Skip to content

Commit 318f3ea

Browse files
authored
Merge branch 'develop' into nterl0k-t1033-query-remote-usage
2 parents 030537a + 70aa840 commit 318f3ea

File tree

250 files changed

+333
-312
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

250 files changed

+333
-312
lines changed

.github/workflows/appinspect.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,13 @@ jobs:
1818

1919
- name: Install Python Dependencies and ContentCTL and Atomic Red Team
2020
run: |
21-
pip install contentctl==5.0.0
21+
if [ -n "${{ vars.CONTENTCTL_VERSION }}" ]; then
22+
echo "Installing contentctl version ${{ vars.CONTENTCTL_VERSION }}"
23+
pip install contentctl==${{ vars.CONTENTCTL_VERSION }}
24+
else
25+
echo "Installing latest contentctl version"
26+
pip install contentctl
27+
fi
2228
git clone --depth=1 --single-branch --branch=master https://github.com/redcanaryco/atomic-red-team.git external_repos/atomic-red-team
2329
git clone --depth=1 --single-branch --branch=master https://github.com/mitre/cti external_repos/cti
2430

.github/workflows/build.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,13 @@ jobs:
1919

2020
- name: Install Python Dependencies and ContentCTL and Atomic Red Team
2121
run: |
22-
pip install contentctl==5.0.0
22+
if [ -n "${{ vars.CONTENTCTL_VERSION }}" ]; then
23+
echo "Installing contentctl version ${{ vars.CONTENTCTL_VERSION }}"
24+
pip install contentctl==${{ vars.CONTENTCTL_VERSION }}
25+
else
26+
echo "Installing latest contentctl version"
27+
pip install contentctl
28+
fi
2329
git clone --depth=1 --single-branch --branch=master https://github.com/redcanaryco/atomic-red-team.git external_repos/atomic-red-team
2430
git clone --depth=1 --single-branch --branch=master https://github.com/mitre/cti external_repos/cti
2531

.github/workflows/unit-testing.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,13 @@ jobs:
2323
- name: Install Python Dependencies and ContentCTL
2424
run: |
2525
python -m pip install --upgrade pip
26-
pip install contentctl==5.0.0
26+
if [ -n "${{ vars.CONTENTCTL_VERSION }}" ]; then
27+
echo "Installing contentctl version ${{ vars.CONTENTCTL_VERSION }}"
28+
pip install contentctl==${{ vars.CONTENTCTL_VERSION }}
29+
else
30+
echo "Installing latest contentctl version"
31+
pip install contentctl
32+
fi
2733
2834
# Running contentctl test with a few arguments, before running the command make sure you checkout into the current branch of the pull request. This step only performs unit testing on all the changes against the target-branch. In most cases this target branch will be develop
2935
# Make sure we check out the PR, even if it actually lives in a fork

contentctl.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 4.44.0
6+
version: 5.0.0
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU

data_sources/linux_secure.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,10 @@ author: Patrick Bareiss, Splunk
66
description: Data source object for Linux Secure
77
source: /var/log/secure
88
sourcetype: linux_secure
9-
supported_TA: []
9+
supported_TA:
10+
- name: Splunk Add-on for Unix and Linux
11+
url: https://splunkbase.splunk.com/app/833
12+
version: 9.2.0
1013
fields:
1114
- _time
1215
- action

detections/application/pingid_mismatch_auth_source_and_verification_response.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: PingID Mismatch Auth Source and Verification Response
22
id: 15b0694e-caa2-4009-8d83-a1f98b86d086
3-
version: 4
3+
version: 5
44
date: '2025-01-21'
55
author: Steven Dick
66
status: production

detections/application/windows_ad_suspicious_attribute_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Windows AD Suspicious Attribute Modification
22
id: 5682052e-ce55-4f9f-8d28-59191420b7e0
3-
version: 3
3+
version: 4
44
date: '2025-01-21'
55
author: Dean Luxton
66
status: production

detections/application/windows_ad_suspicious_gpo_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Windows AD Suspicious GPO Modification
22
id: 0a2afc18-a3b5-4452-b60a-2e774214f9bf
3-
version: 3
3+
version: 4
44
date: '2025-01-21'
55
author: Dean Luxton
66
status: experimental

