|
1 | 1 | ############# |
2 | 2 | # Automatically generated by generator.py in splunk/security-content |
3 | | -# On Date: 2019-10-31T17:15:19 UTC |
| 3 | +# On Date: 2019-10-31T20:26:18 UTC |
4 | 4 | # Author: Splunk Security Research |
5 | 5 | |
6 | 6 | ############# |
7 | 7 |
|
8 | 8 | [api_call_by_user_baseline] |
9 | 9 | filename = api_call_by_user_baseline.csv |
10 | | -description = A lookup file that will contain the baseline information for number of AWS API calls per user |
| 10 | +# description = A lookup file that will contain the baseline information for number of AWS API calls per user |
11 | 11 |
|
12 | 12 | [aws_service_accounts] |
13 | 13 | filename = aws_service_accounts.csv |
14 | | -description = A lookup file that will contain AWS Service accounts |
| 14 | +# description = A lookup file that will contain AWS Service accounts |
15 | 15 |
|
16 | 16 | [baseline_blocked_outbound_connections] |
17 | 17 | filename = baseline_blocked_outbound_connections.csv |
18 | | -description = A lookup file that will contain the baseline information for number of blocked outbound connections |
| 18 | +# description = A lookup file that will contain the baseline information for number of blocked outbound connections |
19 | 19 |
|
20 | 20 | [brandMonitoring_lookup] |
21 | 21 | filename = brand_monitoring.csv |
22 | 22 | default_match = false |
23 | | -description = A file that contains look-a-like domains for brands that you want to monitor |
| 23 | +# description = A file that contains look-a-like domains for brands that you want to monitor |
24 | 24 | match_type = WILDCARD(domain) |
25 | 25 | min_matches = 1 |
26 | 26 |
|
27 | 27 | [csc_lookup] |
28 | 28 | filename = csc_lookup.csv |
29 | | -description = The CSC control numbers and names |
| 29 | +# description = The CSC control numbers and names |
30 | 30 | min_matches = 1 |
31 | 31 |
|
32 | 32 | [domains] |
33 | 33 | filename = domains.csv |
34 | | -description = A list of domains that can be whitelisted |
| 34 | +# description = A list of domains that can be whitelisted |
35 | 35 |
|
36 | 36 | [dynamic_dns_providers_default] |
37 | 37 | filename = dynamic_dns_providers_default.csv |
38 | 38 | case_sensitive_match = false |
39 | | -description = A list of dynammic dns providers that should not be modified |
| 39 | +# description = A list of dynammic dns providers that should not be modified |
40 | 40 | match_type = WILDCARD(dynamic_dns_domains) |
41 | 41 |
|
42 | 42 | [dynamic_dns_providers_local] |
43 | 43 | filename = dynamic_dns_providers_local.csv |
44 | 44 | case_sensitive_match = false |
45 | | -description = A list of dynammic dns providers that can be modified |
| 45 | +# description = A list of dynammic dns providers that can be modified |
46 | 46 | match_type = WILDCARD(dynamic_dns_domains) |
47 | 47 |
|
48 | 48 | [escu_search_id_lookup] |
49 | 49 | filename = escu_search_id.csv |
50 | | -description = A placeholder lookup file to hold information for ESCU Usage dashboard |
| 50 | +# description = A placeholder lookup file to hold information for ESCU Usage dashboard |
51 | 51 |
|
52 | 52 | [isSuspiciousFileExtension_lookup] |
53 | 53 | filename = suspicious_email_attachments.csv |
54 | | -description = A list of suspicious extensions for email attachments |
| 54 | +# description = A list of suspicious extensions for email attachments |
55 | 55 | match_type = WILDCARD(file_name) |
56 | 56 |
|
57 | 57 | [isWindowsSystemFile_lookup] |
58 | 58 | filename = system32_executables.csv |
59 | 59 | default_match = false |
60 | | -description = A list of executable files in Windows\System32 |
| 60 | +# description = A list of executable files in Windows\System32 |
61 | 61 | min_matches = 1 |
62 | 62 |
|
63 | 63 | [legit_domains] |
64 | 64 | filename = legit_domains.csv |
65 | | -description = A list of legit domains to be used to whitelist possible phishing sites |
| 65 | +# description = A list of legit domains to be used to whitelist possible phishing sites |
66 | 66 |
|
67 | 67 | [lookup_rare_process_whitelist_default] |
68 | 68 | filename = rare_process_whitelist_default.csv |
