Try in Splunk Security Cloud


This search looks for AWS CloudTrail events from AWS Elastic Container Service (ECR). You need to activate image scanning in order to get the event DescribeImageScanFindings with the results.

  • Type: Anomaly
  • Product: Splunk Enterprise, Splunk Enterprise Security, Splunk Cloud, Dev Sec Ops Analytics
  • Datamodel:
  • Last Updated: 2021-08-17
  • Author: Patrick Bareiss, Splunk
  • ID: 0b80e2c8-c746-4ddb-89eb-9efd892220cf


ID Technique Tactic
T1204.003 Malicious Image Execution
T1204 User Execution Execution
`cloudtrail` eventName=DescribeImageScanFindings 
| spath path=responseElements.imageScanFindings.findings{} output=findings 
| mvexpand findings 
| spath input=findings
| search severity=MEDIUM 
| rename name as finding_name, description as finding_description, requestParameters.imageId.imageDigest as imageDigest, requestParameters.repositoryName as image 
| eval finding = finding_name.", ".finding_description 
| eval phase="release" 
| eval severity="medium" 
| stats min(_time) as firstTime max(_time) as lastTime by awsRegion, eventName, eventSource, imageDigest, image, user, userName, src_ip, finding, phase, severity 
| `security_content_ctime(firstTime)` 
| `security_content_ctime(lastTime)` 
| `aws_ecr_container_scanning_findings_medium_filter`

Associated Analytic Story

How To Implement

You must install splunk AWS add on and Splunk App for AWS. This search works with AWS CloudTrail logs.

Required field

  • eventSource
  • eventName
  • responseElements.imageScanFindings.findings{}
  • awsRegion
  • requestParameters.imageId.imageDigest
  • requestParameters.repositoryName
  • user
  • userName
  • src_ip

Kill Chain Phase

  • Actions on Objectives

Known False Positives



Risk Score Impact Confidence Message
21.0 30 70 Vulnerabilities with severity high found in image $image$


Test Dataset

Replay any dataset to Splunk Enterprise by using our tool or the UI. Alternatively you can replay a dataset into a Splunk Attack Range

source | version: 1