Skip to content

Commit 4a58ea1

Browse files
authored
Merge branch 'develop' into captcha
2 parents f623ca6 + 271f1bc commit 4a58ea1

16 files changed

+41
-28
lines changed

contentctl.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -101,9 +101,9 @@ apps:
101101
- uid: 5466
102102
title: TA for Zeek
103103
appid: SPLUNK_TA_FOR_ZEEK
104-
version: 1.0.9
104+
version: 1.0.10
105105
description: description of app
106-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/ta-for-zeek_109.tgz
106+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/ta-for-zeek_1010.tgz
107107
- uid: 3258
108108
title: Splunk Add-on for NGINX
109109
appid: SPLUNK_ADD_ON_FOR_NGINX

data_sources/bro_conn.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,4 @@ sourcetype: bro:conn:json
1515
supported_TA:
1616
- name: TA for Zeek
1717
url: https://splunkbase.splunk.com/app/5466
18-
version: 1.0.9
18+
version: 1.0.10

data_sources/bro_dns.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ sourcetype: bro:dns:json
1616
supported_TA:
1717
- name: TA for Zeek
1818
url: https://splunkbase.splunk.com/app/5466
19-
version: 1.0.9
19+
version: 1.0.10

data_sources/bro_files.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ sourcetype: bro:files:json
1717
supported_TA:
1818
- name: TA for Zeek
1919
url: https://splunkbase.splunk.com/app/5466
20-
version: 1.0.9
20+
version: 1.0.10

data_sources/bro_http.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ sourcetype: bro:http:json
1616
supported_TA:
1717
- name: TA for Zeek
1818
url: https://splunkbase.splunk.com/app/5466
19-
version: 1.0.9
19+
version: 1.0.10

data_sources/bro_loaded_scripts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,4 @@ sourcetype: bro:loaded_scripts:json
1515
supported_TA:
1616
- name: TA for Zeek
1717
url: https://splunkbase.splunk.com/app/5466
18-
version: 1.0.9
18+
version: 1.0.10

data_sources/bro_ntp.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,4 +15,4 @@ sourcetype: bro:ntp:json
1515
supported_TA:
1616
- name: TA for Zeek
1717
url: https://splunkbase.splunk.com/app/5466
18-
version: 1.0.9
18+
version: 1.0.10

data_sources/bro_ocsp.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ sourcetype: bro:ocsp:json
1616
supported_TA:
1717
- name: TA for Zeek
1818
url: https://splunkbase.splunk.com/app/5466
19-
version: 1.0.9
19+
version: 1.0.10

data_sources/bro_ssl.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ sourcetype: bro:ssl:json
1616
supported_TA:
1717
- name: TA for Zeek
1818
url: https://splunkbase.splunk.com/app/5466
19-
version: 1.0.9
19+
version: 1.0.10

data_sources/bro_weird.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ sourcetype: bro:weird:json
1616
supported_TA:
1717
- name: TA for Zeek
1818
url: https://splunkbase.splunk.com/app/5466
19-
version: 1.0.9
19+
version: 1.0.10

data_sources/bro_x509.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,4 +16,4 @@ sourcetype: bro:x509:json
1616
supported_TA:
1717
- name: TA for Zeek
1818
url: https://splunkbase.splunk.com/app/5466
19-
version: 1.0.9
19+
version: 1.0.10

data_sources/zeek_conn.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sourcetype: bro:conn:json
99
supported_TA:
1010
- name: TA for Zeek
1111
url: https://splunkbase.splunk.com/app/5466
12-
version: 1.0.9
12+
version: 1.0.10
1313
fields:
1414
- action
1515
- bytes

