Rod- Suspicious Local LLM Frameworks#3780
Conversation
detections/endpoint/suspicious_local_llm_framework_download_and_execution_via_sysmon.yml
Outdated
Show resolved
Hide resolved
detections/endpoint/unauthorized_llm_model_file_creation_on_endpoint.yml
Outdated
Show resolved
Hide resolved
detections/endpoint/suspicious_local_llm_framework_download_and_execution_via_sysmon.yml
Outdated
Show resolved
Hide resolved
detections/endpoint/suspicious_local_llm_framework_download_and_execution_via_sysmon.yml
Outdated
Show resolved
Hide resolved
detections/endpoint/suspicious_local_llm_framework_download_and_execution_via_sysmon.yml
Outdated
Show resolved
Hide resolved
detections/endpoint/unauthorized_llm_model_file_creation_on_endpoint.yml
Outdated
Show resolved
Hide resolved
|
Working on updating the detection to use CIM where possible. |
|
@rosplk @patel-bhavin made changes to the analytics so they are more CIM friendly and I merged some as they were overlapping. The coverage should be the same. One is failing idk why and i cant see to find the data on Endor to check. So @patel-bhavin when you have some time to check it out, |
|
@rosplk please avoid adding raw links in this format : The preferred way is such that it is a GIT LFS file just like all other yamls - Also, your current attack data size is 21k events for 2 detections: strongly consider shipping atomic datasets specific to the detection for future Fixed that in here: splunk/attack_data#1096 . Also, strongly encouraged to use DMs where feasible and if not use TA built extractions @nasbench - Thank you for fixing up the detections to use TA fields 😸 I have pushed the remaining changes! |
This PR introduces new analytics to detect Local LLM execution and shadow AI artifacts. Below is a breakdown of what was added.
New Analytics [3]
New Analytic Story [1]