Skip to content

Commit 8e63105

Browse files
authored
Merge pull request #3695 from splunk/asa_public
move ASA to public - post release
2 parents 264b758 + 4d7faff commit 8e63105

File tree

5 files changed

+281
-3
lines changed

5 files changed

+281
-3
lines changed

data_sources/cisco_asa_logs.yml

Lines changed: 131 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,131 @@
1+
name: Cisco ASA Logs
2+
id: 3f2a9b6d-1c8e-4f7b-a2d3-8b7f1c2a9d4e
3+
version: 1
4+
date: '2025-09-23'
5+
author: Bhavin Patel, Splunk
6+
description: >
7+
Data source object for Cisco ASA system logs. Cisco ASA logs provide firewall
8+
operational and security telemetry (connection events, ACL denies, VPN events,
9+
NAT translations, and device health). Deploy the Splunk Add-on for Cisco ASA
10+
(TA-cisco_asa) on indexers/heavy forwarders and the Cisco ASA App on search
11+
heads for best parsing, CIM mapping, and dashboards. This data is ingested via SYSLOG. You must be ingesting Cisco ASA syslog data into your Splunk environment. To ensure all detections work, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. A few analytics are designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs. You can find specific instructions on how to set this up here : https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#toc-hId--1451069880.
12+
source: cisco:asa
13+
sourcetype: cisco:asa
14+
separator: null
15+
supported_TA:
16+
- name: Cisco Security Cloud
17+
url: https://splunkbase.splunk.com/app/7404
18+
version: 3.4.1
19+
fields:
20+
- Cisco_ASA_action
21+
- Cisco_ASA_message_id
22+
- Cisco_ASA_user
23+
- Cisco_ASA_vendor_action
24+
- IP
25+
- Username
26+
- _bkt
27+
- _cd
28+
- _eventtype_color
29+
- _indextime
30+
- _raw
31+
- _serial
32+
- _si
33+
- _sourcetype
34+
- _time
35+
- acl
36+
- action
37+
- app
38+
- assigned_ip
39+
- bytes
40+
- category
41+
- command
42+
- communication_protocol
43+
- connections_in_use
44+
- date_hour
45+
- date_mday
46+
- date_minute
47+
- date_month
48+
- date_second
49+
- date_wday
50+
- date_year
51+
- date_zone
52+
- dest
53+
- dest_host
54+
- dest_interface
55+
- dest_ip
56+
- dest_nt_domain
57+
- dest_port
58+
- dest_public_port
59+
- dest_translated_host
60+
- dest_translated_ip
61+
- dest_translated_port
62+
- dest_user
63+
- dest_zone
64+
- direction
65+
- duration
66+
- duration_day
67+
- duration_hour
68+
- duration_minute
69+
- duration_second
70+
- dvc
71+
- eventtype
72+
- group
73+
- host
74+
- ids_type
75+
- index
76+
- laction
77+
- linecount
78+
- most_used_connections
79+
- object
80+
- object_attrs
81+
- object_category
82+
- object_id
83+
- product
84+
- protocol
85+
- protocol_version
86+
- punct
87+
- reason
88+
- result
89+
- rule
90+
- rule_name
91+
- session_id
92+
- severity
93+
- signature
94+
- signature_id
95+
- source
96+
- sourcetype
97+
- splunk_server
98+
- splunk_server_group
99+
- src
100+
- src_host
101+
- src_interface
102+
- src_ip
103+
- src_nt_domain
104+
- src_port
105+
- src_public_port
106+
- src_translated_host
107+
- src_translated_ip
108+
- src_translated_port
109+
- src_user
110+
- src_zone
111+
- ssl_is_valid
112+
- status
113+
- tag
114+
- tag::action
115+
- tag::app
116+
- tag::eventtype
117+
- tag::object_category
118+
- teardown_initiator
119+
- timeendpos
120+
- timestartpos
121+
- transport
122+
- type
123+
- user
124+
- vendor
125+
- vendor_action
126+
- vendor_product
127+
- vendor_severity
128+
- zone
129+
example_log: >
130+
Sep 23 19:27:50 18.144.133.67 :2025-09-23T19:27:49Z: %ASA-session-7-609002: Teardown local-host management:54.245.234.201 duration 0:02:01
131+
Sep 23 18:07:00 18.144.133.67 :2025-09-23T18:07:00Z: %ASA-session-7-710005: TCP request discarded from 198.27.166.158/55508 to management:172.31.12.229/443
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
name: Cisco ASA - Core Syslog Message Volume Drop
2+
id: 4b4f8fdd-1f9e-45d8-9b0f-1f64c0b297a4
3+
version: 2
4+
date: '2025-09-25'
5+
author: Bhavin Patel, Micheal Haag, Splunk
6+
status: production
7+
type: Hunting
8+
description: |
9+
Adversaries may intentionally suppress or reduce the volume of core Cisco ASA syslog messages to evade detection or cover their tracks. This hunting search is recommended to proactively identify suspicious downward shifts or absences in key syslog message IDs, which may indicate tampering or malicious activity. Visualizing this data in Splunk dashboards enables security teams to quickly spot anomalies and investigate potential compromise.
10+
data_source:
11+
- Cisco ASA Logs
12+
search: |
13+
`cisco_asa`
14+
| rex "%ASA-[^-]+-\d+-(?<message_id>\d+):"
15+
| search message_id IN (302013,302014,609002,710005)
16+
| eval msg_desc=case(
17+
message_id="302013","Built inbound TCP connection",
18+
message_id="302014","Teardown TCP connection",
19+
message_id="609002","Teardown local-host management",
20+
message_id="710005","TCP request discarded"
21+
)
22+
| bin _time span=15m
23+
| stats count values(msg_desc) as message_description values(host) as host by _time message_id
24+
| xyseries _time message_id count
25+
| `cisco_asa___core_syslog_message_volume_drop_filter`
26+
how_to_implement: |
27+
This search requires Cisco ASA syslog data to be ingested into Splunk via the Cisco Security Cloud TA. To ensure this detection works effectively, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. This analytic is designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs. You can find specific instructions on how to set this up here : https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#toc-hId--1451069880. The search produces a time-series suitable for dashboards to visualize drops across message IDs 302013, 302014, 609002, and 710005.
