Skip to content

Commit ef2ac2a

Browse files
committed
Removal of fields from new detections
1 parent 9ee2e1d commit ef2ac2a

22 files changed

+10
-238
lines changed

detections/cloud/asl_aws_create_access_key.yml

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -18,23 +18,13 @@ tags:
1818
analytic_story:
1919
- AWS IAM Privilege Escalation
2020
asset_type: AWS Account
21-
confidence: 90
22-
impact: 70
2321
mitre_attack_id:
2422
- T1136.003
2523
- T1136
2624
product:
2725
- Splunk Enterprise
2826
- Splunk Enterprise Security
2927
- Splunk Cloud
30-
required_fields:
31-
- api.operation
32-
- actor.user.uid
33-
- actor.user.account.uid
34-
- http_request.user_agent
35-
- src_endpoint.ip
36-
- src_endpoint.domain
37-
- cloud.region
3828
security_domain: network
3929
tests:
4030
- name: True Positive Test

detections/cloud/asl_aws_create_policy_version_to_allow_all_resources.yml

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -34,29 +34,13 @@ tags:
3434
analytic_story:
3535
- AWS IAM Privilege Escalation
3636
asset_type: AWS Account
37-
confidence: 70
38-
impact: 70
3937
mitre_attack_id:
4038
- T1078.004
4139
- T1078
42-
observable:
43-
- name: user
44-
type: User
45-
role:
46-
- Victim
4740
product:
4841
- Splunk Enterprise
4942
- Splunk Enterprise Security
5043
- Splunk Cloud
51-
required_fields:
52-
- api.operation
53-
- actor.user.account.uid
54-
- api.request.data
55-
- actor.user.uid
56-
- http_request.user_agent
57-
- src_endpoint.ip
58-
- src_endpoint.domain
59-
- cloud.region
6044
security_domain: network
6145
tests:
6246
- name: True Positive Test

detections/cloud/asl_aws_credential_access_getpassworddata.yml

Lines changed: 1 addition & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -28,42 +28,23 @@ rba:
2828
risk_objects:
2929
- field: user
3030
type: user
31+
score: 49
3132
threat_objects:
3233
- field: src_ip
3334
type: ip_address
3435
tags:
3536
analytic_story:
3637
- AWS Identity and Access Management Account Takeover
3738
asset_type: AWS Account
38-
confidence: 70
39-
impact: 70
4039
mitre_attack_id:
4140
- T1586
4241
- T1586.003
4342
- T1110
4443
- T1110.001
45-
observable:
46-
- name: src_ip
47-
type: IP Address
48-
role:
49-
- Attacker
50-
- name: user
51-
type: User
52-
role:
53-
- Victim
5444
product:
5545
- Splunk Enterprise
5646
- Splunk Enterprise Security
5747
- Splunk Cloud
58-
required_fields:
59-
- api.operation
60-
- actor.user.uid
61-
- actor.user.account.uid
62-
- http_request.user_agent
63-
- src_endpoint.ip
64-
- src_endpoint.domain
65-
- cloud.region
66-
risk_score: 49
6748
security_domain: threat
6849
tests:
6950
- name: True Positive Test

detections/cloud/asl_aws_credential_access_rds_password_reset.yml

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -35,8 +35,6 @@ tags:
3535
analytic_story:
3636
- AWS Identity and Access Management Account Takeover
3737
asset_type: AWS Account
38-
confidence: 70
39-
impact: 70
4038
mitre_attack_id:
4139
- T1586
4240
- T1586.003
@@ -45,15 +43,6 @@ tags:
4543
- Splunk Enterprise
4644
- Splunk Enterprise Security
4745
- Splunk Cloud
48-
required_fields:
49-
- api.operation
50-
- api.request.data
51-
- actor.user.uid
52-
- actor.user.account.uid
53-
- http_request.user_agent
54-
- src_endpoint.ip
55-
- src_endpoint.domain
56-
- cloud.region
5746
security_domain: threat
5847
tests:
5948
- name: True Positive Test

