August 1, 2025 - Content Release
This content release includes:
- New rules to assist in detection of the ToolShell exploit against Microsoft SharePoint Server (CVE-2025-53770, CVE-2025-53771) and other web shell attack activity.
- Updates to rules.
- Parsing support for Open Cybersecurity Schema Framework (OCSF) logging.
- Designed to support AWS Security Hub Findings via OCSF, but broadly compatible with other OCSF data sources.
- Mapping support for AWS Security Hub Findings via OCSF.
- AWS Security Hub via OCSF mapping support includes mappers which can be easily cloned and repurposed to support additional sources of data which use OCSF. Not all OCSF categories and classes are necessarily pertinent to AWS Security Hub data produced at this time.
- Additional mappers for OCSF data sources will be added in future releases.
- Updates to AWS Security Hub (non-OCSF) mapper to reduce signal volume by using a less granular field for
threat_signalName
and to map general resources intoresource
field. - New mappers for Citrix NetScaler and Palo Alto Firewall events.
- Updates to existing mappers/parsers for AWS, Azure, Citrix NetScaler, Linux Sysmon, Windows Sysmon, and Zscaler to support additional events and field mappings.
- Allows
resource
to be used as an entity in rules.
Other changes are enumerated below.
Rules
- [New] MATCH-S01050 IIS - Executable File Added to Directory
- Executable files added to Microsoft Internet Information Server (IIS) directories can indicate the installation of a web shell by an attacker. For example, the ToolShell exploit (CVE-2025-53770, CVE-2025-53771) included the installation of spinstall10.aspx in an executable directory.
- [New] MATCH-S01051 SharePoint Server ToolShell Exploitation (CVE-2025-53770, CVE-2025-53771)
- Exploits against two vulnerabilities in Microsoft SharePoint server, CVE-2025-53770 and CVE-2025-53771, are combined to execute code on Microsoft SharePoint without authentication. This attack has been nicknamed "ToolShell".
- [New] MATCH-S01052 SharePoint Server ToolShell Web Shell Interaction (CVE-2025-53771)
- Exploits against two vulnerabilities in Microsoft SharePoint server, CVE-2025-53770 and CVE-2025-53771, are combined to execute code on Microsoft SharePoint without authentication. This attack has been nicknamed "ToolShell".
- [Updated] MATCH-S00402 Normalized Security Signal
- Adjusted summary to remove
{{device_hostname}}
to avoidnull
values for blank hostnames. - Added
resource
to entity selector
- Adjusted summary to remove
- [Updated] MATCH-S00061 Zscaler - Allowed Elevated Risk Score Events
- Updated rule expression and severity score to use normalized fields.
Log Mappers
- [New] AWS Security Hub - OCSF Finding Events
- [New] AWS Security Hub - Application Activity *
- [New] AWS Security Hub - Authentication Event*
- [New] AWS Security Hub - DHCP Activity*
- [New] AWS Security Hub - DNS Activity*
- [New] AWS Security Hub - Discovery Event*
- [New] AWS Security Hub - Email Activity*
- [New] AWS Security Hub - File System events*
- [New] AWS Security Hub - HTTP Activity*
- [New] AWS Security Hub - IAM Account change|Authorize Session|Entity Management|User Access Management|Group Management*
- [New] AWS Security Hub - Kernel Extension Activity|Kernel Activity|Memory Activity|Module Activity|Scheduled Job Activity|Process Activity|Event Log Activity|Script Activity*
- [New] AWS Security Hub - Network Activity|RDP Activity|SMB Activity|SMB Activity|SSH Activity|FTP Activity|NTP Activity|Tunnel Activity|Network Remediation Activity*
- [New] AWS Security Hub - Remediation Activity|Process Remediation Activity*
- [New] AWS Security Hub - Unmanned Systems*
- [New] Citrix NetScaler - AAA-AUTH-REQ
- [New] Palo Alto Audit Authentication logs
- [New] Palo Alto Audit Catch All
- [Updated] AWS Security Hub
- [Updated] Azure Event Hub - Windows Defender Audit file events
- [Updated] Citrix NetScaler - AAA-LOGIN_FAILED
- [Updated] Citrix NetScaler - Command Executed
- [Updated] Citrix NetScaler - MESSAGE
- [Updated] Citrix NetScaler - SSL Handshake Success
- [Updated] Citrix NetScaler - SSLVPN-LOGIN
- [Updated] Keeper Authentication
- [Updated] Keeper Catch All
- [Updated] Mimecast AV Event
- [Updated] Mimecast Email logs
- [Updated] Linux-Sysmon/Operational - 11
- Added more normalized fields
- [Updated] Windows - Microsoft-Windows-Sysmon/Operational - 11
- Added more normalized fields.
- [Updated] Zscaler - Nanolog Streaming Service - JSON
- Added normalizedAction for allow/deny actions and alternate values for IPs.
* Security Hub via OCSF is currently limited to the OCSF Findings category. Additional mappers are in place to support potential future Security Hub events that utilize other OCSF categories and classes. These can be cloned and repurposed to support additional sources of data which use OCSF.
Parsers
- [Deleted] /Parsers/System/Mindpoint Group/Mindpoint SurePass
- Updated erroneous vendor name in parser.
- Any existing references to this parser path will need to be updated to the new parser path.
- [New] /Parsers/System/Keeper/Keeper
- New parser for Keeper with correct vendor name.
- [New] /Parsers/System/OCSF/OCSF
- [New] /Parsers/System/SurePass/SurePass
- New parser path for Surepass to reflect correct vendor name.
- [Updated] /Parsers/System/Mindpoint Group/Mindpoint Group Keeper
- Updated parser to point to new parser path with correct vendor name.
- [Updated] /Parsers/System/Microsoft/Office 365
- Updated to fix issue with
normalizedLogon
field not being populated correctly.
- Updated to fix issue with
- [Updated] /Parsers/System/Citrix/Citrix NetScaler Syslog
- Updated header regex, added support for new events, and added new time format.
- [Updated] /Parsers/System/Palo Alto/PAN Firewall CSV
- Updated to handle new log formats and fields.
Schema
- [Updated] resource
- Enables
resource
as an entity.
- Enables