69 | 69 | default_match = false |
70 | 70 | case_sensitive_match = false |
71 | | -description = A list of rare processes that are legitimate provided by Splunk |
| 71 | +# description = A list of rare processes that are legitimate provided by Splunk |
72 | 72 | match_type = WILDCARD(process) |
73 | 73 | min_matches = 1 |
74 | 74 |
|
75 | 75 | [lookup_rare_process_whitelist_local] |
76 | 76 | filename = rare_process_whitelist_local.csv |
77 | 77 | default_match = false |
78 | 78 | case_sensitive_match = false |
79 | | -description = A list of rare processes that are legitimate provided by the end user |
| 79 | +# description = A list of rare processes that are legitimate provided by the end user |
80 | 80 | match_type = WILDCARD(process) |
81 | 81 | min_matches = 1 |
82 | 82 |
|
83 | 83 | [lookup_uncommon_processes_default] |
84 | 84 | filename = uncommon_processes_default.csv |
85 | 85 | case_sensitive_match = false |
86 | | -description = A list of processes that are not common |
| 86 | +# description = A list of processes that are not common |
87 | 87 | match_type = WILDCARD(process) |
88 | 88 |
|
89 | 89 | [lookup_uncommon_processes_local] |
90 | 90 | filename = uncommon_processes_local.csv |
91 | 91 | case_sensitive_match = false |
92 | | -description = A list of processes that are not common |
| 92 | +# description = A list of processes that are not common |
93 | 93 | match_type = WILDCARD(process) |
94 | 94 |
|
95 | 95 | [network_acl_activity_baseline] |
96 | 96 | filename = network_acl_activity_baseline.csv |
97 | | -description = A lookup file that will contain the baseline information for number of AWS Network ACL Activity |
| 97 | +# description = A lookup file that will contain the baseline information for number of AWS Network ACL Activity |
98 | 98 |
|
99 | 99 | [previously_seen_S3_access_from_remote_ip] |
100 | 100 | filename = previously_seen_S3_access_from_remote_ip.csv |
101 | | -description = A placeholder for a list of IPs that have access S3 |
| 101 | +# description = A placeholder for a list of IPs that have access S3 |
102 | 102 |
|
103 | 103 | [previously_seen_api_calls_from_user_roles] |
104 | 104 | filename = previously_seen_api_calls_from_user_roles.csv |
105 | | -description = A placeholder for a list of AWS API calls for each user role |
| 105 | +# description = A placeholder for a list of AWS API calls for each user role |
106 | 106 |
|
107 | 107 | [previously_seen_aws_cross_account_activity] |
108 | 108 | filename = previously_seen_aws_cross_account_activity.csv |
109 | | -description = A placeholder for a list of AWS accounts and assumed roles |
| 109 | +# description = A placeholder for a list of AWS accounts and assumed roles |
110 | 110 |
|
111 | 111 | [previously_seen_aws_regions] |
112 | 112 | filename = previously_seen_aws_regions.csv |
113 | 113 | default_match = false |
114 | | -description = A place holder for a list of used AWS regions |
| 114 | +# description = A place holder for a list of used AWS regions |
115 | 115 | min_matches = 1 |
116 | 116 |
|
117 | 117 | [previously_seen_cloud_compute_creations_by_user] |
118 | 118 | filename = previously_seen_cloud_compute_creations_by_user.csv |
119 | 119 | default_match = false |
120 | | -description = A place holder for a list of users that have created cloud compute instances |
| 120 | +# description = A place holder for a list of users that have created cloud compute instances |
121 | 121 | min_matches = 1 |
122 | 122 |
|
123 | 123 | [previously_seen_cloud_compute_images] |
124 | 124 | filename = previously_seen_cloud_compute_images.csv |
125 | 125 | default_match = false |
126 | | -description = A place holder for a list of used cloud compute images |
| 126 | +# description = A place holder for a list of used cloud compute images |
127 | 127 | min_matches = 1 |
128 | 128 |
|
129 | 129 | [previously_seen_cloud_compute_instance_types] |
130 | 130 | filename = previously_seen_cloud_compute_instance_types.csv |
131 | 131 | default_match = false |
132 | | -description = A place holder for a list of used cloud compute instance types |
