Skip to content

Commit a2ba81b

Browse files
authored
Merge branch 'develop' into secret_blizzard
2 parents 72912a9 + 748a002 commit a2ba81b

File tree

53 files changed

+1283
-791
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

53 files changed

+1283
-791
lines changed

contentctl.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.13.0
6+
version: 5.14.0
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU
@@ -44,9 +44,9 @@ apps:
4444
- uid: 7404
4545
title: Cisco Security Cloud
4646
appid: CiscoSecurityCloud
47-
version: 3.3.1
47+
version: 3.4.0
4848
description: description of app
49-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_331.tgz
49+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_340.tgz
5050
- uid: 6652
5151
title: Add-on for Linux Sysmon
5252
appid: Splunk_TA_linux_sysmon

data_sources/cisco_ai_defense_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,5 +10,5 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields: null

data_sources/cisco_duo_activity.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields:
1515
- access_device.browser
1616
- access_device.browser_version

data_sources/cisco_duo_administrator.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields:
1515
- action
1616
- actionlabel

data_sources/cisco_secure_firewall_threat_defense_connection_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields:
1515
- AC_RuleAction
1616
- action

data_sources/cisco_secure_firewall_threat_defense_file_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields:
1515
- app
1616
- Application

data_sources/cisco_secure_firewall_threat_defense_intrusion_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.3.1
13+
version: 3.4.0
1414
fields:
1515
- Application
1616
- Classification

detections/cloud/aws_defense_evasion_impair_security_services.yml

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,11 @@
11
name: AWS Defense Evasion Impair Security Services
22
id: b28c4957-96a6-47e0-a965-6c767aac1458
3-
version: 8
4-
date: '2025-05-22'
5-
author: Bhavin Patel, Gowthamaraj Rajendran, Splunk
3+
version: 9
4+
date: '2025-08-26'
5+
author: Bhavin Patel, Gowthamaraj Rajendran, Splunk, PashFW, Github Community
66
status: production
77
type: TTP
8-
description: The following analytic detects attempts to delete critical AWS security
9-
service configurations, such as CloudWatch alarms, GuardDuty detectors, and Web
10-
Application Firewall rules. It leverages CloudTrail logs to identify specific API
8+
description: The following analytic detects attempts to impair or disable AWS security services by monitoring specific deletion operations across GuardDuty, AWS WAF (classic and v2), CloudWatch, Route 53, and CloudWatch Logs. These actions include deleting detectors, rule groups, IP sets, web ACLs, logging configurations, alarms, and log streams. Adversaries may perform such operations to evade detection or remove visibility from defenders. By explicitly pairing eventName values with their corresponding eventSource services, this detection reduces noise and ensures that only security-related deletions are flagged. It leverages CloudTrail logs to identify specific API
119
calls like "DeleteLogStream" and "DeleteDetector." This activity is significant
1210
because it indicates potential efforts to disable security monitoring and evade
1311
detection. If confirmed malicious, this could allow attackers to operate undetected,
@@ -22,14 +20,17 @@ data_source:
2220
- AWS CloudTrail DeleteRuleGroup
2321
- AWS CloudTrail DeleteLoggingConfiguration
2422
- AWS CloudTrail DeleteAlarms
25-
search: '`cloudtrail` eventName IN ("DeleteLogStream","DeleteDetector","DeleteIPSet","DeleteWebACL","DeleteRule","DeleteRuleGroup","DeleteLoggingConfiguration","DeleteAlarms")
23+
search: |
24+
`cloudtrail`
25+
(eventName="DeleteDetector" AND eventSource="guardduty.amazonaws.com") OR ( eventName IN ("DeleteIPSet", "DeleteWebACL", "DeleteRuleGroup", "DeleteRule") AND eventSource IN ("guardduty.amazonaws.com", "wafv2.amazonaws.com", "waf.amazonaws.com") ) OR ( eventName="DeleteLoggingConfiguration" AND eventSource IN ("wafv2.amazonaws.com", "waf.amazonaws.com", "route53.amazonaws.com") )
2626
| rename user_name as user
2727
| stats count min(_time) as firstTime max(_time) as lastTime by signature dest user user_agent src vendor_account vendor_region vendor_product
28-
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`| `aws_defense_evasion_impair_security_services_filter`'
28+
| `security_content_ctime(firstTime)`
29+
| `security_content_ctime(lastTime)`
30+
| `aws_defense_evasion_impair_security_services_filter`
2931
how_to_implement: You must install Splunk AWS Add on and enable CloudTrail logs in
3032
your AWS Environment.
31-
known_false_positives: While this search has no known false positives, it is possible
32-
that it is a legitimate admin activity. Please consider filtering out these noisy
33+
known_false_positives: Legitimate administrators may occasionally delete GuardDuty detectors, WAF rule groups, or CloudWatch alarms during environment reconfiguration, migration, or decommissioning activities. In such cases, these events are expected and benign. These should be validated against approved change tickets or deployment pipelines to differentiate malicious activity from normal operations. Please consider filtering out these noisy
3334
events using userAgent, user_arn field names.
3435
references:
3536
- https://docs.aws.amazon.com/cli/latest/reference/guardduty/index.html

