Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
105 commits
Select commit Hold shift + click to select a range
bc09282
auditd_sourcetype_update
tccontre Sep 24, 2024
7cbc846
Branch was auto-updated.
patel-bhavin Sep 24, 2024
3b3c0da
auditd_sourcetype_update
tccontre Sep 25, 2024
14b4b9f
Branch was auto-updated.
patel-bhavin Sep 25, 2024
600634d
Branch was auto-updated.
patel-bhavin Sep 25, 2024
d4133da
Branch was auto-updated.
patel-bhavin Oct 3, 2024
83cf299
Branch was auto-updated.
patel-bhavin Oct 9, 2024
3bb12f9
Branch was auto-updated.
patel-bhavin Oct 9, 2024
a558159
Branch was auto-updated.
patel-bhavin Oct 10, 2024
e224b57
Branch was auto-updated.
patel-bhavin Oct 10, 2024
ab7c689
Branch was auto-updated.
patel-bhavin Oct 10, 2024
d8e80df
Branch was auto-updated.
patel-bhavin Oct 15, 2024
1466895
Branch was auto-updated.
patel-bhavin Oct 15, 2024
354610a
Branch was auto-updated.
patel-bhavin Oct 15, 2024
42eb1a5
Branch was auto-updated.
patel-bhavin Oct 16, 2024
96841dd
Branch was auto-updated.
patel-bhavin Oct 16, 2024
319ed10
Branch was auto-updated.
patel-bhavin Oct 16, 2024
a23b538
Branch was auto-updated.
patel-bhavin Oct 17, 2024
312a145
Branch was auto-updated.
patel-bhavin Oct 22, 2024
8a1e99c
Branch was auto-updated.
patel-bhavin Oct 22, 2024
5b03faf
Branch was auto-updated.
patel-bhavin Oct 23, 2024
21efb02
Branch was auto-updated.
patel-bhavin Oct 23, 2024
851d065
Branch was auto-updated.
patel-bhavin Oct 24, 2024
92a9f3b
Branch was auto-updated.
patel-bhavin Oct 28, 2024
06f5969
Branch was auto-updated.
patel-bhavin Oct 29, 2024
dcf0a3b
Branch was auto-updated.
patel-bhavin Oct 29, 2024
4b7c0c3
Branch was auto-updated.
patel-bhavin Oct 31, 2024
d2965ee
Branch was auto-updated.
patel-bhavin Oct 31, 2024
c1f5bdf
Branch was auto-updated.
patel-bhavin Oct 31, 2024
b7fa8ec
Branch was auto-updated.
patel-bhavin Oct 31, 2024
d936b3c
Branch was auto-updated.
patel-bhavin Nov 1, 2024
b0ffdba
Branch was auto-updated.
patel-bhavin Nov 1, 2024
500f5d8
Branch was auto-updated.
patel-bhavin Nov 1, 2024
373fc09
Branch was auto-updated.
patel-bhavin Nov 1, 2024
0a9bb4d
Branch was auto-updated.
patel-bhavin Nov 4, 2024
c05ecb8
Branch was auto-updated.
patel-bhavin Nov 6, 2024
e06b2da
Branch was auto-updated.
patel-bhavin Nov 6, 2024
cf99fac
Branch was auto-updated.
patel-bhavin Nov 6, 2024
eca59f0
Branch was auto-updated.
patel-bhavin Nov 6, 2024
b9c6533
Branch was auto-updated.
patel-bhavin Nov 6, 2024
55645ae
Branch was auto-updated.
patel-bhavin Nov 6, 2024
c6bf257
Branch was auto-updated.
patel-bhavin Nov 7, 2024
1b1c7d9
Branch was auto-updated.
patel-bhavin Nov 7, 2024
212bb12
Branch was auto-updated.
patel-bhavin Nov 7, 2024
baffbd4
Branch was auto-updated.
patel-bhavin Nov 7, 2024
f6146d6
Branch was auto-updated.
patel-bhavin Nov 12, 2024
60e1cfa
Branch was auto-updated.
patel-bhavin Nov 12, 2024
3a75334
Branch was auto-updated.
patel-bhavin Nov 14, 2024
7315970
Branch was auto-updated.
patel-bhavin Nov 14, 2024
405c6e6
Branch was auto-updated.
patel-bhavin Nov 14, 2024
30fae6b
Branch was auto-updated.
patel-bhavin Nov 14, 2024
05ed9db
Branch was auto-updated.
patel-bhavin Nov 19, 2024
49096d9
Branch was auto-updated.
