Skip to content

Commit 50c22c9

Browse files
authored
Merge branch 'develop' into nterl0k-t1486-bitlocker-sus-commands
2 parents 0400838 + e11b631 commit 50c22c9

File tree

195 files changed

+10438
-9760
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

195 files changed

+10438
-9760
lines changed

app_template/default/data/ui/nav/default.xml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@
22
<view name="escu_summary" default="true"/>
33
<view name="feedback"/>
44
<view name="search"/>
5-
<view name="dashboards"/>
6-
<a href="http://docs.splunk.com/Documentation/ESSOC">Docs</a>
5+
<collection label="Dashboards">
6+
<view source="unclassified" match="__"/>
7+
</collection>
8+
<a href="https://docs.splunk.com/Documentation/ESCU">Docs</a>
79
</nav>

contentctl.yml

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -77,9 +77,9 @@ apps:
7777
- uid: 5579
7878
title: Splunk Add-on for CrowdStrike FDR
7979
appid: Splunk_TA_CrowdStrike_FDR
80-
version: 2.0.3
80+
version: 2.0.4
8181
description: description of app
82-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_203.tgz
82+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_204.tgz
8383
- uid: 3185
8484
title: Splunk Add-on for Microsoft IIS
8585
appid: SPLUNK_TA_FOR_IIS
@@ -206,4 +206,10 @@ apps:
206206
version: 4.2.2
207207
description: PSC for MLTK
208208
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/python-for-scientific-computing-for-linux-64-bit_422.tgz
209+
- uid: 2882
210+
title: Splunk Add-on for AppDynamics
211+
appid: Splunk_TA_AppDynamics
212+
version: 3.0.0
213+
description: The Splunk Add-on for AppDynamics enables you to easily configure data inputs to pull data from AppDynamics' REST APIs
214+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-appdynamics_300.tgz
209215
githash: d6fac80e6d50ae06b40f91519a98489d4ce3a3fd
Lines changed: 136 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,136 @@
1+
name: Cisco Secure Application AppDynamics Alerts
2+
id: 5c963eb0-010e-4386-875f-5134879f14a7
3+
version: 1
4+
date: '2025-02-04'
5+
author: Bhavin Patel, Splunk
6+
description: Data source object for alerts from Cisco Secure Application
7+
source: AppDynamics Security
8+
sourcetype: appdynamics_security
9+
supported_TA:
10+
- name: Splunk Add-on for AppDynamics
11+
url: https://splunkbase.splunk.com/app/3471
12+
version: 3.0.0
13+
fields:
14+
- SourceType
15+
- apiServerExternal
16+
- app_name
17+
- application
18+
- attackEventTrigger
19+
- attackEvents{}.applicationName
20+
- attackEvents{}.attackOutcome
21+
- attackEvents{}.attackTypes
22+
- attackEvents{}.blocked
23+
- attackEvents{}.blockedReason
24+
- attackEvents{}.clientAddress
25+
- attackEvents{}.clientAddressType
26+
- attackEvents{}.clientPort
27+
- attackEvents{}.cveId
28+
- attackEvents{}.detailJson.apiServerExternal
29+
- attackEvents{}.detailJson.apiServerInUrl
30+
- attackEvents{}.detailJson.classname
31+
- attackEvents{}.detailJson.hostContext
32+
- attackEvents{}.detailJson.methodName
33+
- attackEvents{}.detailJson.ptype
34+
- attackEvents{}.detailJson.socketOut
35+
- attackEvents{}.eventType
36+
- attackEvents{}.jvmId
37+
- attackEvents{}.keyInfo
38+
- attackEvents{}.maliciousIpOut
39+
- attackEvents{}.maliciousIpSource
40+
- attackEvents{}.maliciousIpSourceOut
41+
- attackEvents{}.matchedCveName
42+
- attackEvents{}.serverAddress
43+
- attackEvents{}.serverName
44+
- attackEvents{}.serverPort
45+
- attackEvents{}.stackTrace
46+
- attackEvents{}.tierName
47+
- attackEvents{}.timestamp
48+
- attackEvents{}.vulnerabilityInfo.cveNvdUrl
49+
- attackEvents{}.vulnerabilityInfo.cvePublishDate
50+
- attackEvents{}.vulnerabilityInfo.cvssScore
51+
- attackEvents{}.vulnerabilityInfo.cvssSeverity
52+
- attackEvents{}.vulnerabilityInfo.incidentFirstDetected
