Skip to content

Commit 29f8305

Browse files
authored
Merge branch 'develop' into new-research-detection-endpoint
2 parents a73665c + bc334de commit 29f8305

File tree

2,382 files changed

+69564
-53286
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

2,382 files changed

+69564
-53286
lines changed

.github/labeler.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,3 +22,8 @@ Lookups:
2222
Datasource:
2323
- changed-files:
2424
- any-glob-to-any-file: data_sources/*
25+
26+
Baselines:
27+
- changed-files:
28+
- any-glob-to-any-file: baselines/*
29+

.github/workflows/appinspect.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,13 @@ jobs:
1818

1919
- name: Install Python Dependencies and ContentCTL and Atomic Red Team
2020
run: |
21-
pip install contentctl>=4.0.0
21+
if [ -n "${{ vars.CONTENTCTL_VERSION }}" ]; then
22+
echo "Installing contentctl version ${{ vars.CONTENTCTL_VERSION }}"
23+
pip install contentctl==${{ vars.CONTENTCTL_VERSION }}
24+
else
25+
echo "Installing latest contentctl version"
26+
pip install contentctl
27+
fi
2228
git clone --depth=1 --single-branch --branch=master https://github.com/redcanaryco/atomic-red-team.git external_repos/atomic-red-team
2329
git clone --depth=1 --single-branch --branch=master https://github.com/mitre/cti external_repos/cti
2430
@@ -28,7 +34,7 @@ jobs:
2834
APPINSPECTPASSWORD: "${{ secrets.APPINSPECTPASSWORD }}"
2935
run: |
3036
echo $APPINSPECTUSERNAME
31-
contentctl inspect --splunk-api-username "$APPINSPECTUSERNAME" --splunk-api-password "$APPINSPECTPASSWORD" --stack_type victoria --enrichments --enable-metadata-validation --suppress-missing-content-exceptions
37+
contentctl inspect --splunk-api-username "$APPINSPECTUSERNAME" --splunk-api-password "$APPINSPECTPASSWORD" --enrichments --enable-metadata-validation --suppress-missing-content-exceptions
3238
echo "done appinspect"
3339
mkdir -p artifacts/app_inspect_report
3440
cp -r dist/*.html artifacts/app_inspect_report

.github/workflows/auto-update.yml

Lines changed: 0 additions & 37 deletions
This file was deleted.

.github/workflows/build.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,13 @@ jobs:
1919

2020
- name: Install Python Dependencies and ContentCTL and Atomic Red Team
2121
run: |
22-
pip install contentctl>=4.0.0
22+
if [ -n "${{ vars.CONTENTCTL_VERSION }}" ]; then
23+
echo "Installing contentctl version ${{ vars.CONTENTCTL_VERSION }}"
24+
pip install contentctl==${{ vars.CONTENTCTL_VERSION }}
25+
else
26+
echo "Installing latest contentctl version"
27+
pip install contentctl
28+
fi
2329
git clone --depth=1 --single-branch --branch=master https://github.com/redcanaryco/atomic-red-team.git external_repos/atomic-red-team
2430
git clone --depth=1 --single-branch --branch=master https://github.com/mitre/cti external_repos/cti
2531

.github/workflows/unit-testing.yml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,13 @@ jobs:
2323
- name: Install Python Dependencies and ContentCTL
2424
run: |
2525
python -m pip install --upgrade pip
26-
pip install contentctl>=4.0.0
26+
if [ -n "${{ vars.CONTENTCTL_VERSION }}" ]; then
27+
echo "Installing contentctl version ${{ vars.CONTENTCTL_VERSION }}"
28+
pip install contentctl==${{ vars.CONTENTCTL_VERSION }}
29+
else
30+
echo "Installing latest contentctl version"
31+
pip install contentctl
32+
fi
2733
2834
# Running contentctl test with a few arguments, before running the command make sure you checkout into the current branch of the pull request. This step only performs unit testing on all the changes against the target-branch. In most cases this target branch will be develop
2935
# Make sure we check out the PR, even if it actually lives in a fork

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ Please use the [GitHub Issue Tracker](https://github.com/splunk/security_content
138138
If you have questions or need support, you can:
139139

140140
* Post a question to [Splunk Answers](http://answers.splunk.com)
141-
* Join the [#security-research](https://splunk-usergroups.slack.com/archives/C1S5BEF38) room in the [Splunk Slack channel](http://splunk-usergroups.slack.com)
141+
* Join the [#security-research](https://splunkcommunity.slack.com/archives/CDNHXVBGS) channel in the [Splunk Community Slack.](https://splk.it/slack)
142142

143143
## License
144144
Copyright 2022 Splunk Inc.

