The detection is based on data that originates from Endpoint Detection
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -65,8 +65,3 @@ tests:
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.002/atomic_red_team/windows-sysmon.log
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
sourcetype: XmlWinEventLog
- name: True Positive Test - CrowdStrike
attack_data:
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.002/atomic_red_team/crowdstrike_falcon.log
source: crowdstrike
sourcetype: crowdstrike:events:sensor

0 comments on commit 7316314

Please sign in to comment.