<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Threat activity - Errors in correlation search related to RBA? in Splunk Enterprise Security</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Threat-activity-Errors-in-correlation-search-related-to-RBA/m-p/605666#M10921</link>
    <description>&lt;P&gt;Yes, looks to be incorrect. You can re-write that portion as follows:&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;risk_system=if(threat_match_field IN("query", "answer"),threat_match_value,null()),&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;risk_hash=if(threat_match_field IN("file_hash"),threat_match_value,null()),&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;risk_network=if(threat_match_field IN("http_user_agent", "url") OR threat_match_field LIKE "certificate_%",threat_match_value,null()),&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;risk_host=if(threat_match_field IN("file_name", "process", "service") OR threat_match_field LIKE "registry_%",threat_match_value,null()),&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;risk_other=if(threat_match_field IN("query", "answer", "src", "dest", "src_user", "user", "file_hash", "http_user_agent", "url", "file_name", "process", "service") OR threat_match_field LIKE "certificate_%" OR threat_match_field LIKE "registry_%",null(),threat_match_value)&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 14 Jul 2022 17:53:52 GMT</pubDate>
    <dc:creator>frank_s</dc:creator>
    <dc:date>2022-07-14T17:53:52Z</dc:date>
    <item>
      <title>Threat activity - Errors in correlation search related to RBA?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Threat-activity-Errors-in-correlation-search-related-to-RBA/m-p/601904#M10837</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm wondering if there isn't an issue with the correlation search that comes with Splunk ES "Threat activity detected".&amp;nbsp;&lt;/P&gt;&lt;P&gt;Indeed, my problem come from the fact that when it's triggered then I have at least 2 other alerts concerning the "24h thresold risk score" (RBA).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have taken the original correlation search (at least I think it is)&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;| from datamodel:"Threat_Intelligence"."Threat_Activity" &lt;BR /&gt;| dedup threat_match_field,threat_match_value &lt;BR /&gt;| `get_event_id` &lt;BR /&gt;| table _raw,event_id,source,src,dest,src_user,user,threat*,weight &lt;BR /&gt;| rename weight as record_weight &lt;BR /&gt;| `per_panel_filter("ppf_threat_activity","threat_match_field,threat_match_value")` &lt;BR /&gt;| `get_threat_attribution(threat_key)` &lt;BR /&gt;| rename source_* as threat_source_*,description as threat_description &lt;BR /&gt;| fields - *time &lt;BR /&gt;| eval &lt;BR /&gt;risk_score=case(isnum(record_weight), record_weight, isnum(weight) AND weight=1, 60, isnum(weight), weight, 1=1, null()),&lt;BR /&gt;risk_system=if(threat_match_field IN("query", "answer"),threat_match_value,null()),&lt;BR /&gt;risk_hash=if(threat_match_field IN("file_hash"),null(),threat_match_value),&lt;BR /&gt;risk_network=if(threat_match_field IN("http_user_agent", "url") OR threat_match_field LIKE "certificate_%",null(),threat_match_value),&lt;BR /&gt;risk_host=if(threat_match_field IN("file_name", "process", "service") OR threat_match_field LIKE "registry_%",null(),threat_match_value),&lt;BR /&gt;risk_other=if(threat_match_field IN("query", "answer", "src", "dest", "src_user", "user", "file_hash", "http_user_agent", "url", "file_name", "process", "service") OR threat_match_field LIKE "certificate_%" OR threat_match_field LIKE "registry_%",null(),threat_match_value)&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;And notice that the mechanism to select which type of risk category is concerned is changing after the first line.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;1.&amp;nbsp; Risk_system&amp;nbsp;&lt;/U&gt;&lt;/P&gt;&lt;PRE&gt;risk_system=if(threat_match_field IN("query", "answer"),threat_match_value,null()),&lt;/PRE&gt;&lt;P&gt;If I translate : If the &lt;STRONG&gt;threat_match_field&lt;/STRONG&gt; is "&lt;STRONG&gt;query&lt;/STRONG&gt; or "&lt;STRONG&gt;answer&lt;/STRONG&gt;" then the risk category &lt;FONT color="#008000"&gt;is&lt;/FONT&gt; &lt;U&gt;&lt;STRONG&gt;system and risk_system="&lt;EM&gt;&lt;FONT color="#008000"&gt;IOC that matched&lt;/FONT&gt;&lt;/EM&gt;"&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;In this case this is a domain or URL (because it's a DNS query or answer)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#008000"&gt;--&amp;gt; THIS LINE