patel-bhavin Nov 19, 2024
9ac608a
Branch was auto-updated.
patel-bhavin Nov 19, 2024
f026234
Branch was auto-updated.
patel-bhavin Nov 20, 2024
170e119
Branch was auto-updated.
patel-bhavin Nov 20, 2024
bce2482
Branch was auto-updated.
patel-bhavin Dec 2, 2024
99689c0
Branch was auto-updated.
patel-bhavin Dec 2, 2024
f7e35ae
Branch was auto-updated.
patel-bhavin Dec 2, 2024
06a356c
Branch was auto-updated.
patel-bhavin Dec 3, 2024
ac34d12
Branch was auto-updated.
patel-bhavin Dec 3, 2024
1ced58e
Branch was auto-updated.
patel-bhavin Dec 3, 2024
ed95bea
Branch was auto-updated.
patel-bhavin Dec 3, 2024
9d996d5
Branch was auto-updated.
patel-bhavin Dec 3, 2024
1b68a7d
Branch was auto-updated.
patel-bhavin Dec 9, 2024
86d303e
Branch was auto-updated.
patel-bhavin Dec 10, 2024
4dabd5d
Merge branch 'develop' into auditd_sourcetype_update
nasbench Jan 14, 2025
a7fb1c4
Branch was auto-updated.
patel-bhavin Jan 14, 2025
9c937ce
Branch was auto-updated.
patel-bhavin Jan 14, 2025
9b1c183
Merge branch 'develop' into auditd_sourcetype_update
ljstella Feb 18, 2025
f909be7
updating sourcetype, version and date
patel-bhavin Feb 18, 2025
a761716
Merge branch 'develop' into auditd_sourcetype_update
patel-bhavin Feb 18, 2025
7f64fe3
Merge branch 'develop' into auditd_sourcetype_update
patel-bhavin Feb 19, 2025
6f88528
Merge branch 'develop' into auditd_sourcetype_update
patel-bhavin Feb 19, 2025
7f09aa9
auditd_detection_updates
t-contreras Feb 20, 2025
3490fc0
auditd_detection_updates
t-contreras Feb 20, 2025
9743a1b
auditd_detection_updates
t-contreras Feb 20, 2025
23c36c3
auditd_detection_updates
t-contreras Feb 20, 2025
37f16f5
auditd_detection_updates
t-contreras Feb 20, 2025
75b2d71
auditd_detection_updates
t-contreras Feb 20, 2025
baaab64
auditd_detection_updates
t-contreras Feb 20, 2025
ff28372
auditd_detection_updates
t-contreras Feb 20, 2025
8e3d03c
auditd_detection_updates
t-contreras Feb 20, 2025
6ae3bcf
Update data_sources/linux_auditd_add_user.yml
tccontre Feb 21, 2025
64fcd2a
Update detections/endpoint/linux_auditd_change_file_owner_to_root.yml
tccontre Feb 21, 2025
28f4384
Update detections/endpoint/linux_auditd_edit_cron_table_parameter.yml
tccontre Feb 21, 2025
6baa8d0
Update detections/endpoint/linux_auditd_osquery_service_stop.yml
tccontre Feb 21, 2025
9697f1e
auditd_detection_updates
t-contreras Feb 21, 2025
26b65f5
Merge branch 'auditd_sourcetype_update' of https://github.com/splunk/…
t-contreras Feb 21, 2025
b284853
Update linux_auditd_add_user.yml
tccontre Feb 21, 2025
649cc56
Update linux_auditd_execve.yml
tccontre Feb 21, 2025
5f935a6
Update linux_auditd_path.yml
tccontre Feb 21, 2025
f9accd9
Update linux_auditd_proctitle.yml
tccontre Feb 21, 2025
b1032d7
Update linux_auditd_service_stop.yml
tccontre Feb 21, 2025
9614dcd
Update linux_auditd_syscall.yml
tccontre Feb 21, 2025
6869ca9
Merge branch 'develop' into auditd_detection_updates
nasbench Feb 21, 2025
5c4abbc
auditd_detection_updates
t-contreras Feb 24, 2025
3b5dd65
auditd_detection_updates
t-contreras Feb 24, 2025
a856da5
auditd_detection_updates
t-contreras Feb 24, 2025
b83eb77
auditd_detection_updates
t-contreras Feb 26, 2025
fb67c4f
auditd_detection_updates
t-contreras Feb 26, 2025
52ad8c4
Merge branch 'develop' into auditd_detection_updates
patel-bhavin Feb 26, 2025
4fe79f3
Merge branch 'develop' into auditd_detection_updates
patel-bhavin Feb 26, 2025
aabdf4f
status deprecated
patel-bhavin Feb 27, 2025
99871b5
auditd_detection_updates
t-contreras Feb 27, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions data_sources/linux_auditd_add_user.yml
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
name: Linux Auditd Add User
id: 30f79353-e1d2-4585-8735-1e0359559f3f
version: 1
date: '2024-08-08'
version: 2
date: '2025-02-20'
author: Teoderick Contreras, Splunk
description: Data source object for Linux Auditd Add User Type
