Skip to content

Commit 7939d2f

Browse files
committed
headless_bee
1 parent f05c627 commit 7939d2f

File tree

50 files changed

+258
-251
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+258
-251
lines changed

detections/endpoint/any_powershell_downloadfile.yml

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Any Powershell DownloadFile
22
id: 1a93b7ea-7af7-11eb-adb5-acde48001122
3-
version: 11
4-
date: '2025-02-10'
3+
version: '12'
4+
date: '2025-02-24'
55
author: Michael Haag, Splunk
66
status: production
77
type: TTP
@@ -71,18 +71,19 @@ rba:
7171
type: process_name
7272
tags:
7373
analytic_story:
74-
- Data Destruction
7574
- Ingress Tool Transfer
75+
- China-Nexus Threat Activity
76+
- Crypto Stealer
77+
- Hermetic Wiper
7678
- DarkCrystal RAT
77-
- PXA Stealer
78-
- Braodo Stealer
79-
- Phemedrone Stealer
80-
- Log4Shell CVE-2021-44228
8179
- Malicious PowerShell
82-
- Hermetic Wiper
83-
- Crypto Stealer
84-
- Nexus APT Threat Activity
8580
- Earth Estries
81+
- Phemedrone Stealer
82+
- Braodo Stealer
83+
- PXA Stealer
84+
- Nexus APT Threat Activity
85+
- Data Destruction
86+
- Log4Shell CVE-2021-44228
8687
asset_type: Endpoint
8788
cve:
8889
- CVE-2021-44228
@@ -97,7 +98,6 @@ tags:
9798
tests:
9899
- name: True Positive Test
99100
attack_data:
100-
- data:
101-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.001/atomic_red_team/windows-sysmon.log
101+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.001/atomic_red_team/windows-sysmon.log
102102
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
103103
sourcetype: XmlWinEventLog

detections/endpoint/detect_rare_executables.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ tags:
6060
analytic_story:
6161
- SnappyBee
6262
- Rhysida Ransomware
63-
- Nexus APT Threat Activity
63+
- China-Nexus Threat Activity
6464
- Crypto Stealer
6565
- Earth Estries
6666
- Unusual Processes

detections/endpoint/detect_renamed_psexec.yml

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Detect Renamed PSExec
22
id: 683e6196-b8e8-11eb-9a79-acde48001122
3-
version: 11
4-
date: '2025-02-10'
3+
version: '12'
4+
date: '2025-02-24'
55
author: Michael Haag, Splunk, Alex Oberkircher, Github Community
66
status: production
77
type: Hunting
@@ -39,18 +39,19 @@ references:
3939
- https://redcanary.com/blog/threat-hunting-psexec-lateral-movement/
4040
tags:
4141
analytic_story:
42+
- China-Nexus Threat Activity
4243
- BlackByte Ransomware
44+
- HAFNIUM Group
4345
- DHS Report TA18-074A
44-
- DarkSide Ransomware
45-
- SamSam Ransomware
4646
- CISA AA22-320A
47-
- HAFNIUM Group
48-
- Sandworm Tools
47+
- DarkSide Ransomware
4948
- Active Directory Lateral Movement
50-
- Nexus APT Threat Activity
5149
- DarkGate Malware
52-
- Earth Estries
50+
- Sandworm Tools
5351
- Rhysida Ransomware
52+
- Nexus APT Threat Activity
53+
- Earth Estries
54+
- SamSam Ransomware
5455
asset_type: Endpoint
5556
mitre_attack_id:
5657
- T1569.002
@@ -62,7 +63,6 @@ tags:
6263
tests:
6364
- name: True Positive Test
6465
attack_data:
65-
- data:
66-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1569.002/atomic_red_team/windows-sysmon.log
66+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1569.002/atomic_red_team/windows-sysmon.log
6767
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
6868
sourcetype: XmlWinEventLog

detections/endpoint/detect_renamed_winrar.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Detect Renamed WinRAR
22
id: 1b7bfb2c-b8e6-11eb-99ac-acde48001122
3-
version: 9
4-
date: '2025-02-10'
3+
version: '10'
4+
date: '2025-02-24'
55
author: Michael Haag, Splunk
66
status: production
77
type: Hunting
@@ -38,10 +38,11 @@ references:
3838
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560.001/T1560.001.md
3939
tags:
4040
analytic_story:
41+
- China-Nexus Threat Activity
42+
- CISA AA22-277A
4143
- Collection and Staging
42-
- Earth Estries
4344
- Nexus APT Threat Activity
44-
- CISA AA22-277A
45+
- Earth Estries
4546
asset_type: Endpoint
4647
mitre_attack_id:
4748
- T1560.001
@@ -53,7 +54,6 @@ tags:
5354
tests:
5455
- name: True Positive Test
5556
attack_data:
56-
- data:
57-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1560.001/archive_utility/windows-sysmon.log
57+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1560.001/archive_utility/windows-sysmon.log
5858
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
5959
sourcetype: XmlWinEventLog

detections/endpoint/executables_or_script_creation_in_suspicious_path.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ tags:
9595
- Amadey
9696
- DarkCrystal RAT
9797
- Remcos
98-
- Nexus APT Threat Activity
98+
- China-Nexus Threat Activity
9999
- Earth Estries
100100
- Rhysida Ransomware
101101
- RedLine Stealer

