Skip to content

Commit d8434fb

Browse files
authored
Merge branch 'develop' into issue_3245
2 parents 360a91e + bda72d8 commit d8434fb

File tree

107 files changed

+1767
-639
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

107 files changed

+1767
-639
lines changed

contentctl.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -149,9 +149,9 @@ apps:
149149
- uid: 5556
150150
title: Splunk Add-on for Google Workspace
151151
appid: SPLUNK_ADD_ON_FOR_GOOGLE_WORKSPACE
152-
version: 3.0.0
152+
version: 3.0.1
153153
description: description of app
154-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_300.tgz
154+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_301.tgz
155155
- uid: 3110
156156
title: Splunk Add-on for Microsoft Cloud Services
157157
appid: SPLUNK_TA_MICROSOFT_CLOUD_SERVICES

data_sources/g_suite_drive.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sourcetype: gsuite:drive:json
99
supported_TA:
1010
- name: Splunk Add-on for Google Workspace
1111
url: https://splunkbase.splunk.com/app/5556
12-
version: 3.0.0
12+
version: 3.0.1
1313
fields:
1414
- _time
1515
- email

data_sources/g_suite_gmail.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sourcetype: gsuite:gmail:bigquery
99
supported_TA:
1010
- name: Splunk Add-on for Google Workspace
1111
url: https://splunkbase.splunk.com/app/5556
12-
version: 3.0.0
12+
version: 3.0.1
1313
fields:
1414
- _time
1515
- action_type

data_sources/google_workspace_login_failure.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: event.name
1010
supported_TA:
1111
- name: Splunk Add-on for Google Workspace
1212
url: https://splunkbase.splunk.com/app/5556
13-
version: 3.0.0
13+
version: 3.0.1
1414
fields:
1515
- _time
1616
- actor.email

data_sources/google_workspace_login_success.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: event.name
1010
supported_TA:
1111
- name: Splunk Add-on for Google Workspace
1212
url: https://splunkbase.splunk.com/app/5556
13-
version: 3.0.0
13+
version: 3.0.1
1414
fields:
1515
- _time
1616
- actor.email

detections/endpoint/windows_lateral_tool_transfer_remcom.yml renamed to detections/deprecated/windows_lateral_tool_transfer_remcom.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,15 @@
11
name: Windows Lateral Tool Transfer RemCom
22
id: e373a840-5bdc-47ef-b2fd-9cc7aaf387f0
3-
version: 4
4-
date: '2024-09-30'
3+
version: 5
4+
date: '2024-12-10'
55
author: Michael Haag, Splunk
66
type: TTP
7-
status: production
7+
status: deprecated
88
data_source:
99
- Sysmon EventID 1
1010
- Windows Event Log Security 4688
1111
- CrowdStrike ProcessRollup2
12-
description: The following analytic identifies the execution of RemCom.exe, an open-source alternative to PsExec, used for lateral movement and remote command execution. It leverages data from Endpoint Detection and Response (EDR) agents, focusing on process names, original file names, and command-line arguments. This activity is significant as it indicates potential lateral movement within the network. If confirmed malicious, this could allow an attacker to execute commands remotely, potentially leading to further compromise and control over additional systems within the network.
12+
description: NOTE - This search is deprecated in favor of `Windows Service Execution RemCom` as the latter is a more accurate name for the detection. The following analytic identifies the execution of RemCom.exe, an open-source alternative to PsExec, used for lateral movement and remote command execution. It leverages data from Endpoint Detection and Response (EDR) agents, focusing on process names, original file names, and command-line arguments. This activity is significant as it indicates potential lateral movement within the network. If confirmed malicious, this could allow an attacker to execute commands remotely, potentially leading to further compromise and control over additional systems within the network.
1313
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time) as lastTime from datamodel=Endpoint.Processes where (Processes.process_name=remcom.exe OR Processes.original_file_name=RemCom.exe) Processes.process="*\\*" Processes.process IN ("*/user:*", "*/pwd:*") by Processes.dest Processes.user Processes.parent_process_name Processes.process_name Processes.original_file_name Processes.process Processes.process_id Processes.parent_process_id | `drop_dm_object_name(Processes)` | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `windows_lateral_tool_transfer_remcom_filter`'
1414
how_to_implement: The detection is based on data that originates from Endpoint Detection and Response (EDR) agents. These agents are designed to provide security-related telemetry from the endpoints where the agent is installed. To implement this search, you must ingest logs that contain the process GUID, process name, and parent process. Additionally, you must ingest complete command-line executions. These logs must be processed using the appropriate Splunk Technology Add-ons that are specific to the EDR product. The logs must also be mapped to the `Processes` node of the `Endpoint` data model. Use the Splunk Common Information Model (CIM) to normalize the field names and speed up the data modeling process.
1515
known_false_positives: False positives may be present based on Administrative use. Filter as needed.

