Skip to content

Commit 7a8f2d0

Browse files
authored
Merge pull request #59 from splunk/file_writes_fix
fixing broken detection search - suspicious_file_writes
2 parents 77ad425 + f761e90 commit 7a8f2d0

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

detections/suspicious_file_writes.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@
6262
"DE.CM"
6363
]
6464
},
65-
"modification_date": "2018-11-14",
65+
"modification_date": "2019-04-25",
6666
"original_authors": [
6767
{
6868
"company": "Splunk",
@@ -75,12 +75,12 @@
7575
"earliest_time": "-70m@m",
7676
"latest_time": "-10m@m"
7777
},
78-
"search": "| tstats `summariesonly` count values(Filesystem.action) as action values(Filesystem.file_path) as file_path min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Filesystem by Filesystem.file_name Filesystem.dest | `ctime(lastTime)` | `ctime(firstTime)` | `drop_dm_object_name(Filesystem)`",
78+
"search": "| tstats `summariesonly` count values(Filesystem.action) as action values(Filesystem.file_path) as file_path min(_time) as firstTime max(_time) as lastTime FROM datamodel=Endpoint.Filesystem by Filesystem.file_name Filesystem.dest | `ctime(lastTime)` | `ctime(firstTime)` | `drop_dm_object_name(Filesystem)` | `suspicious_writes`",
7979
"search_description": "The search looks for files created with names that have been linked to malicious activity.",
8080
"search_id": "57f76b8a-32f0-42ed-b358-d9fa3ca7bac8",
8181
"search_name": "Suspicious File Write",
8282
"search_type": "detection",
8383
"security_domain": "endpoint",
8484
"spec_version": 1,
85-
"version": "2.0"
85+
"version": "3.0"
8686
}

0 commit comments

Comments
 (0)