Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion contentctl.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ app:
uid: 3449
title: ES Content Updates
appid: DA-ESS-ContentUpdate
version: 5.19.0
version: 5.20.0
description: Explore the Analytic Stories included with ES Content Updates.
prefix: ESCU
label: ESCU
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ id: 900bc324-59f3-11ec-9fb4-acde48001122
version: 10
date: '2025-10-16'
author: Michael Haag, Splunk, DipsyTipsy
status: deprecated
status: removed
type: TTP
description: The following analytic detects the use of curl on Linux or MacOS systems
to download a file from a remote source and pipe it directly to bash for execution.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ id: 7b09db8a-5c20-11ec-9945-acde48001122
version: 10
date: '2025-10-25'
author: Michael Haag, Splunk
status: deprecated
status: removed
type: TTP
description: The following analytic detects instances where Java, or Tomcat
processes spawn a Linux shell, which may indicate exploitation attempts, such as
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ id: 0f03423c-7c6a-11eb-bc47-acde48001122
version: 11
date: '2025-10-16'
author: Michael Haag, Splunk
status: deprecated
status: removed
type: TTP
description: The following analytic identifies instances where a shell (PowerShell.exe
or Cmd.exe) is spawned from W3WP.exe, the IIS worker process. This detection leverages
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ id: 35682718-5a85-11ec-b8f7-acde48001122
version: 10
date: '2025-10-16'
author: Michael Haag, Splunk, DipsyTipsy
status: deprecated
status: removed
type: TTP
description: The following analytic detects the use of wget on Windows, Linux or MacOS
to download a file from a remote source and pipe it to bash. This detection leverages
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ id: 00ab0805-4b0f-489f-8eda-ee3de5ed5b1c
version: 2
date: '2025-10-27'
author: Teoderick Contreras, Splunk
status: deprecated
status: removed
type: Anomaly
description: This detection monitors the creation or modification of the Default.rdp file, typically found in the user's Documents folder. This file is automatically generated or updated by the Remote Desktop Connection client (mstsc.exe) when a user initiates an RDP session. It stores connection settings such as the last-used hostname, screen size, and other preferences. The presence or update of this file strongly suggests that an RDP session has been launched from the system. Since this file is commonly overlooked, it can serve as a valuable artifact in identifying remote access activity, including potential lateral movement or attacker-controlled sessions.
data_source:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ id: 28c81306-5c47-11ec-bfea-acde48001122
version: 12
date: '2025-10-25'
author: Michael Haag, Splunk
status: deprecated
status: removed
type: TTP
description: The following analytic identifies instances where java.exe or w3wp.exe
spawns a Windows shell, such as cmd.exe or powershell.exe. This detection leverages
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ id: 95a455f0-4c04-11ec-b8ac-3e22fbd008af
version: 7
date: '2025-10-21'
author: Mauricio Velazco, Splunk
status: deprecated
status: removed
type: TTP
description: The following analytic detects `wmiprvse.exe` spawning a LOLBAS execution
process. It leverages data from Endpoint Detection and Response (EDR) agents, focusing
Expand Down