28+
known_false_positives: |
29+
Planned maintenance, network outages, routing changes, or benign configuration
30+
updates may reduce log volume temporarily. Validate against change management
31+
records and corroborate with device health metrics.
32+
references:
33+
- https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/
34+
- https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks
35+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB
36+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O
37+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW
38+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O
39+
- https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices
40+
- https://www.ncsc.gov.uk/news/persistent-malicious-targeting-cisco-devices
41+
tags:
42+
analytic_story:
43+
- ArcaneDoor
44+
asset_type: Network
45+
mitre_attack_id:
46+
- T1562
47+
product:
48+
- Splunk Enterprise
49+
- Splunk Enterprise Security
50+
- Splunk Cloud
51+
security_domain: network
52+
cve:
53+
- CVE-2025-20333
54+
- CVE-2025-20362
55+
tests:
56+
- name: True Positive Test
57+
attack_data:
58+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/cisco_asa/arcane_door/cisco_asa.log
59+
source: syslog
60+
sourcetype: cisco:asa
Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,79 @@
1+
name: Cisco ASA - Logging Disabled via CLI
2+
id: 7b4c9f3e-5a88-4b7b-9c4b-94d8e5d67201
3+
version: 2
4+
date: '2025-09-25'
5+
author: Bhavin Patel, Micheal Haag, Splunk
6+
status: production
7+
type: TTP
8+
description: |
9+
This analytic detects the disabling of logging functionality on a Cisco ASA device
10+
through CLI commands. Adversaries or malicious insiders may attempt to disable logging
11+
to evade detection and hide malicious activity. The detection looks for specific ASA
12+
syslog message IDs (111009, 111010, 111008) associated with command execution,
13+
combined with suspicious commands such as `no logging`, `logging disable`,
14+
`clear logging`, or `no logging host`. Disabling logging on a firewall or security device
15+
is a strong indicator of defense evasion.
16+
data_source:
17+
- Cisco ASA Logs
18+
search: |
19+
`cisco_asa`
20+
| rex "%ASA-[^-]+-\d+-(?<message_id>\d+):"
21+
| search message_id IN (111009,111010,111008)
22+
| rex field=_raw "executed (?:the command )?(?<asa_command>.+)$"
23+
| search asa_command IN ("*no logging*","*logging disable*","*clear logging*","*no logging host*","*no logging trap*")
24+
| stats earliest(_time) as firstTime latest(_time) as lastTime values(user) as user values(action) as action values(asa_command) as commands values(src_ip) as src_ip values(process_name) as process_name by host
25+
| `security_content_ctime(firstTime)`
26+
| `security_content_ctime(lastTime)`
27+
| `cisco_asa___logging_disabled_via_cli_filter`
28+
how_to_implement: |
29+
This search requires Cisco ASA syslog data to be ingested into Splunk via the Cisco Security Cloud TA. To ensure this detection works effectively, configure your ASA and FTD devices to generate and forward both debug and informational level syslog messages before they are sent to Splunk. This analytic is designed to be used with comprehensive logging enabled, as it relies on the presence of specific message IDs. You can find specific instructions on how to set this up here : https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#toc-hId--1451069880.
30+
known_false_positives: |
31+
Administrators may intentionally disable or modify logging during maintenance,
32+
troubleshooting, or device reconfiguration. These events should be verified
33+
against approved change management activities.
34+
references:
35+
- https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/
36+
- https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks
37+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB
38+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O
39+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW
40+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O
41+
- https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices
42+
- https://www.ncsc.gov.uk/news/persistent-malicious-targeting-cisco-devices
43+
drilldown_searches:
44+
- name: View the detection results for $host$
45+
search: '%original_detection_search% | search host = $host$'
46+
earliest_offset: $info_min_time$
47+
latest_offset: $info_max_time$
48+
- name: View risk events for the last 7 days for $host$
49+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ($host$) starthoursago=168 endhoursago=1 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
50+
earliest_offset: $info_min_time$
51+
latest_offset: $info_max_time$
52+
rba:
53+
message: User $user$ from executed commands to disable logging on the Cisco ASA host $host$.
54+
risk_objects:
55+
- field: host
56+
type: system
57+
score: 80
58+
threat_objects:
59+
- field: src_ip
60+
type: ip_address
61+
tags:
62+
analytic_story:
63+
- ArcaneDoor
64+
asset_type: Network
65+
mitre_attack_id:
66+
- T1562.002
67+
product:
68+
- Splunk Enterprise
69+
- Splunk Enterprise Security
70+
security_domain: network
71+
cve:
72+
- CVE-2025-20333
73+
- CVE-2025-20362
74+
tests:
75+
- name: True Positive Test
76+
attack_data:
77+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/cisco_asa/arcane_door/cisco_asa.log
78+
source: syslog
79+
sourcetype: cisco:asa

