Chat on WhatsApp
HomeAbout SOC ProjectsPortfolio ServicesAcademy CertificationsBlog Contact →
← Back to Projects HIGH
SIEM · Log Analysis

Log Correlation & Threat Detection

Splunk + Sysmon correlation rules built to detect multi-stage attack patterns. Identified process injection via unusual parent-child process relationships, registry-based persistence mechanisms, and lateral movement indicators across Windows Event Logs.

Tools Used

SplunkSysmonWindows Event LogsSigma RulesMITRE ATT&CK Navigator

MITRE ATT&CK Mapping

TA0003 — PersistenceT1547.001 — Registry Run KeysT1055 — Process InjectionTA0008 — Lateral Movement

Status

This case study is being written up with full scenario documentation, investigation timeline, IOC table, detection strategy, and conclusion. Check back soon or contact me directly to discuss this investigation.