Skip to content

Commit 6033082

Browse files
authored
Merge branch 'develop' into haagsqldb
2 parents 42fbaba + 3dbc72f commit 6033082

File tree

226 files changed

+6638
-2770
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

226 files changed

+6638
-2770
lines changed

contentctl.yml

Lines changed: 15 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.1.0
6+
version: 5.1.1
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU
@@ -44,9 +44,9 @@ apps:
4444
- uid: 7404
4545
title: Cisco Security Cloud
4646
appid: CiscoSecurityCloud
47-
version: 3.0.1
47+
version: 3.1.1
4848
description: description of app
49-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_301.tgz
49+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_311.tgz
5050
- uid: 6652
5151
title: Add-on for Linux Sysmon
5252
appid: Splunk_TA_linux_sysmon
@@ -155,9 +155,9 @@ apps:
155155
- uid: 5556
156156
title: Splunk Add-on for Google Workspace
157157
appid: SPLUNK_ADD_ON_FOR_GOOGLE_WORKSPACE
158-
version: 3.0.2
158+
version: 3.0.3
159159
description: description of app
160-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_302.tgz
160+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_303.tgz
161161
- uid: 3110
162162
title: Splunk Add-on for Microsoft Cloud Services
163163
appid: SPLUNK_TA_MICROSOFT_CLOUD_SERVICES
@@ -167,9 +167,9 @@ apps:
167167
- uid: 4055
168168
title: Splunk Add-on for Microsoft Office 365
169169
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_OFFICE_365
170-
version: 4.7.0
170+
version: 4.8.0
171171
description: description of app
172-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_470.tgz
172+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_480.tgz
173173
- uid: 2890
174174
title: Splunk Machine Learning Toolkit
175175
appid: SPLUNK_MACHINE_LEARNING_TOOLKIT
@@ -212,10 +212,17 @@ apps:
212212
version: 4.2.2
213213
description: PSC for MLTK
214214
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/python-for-scientific-computing-for-linux-64-bit_422.tgz
215+
- uid: 6254
216+
title: Splunk Add-on for Github
217+
appid: Splunk_TA_github
218+
version: 3.1.0
219+
description: description of app
220+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-github_310.tgz
215221
- uid: 2882
216222
title: Splunk Add-on for AppDynamics
217223
appid: Splunk_TA_AppDynamics
218224
version: 3.0.0
219-
description: The Splunk Add-on for AppDynamics enables you to easily configure data inputs to pull data from AppDynamics' REST APIs
225+
description: The Splunk Add-on for AppDynamics enables you to easily configure data
226+
inputs to pull data from AppDynamics' REST APIs
220227
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-appdynamics_300.tgz
221228
githash: d6fac80e6d50ae06b40f91519a98489d4ce3a3fd
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
name: AWS CloudTrail DeleteLoggingConfiguration
2+
id: 24a28726-28f3-4537-a953-71bfbbc3b831
3+
version: 1
4+
date: '2025-02-21'
5+
author: Bhavin Patel, Splunk
6+
description: Data source object for AWS CloudTrail DeleteLoggingConfiguration
7+
source: aws_cloudtrail
8+
sourcetype: aws:cloudtrail
9+
separator: eventName
10+
supported_TA:
11+
- name: Splunk Add-on for AWS
12+
url: https://splunkbase.splunk.com/app/1876
13+
version: 7.9.1
14+
fields:
15+
- _time
16+
example_log: ''
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
name: AWS CloudTrail DeleteRuleGroup
2+
id: 21c9b538-fa11-4bdf-9138-0dfe06b4d730
3+
version: 1
4+
date: '2025-02-21'
5+
author: Bhavin Patel, Splunk
6+
description: Data source object for AWS CloudTrail DeleteRuleGroup
7+
source: aws_cloudtrail
8+
sourcetype: aws:cloudtrail