detections/cloud/asl_aws_defense_evasion_putbucketlifecycle.yml

Lines changed: 0 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -13,21 +13,10 @@ how_to_implement: The detection is based on Amazon Security Lake events from Ama
1313
known_false_positives: While this search has no known false positives, it is possible that it is a legitimate admin activity. Please consider filtering out these noisy events using userAgent, user_arn field names.
1414
references:
1515
- https://stratus-red-team.cloud/attack-techniques/AWS/aws.defense-evasion.cloudtrail-lifecycle-rule/
16-
rba:
17-
message: User $user$ has created a new rule to on an S3 bucket $bucketName$ with short expiration days
18-
risk_objects:
19-
- field: user
20-
type: user
21-
score: 20
22-
threat_objects:
23-
- field: src_ip
24-
type: ip_address
2516
tags:
2617
analytic_story:
2718
- AWS Defense Evasion
2819
asset_type: AWS Account
29-
confidence: 40
30-
impact: 50
3120
mitre_attack_id:
3221
- T1562.008
3322
- T1562
@@ -37,15 +26,6 @@ tags:
3726
- Splunk Enterprise
3827
- Splunk Enterprise Security
3928
- Splunk Cloud
40-
required_fields:
41-
- api.operation
42-
- api.request.data
43-
- actor.user.uid
44-
- actor.user.account.uid
45-
- http_request.user_agent
46-
- src_endpoint.ip
47-
- src_endpoint.domain
48-
- cloud.region
4929
security_domain: threat
5030
tests:
5131
- name: True Positive Test

detections/cloud/asl_aws_detect_users_creating_keys_with_encrypt_policy_without_mfa.yml

Lines changed: 0 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -48,24 +48,12 @@ tags:
4848
analytic_story:
4949
- Ransomware Cloud
5050
asset_type: AWS Account
51-
confidence: 50
52-
impact: 50
53-
message: AWS account is potentially compromised and user $user$ is trying to compromise other accounts.
5451
mitre_attack_id:
5552
- T1486
5653
product:
5754
- Splunk Enterprise
5855
- Splunk Enterprise Security
5956
- Splunk Cloud
60-
required_fields:
61-
- api.operation
62-
- actor.user.uid
63-
- actor.user.account.uid
64-
- api.request.data
65-
- http_request.user_agent
66-
- src_endpoint.ip
67-
- src_endpoint.domain
68-
- cloud.region
6957
security_domain: threat
7058
tests:
7159
- name: True Positive Test

detections/cloud/asl_aws_disable_bucket_versioning.yml

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -44,23 +44,12 @@ tags:
4444
- Suspicious AWS S3 Activities
4545
- Data Exfiltration
4646
asset_type: AWS Account
47-
confidence: 80
48-
impact: 80
4947
mitre_attack_id:
5048
- T1490
5149
product:
5250
- Splunk Enterprise
5351
- Splunk Enterprise Security
5452
- Splunk Cloud
55-
required_fields:
56-
- api.operation
57-
- actor.user.uid
58-
- actor.user.account.uid
59-
- api.request.data
60-
- http_request.user_agent
61-
- src_endpoint.ip
62-
- src_endpoint.domain
63-
- cloud.region
6453
security_domain: threat
6554
tests:
6655
- name: True Positive Test

detections/cloud/asl_aws_ec2_snapshot_shared_externally.yml

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -44,23 +44,12 @@ tags:
4444
- Suspicious Cloud Instance Activities
4545
- Data Exfiltration
4646
asset_type: EC2 Snapshot
47-
confidence: 80
48-
impact: 60
4947
mitre_attack_id:
5048
- T1537
5149
product:
5250
- Splunk Enterprise
5351
- Splunk Enterprise Security
5452
- Splunk Cloud
55-
required_fields:
56-
- api.operation
57-
- actor.user.uid
58-
- actor.user.account.uid
59-
- api.request.data
60-
- http_request.user_agent
61-
- src_endpoint.ip
62-
- src_endpoint.domain
63-
- cloud.region
6453
security_domain: threat
6554
tests:
6655
- name: True Positive Test

detections/cloud/asl_aws_iam_accessdenied_discovery_events.yml

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -41,19 +41,12 @@ tags:
4141
analytic_story:
4242
- Suspicious Cloud User Activities
4343
asset_type: AWS Account
44-
confidence: 50
45-
impact: 20
4644
mitre_attack_id:
4745
- T1580
4846
product:
4947
- Splunk Enterprise
5048
- Splunk Enterprise Security
5149
- Splunk Cloud
52-
required_fields:
53-
- api.operation
54-
- actor.user.uid
55-
- src_endpoint.ip
56-
- cloud.region
5750
security_domain: access
5851
tests:
5952
- name: True Positive Test

detections/cloud/asl_aws_iam_assume_role_policy_brute_force.yml

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -42,21 +42,13 @@ tags:
4242
analytic_story:
4343
- AWS IAM Privilege Escalation
4444
asset_type: AWS Account
45-
confidence: 70
46-
impact: 40
4745
mitre_attack_id:
4846
- T1580
4947
- T1110
5048
product:
5149
- Splunk Enterprise
5250
- Splunk Enterprise Security
5351
- Splunk Cloud
54-
required_fields:
55-
- _time
56-
- api.operation
57-
- actor.user.uid
58-
- src_endpoint.ip
59-
- cloud.region
6052
security_domain: access
6153
tests:
6254
- name: True Positive Test

0 commit comments

Comments
 (0)