Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Kerberos Local Successful Logon
id: 8309c3a8-4d34-48ae-ad66-631658214653
version: 9
date: '2025-10-14'
version: 10
date: '2025-11-06'
author: Michael Haag, Splunk
status: production
type: TTP
Expand All @@ -16,7 +16,7 @@ description: The following analytic identifies a local successful authentication
data_source:
- Windows Event Log Security 4624
search: '`wineventlog_security` EventCode=4624 LogonType=3 AuthenticationPackageName=Kerberos
action=success src=127.0.0.1 | stats count min(_time) as firstTime max(_time) as
action=success src=127.0.0.1 | fillnull | stats count min(_time) as firstTime max(_time) as
lastTime by action app authentication_method dest dvc process process_id process_name
process_path signature signature_id src src_port status subject user user_group
vendor_product | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Svchost.exe Parent Process Anomaly
id: 1d38e5e9-2ff8-4c47-872c-bf1657cefab5
version: 4
date: '2025-05-02'
version: 5
date: '2025-11-07'
author: Teoderick Contreras, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -74,6 +74,7 @@ tags:
- Splunk Enterprise Security
- Splunk Cloud
security_domain: endpoint
manual_test: This detection analytic is not passing unit tests due to a change with the latest windows 9.1.0 TA causing sysmon parsing to fail and the data does not get mapped to the datamodel correctly. Issue details- https://github.com/splunk/splunk-add-on-for-microsoft-windows/issues/563
tests:
- name: True Positive Test
attack_data:
Expand Down