source: /var/log/audit/audit.log
sourcetype: linux:audit
source: auditd
sourcetype: auditd
configuration: https://github.com/Neo23x0/auditd/blob/master/audit.rules
supported_TA:
- name: Splunk Add-on for Unix and Linux
Expand Down
8 changes: 4 additions & 4 deletions data_sources/linux_auditd_execve.yml
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
name: Linux Auditd Execve
id: 9ef6364d-cc67-480e-8448-3306829a6a24
version: 1
date: '2024-08-08'
version: 2
date: '2025-02-20'
author: Teoderick Contreras, Splunk
description: Data source object for Linux Auditd Execve Type
source: /var/log/audit/audit.log
sourcetype: linux:audit
source: auditd
sourcetype: auditd
configuration: https://github.com/Neo23x0/auditd/blob/master/audit.rules
supported_TA:
- name: Splunk Add-on for Unix and Linux
Expand Down
8 changes: 4 additions & 4 deletions data_sources/linux_auditd_path.yml
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
name: Linux Auditd Path
id: 3d86125c-0496-4a5a-aae3-0d355a4f3d7d
version: 1
date: '2024-08-08'
version: 2
date: '2025-02-20'
author: Teoderick Contreras, Splunk
description: Data source object for Linux Auditd Path Type
source: /var/log/audit/audit.log
sourcetype: linux:audit
source: auditd
sourcetype: auditd
configuration: https://github.com/Neo23x0/auditd/blob/master/audit.rules
supported_TA:
- name: Splunk Add-on for Unix and Linux
Expand Down
8 changes: 4 additions & 4 deletions data_sources/linux_auditd_proctitle.yml
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
name: Linux Auditd Proctitle
id: 5a25984a-2789-400a-858b-d75c923e06b1
version: 1
date: '2024-08-08'
version: 2
date: '2025-02-20'
author: Teoderick Contreras, Splunk
description: Data source object for Linux Auditd Proctitle Type
source: /var/log/audit/audit.log
sourcetype: linux:audit
source: auditd
sourcetype: auditd
configuration: https://github.com/Neo23x0/auditd/blob/master/audit.rules
supported_TA:
- name: Splunk Add-on for Unix and Linux
Expand Down
8 changes: 4 additions & 4 deletions data_sources/linux_auditd_service_stop.yml
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
name: Linux Auditd Service Stop
id: 0643483c-bc62-455c-8d6e-1630e5f0e00d
version: 1
date: '2024-08-08'
version: 2
date: '2025-02-20'
author: Teoderick Contreras, Splunk
description: Data source object for Linux Auditd Service Stop Type
source: /var/log/audit/audit.log
sourcetype: linux:audit
source: auditd
sourcetype: auditd
configuration: https://github.com/Neo23x0/auditd/blob/master/audit.rules
supported_TA:
- name: Splunk Add-on for Unix and Linux
Expand Down
8 changes: 4 additions & 4 deletions data_sources/linux_auditd_syscall.yml
Original file line number Diff line number Diff line change
@@ -1,11 +1,11 @@
name: Linux Auditd Syscall
id: 4dff7047-0d43-4096-bb3f-b756c889bbad
version: 1
date: '2024-08-08'
version: 2
date: '2025-02-20'
author: Teoderick Contreras, Splunk
description: Data source object for Linux Auditd Syscall Type
source: /var/log/audit/audit.log
sourcetype: linux:audit
source: auditd
sourcetype: auditd
configuration: https://github.com/Neo23x0/auditd/blob/master/audit.rules
supported_TA:
- name: Splunk Add-on for Unix and Linux
Expand Down
23 changes: 11 additions & 12 deletions detections/endpoint/any_powershell_downloadfile.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Any Powershell DownloadFile
id: 1a93b7ea-7af7-11eb-adb5-acde48001122
version: 11
date: '2025-02-10'
version: '12'
date: '2025-02-24'
author: Michael Haag, Splunk
status: production
type: TTP
Expand Down Expand Up @@ -71,18 +71,18 @@ rba:
type: process_name
tags:
analytic_story:
- Data Destruction
- Ingress Tool Transfer
- China-Nexus Threat Activity
- Crypto Stealer
- Hermetic Wiper
- DarkCrystal RAT
- PXA Stealer
- Braodo Stealer
- Phemedrone Stealer
- Log4Shell CVE-2021-44228
- Malicious PowerShell
- Hermetic Wiper
