Skip to content

Commit ce6fbc2

Browse files
committed
update snort lookup
1 parent 731df60 commit ce6fbc2

File tree

3 files changed

+17
-13
lines changed

3 files changed

+17
-13
lines changed

detections/network/cisco_secure_firewall___intrusion_events_by_threat_activity.yml

Lines changed: 14 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,25 +1,27 @@
11
name: Cisco Secure Firewall - Intrusion Events by Threat Activity
22
id: b71e57e8-c571-4ff1-ae13-bc4384a9e891
3-
version: 4
4-
date: '2025-09-25'
3+
version: 5
4+
date: '2025-12-08'
55
author: Bhavin Patel, Nasreddine Bencherchali, Splunk
66
status: production
77
type: Anomaly
88
description: |
9-
This analytic detects intrusion events from known threat activity using Cisco Secure Firewall Intrusion Events.
10-
It leverages Cisco Secure Firewall Threat Defense IntrusionEvent logs to identify cases where one or multiple Snort signatures
11-
associated with a known threat or threat actor activity have been triggered within a one-hour time window. The detection uses a
12-
lookup table (cisco_snort_ids_to_threat_mapping) to map Snort signature IDs to known threat actors and their techniques.
13-
When multiple signatures associated with the same threat actor are triggered within the time window, and the count of
14-
unique signatures matches or exceeds the expected number of signatures for that threat technique, an alert is generated.
15-
This helps identify potential coordinated threat activity in your network environment by correlating related intrusion
9+
This analytic detects intrusion events from known threat activity using Cisco Secure Firewall Intrusion Events.
10+
It leverages Cisco Secure Firewall Threat Defense IntrusionEvent logs to identify cases where one or multiple Snort signatures
11+
associated with a known threat or threat actor activity have been triggered within a one-hour time window. The detection uses a
12+
lookup table (cisco_snort_ids_to_threat_mapping) to map Snort signature IDs to known threat actors and their techniques.
13+
When multiple signatures associated with the same threat actor are triggered within the time window, and the count of
14+
unique signatures matches or exceeds the expected number of signatures for that threat technique, an alert is generated.
15+
This helps identify potential coordinated threat activity in your network environment by correlating related intrusion
1616
events that occur in close temporal proximity.
1717
1818
Currently, this detection will alert on the following threat actors or malware families as defined in the cisco_snort_ids_to_threat_mapping lookup:
19+
1920
* ArcaneDoor
2021
* Static Tundra
2122
* AgentTesla
2223
* Amadey
24+
* CastleRAT
2325
* AsyncRAT
2426
* Chafer
2527
* DCRAT
@@ -28,6 +30,7 @@ description: |
2830
* Quasar
2931
* Remcos
3032
* Snake
33+
* Static Tundra
3134
* Xworm
3235
3336
To add or update threat actors, update the cisco_snort_ids_to_threat_mapping.csv lookup file with new or modified threat names and associated Snort signature IDs.
@@ -80,7 +83,7 @@ rba:
8083
- field: signature
8184
type: signature
8285
tags:
83-
analytic_story:
86+
analytic_story:
8487
- Cisco Secure Firewall Threat Defense Analytics
8588
- ArcaneDoor
8689
asset_type: Network
@@ -97,4 +100,4 @@ tests:
97100
attack_data:
98101
- data: https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/cisco_secure_firewall_threat_defense/lumma_stealer/lumma_stealer_events.log
99102
source: not_applicable
100-
sourcetype: cisco:sfw:estreamer
103+
sourcetype: cisco:sfw:estreamer

lookups/cisco_snort_ids_to_threat_mapping.csv

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,7 @@ Amadey,60570,MALWARE-TOOLS,Win.Trojan.Amadey malware tools download attempt
1818
Amadey,60571,MALWARE-TOOLS,Win.Trojan.Amadey malware tools download attempt
1919
Amadey,60572,MALWARE-TOOLS,Win.Trojan.Amadey malware tools download attempt
2020
AsyncRAT,58773,MALWARE-CNC,Rat.Trojan.AsyncRAT variant cnc connection
21+
CastleRAT,65548,MALWARE-CNC,Win.Trojan.CastleRAT variant outbound IP geolocation lookup attempt
2122
Chafer,45972,MALWARE-CNC,Win.Trojan.Chafer malicious communication attempt
2223
Chafer,45973,MALWARE-CNC,Win.Trojan.Chafer malicious communication attempt
2324
DCRAT,58356,MALWARE-CNC,Win.Trojan.DCRAT variant outbound connection

lookups/cisco_snort_ids_to_threat_mapping.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
name: cisco_snort_ids_to_threat_mapping
2-
date: 2025-09-24
3-
version: 3
2+
date: 2025-12-08
3+
version: 4
44
id: f08ae6ce-d7a8-423e-a778-be7178a719f9
55
author: Bhavin Patel, Nasreddine Bencherchali, Splunk Threat Research Team
66
lookup_type: csv

0 commit comments

Comments
 (0)