53+
- attackEvents{}.vulnerabilityInfo.kennaActiveInternetBreach
54+
- attackEvents{}.vulnerabilityInfo.kennaEasilyExploitable
55+
- attackEvents{}.vulnerabilityInfo.kennaMalwareExploitable
56+
- attackEvents{}.vulnerabilityInfo.kennaPopularTarget
57+
- attackEvents{}.vulnerabilityInfo.kennaPredictedExploitable
58+
- attackEvents{}.vulnerabilityInfo.kennaScore
59+
- attackEvents{}.vulnerabilityInfo.library
60+
- attackEvents{}.vulnerabilityInfo.title
61+
- attackEvents{}.vulnerabilityInfo.type
62+
- attackEvents{}.vulnerableMethod
63+
- attackEvents{}.webTransactionUrl
64+
- attackId
65+
- attackLastDetected
66+
- attackOutcome
67+
- attackSource
68+
- attackStatus
69+
- attackTypes
70+
- blocked
71+
- blockedReason
72+
- businessTransaction
73+
- classname
74+
- clientAddressType
75+
- cveId
76+
- cveNvdUrl
77+
- cvePublishDate
78+
- cvssScore
79+
- cvssSeverity
80+
- dest_ip
81+
- dest_nt_host
82+
- dest_port
83+
- eventType
84+
- eventtype
85+
- host
86+
- incidentFirstDetected
87+
- index
88+
- jvmId
89+
- kennaActiveInternetBreach
90+
- kennaEasilyExploitable
91+
- kennaMalwareExploitable
92+
- kennaPopularTarget
93+
- kennaPredictedExploitable
94+
- kennaScore
95+
- keyInfo
96+
- linecount
97+
- maliciousIpOut
98+
- maliciousIpSource
99+
- maliciousIpSourceOut
100+
- matchedCveName
101+
- methodName
102+
- ptype
103+
- punct
104+
- signature
105+
- socketAddr
106+
- socketFromLog4j
107+
- socketOut
108+
- source
109+
- sourcetype
110+
- splunk_server
111+
- splunk_server_group
112+
- src_category
113+
- src_ip
114+
- src_port
115+
- stackTrace
116+
- status
117+
- tag
118+
- tag::eventtype
119+
- tier
120+
- tierName
121+
- timestamp
122+
- vulnLibrary
123+
- vulnTitle
124+
- vulnType
125+
- vulnerableMethod
126+
- webTransactionUrl
127+
- _bkt
128+
- _cd
129+
- _eventtype_color
130+
- _indextime
131+
- _raw
132+
- _serial
133+
- _si
134+
- _sourcetype
135+
- _time
136+
example_log: '{ "SourceType": "secure_app_attacks", "attackId": "24815279", "attackSource": "EXTERNAL", "attackOutcome": "EXPLOITED", "attackTypes": "{SSRF}", "attackEventTrigger": "", "application": "AD-Ecommerce", "tier": "Order-Processing-Services", "businessTransaction": "Checkout", "attackStatus": "OPEN", "attackLastDetected": "2025-01-31 12:30:22 +0000 UTC", "attackEvents": [{"attackOutcome":"EXPLOITED","eventType":"SOCKET_RESOLVE","attackTypes":"SSRF","timestamp":"2025-01-31T12:30:22Z","applicationName":"AD-Ecommerce","tierName":"Order-Processing-Services","maliciousIpOut":"","maliciousIpSourceOut":"","detailJson":{"classname":"java.net.SocketPermission","ptype":"SOCKET","socketOut":"www.cisco.com","hostContext":"www.cisco.com","methodName":"sun.net.www.http.HttpClient.openServer","apiServerExternal":true,"apiServerInUrl":true},"blocked":false,"blockedReason":"","vulnerableMethod":"org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:868)","matchedCveName":"CVE-2020-13934","keyInfo":"","cveId":"a21931cd-52fa-11ec-a8b2-8e3051145156","stackTrace":"java.lang.SecurityManager.checkConnect(SecurityManager.java:1051)\nsun.net.www.http.HttpClient.openServer(HttpClient.java:510)\nsun.net.www.protocol.https.HttpsClient.\u003cinit\u003e(HttpsClient.java:264)\nsun.net.www.protocol.https.HttpsClient.New(HttpsClient.java:367)\nsun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.getNewHttpClient(AbstractDelegateHttpsURLConnection.java:191)\norg.apache.activemq.artemis.spi.core.security.jaas.LDAPLoginModule.login(SomeFile.java:12)\nsun.net.www.protocol.http.HttpURLConnection.plainConnect0(HttpURLConnection.java:1138)\nsun.net.www.protocol.http.HttpURLConnection$6.run(HttpURLConnection.java:1022)\nsun.net.www.protocol.http.HttpURLConnection$6.run(HttpURLConnection.java:1020)\njava.security.AccessController.doPrivileged(Native