Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
name: Cobalt Strike Named Pipes
id: 5876d429-0240-4709-8b93-ea8330b411b5
version: 13
date: '2025-11-18'
date: '2025-12-04'
author: Michael Haag, Splunk
status: production
status: deprecated
type: TTP
description: The following analytic detects the use of default or publicly known named
pipes associated with Cobalt Strike. It leverages Sysmon EventID 17 and 18 to identify
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Access Token Manipulation SeDebugPrivilege
id: 6ece9ed0-5f92-4315-889d-48560472b188
version: 17
date: '2025-10-14'
version: 18
date: '2025-12-04'
author: Teoderick Contreras, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -73,6 +73,7 @@ tags:
- GhostRedirector IIS Module and Rungan Backdoor
- Lokibot
- Scattered Lapsus$ Hunters
- Tuoni
asset_type: Endpoint
mitre_attack_id:
- T1134.002
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Cmdline Tool Execution From Non-Shell Process
id: 2afa393f-b88d-41b7-9793-623c93a2dfde
version: 7
date: '2025-05-06'
version: 8
date: '2025-12-04'
author: Teoderick Contreras, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -91,6 +91,7 @@ tags:
- Volt Typhoon
- FIN7
- Water Gamayun
- Tuoni
asset_type: Endpoint
mitre_attack_id:
- T1059.007
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows File Download Via PowerShell
id: 58c4e56c-b5b8-46a3-b5fb-6537dca3c6de
version: 5
date: '2025-11-25'
date: '2025-12-04'
author: Michael Haag, Nasreddine Bencherchali, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -107,6 +107,7 @@ tags:
- SysAid On-Prem Software CVE-2023-47246 Vulnerability
- Winter Vivern
- XWorm
- Tuoni
asset_type: Endpoint
mitre_attack_id:
- T1059.001
Expand Down
112 changes: 112 additions & 0 deletions detections/endpoint/windows_pua_named_pipe.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,112 @@
name: Windows PUA Named Pipe
id: 95b11d20-e2c6-46a5-b526-8629f5f0860a
version: 1
date: '2025-12-05'
author: Raven Tait, Splunk
status: production
type: Anomaly
description: |
The following analytic detects the creation or connection to named pipes used by potentially unwanted applications (PUAs) like VPNs or utilities like PsExec.
It leverages Sysmon EventCodes 17 and 18.
If confirmed malicious, this could allow an attacker to abuse these to potentially gain persistence, command and control, or further system compromise.
data_source:
- Sysmon EventID 17
- Sysmon EventID 18
search: |
`sysmon`
(EventCode=17 OR EventCode=18)
NOT process_path IN (
"*:\\Program Files \(x86\)\\Adobe*",
"*:\\Program Files \(x86\)\\Google*",
"*:\\Program Files \(x86\)\\Microsoft*",
"*:\\Program Files\\Adobe*",
"*:\\Program Files\\dotnet\\dotnet.exe",
"*:\\Program Files\\Google*",
"*:\\Program Files\\Microsoft*",
"*:\\Windows\\system32\\SearchIndexer.exe",
"*:\\Windows\\System32\\svchost.exe",
"*:\\Windows\\SystemApps\\Microsoft*",
"*\\Amazon\\SSM\\Instance*",
"*\\AppData\\Local\\Google*",
"*\\AppData\\Local\\Kingsoft\\*",
"*\\AppData\\Local\\Microsoft*",
"System"
)

| stats min(_time) as firstTime max(_time) as lastTime
count by dest dvc process_exec process_guid process_id process_path signature signature_id
vendor_product pipe_name user_id Image process_name

