Skip to content

5.2 ‐ Detection Types and Status

Bhavin Patel edited this page Oct 9, 2024 · 1 revision

Splunk Security Content detections has a field called type these types will drive workflow in the future on the product, below are the current proposed types:

See https://car.mitre.org/Glossary for inspiration.

Type

Type Description Example
TTP A TTP analytic is designed to detect a certain adversary tactic, technique or procedure. Attempted Credential Dump From Registry via Reg exe
Baseline A posture analytic is designed to help in the maintenance of the analytic or create a baseline of data for detections to leverage. Baseline Of Cloud Instances Launched
Anomaly An anomaly analytic triggers on behavior that is not normally observed. Anomalous may not be explicitly malicious but may be suspect. For example, detection of executables that have never been run before or a process using the network which does not normally use the network. Like Situational Awareness analytics, anomaly analytics don’t necessarily indicate an attack. Abnormally High Number Of Cloud Infrastructure API Calls
Hunting A detection that increases the risk of an asset or entity, although tends to be too noisy to generate a notable event by itself. It leverages aggregated risk from various other detections to produce a notable. Also known as hunting queries. Common Ransomware Extensions
Correlation An analytic that correlates various detection results to correlate a high level threat and its primary purpose is to generate a notable. Windows Post Exploitation Risk Behavior
Investigation These analytics are searches that leverage tokens and are used in the prebuilt panels shipped by ESCU for Investigative Workbench in ES AWS Investigate Security Hub alerts by dest

Detection Configurations

Below is a table showing how each type is configured out of the box in ESCU.

Analytic Type Generates Notable Increases Risk (RBA) Triggers Playbook Tied to a Dashboard Runs on CRON Schedule Enabled OOB
Hunting No No No Yes No No
TTP Yes Yes Yes No Yes No
Baseline No Yes Yes No Yes No
Anomaly No Yes No No Yes No
Correlation Yes No Yes No Yes Yes
Investigation No No No Yes No No

Status

Status Explanation
Production These are fully-tested detections in Splunk Enterprise Security environment with latest Splunk TAs installed against the associated attack data
Experimental These detections DO NOT have an associated attack data because we were either not able to simulate the attack or that the attack data contains sensitive information that we were not able to publish to our attack data repository
Deprecated These detections are deprecated and no longer supported or maintained by Splunk. Usually, the description of a deprecated detections have a note regarding why the said detection is deprecated and if there is a replacement detection available