Skip to content

Commit a856da5

Browse files
committed
auditd_detection_updates
1 parent 3b5dd65 commit a856da5

File tree

34 files changed

+296
-320
lines changed

34 files changed

+296
-320
lines changed

detections/endpoint/any_powershell_downloadfile.yml

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Any Powershell DownloadFile
22
id: 1a93b7ea-7af7-11eb-adb5-acde48001122
3-
version: 11
4-
date: '2025-02-10'
3+
version: '12'
4+
date: '2025-02-24'
55
author: Michael Haag, Splunk
66
status: production
77
type: TTP
@@ -71,18 +71,18 @@ rba:
7171
type: process_name
7272
tags:
7373
analytic_story:
74-
- Data Destruction
7574
- Ingress Tool Transfer
75+
- China-Nexus Threat Activity
76+
- Crypto Stealer
77+
- Hermetic Wiper
7678
- DarkCrystal RAT
77-
- PXA Stealer
78-
- Braodo Stealer
79-
- Phemedrone Stealer
80-
- Log4Shell CVE-2021-44228
8179
- Malicious PowerShell
82-
- Hermetic Wiper
83-
- Crypto Stealer
84-
- Nexus APT Threat Activity
8580
- Earth Estries
81+
- Phemedrone Stealer
82+
- Braodo Stealer
83+
- PXA Stealer
84+
- Data Destruction
85+
- Log4Shell CVE-2021-44228
8686
asset_type: Endpoint
8787
cve:
8888
- CVE-2021-44228
@@ -97,7 +97,6 @@ tags:
9797
tests:
9898
- name: True Positive Test
9999
attack_data:
100-
- data:
101-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.001/atomic_red_team/windows-sysmon.log
100+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.001/atomic_red_team/windows-sysmon.log
102101
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
103102
sourcetype: XmlWinEventLog

detections/endpoint/detect_renamed_psexec.yml

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Detect Renamed PSExec
22
id: 683e6196-b8e8-11eb-9a79-acde48001122
3-
version: 11
4-
date: '2025-02-10'
3+
version: '12'
4+
date: '2025-02-24'
55
author: Michael Haag, Splunk, Alex Oberkircher, Github Community
66
status: production
77
type: Hunting
@@ -39,18 +39,18 @@ references:
3939
- https://redcanary.com/blog/threat-hunting-psexec-lateral-movement/
4040
tags:
4141
analytic_story:
42+
- China-Nexus Threat Activity
4243
- BlackByte Ransomware
44+
- HAFNIUM Group
4345
- DHS Report TA18-074A
44-
- DarkSide Ransomware
45-
- SamSam Ransomware
4646
- CISA AA22-320A
47-
- HAFNIUM Group
48-
- Sandworm Tools
47+
- DarkSide Ransomware
4948
- Active Directory Lateral Movement
50-
- Nexus APT Threat Activity
5149
- DarkGate Malware
52-
- Earth Estries
50+
- Sandworm Tools
5351
- Rhysida Ransomware
52+
- Earth Estries
53+
- SamSam Ransomware
5454
asset_type: Endpoint
5555
mitre_attack_id:
5656
- T1569.002
@@ -62,7 +62,6 @@ tags:
6262
tests:
6363
- name: True Positive Test
6464
attack_data:
65-
- data:
66-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1569.002/atomic_red_team/windows-sysmon.log
65+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1569.002/atomic_red_team/windows-sysmon.log
6766
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
6867
sourcetype: XmlWinEventLog

detections/endpoint/detect_renamed_winrar.yml

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Detect Renamed WinRAR
22
id: 1b7bfb2c-b8e6-11eb-99ac-acde48001122
3-
version: 9
4-
date: '2025-02-10'
3+
version: '10'
4+
date: '2025-02-24'
55
author: Michael Haag, Splunk
66
status: production
77
type: Hunting
@@ -38,10 +38,10 @@ references:
3838
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560.001/T1560.001.md
3939
tags:
4040
analytic_story:
41+
- China-Nexus Threat Activity
42+
- CISA AA22-277A
4143
- Collection and Staging
4244
- Earth Estries
43-
- Nexus APT Threat Activity
44-
- CISA AA22-277A
4545
asset_type: Endpoint
4646
mitre_attack_id:
4747
- T1560.001
@@ -53,7 +53,6 @@ tags:
5353
tests:
5454
- name: True Positive Test
5555
attack_data:
56-
- data:
57-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1560.001/archive_utility/windows-sysmon.log
56+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1560.001/archive_utility/windows-sysmon.log
5857
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
5958
sourcetype: XmlWinEventLog

