Skip to content

Commit e8f9c1d

Browse files
authored
Merge branch 'develop' into nterl0k-T1550-netexec-usage
2 parents 662b542 + d69dcf3 commit e8f9c1d

File tree

7 files changed

+97
-19
lines changed

7 files changed

+97
-19
lines changed

contentctl.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,8 @@ test_instance:
2121
hec_port: 8088
2222
web_ui_port: 8000
2323
api_port: 8089
24-
full_image_path: registry.hub.docker.com/splunk/splunk:latest
2524
container_settings:
25+
full_image_path: registry.hub.docker.com/splunk/splunk:9.3
2626
leave_running: true
2727
num_containers: 1
2828
mode: {}
@@ -77,9 +77,9 @@ apps:
7777
- uid: 5579
7878
title: Splunk Add-on for CrowdStrike FDR
7979
appid: Splunk_TA_CrowdStrike_FDR
80-
version: 2.0.2
80+
version: 2.0.3
8181
description: description of app
82-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_202.tgz
82+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_203.tgz
8383
- uid: 3185
8484
title: Splunk Add-on for Microsoft IIS
8585
appid: SPLUNK_TA_FOR_IIS

data_sources/crowdstrike_processrollup2.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: event_simpleName
1010
supported_TA:
1111
- name: Splunk Add-on for CrowdStrike FDR
1212
url: https://splunkbase.splunk.com/app/5579
13-
version: 2.0.2
13+
version: 2.0.3
1414
fields:
1515
- AuthenticationId
1616
- AuthenticationId_meaning

