Skip to content

Commit 2bcff65

Browse files
patel-bhavinresearch bot
andauthored
Bump contentctl.yml to 5.20.0 (#3829)
* chore: bump contentctl.yml to 5.20.0 * move removed detections --------- Co-authored-by: research bot <[email protected]>
1 parent 78d7f8c commit 2bcff65

8 files changed

+8
-8
lines changed

contentctl.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.19.0
6+
version: 5.20.0
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU

detections/deprecated/curl_download_and_bash_execution.yml renamed to removed/detections/curl_download_and_bash_execution.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 900bc324-59f3-11ec-9fb4-acde48001122
33
version: 10
44
date: '2025-10-16'
55
author: Michael Haag, Splunk, DipsyTipsy
6-
status: deprecated
6+
status: removed
77
type: TTP
88
description: The following analytic detects the use of curl on Linux or MacOS systems
99
to download a file from a remote source and pipe it directly to bash for execution.

detections/deprecated/linux_java_spawning_shell.yml renamed to removed/detections/linux_java_spawning_shell.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 7b09db8a-5c20-11ec-9945-acde48001122
33
version: 10
44
date: '2025-10-25'
55
author: Michael Haag, Splunk
6-
status: deprecated
6+
status: removed
77
type: TTP
88
description: The following analytic detects instances where Java, or Tomcat
99
processes spawn a Linux shell, which may indicate exploitation attempts, such as

detections/deprecated/w3wp_spawning_shell.yml renamed to removed/detections/w3wp_spawning_shell.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 0f03423c-7c6a-11eb-bc47-acde48001122
33
version: 11
44
date: '2025-10-16'
55
author: Michael Haag, Splunk
6-
status: deprecated
6+
status: removed
77
type: TTP
88
description: The following analytic identifies instances where a shell (PowerShell.exe
99
or Cmd.exe) is spawned from W3WP.exe, the IIS worker process. This detection leverages

detections/deprecated/wget_download_and_bash_execution.yml renamed to removed/detections/wget_download_and_bash_execution.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 35682718-5a85-11ec-b8f7-acde48001122
33
version: 10
44
date: '2025-10-16'
55
author: Michael Haag, Splunk, DipsyTipsy
6-
status: deprecated
6+
status: removed
77
type: TTP
88
description: The following analytic detects the use of wget on Windows, Linux or MacOS
99
to download a file from a remote source and pipe it to bash. This detection leverages

detections/deprecated/windows_default_rdp_file_creation.yml renamed to removed/detections/windows_default_rdp_file_creation.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 00ab0805-4b0f-489f-8eda-ee3de5ed5b1c
33
version: 2
44
date: '2025-10-27'
55
author: Teoderick Contreras, Splunk
6-
status: deprecated
6+
status: removed
77
type: Anomaly
88
description: This detection monitors the creation or modification of the Default.rdp file, typically found in the user's Documents folder. This file is automatically generated or updated by the Remote Desktop Connection client (mstsc.exe) when a user initiates an RDP session. It stores connection settings such as the last-used hostname, screen size, and other preferences. The presence or update of this file strongly suggests that an RDP session has been launched from the system. Since this file is commonly overlooked, it can serve as a valuable artifact in identifying remote access activity, including potential lateral movement or attacker-controlled sessions.
99
data_source:

detections/deprecated/windows_java_spawning_shells.yml renamed to removed/detections/windows_java_spawning_shells.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 28c81306-5c47-11ec-bfea-acde48001122
33
version: 12
44
date: '2025-10-25'
55
author: Michael Haag, Splunk
6-
status: deprecated
6+
status: removed
77
type: TTP
88
description: The following analytic identifies instances where java.exe or w3wp.exe
99
spawns a Windows shell, such as cmd.exe or powershell.exe. This detection leverages

detections/deprecated/wmiprsve_lolbas_execution_process_spawn.yml renamed to removed/detections/wmiprsve_lolbas_execution_process_spawn.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: 95a455f0-4c04-11ec-b8ac-3e22fbd008af
33
version: 7
44
date: '2025-10-21'
55
author: Mauricio Velazco, Splunk
6-
status: deprecated
6+
status: removed
77
type: TTP
88
description: The following analytic detects `wmiprvse.exe` spawning a LOLBAS execution
99
process. It leverages data from Endpoint Detection and Response (EDR) agents, focusing

0 commit comments

Comments
 (0)