You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This analytic detects intrusion events from known threat activity using Cisco Secure Firewall Intrusion Events.
10
-
It leverages Cisco Secure Firewall Threat Defense IntrusionEvent logs to identify cases where one or multiple Snort signatures
11
-
associated with a known threat or threat actor activity have been triggered within a one-hour time window. The detection uses a
12
-
lookup table (cisco_snort_ids_to_threat_mapping) to map Snort signature IDs to known threat actors and their techniques.
13
-
When multiple signatures associated with the same threat actor are triggered within the time window, and the count of
14
-
unique signatures matches or exceeds the expected number of signatures for that threat technique, an alert is generated.
15
-
This helps identify potential coordinated threat activity in your network environment by correlating related intrusion
9
+
This analytic detects intrusion events from known threat activity using Cisco Secure Firewall Intrusion Events.
10
+
It leverages Cisco Secure Firewall Threat Defense IntrusionEvent logs to identify cases where one or multiple Snort signatures
11
+
associated with a known threat or threat actor activity have been triggered within a one-hour time window. The detection uses a
12
+
lookup table (cisco_snort_ids_to_threat_mapping) to map Snort signature IDs to known threat actors and their techniques.
13
+
When multiple signatures associated with the same threat actor are triggered within the time window, and the count of
14
+
unique signatures matches or exceeds the expected number of signatures for that threat technique, an alert is generated.
15
+
This helps identify potential coordinated threat activity in your network environment by correlating related intrusion
16
16
events that occur in close temporal proximity.
17
17
18
18
Currently, this detection will alert on the following threat actors or malware families as defined in the cisco_snort_ids_to_threat_mapping lookup:
19
+
19
20
* ArcaneDoor
20
21
* Static Tundra
21
22
* AgentTesla
22
23
* Amadey
24
+
* CastleRAT
23
25
* AsyncRAT
24
26
* Chafer
25
27
* DCRAT
@@ -28,6 +30,7 @@ description: |
28
30
* Quasar
29
31
* Remcos
30
32
* Snake
33
+
* Static Tundra
31
34
* Xworm
32
35
33
36
To add or update threat actors, update the cisco_snort_ids_to_threat_mapping.csv lookup file with new or modified threat names and associated Snort signature IDs.
0 commit comments