Skip to content

Commit 3bb8618

Browse files
committed
updating as per Lou's feedback
1 parent d5f3bf6 commit 3bb8618

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

data_sources/cisco_secure_application_appdynamics_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Cisco Secure Application AppDynamics Alerts
22
id: 5c963eb0-010e-4386-875f-5134879f14a7
33
version: 1
4-
date: '2025-07-18'
4+
date: '2025-02-04'
55
author: Bhavin Patel, Splunk
66
description: Data source object for alerts from Cisco Secure Application
77
source: AppDynamics Security

detections/application/cisco_secure_application_alerts.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -38,13 +38,13 @@ search: |-
3838
risk_score=0 AND attackOutcome="OBSERVED", "low"
3939
)
4040
| eval risk_message=case(
41-
(signature="API" OR signature="LOG4J" OR signature="SSRF"), "An ".attackOutcome." ".signature." vulnerability is attempted to be abused from ".src_category." IP address ".src_ip." and was seen connecting to server ".dest_nt_host." hosting application ".app_name." and possibly exfiltrating data to ".socketOut."",
42-
(signature="MALIP" OR signature="SQL"), "A vulnerability is being ".attackOutcome." to be abused from ".src_category." IP address ".src_ip." and was seen connecting to server ".dest_nt_host." hosting application ".app_name.".",
43-
(signature="DESEREAL"), "The application ".app_name." deserializes untrusted data without sufficiently verifying that the resulting data will be valid. Data which is untrusted cannot be trusted to be well-formed. Malformed data or unexpected data could be used to abuse application logic, deny service, or execute arbitrary code, when deserialized."
44-
)
45-
| `cisco_secure_application_alerts_filter`
46-
how_to_implement: In order to properly run this search, you need to ingest alerts data from AppD SecureApp, specifically ingesting data via HEC. You will also need to ensure that the data is going to sourcetype appdynamics_security. You will need to install the Splunk Add-on for AppDynamics. This add-on will give the needed field aliases to properly run this search. In a future update you will be able to run this detection if ingesting data via the TA.
47-
known_false_positives: None known at this time
41+
(signature="API" OR signature="LOG4J" OR signature="SSRF"), "An attempt to exploit a ".signature." vulnerability was made from a ".src_category." IP address ".src_ip.". The server ".dest_nt_host." hosting application ".app_name." was accessed, and data may have been exfiltrated to ".socketOut.".",
42+
(signature="MALIP" OR signature="SQL"), "A vulnerability is being ".attackOutcome." from a ".src_category." IP address ".src_ip.". The server ".dest_nt_host." hosting application ".app_name." was accessed.",
43+
(signature="DESEREAL"), "The application ".app_name." deserializes untrusted data without sufficiently verifying that the resulting data will be valid. Data which is untrusted cannot be trusted to be well-formed. Malformed data or unexpected data could be used to abuse application logic, deny service, or execute arbitrary code, when deserialized."
44+
)
45+
| `cisco_secure_application_alerts_filter`
46+
how_to_implement: In order to properly run this search, you need to ingest alerts data from AppD SecureApp, specifically ingesting data via HEC. You will also need to ensure that the data is going to sourcetype - `appdynamics_security`. You will need to install the Splunk Add-on for AppDynamics.
47+
known_false_positives: None known at this time but if there are false positives, please reach filter out these using the filter macro to reduce alert fatigue
4848
references:
4949
- https://docs.appdynamics.com/appd/24.x/latest/en/application-security-monitoring/integrate-cisco-secure-application-with-splunk
5050
drilldown_searches:
@@ -79,7 +79,7 @@ tags:
7979
- Splunk Enterprise Security
8080
- Splunk Cloud
8181
security_domain: threat
82-
manual_test: We are dynamically creating the risk_score field based on the severity of the alert in the SPL and that supersedes the risk score set in the detection. Setting these to manual test since otherwise we fail integration testing. The detection is also failing on unit-testing as some of the fields set in the observables are empty.
82+
# manual_test: We are dynamically creating the risk_score field based on the severity of the alert in the SPL and that supersedes the risk score set in the detection. Setting these to manual test since otherwise we fail integration testing. The detection is also failing on unit-testing as some of the fields set in the observables are empty.
8383
tests:
8484
- name: True Positive Test
8585
attack_data:

0 commit comments

Comments
 (0)