Skip to content

Commit 41e69bd

Browse files
author
Patrick Bareiss
committed
Merge branch 'develop' into github_detections_improvement
2 parents 3c9145b + c2eb1a2 commit 41e69bd

File tree

192 files changed

+10270
-9757
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

192 files changed

+10270
-9757
lines changed

app_template/default/data/ui/nav/default.xml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
<view name="escu_summary" default="true"/>
33
<view name="feedback"/>
44
<view name="search"/>
5-
<view name="dashboards"/>
6-
<a href="http://docs.splunk.com/Documentation/ESSOC">Docs</a>
5+
<collection label="Dashboards">
6+
<view source="unclassified" match="__"/>
7+
</collection>
8+
<a href="https://docs.splunk.com/Documentation/ESCU">Docs</a>
79
</nav>

data_sources/crowdstrike_processrollup2.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -96,6 +96,7 @@ field_mappings:
9696
mapping:
9797
CommandLine: Processes.process
9898
ImageFileName: Processes.process_path
99+
ImageFileName|endswith: Processes.process_name
99100
ParentBaseFileName: Processes.parent_process_name
100101
ParentProcessId: Processes.parent_process_id
101102
RawProcessId: Processes.process_id

data_sources/nginx_access.yml

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,21 @@ author: Patrick Bareiss, Splunk
66
description: Data source object for Nginx Access
77
source: /var/log/nginx/access.log
88
sourcetype: nginx:plus:kv
9-
supported_TA: []
9+
supported_TA:
10+
- name: Splunk Add-on for NGINX
11+
url: https://splunkbase.splunk.com/app/3258
12+
version: 3.3.0
13+
field_mappings:
14+
- data_model: cim
15+
data_set: Web
16+
mapping:
17+
server: Web.dest
18+
http_method: Web.http_method
19+
http_user_agent: Web.http_user_agent
20+
status: Web.status
21+
uri_path: Web.url
22+
url_length: Web.url_length
23+
src_ip: Web.src
1024
fields:
1125
- _time
1226
- action

data_sources/palo_alto_network_threat.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,16 @@ supported_TA:
1010
- name: Palo Alto Networks Add-on
1111
url: https://splunkbase.splunk.com/app/2757
1212
version: 8.1.3
13+
field_mappings:
14+
- data_model: cim
15+
data_set: Web
16+
mapping:
17+
dest: Web.dest
18+
http_method: Web.http_method
19+
http_user_agent: Web.http_user_agent
20+
url: Web.url
21+
url_length: Web.url_length
22+
src: Web.src
1323
fields:
1424
- _time
1525
- date_hour

data_sources/palo_alto_network_traffic.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,16 @@ fields:
2929
- splunk_server
3030
- timeendpos
3131
- timestartpos
32+
field_mappings:
33+
- data_model: cim
34+
data_set: All_Traffic
35+
mapping:
36+
app: All_Traffic.app
37+
action: All_Traffic.action
38+
dest_ip: All_Traffic.dest_ip
39+
dest_port: All_Traffic.dest_port
40+
src_ip: All_Traffic.src_ip
41+
src_port: All_Traffic.src_port
3242
example_log: 577 <14>1 2024-02-22T12:33:50-05:00 PALO220.ATTACK_RANGE.LAN - - - -
3343
1,2024/02/22 12:33:50,012801036556,TRAFFIC,end,2305,2024/02/22 12:33:50,192.168.1.205,147.28.146.44,201.17.96.104,147.28.146.44,No_Vuln_Filtering_OUT,,,screenconnect,vsys1,Trust,Untrust,ethernet1/2,ethernet1/1,splunk_range,2024/02/22
3444
12:33:50,14740,1,50624,443,11024,443,0x40005e,tcp,allow,7419,6609,810,25,2024/02/22

