Skip to content

Commit 53b73c5

Browse files
authored
Merge branch 'develop' into feature/PEX-699-response-plan
2 parents cc74c88 + 78d7f8c commit 53b73c5

File tree

156 files changed

+1933
-505
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

156 files changed

+1933
-505
lines changed

contentctl.yml

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -38,9 +38,9 @@ apps:
3838
- uid: 6553
3939
title: Splunk Add-on for Okta Identity Cloud
4040
appid: Splunk_TA_okta_identity_cloud
41-
version: 4.1.0
41+
version: 5.0.0
4242
description: description of app
43-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-okta-identity-cloud_410.tgz
43+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-okta-identity-cloud_500.tgz
4444
- uid: 7404
4545
title: Cisco Security Cloud
4646
appid: CiscoSecurityCloud
@@ -65,9 +65,9 @@ apps:
6565
- uid: 742
6666
title: Splunk Add-on for Microsoft Windows
6767
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_WINDOWS
68-
version: 9.1.1
68+
version: 9.1.2
6969
description: description of app
70-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-windows_911.tgz
70+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-windows_912.tgz
7171
- uid: 5709
7272
title: Splunk Add-on for Sysmon
7373
appid: Splunk_TA_microsoft_sysmon
@@ -167,9 +167,9 @@ apps:
167167
- uid: 4055
168168
title: Splunk Add-on for Microsoft Office 365
169169
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_OFFICE_365
170-
version: 5.0.0
170+
version: 5.1.0
171171
description: description of app
172-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_500.tgz
172+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_510.tgz
173173
- uid: 2890
174174
title: Splunk Machine Learning Toolkit
175175
appid: SPLUNK_MACHINE_LEARNING_TOOLKIT
@@ -251,6 +251,11 @@ apps:
251251
appid: TA-cisco_ios
252252
version: 2.7.9
253253
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/add-on-for-cisco-network-data_279.tgz
254+
- uid: 8024
255+
title: TA-ollama
256+
appid: ta-ollama
257+
version: 0.1.5
258+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/ta-ollama_015.tgz
254259
githash: d6fac80e6d50ae06b40f91519a98489d4ce3a3fd
255260
test_data_caches:
256261
- base_url: https://media.githubusercontent.com/media/splunk/attack_data/master/

data_sources/linux_auditd_cwd.yml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
name: Linux Auditd Cwd
2+
id: a9ef851b-d864-478b-b1b3-76535d7ff7fc
3+
version: 1
4+
date: '2025-12-02'
5+
author: Nasreddine Bencherchali, Splunk
6+
description: This type is used to record the working directory from which the process that invoked the system call specified in the first record was executed. The purpose of this record is to record the current process's location in case a relative path winds up being captured in the associated PATH record. This way the absolute path can be reconstructed.
7+
source: auditd
8+
sourcetype: auditd
9+
separator: type
10+
separator_value: CWD
11+
configuration: https://github.com/Neo23x0/auditd/blob/master/audit.rules
12+
supported_TA:
13+
- name: Splunk Add-on for Unix and Linux
14+
url: https://splunkbase.splunk.com/app/833
15+
version: 10.2.0
16+
fields:
17+
- cwd
18+
- date_hour
19+
- date_mday
20+
- date_minute
21+
- date_month
22+
- date_second
23+
- msg
24+
- type
25+
example_log: 'type=CWD msg=audit(11/20/2025 16:57:48.909:110027) : cwd=/etc/ssh'

data_sources/m365_copilot_graph_api.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sourcetype: o365:graph:api
99
supported_TA:
1010
- name: Splunk Add-on for Microsoft Office 365
1111
url: https://splunkbase.splunk.com/app/4055
12-
version: 5.0.0
12+
version: 5.1.0
1313
fields:
1414
- appDisplayName
1515
- appId

data_sources/ntlm_operational_8004.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: EventCode
1010
supported_TA:
1111
- name: Splunk Add-on for Microsoft Windows
1212
url: https://splunkbase.splunk.com/app/742
13-
version: 9.1.1
13+
version: 9.1.2
1414
fields:
1515
- CategoryString
1616
- Channel

data_sources/ntlm_operational_8005.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: EventCode
1010
supported_TA:
1111
- name: Splunk Add-on for Microsoft Windows
1212
url: https://splunkbase.splunk.com/app/742
13-
version: 9.1.1
13+
version: 9.1.2
1414
fields:
1515
- CategoryString
1616
- Channel

data_sources/ntlm_operational_8006.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: EventCode
1010
supported_TA:
1111
- name: Splunk Add-on for Microsoft Windows
1212
url: https://splunkbase.splunk.com/app/742
13-
version: 9.1.1
13+
version: 9.1.2
1414
fields:
1515
- CategoryString
1616
- Channel

data_sources/o365.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@ separator: Operation
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 5.0.0
20+
version: 5.1.0

data_sources/o365_add_app_role_assignment_grant_to_user_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: Add app role assignment grant to user.
1717
supported_TA:
1818
- name: Splunk Add-on for Microsoft Office 365
1919
url: https://splunkbase.splunk.com/app/4055
20-
version: 5.0.0
20+
version: 5.1.0
2121
fields:
2222
- _time
2323
- ActorContextId

data_sources/o365_add_app_role_assignment_to_service_principal_.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add app role assignment to service principal.
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Office 365
2020
url: https://splunkbase.splunk.com/app/4055
21-
version: 5.0.0
21+
version: 5.1.0
2222
fields:
2323
- _time
2424
- ActorContextId

data_sources/o365_add_mailboxpermission.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: Add-MailboxPermission
1818
supported_TA:
1919
- name: Splunk Add-on for Microsoft Office 365
2020
url: https://splunkbase.splunk.com/app/4055
21-
version: 5.0.0
21+
version: 5.1.0
2222
fields:
2323
- _time
2424
- AccessRights

0 commit comments

Comments
 (0)