detections/cloud/azure_automation_account_created.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
name: Azure Automation Account Created
22
id: 860902fd-2e76-46b3-b050-ba548dab576c
3-
version: 9
4-
date: '2025-05-02'
5-
author: Mauricio Velazco, Splunk
3+
version: 10
4+
date: '2025-09-03'
5+
author: Mauricio Velazco, Brian Serocki, Splunk
66
status: production
77
type: TTP
88
description: The following analytic detects the creation of a new Azure Automation
@@ -15,9 +15,9 @@ description: The following analytic detects the creation of a new Azure Automati
1515
on virtual machines, posing a significant security risk.
1616
data_source:
1717
- Azure Audit Create or Update an Azure Automation account
18-
search: '`azure_audit` operationName.localizedValue="Create or Update an Azure Automation account" status.value=Succeeded
18+
search: '`azure_audit` operationName.value="Microsoft.Automation/automationAccounts/write" status.value=Succeeded
1919
| dedup object
20-
| rename claims.ipaddr as src, subscriptionId as vendor_account, operationName.localizedValue as signature
20+
| rename claims.ipaddr as src, subscriptionId as vendor_account, operationName.value as signature
2121
| stats count min(_time) as firstTime max(_time) as lastTime by dest user src vendor_account vendor_product object object_path signature
2222
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `azure_automation_account_created_filter`'
2323
how_to_implement: You must install the latest version of Splunk Add-on for Microsoft

detections/cloud/azure_automation_runbook_created.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
name: Azure Automation Runbook Created
22
id: 178d696d-6dc6-4ee8-9d25-93fee34eaf5b
3-
version: 9
4-
date: '2025-05-02'
5-
author: Mauricio Velazco, Splunk
3+
version: 10
4+
date: '2025-09-03'
5+
author: Mauricio Velazco, Brian Serocki, Splunk
66
status: production
77
type: TTP
88
description: The following analytic detects the creation of a new Azure Automation
@@ -15,9 +15,9 @@ description: The following analytic detects the creation of a new Azure Automati
1515
environment.
1616
data_source:
1717
- Azure Audit Create or Update an Azure Automation Runbook
18-
search: '`azure_audit` operationName.localizedValue="Create or Update an Azure Automation Runbook" object!=AzureAutomationTutorial* status.value=Succeeded
18+
search: '`azure_audit` operationName.value="Microsoft.Automation/automationAccounts/runbooks/write" object!=AzureAutomationTutorial* status.value=Succeeded
1919
| dedup object
20-
| rename claims.ipaddr as src, subscriptionId as vendor_account, operationName.localizedValue as operationName
20+
| rename claims.ipaddr as src, subscriptionId as vendor_account, operationName.value as operationName
2121
| stats count min(_time) as firstTime max(_time) as lastTime by dest user src vendor_account vendor_product object object_path
2222
| `security_content_ctime(firstTime)`
2323
| `security_content_ctime(lastTime)`

0 commit comments

Comments
 (0)