Skip to content

Commit 1a23528

Browse files
committed
updating risk and drilldowns
1 parent fda0fc2 commit 1a23528

5 files changed

+38
-28
lines changed

detections/network/cisco_secure_firewall___high_priority_intrusion_classification.yml

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -51,12 +51,12 @@ known_false_positives: Some intrusion events that are linked to these classifica
5151
references:
5252
- https://www.cisco.com/c/en/us/td/docs/security/firepower/741/api/FQE/secure_firewall_estreamer_fqe_guide_740.pdf
5353
drilldown_searches:
54-
- name: View the detection results for - "$src_ip$" and "$signature_id$"
55-
search: '%original_detection_search% | search src_ip = "$src_ip$" and signature_id = "$signature_id$"'
54+
- name: View the detection results for - "$dest_ip$" and "$src_ip$"
55+
search: '%original_detection_search% | search dest_ip = "$dest_ip$" and src_ip = "$src_ip$"'
5656
earliest_offset: $info_min_time$
5757
latest_offset: $info_max_time$
58-
- name: View risk events for the last 7 days for - "$src_ip$" and "$signature_id$"
59-
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$src_ip$", "$signature_id$") starthoursago=168 | stats count min(_time)
58+
- name: View risk events for the last 7 days for - "$dest_ip$"
59+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest_ip$") starthoursago=168 | stats count min(_time)
6060
as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message)
6161
as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all)
6262
as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics"
@@ -66,12 +66,14 @@ drilldown_searches:
6666
rba:
6767
message: A high priority intrusion event with classification ($class_desc$) was detected from $src_ip$ to $dest_ip$, indicating potential suspicious activity.
6868
risk_objects:
69-
- field: src_ip
69+
- field: dest_ip
7070
type: system
7171
score: 25
7272
threat_objects:
7373
- field: signature
7474
type: signature
75+
- field: src_ip
76+
type: ip_address
7577
tags:
7678
analytic_story:
7779
- Cisco Secure Firewall Threat Defense Analytics

detections/network/cisco_secure_firewall___lumma_stealer_activity.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -47,27 +47,29 @@ known_false_positives: False positives should be very unlikely.
4747
references:
4848
- https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
4949
drilldown_searches:
50-
- name: View the detection results for - "$src_ip$" and "$signature_id$"
51-
search: '%original_detection_search% | search src_ip = "$src_ip$" and signature_id = "$signature_id$"'
50+
- name: View the detection results for - "$dest_ip$" and "$src_ip$"
51+
search: '%original_detection_search% | search dest_ip = "$dest_ip$" and src_ip = "$src_ip$"'
5252
earliest_offset: $info_min_time$
5353
latest_offset: $info_max_time$
54-
- name: View risk events for the last 7 days for - "$src_ip$" and "$signature_id$"
55-
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$src_ip$", "$signature_id$") starthoursago=168 | stats count min(_time)
54+
- name: View risk events for the last 7 days for - "$dest_ip$"
55+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest_ip$") starthoursago=168 | stats count min(_time)
5656
as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message)
5757
as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all)
5858
as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics"
5959
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
6060
earliest_offset: $info_min_time$
6161
latest_offset: $info_max_time$
6262
rba:
63-
message: Lumma Stealer Activity on host $src_ip$.
63+
message: Lumma Stealer Activity on host $dest_ip$ origniating from $src_ip$
6464
risk_objects:
65-
- field: src_ip
65+
- field: dest_ip
6666
type: system
6767
score: 25
6868
threat_objects:
6969
- field: signature
7070
type: signature
71+
- field: src_ip
72+
type: ip_address
7173
tags:
7274
analytic_story:
7375
- Cisco Secure Firewall Threat Defense Analytics

