|
| 1 | +--- |
| 2 | +title: September 19, 2024 - Content Release |
| 3 | +hide_table_of_contents: true |
| 4 | +keywords: |
| 5 | + - log mappers |
| 6 | + - log parsers |
| 7 | + - detection rules |
| 8 | +image: https://help.sumologic.com/img/sumo-square.png |
| 9 | +--- |
| 10 | + |
| 11 | +import useBaseUrl from '@docusaurus/useBaseUrl'; |
| 12 | + |
| 13 | +<a href="https://help.sumologic.com/release-notes-cse/rss.xml"><img src={useBaseUrl('img/release-notes/rss-orange2.png')} alt="icon" width="50"/></a> |
| 14 | + |
| 15 | +This content release includes: |
| 16 | +* Updates to 111 rules to improve the user experience by removing often lengthy command lines from rule summary expressions (retained in record and signal). |
| 17 | +* Deletion of a low efficacy rule. |
| 18 | +* Mapping updates to better employ [normalized classification](/docs/cse/schema/cse-normalized-classification/) fields across data sources. |
| 19 | +* Adds alternate case handling for Windows Security Event Log error codes. |
| 20 | +* Updates to LastPass parsing and mapping to support Reporting and Failed Logon events. |
| 21 | +* Adds support for Thinkst Canary JSON logging. |
| 22 | +* Adjusts time handling for Thinkst Canary Syslog. |
| 23 | + |
| 24 | +Other changes are enumerated below. |
| 25 | + |
| 26 | + |
| 27 | +### Rules |
| 28 | +- [Deleted] LEGACY-S00180 DNS query for dynamic DNS provider |
| 29 | +- [Updated] MATCH-S00814 Abnormal Child Process - sdiagnhost.exe - CVE-2022-30190 |
| 30 | +- [Updated] MATCH-S00660 Anomalous AWS User Executed a Command on ECS Container |
| 31 | +- [Updated] MATCH-S00388 COMPlus_ETWEnabled Command Line Arguments |
| 32 | +- [Updated] MATCH-S00727 CPL File Executed from Temp Directory |
| 33 | +- [Updated] MATCH-S00412 Command Line Execution with Suspicious URL and AppData Strings |
| 34 | +- [Updated] MATCH-S00658 Container Management Utility in Container |
| 35 | +- [Updated] MATCH-S00410 Copy from Admin Share |
| 36 | +- [Updated] MATCH-S00443 Create Windows Share |
| 37 | +- [Updated] MATCH-S00525 Credential Dumping Via Copy Command From Shadow Copy |
| 38 | +- [Updated] MATCH-S00526 Credential Dumping Via Symlink To Shadow Copy |
| 39 | +- [Updated] MATCH-S00348 Curl Start Combination |
| 40 | +- [Updated] MATCH-S00385 DTRACK Process Creation |
| 41 | +- [Updated] MATCH-S00441 Delete Windows Share |
| 42 | +- [Updated] MATCH-S00543 Detect Psexec With Accepteula Flag |
| 43 | +- [Updated] MATCH-S00319 Dridex Process Pattern |
| 44 | +- [Updated] MATCH-S00590 Elise Backdoor |
| 45 | +- [Updated] MATCH-S00392 File or Folder Permissions Modifications |
| 46 | +- [Updated] FIRST-S00028 First Seen Common Windows Recon Commands From User |
| 47 | +- [Updated] FIRST-S00059 First Seen esentutl command From User |
| 48 | +- [Updated] FIRST-S00041 First Seen networksetup Usage from User |
| 49 | +- [Updated] FIRST-S00058 First Seen vssadmin command From User |
| 50 | +- [Updated] FIRST-S00060 First Seen wbadmin command From User |
| 51 | +- [Updated] FIRST-S00008 First Seen whoami command From User |
| 52 | +- [Updated] MATCH-S00414 Grabbing Sensitive Hives via Reg Utility |
| 53 | +- [Updated] MATCH-S00325 Greenbug Campaign Indicators |
| 54 | +- [Updated] MATCH-S00367 Impacket Lateralization Detection |
