Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions contentctl.yml
Original file line number Diff line number Diff line change
Expand Up @@ -65,9 +65,9 @@ apps:
- uid: 742
title: Splunk Add-on for Microsoft Windows
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_WINDOWS
version: 9.1.1
version: 9.1.2
description: description of app
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-windows_911.tgz
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-windows_912.tgz
- uid: 5709
title: Splunk Add-on for Sysmon
appid: Splunk_TA_microsoft_sysmon
Expand Down
2 changes: 1 addition & 1 deletion data_sources/ntlm_operational_8004.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- CategoryString
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/ntlm_operational_8005.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- CategoryString
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/ntlm_operational_8006.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- CategoryString
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/powershell_script_block_logging_4104.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ separator_value: '4104'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ActivityID
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_active_directory_admon.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ sourcetype: ActiveDirectory
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- Guid
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_application_15457.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- CategoryString
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_application_17135.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- CategoryString
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_application_2282.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_application_3000.yml
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ separator_value: '3000'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_application_8128.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- CategoryString
- Channel
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- CategoryString
- Channel
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- CategoryString
- Channel
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- CategoryString
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_appxpackaging_171.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- CategoryString
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_capi2_70.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ separator_value: '70'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_capi2_81.yml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ separator_value: '81'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- Channel
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ separator_value: '1007'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ActivityID
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_defender_1121.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ separator_value: '1121'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ActivityID
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_defender_1122.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ separator_value: '1122'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ActivityID
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_defender_1125.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
example_log: <Event xmlns='http://schemas.microsoft.com/win/2004/08/events/event'><System><Provider
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_defender_1126.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ActivityID
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_defender_1129.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ separator_value: '1129'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ComputerName
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_defender_1131.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- ActivityID
- CategoryString
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_defender_1132.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- ActivityID
- CategoryString
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_defender_1133.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- ActivityID
- CategoryString
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_defender_1134.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- ActivityID
- CategoryString
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_defender_5007.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_printservice_316.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ separator_value: '316'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ComputerName
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_printservice_4909.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: EventCode
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
example_log: ''
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_printservice_808.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ separator_value: '808'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ComputerName
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ separator_value: '1149'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ActivityID
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_1100.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ separator_value: '1100'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- Channel
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_1102.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ separator_value: '1102'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- Caller_User_Name
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_4624.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ separator_value: '4624'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ActivityID
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_4625.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ separator_value: '4625'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ActivityID
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_4627.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ separator_value: '4627'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ActivityID
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_4648.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ separator_value: '4648'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ActivityID
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_4662.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ separator_value: '4662'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- AccessList
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_4663.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ separator_value: '4663'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- AccessList
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_4672.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ separator_value: '4672'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- ActivityID
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_4688.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ configuration: Enabling Windows event log process command line logging via group
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- Caller_Domain
- Caller_User_Name
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_4698.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ separator_value: '4698'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- Account_Domain
Expand Down
2 changes: 1 addition & 1 deletion data_sources/windows_event_log_security_4699.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ separator_value: '4699'
supported_TA:
- name: Splunk Add-on for Microsoft Windows
url: https://splunkbase.splunk.com/app/742
version: 9.1.1
version: 9.1.2
fields:
- _time
- Account_Domain
Expand Down
Loading