Skip to content

Releases: splunk/security_content

v4.27.0

20 Mar 23:08
e4dd27c
Compare
Choose a tag to compare

v4.26.0

06 Mar 22:42
b32c1a6
Compare
Choose a tag to compare

New Analytics Story

Updated Analytics Story

New Analytics

Updated Analytics

Macros Added

  • nginx_access_logs
  • suricata

Macros Updated

Lookups Added

Lookups Updated

  • remote_access_software

Playbooks Added

Playbooks Updated

Other Updates

  • Added a new script and a CI job to automatically upload the package to Splunkbase using a service account
  • Create SSA-Content-latest.tar.gz in the generate_ba CI job

v4.25.0

22 Feb 19:58
bac4b5b
Compare
Choose a tag to compare

Release notes for ESCU v4.25.0

New Analytics Story

Updated Analytics Story

New Analytics

Updated Analytics

Other Updates

  • Updated contentctl to output accurate providing technologies in savedsearches.conf

v4.24.0

15 Feb 21:47
794904b
Compare
Choose a tag to compare

Release notes for ESCUv4.24.0

New Analytics Story

Updated Analytics Story

New Analytics

Updated Analytics

Read more

v4.23.0

30 Jan 22:17
50459e7
Compare
Choose a tag to compare

Release notes for ESCU v4.23.0

New Analytics Story

Updated Analytics Story

New Analytics

Updated Analytics

Other Updates

  • Added a new input macro sourcetype="kube:container:falco"

Playbook Updates

  • Splunk Attack Analyzer Dynamic Analysis
  • Splunk Automated Email Investigation
  • Splunk Identifier Activity Analysis
  • Splunk Message Identifier Activity Analysis

v4.22.0

24 Jan 22:16
fee6f11
Compare
Choose a tag to compare

v4.21.0

23 Jan 00:11
47eea50
Compare
Choose a tag to compare

Release notes for ESCUv4.21.0

New Analytics Story

Updated Analytics Story

New Analytics

Updated Analytics

Other Updates

  • Updated splunk_risky_command lookup with a new splunk_risky_command_20240122.csv file

v4.20.0

17 Jan 20:13
d54db88
Compare
Choose a tag to compare

v4.19.0

10 Jan 19:17
87cb8c9
Compare
Choose a tag to compare

Release Branch for ESCU 4.19.0

New Analytic Story
  • CISA AA23-347A
  • Abnormal Kubernetes Behavior using Splunk Infrastructure Monitoring
Updated Analytic Story
  • Office 365 Account Takeover
  • Office 365 Persistence Mechanisms
  • Splunk Vulnerabilities
New Analytics
  • Kubernetes Anomalous Inbound Outbound Network IO (Internal Contributor : Matthew Moore )
  • Kubernetes Anomalous Inbound to Outbound Network IO Ratio (Internal Contributor : Matthew Moore )
  • Kubernetes Previously Unseen Container Image Name (Internal Contributor : Matthew Moore )
  • Kubernetes Previously Unseen Process (Internal Contributor : Matthew Moore )
  • Kubernetes Process Running From New Path (Internal Contributor : Matthew Moore )
  • Kubernetes Process with Anomalous Resource Utilisation (Internal Contributor : Matthew Moore )
  • Kubernetes Process with Resource Ratio Anomalies (Internal Contributor : Matthew Moore )
  • Kubernetes Shell Running on Worker Node with CPU Activity (Internal Contributor : Matthew Moore )
  • Kubernetes Shell Running on Worker Node (Internal Contributor : Matthew Moore )
  • Windows Account Discovery For None Disable User Account
  • Windows Lsa Secrets Nolmhash Registry
  • Windows Modify Registry Disable Restricted Admin
  • Windows Account Discovery For Sam Account Name
  • Windows Account Discovery With Netuser Preauthnotrequire
  • Windows Archive Collected Data Via Powershell
  • Windows Domain Account Discovery Via Get Netcomputer
  • Windows Known Graphicalproton Loaded Modules
  • Windows Process Commandline Discovery
  • Windows System User Privilege Discovery
  • Windows Modify Registry Nochangingwallpaper
  • Windows Rundll32 Apply User Settings Changes
  • Windows UAC Bypass Suspicious Child Process (External Contributor : @nterl0k )
  • Windows UAC Bypass Suspicious Escalation Behavior (External Contributor : @nterl0k )
  • Windows Alternate DataStream - Base64 Content (External Contributor : @nterl0k )
  • Windows Alternate DataStream - Process Execution (External Contributor : @nterl0k )
  • Windows Alternate DataStream - Executable Content (External Contributor : @nterl0k )
  • O365 Concurrent Sessions From Different Ips
  • Splunk ES DoS Investigations Manager via Investigation Creation (Internal Contributor : Chase Franklin )
  • Splunk ES DoS Through Investigation Attachments (Internal Contributor : Chase Franklin )
Updated Analytics
  • GCP Authentication Failed During MFA Challenge
  • GCP Multi-Factor Authentication Disabled
  • GCP Successful Single-Factor Authentication
  • Windows Steal Authentication Certificates - ESC1 Abuse
  • Allow Network Discovery In Firewall
  • Msmpeng Application DLL Side Loading
Other Updates
  • Updated mitre attack navigator json files for detection coverage for RAT and Stealer analytic stories
  • Updated ALL Azure AD analytics to use sourcetype = azure:monitor:aad for better CIM Compliance.

v4.18.0

20 Dec 18:44
87cb8c9
Compare
Choose a tag to compare

ESCU 4.18.0 Release branch

New Analytic Story
  • Rhysida Ransomware
  • Kubernetes Security
Updated Analytic Story
  • NjRAT
  • RedLine Stealer
  • Amadey
New Analytics
  • PingID Mismatch Auth Source and Verification Response (External Contributor : @nterl0k )
  • PingID Multiple Failed MFA Requests For User (External Contributor : @nterl0k )
  • PingID New MFA Method After Credential Reset (External Contributor : @nterl0k )
  • PingID New MFA Method Registered For User (External Contributor : @nterl0k )
  • Kubernetes Abuse of Secret by Unusual Location
  • Kubernetes Abuse of Secret by Unusual User Agent
  • Windows Modify System Firewall with Notable Process Path
  • Kubernetes Abuse of Secret by Unusual User Group
  • Kubernetes Abuse of Secret by Unusual User Name
  • Kubernetes Access Scanning
  • Kubernetes Suspicious Image Pulling
  • Kubernetes Unauthorized Access
  • Windows Modify System Firewall with Notable Process Path
Updated Analytics
  • Allow File And Printing Sharing In Firewall
  • Azure AD PIM Role Assigned
  • CMD Carry Out String Command Parameter
  • Detect Use of cmd exe to Launch Script Interpreters
  • Modification Of Wallpaper
Other Updates
  • Added two new lookup files ransomware_extensions_20231219.csv‎ and ransomware_notes_20231219.csv and updated the existing transforms definitions of ransomware_extensions_lookup and ransomware_notes_lookup to use the latest csv files.