title: SWIFT Workstation Malware
id: 3b9f6b6c-1d1b-4f6a-98c3-7a9c2b3b2f21
status: experimental
description: >
Detects malware alerts on SWIFT workstations/endpoints.
Mirrors SPL logic:
- filter on dest_category containing "SWIFT Endpoint"
- extract file_path from _raw after "Occurrences:"
- surface orig_time, dest, file_path, user, signature
author: User / Org
date: 2025/10/15
level: critical
tags:
- attack.initial_access
- hm.swift
- hm.malware
references: []
logsource:
category: endpoint
product: windows
detection:
selection_dest_category:
dest_category|contains: 'SWIFT Endpoint'
_raw|contains:
- 'Occurrences:'
- 'Alert:SES Alert- Intrusion Activity'
extract_file_path:
_raw|re: 'Occurrences\:[^,]+,(?<file_path>[^,]+)'
condition: selection_dest_category and selection_malware_text
fields:
- _time
- dest
- user
- signature
- file_path
- dest_category
- _raw
falsepositives:
- Benign SES alerts or test signatures on SWIFT endpoints
- Repeated detections from known good processes without malicious behavior