-
Notifications
You must be signed in to change notification settings - Fork 375
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #2910 from splunk/gitlab_release_v4.15.0
Gitlab release v4.15.0
- Loading branch information
Showing
159 changed files
with
3,249 additions
and
1,562 deletions.
There are no files selected for viewing
Submodule contentctl
added at
48c1c2
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
build: | ||
#Temporary fix to support testing. The following | ||
#line will be reverted soon | ||
title: DA-ESS-ContentUpdate | ||
name: DA-ESS-ContentUpdate | ||
path_root: dist | ||
prefix: ESCU | ||
build: 004150 | ||
version: 4.15.0 | ||
label: ES Content Updates | ||
author_name: Splunk Threat Research Team | ||
author_email: research@splunk.com | ||
author_company: Splunk | ||
description: Explore the Analytic Stories included with ES Content Updates. | ||
splunk_app: {} | ||
json_objects: null | ||
ba_objects: null | ||
build_ssa: | ||
path_root: 'dist/ssa' | ||
build_api: | ||
path_root: 'dist/api' | ||
enrichments: | ||
attack_enrichment: true | ||
cve_enrichment: true | ||
splunk_app_enrichment: false |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,70 @@ | ||
version_control_config: {} | ||
infrastructure_config: | ||
infrastructure_type: container | ||
full_image_path: registry.hub.docker.com/splunk/splunk:latest | ||
post_test_behavior: always_pause | ||
mode: all | ||
detections_list: null | ||
splunkbase_username: null | ||
splunkbase_password: null | ||
apps: | ||
- uid: 6176 | ||
appid: Splunk_TA_linux_sysmon | ||
title: Add-on for Linux Sysmon | ||
description: null | ||
release: 1.0.4 | ||
local_path: null | ||
http_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/Latest/add-on-for-linux-sysmon_104.tgz | ||
splunkbase_path: null | ||
environment_path: ENVIRONMENT_PATH_NOT_SET | ||
force_local: false | ||
- uid: 742 | ||
appid: Splunk_TA_windows | ||
title: Splunk Add-on for Microsoft Windows | ||
description: null | ||
release: 8.5.0 | ||
local_path: null | ||
http_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/Latest/splunk-add-on-for-microsoft-windows_850_PATCHED.tgz | ||
splunkbase_path: null | ||
environment_path: ENVIRONMENT_PATH_NOT_SET | ||
force_local: false | ||
- uid: 5709 | ||
appid: Splunk_TA_microsoft_sysmon | ||
title: Splunk Add-on for Sysmon | ||
description: null | ||
release: 3.0.0 | ||
local_path: null | ||
http_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/Latest/splunk-add-on-for-sysmon_300.tgz | ||
splunkbase_path: null | ||
environment_path: ENVIRONMENT_PATH_NOT_SET | ||
force_local: false | ||
- uid: 833 | ||
appid: Splunk_TA_nix | ||
title: Splunk Add-on for Unix and Linux | ||
description: null | ||
release: 8.7.0 | ||
local_path: null | ||
http_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/Latest/splunk-add-on-for-unix-and-linux_860.tgz | ||
splunkbase_path: null | ||
environment_path: ENVIRONMENT_PATH_NOT_SET | ||
force_local: false | ||
- uid: 2734 | ||
appid: utbox | ||
title: URL Toolbox | ||
description: null | ||
release: 1.9.2 | ||
local_path: null | ||
http_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/Latest/url-toolbox_192.tgz | ||
splunkbase_path: null | ||
environment_path: ENVIRONMENT_PATH_NOT_SET | ||
force_local: false | ||
- uid: 1621 | ||
appid: Splunk_SA_CIM | ||
title: Splunk Common Information Model (CIM) | ||
description: null | ||
release: 5.0.2 | ||
local_path: null | ||
http_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/Latest/splunk-common-information-model-cim_501.tgz | ||
splunkbase_path: null | ||
environment_path: ENVIRONMENT_PATH_NOT_SET | ||
force_local: false |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -41,6 +41,7 @@ tags: | |
- Qakbot | ||
- Azorult | ||
- Remcos | ||
- PlugX | ||
asset_type: Endpoint | ||
confidence: 50 | ||
impact: 70 | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
57 changes: 57 additions & 0 deletions
57
dev_ssa/endpoint/ssa___detect_prohibited_applications_spawning_cmd_exe_browsers.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
name: Detect Prohibited Applications Spawning cmd exe browsers | ||
id: c10a18cb-fd70-4ffa-a844-25026e0a0c94 | ||
