Skip to content

Commit 9a6c0a7

Browse files
authored
Merge branch 'develop' into backwards
2 parents b0b5bf1 + df76069 commit 9a6c0a7

File tree

48 files changed

+1197
-776
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

48 files changed

+1197
-776
lines changed

contentctl.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.13.0
6+
version: 5.14.0
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU
@@ -44,9 +44,9 @@ apps:
4444
- uid: 7404
4545
title: Cisco Security Cloud
4646
appid: CiscoSecurityCloud
47-
version: 3.3.1
47+
version: 3.4.0
4848
description: description of app
49-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_331.tgz
49+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_340.tgz
5050
- uid: 6652
5151
title: Add-on for Linux Sysmon
5252
appid: Splunk_TA_linux_sysmon

data_sources/cisco_ai_defense_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,5 +10,5 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields: null

data_sources/cisco_duo_activity.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields:
1515
- access_device.browser
1616
- access_device.browser_version

data_sources/cisco_duo_administrator.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields:
1515
- action
1616
- actionlabel

data_sources/cisco_secure_firewall_threat_defense_connection_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields:
1515
- AC_RuleAction
1616
- action

data_sources/cisco_secure_firewall_threat_defense_file_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields:
1515
- app
1616
- Application

data_sources/cisco_secure_firewall_threat_defense_intrusion_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields:
1515
- Application
1616
- Classification

detections/cloud/aws_defense_evasion_impair_security_services.yml

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,11 @@
11
name: AWS Defense Evasion Impair Security Services
22
id: b28c4957-96a6-47e0-a965-6c767aac1458
3-
version: 8
4-
date: '2025-05-22'
5-
author: Bhavin Patel, Gowthamaraj Rajendran, Splunk
3+
version: 9
4+
date: '2025-08-26'
5+
author: Bhavin Patel, Gowthamaraj Rajendran, Splunk, PashFW, Github Community
66
status: production
77
type: TTP
8-
description: The following analytic detects attempts to delete critical AWS security
9-
service configurations, such as CloudWatch alarms, GuardDuty detectors, and Web
10-
Application Firewall rules. It leverages CloudTrail logs to identify specific API
8+
description: The following analytic detects attempts to impair or disable AWS security services by monitoring specific deletion operations across GuardDuty, AWS WAF (classic and v2), CloudWatch, Route 53, and CloudWatch Logs. These actions include deleting detectors, rule groups, IP sets, web ACLs, logging configurations, alarms, and log streams. Adversaries may perform such operations to evade detection or remove visibility from defenders. By explicitly pairing eventName values with their corresponding eventSource services, this detection reduces noise and ensures that only security-related deletions are flagged. It leverages CloudTrail logs to identify specific API
119
calls like "DeleteLogStream" and "DeleteDetector." This activity is significant
1210
because it indicates potential efforts to disable security monitoring and evade
1311
detection. If confirmed malicious, this could allow attackers to operate undetected,
@@ -22,14 +20,17 @@ data_source:
2220
- AWS CloudTrail DeleteRuleGroup
2321
- AWS CloudTrail DeleteLoggingConfiguration
2422
- AWS CloudTrail DeleteAlarms
25-
search: '`cloudtrail` eventName IN ("DeleteLogStream","DeleteDetector","DeleteIPSet","DeleteWebACL","DeleteRule","DeleteRuleGroup","DeleteLoggingConfiguration","DeleteAlarms")
23+
search: |
24+
`cloudtrail`
25+
(eventName="DeleteDetector" AND eventSource="guardduty.amazonaws.com") OR ( eventName IN ("DeleteIPSet", "DeleteWebACL", "DeleteRuleGroup", "DeleteRule") AND eventSource IN ("guardduty.amazonaws.com", "wafv2.amazonaws.com", "waf.amazonaws.com") ) OR ( eventName="DeleteLoggingConfiguration" AND eventSource IN ("wafv2.amazonaws.com", "waf.amazonaws.com", "route53.amazonaws.com") )
2626
| rename user_name as user
2727
| stats count min(_time) as firstTime max(_time) as lastTime by signature dest user user_agent src vendor_account vendor_region vendor_product
28-
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`| `aws_defense_evasion_impair_security_services_filter`'
28+
| `security_content_ctime(firstTime)`
29+
| `security_content_ctime(lastTime)`
30+
| `aws_defense_evasion_impair_security_services_filter`
2931
how_to_implement: You must install Splunk AWS Add on and enable CloudTrail logs in
3032
your AWS Environment.
31-
known_false_positives: While this search has no known false positives, it is possible
32-
that it is a legitimate admin activity. Please consider filtering out these noisy
33+
known_false_positives: Legitimate administrators may occasionally delete GuardDuty detectors, WAF rule groups, or CloudWatch alarms during environment reconfiguration, migration, or decommissioning activities. In such cases, these events are expected and benign. These should be validated against approved change tickets or deployment pipelines to differentiate malicious activity from normal operations. Please consider filtering out these noisy
3334
events using userAgent, user_arn field names.
3435
references:
3536
- https://docs.aws.amazon.com/cli/latest/reference/guardduty/index.html

