-
Notifications
You must be signed in to change notification settings - Fork 95
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'splunk:master' into master
- Loading branch information
Showing
73 changed files
with
425 additions
and
13 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
4 changes: 2 additions & 2 deletions
4
datasets/attack_techniques/T1027/atomic_red_team/linux-sysmon.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1036/cmd_lolbas_usage/cmd_lolbas_usage.log
Git LFS file not shown
13 changes: 13 additions & 0 deletions
13
datasets/attack_techniques/T1036/cmd_lolbas_usage/cmd_lolbas_usage.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
author: Steven Dick | ||
id: 8c54662e-a3c8-456c-a8bb-928e6c13b641 | ||
date: '2024-5-3' | ||
description: 'Some simple T1036.003 and T1036.005 tests using moved/renamed cmd.exe' | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1036/cmd_lolbas_usage/cmd_lolbas_usage.log | ||
sourcetypes: | ||
- xmlwineventlog | ||
references: | ||
- https://attack.mitre.org/techniques/T1036/ | ||
- https://attack.mitre.org/techniques/T1036/003/ | ||
- https://attack.mitre.org/techniques/T1036/005/ |
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1046/open_dns_port/linux_dns_openports.log
Git LFS file not shown
11 changes: 11 additions & 0 deletions
11
datasets/attack_techniques/T1046/open_dns_port/open_dns_port.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
author: Teoderick Contreras, Splunk | ||
id: 2ae6cf24-4e89-11ef-a7ff-acde48001122 | ||
date: '2024-07-30' | ||
description: Generated datasets for open dns port in attack range. | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1046/open_dns_port/linux_dns_openports.log | ||
sourcetypes: | ||
- 'openPorts' | ||
references: | ||
- https://eric-chow.medium.com/the-risks-of-open-ports-b1da14a7bd48 |
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1046/open_ports_discovery/linux_known_openports.log
Git LFS file not shown
11 changes: 11 additions & 0 deletions
11
datasets/attack_techniques/T1046/open_ports_discovery/open_ports_discovery.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
author: Teoderick Contreras, Splunk | ||
id: cd47daf6-498e-11ef-aa76-acde48001122 | ||
date: '2024-07-24' | ||
description: Generated datasets for open ports discovery in attack range. | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1046/open_ports_discovery/linux_known_openports.log | ||
sourcetypes: | ||
- 'openPorts' | ||
references: | ||
- https://eric-chow.medium.com/the-risks-of-open-ports-b1da14a7bd48 |
4 changes: 2 additions & 2 deletions
4
...techniques/T1053.005/winevent_windows_task_scheduler_event_action_started/windows-xml.log
Git LFS file not shown
4 changes: 2 additions & 2 deletions
4
datasets/attack_techniques/T1070.001/windows_event_log_cleared/windows-xml.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1083/splunk/SVD-2024-0711_web_access_splunk_web_access.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1087/splunk/SVD-2024-0716_splunkd_splunkd.log
Git LFS file not shown
11 changes: 11 additions & 0 deletions
11
datasets/attack_techniques/T1098/linux_password_change/linux_password_change.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
author: Teoderick Contreras, Splunk | ||
id: 09daa138-498f-11ef-aa76-acde48001122 | ||
date: '2024-07-24' | ||
description: Generated datasets for linux password change in attack range. | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1098/linux_password_change/linux_unix_change_pwd.log | ||
sourcetypes: | ||
- 'syslog' | ||
references: | ||
- https://help.fortinet.com/fsiem/Public_Resource_Access/7_1_1/rules/PH_RULE_LINUX_USER_PWD_CHANGED.htm |
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1098/linux_password_change/linux_unix_change_pwd.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1098/o365_azure_workload_events/o365_azure_workload_events.log
Git LFS file not shown
25 changes: 25 additions & 0 deletions
25
datasets/attack_techniques/T1098/o365_azure_workload_events/o365_azure_workload_events.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
author: Steven Dick | ||
id: a44c84cb-231b-4657-8386-0f5d4b8f183e | ||
date: '2024-4-13' | ||
description: 'Various Office 365 events sourced from the Universal Access Log, meant to duplicate other Azure detections without relying on using Azure event hubs in the MS Cloud Services add-on.' | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1098/o365_various_events/o365_various_events.log | ||
sourcetypes: | ||
- o365:management:activity | ||