app_template/default/data/ui/views/feedback.xml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@
66
<html>
77
<p5>You can contact the Splunk Threat Research team at<a href = "mailto:[email protected]">[email protected]</a> to send us support requests, bug reports, and questions.
88
<br>Specify the request type and the title of any related analytic stories, detections analytics where applicable.</br>
9-
You can also find us on the <b>#es-content-updates</b><a href = "http://splunk-usergroups.slack.com/"> Splunk Usergroups Slack channel.</a></p5>
9+
You can also find us on the <b>#es-content-updates</b><a href = "https://splk.it/slack/"> Splunk Community Slack channel.</a></p5>
1010
</html>
1111
</panel>
1212
</row>
13-
</form>
13+
</form>

baselines/baseline_of_blocked_outbound_traffic_from_aws.yml

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ version: 1
44
date: '2018-05-07'
55
author: Bhavin Patel, Splunk
66
type: Baseline
7-
datamodel: []
7+
status: production
88
description: This search establishes, on a per-hour basis, the average and the standard
99
deviation of the number of outbound connections blocked in your VPC flow logs by
1010
each source IP address (IP address of your EC2 instances). Also recorded is the
@@ -34,9 +34,4 @@ tags:
3434
- Splunk Enterprise
3535
- Splunk Enterprise Security
3636
- Splunk Cloud
37-
required_fields:
38-
- _time
39-
- action
40-
- src_ip
41-
- dest_ip
4237
security_domain: network

baselines/baseline_of_cloud_infrastructure_api_calls_per_user.yml

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,7 @@ version: 1
44
date: '2020-09-07'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
datamodel:
8-
- Change
7+
status: production
98
description: This search is used to build a Machine Learning Toolkit (MLTK) model
109
for how many API calls are performed by each user. By default, the search uses the
1110
last 90 days of data to build the model and the model is rebuilt weekly. The model
@@ -40,14 +39,10 @@ tags:
4039
- Splunk Enterprise
4140
- Splunk Enterprise Security
4241
- Splunk Cloud
43-
required_fields:
44-
- _time
45-
- All_Changes.user
46-
- All_Changes.status
4742
security_domain: network
4843
deployment:
4944
scheduling:
5045
cron_schedule: 0 2 * * 0
5146
earliest_time: -90d@d
5247
latest_time: -1d@d
53-
schedule_window: auto
48+
schedule_window: auto

baselines/baseline_of_cloud_instances_destroyed.yml

Lines changed: 5 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,7 @@ version: 1
44
date: '2020-08-25'
55
author: David Dorsey, Splunk
66
type: Baseline
7-
datamodel:
8-
- Change
7+
status: production
98
description: This search is used to build a Machine Learning Toolkit (MLTK) model
109
for how many instances are destroyed in the environment. By default, the search
1110
uses the last 90 days of data to build the model and the model is rebuilt weekly.
@@ -20,17 +19,16 @@ search: '| tstats count as instances_destroyed from datamodel=Change where All_C
2019
<= 5, 0, 1) | table _time instances_destroyed, HourOfDay, isWeekend | fit DensityFunction
2120
instances_destroyed by "HourOfDay,isWeekend" into cloud_excessive_instances_destroyed_v1
2221
dist=expon show_density=true'
23-
how_to_implement: 'You must have Enterprise Security 6.0 or later, if not you will
22+
how_to_implement: "You must have Enterprise Security 6.0 or later, if not you will
2423
need to verify that the Machine Learning Toolkit (MLTK) version 4.2 or later is
2524
installed, along with any required dependencies. Depending on the number of users
2625
in your environment, you may also need to adjust the value for max_inputs in the
2726
MLTK settings for the DensityFunction algorithm, then ensure that the search completes
2827
in a reasonable timeframe. By default, the search builds the model using the past
2928
30 days of data. You can modify the search window to build the model over a longer
3029
period of time, which may give you better results. You may also want to periodically
31-
re-run this search to rebuild the model with the latest data.
32-
33-
More information on the algorithm used in the search can be found at `https://docs.splunk.com/Documentation/MLApp/4.2.0/User/Algorithms#DensityFunction`.'
30+
re-run this search to rebuild the model with the latest data.\nMore information
31+
on the algorithm used in the search can be found at `https://docs.splunk.com/Documentation/MLApp/4.2.0/User/Algorithms#DensityFunction`."
3432
known_false_positives: none
3533
references: []
3634
tags:
@@ -43,15 +41,10 @@ tags:
4341
- Splunk Enterprise
4442
- Splunk Enterprise Security
4543
- Splunk Cloud
46-
required_fields:
47-
- _time
48-
- All_Changes.action
49-
- All_Changes.status
50-
- All_Changes.object_category
5144
security_domain: network
5245
deployment:
5346
scheduling:
5447
cron_schedule: 0 2 * * 0
5548
earliest_time: -90d@d
5649
latest_time: -1d@d
57-
schedule_window: auto
50+
schedule_window: auto

0 commit comments

Comments
 (0)