Skip to content

Commit 441ba47

Browse files
committed
fixing merge conflicts
2 parents d83efc4 + 7907bd8 commit 441ba47

File tree

1,034 files changed

+16478
-13648
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

1,034 files changed

+16478
-13648
lines changed

.github/labeler.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,3 +22,8 @@ Lookups:
2222
Datasource:
2323
- changed-files:
2424
- any-glob-to-any-file: data_sources/*
25+
26+
Baselines:
27+
- changed-files:
28+
- any-glob-to-any-file: baselines/*
29+

.github/workflows/appinspect.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ jobs:
3434
APPINSPECTPASSWORD: "${{ secrets.APPINSPECTPASSWORD }}"
3535
run: |
3636
echo $APPINSPECTUSERNAME
37-
contentctl inspect --splunk-api-username "$APPINSPECTUSERNAME" --splunk-api-password "$APPINSPECTPASSWORD" --stack_type victoria --enrichments --enable-metadata-validation --suppress-missing-content-exceptions
37+
contentctl inspect --splunk-api-username "$APPINSPECTUSERNAME" --splunk-api-password "$APPINSPECTPASSWORD" --enrichments --enable-metadata-validation --suppress-missing-content-exceptions
3838
echo "done appinspect"
3939
mkdir -p artifacts/app_inspect_report
4040
cp -r dist/*.html artifacts/app_inspect_report

app_template/default/data/ui/nav/default.xml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
<view name="escu_summary" default="true"/>
33
<view name="feedback"/>
44
<view name="search"/>
5-
<view name="dashboards"/>
6-
<a href="http://docs.splunk.com/Documentation/ESSOC">Docs</a>
5+
<collection label="Dashboards">
6+
<view source="unclassified" match="__"/>
7+
</collection>
8+
<a href="https://docs.splunk.com/Documentation/ESCU">Docs</a>
79
</nav>

baselines/baseline_of_open_s3_bucket_decommissioning.yml

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,16 @@
1-
data_source: []
2-
mitre_attack_ids: ''
3-
security_domain: audit
41
name: Baseline Of Open S3 Bucket Decommissioning
52
id: 984e9022-b87b-499a-a260-8d0282c46ea2
63
version: 1
74
date: '2025-02-12'
85
author: Jose Hernandez
96
type: Baseline
107
status: production
11-
description: This baseline search identifies S3 buckets that were previously exposed to the public (either through bucket policies or website hosting) and have been subsequently deleted. This helps track the lifecycle of potentially risky S3 bucket configurations and their proper decommissioning.
12-
kind: cloud
8+
description: |-
9+
The following analytic identifies S3 buckets that were previously exposed to the public and have been subsequently deleted. It leverages AWS CloudTrail logs to track the lifecycle of potentially risky S3 bucket configurations. This activity is crucial for ensuring that public access to sensitive data is properly managed and decommissioned. By monitoring these events, organizations can ensure that exposed buckets are promptly deleted, reducing the risk of unauthorized access. Immediate investigation is recommended to confirm the proper decommissioning of these buckets and to ensure no sensitive data remains exposed. This baseline detection creates a lookup table of decommissioned buckets.csv and their associated events which can be used by detection searches to trigger alerts when decommissioned buckets are detected.
10+
11+
The following detections searches leverage this baseline search and the lookup table.
12+
* Detect DNS Query to Decommissioned S3 Bucket
13+
* Detect Web Access to Decommissioned S3 Bucket
1314
search: '`cloudtrail` eventSource="s3.amazonaws.com" (eventName=DeleteBucket OR eventName=PutBucketPolicy OR eventName=PutBucketWebsite)
1415
| spath input=_raw path=requestParameters.bucketName output=bucketName
1516
| spath input=_raw path=requestParameters.Host output=host
@@ -36,8 +37,8 @@ search: '`cloudtrail` eventSource="s3.amazonaws.com" (eventName=DeleteBucket OR
3637
| eval policy_details = if(isPublicPolicy==1, "Policy: Principal=" . mvjoin(principals, ", ") . " Effect=" . mvjoin(effects, ", ") . " Action=" . mvjoin(actions, ", "), "No Public Policy")
3738
| eval website_details = if(isWebsite==1, "Static Website Enabled", "No Website Hosting")
3839
| table bucketName, hosts, firstEvent, lastEvent, events, policy_details, website_details, accountIds, userARNs, awsRegions
39-
| outputlookup append=true decommissioned_buckets.csv | `baseline_of_open_s3_bucket_decommissioning_filter`'
40-
how_to_implement: To implement this baseline, you need to have AWS CloudTrail logs being ingested into Splunk with the AWS Add-on properly configured. The search looks for S3 bucket events related to bucket policies, website hosting configuration, and bucket deletion. The results are stored in a lookup file named decommissioned_buckets.csv which tracks the history of deleted buckets that were previously exposed to the public.
40+
| outputlookup append=true decommissioned_buckets | `baseline_of_open_s3_bucket_decommissioning_filter`'
41+
how_to_implement: To implement this baseline, you need to have AWS CloudTrail logs being ingested into Splunk with the AWS Add-on properly configured. The search looks for S3 bucket events related to bucket policies, website hosting configuration, and bucket deletion. The results are stored in a lookup KVStore named decommissioned_buckets which tracks the history of deleted buckets that were previously exposed to the public.
4142
known_false_positives: Some buckets may be intentionally made public for legitimate business purposes before being decommissioned. Review the policy_details and website_details fields to understand the nature of the public access that was configured.
4243
references:
4344
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/access-control-block-public-access.html
@@ -47,7 +48,6 @@ tags:
4748
analytic_story:
4849
- AWS S3 Bucket Security Monitoring
4950
- Suspicious AWS S3 Activities
50-
message: An S3 bucket that was previously configured with public access has been deleted
5151
product:
5252
- Splunk Enterprise
5353
- Splunk Enterprise Security
@@ -61,4 +61,4 @@ deployment:
6161
cron_schedule: 0 2 * * 0
6262
earliest_time: -30d@d
6363
latest_time: -1d@d
64-
schedule_window: auto
64+
schedule_window: auto