references: | ||
- https://attack.mitre.org/techniques/T1098 | ||
- https://attack.mitre.org/techniques/T1484/002/ | ||
- https://attack.mitre.org/techniques/T1136/003/ | ||
- https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference | ||
- https://learn.microsoft.com/en-us/microsoft-365/admin/add-users/about-exchange-online-admin-role?view=o365-worldwide | ||
- https://docs.microsoft.com/en-us/azure/active-directory/external-identities/b2b-quickstart-add-guest-users-portal | ||
- https://posts.specterops.io/azure-privilege-escalation-via-service-principal-abuse-210ae2be2a5 | ||
- https://thehackernews.com/2023/08/emerging-attacker-exploit-microsoft.html | ||
- https://cyberaffairs.com/news/emerging-attacker-exploit-microsoft-cross-tenant-synchronization/ | ||
- https://www.crowdstrike.com/blog/crowdstrike-defends-against-azure-cross-tenant-synchronization-attacks/ | ||
- https://dirkjanm.io/assets/raw/US-22-Mollema-Backdooring-and-hijacking-Azure-AD-accounts_final.pdf | ||
- https://www.blackhat.com/us-22/briefings/schedule/#backdooring-and-hijacking-azure-ad-accounts-by-abusing-external-identities-26999 | ||
- https://msrc.microsoft.com/blog/2023/03/guidance-on-potential-misconfiguration-of-authorization-of-multi-tenant-applications-that-use-azure-ad/ | ||
- https://www.wiz.io/blog/azure-active-directory-bing-misconfiguration | ||
- https://medium.com/tenable-techblog/roles-allowing-to-abuse-entra-id-federation-for-persistence-and-privilege-escalation-df9ca6e58360 |
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1110.003/generic_password_spray/password_spray_attack.log
Git LFS file not shown
12 changes: 12 additions & 0 deletions
12
datasets/attack_techniques/T1110.003/generic_password_spray/password_spray_attack.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
author: Steven Dick | ||
id: 1d46ff6c-4a0e-4084-8975-e367e4e92bba | ||
date: '2023-10-30' | ||
description: 'Generic detection of password spray behaviors using CIM datamodel.' | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1110.003/generic_password_spray/password_spray_attack.log | ||
sourcetypes: | ||
- WinEventLog:Security | ||
references: | ||
- https://www.microsoft.com/en-us/security/blog/2020/04/23/protecting-organization-password-spray-attacks/ | ||
- https://github.com/MarkoH17/Spray365 |
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1110.003/ntlm_bruteforce/ntlm_bruteforce.log
Git LFS file not shown
16 changes: 16 additions & 0 deletions
16
datasets/attack_techniques/T1110.003/ntlm_bruteforce/ntlm_bruteforce.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,16 @@ | ||
author: Steven Dick | ||
id: 7d0802bd-b870-4a93-96f0-6e8323af425e | ||
date: '2024-2-19' | ||
description: 'Detection of suspicious NTLM authentication behavior.' | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1110.003/ntlm_bruteforce/ntlm_bruteforce.log | ||
sourcetypes: | ||
- XmlWinEventLog:Microsoft-Windows-NTLM/Operational | ||
references: | ||
- https://attack.mitre.org/techniques/T1110/003/ | ||
- https://www.varonis.com/blog/investigate-ntlm-brute-force | ||
- https://techcommunity.microsoft.com/t5/ask-the-directory-services-team/ntlm-blocking-and-you-application-analysis-and-auditing/ba-p/397191 | ||
- https://techcommunity.microsoft.com/t5/microsoft-defender-for-identity/enriched-ntlm-authentication-data-using-windows-event-8004/m-p/871827 | ||
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd560653(v=ws.10)?redirectedfrom=MSDN | ||
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-nrpc/4d1235e3-2c96-4e9f-a147-3cb338a0d09f |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1112/atomic_red_team/windows-sysmon-webview.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1112/firewall_modify_delete/firewall_mod_delete.log
Git LFS file not shown
6 changes: 3 additions & 3 deletions
6
datasets/attack_techniques/T1112/firewall_modify_delete/firewall_modify_delete.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1136.001/atomic_red_team/windows-powershell-esxadmins.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1136.001/atomic_red_team/windows-security-esxadmins.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1136.001/atomic_red_team/windows-sysmon-esxadmins.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1136/linux_unix_new_user/linux_new_user.log
Git LFS file not shown
11 changes: 11 additions & 0 deletions
11
datasets/attack_techniques/T1136/linux_unix_new_user/linux_unix_new_user.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
author: Teoderick Contreras, Splunk | ||
