Solutions/SentinelOne/Hunting Queries/SentinelOneAlertTriggers.yaml (25 lines of code) (raw):
id: 660e92b5-1ef6-471f-b753-44a34af82c41
name: Sentinel One - Alert triggers (files, processes, strings)
description: |
'Query shows alert triggers (e.g. files, processes, etc.).'
severity: High
requiredDataConnectors:
- connectorId: SentinelOne
dataTypes:
- SentinelOne
tactics:
- InitialAccess
relevantTechniques:
- T1204
query: |
SentinelOne
| where TimeGenerated > ago(24h)
| where ActivityType == 3608
| order by EventCreationTime
| extend trigger = extract(@'Alert created for\s+(.*?)\sfrom Custom', 1, EventOriginalMessage)
| extend MalwareCustomEntity = trigger
entityMappings:
- entityType: Malware
fieldMappings:
- identifier: Name
columnName: MalwareCustomEntity