detections/endpoint/executables_or_script_creation_in_temp_path.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ tags:
9494
- Amadey
9595
- DarkCrystal RAT
9696
- Remcos
97-
- Nexus APT Threat Activity
97+
- China-Nexus Threat Activity
9898
- Earth Estries
9999
- Rhysida Ransomware
100100
- RedLine Stealer

detections/endpoint/linux_auditd_file_permission_modification_via_chmod.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
name: Linux Auditd File Permission Modification Via Chmod
22
id: 5f1d2ea7-eec0-4790-8b24-6875312ad492
3-
version: 7
4-
date: '2025-02-10'
5-
author: Teoderick Contreras, Splunk, Ivar Nygård
3+
version: '8'
4+
date: '2025-02-24'
5+
author: "Teoderick Contreras, Splunk, Ivar Nyg\xE5rd"
66
status: production
77
type: Anomaly
88
description: The following analytic detects suspicious file permission modifications
@@ -58,11 +58,12 @@ rba:
5858
threat_objects: []
5959
tags:
6060
analytic_story:
61-
- Linux Privilege Escalation
62-
- Linux Living Off The Land
63-
- Compromised Linux Host
61+
- China-Nexus Threat Activity
6462
- Linux Persistence Techniques
6563
- XorDDos
64+
- Linux Privilege Escalation
65+
- Compromised Linux Host
66+
- Linux Living Off The Land
6667
- Nexus APT Threat Activity
6768
- Earth Estries
6869
asset_type: Endpoint
@@ -76,7 +77,6 @@ tags:
7677
tests:
7778
- name: True Positive Test
7879
attack_data:
79-
- data:
80-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1222.002/linux_auditd_chmod_exec_attrib/linux_auditd_chmod_exec_attrib.log
80+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1222.002/linux_auditd_chmod_exec_attrib/linux_auditd_chmod_exec_attrib.log
8181
source: /var/log/audit/audit.log
8282
sourcetype: linux:audit

detections/endpoint/linux_auditd_nopasswd_entry_in_sudoers_file.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux Auditd Nopasswd Entry In Sudoers File
22
id: 651df959-ad17-4b73-a323-90cb96d5fa1b
3-
version: 5
4-
date: '2025-02-10'
3+
version: '6'
4+
date: '2025-02-24'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -57,9 +57,10 @@ rba:
5757
threat_objects: []
5858
tags:
5959
analytic_story:
60+
- China-Nexus Threat Activity
61+
- Linux Persistence Techniques
6062
- Linux Privilege Escalation
6163
- Compromised Linux Host
62-
- Linux Persistence Techniques
6364
- Nexus APT Threat Activity
6465
- Earth Estries
6566
asset_type: Endpoint
@@ -73,7 +74,6 @@ tags:
7374
tests:
7475
- name: True Positive Test
7576
attack_data:
76-
- data:
77-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/linux_auditd_nopasswd/linux_auditd_nopasswd.log
77+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/linux_auditd_nopasswd/linux_auditd_nopasswd.log
7878
source: /var/log/audit/audit.log
7979
sourcetype: linux:audit

detections/endpoint/linux_auditd_possible_access_to_credential_files.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux Auditd Possible Access To Credential Files
22
id: 0419cb7a-57ea-467b-974f-77c303dfe2a3
3-
version: 5
4-
date: '2025-02-10'
3+
version: '6'
4+
date: '2025-02-24'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -59,9 +59,10 @@ rba:
5959
threat_objects: []
6060
tags:
6161
analytic_story:
62+
- China-Nexus Threat Activity
63+
- Linux Persistence Techniques
6264
- Linux Privilege Escalation
6365
- Compromised Linux Host
64-
- Linux Persistence Techniques
6566
- Nexus APT Threat Activity
6667
- Earth Estries
6768
asset_type: Endpoint
@@ -75,7 +76,6 @@ tags:
7576
tests:
7677
- name: True Positive Test
7778
attack_data:
78-
- data:
79-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.008/linux_auditd_access_credential/linux_auditd_access_credential.log
79+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.008/linux_auditd_access_credential/linux_auditd_access_credential.log
8080
source: /var/log/audit/audit.log
8181
sourcetype: linux:audit

detections/endpoint/linux_auditd_possible_access_to_sudoers_file.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux Auditd Possible Access To Sudoers File
22
id: 8be88f46-f7e8-4ae6-b15e-cf1b13392834
3-
version: 5
4-
date: '2025-02-10'
3+
version: '6'
4+
date: '2025-02-24'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -56,9 +56,10 @@ rba:
5656
threat_objects: []
5757
tags:
5858
analytic_story:
59+
- China-Nexus Threat Activity
60+
- Linux Persistence Techniques
5961
- Linux Privilege Escalation
6062
- Compromised Linux Host
61-
- Linux Persistence Techniques
6263
- Nexus APT Threat Activity
6364
- Earth Estries
6465
asset_type: Endpoint
@@ -72,7 +73,6 @@ tags:
7273
tests:
7374
- name: True Positive Test
7475
attack_data:
75-
- data:
76-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/linux_auditd_sudoers_access/linux_auditd_sudoers_access.log
76+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/linux_auditd_sudoers_access/linux_auditd_sudoers_access.log
7777
source: /var/log/audit/audit.log
7878
sourcetype: linux:audit

0 commit comments

Comments
 (0)