Skip to content

Commit bf3fe8b

Browse files
committed
remove yamls and update mapping
1 parent 1a08409 commit bf3fe8b

20 files changed

+89
-62
lines changed

removed/deprecation_mapping.YML

+89-62
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,81 @@
11
detections:
2+
- content: Detect Large Outbound ICMP Packets
3+
removed_in_version: 5.6.0
4+
reason: Detection has been replaced by a new detection with a more specific name
5+
replacement_content:
6+
- Detect Large ICMP Traffic
7+
- content: Windows Service Created Within Public Path
8+
removed_in_version: 5.6.0
9+
reason: Detection has been replaced by a new detection with a more specific name
10+
replacement_content:
11+
- Windows Service Created with Suspicious Service Path
12+
- content: GitHub Actions Disable Security Workflow
13+
removed_in_version: 5.4.0
14+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
15+
replacement_content:
16+
- GitHub Organizations Disable Classic Branch Protection Rule
17+
- content: Github Commit Changes In Master
18+
removed_in_version: 5.4.0
19+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
20+
- content: Github Commit In Develop
21+
removed_in_version: 5.4.0
22+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
23+
- content: GitHub Dependabot Alert
24+
removed_in_version: 5.4.0
25+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
26+
replacement_content:
27+
- GitHub Enterprise Disable Dependabot
28+
- content: GitHub Pull Request from Unknown User
29+
removed_in_version: 5.4.0
30+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
31+
- content: Known Services Killed by Ransomware
32+
removed_in_version: 5.4.0
33+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
34+
replacement_content:
35+
- Windows Security And Backup Services Stop
36+
- content: Remote Desktop Network Bruteforce
37+
removed_in_version: 5.4.0
38+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
39+
replacement_content:
40+
- Windows Remote Desktop Network Bruteforce Attempt
41+
- content: Suspicious Driver Loaded Path
42+
removed_in_version: 5.4.0
43+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
44+
replacement_content:
45+
- Windows Suspicious Driver Loaded Path
46+
- content: Suspicious Event Log Service Behavior
47+
removed_in_version: 5.4.0
48+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
49+
replacement_content:
50+
- Windows Event Logging Service Has Shutdown
51+
- content: Suspicious Process File Path
52+
removed_in_version: 5.4.0
53+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
54+
replacement_content:
55+
- Windows Suspicious Process File Path
56+
- content: AWS Cross Account Activity From Previously Unseen Account
57+
removed_in_version: 5.4.0
58+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
59+
replacement_content:
60+
- AWS Cross Account Activity From Previously Unseen Account
61+
- content: aws detect attach to role policy
62+
removed_in_version: 5.4.0
63+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
64+
- content: aws detect permanent key creation
65+
removed_in_version: 5.4.0
66+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
67+
- content: aws detect role creation
68+
removed_in_version: 5.4.0
69+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
70+
- content: aws detect sts assume role abuse
71+
removed_in_version: 5.4.0
72+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
73+
- content: aws detect sts get session token abuse
74+
removed_in_version: 5.4.0
75+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
76+
- content: AWS SAML Access by Provider User and Principal
77+
removed_in_version: 5.4.0
78+
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
279
- content: Open Redirect in Splunk Web
380
removed_in_version: 5.2.0
481
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
@@ -250,11 +327,7 @@ detections:
250327
have their specific analytics.
251328
replacement_content:
252329
- Microsoft Defender ATP Alerts
253-
- content: Detect Critical Alerts from Security Tools
254-
removed_in_version: 5.2.0
255-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
256-
replacement_content:
257-
- Microsoft Defender Incident Alerts
330+
- Microsoft Defender Incident Alerts
258331
- content: Excel Spawning PowerShell
259332
removed_in_version: 5.2.0
260333
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
@@ -694,57 +767,6 @@ detections:
694767
- content: Excel Spawning Windows Script Host
695768
removed_in_version: 5.2.0
696769
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
697-
- content: GitHub Actions Disable Security Workflow
698-
removed_in_version: 5.4.0
699-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
700-
- content: Github Commit Changes In Master
701-
removed_in_version: 5.4.0
702-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
703-
- content: Github Commit In Develop
704-
removed_in_version: 5.4.0
705-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
706-
- content: GitHub Dependabot Alert
707-
removed_in_version: 5.4.0
708-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
709-
- content: GitHub Pull Request from Unknown User
710-
removed_in_version: 5.4.0
711-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
712-
- content: Known Services Killed by Ransomware
713-
removed_in_version: 5.4.0
714-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
715-
- content: Remote Desktop Network Bruteforce
716-
removed_in_version: 5.4.0
717-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
718-
- content: Suspicious Driver Loaded Path
719-
removed_in_version: 5.4.0
720-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
721-
- content: Suspicious Event Log Service Behavior
722-
removed_in_version: 5.4.0
723-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
724-
- content: Suspicious Process File Path
725-
removed_in_version: 5.4.0
726-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
727-
- content: AWS Cross Account Activity From Previously Unseen Account
728-
removed_in_version: 5.4.0
729-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
730-
- content: aws detect attach to role policy
731-
removed_in_version: 5.4.0
732-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
733-
- content: aws detect permanent key creation
734-
removed_in_version: 5.4.0
735-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
736-
- content: aws detect role creation
737-
removed_in_version: 5.4.0
738-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
739-
- content: aws detect sts assume role abuse
740-
removed_in_version: 5.4.0
741-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
742-
- content: aws detect sts get session token abuse
743-
removed_in_version: 5.4.0
744-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
745-
- content: AWS SAML Access by Provider User and Principal
746-
removed_in_version: 5.4.0
747-
reason: Detection deprecated as it no longer effectively identifies the intended malicious activity
748770
baselines:
749771
- content: Add Prohibited Processes to Enterprise Security
750772
removed_in_version: 5.2.0
@@ -943,6 +965,16 @@ investigations:
943965
removed_in_version: 5.2.0
944966
reason: 'As of Splunk Enterprise Security version 8.0, Splunk Enterprise Security no longer supports Investigations. As such, all Investigations have been deprecated in ES Content Update.'
945967
stories:
968+
- content: Nexus APT Threat Activity
969+
removed_in_version: 5.4.0
970+
reason: Analytic Story has been replaced by a new analytic story with a more specific name
971+
replacement_content:
972+
- China-Nexus Threat Activity
973+
- content: Earth Estries
974+
removed_in_version: 5.4.0
975+
reason: Analytic Story has been replaced by a new analytic story with a more specific name
976+
replacement_content:
977+
- Salt Typhoon
946978
- content: AWS Cryptomining
947979
removed_in_version: 5.2.0
948980
reason: Analytic Story deprecated as it no longer effectively identifies the intended malicious activity
@@ -1000,9 +1032,4 @@ stories:
10001032
- Suspicious Cloud Instance Activities
10011033
- content: Web Fraud Detection
10021034
removed_in_version: 5.2.0
1003-
reason: Analytic Story deprecated as it no longer effectively identifies the intended malicious activity
1004-
- content: Nexus APT Threat Activity
1005-
removed_in_version: 5.4.0
1006-
reason: Analytic Story deprecated as it no longer effectively identifies the intended malicious activity
1007-
replacement_content:
1008-
- China-Nexus Threat Activity
1035+
reason: Analytic Story deprecated as it no longer effectively identifies the intended malicious activity

0 commit comments

Comments
 (0)