macros/cisco_asa.yml

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
definition: sourcetype=cisco:asa
2+
description: customer specific splunk configurations(eg- index, source, sourcetype).
3+
Replace the macro definition with configurations for your Splunk Environment.
4+
name: cisco_asa

stories/arcanedoor.yml

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: ArcaneDoor
22
id: 7f2b9eac-0df5-4d0c-9e35-2b8fd552c9f1
3-
version: 1
3+
version: 2
44
date: '2025-09-23'
55
author: Bhavin Patel, Micheal Haag, Splunk
66
status: production
@@ -14,8 +14,12 @@ narrative: |
1414
references:
1515
- https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/
1616
- https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks
17-
- https://ciscovulnmgmtprod.service-now.com/psirt?id=advisory_preview&sysparm_sys_id=bd8313cb47a7ea10f61dfa74116d43d8
18-
- https://ciscovulnmgmtprod.service-now.com/psirt?id=advisory_preview&sysparm_sys_id=cf28925747636e10f61dfa74116d43d9
17+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB
18+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O
19+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW
20+
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-code-exec-WmfP3h3O
21+
- https://www.cisa.gov/news-events/directives/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices
22+
- https://www.ncsc.gov.uk/news/persistent-malicious-targeting-cisco-devices
1923
tags:
2024
category:
2125
- Adversary Tactics

0 commit comments

Comments
 (0)