| 55 | +- [Updated] MATCH-S00482 Impacket-Obfuscation SMBEXEC Utility |
| 56 | +- [Updated] MATCH-S00483 Impacket-Obfuscation WMIEXEC Utility |
| 57 | +- [Updated] MATCH-S00322 Judgement Panda Credential Access Activity |
| 58 | +- [Updated] MATCH-S00334 Judgement Panda Exfil Activity |
| 59 | +- [Updated] MATCH-S00651 Kubernetes CreateCronjob |
| 60 | +- [Updated] MATCH-S00652 Kubernetes DeleteCronjob |
| 61 | +- [Updated] MATCH-S00650 Kubernetes ListCronjobs |
| 62 | +- [Updated] MATCH-S00648 Kubernetes ListSecrets |
| 63 | +- [Updated] MATCH-S00647 Kubernetes Pod Deletion |
| 64 | +- [Updated] MATCH-S00649 Kubernetes Service Account Token File Accessed |
| 65 | +- [Updated] MATCH-S00461 LNKSmasher Utility Commands |
| 66 | +- [Updated] MATCH-S00746 Loadable Kernel Module Dependency Install |
| 67 | +- [Updated] MATCH-S00745 Loadable Kernel Module Enumeration |
| 68 | +- [Updated] MATCH-S00723 Loadable Kernel Module Modifications |
| 69 | +- [Updated] MATCH-S00352 MSHTA Suspicious Execution |
| 70 | +- [Updated] MATCH-S00534 MacOS - Re-Opened Applications |
| 71 | +- [Updated] MATCH-S00729 MacOS Gatekeeper Bypass |
| 72 | +- [Updated] MATCH-S00731 MacOS System Integrity Protection Disabled |
| 73 | +- [Updated] MATCH-S00161 Malicious PowerShell Get Commands |
| 74 | +- [Updated] MATCH-S00190 Malicious PowerShell Invoke Commands |
| 75 | +- [Updated] MATCH-S00198 Malicious PowerShell Keywords |
| 76 | +- [Updated] MATCH-S00331 MavInject Process Injection |
| 77 | +- [Updated] MATCH-S00466 MsiExec Web Install |
| 78 | +- [Updated] MATCH-S00288 NotPetya Ransomware Activity |
| 79 | +- [Updated] MATCH-S00698 PATH Set to Current Directory |
| 80 | +- [Updated] MATCH-S00659 Package Management Utility in Container |
| 81 | +- [Updated] MATCH-S00697 Pkexec Privilege Escalation - CVE-2021-4034 |
| 82 | +- [Updated] MATCH-S00149 PowerShell File Download |
| 83 | +- [Updated] MATCH-S00449 Powershell Execution Policy Bypass |
| 84 | +- [Updated] MATCH-S00427 Process Dump via Rundll32 and Comsvcs.dll |
| 85 | +- [Updated] MATCH-S00439 Psr.exe Capture Screenshots |
| 86 | +- [Updated] MATCH-S00167 Recon Using Common Windows Commands |
| 87 | +- [Updated] MATCH-S00346 Ryuk Ransomware Endpoint Indicator |
| 88 | +- [Updated] MATCH-S00506 SC Exe Manipulating Windows Services |
| 89 | +- [Updated] MATCH-S00153 Scheduled Task Created via PowerShell |
| 90 | +- [Updated] MATCH-S00529 Schtasks Scheduling Job On Remote System |
| 91 | +- [Updated] MATCH-S00530 Schtasks Used For Forcing A Reboot |
| 92 | +- [Updated] MATCH-S00359 Suspicious Certutil Command |
| 93 | +- [Updated] MATCH-S00356 Suspicious Compression Tool Parameters |
| 94 | +- [Updated] MATCH-S00362 Suspicious Curl File Upload |
| 95 | +- [Updated] MATCH-S00476 Suspicious Execution of Search Indexer |
| 96 | +- [Updated] MATCH-S00464 Suspicious Non-Standard InstallUtil Execution |
| 97 | +- [Updated] MATCH-S00191 Suspicious PowerShell Keywords |
| 98 | +- [Updated] MATCH-S00431 Suspicious Use of Procdump |
| 99 | +- [Updated] MATCH-S00477 Suspicious Use of Workflow Compiler for Payload Execution |
| 100 | +- [Updated] MATCH-S00342 Suspicious use of Dev-Tools-Launcher |
| 101 | +- [Updated] MATCH-S00279 TAIDOOR RAT DLL Load |
| 102 | +- [Updated] MATCH-S00531 Unload Sysmon Filter Driver |