data_sources/suricata.yml

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,21 @@ author: Patrick Bareiss, Splunk
66
description: Data source object for Suricata
77
source: suricata
88
sourcetype: suricata
9-
supported_TA: []
9+
supported_TA:
10+
- name: Splunk TA for Suricata
11+
url: https://splunkbase.splunk.com/app/2760
12+
version: 2.3.3
13+
field_mappings:
14+
- data_model: cim
15+
data_set: Web
16+
mapping:
17+
http.hostname: Web.dest
18+
http.http_method: Web.http_method
19+
http.http_user_agent: Web.http_user_agent
20+
http.status: Web.status
21+
http.url: Web.url
22+
http.length: Web.url_length
23+
src_ip: Web.src
1024
fields:
1125
- _time
1226
- app_proto

data_sources/sysmon_eventid_1.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ field_mappings:
125125
Hashes: Processes.process_hash
126126
ParentProcessGuid: Processes.parent_process_guid
127127
ParentProcessId: Processes.parent_process_id
128-
ParentImage: Processes.parent_process_name
128+
ParentImage|endswith: Processes.parent_process_name
129129
ParentCommandLine: Processes.parent_process
130130
Computer: Processes.dest
131131
OriginalFileName: Processes.original_file_name

data_sources/sysmon_eventid_11.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,7 @@ field_mappings:
9292
ProcessGuid: Filesystem.process_guid
9393
ProcessId: Filesystem.process_id
9494
TargetFilename: Filesystem.file_path
95+
TargetFilename|endswith: Filesystem.file_name
9596
example_log: <Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider
9697
Name='Microsoft-Windows-Sysmon' Guid='{5770385F-C22A-43E0-BF4C-06F5698FFBD9}'/><EventID>11</EventID><Version>2</Version><Level>4</Level><Task>11</Task><Opcode>0</Opcode><Keywords>0x8000000000000000</Keywords><TimeCreated
9798
SystemTime='2023-02-08T13:01:11.065939500Z'/><EventRecordID>7712490</EventRecordID><Correlation/><Execution

data_sources/sysmon_eventid_12.yml

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -87,6 +87,14 @@ fields:
8787
- timestartpos
8888
- user_id
8989
- vendor_product
90+
field_mappings:
91+
- data_model: cim
92+
data_set: Endpoint.Registry
93+
mapping:
94+
Computer: Registry.dest
95+
ProcessGuid: Registry.process_guid
96+
ProcessId: Registry.process_id
97+
TargetObject: Registry.registry_path
9098
example_log: <Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider
9199
Name='Microsoft-Windows-Sysmon' Guid='{5770385F-C22A-43E0-BF4C-06F5698FFBD9}'/><EventID>12</EventID><Version>2</Version><Level>4</Level><Task>12</Task><Opcode>0</Opcode><Keywords>0x8000000000000000</Keywords><TimeCreated
92100
SystemTime='2021-07-12T08:10:32.607068200Z'/><EventRecordID>1055579</EventRecordID><Correlation/><Execution

data_sources/sysmon_eventid_13.yml

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,7 +102,10 @@ field_mappings:
102102
ProcessGuid: Registry.process_guid
103103
ProcessId: Registry.process_id
104104
TargetObject: Registry.registry_path
105-
Details: Registry.registry_value_data
105+
Details|in: Registry.registry_value_data
106+
action: Registry.action
107+
TargetObject|startswith: Registry.registry_key_name
108+
TargetObject|endswith: Registry.registry_value_name
106109
example_log: <Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider
107110
Name='Microsoft-Windows-Sysmon' Guid='{5770385F-C22A-43E0-BF4C-06F5698FFBD9}'/><EventID>13</EventID><Version>2</Version><Level>4</Level><Task>13</Task><Opcode>0</Opcode><Keywords>0x8000000000000000</Keywords><TimeCreated
108111
SystemTime='2021-07-12T08:11:04.548083500Z'/><EventRecordID>810987</EventRecordID><Correlation/><Execution

0 commit comments

Comments
 (0)