IS GOOD&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;2. Risk_hash&lt;/U&gt;&lt;/P&gt;&lt;PRE&gt;risk_hash=if(threat_match_field IN("file_hash"),null(),threat_match_value),&lt;/PRE&gt;&lt;P&gt;But in the case of hash, if I translate : If the &lt;STRONG&gt;threat_match_field&lt;/STRONG&gt; is "&lt;STRONG&gt;file_hash&lt;/STRONG&gt;" then the risk category is &lt;FONT color="#800000"&gt;NOT&amp;nbsp;&lt;/FONT&gt;&lt;U&gt;&lt;STRONG&gt;hash and risk_hash="&lt;FONT color="#800000"&gt;&lt;EM&gt;null&lt;/EM&gt;&lt;/FONT&gt;"&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#800000"&gt;&lt;STRONG&gt;--&amp;gt; THIS LINE IS WRONG&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Then it is the same for all other category : network, host, other&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So in my opinion the values in the if statement were reversed.&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;risk_hash=if(threat_match_field IN("file_hash"),&lt;FONT color="#3366FF"&gt;null()&lt;/FONT&gt;,&lt;FONT color="#800080"&gt;threat_match_value&lt;/FONT&gt;),&lt;/PRE&gt;&lt;P&gt;shoud be&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;risk_hash=if(threat_match_field IN("file_hash"),&lt;FONT color="#800080"&gt;threat_match_value&lt;/FONT&gt;, &lt;FONT color="#3366FF"&gt;null()&lt;/FONT&gt;),&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it me ? My instance ? or what ?&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Xavier&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2022 06:59:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Threat-activity-Errors-in-correlation-search-related-to-RBA/m-p/601904#M10837</guid>
      <dc:creator>XavG</dc:creator>
      <dc:date>2022-06-16T06:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: Threat activity - Errors in correlation search related to RBA?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Threat-activity-Errors-in-correlation-search-related-to-RBA/m-p/602924#M10861</link>
      <description>&lt;P&gt;Nobody ?&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jun 2022 06:40:46 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Threat-activity-Errors-in-correlation-search-related-to-RBA/m-p/602924#M10861</guid>
      <dc:creator>XavG</dc:creator>
      <dc:date>2022-06-23T06:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: Threat activity - Errors in correlation search related to RBA?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Threat-activity-Errors-in-correlation-search-related-to-RBA/m-p/605666#M10921</link>
      <description>&lt;P&gt;Yes, looks to be incorrect. You can re-write that portion as follows:&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;risk_system=if(threat_match_field IN("query", "answer"),threat_match_value,null()),&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;risk_hash=if(threat_match_field IN("file_hash"),threat_match_value,null()),&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;risk_network=if(threat_match_field IN("http_user_agent", "url") OR threat_match_field LIKE "certificate_%",threat_match_value,null()),&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;risk_host=if(threat_match_field IN("file_name", "process", "service") OR threat_match_field LIKE "registry_%",threat_match_value,null()),&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;risk_other=if(threat_match_field IN("query", "answer", "src", "dest", "src_user", "user", "file_hash", "http_user_agent", "url", "file_name", "process", "service") OR threat_match_field LIKE "certificate_%" OR threat_match_field LIKE "registry_%",null(),threat_match_value)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jul 2022 17:53:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Threat-activity-Errors-in-correlation-search-related-to-RBA/m-p/605666#M10921</guid>
      <dc:creator>frank_s</dc:creator>
      <dc:date>2022-07-14T17:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: Threat activity - Errors in correlation search related to RBA?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise-Security/Threat-activity-Errors-in-correlation-search-related-to-RBA/m-p/608540#M10959</link>
      <description>&lt;P&gt;We've noticed the same thing. Would be nice to get some feedback from Splunk on whether this is a known issue.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2022 18:44:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise-Security/Threat-activity-Errors-in-correlation-search-related-to-RBA/m-p/608540#M10959</guid>
      <dc:creator>jacobappleton</dc:creator>
      <dc:date>2022-08-05T18:44:09Z</dc:date>
    </item>
  </channel>
</rss>