| 103 | +- [Updated] MATCH-S00762 Unusual Staging Directory - PolicyDefinitions |
| 104 | +- [Updated] MATCH-S00761 Volume Shadow Copy Service Stopped |
| 105 | +- [Updated] MATCH-S00147 WMI Managed Object Format (MOF) Process Execution |
| 106 | +- [Updated] MATCH-S00760 WMI Ping Sweep |
| 107 | +- [Updated] MATCH-S00146 WMI Process Call Create |
| 108 | +- [Updated] MATCH-S00151 WMI Process Get Brief |
| 109 | +- [Updated] MATCH-S00379 WMIExec VBS Script |
| 110 | +- [Updated] MATCH-S00400 Web Download via Office Binaries |
| 111 | +- [Updated] MATCH-S00539 Web Servers Executing Suspicious Processes |
| 112 | +- [Updated] MATCH-S00174 Web Services Executing Common Web Shell Commands |
| 113 | +- [Updated] MATCH-S00284 Windows - Delete Windows Backup Catalog |
| 114 | +- [Updated] MATCH-S00181 Windows - Domain Trust Discovery |
| 115 | +- [Updated] MATCH-S00168 Windows - Local System executing whoami.exe |
| 116 | +- [Updated] MATCH-S00162 Windows - Network trace capture using netsh.exe |
| 117 | +- [Updated] MATCH-S00159 Windows - Permissions Group Discovery |
| 118 | +- [Updated] MATCH-S00268 Windows - Possible Impersonation Token Creation Using Runas |
| 119 | +- [Updated] MATCH-S00276 Windows - Possible Squiblydoo Technique Observed |
| 120 | +- [Updated] MATCH-S00281 Windows - PowerShell Process Discovery |
| 121 | +- [Updated] MATCH-S00171 Windows - Powershell Scheduled Task Creation from PowerSploit or Empire |
| 122 | +- [Updated] MATCH-S00185 Windows - Remote System Discovery |
| 123 | +- [Updated] MATCH-S00272 Windows - Rogue Domain Controller - dcshadow |
| 124 | +- [Updated] MATCH-S00170 Windows - Scheduled Task Creation |
| 125 | +- [Updated] MATCH-S00192 Windows - System Network Configuration Discovery |
| 126 | +- [Updated] MATCH-S00194 Windows - System Time Discovery |
| 127 | +- [Updated] MATCH-S00172 Windows - WiFi Credential Harvesting with netsh |
| 128 | +- [Updated] MATCH-S00532 Windows Adfind Exe |
| 129 | +- [Updated] MATCH-S00552 Windows Connhost Started Forcefully |
| 130 | +- [Updated] MATCH-S00398 Windows Defender Download Activity |
| 131 | +- [Updated] MATCH-S00179 Windows Network Sniffing |
| 132 | +- [Updated] MATCH-S00157 Windows Process Name Impersonation |
| 133 | +- [Updated] MATCH-S00178 Windows Query Registry |
| 134 | +- [Updated] MATCH-S00533 Windows Security Account Manager Stopped |
| 135 | +- [Updated] LEGACY-S00171 Windows Service Executed from Nonstandard Execution Path |
| 136 | +- [Updated] MATCH-S00724 Windows Update Agent DLL Changed |
| 137 | +- [Updated] MATCH-S00382 Winnti Pipemon Characteristics |
| 138 | +- [Updated] MATCH-S00435 XSL Script Processing |
| 139 | +- [Updated] MATCH-S00726 macOS Kernel Extension Load |
| 140 | + |
| 141 | +### Log Mappers |
| 142 | +- [New] LastPass Failed Login Attempt |
| 143 | +- [New] LastPass Reporting |
| 144 | +- [Updated] Thinkst Canary Parser - Catch All |
| 145 | + - Removed time handling from mapper to favor parser time handling |
| 146 | +- [Updated] 1Password Item Audit Actions |
| 147 | +- [Updated] 1Password Item Usage Actions |
| 148 | +- [Updated] AWS Config - Custom Parser |
| 149 | +- [Updated] AWS EKS - Custom Parser |
| 150 | +- [Updated] AWS Inspector - Custom Parser |
| 151 | +- [Updated] AWS Route 53 Logs |
| 152 | +- [Updated] AWS S3 Server Access Log - Custom Parser |