9+
separator: eventName
10+
supported_TA:
11+
- name: Splunk Add-on for AWS
12+
url: https://splunkbase.splunk.com/app/1876
13+
version: 7.9.1
14+
fields:
15+
- _time
16+
example_log: ''
Lines changed: 150 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,150 @@
1+
name: AWS CloudTrail DescribeSnapshotAttribute
2+
id: f054c99b-63b8-4236-8a62-b52fbbabacba
3+
version: 1
4+
date: '2025-02-21'
5+
author: Bhavin Patel, Splunk
6+
description: Data source object for AWS CloudTrail DescribeSnapshotAttribute
7+
source: aws_cloudtrail
8+
sourcetype: aws:cloudtrail
9+
separator: eventName
10+
supported_TA:
11+
- name: Splunk Add-on for AWS
12+
url: https://splunkbase.splunk.com/app/1876
13+
version: 7.9.1
14+
fields:
15+
- action
16+
- app
17+
- authentication_method
18+
- awsRegion
19+
- aws_account_id
20+
- change_type
21+
- command
22+
- date_hour
23+
- date_mday
24+
- date_minute
25+
- date_month
26+
- date_second
27+
- date_wday
28+
- date_year
29+
- date_zone
30+
- desc
31+
- dest
32+
- dest_ip_range
33+
- dest_port_range
34+
- direction
35+
- dvc
36+
- errorCode
37+
- errorMessage
38+
- eventCategory
39+
- eventID
40+
- eventName
41+
- eventSource
42+
- eventTime
43+
- eventType
44+
- eventVersion
45+
- eventtype
46+
- host
47+
- image_id
48+
- index
49+
- instance_type
50+
- linecount
51+
- managementEvent
52+
- msg
53+
- object
54+
- object_attrs
55+
- object_category
56+
- object_id
57+
- product
58+
- protocol
59+
- protocol_code
60+
- punct
61+
- readOnly
62+
- reason
63+
- recipientAccountId
64+
- region
65+
- requestID
66+
- requestParameters.attributeType
67+
- requestParameters.snapshotId
68+
- responseElements
69+
- result
70+
- result_id
71+
- rule_action
72+
- signature
73+
- source
74+
- sourceIPAddress
75+
- sourcetype
76+
- splunk_server
77+
- splunk_server_group
78+
- src
79+
- src_ip
80+
- src_ip_range
81+
- src_port_range
82+
- src_user
83+
- src_user_id
84+
- src_user_name
85+
- src_user_role
86+
- src_user_type
87+
- start_time
88+
- status
89+
- tag
90+
- tag::action
91+
- tag::app
92+
- tag::eventtype
93+
- tag::object_category
94+
- temp_access_key
95+
- timeendpos
96+
- timestartpos
97+
- tlsDetails.cipherSuite
98+
- tlsDetails.clientProvidedHostHeader
99+
- tlsDetails.tlsVersion
100+
- user
101+
- userAgent
102+
- userIdentity.accessKeyId
103+
- userIdentity.accountId
104+
- userIdentity.arn
105+
- userIdentity.principalId
106+
- userIdentity.sessionContext.attributes.creationDate
107+
- userIdentity.sessionContext.attributes.mfaAuthenticated
108+
- userIdentity.sessionContext.sessionIssuer.accountId
109+
- userIdentity.sessionContext.sessionIssuer.arn
110+
- userIdentity.sessionContext.sessionIssuer.principalId
111+
- userIdentity.sessionContext.sessionIssuer.type
112+
- userIdentity.sessionContext.sessionIssuer.userName
113+
- userIdentity.type
114+
- userName
115+
- user_access_key
116+
- user_agent
117+
- user_arn
118+
- user_group_id
119+
- user_id
120+
- user_name
121+
- user_role
122+
- user_type
123+
- vendor
124+
- vendor_account
125+
- vendor_product
126+
- vendor_region
127+
- _bkt
128+
- _cd
129+
- _eventtype_color
130+
- _indextime
131+
- _raw
132+
- _serial
133+
- _si
134+
- _sourcetype
135+
- _time
136+
example_log: '{"eventVersion": "1.10", "userIdentity": {"type": "AssumedRole", "principalId":
137+
"AROAYTOGP2RLBXYPYUKBH:aws-go-sdk-1740131590946446551", "arn": "arn:aws:sts::111111111111111:assumed-role/DAFTPUNK-cloud-security-audit/aws-go-sdk-1740131590946446551",
138+
"accountId": "111111111111111", "accessKeyId": "DAFTPUNK", "sessionContext": {"sessionIssuer":
139+
