You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"name": f'View risk events for the last 7 days for - "${UPDATE_PREFIX}FIRST_RISK_OBJECT$" and "${UPDATE_PREFIX}SECOND_RISK_OBJECT$"',
26
+
"search": f'| from datamodel Risk.All_Risk | search normalized_risk_object IN ("${UPDATE_PREFIX}FIRST_RISK_OBJECT$", "${UPDATE_PREFIX}SECOND_RISK_OBJECT$") starthoursago=168 | stats count min(_time) as firstTime max(_time) as lastTime values(search_name) as "Search Name" values(risk_message) as "Risk Message" values(analyticstories) as "Analytic Stories" values(annotations._all) as "Annotations" values(annotations.mitre_attack.mitre_tactic) as "ATT&CK Tactics" by normalized_risk_object | `security_content_ctime(firstTime)` | `security_content_ctime(lastTime)`',
"analytic_story": [f"{NewContent.UPDATE_PREFIX} by providing zero or more analytic stories"],
78
+
"asset_type": f"{NewContent.UPDATE_PREFIX} by providing and asset type from {list(AssetType._value2member_map_)}",
79
+
"confidence": f"{NewContent.UPDATE_PREFIX} by providing a value between 1-100",
80
+
"impact": f"{NewContent.UPDATE_PREFIX} by providing a value between 1-100",
81
+
"message": f"{NewContent.UPDATE_PREFIX} by providing a risk message. Fields in your search results can be referenced using $fieldName$",
82
+
"mitre_attack_id": mitre_attack_ids,
83
+
"observable": [
84
+
{"name": f"{NewContent.UPDATE_PREFIX} the field name of the observable. This is a field that exists in your search results.", "type": f"{NewContent.UPDATE_PREFIX} the type of your observable from the list {list(SES_OBSERVABLE_TYPE_MAPPING.keys())}.", "role": [f"{NewContent.UPDATE_PREFIX} the role from the list {list(SES_OBSERVABLE_ROLE_MAPPING.keys())}"]}
85
+
],
86
+
"product": [
87
+
"Splunk Enterprise",
88
+
"Splunk Enterprise Security",
89
+
"Splunk Cloud",
90
+
],
91
+
"security_domain": answers["security_domain"],
92
+
"cve": [f"{NewContent.UPDATE_PREFIX} with CVE(s) if applicable"],
93
+
},
94
+
"tests": [
95
+
{
96
+
"name": "True Positive Test",
97
+
"attack_data": [
98
+
{
99
+
"data": f"{NewContent.UPDATE_PREFIX} the data file to replay. Go to https://github.com/splunk/contentctl/wiki for information about the format of this field",
100
+
"sourcetype": f"{NewContent.UPDATE_PREFIX} the sourcetype of your data file.",
101
+
"source": f"{NewContent.UPDATE_PREFIX} the source of your datafile",
0 commit comments