detections/cloud/azure_ad_application_administrator_role_assigned.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Azure AD Application Administrator Role Assigned
22
id: eac4de87-7a56-4538-a21b-277897af6d8d
3-
version: 6
3+
version: 7
44
date: '2024-11-14'
55
author: Mauricio Velazco, Gowthamaraj Rajendran, Splunk
66
status: production

detections/cloud/azure_ad_azurehound_useragent_detected.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Azure AD AzureHound UserAgent Detected
22
id: d62852db-a1f1-40db-a7fc-c3d56fa8bda3
3-
version: 1
3+
version: 2
44
date: '2025-01-06'
55
author: Dean Luxton
66
data_source:

detections/cloud/azure_ad_external_guest_user_invited.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Azure AD External Guest User Invited
22
id: c1fb4edb-cab1-4359-9b40-925ffd797fb5
3-
version: 5
3+
version: 6
44
date: '2024-11-14'
55
author: Gowthamaraj Rajendran, Mauricio Velazco, Splunk
66
status: production

detections/cloud/azure_ad_multi_factor_authentication_disabled.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Azure AD Multi-Factor Authentication Disabled
22
id: 482dd42a-acfa-486b-a0bb-d6fcda27318e
3-
version: 5
3+
version: 6
44
date: '2024-11-14'
55
author: Mauricio Velazco, Gowthamaraj Rajendran, Splunk
66
status: production

detections/cloud/azure_ad_privileged_role_assigned.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Azure AD Privileged Role Assigned
22
id: a28f0bc3-3400-4a6e-a2da-89b9e95f0d2a
3-
version: 6
3+
version: 7
44
date: '2024-11-14'
55
author: Mauricio Velazco, Gowthamaraj Rajendran, Splunk
66
status: production

detections/cloud/azure_ad_service_principal_enumeration.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Azure AD Service Principal Enumeration
22
id: 3f0647ce-add5-4436-8039-cbd1abe74563
3-
version: 1
3+
version: 2
44
date: '2025-01-06'
55
author: Dean Luxton
66
data_source:

detections/cloud/azure_ad_service_principal_owner_added.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Azure AD Service Principal Owner Added
22
id: 7ddf2084-6cf3-4a44-be83-474f7b73c701
3-
version: 7
3+
version: 8
44
date: '2024-11-14'
55
author: Mauricio Velazco, Gowthamaraj Rajendran, Splunk
66
status: production

detections/cloud/azure_ad_user_enabled_and_password_reset.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Azure AD User Enabled And Password Reset
22
id: 1347b9e8-2daa-4a6f-be73-b421d3d9e268
3-
version: 6
3+
version: 7
44
date: '2024-11-14'
55
author: Mauricio Velazco, Gowthamaraj Rajendran, Splunk
66
status: production

detections/cloud/azure_ad_user_immutableid_attribute_updated.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Azure AD User ImmutableId Attribute Updated
22
id: 0c0badad-4536-4a84-a561-5ff760f3c00e
3-
version: 5
3+
version: 6
44
date: '2024-11-14'
55
author: Mauricio Velazco, Gowthamaraj Rajendran, Splunk
66
status: production

detections/cloud/gcp_multi_factor_authentication_disabled.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: GCP Multi-Factor Authentication Disabled
22
id: b9bc5513-6fc1-4821-85a3-e1d81e451c83
3-
version: 5
3+
version: 6
44
date: '2024-11-14'
55
author: Bhavin Patel, Mauricio Velazco, Splunk
66
status: production

detections/cloud/gsuite_drive_share_in_external_email.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Gsuite Drive Share In External Email
22
id: f6ee02d6-fea0-11eb-b2c2-acde48001122
3-
version: 4
3+
version: 5
44
date: '2024-11-14'
55
author: Teoderick Contreras, Splunk
66
status: experimental

detections/cloud/gsuite_suspicious_shared_file_name.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Gsuite Suspicious Shared File Name
22
id: 07eed200-03f5-11ec-98fb-acde48001122
3-
version: 4
3+
version: 5
44
date: '2024-11-14'
55
author: Teoderick Contreras, Splunk
66
status: production