| 132 | +# description = A place holder for a list of used cloud compute instance types |
133 | 133 | min_matches = 1 |
134 | 134 |
|
135 | 135 | [previously_seen_cloud_regions] |
136 | 136 | filename = previously_seen_cloud_regions.csv |
137 | 137 | default_match = false |
138 | | -description = A place holder for a list of used cloud compute images |
| 138 | +# description = A place holder for a list of used cloud compute images |
139 | 139 | min_matches = 1 |
140 | 140 |
|
141 | 141 | [previously_seen_cmd_line_arguments] |
142 | 142 | filename = previously_seen_cmd_line_arguments.csv |
143 | | -description = A placeholder for a list of cmd line arugments that been seen before |
| 143 | +# description = A placeholder for a list of cmd line arugments that been seen before |
144 | 144 |
|
145 | 145 | [previously_seen_ec2_modifications_by_user] |
146 | 146 | filename = previously_seen_ec2_modifications_by_user.csv |
147 | | -description = A place holder for a list of AWS EC2 modifications done by each user |
| 147 | +# description = A place holder for a list of AWS EC2 modifications done by each user |
148 | 148 |
|
149 | 149 | [previously_seen_running_windows_services] |
150 | 150 | filename = previously_seen_running_windows_services.csv |
151 | | -description = A placeholder for the list of Windows Services running |
| 151 | +# description = A placeholder for the list of Windows Services running |
152 | 152 |
|
153 | 153 | [prohibitedProcesses_lookup] |
154 | 154 | filename = prohibited_processes.csv |
155 | | -description = A list of processes that have been marked as prohibited |
| 155 | +# description = A list of processes that have been marked as prohibited |
156 | 156 |
|
157 | 157 | [prohibited_apps_launching_cmd] |
158 | 158 | filename = prohibited_apps_launching_cmd.csv |
159 | | -description = A list of processes that should not be launching cmd.exe |
| 159 | +# description = A list of processes that should not be launching cmd.exe |
160 | 160 | match_type = WILDCARD(prohibited_applications) |
161 | 161 |
|
162 | 162 | [ransomware_extensions_lookup] |
163 | 163 | filename = ransomware_extensions.csv |
164 | 164 | default_match = false |
165 | | -description = A list of file extensions that are associated with ransomware |
| 165 | +# description = A list of file extensions that are associated with ransomware |
166 | 166 | min_matches = 1 |
167 | 167 |
|
168 | 168 | [ransomware_notes_lookup] |
169 | 169 | filename = ransomware_notes.csv |
170 | 170 | default_match = false |
171 | | -description = A list of file names that are ransomware note files |
| 171 | +# description = A list of file names that are ransomware note files |
172 | 172 | match_type = WILDCARD(ransomware_notes) |
173 | 173 | min_matches = 1 |
174 | 174 |
|
175 | 175 | [s3_deletion_baseline] |
176 | 176 | filename = s3_deletion_baseline.csv |
177 | | -description = A placeholder for the baseline information for AWS S3 deletions |
| 177 | +# description = A placeholder for the baseline information for AWS S3 deletions |
178 | 178 |
|
179 | 179 | [security_group_activity_baseline] |
180 | 180 | filename = security_group_activity_baseline.csv |
181 | | -description = A placeholder for the baseline information for AWS security groups |
| 181 | +# description = A placeholder for the baseline information for AWS security groups |
182 | 182 |
|
183 | 183 | [security_services_lookup] |
184 | 184 | filename = security_services.csv |
185 | 185 | default_match = false |
186 | | -description = A list of services that deal with security |
| 186 | +# description = A list of services that deal with security |
187 | 187 | match_type = WILDCARD(service) |
188 | 188 | min_matches = 1 |
189 | 189 |
|
190 | 190 | [suspicious_writes_lookup] |
191 | 191 | filename = suspicious_files.csv |
192 | 192 | default_match = false |
193 | | -description = A list of suspicious file names |
| 193 | +# description = A list of suspicious file names |
194 | 194 | match_type = WILDCARD(file) |
195 | 195 | min_matches = 1 |
196 | 196 |
|
0 commit comments