detections/endpoint/detect_exchange_web_shell.yml

Lines changed: 14 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Detect Exchange Web Shell
22
id: 8c14eeee-2af1-4a4b-bda8-228da0f4862a
3-
version: '8'
4-
date: '2024-11-28'
3+
version: 9
4+
date: '2024-12-12'
55
author: Michael Haag, Shannon Davis, David Dorsey, Splunk
66
status: production
77
type: TTP
@@ -16,16 +16,18 @@ description: The following analytic identifies the creation of suspicious .aspx
1616
data_source:
1717
- Sysmon EventID 1 AND Sysmon EventID 11
1818
search: '| tstats `security_content_summariesonly` count FROM datamodel=Endpoint.Processes
19-
where Processes.process_name=System by _time span=1h Processes.process_id Processes.process_name
20-
Processes.dest Processes.user | `drop_dm_object_name(Processes)` | join process_guid,
21-
_time [| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
22-
as lastTime FROM datamodel=Endpoint.Filesystem where Filesystem.file_path IN ("*\\HttpProxy\\owa\\auth\\*",
23-
"*\\inetpub\\wwwroot\\aspnet_client\\*", "*\\HttpProxy\\OAB\\*") Filesystem.file_name
24-
IN( "*.aspx", "*.ashx") by _time span=1h Filesystem.user Filesystem.dest Filesystem.file_create_time
25-
Filesystem.file_name Filesystem.file_path | `drop_dm_object_name(Filesystem)` |
26-
fields _time dest user file_create_time file_name file_path process_name process_path
27-
process] | dedup file_create_time | table dest user file_create_time, file_name,
28-
file_path, process_name | `detect_exchange_web_shell_filter`'
19+
where Processes.process_name=System by _time span=1h Processes.process_guid Processes.process_name Processes.process
20+
Processes.dest Processes.user
21+
| `drop_dm_object_name(Processes)`
22+
| join process_guid, _time
23+
[| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
24+
as lastTime FROM datamodel=Endpoint.Filesystem where Filesystem.file_path IN ("*\\HttpProxy\\owa\\auth\\*",
25+
"*\\inetpub\\wwwroot\\aspnet_client\\*", "*\\HttpProxy\\OAB\\*") Filesystem.file_name
26+
IN( "*.aspx", "*.ashx") by _time span=1h Filesystem.process_guid Filesystem.user Filesystem.dest Filesystem.file_create_time
27+
Filesystem.file_name Filesystem.file_path
28+
| `drop_dm_object_name(Filesystem)` ]
29+
| dedup file_create_time
30+
| table _time dest user file_create_time file_name file_path process_name process process_guid | `detect_exchange_web_shell_filter`'
2931
how_to_implement: To successfully implement this search you need to be ingesting information
3032
on process that include the name of the process responsible for the changes from
3133
your endpoints into the `Endpoint` datamodel in the `Processes` node and `Filesystem`
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
name: Windows Detect Network Scanner Behavior
2+
id: 78e678d2-bf64-4fe6-aa52-2f7b11dddee7
3+
version: 1
4+
date: '2024-12-26'
5+
author: Steven Dick
6+
status: production
7+
type: Anomaly
8+
description: The following analytic detects when an application is used to connect a large number of unique ports/targets within a short time frame. Network enumeration may be used by adversaries as a method of discovery, lateral movement, or remote execution. This analytic may require significant tuning depending on the organization and applications being actively used, highly recommended to pre-populate the filter macro prior to activation.
9+
data_source:
10+
- Sysmon EventID 3
11+
search: '| tstats `security_content_summariesonly` count latest(All_Traffic.dest_port) as dest_port dc(All_Traffic.dest_port) as port_count dc(All_Traffic.dest) as dest_count min(_time) as firstTime max(_time) as lastTime values(All_Traffic.process_id) as process_id from datamodel=Network_Traffic.All_Traffic where sourcetype=XmlWinEventLog All_Traffic.app = "*\\*" All_Traffic.dest_port < 32000 NOT All_Traffic.dest_port IN (8443,8080,5353,3268,443,389,88,80,53,25) by host,All_Traffic.app,All_Traffic.src,All_Traffic.src_ip,All_Traffic.user _time span=5m
12+
| `drop_dm_object_name(All_Traffic)`
13+
| rex field=app ".*\\\(?<process_name>.*)$"
14+
| where port_count > 10 OR dest_count > 10
15+
| stats latest(src) as src, latest(src_ip) as src_ip, max(dest_count) as dest_count, max(port_count) as port_count, latest(dest_port) as dest_port, min(firstTime) as firstTime, max(lastTime) as lastTime, max(count) as count by host,user,app,process_name
16+
| `security_content_ctime(firstTime)`
17+
| `security_content_ctime(lastTime)`
18+
| `windows_detect_network_scanner_behavior_filter`'
19+
how_to_implement: This detection relies on Sysmon EventID 3 events being ingested AND tagged into the Network_Traffic datamodel.
20+
known_false_positives: Various, could be noisy depending on processes in the organization and sysmon configuration used. Adjusted port/dest count thresholds as needed.
21+
references:
22+
- https://attack.mitre.org/techniques/T1595
23+
drilldown_searches:
24+
- name: View the detection results for - "$src$" and "$user$"
25+
search: '%original_detection_search% | search src = "$src$" user = "$user$"'
26+
earliest_offset: $info_min_time$
27+
latest_offset: $info_max_time$
28+
- name: View risk events for the last 7 days for - "$src$" and "$user$"
29+
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$src$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`'
30+
earliest_offset: $info_min_time$
31+
latest_offset: $info_max_time$
32+
tags:
33+
analytic_story:
34+
- Network Discovery
35+
- Windows Discovery Techniques
36+
asset_type: Endpoint
37+
confidence: 50
38+
impact: 50
39+
message: A process exhibiting network scanning behavior [$process_name$] was detected on $src$
40+
mitre_attack_id:
41+
- T1595
42+
- T1595.001
43+
- T1595.002
44+
observable:
45+
- name: src
46+
type: IP Address
47+
role:
48+
- Victim
49+
- name: user
50+
type: User
51+
role:
52+
- Victim
53+
- name: process_name
54+
type: Process
55+
role:
56+
- Attacker
57+
product:
58+
- Splunk Enterprise
59+
- Splunk Enterprise Security
60+
- Splunk Cloud
61+
required_fields:
62+
- All_Traffic.dest_port
63+
- host
64+
- All_Traffic.app
65+
- All_Traffic.src
66+
- All_Traffic.src_ip
67+
- All_Traffic.user
68+
- _time
69+
risk_score: 25
70+
security_domain: network
71+
tests:
72+
- name: True Positive Test
73+
attack_data:
74+
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1595/sysmon_scanning_events/sysmon_scanning_events.log
75+
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
76+
sourcetype: XmlWinEventLog

macros/f5_bigip_rogue.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
definition: index=netops sourcetype="f5:bigip:rogue"
1+
definition: sourcetype="f5:bigip:rogue"
22
description: customer specific splunk configurations(eg- index, source, sourcetype).
33
Replace the macro definition with configurations for your Splunk Environment.
44
name: f5_bigip_rogue

macros/zeek_rpc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
definition: index=zeek sourcetype="zeek:rpc:json"
1+
definition: sourcetype="zeek:rpc:json"
22
description: customer specific splunk configurations(eg- index, source, sourcetype).
33
Replace the macro definition with configurations for your Splunk Environment.
44
name: zeek_rpc

macros/zeek_ssl.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
definition: index=zeek sourcetype="zeek:ssl:json"
1+
definition: sourcetype="zeek:ssl:json"
22
description: customer specific splunk configurations(eg- index, source, sourcetype).
33
Replace the macro definition with configurations for your Splunk Environment.
44
name: zeek_ssl

0 commit comments

Comments
 (0)