id: 47c96cf6-483e-11ef-8840-acde48001122 | ||
date: '2024-07-22' | ||
description: Generated datasets for linux unix new user in attack range. | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1136/linux_unix_new_user/linux_new_user.log | ||
sourcetypes: | ||
- 'syslog' | ||
references: | ||
- https://linuxize.com/post/how-to-create-users-in-linux-using-the-useradd-command/ |
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1189/splunk/SVD-2024-0712_audittrail_audittrail.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1189/splunk/SVD-2024-0712_splunkd_ui_access_splunk_ui_access.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1189/splunk/SVD-2024-0713_json_json.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1189/splunk/SVD-2024-0714_web_access_splunk_web_access.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1189/splunk/SVD-2024-0715_splunkd_splunkd_access.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1189/splunk/SVD-2024-0717_python_log_splunk_python.log
Git LFS file not shown
Git LFS file not shown
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
author: Michael Haag, Splunk | ||
id: 9535ef60-d482-434c-b3bb-6d1bd61e83be | ||
date: '2024-07-23' | ||
description: AttackData from WatchTowr blog related to CVE-2024-5806. | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1190/moveit/SftpServer.log | ||
sourcetypes: | ||
- sftp_server_logs | ||
references: | ||
- https://attack.mitre.org/techniques/T1190 |
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1210/splunk/SVD-2024-0701_pdfgen_log_splunk_pdfgen.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
...ttack_techniques/T1210/splunk/SVD-2024-0705_splunk_archiver_splunk_archiver-too_small.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1496/process_high_cpu_usage/linux_max_cpu2.log
Git LFS file not shown
11 changes: 11 additions & 0 deletions
11
datasets/attack_techniques/T1496/process_high_cpu_usage/process_high_cpu_usage.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
author: Teoderick Contreras, Splunk | ||
id: 6deb28d0-483d-11ef-8840-acde48001122 | ||
date: '2024-07-22' | ||
description: Generated datasets for process high cpu usage in attack range. | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1496/process_high_cpu_usage/linux_max_cpu2.log | ||
sourcetypes: | ||
- 'ps_metric' | ||
references: | ||
- ttps://serverfault.com/questions/674685/kernel-processes-periodically-eating-cpu-during-high-load |
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1496/process_high_mem_usage/linux_max_mem.log
Git LFS file not shown
11 changes: 11 additions & 0 deletions
11
datasets/attack_techniques/T1496/process_high_mem_usage/process_high_mem_usage.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
author: Teoderick Contreras, Splunk | ||
id: 8f43fa5c-483d-11ef-8840-acde48001122 | ||
date: '2024-07-22' | ||
description: Generated datasets for process high mem usage in attack range. | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1496/process_high_mem_usage/linux_max_mem.log | ||
sourcetypes: | ||
- 'ps_metric' | ||
references: | ||
- ttps://serverfault.com/questions/674685/kernel-processes-periodically-eating-cpu-during-high-load |
3 changes: 3 additions & 0 deletions
3
...sets/attack_techniques/T1499/splunk/SVD-2024-0702_splunkd_crash_log_splunkd_crash_log.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1499/splunk/SVD-2024-0710_web_service_splunk_web_service.log
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1531/linux_unix_delete_user/linux_del_user.log
Git LFS file not shown
11 changes: 11 additions & 0 deletions
11
datasets/attack_techniques/T1531/linux_unix_delete_user/linux_unix_delete_user.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,11 @@ | ||
author: Teoderick Contreras, Splunk | ||
id: a5357efc-483e-11ef-8840-acde48001122 | ||
date: '2024-07-22' | ||
description: Generated datasets for linux unix delete user in attack range. | ||
environment: attack_range | ||
dataset: | ||
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1531/linux_unix_delete_user/linux_del_user.log | ||
sourcetypes: | ||
- 'syslog' | ||
references: | ||
- https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/6/html/deployment_guide/cl-tools-userdel |
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1548/splunk/SVD-2024-0709_json_json.json
Git LFS file not shown
3 changes: 3 additions & 0 deletions
3
datasets/attack_techniques/T1562/disable_linux_firewall/Linux_service_inactive.log
Git LFS file not shown
Oops, something went wrong.