detections/cloud/o365_service_principal_new_client_credentials.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: O365 Service Principal New Client Credentials
22
id: a1b229e9-d962-4222-8c62-905a8a010453
3-
version: 5
3+
version: 6
44
date: '2024-11-14'
55
author: Mauricio Velazco, Splunk
66
status: production

detections/deprecated/attempt_to_stop_security_service.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Attempt To Stop Security Service
22
id: c8e349c6-b97c-486e-8949-bd7bcd1f3910
3-
version: 9
3+
version: 10
44
date: '2025-01-24'
55
author: Rico Valdez, Splunk
66
status: deprecated

detections/deprecated/attempted_credential_dump_from_registry_via_reg_exe.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Attempted Credential Dump From Registry via Reg exe
22
id: e9fb4a59-c5fb-440a-9f24-191fbc6b2911
3-
version: 12
3+
version: 13
44
date: '2025-01-15'
55
author: Patrick Bareiss, Splunk
66
status: deprecated

detections/deprecated/cmdline_tool_not_executed_in_cmd_shell.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Cmdline Tool Not Executed In CMD Shell
22
id: 6c3f7dd8-153c-11ec-ac2d-acde48001122
3-
version: 7
3+
version: 8
44
date: '2025-01-24'
55
author: Teoderick Contreras, Splunk
66
status: deprecated

detections/deprecated/create_local_admin_accounts_using_net_exe.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Create local admin accounts using net exe
22
id: b89919ed-fe5f-492c-b139-151bb162040e
3-
version: 15
3+
version: 16
44
date: '2025-01-24'
55
author: Bhavin Patel, Splunk
66
status: deprecated

detections/deprecated/deleting_of_net_users.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Deleting Of Net Users
22
id: 1c8c6f66-acce-11eb-aafb-acde48001122
3-
version: 7
3+
version: 8
44
date: '2025-01-24'
55
author: Teoderick Contreras, Splunk
66
status: deprecated

detections/deprecated/detect_processes_used_for_system_network_configuration_discovery.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Detect processes used for System Network Configuration Discovery
22
id: a51bfe1a-94f0-48cc-b1e4-16ae10145893
3-
version: 7
3+
version: 8
44
date: '2025-01-24'
55
author: Bhavin Patel, Splunk
66
status: deprecated

detections/deprecated/disabling_net_user_account.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Disabling Net User Account
22
id: c0325326-acd6-11eb-98c2-acde48001122
3-
version: 7
3+
version: 8
44
date: '2025-01-24'
55
author: Teoderick Contreras, Splunk
66
status: deprecated

detections/deprecated/excel_spawning_powershell.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Excel Spawning PowerShell
22
id: 42d40a22-9be3-11eb-8f08-acde48001122
3-
version: 7
3+
version: 8
44
date: '2025-01-13'
55
author: Michael Haag, Splunk
66
status: deprecated

detections/deprecated/excel_spawning_windows_script_host.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Excel Spawning Windows Script Host
22
id: 57fe880a-9be3-11eb-9bf3-acde48001122
3-
version: 8
3+
version: 9
44
date: '2025-01-13'
55
author: Michael Haag, Splunk
66
status: deprecated

detections/deprecated/excessive_usage_of_net_app.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Excessive Usage Of Net App
22
id: 45e52536-ae42-11eb-b5c6-acde48001122
3-
version: 6
3+
version: 7
44
date: '2025-01-24'
55
author: Teoderick Contreras, Splunk
66
status: deprecated

detections/deprecated/extraction_of_registry_hives.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Extraction of Registry Hives
22
id: 8bbb7d58-b360-11eb-ba21-acde48001122
3-
version: 6
3+
version: 7
44
date: '2025-01-24'
55
author: Michael Haag, Splunk
66
status: deprecated

detections/deprecated/office_product_spawn_cmd_process.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Office Product Spawn CMD Process
22
id: b8b19420-e892-11eb-9244-acde48001122
3-
version: 8
3+
version: 9
44
date: '2025-01-13'
55
author: Teoderick Contreras, Splunk
66
status: deprecated