detections/endpoint/executables_or_script_creation_in_suspicious_path.yml

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Executables Or Script Creation In Suspicious Path
22
id: a7e3f0f0-ae42-11eb-b245-acde48001122
3-
version: 10
4-
date: '2025-01-27'
3+
version: '11'
4+
date: '2025-02-24'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -61,46 +61,46 @@ rba:
6161
type: file_name
6262
tags:
6363
analytic_story:
64-
- Chaos Ransomware
64+
- BlackByte Ransomware
65+
- Brute Ratel C4
6566
- Trickbot
6667
- Snake Keylogger
67-
- CISA AA23-347A
68-
- Industroyer2
69-
- WinDealer RAT
70-
- Qakbot
68+
- Graceful Wipe Out Attack
69+
- PlugX
70+
- Handala Wiper
71+
- Earth Estries
7172
- Warzone RAT
72-
- IcedID
7373
- ValleyRAT
74-
- Azorult
75-
- Handala Wiper
74+
- NjRAT
7675
- LockBit Ransomware
77-
- Meduza Stealer
78-
- Brute Ratel C4
76+
- Double Zero Destructor
77+
- Swift Slicer
78+
- DarkCrystal RAT
7979
- AsyncRAT
80-
- AcidPour
80+
- Volt Typhoon
81+
- Chaos Ransomware
82+
- Hermetic Wiper
8183
- Derusbi
82-
- DarkGate Malware
83-
- Graceful Wipe Out Attack
84-
- NjRAT
85-
- WhisperGate
86-
- Data Destruction
87-
- BlackByte Ransomware
84+
- XMRig
8885
- AgentTesla
89-
- Swift Slicer
86+
- WinDealer RAT
87+
- RedLine Stealer
88+
- Remcos
89+
- Rhysida Ransomware
90+
- China-Nexus Threat Activity
9091
- Crypto Stealer
91-
- Hermetic Wiper
92+
- Qakbot
93+
- IcedID
94+
- Meduza Stealer
95+
- AcidPour
9296
- MoonPeak
93-
- Double Zero Destructor
94-
- XMRig
95-
- PlugX
97+
- CISA AA23-347A
98+
- DarkGate Malware
99+
- Industroyer2
100+
- Azorult
101+
- Data Destruction
96102
- Amadey
97-
- DarkCrystal RAT
98-
- Remcos
99-
- Nexus APT Threat Activity
100-
- Earth Estries
101-
- Rhysida Ransomware
102-
- RedLine Stealer
103-
- Volt Typhoon
103+
- WhisperGate
104104
asset_type: Endpoint
105105
mitre_attack_id:
106106
- T1036

detections/endpoint/linux_common_process_for_elevation_control.yml

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux Common Process For Elevation Control
22
id: 66ab15c0-63d0-11ec-9e70-acde48001122
3-
version: 6
4-
date: '2025-02-10'
3+
version: '7'
4+
date: '2025-02-24'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Hunting
@@ -44,10 +44,10 @@ references:
4444
- https://github.com/microsoft/MSTIC-Sysmon/blob/main/linux/configs/attack-based/privilege_escalation/T1548.001_ElevationControl_CommonProcesses.xml
4545
tags:
4646
analytic_story:
47+
- China-Nexus Threat Activity
48+
- Linux Persistence Techniques
4749
- Linux Privilege Escalation
4850
- Linux Living Off The Land
49-
- Linux Persistence Techniques
50-
- Nexus APT Threat Activity
5151
- Earth Estries
5252
asset_type: Endpoint
5353
mitre_attack_id:
@@ -60,7 +60,6 @@ tags:
6060
tests:
6161
- name: True Positive Test
6262
attack_data:
63-
- data:
64-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.001/chmod_uid/sysmon_linux.log
63+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.001/chmod_uid/sysmon_linux.log
6564
source: Syslog:Linux-Sysmon/Operational
6665
sourcetype: sysmon:linux