- Crypto Stealer
- Nexus APT Threat Activity
- Earth Estries
- Phemedrone Stealer
- Braodo Stealer
- PXA Stealer
- Data Destruction
- Log4Shell CVE-2021-44228
asset_type: Endpoint
cve:
- CVE-2021-44228
Expand All @@ -97,7 +97,6 @@ tags:
tests:
- name: True Positive Test
attack_data:
- data:
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.001/atomic_red_team/windows-sysmon.log
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1059.001/atomic_red_team/windows-sysmon.log
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
sourcetype: XmlWinEventLog
19 changes: 9 additions & 10 deletions detections/endpoint/detect_renamed_psexec.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Detect Renamed PSExec
id: 683e6196-b8e8-11eb-9a79-acde48001122
version: 11
date: '2025-02-10'
version: '12'
date: '2025-02-24'
author: Michael Haag, Splunk, Alex Oberkircher, Github Community
status: production
type: Hunting
Expand Down Expand Up @@ -39,18 +39,18 @@ references:
- https://redcanary.com/blog/threat-hunting-psexec-lateral-movement/
tags:
analytic_story:
- China-Nexus Threat Activity
- BlackByte Ransomware
- HAFNIUM Group
- DHS Report TA18-074A
- DarkSide Ransomware
- SamSam Ransomware
- CISA AA22-320A
- HAFNIUM Group
- Sandworm Tools
- DarkSide Ransomware
- Active Directory Lateral Movement
- Nexus APT Threat Activity
- DarkGate Malware
- Earth Estries
- Sandworm Tools
- Rhysida Ransomware
- Earth Estries
- SamSam Ransomware
asset_type: Endpoint
mitre_attack_id:
- T1569.002
Expand All @@ -62,7 +62,6 @@ tags:
tests:
- name: True Positive Test
attack_data:
- data:
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1569.002/atomic_red_team/windows-sysmon.log
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1569.002/atomic_red_team/windows-sysmon.log
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
sourcetype: XmlWinEventLog
11 changes: 5 additions & 6 deletions detections/endpoint/detect_renamed_winrar.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Detect Renamed WinRAR
id: 1b7bfb2c-b8e6-11eb-99ac-acde48001122
version: 9
date: '2025-02-10'
version: '10'
date: '2025-02-24'
author: Michael Haag, Splunk
status: production
type: Hunting
Expand Down Expand Up @@ -38,10 +38,10 @@ references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1560.001/T1560.001.md
tags:
analytic_story:
- China-Nexus Threat Activity
- CISA AA22-277A
- Collection and Staging
- Earth Estries
- Nexus APT Threat Activity
- CISA AA22-277A
asset_type: Endpoint
mitre_attack_id:
- T1560.001
Expand All @@ -53,7 +53,6 @@ tags:
tests:
- name: True Positive Test
attack_data:
- data:
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1560.001/archive_utility/windows-sysmon.log
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1560.001/archive_utility/windows-sysmon.log
source: XmlWinEventLog:Microsoft-Windows-Sysmon/Operational
sourcetype: XmlWinEventLog
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Executables Or Script Creation In Suspicious Path
id: a7e3f0f0-ae42-11eb-b245-acde48001122
version: 10
date: '2025-01-27'
version: '11'
date: '2025-02-24'
author: Teoderick Contreras, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -61,46 +61,46 @@ rba:
type: file_name
tags:
analytic_story:
- Chaos Ransomware
- BlackByte Ransomware
- Brute Ratel C4
- Trickbot
- Snake Keylogger
- CISA AA23-347A
- Industroyer2
- WinDealer RAT
- Qakbot
- Graceful Wipe Out Attack
- PlugX
- Handala Wiper
- Earth Estries
- Warzone RAT
- IcedID
- ValleyRAT
- Azorult
- Handala Wiper
- NjRAT
- LockBit Ransomware
- Meduza Stealer
- Brute Ratel C4
- Double Zero Destructor
- Swift Slicer
- DarkCrystal RAT
- AsyncRAT
- AcidPour
- Volt Typhoon
- Chaos Ransomware
- Hermetic Wiper
- Derusbi
- DarkGate Malware
- Graceful Wipe Out Attack
- NjRAT
- WhisperGate
- Data Destruction
- BlackByte Ransomware
- XMRig
- AgentTesla
- Swift Slicer