detections/endpoint/active_setup_registry_autostart.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Active Setup Registry Autostart
22
id: f64579c0-203f-11ec-abcc-acde48001122
3-
version: 7
4-
date: '2024-11-14'
3+
version: 8
4+
date: '2024-12-08'
55
author: Steven Dick, Teoderick Contreras, Splunk
66
status: production
77
type: TTP
@@ -17,7 +17,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1717
| `security_content_ctime(lastTime)`| `active_setup_registry_autostart_filter`'
1818
how_to_implement: To successfully implement this search, you need to be ingesting
1919
logs with the registry value name, registry path, and registry value data from your
20-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
20+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2121
Sysmon TA. https://splunkbase.splunk.com/app/5709
2222
known_false_positives: Active setup installer may add or modify this registry.
2323
references:

detections/endpoint/add_defaultuser_and_password_in_registry.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Add DefaultUser And Password In Registry
22
id: d4a3eb62-0f1e-11ec-a971-acde48001122
3-
version: 7
4-
date: '2024-11-14'
3+
version: 8
4+
date: '2024-12-08'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: Anomaly
@@ -18,7 +18,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1818
| `add_defaultuser_and_password_in_registry_filter`'
1919
how_to_implement: To successfully implement this search, you need to be ingesting
2020
logs with the registry value name, registry path, and registry value data from your
21-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
21+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2222
Sysmon TA. https://splunkbase.splunk.com/app/5709
2323
known_false_positives: unknown
2424
references:

detections/endpoint/allow_inbound_traffic_by_firewall_rule_registry.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Allow Inbound Traffic By Firewall Rule Registry
22
id: 0a46537c-be02-11eb-92ca-acde48001122
3-
version: 8
4-
date: '2024-11-14'
3+
version: 9
4+
date: '2024-12-08'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: TTP
@@ -18,7 +18,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1818
| `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)` | `allow_inbound_traffic_by_firewall_rule_registry_filter`'
1919
how_to_implement: To successfully implement this search, you need to be ingesting
2020
logs with the registry value name, registry path, and registry value data from your
21-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
21+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2222
Sysmon TA. https://splunkbase.splunk.com/app/5709
2323
known_false_positives: network admin may add/remove/modify public inbound firewall
2424
rule that may cause this rule to be triggered.

detections/endpoint/allow_operation_with_consent_admin.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Allow Operation with Consent Admin
22
id: 7de17d7a-c9d8-11eb-a812-acde48001122
3-
version: 7
4-
date: '2024-11-14'
3+
version: 8
4+
date: '2024-12-08'
55
author: Teoderick Contreras, Splunk, Steven Dick
66
status: production
77
type: TTP
@@ -18,7 +18,7 @@ search: '| tstats `security_content_summariesonly` count min(_time) as firstTime
1818
| `security_content_ctime(lastTime)` | `allow_operation_with_consent_admin_filter`'
1919
how_to_implement: To successfully implement this search, you need to be ingesting
2020
logs with the registry value name, registry path, and registry value data from your
21-
endpoints. If you are using Sysmon, you must have at least version 2.0 of the offical
21+
endpoints. If you are using Sysmon, you must have at least version 2.0 of the official
2222
Sysmon TA. https://splunkbase.splunk.com/app/5709
2323
known_false_positives: unknown
2424
references:

0 commit comments

Comments
 (0)