detections/endpoint/linux_file_creation_in_init_boot_directory.yml

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux File Creation In Init Boot Directory
22
id: 97d9cfb2-61ad-11ec-bb2d-acde48001122
3-
version: 7
4-
date: '2025-02-10'
3+
version: '8'
4+
date: '2025-02-24'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -49,11 +49,11 @@ rba:
4949
threat_objects: []
5050
tags:
5151
analytic_story:
52-
- Linux Privilege Escalation
52+
- China-Nexus Threat Activity
5353
- Backdoor Pingpong
5454
- Linux Persistence Techniques
5555
- XorDDos
56-
- Nexus APT Threat Activity
56+
- Linux Privilege Escalation
5757
asset_type: Endpoint
5858
mitre_attack_id:
5959
- T1037.004
@@ -65,7 +65,6 @@ tags:
6565
tests:
6666
- name: True Positive Test
6767
attack_data:
68-
- data:
69-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1546.004/linux_init_profile/sysmon_linux.log
68+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1546.004/linux_init_profile/sysmon_linux.log
7069
source: Syslog:Linux-Sysmon/Operational
7170
sourcetype: sysmon:linux

detections/endpoint/linux_iptables_firewall_modification.yml

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux Iptables Firewall Modification
22
id: 309d59dc-1e1b-49b2-9800-7cf18d12f7b7
3-
version: 8
4-
date: '2025-02-10'
3+
version: '9'
4+
date: '2025-02-24'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -66,10 +66,10 @@ rba:
6666
threat_objects: []
6767
tags:
6868
analytic_story:
69-
- Sandworm Tools
69+
- China-Nexus Threat Activity
7070
- Backdoor Pingpong
71-
- Nexus APT Threat Activity
7271
- Cyclops Blink
72+
- Sandworm Tools
7373
asset_type: Endpoint
7474
mitre_attack_id:
7575
- T1562.004
@@ -81,7 +81,6 @@ tags:
8181
tests:
8282
- name: True Positive Test
8383
attack_data:
84-
- data:
85-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/malware/cyclopsblink/sysmon_linux.log
84+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/malware/cyclopsblink/sysmon_linux.log
8685
source: Syslog:Linux-Sysmon/Operational
8786
sourcetype: sysmon:linux

detections/endpoint/linux_nopasswd_entry_in_sudoers_file.yml

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux NOPASSWD Entry In Sudoers File
22
id: ab1e0d52-624a-11ec-8e0b-acde48001122
3-
version: 6
4-
date: '2025-02-10'
3+
version: '7'
4+
date: '2025-02-24'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -58,10 +58,10 @@ rba:
5858
threat_objects: []
5959
tags:
6060
analytic_story:
61+
- China-Nexus Threat Activity
62+
- Linux Persistence Techniques
6163
- Linux Privilege Escalation
6264
- Earth Estries
63-
- Nexus APT Threat Activity
64-
- Linux Persistence Techniques
6565
asset_type: Endpoint
6666
mitre_attack_id:
6767
- T1548.003
@@ -73,7 +73,6 @@ tags:
7373
tests:
7474
- name: True Positive Test
7575
attack_data:
76-
- data:
77-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/nopasswd_sudoers/sysmon_linux.log
76+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1548.003/nopasswd_sudoers/sysmon_linux.log
7877
source: Syslog:Linux-Sysmon/Operational
7978
sourcetype: sysmon:linux

detections/endpoint/linux_possible_access_to_credential_files.yml

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Linux Possible Access To Credential Files
22
id: 16107e0e-71fc-11ec-b862-acde48001122
3-
version: 7
4-
date: '2025-02-10'
3+
version: '8'
4+
date: '2025-02-24'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
@@ -57,10 +57,10 @@ rba:
5757
threat_objects: []
5858
tags:
5959
analytic_story:
60-
- Linux Privilege Escalation
60+
- China-Nexus Threat Activity
6161
- Linux Persistence Techniques
6262
- XorDDos
63-
- Nexus APT Threat Activity
63+
- Linux Privilege Escalation
6464
- Earth Estries
6565
asset_type: Endpoint
6666
mitre_attack_id:
@@ -73,7 +73,6 @@ tags:
7373
tests:
7474
- name: True Positive Test
7575
attack_data:
76-
- data:
77-
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.008/copy_file_stdoutpipe/sysmon_linux.log
76+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1003.008/copy_file_stdoutpipe/sysmon_linux.log
7877
source: Syslog:Linux-Sysmon/Operational
7978
sourcetype: sysmon:linux

0 commit comments

Comments
 (0)