Analytics Story: Salt Typhoon
Description
Leverage searches that allow you to detect and investigate unusual activities that might relate to Salt Typhoon, a sophisticated threat actor targeting various sectors with espionage-focused campaigns. Monitor for indicators such as spear-phishing emails, unauthorized access attempts, and lateral movement within your network. Investigate anomalous data exfiltration patterns and command-and-control (C2) traffic consistent with known tactics, techniques, and procedures (TTPs) of this group. Combining threat intelligence with advanced monitoring tools helps identify potential Salt Typhoon activity early, enabling swift response to mitigate risks effectively.
Why it matters
Salt Typhoon is a highly capable threat actor known for conducting targeted espionage campaigns against diverse sectors, including government, technology, and critical infrastructure. This group leverages sophisticated tactics such as spear-phishing, credential theft, and exploiting software vulnerabilities to gain initial access. Once inside a network, Salt Typhoon demonstrates expertise in lateral movement, privilege escalation, and covert data exfiltration. Their use of custom malware and command-and-control (C2) infrastructures highlights their adaptability. Detecting their activity requires robust threat intelligence and proactive monitoring of unusual behaviors and network anomalies.
Correlation Search
Cisco Privileged Account Creation with Suspicious SSH Activity
1| tstats `security_content_summariesonly`
2 min(_time) as firstTime
3 max(_time) as lastTime
4
5 sum(All_Risk.calculated_risk_score) as risk_score
6 count(All_Risk.calculated_risk_score) as risk_event_count
7
8 values(All_Risk.annotations.mitre_attack.mitre_tactic_id) as annotations.mitre_attack.mitre_tactic_id
9 dc(All_Risk.annotations.mitre_attack.mitre_tactic_id) as mitre_tactic_id_count
10
11 values(All_Risk.annotations.mitre_attack.mitre_technique_id) as annotations.mitre_attack.mitre_technique_id
12 dc(All_Risk.annotations.mitre_attack.mitre_technique_id) as mitre_technique_id_count
13
14 values(All_Risk.tag) as tag
15 values(source) as source
16 dc(source) as source_count
17
18 values(contributing_events_search)
19
20 values(All_Risk.threat_object)
21
22 from datamodel=Risk.All_Risk where
23
24 source IN (
25 "*Cisco IOS Suspicious Privileged Account Creation*",
26 "*Cisco Secure Firewall - SSH Connection to sshd_operns*",
27 "*Cisco Secure Firewall - SSH Connection to Non-Standard Port*"
28 )
29 by All_Risk.normalized_risk_object
30| `drop_dm_object_name(All_Risk)`
31| eval has_account_creation=if(
32 match(source, "Cisco IOS Suspicious Privileged Account Creation"),
33 1, 0
34 )
35| eval has_ssh_detection=if(
36 match(source, "SSH Connection to sshd_operns")
37 OR
38 match(source, "SSH Connection to Non-Standard Port"),
39 1, 0
40 )
41| where has_account_creation=1
42 AND
43 has_ssh_detection=1
44| `security_content_ctime(firstTime)`
45| `security_content_ctime(lastTime)`
46| `cisco_privileged_account_creation_with_suspicious_ssh_activity_filter`
Detections
Data Sources
| Name | Platform | Sourcetype | Source |
|---|---|---|---|
| Cisco Network Visibility Module Flow Data | cisco:nvm:flowdata |
not_applicable |
|
| Cisco Secure Firewall Threat Defense Intrusion Event | Other | cisco:sfw:estreamer |
not_applicable |
| CrowdStrike ProcessRollup2 | Other | crowdstrike:events:sensor |
crowdstrike |
| Linux Auditd Cwd | auditd |
auditd |
|
| Linux Auditd Execve | auditd |
auditd |
|
| Linux Auditd Path | auditd |
auditd |
|
| Linux Auditd Proctitle | auditd |
auditd |
|
| Powershell Script Block Logging 4104 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-PowerShell/Operational |
|
| Sysmon EventID 1 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
| Sysmon EventID 11 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
| Sysmon EventID 13 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
| Sysmon EventID 17 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
| Sysmon EventID 18 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
| Sysmon EventID 7 | XmlWinEventLog |
XmlWinEventLog:Microsoft-Windows-Sysmon/Operational |
|
| Sysmon for Linux EventID 1 | sysmon:linux |
Syslog:Linux-Sysmon/Operational |
|
| Sysmon for Linux EventID 11 | sysmon:linux |
Syslog:Linux-Sysmon/Operational |
|
| Windows Event Log Security 4663 | XmlWinEventLog |
XmlWinEventLog:Security |
|
| Windows Event Log Security 4688 | XmlWinEventLog |
XmlWinEventLog:Security |
|
| Windows Event Log Security 4698 | XmlWinEventLog |
XmlWinEventLog:Security |
|
| Windows Event Log Security 4703 | XmlWinEventLog |
XmlWinEventLog:Security |
|
| Windows Event Log System 7045 | XmlWinEventLog |
XmlWinEventLog:System |
References
Source: GitHub | Version: 1