- WinDealer RAT
- RedLine Stealer
- Remcos
- Rhysida Ransomware
- China-Nexus Threat Activity
- Crypto Stealer
- Hermetic Wiper
- Qakbot
- IcedID
- Meduza Stealer
- AcidPour
- MoonPeak
- Double Zero Destructor
- XMRig
- PlugX
- CISA AA23-347A
- DarkGate Malware
- Industroyer2
- Azorult
- Data Destruction
- Amadey
- DarkCrystal RAT
- Remcos
- Nexus APT Threat Activity
- Earth Estries
- Rhysida Ransomware
- RedLine Stealer
- Volt Typhoon
- WhisperGate
asset_type: Endpoint
mitre_attack_id:
- T1036
Expand Down
23 changes: 12 additions & 11 deletions detections/endpoint/linux_auditd_add_user_account.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Linux Auditd Add User Account
id: aae66dc0-74b4-4807-b480-b35f8027abb4
version: 4
date: '2025-02-10'
version: 5
date: '2025-02-20'
author: Teoderick Contreras, Splunk
status: production
type: Anomaly
Expand All @@ -14,11 +14,12 @@ description: The following analytic detects the creation of new user accounts on
the system, posing a severe security risk.
data_source:
- Linux Auditd Proctitle
search: '`linux_auditd` `linux_auditd_normalized_proctitle_process`| rename host as
dest | where LIKE (process_exec, "%useradd%") OR LIKE (process_exec, "%adduser%")
| stats count min(_time) as firstTime max(_time) as lastTime by process_exec proctitle
dest | `security_content_ctime(firstTime)`| `security_content_ctime(lastTime)`|
`linux_auditd_add_user_account_filter`'
search: '`linux_auditd` proctitle IN ("*useradd*", "*adduser*")
| rename host as dest
| stats count min(_time) as firstTime max(_time) as lastTime by proctitle dest
| `security_content_ctime(firstTime)`
| `security_content_ctime(lastTime)`
|`linux_auditd_add_user_account_filter`'
how_to_implement: To implement this detection, the process begins by ingesting auditd
data, that consist SYSCALL, TYPE, EXECVE and PROCTITLE events, which captures command-line
executions and process details on Unix/Linux systems. These logs should be ingested
Expand Down Expand Up @@ -47,7 +48,7 @@ drilldown_searches:
earliest_offset: $info_min_time$
latest_offset: $info_max_time$
rba:
message: A [$process_exec$] event occurred on host - [$dest$] to add a user account.
message: A [$proctitle$] event occurred on host - [$dest$] to add a user account.
risk_objects:
- field: dest
type: system
Expand All @@ -70,6 +71,6 @@ tests:
- name: True Positive Test
attack_data:
- data:
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1136.001/linux_auditd_add_user/linux_auditd_add_user.log
source: /var/log/audit/audit.log
sourcetype: linux:audit
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1136.001/linux_auditd_add_user/auditd_proctitle_user_add.log
source: auditd
sourcetype: auditd
8 changes: 4 additions & 4 deletions detections/endpoint/linux_auditd_add_user_account_type.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Linux Auditd Add User Account Type
id: f8c325ea-506e-4105-8ccf-da1492e90115
version: 5
date: '2025-02-10'
version: 6
date: '2025-02-20'
author: Teoderick Contreras, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -70,5 +70,5 @@ tests:
attack_data:
- data:
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1136.001/linux_auditd_add_user_type/linux_auditd_add_user_type.log
source: /var/log/audit/audit.log
sourcetype: linux:audit
source: auditd
sourcetype: auditd
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
name: Linux Auditd At Application Execution
id: 9f306e0a-1c36-469e-8892-968ca12470dd
version: 4
date: '2025-02-10'
version: 5
date: '2025-02-20'
author: Teoderick Contreras, Splunk
status: production
type: Anomaly
Expand Down Expand Up @@ -76,5 +76,5 @@ tests:
attack_data:
- data:
https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1053.002/linux_auditd_at/linux_auditd_at_execution.log
source: /var/log/audit/audit.log
sourcetype: linux:audit
source: auditd
sourcetype: auditd
Loading