From 7da798057d3c41fc1c8b27a9ee3194c46efa0b71 Mon Sep 17 00:00:00 2001 From: pcmcpherson <74933047+pcmcpherson@users.noreply.github.com> Date: Wed, 26 May 2021 15:55:17 -0600 Subject: [PATCH] Update CAR-2021-05-010.yml added pseudocode --- analytics/CAR-2021-05-010.yml | 12 +++++++++++- 1 file changed, 11 insertions(+), 1 deletion(-) diff --git a/analytics/CAR-2021-05-010.yml b/analytics/CAR-2021-05-010.yml index b81330aa..fa7acbc2 100644 --- a/analytics/CAR-2021-05-010.yml +++ b/analytics/CAR-2021-05-010.yml @@ -18,7 +18,17 @@ coverage: - TA0003 coverage: Moderate implementations: -- description: You must be ingesting data that records process activity from your +- name: Pseudocode – CertUtil certificate extraction + description: Pseudocode implementation of the Splunk search below + code: |- + processes = search Process:Create + certutil_downloads = filter processes where ( + (exe = C:\Windows\System32\net.exe OR exe = C:\Windows\System32\net1.exe ) AND command_line = * -exportPFX * ) + output certutil_downloads + data_model: CAR native + type: Pseudocode +- name: Splunk code + description: You must be ingesting data that records process activity from your hosts to populate the Endpoint data model in the Processes node. You must also be ingesting logs with both the process name and command line from your endpoints. The command-line arguments are mapped to the "process" field in the Endpoint data