{"type": "Role", "principalId": "AROAYTOGP2RLBXYPYUKBH", "arn": "arn:aws:iam::111111111111111:role/DAFTPUNK-cloud-security-audit",
140+
"accountId": "111111111111111", "userName": "DAFTPUNK-cloud-security-audit"}, "attributes":
141+
{"creationDate": "2025-02-21T10:48:43Z", "mfaAuthenticated": "false"}}}, "eventTime":
142+
"2025-02-21T11:29:27Z", "eventSource": "ec2.amazonaws.com", "eventName": "DescribeSnapshotAttribute",
143+
"awsRegion": "eu-central-1", "sourceIPAddress": "54.203.114.197", "userAgent": "m/E
144+
aws-sdk-go-v2/1.30.5 os/linux lang/go#1.22.4 md/GOOS#linux md/GOARCH#amd64 api/ec2#1.177.3",
145+
"requestParameters": {"snapshotId": "snap-082bd5016636bbd94", "attributeType": "PRODUCT_CODES"},
146+
"responseElements": null, "requestID": "70339070-6038-40b7-9acf-5ecb85cda843", "eventID":
147+
"bcc65c3f-a997-4a01-90bf-3b85f7268e70", "readOnly": true, "eventType": "AwsApiCall",
148+
"managementEvent": true, "recipientAccountId": "111111111111111", "eventCategory":
149+
"Management", "tlsDetails": {"tlsVersion": "TLSv1.3", "cipherSuite": "TLS_AES_128_GCM_SHA256",
150+
"clientProvidedHostHeader": "ec2.eu-central-1.amazonaws.com"}}'
Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
name: Azure Active Directory MicrosoftGraphActivityLogs
2+
id: 63ff93ba-2bbb-4542-8773-239bf5266367
3+
version: 1
4+
date: '2025-02-21'
5+
author: Bhavin Patel, Splunk
6+
description: Data source object for Azure Active Directory MicrosoftGraphActivityLogs
7+
source: Azure AD
8+
sourcetype: azure:monitor:aad
9+
separator: operationName
10+
supported_TA:
11+
- name: Splunk Add-on for Microsoft Cloud Services
12+
url: https://splunkbase.splunk.com/app/3110
13+
version: 5.4.3
14+
fields:
15+
- _time
16+
example_log: '{"time": "2024-04-30T01:22:46.4948958Z", "resourceId": "/TENANTS/225E05A1-5914-4688-A404-7030E60F3143/PROVIDERS/MICROSOFT.AADIAM",
17+
"operationName": "Microsoft Graph Activity", "operationVersion": "beta", "category":
18+
"MicrosoftGraphActivityLogs", "resultSignature": "200", "durationMs": "948894",
19+
"callerIpAddress": "45.83.145.6", "correlationId": "8fb849dd-2abe-4c3e-b202-d71af8d1555b",
20+
"level": "Informational", "location": "East US 2", "properties": {"__UDI_RequiredFields_TenantId":
21+
"225e05a1-5914-4688-a404-7030e60f3143", "__UDI_RequiredFields_UniqueId": "8fb849dd-2abe-4c3e-b202-d71af8d1555b",
22+
"__UDI_RequiredFields_EventTime": 638500369660000000, "__UDI_RequiredFields_RegionScope":
23+
"NA", "timeGenerated": "2024-04-30T01:22:46.4948958Z", "location": "East US 2",
24+
"requestId": "8fb849dd-2abe-4c3e-b202-d71af8d1555b", "operationId": "8fb849dd-2abe-4c3e-b202-d71af8d1555b",
25+
"clientRequestId": "8fb849dd-2abe-4c3e-b202-d71af8d1555b", "apiVersion": "beta",
26+
"requestMethod": "GET", "responseStatusCode": 200, "tenantId": "225e05a1-5914-4688-a404-7030e60f3143",
27+
"durationMs": 948894, "responseSizeBytes": 91, "signInActivityId": "KRsphQ_4s0-oHv_Br8qSAQ",
28+
"roles": "", "appId": "1950a258-227b-4e31-a9cf-717495945fc2", "UserPrincipalObjectID":
29+
"7b934539-7366-494e-a8ac-3517694d32db", "scopes": "AuditLog.Read.All Directory.AccessAsUser.All
30+
email openid profile", "identityProvider": "", "clientAuthMethod": "0", "wids":
31+
"b79fbf4d-3ef9-4689-8143-76b194e85509", "C_Idtyp": "user", "C_Iat": "1714439850",
32+
"ipAddress": "45.83.145.6", "userAgent": "azurehound/v2.1.8", "requestUri": "https://graph.microsoft.com/beta/servicePrincipals/ffe3e001-d8cf-43a4-89ab-bfce35fd7786/owners?%24top=999",
33+
"userId": "7b934539-7366-494e-a8ac-3517694d32db", "tokenIssuedAt": "2024-04-30T01:17:30.0000000Z"},
34+
"tenantId": "225e05a1-5914-4688-a404-7030e60f3143"}'

0 commit comments

Comments
 (0)