| lookup pua_named_pipes pua_pipe_name AS pipe_name OUTPUT tool, description
| where isnotnull(tool)
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `windows_pua_named_pipe_filter`
how_to_implement: |
To successfully implement this search, you need to be ingesting
logs with the process name and pipename from your endpoints. If you are using Sysmon,
you must have at least version 6.0.4 of the Sysmon TA.
known_false_positives: |
PUAs can be used in a legitimate manner. Therefore, some of the named pipes identified and added may cause false positives.
Filter by process name or pipe name to reduce false positives.
references:
- https://attack.mitre.org/techniques/T1218/009/
- https://docs.microsoft.com/en-us/windows/win32/ipc/named-pipes
drilldown_searches:
- name: View the detection results for - "$dest$"
search: '%original_detection_search% | search dest = "$dest$"'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
- name: View risk events for the last 7 days for - "$dest$"
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$")
starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime
values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories)
as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic)
as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
rba:
message: An instance of $process_name$ located in $process_path$ was identified on endpoint $dest$ accessing
known named pipe $pipe_name$ from a potentially unwanted application in your environment.
risk_objects:
- field: dest
type: system
score: 72
threat_objects:
- field: process_name
type: process_name
tags:
analytic_story:
- Active Directory Lateral Movement
- BlackByte Ransomware
- Cactus Ransomware
- CISA AA22-320A
- DarkGate Malware
- DarkSide Ransomware
- DHS Report TA18-074A
- HAFNIUM Group
- IcedID
- Medusa Ransomware
- Rhysida Ransomware
- SamSam Ransomware
- Sandworm Tools
- Seashell Blizzard
- VanHelsing Ransomware
- Volt Typhoon
asset_type: Endpoint
mitre_attack_id:
- T1559
- T1021.002
- T1055
product:
- Splunk Enterprise
- Splunk Enterprise Security
- Splunk Cloud
security_domain: endpoint
tests:
- name: True Positive Test
attack_data:
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1055/named_pipes/windows-sysmon.log
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
sourcetype: XmlWinEventLog
108 changes: 108 additions & 0 deletions detections/endpoint/windows_rmm_named_pipe.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,108 @@
name: Windows RMM Named Pipe
id: c07c7138-edf5-4a16-8b24-3842599235bf
version: 1
date: '2025-12-05'
author: Raven Tait, Splunk
status: production
type: Anomaly
description: |
The following analytic detects the creation or connection to known suspicious named pipes, which is a technique often used by offensive tools.
It leverages Sysmon EventCodes 17 and 18 to identify known default pipe names used by RMM tools.
If confirmed malicious, this could allow an attacker to abuse these to potentially gain persistence, command and control, or further system compromise.
data_source:
- Sysmon EventID 17
- Sysmon EventID 18
search: |
`sysmon`
(EventCode=17 OR EventCode=18)
NOT process_path IN (
"*:\\Program Files \(x86\)\\Adobe*",
"*:\\Program Files \(x86\)\\Google*",
"*:\\Program Files \(x86\)\\Microsoft*",
"*:\\Program Files\\Adobe*",
"*:\\Program Files\\Google*",
"*:\\Program Files\\Microsoft*",
"*:\\Windows\\system32\\SearchIndexer.exe",
"*:\\Windows\\System32\\svchost.exe",
"*:\\Windows\\SystemApps\\Microsoft*",
"*\\Amazon\\SSM\\Instance*",
"*\\AppData\\Local\\Google*",
"*\\AppData\\Local\\Kingsoft\\*",
"*\\AppData\\Local\\Microsoft*",
"System"
)

| stats min(_time) as firstTime max(_time) as lastTime
count by dest dvc process_exec process_guid process_id process_path signature signature_id
vendor_product pipe_name user_id Image process_name

| lookup suspicious_rmm_named_pipes suspicious_pipe_name AS pipe_name OUTPUT tool, description
| where isnotnull(tool)
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
| `windows_rmm_named_pipe_filter`
how_to_implement: |
To successfully implement this search, you need to be ingesting
logs with the process name and pipename from your endpoints. If you are using Sysmon,
you must have at least version 6.0.4 of the Sysmon TA.
known_false_positives: |
Some false positives may occur from RMM software used in your environment. Apply filters
based on known legitimate RMM software in your environment to reduce false positives.
references:
- https://attack.mitre.org/techniques/T1218/009/
- https://docs.microsoft.com/en-us/windows/win32/ipc/named-pipes
drilldown_searches:
- name: View the detection results for - "$dest$"
search: '%original_detection_search% | search dest = "$dest$"'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
- name: View risk events for the last 7 days for - "$dest$"
search: '| from datamodel Risk.All_Risk | search normalized_risk_object IN ("$dest$")
starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime
values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories)
as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic)
as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`'
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
rba:
message: An instance of $process_name$ located in $process_path$ was identified on endpoint $dest$ accessing
known RMM named pipe $pipe_name$.
risk_objects:
- field: dest
type: system
score: 52
threat_objects:
- field: process_name
type: process_name
tags:
analytic_story:
- Cactus Ransomware
- CISA AA24-241A
- Command And Control
- GhostRedirector IIS Module and Rungan Backdoor
- Gozi Malware
- Insider Threat
- Interlock Ransomware
- Ransomware
- Remote Monitoring and Management Software
- Scattered Lapsus$ Hunters
- Scattered Spider
- Seashell Blizzard
asset_type: Endpoint
mitre_attack_id:
- T1559
- T1021.002
- T1055
product:
- Splunk Enterprise
- Splunk Enterprise Security
- Splunk Cloud
security_domain: endpoint
tests:
- name: True Positive Test
attack_data:
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1055/named_pipes/windows-sysmon.log
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
sourcetype: XmlWinEventLog

Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Windows Service Created with Suspicious Service Name
id: 35eb6d19-a497-400c-93c5-645562804b11
version: 3
date: '2025-05-02'
version: 4
date: '2025-12-04'
author: Steven Dick
status: production
type: Anomaly
Expand Down Expand Up @@ -59,6 +59,7 @@ tags:
- PlugX
- Qakbot
- Snake Malware
- Tuoni
asset_type: Endpoint
mitre_attack_id:
- T1569.002
Expand Down
Loading