Skip to content

Commit 4583864

Browse files
authored
Merge pull request #3366 from splunk/remove_detections
Remove 151 Deprecated detections, stories, baselines, investigations - Github
2 parents 7ba4dc0 + 011b33c commit 4583864

File tree

238 files changed

+1467
-244
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

238 files changed

+1467
-244
lines changed

baselines/deprecated/.gitkeep

Whitespace-only changes.

baselines/previously_seen_aws_cross_account_activity___initial.yml renamed to baselines/deprecated/previously_seen_aws_cross_account_activity___initial.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 1
44
date: '2020-08-15'
55
author: Rico Valdez, Splunk
66
type: Baseline
7-
status: production
7+
status: deprecated
88
description: This search looks for **AssumeRole** events where the requesting account
99
differs from the requested account, then writes these relationships to a lookup
1010
file.

baselines/previously_seen_aws_cross_account_activity___update.yml renamed to baselines/deprecated/previously_seen_aws_cross_account_activity___update.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 1
44
date: '2020-08-15'
55
author: Rico Valdez, Splunk
66
type: Baseline
7-
status: production
7+
status: deprecated
88
description: This search looks for **AssumeRole** events where the requesting account
99
differs from the requested account, then writes these relationships to a lookup
1010
file.

contentctl.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.1.1
6+
version: 5.2.0
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU

detections/deprecated/.gitkeep

Whitespace-only changes.

detections/endpoint/attacker_tools_on_endpoint.yml

+2-3
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Attacker Tools On Endpoint
22
id: a51bfe1a-94f0-48cc-b4e4-16a110145893
3-
version: 8
4-
date: '2025-02-10'
3+
version: 9
4+
date: '2025-02-27'
55
author: Bhavin Patel, Splunk
66
status: production
77
type: TTP
@@ -66,7 +66,6 @@ rba:
6666
tags:
6767
analytic_story:
6868
- XMRig
69-
- Monitor for Unauthorized Software
7069
- Unusual Processes
7170
- SamSam Ransomware
7271
- CISA AA22-264A

lookups/deprecation_info.csv

+207
Large diffs are not rendered by default.

lookups/deprecation_info.yml

+9
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
name: deprecation_info
2+
date: 2025-03-14
3+
version: 1
4+
id: d83dad4f-7bce-4979-bf07-a88c610da5f6
5+
author: Splunk Threat Research Team
6+
lookup_type: csv
7+
default_match: false
8+
description: A lookup file for deprecation information
9+
min_matches: 1

baselines/deprecated/add_prohibited_processes_to_enterprise_security.yml renamed to removed/baselines/add_prohibited_processes_to_enterprise_security.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 1
44
date: '2017-09-15'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
status: deprecated
7+
status: removed
88
description: This search takes the existing interesting process table from ES, filters
99
out any existing additions added by ESCU and then updates the table with processes
1010
identified by ESCU that should be prohibited on your endpoints.

baselines/deprecated/baseline_of_api_calls_per_user_arn.yml renamed to removed/baselines/baseline_of_api_calls_per_user_arn.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 1
44
date: '2018-04-09'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
status: deprecated
7+
status: removed
88
description: This search establishes, on a per-hour basis, the average and the standard
99
deviation of the number of API calls made by each user. Also recorded is the number
1010
of data points for each user. This table is then outputted to a lookup file to allow

baselines/deprecated/baseline_of_excessive_aws_instances_launched_by_user___mltk.yml renamed to removed/baselines/baseline_of_excessive_aws_instances_launched_by_user___mltk.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 1
44
date: '2019-11-14'
55
author: Jason Brewer, Splunk
66
type: Baseline
7-
status: deprecated
7+
status: removed
88
description: This search is used to build a Machine Learning Toolkit (MLTK) model
99
for how many RunInstances users do in the environment. By default, the search uses
1010
the last 90 days of data to build the model. The model created by this search is

baselines/deprecated/baseline_of_excessive_aws_instances_terminated_by_user___mltk.yml renamed to removed/baselines/baseline_of_excessive_aws_instances_terminated_by_user___mltk.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 1
44
date: '2019-11-14'
55
author: Jason Brewer, Splunk
66
type: Baseline
7-
status: deprecated
7+
status: removed
88
description: This search is used to build a Machine Learning Toolkit (MLTK) model
99
for how many TerminateInstances users do in the environment. By default, the search
1010
uses the last 90 days of data to build the model. The model created by this search

baselines/monitor_successful_backups.yml renamed to removed/baselines/monitor_successful_backups.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
name: Monitor Successful Backups
22
id: b4d0dfb2-2195-4f6e-93a3-48468ed9734e
3-
version: 1
4-
date: '2017-09-12'
3+
version: 2
4+
date: '2025-02-27'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
status: production
7+
status: removed
88
description: This search is intended to give you a feel for how often successful backups
99
are conducted in your environment. Fluctuations in these numbers will allow you
1010
to determine when you should investigate.

baselines/monitor_unsuccessful_backups.yml renamed to removed/baselines/monitor_unsuccessful_backups.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
name: Monitor Unsuccessful Backups
22
id: b2178fed-592f-492b-b851-74161678aa56
3-
version: 1
4-
date: '2017-09-12'
3+
version: 2
4+
date: '2025-02-27'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
status: production
7+
status: removed
88
description: This search is intended to give you a feel for how often backup failures
99
happen in your environments. Fluctuations in these numbers will allow you to determine
1010
when you should investigate.