detections/endpoint/cmd_carry_out_string_command_parameter.yml

Lines changed: 25 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,18 @@
11
name: CMD Carry Out String Command Parameter
22
id: 54a6ed00-3256-11ec-b031-acde48001122
3-
version: 14
4-
date: '2025-08-07'
3+
version: 15
4+
date: '2025-08-22'
55
author: Teoderick Contreras, Bhavin Patel, Splunk
66
status: production
77
type: Hunting
8-
description: The following analytic detects the use of `cmd.exe /c` to execute commands,
9-
a technique often employed by adversaries and malware to run batch commands or invoke
10-
other shells like PowerShell. This detection leverages data from Endpoint Detection
11-
and Response (EDR) agents, focusing on command-line executions and process metadata.
12-
Monitoring this activity is crucial as it can indicate script-based attacks or unauthorized
13-
command execution. If confirmed malicious, this behavior could lead to unauthorized
14-
code execution, privilege escalation, or persistence within the environment.
8+
description: The following analytic detects the use of `cmd.exe /c` to execute
9+
commands, a technique often employed by adversaries and malware to run batch
10+
commands or invoke other shells like PowerShell. This detection leverages data
11+
from Endpoint Detection and Response (EDR) agents, focusing on command-line
12+
executions and process metadata. Monitoring this activity is crucial as it can
13+
indicate script-based attacks or unauthorized command execution. If confirmed
14+
malicious, this behavior could lead to unauthorized code execution, privilege
15+
escalation, or persistence within the environment.
1516
data_source:
1617
- Sysmon EventID 1
1718
- Windows Event Log Security 4688
@@ -25,17 +26,18 @@ search: '| tstats `security_content_summariesonly` min(_time) as firstTime max(_
2526
Processes.process_id Processes.process_integrity_level Processes.process_name Processes.process_path
2627
Processes.user Processes.user_id Processes.vendor_product | `drop_dm_object_name(Processes)`
2728
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `cmd_carry_out_string_command_parameter_filter`'
28-
how_to_implement: The detection is based on data that originates from Endpoint Detection
29-
and Response (EDR) agents. These agents are designed to provide security-related
30-
telemetry from the endpoints where the agent is installed. To implement this search,
31-
you must ingest logs that contain the process GUID, process name, and parent process.
32-
Additionally, you must ingest complete command-line executions. These logs must
33-
be processed using the appropriate Splunk Technology Add-ons that are specific to
34-
the EDR product. The logs must also be mapped to the `Processes` node of the `Endpoint`
35-
data model. Use the Splunk Common Information Model (CIM) to normalize the field
36-
names and speed up the data modeling process.
37-
known_false_positives: False positives may be high based on legitimate scripted code
38-
in any environment. Filter as needed.
29+
how_to_implement: The detection is based on data that originates from Endpoint
30+
Detection and Response (EDR) agents. These agents are designed to provide
31+
security-related telemetry from the endpoints where the agent is installed. To
32+
implement this search, you must ingest logs that contain the process GUID,
33+
process name, and parent process. Additionally, you must ingest complete
34+
command-line executions. These logs must be processed using the appropriate
35+
Splunk Technology Add-ons that are specific to the EDR product. The logs must
36+
also be mapped to the `Processes` node of the `Endpoint` data model. Use the
37+
Splunk Common Information Model (CIM) to normalize the field names and speed
38+
up the data modeling process.
39+
known_false_positives: False positives may be high based on legitimate scripted
40+
code in any environment. Filter as needed.
3941
references:
4042
- https://thedfirreport.com/2021/10/18/icedid-to-xinglocker-ransomware-in-24-hours/
4143
- https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/
@@ -65,6 +67,7 @@ tags:
6567
- RedLine Stealer
6668
- Log4Shell CVE-2021-44228
6769
- Interlock Rat
70+
- 0bj3ctivity Stealer
6871
asset_type: Endpoint
6972
cve:
7073
- CVE-2021-44228
@@ -78,6 +81,7 @@ tags:
7881
tests:
7982
- name: True Positive Test
8083
attack_data:
81-
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/malware/icedid/cmd_carry_str_param/sysmon.log
84+
- data:
85+
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/malware/icedid/cmd_carry_str_param/sysmon.log
8286
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
8387
sourcetype: XmlWinEventLog

