soc30 / lms
connected
dashboard
WEEK_4 · DAY_22 · 1 HOUR

Use Case Engineering

From threat hypothesis to production correlation search

Splunk Lab

Learning Objectives

  • Translate a threat into a use case
  • Document data sources, logic, FPs, response
  • Build, test, tune, and ship
  • Track use case lifecycle (proposed → tuning → production → retired)

Module 1 — Use Case Template

Name. Threat. ATT&CK. Data sources. Logic (SPL). False positive scenarios. Response (runbook). Owner. Status.

Module 2 — Lifecycle

Proposed → Drafted → Tested (shadow mode) → Production → Tuning → Retired.

Detection-as-code: store use cases in Git, deploy via CI/CD.

Module 3 — False Positive Discipline

Always document FP scenarios upfront. Without it, alerts get muted and detection coverage rots.

SPL Queries

Scheduled task persistence
index=sysmon EventCode=1 Image="*\\schtasks.exe"
  CommandLine="*/create*"
  CommandLine!="*\\Windows\\System32\\*"
| stats count by Computer, User, CommandLine
// T1053.005 — non-system schtasks creation = persistence.

Lab 22 — Author a Use Case

  1. Pick a threat: 'Adversary uses scheduled tasks for persistence (T1053.005)'.
  2. Fill the template: data sources, logic (use SPL above), FP list, response.
  3. Build the search; mark as shadow (notable disabled) for a week.
  4. Document tuning plan.
Launch Lab Workbench

Key Takeaways

  • Use cases are the unit of SOC delivery
  • Document FPs upfront or detection coverage rots
  • Shadow mode before production — always