baselines/deprecated/previously_seen_api_call_per_user_roles_in_cloudtrail.yml renamed to removed/baselines/previously_seen_api_call_per_user_roles_in_cloudtrail.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 1
44
date: '2018-04-16'
55
author: Bhavin Patel, Splunk
66
type: Baseline
7-
status: deprecated
7+
status: removed
88
description: This search looks for successful API calls made by different user roles,
99
then creates a baseline of the earliest and latest times we have encountered this
1010
user role. It also returns the name of the API call in our dataset--grouped by user

baselines/deprecated/previously_seen_aws_provisioning_activity_sources.yml renamed to removed/baselines/previously_seen_aws_provisioning_activity_sources.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 1
44
date: '2018-03-16'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
status: deprecated
7+
status: removed
88
description: This search builds a table of the first and last times seen for every
99
IP address (along with its physical location) previously associated with cloud-provisioning
1010
activity. This is broadly defined as any event that runs or creates something.

baselines/previously_seen_aws_regions.yml renamed to removed/baselines/previously_seen_aws_regions.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
name: Previously Seen AWS Regions
22
id: fc0edc95-ff2b-48b0-9f6f-63da3789fd63
3-
version: 1
4-
date: '2018-01-08'
3+
version: 2
4+
date: '2025-02-27'
55
author: Bhavin Patel, Splunk
66
type: Baseline
7-
status: production
7+
status: removed
88
description: This search looks for CloudTrail events where an AWS instance is started
99
and creates a baseline of most recent time (latest) and the first time (earliest)
1010
we've seen this region in our dataset grouped by the value awsRegion for the last

baselines/deprecated/previously_seen_ec2_amis.yml renamed to removed/baselines/previously_seen_ec2_amis.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 2
44
date: '2025-01-16'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
status: deprecated
7+
status: removed
88
description: This search builds a table of previously seen AMIs used to launch EC2
99
instances
1010
search: '`cloudtrail` eventName=RunInstances errorCode=success | rename requestParameters.instancesSet.items{}.imageId

baselines/deprecated/previously_seen_ec2_instance_types.yml renamed to removed/baselines/previously_seen_ec2_instance_types.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 2
44
date: '2025-01-16'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
status: deprecated
7+
status: removed
88
description: This search builds a table of previously seen EC2 instance types
99
search: '`cloudtrail` eventName=RunInstances errorCode=success | rename requestParameters.instanceType
1010
as instanceType | fillnull value="m1.small" instanceType | stats earliest(_time)

baselines/deprecated/previously_seen_ec2_launches_by_user.yml renamed to removed/baselines/previously_seen_ec2_launches_by_user.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 2
44
date: '2025-01-16'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
status: deprecated
7+
status: removed
88
description: This search builds a table of previously seen ARNs that have launched
99
a EC2 instance.
1010
search: '`cloudtrail` eventName=RunInstances errorCode=success | rename userIdentity.arn

baselines/previously_seen_ec2_modifications_by_user.yml renamed to removed/baselines/previously_seen_ec2_modifications_by_user.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
name: Previously Seen EC2 Modifications By User
22
id: 4d69091b-d975-4267-85df-888bd41034eb
3-
version: 1
4-
date: '2018-04-05'
3+
version: 2
4+
date: '2025-02-27'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
status: production
7+
status: removed
88
description: This search builds a table of previously seen ARNs that have launched
99
a EC2 instance.
1010
search: '`cloudtrail` `ec2_modification_api_calls` errorCode=success | spath output=arn

baselines/deprecated/previously_seen_users_in_cloudtrail.yml renamed to removed/baselines/previously_seen_users_in_cloudtrail.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 1
44
date: '2018-04-30'
55
author: Jason Brewer, Splunk
66
type: Baseline
7-
status: deprecated
7+
status: removed
88
description: This search looks for CloudTrail events where a user logs into the console,
99
then creates a baseline of the latest and earliest times, City, Region, and Country
1010
we have encountered this user in our dataset, grouped by ARN, within the last 30

baselines/systems_ready_for_spectre_meltdown_windows_patch.yml renamed to removed/baselines/systems_ready_for_spectre_meltdown_windows_patch.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
name: Systems Ready for Spectre-Meltdown Windows Patch
22
id: fc0edc95-ff2b-48b0-9f6f-63da3789fd61
3-
version: 1
4-
date: '2018-01-08'
3+
version: 2
4+
date: '2025-02-27'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
status: production
7+
status: removed
88
description: Some AV applications can cause the Spectre/Meltdown patch for Windows
99
not to install successfully. This registry key is supposed to be created by the
1010
AV engine when it has been patched to be able to handle the Windows patch. If this

baselines/deprecated/update_previously_seen_users_in_cloudtrail.yml renamed to removed/baselines/update_previously_seen_users_in_cloudtrail.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 2
44
date: '2025-01-16'
55
author: Jason Brewer, Splunk
66
type: Baseline
7-
status: deprecated
7+
status: removed
88
description: This search looks for CloudTrail events where a user logs into the console,
99
then updates the baseline of the latest and earliest times, City, Region, and Country
1010
we have encountered this user in our dataset, grouped by ARN, within the last hour.

0 commit comments

Comments
 (0)