Method)\njava.security.AccessController.doPrivilegedWithCombiner(AccessController.java:782)\nsun.net.www.protocol.http.HttpURLConnection.plainConnect(HttpURLConnection.java:1019)\nsun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:177)\nsun.net.www.protocol.http.HttpURLConnection.getInputStream0(HttpURLConnection.java:1546)\nsun.net.www.protocol.http.HttpURLConnection.access$200(HttpURLConnection.java:91)\nsun.net.www.protocol.http.HttpURLConnection$9.run(HttpURLConnection.java:1466)\nsun.net.www.protocol.http.HttpURLConnection$9.run(HttpURLConnection.java:1464)\njava.security.AccessController.doPrivileged(Native Method)\njava.security.AccessController.doPrivilegedWithCombiner(AccessController.java:782)\nsun.net.www.protocol.http.HttpURLConnection.getInputStream(HttpURLConnection.java:1463)\nsun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:254)\nservlet.ArgentoDemoApp$GenericExecution._executeServletCommand(ArgentoDemoApp.java:850)\nservlet.ArgentoDemoApp$GenericExecution.executeServletCommand(ArgentoDemoApp.java:778)\nservlet.ArgentoDemoApp$MyApplicationExecution.executeServletCommand(ArgentoDemoApp.java:718)\nservlet.ArgentoDemoApp._doGet(ArgentoDemoApp.java:441)\nservlet.ArgentoDemoApp.doGet(ArgentoDemoApp.java:376)\njavax.servlet.http.HttpServlet.service(HttpServlet.java:634)\njavax.servlet.http.HttpServlet.service(HttpServlet.java:741)\norg.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:231)\norg.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)\norg.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)\norg.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:193)\norg.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:166)\norg.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:202)\norg.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:96)\norg.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:541)\norg.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:139)\norg.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)\norg.apache.catalina.valves.AbstractAccessLogValve.invoke(AbstractAccessLogValve.java:690)\norg.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:74)\norg.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:343)\norg.apache.coyote.http11.Http11Processor.service(Http11Processor.java:373)\norg.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)\norg.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:868)\norg.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1590)\norg.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)\njava.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1142)\njava.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:617)\norg.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)\njava.lang.Thread.run(Thread.java:745)\n","jvmId":"EEcommerce_MS_NODE","maliciousIpSource":"","webTransactionUrl":"https://localhost:8088/argentoDemoApp/execute?upload=https://www.cisco.com/c/dam/cdc/t/ctm-core.js","clientAddressType":4,"clientAddress":"218.132.217.179","serverPort":"1047","serverAddress":"75.155.150.130","clientPort":"68389","serverName":"/usr/src/argento/prod/demo-run/tomcat-demo-app/webapps/argentoDemoApp/","vulnerabilityInfo":{"cvePublishDate":"2020-07-15T16:40:14.601976Z","cvssScore":5.3,"cvssSeverity":"MEDIUM","cveNvdUrl":"https://security.snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-584427","incidentFirstDetected":"2020-07-15T16:40:14.601976Z","kennaScore":53.0971,"library":"org.apache.tomcat.embed:tomcat-embed-core","title":"Denial of Service (DoS)","type":"java","kennaActiveInternetBreach":false,"kennaEasilyExploitable":false,"kennaMalwareExploitable":false,"kennaPredictedExploitable":true,"kennaPopularTarget":false}}]}'