detections/network/cisco_secure_firewall___lumma_stealer_download_attempt.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -31,27 +31,29 @@ known_false_positives: False positives should be unlikely.
3131
references:
3232
- https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
3333
drilldown_searches:
34-
- name: View the detection results for - "$src_ip$" and "$signature_id$"
35-
search: '%original_detection_search% | search src_ip = "$src_ip$" and signature_id = "$signature_id$"'
34+
- name: View the detection results for - "$dest_ip$" and "$src_ip$"
35+
search: '%original_detection_search% | search dest_ip = "$dest_ip$" and src_ip = "$src_ip$"'
3636
earliest_offset: $info_min_time$
3737
latest_offset: $info_max_time$
38-
- name: View risk events for the last 7 days for - "$src_ip$" and "$signature_id$"
39-
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$src_ip$", "$signature_id$") starthoursago=168 | stats count min(_time)
38+
- name: View risk events for the last 7 days for - "$dest_ip$"
39+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest_ip$") starthoursago=168 | stats count min(_time)
4040
as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message)
4141
as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all)
4242
as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics"
4343
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
4444
earliest_offset: $info_min_time$
4545
latest_offset: $info_max_time$
4646
rba:
47-
message: Lumma Stealer Download Attempt initiated by $src_ip$ from $dest_ip$.
47+
message: Lumma Stealer Download Attempt detected on host $dest_ip$ origniating from $src_ip$
4848
risk_objects:
49-
- field: src_ip
49+
- field: dest_ip
5050
type: system
5151
score: 25
5252
threat_objects:
5353
- field: signature
5454
type: signature
55+
- field: src_ip
56+
type: ip_address
5557
tags:
5658
analytic_story:
5759
- Cisco Secure Firewall Threat Defense Analytics

detections/network/cisco_secure_firewall___lumma_stealer_outbound_connection_attempt.yml

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -31,27 +31,29 @@ known_false_positives: False positives should be unlikely.
3131
references:
3232
- https://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
3333
drilldown_searches:
34-
- name: View the detection results for - "$src_ip$" and "$signature_id$"
35-
search: '%original_detection_search% | search src_ip = "$src_ip$" and signature_id = "$signature_id$"'
34+
- name: View the detection results for - "$dest_ip$" and "$src_ip$"
35+
search: '%original_detection_search% | search dest_ip = "$dest_ip$" and src_ip = "$src_ip$"'
3636
earliest_offset: $info_min_time$
3737
latest_offset: $info_max_time$
38-
- name: View risk events for the last 7 days for - "$src_ip$" and "$signature_id$"
39-
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$src_ip$", "$signature_id$") starthoursago=168 | stats count min(_time)
38+
- name: View risk events for the last 7 days for - "$dest_ip$"
39+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest_ip$") starthoursago=168 | stats count min(_time)
4040
as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message)
4141
as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all)
4242
as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics"
4343
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
4444
earliest_offset: $info_min_time$
4545
latest_offset: $info_max_time$
4646
rba:
47-
message: Lumma Stealer Outbound Connection Attempt initiated by $src_ip$ to $dest_ip$.
47+
message: Lumma Stealer Outbound Connection Attempt detected on host $dest_ip$ origniating from $src_ip$
4848
risk_objects:
49-
- field: src_ip
49+
- field: dest_ip
5050
type: system
5151
score: 25
5252
threat_objects:
5353
- field: signature
5454
type: signature
55+
- field: src_ip
56+
type: ip_address
5557
tags:
5658
analytic_story:
5759
- Cisco Secure Firewall Threat Defense Analytics

detections/network/cisco_secure_firewall___veeam_cve_2023_27532_exploitation_activity.yml

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -49,12 +49,12 @@ references:
4949
- https://nvd.nist.gov/vuln/detail/CVE-2023-27532
5050
- https://www.veeam.com/kb4424
5151
drilldown_searches:
52-
- name: View the detection results for - "$src_ip$" and "$signature_id$"
53-
search: '%original_detection_search% | search src_ip = "$src_ip$" and signature_id = "$signature_id$"'
52+
- name: View the detection results for - "$dest_ip$" and "$src_ip$"
53+
search: '%original_detection_search% | search dest_ip = "$dest_ip$" and src_ip = "$src_ip$"'
5454
earliest_offset: $info_min_time$
5555
latest_offset: $info_max_time$
56-
- name: View risk events for the last 7 days for - "$src_ip$" and "$signature_id$"
57-
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$src_ip$", "$signature_id$") starthoursago=168 | stats count min(_time)
56+
- name: View risk events for the last 7 days for - "$dest_ip$"
57+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest_ip$") starthoursago=168 | stats count min(_time)
5858
as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message)
5959
as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all)
6060
as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics"
@@ -64,12 +64,14 @@ drilldown_searches:
6464
rba:
6565
message: Exploitation attempt of Veeam CVE-2023-27532 on host $dest_ip$ by $src_ip$.
6666
risk_objects:
67-
- field: src_ip
67+
- field: dest_ip
6868
type: system
6969
score: 25
7070
threat_objects:
7171
- field: signature
7272
type: signature
73+
- field: src_ip
74+
type: ip_address
7375
tags:
7476
analytic_story:
7577
- Cisco Secure Firewall Threat Defense Analytics

0 commit comments

Comments
 (0)