contentctl.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,9 +77,9 @@ apps:
7777
- uid: 5579
7878
title: Splunk Add-on for CrowdStrike FDR
7979
appid: Splunk_TA_CrowdStrike_FDR
80-
version: 2.0.3
80+
version: 2.0.4
8181
description: description of app
82-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_203.tgz
82+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_204.tgz
8383
- uid: 3185
8484
title: Splunk Add-on for Microsoft IIS
8585
appid: SPLUNK_TA_FOR_IIS
@@ -206,4 +206,10 @@ apps:
206206
version: 4.2.2
207207
description: PSC for MLTK
208208
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/python-for-scientific-computing-for-linux-64-bit_422.tgz
209+
- uid: 2882
210+
title: Splunk Add-on for AppDynamics
211+
appid: Splunk_TA_AppDynamics
212+
version: 3.0.0
213+
description: The Splunk Add-on for AppDynamics enables you to easily configure data inputs to pull data from AppDynamics' REST APIs
214+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-appdynamics_300.tgz
209215
githash: d6fac80e6d50ae06b40f91519a98489d4ce3a3fd
Lines changed: 136 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,136 @@
1+
name: Cisco Secure Application AppDynamics Alerts
2+
id: 5c963eb0-010e-4386-875f-5134879f14a7
3+
version: 1
4+
date: '2025-02-04'
5+
author: Bhavin Patel, Splunk
6+
description: Data source object for alerts from Cisco Secure Application
7+
source: AppDynamics Security
8+
sourcetype: appdynamics_security
9+
supported_TA:
10+
- name: Splunk Add-on for AppDynamics
11+
url: https://splunkbase.splunk.com/app/3471
12+
version: 3.0.0
13+
fields:
14+
- SourceType
15+
- apiServerExternal
16+
- app_name
17+
- application
18+
- attackEventTrigger
19+
- attackEvents{}.applicationName
20+
- attackEvents{}.attackOutcome
21+
- attackEvents{}.attackTypes
22+
- attackEvents{}.blocked
23+
- attackEvents{}.blockedReason
24+
- attackEvents{}.clientAddress
25+
- attackEvents{}.clientAddressType
26+
- attackEvents{}.clientPort
27+
- attackEvents{}.cveId
28+
- attackEvents{}.detailJson.apiServerExternal
29+
- attackEvents{}.detailJson.apiServerInUrl
30+
- attackEvents{}.detailJson.classname
31+
- attackEvents{}.detailJson.hostContext
32+
- attackEvents{}.detailJson.methodName
33+
- attackEvents{}.detailJson.ptype
34+
- attackEvents{}.detailJson.socketOut
35+
- attackEvents{}.eventType
36+
- attackEvents{}.jvmId
37+
- attackEvents{}.keyInfo
38+
- attackEvents{}.maliciousIpOut
39+
- attackEvents{}.maliciousIpSource
40+
- attackEvents{}.maliciousIpSourceOut
41+
- attackEvents{}.matchedCveName
42+
- attackEvents{}.serverAddress
43+
- attackEvents{}.serverName
44+
- attackEvents{}.serverPort
45+
- attackEvents{}.stackTrace
46+
- attackEvents{}.tierName
47+
- attackEvents{}.timestamp
48+
- attackEvents{}.vulnerabilityInfo.cveNvdUrl
49+
- attackEvents{}.vulnerabilityInfo.cvePublishDate
50+
- attackEvents{}.vulnerabilityInfo.cvssScore
51+
- attackEvents{}.vulnerabilityInfo.cvssSeverity
52+
- attackEvents{}.vulnerabilityInfo.incidentFirstDetected
53+
- attackEvents{}.vulnerabilityInfo.kennaActiveInternetBreach
54+
- attackEvents{}.vulnerabilityInfo.kennaEasilyExploitable
55+
- attackEvents{}.vulnerabilityInfo.kennaMalwareExploitable
56+
- attackEvents{}.vulnerabilityInfo.kennaPopularTarget
57+
- attackEvents{}.vulnerabilityInfo.kennaPredictedExploitable
58+
- attackEvents{}.vulnerabilityInfo.kennaScore
59+
- attackEvents{}.vulnerabilityInfo.library
60+
- attackEvents{}.vulnerabilityInfo.title
61+