detections/endpoint/disabling_windows_local_security_authority_defences_via_registry.yml

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
name: Disabling Windows Local Security Authority Defences via Registry
22
id: 45cd08f8-a2c9-4f4e-baab-e1a0c624b0ab
3-
version: 7
4-
date: '2025-05-02'
5-
author: Dean Luxton
3+
version: 8
4+
date: '2025-08-20'
5+
author: Dean Luxton,Teoderick Contreras Splunk
66
status: production
77
type: TTP
88
data_source:
@@ -16,13 +16,15 @@ description: The following analytic identifies the deletion of registry keys tha
1616
If confirmed malicious, this action could allow attackers to bypass critical security
1717
mechanisms, leading to potential system compromise and persistent access.
1818
search: '| tstats `security_content_summariesonly` min(_time) as _time from datamodel=Endpoint.Registry
19-
where Registry.registry_path IN ("*\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\LsaCfgFlags",
20-
"*\\SOFTWARE\\Policies\\Microsoft\\Windows\\DeviceGuard\\*", "*\\SYSTEM\\CurrentControlSet\\Control\\Lsa\\RunAsPPL")
21-
Registry.action IN (deleted, unknown) by Registry.action Registry.dest Registry.process_guid
19+
where Registry.registry_path IN ("*\\Lsa\\LsaCfgFlags", "*\\Lsa\\RunAsPPL", "*\\SOFTWARE\\Policies\\Microsoft\\Windows\\DeviceGuard\\*")
20+
AND ((Registry.action = deleted)
21+
OR (Registry.action = modified AND Registry.registry_value_data IN(0x00000000, 0)))
22+
by Registry.action Registry.dest Registry.process_guid
2223
Registry.process_id Registry.registry_hive Registry.registry_path Registry.registry_key_name
2324
Registry.registry_value_data Registry.registry_value_name Registry.registry_value_type
2425
Registry.status Registry.user Registry.vendor_product | `drop_dm_object_name(Registry)`
25-
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `disabling_windows_local_security_authority_defences_via_registry_filter`'
26+
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`
27+
| `disabling_windows_local_security_authority_defences_via_registry_filter`'
2628
how_to_implement: The detection is based on data that originates from Endpoint Detection
2729
and Response (EDR) agents. These agents are designed to provide security-related
2830
telemetry from the endpoints where the agent is installed. To implement this search,
@@ -77,6 +79,6 @@ tags:
7779
tests:
7880
- name: True Positive Test
7981
attack_data:
80-
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1556/disable_lsa_protection/windows-sysmon.log
82+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1556/disable_lsa_protection_new/lsa_reg_deletion_modification.log
8183
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
8284
sourcetype: XmlWinEventLog

0 commit comments

Comments
 (0)