Skip to content

Commit 8bd67a1

Browse files
authored
Merge branch 'develop' into axios_attack
2 parents 815e2de + 90536d0 commit 8bd67a1

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

contentctl.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -125,9 +125,9 @@ apps:
125125
- uid: 2757
126126
title: Splunk Add-on for Palo Alto Networks
127127
appid: SPLUNK_ADD_ON_FOR_PALO_ALTO_NETWORKS
128-
version: 3.0.0
128+
version: 3.0.1
129129
description: description of app
130-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-palo-alto-networks_300.tgz
130+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-palo-alto-networks_301.tgz
131131
- uid: 3865
132132
title: Zscaler Technical Add-On for Splunk
133133
appid: Zscaler_CIM

data_sources/palo_alto_network_threat.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Palo Alto Network Threat
22
id: 375c2b0e-d216-41ad-9406-200464595209
3-
version: 3
4-
date: '2026-03-23'
3+
version: 4
4+
date: '2026-03-31'
55
author: Patrick Bareiss, Splunk
66
description: Logs detected threats identified by Palo Alto Networks devices, including
77
details about malware, intrusion attempts, and malicious network activity.
@@ -16,7 +16,7 @@ sourcetype: pan:threat
1616
supported_TA:
1717
- name: Palo Alto Networks Add-on
1818
url: https://splunkbase.splunk.com/app/7523
19-
version: 3.0.0
19+
version: 3.0.1
2020
field_mappings:
2121
- data_model: cim
2222
data_set: Web

data_sources/palo_alto_network_traffic.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Palo Alto Network Traffic
22
id: 182a83bc-c31a-4817-8c7a-263744cec52a
3-
version: 3
4-
date: '2026-03-23'
3+
version: 4
4+
date: '2026-03-31'
55
author: Patrick Bareiss, Splunk
66
description: Logs network traffic events captured by Palo Alto Networks devices, including
77
details about sessions, protocols, and source and destination IPs.
@@ -16,7 +16,7 @@ sourcetype: pan:traffic
1616
supported_TA:
1717
- name: Palo Alto Networks Add-on
1818
url: https://splunkbase.splunk.com/app/7523
19-
version: 3.0.0
19+
version: 3.0.1
2020
fields:
2121
- _time
2222
- date_hour

detections/endpoint/windows_rundll32_with_non_standard_file_extension.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ drilldown_searches:
115115
earliest_offset: $info_min_time$
116116
latest_offset: $info_max_time$
117117
rba:
118-
message: An instance of [$parent_process_path] launched [$process_name$] loading a non-standard DLL extension [$process$] in host [$dest$]
118+
message: An instance of [$parent_process_path$] launched [$process_name$] loading a non-standard DLL extension [$process$] in host [$dest$]
119119
risk_objects:
120120
- field: dest
121121
type: system

0 commit comments

Comments
 (0)