- attackEvents{}.vulnerabilityInfo.type
62+
- attackEvents{}.vulnerableMethod
63+
- attackEvents{}.webTransactionUrl
64+
- attackId
65+
- attackLastDetected
66+
- attackOutcome
67+
- attackSource
68+
- attackStatus
69+
- attackTypes
70+
- blocked
71+
- blockedReason
72+
- businessTransaction
73+
- classname
74+
- clientAddressType
75+
- cveId
76+
- cveNvdUrl
77+
- cvePublishDate
78+
- cvssScore
79+
- cvssSeverity
80+
- dest_ip
81+
- dest_nt_host
82+
- dest_port
83+
- eventType
84+
- eventtype
85+
- host
86+
- incidentFirstDetected
87+
- index
88+
- jvmId
89+
- kennaActiveInternetBreach
90+
- kennaEasilyExploitable
91+
- kennaMalwareExploitable
92+
- kennaPopularTarget
93+
- kennaPredictedExploitable
94+
- kennaScore
95+
- keyInfo
96+
- linecount
97+
- maliciousIpOut
98+
- maliciousIpSource
99+
- maliciousIpSourceOut
100+
- matchedCveName
101+
- methodName
102+
- ptype
103+
- punct
104+
- signature
105+
- socketAddr
106+
- socketFromLog4j
107+
- socketOut
108+
- source
109+
- sourcetype
110+
- splunk_server
111+
- splunk_server_group
112+
- src_category
113+
- src_ip
114+
- src_port
115+
- stackTrace
116+
- status
117+
- tag
118+
- tag::eventtype
119+
- tier
120+
- tierName
121+
- timestamp
122+
- vulnLibrary
123+
- vulnTitle
124+
- vulnType
125+
- vulnerableMethod
126+
- webTransactionUrl
127+
- _bkt
128+
- _cd
129+
- _eventtype_color
130+
- _indextime
131+
- _raw
132+
- _serial
133+
- _si
134+
- _sourcetype
135+
- _time
136+
example_log: '{ "SourceType": "secure_app_attacks", "attackId": "24815279", "attackSource": "EXTERNAL", "attackOutcome": "EXPLOITED", "attackTypes": "{SSRF}", "attackEventTrigger": "", "application": "AD-Ecommerce", "tier": "Order-Processing-Services", "businessTransaction": "Checkout", "attackStatus": "OPEN", "attackLastDetected": "2025-01-31 12:30:22 +0000 UTC", "attackEvents": [{"attackOutcome":"EXPLOITED","eventType":"SOCKET_RESOLVE","attackTypes":"SSRF","timestamp":"2025-01-31T12:30:22Z","applicationName":"AD-Ecommerce","tierName":"Order-Processing-Services","maliciousIpOut":"","maliciousIpSourceOut":"","detailJson":{"classname":"java.net.SocketPermission","ptype":"SOCKET","socketOut":"www.cisco.com","hostContext":"www.cisco.com","methodName":"sun.net.www.http.HttpClient.openServer","apiServerExternal":true,"apiServerInUrl":true},"blocked":false,"blockedReason":"","vulnerableMethod":"org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:868)","matchedCveName":"CVE-2020-13934","keyInfo":"","cveId":"a21931cd-52fa-11ec-a8b2-8e3051145156","stackTrace":"java.lang.SecurityManager.checkConnect(SecurityManager.java:1051)\nsun.net.www.http.HttpClient.openServer(HttpClient.java:510)\nsun.net.www.protocol.https.HttpsClient.\u003cinit\u003e(HttpsClient.java:264)\nsun.net.www.protocol.https.HttpsClient.New(HttpsClient.java:367)\nsun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.getNewHttpClient(AbstractDelegateHttpsURLConnection.java:191)\norg.apache.activemq.artemis.spi.core.security.jaas.LDAPLoginModule.login(SomeFile.java:12)\nsun.net.www.protocol.http.HttpURLConnection.plainConnect0(HttpURLConnection.java:1138)\nsun.net.www.protocol.http.HttpURLConnection$6.run(HttpURLConnection.java:1022)\nsun.net.www.protocol.http.HttpURLConnection$6.run(HttpURLConnection.java:1020)\njava.security.AccessController.doPrivileged(Native