You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Utilize this panel to correlate Snort intrusion events with known threat activity. Configure the Snort-ID-to-Threat lookup to enrich incoming signature data and populate the “Threat Activity by Snort IDs” view.
name: Cisco Secure Firewall - High Priority Intrusion Classification
2
+
id: ec99bb81-c31b-4837-8c7d-1b32aa70b337
3
+
version: 1
4
+
date: '2025-04-28'
5
+
author: Nasreddine Bencherchali, Splunk
6
+
status: production
7
+
type: TTP
8
+
description: |
9
+
This analytic identifies high-severity intrusion events based on the classification assigned to Snort rules within Cisco Secure Firewall logs.
10
+
It leverages Cisco Secure Firewall Threat Defense logs and focuses on events classified as:
11
+
12
+
- A Network Trojan was Detected
13
+
- Successful Administrator Privilege Gain
14
+
- Successful User Privilege Gain
15
+
- Attempt to Login By a Default Username and Password
16
+
- Known malware command and control traffic
17
+
- Known malicious file or file based exploit
18
+
- Known client side exploit attempt
19
+
- Large Scale Information Leak"
20
+
21
+
These classifications typically represent significant threats such as remote code execution, credential theft, lateral movement, or malware communication. Detection of these classifications should be prioritized for immediate investigation.
class_desc IN ("A Network Trojan was Detected", "Successful Administrator Privilege Gain", "Successful User Privilege Gain", "Attempt to Login By a Default Username and Password", "Known malware command and control traffic", "Known malicious file or file based exploit", "Known client side exploit attempt", "Large Scale Information Leak")
27
+
| fillnull
28
+
| stats count min(_time) as firstTime max(_time) as lastTime
This search requires Cisco Secure Firewall Threat Defense Logs, which
43
+
includes the IntrusionEvent EventType. This search uses an input macro named `cisco_secure_firewall`.
44
+
We strongly recommend that you specify your environment-specific configurations
45
+
(index, source, sourcetype, etc.) for Cisco Secure Firewall Threat Defense logs. Replace the macro definition
46
+
with configurations for your Splunk environment. The search also uses a post-filter
47
+
macro designed to filter out known false positives.
48
+
The logs are to be ingested using the Splunk Add-on for Cisco Security Cloud (https://splunkbase.splunk.com/app/7404).
49
+
The intrusion access policy must also be configured.
50
+
known_false_positives: Some intrusion events that are linked to these classifications might be noisy in certain environments. Apply a combination of filters for specific snort IDs and other indicators.
- name: View risk events for the last 7 days for - "$dest_ip$"
59
+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest_ip$") starthoursago=168 | stats count min(_time)
60
+
as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message)
61
+
as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all)
62
+
as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics"
63
+
by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
64
+
earliest_offset: $info_min_time$
65
+
latest_offset: $info_max_time$
66
+
rba:
67
+
message: A high priority intrusion event with classification ($class_desc$) was detected from $src_ip$ to $dest_ip$, indicating potential suspicious activity.
| stats count AS total_alerts, dc(signature_id) AS sig_count, values(SnortRuleGroups) AS snort_rule_groups, values(connection_id) AS connection_id, values(rule) AS rule, values(dest_port) AS dest_port, values(transport) AS transport, values(app) AS app, values(signature) AS signature, values(src_ip) AS src_ip BY _time dest_ip signature_id
| stats count AS Total_Alerts, dc(signature_id) AS sig_count, values(signature_id) AS signature_id, values(category) AS category, values(message) AS message, values(snort_rule_groups) AS snort_rule_groups, values(connection_id) AS connection_id, values(rule) AS rule, values(dest_port) AS dest_port, values(transport) AS transport, values(app) AS app, values(signature) AS signature, values(src_ip) AS src_ip BY _time dest_ip threat
This search requires Cisco Secure Firewall Threat Defense Logs, which
32
+
includes the IntrusionEvent EventType. This search uses an input macro named `cisco_secure_firewall`.
33
+
We strongly recommend that you specify your environment-specific configurations
34
+
(index, source, sourcetype, etc.) for Cisco Secure Firewall Threat Defense logs. Replace the macro definition
35
+
with configurations for your Splunk environment. The search also uses a post-filter
36
+
macro designed to filter out known false positives.
37
+
The logs are to be ingested using the Splunk Add-on for Cisco Security Cloud (https://splunkbase.splunk.com/app/7404).
38
+
The intrusion access policy must also be configured. This detection is based on the cisco_snort_ids_to_threat_mapping.csv mapping file - please update the lookup file with the latest Snort IDs to Threat Actors if you would like to modify the distinct count of Snort IDs needed to trigger the detection or if you would like to add new Snort IDs to Threat Actors.
39
+
known_false_positives: False positives may occur due to legitimate security testing or research activities.
This analytic detects Lumma Stealer activity using Cisco Secure Firewall Intrusion Events.
10
+
It leverages Cisco Secure Firewall Threat Defense IntrusionEvent logs to identify cases where four of the following Snort signature IDs 64793, 64794, 64797, 64798, 64799, 64800, 64801, 62709, 64167, 64168, 64169, 64796, 62710, 62711, 62712, 62713, 62714, 62715, 62716, 62717, 64812, 64810, 64811 occurs in the span of 15 minutes from the same host.
11
+
If confirmed malicious, this behavior is highly indicative of a successful infection of Lumma Stealer.
This analytic detects Lumma Stealer download attempts using Cisco Secure Firewall Intrusion Events.
10
+
It leverages Cisco Secure Firewall Threat Defense IntrusionEvent logs to identify cases where Snort signatures with IDs 64797, 64798, 64799, 64800, 64801, 64167, 64168, 64169 have been triggered. If confirmed malicious, this behavior could indicate an active infection of Lumma Stealer.
0 commit comments