Skip to content

Commit c5eb937

Browse files
committed
adding nltm objects
1 parent 23c3f98 commit c5eb937

8 files changed

+63
-5
lines changed
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
name: NTLM Operational 8004
2+
id: fd08cb77-c26e-464c-a43e-2867e232127e
3+
version: 1
4+
date: '2025-02-21'
5+
author: Bhavin Patel, Splunk
6+
description: Data source object for NTLM Operational 8004
7+
source: XmlWinEventLog:Microsoft-Windows-NTLM/Operational
8+
sourcetype: XmlWinEventLog:Microsoft-Windows-NTLM/Operational
9+
separator: EventCode
10+
supported_TA:
11+
- name: Splunk Add-on for Microsoft Windows
12+
url: https://splunkbase.splunk.com/app/742
13+
version: 9.0.1
14+
fields:
15+
- _time
16+
example_log: |-
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
name: NTLM Operational 8005
2+
id: ad15a1cf-4b21-43de-81e4-6307c69172fb
3+
version: 1
4+
date: '2025-02-21'
5+
author: Bhavin Patel, Splunk
6+
description: Data source object for NTLM Operational 8005
7+
source: XmlWinEventLog:Microsoft-Windows-NTLM/Operational
8+
sourcetype: XmlWinEventLog:Microsoft-Windows-NTLM/Operational
9+
separator: EventCode
10+
supported_TA:
11+
- name: Splunk Add-on for Microsoft Windows
12+
url: https://splunkbase.splunk.com/app/742
13+
version: 9.0.1
14+
fields:
15+
- _time
16+
example_log: |-
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
name: NTLM Operational 8006
2+
id: 9f50a672-6f7d-4621-a3bd-69468c6b7a7f
3+
version: 1
4+
date: '2025-02-21'
5+
author: Bhavin Patel, Splunk
6+
description: Data source object for NTLM Operational 8006
7+
source: XmlWinEventLog:Microsoft-Windows-NTLM/Operational
8+
sourcetype: XmlWinEventLog:Microsoft-Windows-NTLM/Operational
9+
separator: EventCode
10+
supported_TA:
11+
- name: Splunk Add-on for Microsoft Windows
12+
url: https://splunkbase.splunk.com/app/742
13+
version: 9.0.1
14+
fields:
15+
- _time
16+
example_log: |-

detections/endpoint/windows_multiple_ntlm_null_domain_authentications.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,9 @@ description: The following analytic detects when a device is the target of numer
1212
a large number of EventID 4776 events in tandem, however these events will not indicate
1313
the attacker or target device
1414
data_source:
15-
- NTLM Operational 8004,8005,8006
15+
- NTLM Operational 8004
16+
- NTLM Operational 8005
17+
- NTLM Operational 8006
1618
search: '`ntlm_audit` EventCode IN (8004,8005,8006) DomainName=NULL UserName!=NULL
1719
| eval src = replace(WorkstationName,"\\\\","") ```CIM alignment, remove leading
1820
\\ from some auth attempts ``` | eval dest = SChannelName, user = UserName ``` CIM

detections/endpoint/windows_unusual_ntlm_authentication_destinations_by_source.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,9 @@ description: The following analytic detects when an unusual number NTLM authenti
1111
to a multiple domain joined Windows devices using an NTLM based process/attack.
1212
This same activity may also generate a large number of EventID 4776 events as well.
1313
data_source:
14-
- NTLM Operational 8004,8005,8006
14+
- NTLM Operational 8004
15+
- NTLM Operational 8005
16+
- NTLM Operational 8006
1517
search: '`ntlm_audit` EventCode = 8004 SChannelName=* WorkstationName=* | eval src
1618
= replace(WorkstationName,"\\\\","") ```CIM alignment, remove leading \\ from some
1719
auth attempts ``` | eval dest = SChannelName, user = UserName ``` CIM alignment```

detections/endpoint/windows_unusual_ntlm_authentication_destinations_by_user.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,9 @@ description: The following analytic detects when an unusual number of NTLM authe
1111
authenticate to numerous domain joined Windows devices using an NTLM based process/attack.
1212
This same activity may also generate a large number of EventID 4776 events as well.
1313
data_source:
14-
- NTLM Operational 8004,8005,8006
14+
- NTLM Operational 8004
15+
- NTLM Operational 8005
16+
- NTLM Operational 8006
1517
search: '`ntlm_audit` EventCode = 8004 SChannelName=* WorkstationName=* | eval src
1618
= replace(WorkstationName,"\\\\","") ```CIM alignment, remove leading \\ from some
1719
auth attempts ``` | eval dest = SChannelName, user = UserName ``` CIM alignment```

detections/endpoint/windows_unusual_ntlm_authentication_users_by_destination.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,9 @@ description: The following analytic detects when a device is the target of numer
1212
a large number of EventID 4776 events in tandem, however these events will not indicate
1313
the attacker or target device.
1414
data_source:
15-
- NTLM Operational 8004,8005,8006
15+
- NTLM Operational 8004
16+
- NTLM Operational 8005
17+
- NTLM Operational 8006
1618
search: '`ntlm_audit` EventCode = 8004 SChannelName=* WorkstationName=* | eval src
1719
= replace(WorkstationName,"\\\\","") ```CIM alignment, remove leading \\ from some
1820
auth attempts ``` | eval dest = SChannelName, user = UserName ``` CIM alignment```

detections/endpoint/windows_unusual_ntlm_authentication_users_by_source.yml

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,9 @@ description: The following analytic detects when an unusual number of NTLM authe
1111
Windows device using an NTLM based process/attack. This same activity may also generate
1212
a large number of EventID 4776 events in as well.
1313
data_source:
14-
- NTLM Operational 8004,8005,8006
14+
- NTLM Operational 8004
15+
- NTLM Operational 8005
16+
- NTLM Operational 8006
1517
search: '`ntlm_audit` EventCode = 8004 SChannelName=* WorkstationName=* | eval src
1618
= replace(WorkstationName,"\\\\","") ```CIM alignment, remove leading \\ from some
1719
auth attempts ``` | eval dest = SChannelName, user = UserName ``` CIM alignment```

0 commit comments

Comments
 (0)