Method)\njava.security.AccessController.doPrivilegedWithCombiner(AccessController.java:782)\nsun.net.www.protocol.http.HttpURLConnection.plainConnect(HttpURLConnection.java:1019)\nsun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:177)\nsun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1546)\nsun.net.www.protocol.http.HttpURLConnection.access$200(HttpURLConnection.java:91)\nsun.net.www.protocol.http.HttpURLConnection$9.run(HttpURLConnection.java:1466)\nsun.net.www.protocol.http.HttpURLConnection$9.run(HttpURLConnection.java:1464)\njava.security.AccessController.doPrivileged(Native Method)\njava.security.AccessController.doPrivilegedWithCombiner(AccessController.java:782)\nsun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1463)\nsun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:254)\nservlet.ArgentoDemoApp$GenericExecution._executeServletCommand(ArgentoDemoApp.java:850)\nservlet.ArgentoDemoApp$GenericExecution.executeServletCommand(ArgentoDemoApp.java:778)\nservlet.ArgentoDemoApp$MyApplicationExecution.executeServletCommand(ArgentoDemoApp.java:718)\nservlet.ArgentoDemoApp._doGet(ArgentoDemoApp.java:441)\nservlet.ArgentoDemoApp.doGet(ArgentoDemoApp.java:376)\njavax.servlet.http.HttpServlet.service(HttpServlet.java:634)\njavax.servlet.http.HttpServlet.service(HttpServlet.java:741)\norg.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231)\norg.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)\norg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)\norg.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)\norg.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)\norg.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202)\norg.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96)\norg.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541)\norg.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139)\norg.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)\norg.apache.catalina.valves.AbstractAccessLogValve.invoke(AbstractAccessLogValve.java:690)\norg.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)\norg.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343)\norg.apache.coyote.http11.Http11Processor.service(Http11Processor.java:373)\norg.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)\norg.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:868)\norg.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1590)\norg.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)\njava.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)\njava.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)\norg.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)\njava.lang.Thread.run(Thread.java:745)\n","jvmId":"EEcommerce_MS_NODE","maliciousIpSource":"","webTransactionUrl":"https://localhost:8088/argentoDemoApp/execute?upload=https://www.cisco.com/c/dam/cdc/t/ctm-core.js","clientAddressType":4,"clientAddress":"218.132.217.179","serverPort":"1047","serverAddress":"75.155.150.130","clientPort":"68389","serverName":"/usr/src/argento/prod/demo-run/tomcat-demo-app/webapps/argentoDemoApp/","vulnerabilityInfo":{"cvePublishDate":"2020-07-15T16:40:14.601976Z","cvssScore":5.3,"cvssSeverity":"MEDIUM","cveNvdUrl":"https://security.snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-584427","incidentFirstDetected":"2020-07-15T16:40:14.601976Z","kennaScore":53.0971,"library":"org.apache.tomcat.embed:tomcat-embed-core","title":"Denial of Service (DoS)","type":"java","kennaActiveInternetBreach":false,"kennaEasilyExploitable":false,"kennaMalwareExploitable":false,"kennaPredictedExploitable":true,"kennaPopularTarget":false}}]}'