detections/deprecated/office_product_spawning_windows_script_host.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Office Product Spawning Windows Script Host
22
id: b3628a5b-8d02-42fa-a891-eebf2351cbe1
3-
version: 10
3+
version: 11
44
date: '2025-01-13'
55
author: Michael Haag, Splunk
66
status: deprecated

detections/deprecated/office_spawning_control.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Office Spawning Control
22
id: 053e027c-10c7-11ec-8437-acde48001122
3-
version: 10
3+
version: 11
44
date: '2025-01-24'
55
author: Michael Haag, Splunk
66
status: deprecated

detections/deprecated/osquery_pack___coldroot_detection.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Osquery pack - ColdRoot detection
22
id: a6fffe5e-05c3-4c04-badc-887607fbb8dc
3-
version: 4
3+
version: 5
44
date: '2024-11-14'
55
author: Rico Valdez, Splunk
66
status: deprecated

detections/deprecated/windows_lateral_tool_transfer_remcom.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Windows Lateral Tool Transfer RemCom
22
id: e373a840-5bdc-47ef-b2fd-9cc7aaf387f0
3-
version: 5
3+
version: 6
44
date: '2024-12-10'
55
author: Michael Haag, Splunk
66
type: TTP

detections/deprecated/windows_msiexec_with_network_connections.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Windows MSIExec With Network Connections
22
id: 827409a1-5393-4d8d-8da4-bbb297c262a7
3-
version: 6
3+
version: 7
44
date: '2025-01-24'
55
author: Michael Haag, Splunk
66
status: deprecated

detections/deprecated/windows_office_product_spawning_msdt.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Windows Office Product Spawning MSDT
22
id: 127eba64-c981-40bf-8589-1830638864a7
3-
version: 9
3+
version: 10
44
date: '2025-01-24'
55
author: Michael Haag, Teoderick Contreras, Splunk
66
status: deprecated

detections/endpoint/anomalous_usage_of_7zip.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Anomalous usage of 7zip
22
id: 9364ee8e-a39a-11eb-8f1d-acde48001122
3-
version: 6
3+
version: 7
44
date: '2024-11-13'
55
author: Michael Haag, Teoderick Contreras, Splunk
66
status: production

detections/endpoint/any_powershell_downloadfile.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Any Powershell DownloadFile
22
id: 1a93b7ea-7af7-11eb-adb5-acde48001122
3-
version: 9
3+
version: 10
44
date: '2025-01-27'
55
author: Michael Haag, Splunk
66
status: production

detections/endpoint/any_powershell_downloadstring.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Any Powershell DownloadString
22
id: 4d015ef2-7adf-11eb-95da-acde48001122
3-
version: 7
3+
version: 8
44
date: '2024-11-13'
55
author: Michael Haag, Splunk
66
status: production

detections/endpoint/attempt_to_add_certificate_to_untrusted_store.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: Attempt To Add Certificate To Untrusted Store
22
id: 6bc5243e-ef36-45dc-9b12-f4a6be131159
3-
version: 11
3+
version: 12
44
date: '2024-11-13'
55
author: Patrick Bareiss, Rico Valdez, Splunk
66
status: production

detections/endpoint/bcdedit_failure_recovery_modification.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: BCDEdit Failure Recovery Modification
22
id: 809b31d2-5462-11eb-ae93-0242ac130002
3-
version: 6
3+
version: 7
44
date: '2024-12-10'
55
author: Michael Haag, Splunk
66
status: production

detections/endpoint/bits_job_persistence.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: BITS Job Persistence
22
id: e97a5ffe-90bf-11eb-928a-acde48001122
3-
version: 6
3+
version: 7
44
date: '2024-11-13'
55
author: Michael Haag, Splunk
66
status: production

detections/endpoint/bitsadmin_download_file.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: BITSAdmin Download File
22
id: 80630ff4-8e4c-11eb-aab5-acde48001122
3-
version: 7
3+
version: 8
44
date: '2024-11-13'
55
author: Michael Haag, Sittikorn S
66
status: production

0 commit comments

Comments
 (0)