| 153 | +- [Updated] AWS Security Hub |
| 154 | +- [Updated] AWSGuardDuty - Audit Events |
| 155 | +- [Updated] AWSGuardDuty - AwsServiceEvent-AWS API Call via CloudTrail |
| 156 | +- [Updated] AWSGuardDuty - Reconnaissance and malicious activity detection |
| 157 | +- [Updated] AWSGuardDuty - Tor Client and Relay |
| 158 | +- [Updated] AWSGuardDuty - UnauthorizedAccess_EC2_TorIPCaller |
| 159 | +- [Updated] AWSGuardDuty_Catch_All |
| 160 | +- [Updated] Adaxes - Custom Parser |
| 161 | +- [Updated] ApplicationGatewayAccessLog |
| 162 | +- [Updated] ApplicationGatewayFirewallLog |
| 163 | +- [Updated] Aqua Runtime Policy Match |
| 164 | +- [Updated] Azure Appplication Service Console Logs |
| 165 | +- [Updated] Azure AuditEvent logs |
| 166 | +- [Updated] Azure Event Hub - Windows Defender Logs |
| 167 | +- [Updated] Azure Firewall Application Rule |
| 168 | +- [Updated] Azure Firewall DNS Proxy |
| 169 | +- [Updated] Azure Firewall Network Rule |
| 170 | +- [Updated] Azure NSG Flows |
| 171 | +- [Updated] Azure Policy Logs |
| 172 | +- [Updated] AzureActivityLog |
| 173 | +- [Updated] AzureActivityLog 01 |
| 174 | +- [Updated] AzureActivityLog AuditLogs |
| 175 | +- [Updated] AzureDevOpsAuditing |
| 176 | +- [Updated] Cato Networks Audits |
| 177 | +- [Updated] CloudTrail - cloudtrail.amazonaws.com - CreateTrail |
| 178 | +- [Updated] Cyber Ark EPM AggregateEvent |
| 179 | +- [Updated] Druva Cyber Resilience - Catch All |
| 180 | +- [Updated] GCP App Engine Logs |
| 181 | +- [Updated] GCP Audit Logs |
| 182 | +- [Updated] GCP IDS |
| 183 | +- [Updated] GCP Parser - Load Balancer |
| 184 | +- [Updated] Google Security Command Center |
| 185 | +- [Updated] JumpCloud IdP - Catch All |
| 186 | +- [Updated] Kaltura Audits |
| 187 | +- [Updated] Microsoft Defender for Cloud - Security Alerts |
| 188 | +- [Updated] Microsoft Office 365 AzureActiveDirectory Events |
| 189 | +- [Updated] Microsoft Office 365 MicrosoftStream Events |
| 190 | +- [Updated] Microsoft Office 365 PowerApps Events |
| 191 | +- [Updated] Microsoft Office 365 Sway Events |
| 192 | +- [Updated] Microsoft Office 365 Teams Events |
| 193 | +- [Updated] Microsoft Office 365 Yammer Events |
| 194 | +- [Updated] MicrosoftGraphActivityLogs |
| 195 | +- [Updated] Office 365 - MicrosoftFlow |
| 196 | +- [Updated] Office 365 - Security Compliance Alerts |
| 197 | +- [Updated] Osquery Catchall |
| 198 | +- [Updated] Osquery FIM |
| 199 | +- [Updated] Osquery Process Auditing |
| 200 | +- [Updated] Osquery Socket Events |
| 201 | +- [Updated] Osquery Startup Items |
| 202 | +- [Updated] Palo Alto Config - Custom Parser |
| 203 | +- [Updated] Palo Alto Threat Spyware - Custom Parser |
| 204 | +- [Updated] RSA SecurID Runtime Authn Logout |
| 205 | +- [Updated] RSA SecurID Runtime Catchall |
| 206 | +- [Updated] UnauthorizedAccess_EC2_SSHBruteForce |
| 207 | +- [Updated] Windows - Security - 4625 |
| 208 | +- [Updated] Windows - Security - 4634 |
| 209 | + |
| 210 | +### Parsers |
| 211 | +- [New] /Parsers/System/Thinkst Canary/Thinkst Canary JSON |
| 212 | +- [Updated] /Parsers/System/LastPass/LastPass |
| 213 | +- [Updated] /Parsers/System/Thinkst Canary/Thinkst Canary |
| 214 | + - Updated time handling to use `_messagetime` metadata |
0 commit comments