data_sources/crowdstrike_processrollup2.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: event_simpleName
1010
supported_TA:
1111
- name: Splunk Add-on for CrowdStrike FDR
1212
url: https://splunkbase.splunk.com/app/5579
13-
version: 2.0.3
13+
version: 2.0.4
1414
fields:
1515
- AuthenticationId
1616
- AuthenticationId_meaning
@@ -96,6 +96,7 @@ field_mappings:
9696
mapping:
9797
CommandLine: Processes.process
9898
ImageFileName: Processes.process_path
99+
ImageFileName|endswith: Processes.process_name
99100
ParentBaseFileName: Processes.parent_process_name
100101
ParentProcessId: Processes.parent_process_id
101102
RawProcessId: Processes.process_id

data_sources/nginx_access.yml

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,21 @@ author: Patrick Bareiss, Splunk
66
description: Data source object for Nginx Access
77
source: /var/log/nginx/access.log
88
sourcetype: nginx:plus:kv
9-
supported_TA: []
9+
supported_TA:
10+
- name: Splunk Add-on for NGINX
11+
url: https://splunkbase.splunk.com/app/3258
12+
version: 3.3.0
13+
field_mappings:
14+
- data_model: cim
15+
data_set: Web
16+
mapping:
17+
server: Web.dest
18+
http_method: Web.http_method
19+
http_user_agent: Web.http_user_agent
20+
status: Web.status
21+
uri_path: Web.url
22+
url_length: Web.url_length
23+
src_ip: Web.src
1024
fields:
1125
- _time
1226
- action

data_sources/palo_alto_network_threat.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,16 @@ supported_TA:
1010
- name: Palo Alto Networks Add-on
1111
url: https://splunkbase.splunk.com/app/2757
1212
version: 8.1.3
13+
field_mappings:
14+
- data_model: cim
15+
data_set: Web
16+
mapping:
17+
dest: Web.dest
18+
http_method: Web.http_method
19+
http_user_agent: Web.http_user_agent
20+
url: Web.url
21+
url_length: Web.url_length
22+
src: Web.src
1323
fields:
1424
- _time
1525
- date_hour

data_sources/palo_alto_network_traffic.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,16 @@ fields:
2929
- splunk_server
3030
- timeendpos
3131
- timestartpos
32+
field_mappings:
33+
- data_model: cim
34+
data_set: All_Traffic
35+
mapping:
36+
app: All_Traffic.app
37+
action: All_Traffic.action
38+
dest_ip: All_Traffic.dest_ip
39+
dest_port: All_Traffic.dest_port
40+
src_ip: All_Traffic.src_ip
41+
src_port: All_Traffic.src_port
3242
example_log: 577 <14>1 2024-02-22T12:33:50-05:00 PALO220.ATTACK_RANGE.LAN - - - -
3343
1,2024/02/22 12:33:50,012801036556,TRAFFIC,end,2305,2024/02/22 12:33:50,192.168.1.205,147.28.146.44,201.17.96.104,147.28.146.44,No_Vuln_Filtering_OUT,,,screenconnect,vsys1,Trust,Untrust,ethernet1/2,ethernet1/1,splunk_range,2024/02/22
3444
12:33:50,14740,1,50624,443,11024,443,0x40005e,tcp,allow,7419,6609,810,25,2024/02/22

0 commit comments

Comments
 (0)