data_sources/crowdstrike_processrollup2.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: event_simpleName
1010
supported_TA:
1111
- name: Splunk Add-on for CrowdStrike FDR
1212
url: https://splunkbase.splunk.com/app/5579
13-
version: 2.0.3
13+
version: 2.0.4
1414
fields:
1515
- AuthenticationId
1616
- AuthenticationId_meaning
@@ -96,6 +96,7 @@ field_mappings:
9696
mapping:
9797
CommandLine: Processes.process
9898
ImageFileName: Processes.process_path
99+
ImageFileName|endswith: Processes.process_name
99100
ParentBaseFileName: Processes.parent_process_name
100101
ParentProcessId: Processes.parent_process_id
101102
RawProcessId: Processes.process_id

data_sources/nginx_access.yml

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,21 @@ author: Patrick Bareiss, Splunk
66
description: Data source object for Nginx Access
77
source: /var/log/nginx/access.log
88
sourcetype: nginx:plus:kv
9-
supported_TA: []
9+
supported_TA:
10+
- name: Splunk Add-on for NGINX
11+
url: https://splunkbase.splunk.com/app/3258
12+
version: 3.3.0
13+
field_mappings:
14+
- data_model: cim
15+
data_set: Web
16+
mapping:
17+
server: Web.dest
18+
http_method: Web.http_method
19+
http_user_agent: Web.http_user_agent
20+
status: Web.status
21+
uri_path: Web.url
22+
url_length: Web.url_length
23+
src_ip: Web.src
1024
fields:
1125
- _time
1226
- action

data_sources/palo_alto_network_threat.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,16 @@ supported_TA:
1010
- name: Palo Alto Networks Add-on
1111
url: https://splunkbase.splunk.com/app/2757
1212
version: 8.1.3
13+
field_mappings:
14+
- data_model: cim
15+
data_set: Web
16+
mapping:
17+
dest: Web.dest
18+
http_method: Web.http_method
19+
http_user_agent: Web.http_user_agent
20+
url: Web.url
21+
url_length: Web.url_length
22+
src: Web.src
1323
fields:
1424
- _time
1525
- date_hour

data_sources/palo_alto_network_traffic.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,16 @@ fields:
2929
- splunk_server
3030
- timeendpos
3131
- timestartpos
32+
field_mappings:
33+
- data_model: cim
34+
data_set: All_Traffic
35+
mapping:
36+
app: All_Traffic.app
37+
action: All_Traffic.action
38+
dest_ip: All_Traffic.dest_ip
39+
dest_port: All_Traffic.dest_port
40+
src_ip: All_Traffic.src_ip
41+
src_port: All_Traffic.src_port
3242
example_log: 577 <14>1 2024-02-22T12:33:50-05:00 PALO220.ATTACK_RANGE.LAN - - - -
3343
1,2024/02/22 12:33:50,012801036556,TRAFFIC,end,2305,2024/02/22 12:33:50,192.168.1.205,147.28.146.44,201.17.96.104,147.28.146.44,No_Vuln_Filtering_OUT,,,screenconnect,vsys1,Trust,Untrust,ethernet1/2,ethernet1/1,splunk_range,2024/02/22
3444
12:33:50,14740,1,50624,443,11024,443,0x40005e,tcp,allow,7419,6609,810,25,2024/02/22

data_sources/suricata.yml

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,21 @@ author: Patrick Bareiss, Splunk
66
description: Data source object for Suricata
77
source: suricata
88
sourcetype: suricata
9-
supported_TA: []
9+
supported_TA:
10+
- name: Splunk TA for Suricata
11+
url: https://splunkbase.splunk.com/app/2760
12+
version: 2.3.3
13+
field_mappings:
14+
- data_model: cim
15+
data_set: Web
16+
mapping:
17+
http.hostname: Web.dest
18+
http.http_method: Web.http_method
19+
http.http_user_agent: Web.http_user_agent
20+
http.status: Web.status
21+
http.url: Web.url
22+
http.length: Web.url_length
23+
src_ip: Web.src
1024
fields:
1125
- _time
1226
- app_proto

data_sources/sysmon_eventid_1.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,7 +125,7 @@ field_mappings:
125125
Hashes: Processes.process_hash
126126
ParentProcessGuid: Processes.parent_process_guid
127127
ParentProcessId: Processes.parent_process_id
128-
ParentImage: Processes.parent_process_name
128+
ParentImage|endswith: Processes.parent_process_name
129129
ParentCommandLine: Processes.parent_process
130130
Computer: Processes.dest
131131
OriginalFileName: Processes.original_file_name

data_sources/sysmon_eventid_11.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,7 @@ field_mappings:
9292
ProcessGuid: Filesystem.process_guid
9393
ProcessId: Filesystem.process_id
9494
TargetFilename: Filesystem.file_path
95+
TargetFilename|endswith: Filesystem.file_name
9596
example_log: <Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider
9697
Name='Microsoft-Windows-Sysmon' Guid='{5770385F-C22A-43E0-BF4C-06F5698FFBD9}'/><EventID>11</EventID><Version>2</Version><Level>4</Level><Task>11</Task><Opcode>0</Opcode><Keywords>0x8000000000000000</Keywords><TimeCreated
9798
SystemTime='2023-02-08T13:01:11.065939500Z'/><EventRecordID>7712490</EventRecordID><Correlation/><Execution

0 commit comments

Comments
 (0)