detections/endpoint/ping_sleep_batch_command.yml

Lines changed: 19 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
name: Ping Sleep Batch Command
22
id: ce058d6c-79f2-11ec-b476-acde48001122
3-
version: 9
4-
date: '2025-05-02'
3+
version: 10
4+
date: '2025-05-19'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Anomaly
8-
description: The following analytic identifies the execution of ping sleep batch commands.
8+
description: |
9+
The following analytic identifies the execution of ping sleep batch commands.
910
It leverages data from Endpoint Detection and Response (EDR) agents, focusing on
1011
process and parent process command-line details. This activity is significant as
1112
it indicates an attempt to delay malicious code execution, potentially evading detection
@@ -17,9 +18,21 @@ data_source:
1718
- Sysmon EventID 1
1819
- CrowdStrike ProcessRollup2
1920
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
20-
as lastTime from datamodel=Endpoint.Processes where `process_ping` (Processes.parent_process
21-
= "*ping*" Processes.parent_process = *-n* Processes.parent_process="* Nul*"Processes.parent_process="*>*")
22-
OR (Processes.process = "*ping*" Processes.process = *-n* Processes.process="* Nul*"Processes.process="*>*")
21+
as lastTime from datamodel=Endpoint.Processes where
22+
(
23+
Processes.parent_process= "*ping*"
24+
Processes.parent_process = *-n*
25+
Processes.parent_process="* Nul*"
26+
Processes.parent_process IN ("*>*", "*>*")
27+
Processes.parent_process IN ("*&*", "*& *")
28+
)
29+
OR (
30+
Processes.process = "*ping*"
31+
Processes.process = *-n*
32+
Processes.process="* Nul*"
33+
Processes.process IN ("*>*", "*>*")
34+
Processes.process IN ("*&*", "*& *")
35+
)
2336
by Processes.action Processes.dest Processes.original_file_name Processes.parent_process
2437
Processes.parent_process_exec Processes.parent_process_guid Processes.parent_process_id
2538
Processes.parent_process_name Processes.parent_process_path Processes.process Processes.process_exec

detections/endpoint/schtasks_scheduling_job_on_remote_system.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Schtasks scheduling job on remote system
22
id: 1297fb80-f42a-4b4a-9c8a-88c066237cf6
3-
version: 14
4-
date: '2025-05-02'
3+
version: 15
4+
date: '2025-05-19'
55
author: David Dorsey, Mauricio Velazco, Splunk
66
status: production
77
type: TTP
@@ -20,7 +20,7 @@ data_source:
2020
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
2121
as lastTime from datamodel=Endpoint.Processes where (Processes.process_name = schtasks.exe
2222
OR Processes.original_file_name=schtasks.exe) (Processes.process="*/create*" AND
23-
Processes.process="*/s*") by Processes.action Processes.dest Processes.original_file_name
23+
Processes.process="*/s *") by Processes.action Processes.dest Processes.original_file_name
2424
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
2525
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
2626
Processes.process Processes.process_exec Processes.process_guid Processes.process_hash

detections/endpoint/windows_msiexec_dllregisterserver.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows MSIExec DLLRegisterServer
22
id: fdb59aef-d88f-4909-8369-ec2afbd2c398
3-
version: 9
4-
date: '2025-05-02'
3+
version: 10
4+
date: '2025-05-19'
55
author: Michael Haag, Splunk
66
status: production
77
type: TTP
@@ -21,7 +21,7 @@ data_source:
2121
search:
2222
'| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
2323
as lastTime from datamodel=Endpoint.Processes where `process_msiexec` Processes.process
24-
IN ("*/y*", "*-y*") by Processes.action Processes.dest Processes.original_file_name
24+
IN ("* /y*", "* -y*") by Processes.action Processes.dest Processes.original_file_name
2525
Processes.parent_process Processes.parent_process_exec Processes.parent_process_guid
2626
Processes.parent_process_id Processes.parent_process_name Processes.parent_process_path
2727
Processes.process Processes.process_exec Processes.process_guid Processes.process_hash

detections/endpoint/windows_process_commandline_discovery.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Windows Process Commandline Discovery
22
id: 67d2a52e-a7e2-4a5d-ae44-a21212048bc2
3-
version: 6
4-
date: '2025-05-02'
3+
version: 7
4+
date: '2025-05-19'
55
author: Teoderick Contreras, Splunk
66
status: production
77
type: Hunting
@@ -20,7 +20,7 @@ description: The following analytic detects the use of Windows Management Instru
2020
further exploitation or lateral movement.
2121
search: '| tstats `security_content_summariesonly` count min(_time) as firstTime max(_time)
2222
as lastTime from datamodel=Endpoint.Processes where `process_wmic` Processes.process=
23-
"* process *" Processes.process= "* get commandline *" by Processes.action Processes.dest
23+
"* process *" Processes.process= "* get *" Processes.process= "*CommandLine*" by Processes.action Processes.dest
2424
Processes.original_file_name Processes.parent_process Processes.parent_process_exec
2525
Processes.parent_process_guid Processes.parent_process_id Processes.parent_process_name
2626
Processes.parent_process_path Processes.process Processes.process_exec Processes.process_guid

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy