Skip to content

Commit b1365f4

Browse files
committed
updating datasets
2 parents 01f4611 + 90536d0 commit b1365f4

File tree

158 files changed

+2526
-1031
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

158 files changed

+2526
-1031
lines changed

contentctl.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.24.0
6+
version: 5.25.0
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU
@@ -93,11 +93,11 @@ apps:
9393
description: description of app
9494
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-iis_130.tgz
9595
- uid: 4242
96-
title: TA for Suricata
96+
title: CCX Add-on for Suricata
9797
appid: SPLUNK_TA_FOR_SURICATA
98-
version: 2.3.4
98+
version: 1.0.1
9999
description: description of app
100-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/ta-for-suricata_234.tgz
100+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/ccx-add-on-for-suricata_101.tgz
101101
- uid: 5466
102102
title: TA for Zeek
103103
appid: SPLUNK_TA_FOR_ZEEK
@@ -123,11 +123,11 @@ apps:
123123
description: description of app
124124
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-stream-wire-data_816.tgz
125125
- uid: 2757
126-
title: Palo Alto Networks Add-on for Splunk
127-
appid: PALO_ALTO_NETWORKS_ADD_ON_FOR_SPLUNK
128-
version: 8.1.3
126+
title: Splunk Add-on for Palo Alto Networks
127+
appid: SPLUNK_ADD_ON_FOR_PALO_ALTO_NETWORKS
128+
version: 3.0.1
129129
description: description of app
130-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/palo-alto-networks-add-on-for-splunk_813.tgz
130+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-palo-alto-networks_301.tgz
131131
- uid: 3865
132132
title: Zscaler Technical Add-On for Splunk
133133
appid: Zscaler_CIM

data_sources/palo_alto_network_threat.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Palo Alto Network Threat
22
id: 375c2b0e-d216-41ad-9406-200464595209
3-
version: 2
4-
date: '2025-01-23'
3+
version: 4
4+
date: '2026-03-31'
55
author: Patrick Bareiss, Splunk
66
description: Logs detected threats identified by Palo Alto Networks devices, including
77
details about malware, intrusion attempts, and malicious network activity.
@@ -11,12 +11,12 @@ mitre_components:
1111
- Network Traffic Flow
1212
- Application Log Content
1313
- Host Status
14-
source: pan:threat
14+
source: not_applicable
1515
sourcetype: pan:threat
1616
supported_TA:
1717
- name: Palo Alto Networks Add-on
18-
url: https://splunkbase.splunk.com/app/2757
19-
version: 8.1.3
18+
url: https://splunkbase.splunk.com/app/7523
19+
version: 3.0.1
2020
field_mappings:
2121
- data_model: cim
2222
data_set: Web

data_sources/palo_alto_network_traffic.yml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Palo Alto Network Traffic
22
id: 182a83bc-c31a-4817-8c7a-263744cec52a
3-
version: 2
4-
date: '2025-01-23'
3+
version: 4
4+
date: '2026-03-31'
55
author: Patrick Bareiss, Splunk
66
description: Logs network traffic events captured by Palo Alto Networks devices, including
77
details about sessions, protocols, and source and destination IPs.
@@ -11,12 +11,12 @@ mitre_components:
1111
- Network Connection Creation
1212
- Response Metadata
1313
- Application Log Content
14-
source: screenconnect_palo_traffic
14+
source: not_applicable
1515
sourcetype: pan:traffic
1616
supported_TA:
1717
- name: Palo Alto Networks Add-on
18-
url: https://splunkbase.splunk.com/app/2757
19-
version: 8.1.3
18+
url: https://splunkbase.splunk.com/app/7523
19+
version: 3.0.1
2020
fields:
2121
- _time
2222
- date_hour

data_sources/suricata.yml

Lines changed: 223 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
name: Suricata
22
id: 64b245d4-a4d1-4865-a718-c83d3b939f2e
3-
version: 2
4-
date: '2025-01-23'
3+
version: 3
4+
date: '2026-03-26'
55
author: Patrick Bareiss, Splunk
66
description: Logs network traffic and security events detected by Suricata, including
77
details about connections, protocol metadata, and potential threats.
@@ -11,12 +11,12 @@ mitre_components:
1111
- Network Connection Creation
1212
- Malware Metadata
1313
- Application Log Content
14-
source: suricata
14+
source: not_applicable
1515
sourcetype: suricata
1616
supported_TA:
17-
- name: Splunk TA for Suricata
18-
url: https://splunkbase.splunk.com/app/2760
19-
version: 2.3.3
17+
- name: CCX Add-on for Suricata
18+
url: https://splunkbase.splunk.com/app/6994
19+
version: 1.0.1
2020
field_mappings:
2121
- data_model: cim
2222
data_set: Web
@@ -30,7 +30,31 @@ field_mappings:
3030
src_ip: Web.src
3131
fields:
3232
- _time
33+
- action
34+
- alert_gid
35+
- alert_rev
36+
- alert.action
37+
- alert.category
38+
- alert.gid
39+
- alert.metadata.created_at{}
40+
- alert.metadata.former_category{}
41+
- alert.metadata.signature_severity{}
42+
- alert.metadata.updated_at{}
43+
- alert.rev
44+
- alert.severity
45+
- alert.signature
46+
- alert.signature_id
47+
- answer
48+
- app
3349
- app_proto
50+
- body
51+
- bytes
52+
- bytes_in
53+
- bytes_out
54+
- capture_kernel_drops
55+
- capture_kernel_packets
56+
- category
57+
- cookie
3458
- date_hour
3559
- date_mday
3660
- date_minute
@@ -39,9 +63,106 @@ fields:
3963
- date_wday
4064
- date_year
4165
- date_zone
66+
- decoder_avg_pkt_size
67+
- decoder_bytes
68+
- decoder_erspan
69+
- decoder_ethernet
70+
- decoder_gre
71+
- decoder_icmpv4
72+
- decoder_invalid
73+
- decoder_ipraw_invalid_ip_version
74+
- decoder_ipv4
75+
- decoder_ipv4_in_ipv6
76+
- decoder_ipv6
77+
- decoder_ipv6_in_ipv6
78+
- decoder_ltnull_pkt_too_small
79+
- decoder_ltnull_unspported_type
80+
- decoder_max_pkt_size
81+
- decoder_mpls
82+
- decoder_null
83+
- decoder_pkts
84+
- decoder_ppp
85+
- decoder_pppoe
86+
- decoder_raw
87+
- decoder_sctp
88+
- decoder_ssl
89+
- decoder_tcp
90+
- decoder_teredo
91+
- decoder_udp
92+
- decoder_vlan
93+
- decoder_vlan_qinq
94+
- decoer_icmpv6
95+
- defrag_ipv4_fragments
96+
- defrag_ipv4_reassembled
97+
- defrag_ipv4_timeouts
98+
- defrag_ipv6_fragments
99+
- defrag_ipv6_reassembled
100+
- defrag_max_frag_hits
101+
- description
102+
- dest
42103
- dest_ip
43104
- dest_port
105+
- detect_alert
106+
- dfrag_ipv6_timeouts
107+
- dns_memcap_global
108+
- dns_memcap_state
109+
- dns_memuse
110+
- dns.aa
111+
- dns.answers{}.rdata
112+
- dns.answers{}.rrname
113+
- dns.answers{}.rrtype
114+
- dns.answers{}.ttl
115+
- dns.authorities{}.rrname
116+
- dns.authorities{}.rrtype
117+
- dns.authorities{}.soa.expire
118+
- dns.authorities{}.soa.minimum
119+
- dns.authorities{}.soa.mname
120+
- dns.authorities{}.soa.refresh
121+
- dns.authorities{}.soa.retry
122+
- dns.authorities{}.soa.rname
123+
- dns.authorities{}.soa.serial
124+
- dns.authorities{}.ttl
125+
- dns.flags
126+
- dns.grouped.A{}
127+
- dns.id
128+
- dns.opcode
129+
- dns.qr
130+
- dns.ra
131+
- dns.rcode
132+
- dns.rd
133+
- dns.rrname
134+
- dns.rrtype
135+
- dns.tx_id
136+
- dns.type
137+
- dns.version
138+
- duration
139+
- dvc
140+
- endtime
44141
- event_type
142+
- eventtype
143+
- field
144+
- file_rx_id
145+
- file_size
146+
- file_state
147+
- file_stored
148+
- file_tx_id
149+
- fileinfo.filename
150+
- fileinfo.gaps
151+
- fileinfo.size
152+
- fileinfo.state
153+
- fileinfo.stored
154+
- fileinfo.tx_id
155+
- filename
156+
- flow_emerg_mode_entered
157+
- flow_emerg_mode_over
158+
- flow_id
159+
- flow_memcap
160+
- flow_memuse
161+
- flow_mgr_closed_pruned
162+
- flow_mgr_est_pruned
163+
- flow_mgr_new_pruned
164+
- flow_spare
165+
- flow_tcp_reuse
45166
- flow.age
46167
- flow.alerted
47168
- flow.bytes_toclient
@@ -52,18 +173,100 @@ fields:
52173
- flow.reason
53174
- flow.start
54175
- flow.state
55-
- flow_id
56176
- host
177+
- http_content_type
178+
- http_memcap
179+
- http_memuse
180+
- http_method
181+
- http_protocol
182+
- http_referrer
183+
- http_user_agent
184+
- http.hostname
185+
- http.http_content_type
186+
- http.http_method
187+
- http.http_port
188+
- http.http_user_agent
189+
- http.length
190+
- http.protocol
191+
- http.redirect
192+
- http.request_headers{}.name
193+
- http.request_headers{}.value
194+
- http.response_headers{}.name
195+
- http.response_headers{}.value
196+
- http.status
197+
- http.url
198+
- http.xff
199+
- ids_type
57200
- in_iface
58201
- index
59202
- linecount
203+
- message_type
204+
- packets_in
205+
- packets_out
206+
- pcap_cnt
207+
- pkt_src
208+
- product
60209
- proto
61210
- punct
211+
- query
212+
- reason
213+
- reply_code
214+
- severity
215+
- severity_id
216+
- signature
62217
- source
63218
- sourcetype
64219
- splunk_server
220+
- splunk_server_group
221+
- src
65222
- src_ip
66223
- src_port
224+
- ssh_client_software
225+
- ssh_client_version
226+
- ssh_server_software
227+
- ssh_server_version
228+
- ssl_issuer_common_name
229+
- ssl_publickey
230+
- ssl_server_name_indication
231+
- ssl_subject_common_name
232+
- ssl_version
233+
- starttime
234+
- state
235+
- status
236+
- stream_3whs_ack_in_wrong_dir
237+
- stream_3whs_async_wrong_seq
238+
- stream_3whs_right_seq_wrong_ack_evasion
239+
- suricata_signature_id
240+
- tag
241+
- tag::action
242+
- tag::app
243+
- tag::eventtype
244+
- tcp_ack
245+
- tcp_cwr
246+
- tcp_ecn
247+
- tcp_fin
248+
- tcp_flag
249+
- tcp_flag_hex
250+
- tcp_flag_hex_to_client
251+
- tcp_flag_hex_to_server
252+
- tcp_flag_to_client
253+
- tcp_flag_to_server
254+
- tcp_invalid_checksum
255+
- tcp_memuse
256+
- tcp_no_flow
257+
- tcp_pseudo
258+
- tcp_pseudo_failed
259+
- tcp_psh
260+
- tcp_reassembly_gap
261+
- tcp_reassembly_memuse
262+
- tcp_rst
263+
- tcp_segment_memcap_drop
264+
- tcp_sessions
265+
- tcp_ssn_memcap_drop
266+
- tcp_state
267+
- tcp_stream_depth_reached
268+
- tcp_syn
269+
- tcp_synack
67270
- tcp.ack
68271
- tcp.fin
69272
- tcp.psh
@@ -75,4 +278,17 @@ fields:
75278
- timeendpos
76279
- timestamp
77280
- timestartpos
281+
- transaction_id
282+
- transport
283+
- ttl
284+
- tx_id
285+
- type
286+
- uptime
287+
- url
288+
- url_domain
289+
- vendor
290+
- vendor_gid
291+
- vendor_product
292+
- vendor_rev
293+
- vendor_sid
78294
example_log: '{"timestamp":"2023-10-17T01:24:52.149017+0000","flow_id":721124494649885,"in_iface":"ens5","event_type":"flow","src_ip":"192.0.2.1","src_port":30880,"dest_ip":"192.0.2.2","dest_port":80,"proto":"TCP","app_proto":"http","flow":{"pkts_toserver":6,"pkts_toclient":4,"bytes_toserver":640,"bytes_toclient":660,"start":"2023-10-17T01:20:23.829981+0000","end":"2023-10-17T01:22:11.831172+0000","age":108,"state":"closed","reason":"timeout","alerted":false},"tcp":{"tcp_flags":"1b","tcp_flags_ts":"1b","tcp_flags_tc":"1b","syn":true,"fin":true,"psh":true,"ack":true,"state":"closed"}}'
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
name: Windows Event Log Security 4756
2+
id: b0093058-0cb6-4c73-a95b-fb0f3541e88c
3+
version: 1
4+
date: '2026-03-23'
5+
author: Nasreddine Bencherchali, Splunk
6+
description: Data source object for Windows Event Log Security 4756
7+
source: XmlWinEventLog:Security
8+
sourcetype: XmlWinEventLog
9+
separator: EventCode
10+
supported_TA:
11+
- name: Splunk Add-on for Microsoft Windows
12+
url: https://splunkbase.splunk.com/app/742
13+
version: 9.1.2
14+
fields:
15+
- _time
16+
output_fields:
17+
- dest
18+
example_log: <Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider Name='Microsoft-Windows-Security-Auditing' Guid='{54849625-5478-4994-A5BA-3E3B0328C30D}' /> <EventID>4756</EventID> <Version>0</Version> <Level>0</Level> <Task>13826</Task> <Opcode>0</Opcode> <Keywords>0x8020000000000000</Keywords> <TimeCreated SystemTime='2019-03-20T17:08:41.465560800Z' /> <EventRecordID>4405437</EventRecordID> <Correlation /> <Execution ProcessID='704' ThreadID='2584' /> <Channel>Security</Channel> <Computer>atc-win-2k16.atc.local</Computer> <Security /> </System><EventData><Data Name='MemberName'>CN=demouser,CN=Users,DC=atc,DC=local</Data> <Data Name='MemberSid'>S-1-5-21-2245550993-2690282630-2861202560-18603</Data> <Data Name='TargetUserName'>Enterprise Admins</Data> <Data Name='TargetDomainName'>ATC</Data> <Data Name='TargetSid'>S-1-5-21-2245550993-2622282683-2531201460-519</Data> <Data Name='SubjectUserSid'>S-1-5-21-2245550993-2622282683-2531201460-500</Data> <Data Name='SubjectUserName'>test_user</Data> <Data Name='SubjectDomainName'>ATC</Data> <Data Name='SubjectLogonId'>0x109a6c</Data> <Data Name='PrivilegeList'>-</Data> </EventData></Event>

0 commit comments

Comments
 (0)