version: 1 | ||
date: '2023-10-26' | ||
author: Lou Stella, Splunk | ||
status: validation | ||
type: Anomaly | ||
description: The following analytic identifies parent processes that are browsers, spawning cmd.exe. By its very nature, | ||
many applications spawn cmd.exe natively or built into macros. Much of this will | ||
need to be tuned to further enhance the risk. | ||
data_source: | ||
- Windows Security 4688 | ||
search: | ||
selection1: | ||
actor.process.file.name: | ||
- iexplore.exe | ||
- opera.exe | ||
- firefox.exe | ||
selection2: | ||
actor.process.file.name: chrome.exe | ||
selection3: | ||
process.cmd_line: chrome-extension | ||
selection4: | ||
process.file.name: cmd.exe | ||
condition: ((selection1) or (selection2 and not selection3)) and selection4 | ||
how_to_implement: In order to successfully implement this analytic, you will need | ||
endpoint process data from a EDR product or Sysmon. This search has been modified | ||
to process raw sysmon data from attack_range's nxlogs on DSP. | ||
known_false_positives: There are circumstances where an application may legitimately | ||
execute and interact with the Windows command-line interface. | ||
references: | ||
- https://attack.mitre.org/techniques/T1059/ | ||
tags: | ||
analytic_story: | ||
- Suspicious Command-Line Executions | ||
- Insider Threat | ||
asset_type: Endpoint | ||
confidence: 50 | ||
impact: 70 | ||
message: An instance of $parent_process_name$ spawning $process_name$ was identified | ||
on endpoint $dest_device_id$ by user $dest_user_id$, producing a suspicious event | ||
that warrants investigating. | ||
mitre_attack_id: | ||
- T1059 | ||
observable: [] | ||
product: | ||
- Splunk Behavioral Analytics | ||
required_fields: [] | ||
kill_chain_phases: | ||
- Exploitation | ||
risk_score: 35 | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.003/ssa_validation/browsers/windows-security.log | ||
source: WinEventLog:Security |
55 changes: 55 additions & 0 deletions
55
dev_ssa/endpoint/ssa___detect_prohibited_applications_spawning_cmd_exe_office.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
name: Detect Prohibited Applications Spawning cmd exe office | ||
id: c10a18cb-fd70-4ffa-a844-25026e0b0c94 | ||
version: 1 | ||
date: '2023-10-26' | ||
author: Lou Stella, Splunk | ||
status: validation | ||
type: Anomaly | ||
description: The following analytic identifies parent processes that are office/productivity applications, spawning cmd.exe. By its very nature, | ||
many applications spawn cmd.exe natively or built into macros. Much of this will | ||
need to be tuned to further enhance the risk. | ||
data_source: | ||
- Windows Security 4688 | ||
search: | ||
selection1: | ||
actor.process.file.name: | ||
- winword.exe | ||
- excel.exe | ||
- outlook.exe | ||
- acrobat.exe | ||
- acrord32.exe | ||
selection2: | ||
process.file.name: cmd.exe | ||
condition: selection1 and selection2 | ||
how_to_implement: In order to successfully implement this analytic, you will need | ||
endpoint process data from a EDR product or Sysmon. This search has been modified | ||
to process raw sysmon data from attack_range's nxlogs on DSP. | ||
known_false_positives: There are circumstances where an application may legitimately | ||
execute and interact with the Windows command-line interface. | ||
references: | ||
- https://attack.mitre.org/techniques/T1059/ | ||
tags: | ||
analytic_story: | ||
- Suspicious Command-Line Executions | ||
- Insider Threat | ||
asset_type: Endpoint | ||
confidence: 50 | ||
impact: 70 | ||
message: An instance of $parent_process_name$ spawning $process_name$ was identified | ||
on endpoint $dest_device_id$ by user $dest_user_id$, producing a suspicious event | ||
that warrants investigating. | ||
mitre_attack_id: | ||
- T1059 | ||
observable: [] | ||
product: | ||
- Splunk Behavioral Analytics | ||
required_fields: [] | ||
kill_chain_phases: | ||
- Exploitation | ||
risk_score: 35 | ||
security_domain: endpoint | ||
tests: | ||
- name: True Positive Test | ||
attack_data: | ||
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.003/ssa_validation/office/windows-security.log | ||
source: WinEventLog:Security |
Oops, something went wrong.