icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Corelight App For Splunk
SHA256 checksum (corelight-app-for-splunk_251.tgz) 394310bc38ac47783f70c525b4e98bd4df2c53a61818abc5ea41314de0baa35d SHA256 checksum (corelight-app-for-splunk_250.tgz) 84d87eccabde8a87d0a53bf3aea1a8aec9ba6f33e1e2cc6c87a0ae7406c74a5c SHA256 checksum (corelight-app-for-splunk_249.tgz) a087042432559cfb1ad2b04019a5d555d872dd312f70d0bcb83a7d822f38cdad SHA256 checksum (corelight-app-for-splunk_248.tgz) 953e9ed1fd834070473e5defbd2ac3e37c69b769d59263c65e79855cfd371ee3 SHA256 checksum (corelight-app-for-splunk_247.tgz) 17edebdece3837becd1bb8e228e89218573e308ea1efef76efb0dc166f05b59e SHA256 checksum (corelight-app-for-splunk_246.tgz) 3a1c611cd501740e98fe42d1957fc51c9cf11ae627c7a27d4ac5fdb61805ec60 SHA256 checksum (corelight-app-for-splunk_245.tgz) abdb4211ffff3df1abca5c1377976a8b3cd4d89d08803dd226330dd866ed205a SHA256 checksum (corelight-app-for-splunk_244.tgz) a301e2729d1dfb133726e57cc42d76e45880474e74a53462f16967dd8c7d7a4c
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Corelight App For Splunk

Splunk Cloud
Overview
Details
The Corelight App for Splunk enables incident responders and threat hunters who use Splunk® and Splunk Enterprise Security to work faster and more effectively. The app and required TA extracts information and knowledge from Zeek (formerly known as Bro) via Corelight Sensors or open-source Zeek, resulting in powerful security insights through key traffic dashboards such as:

Intel: Find IOCs from external sources matched in network traffic.

Notices: See situations flagged by the Notice policy for further investigation.

IP Interrogation: Identify anomalies by reviewing top protocol usage, internal vs. external connections, top connections by bytes transferred and more.

Log Hunting: Accelerate your hunt by narrowing down many logs to only the logs that matter.

Detections: Find and respond to off-port protocol usage, IOC matches, and other potentially interesting events.

Connections: Gain situational awareness using lists of top services, ports, dataflows, originators, and responders.

HTTP: Find suspicious HTTP transactions by reviewing a list of top host headers, originators, rare user agents and rare host headers.

DNS: Detect DNS exfiltration by spotting queries to non-existent domains and high connection counts.

Files: Find executables hidden in benign extensions and compressed files.

Corelight Egress Monitor: Find risky North/South user connections to weak SSL versions.

Corelight App For Splunk Documentation

The Corelight App for Splunk enables incident responders and threat hunters who use Splunk® and Splunk Enterprise Security to work faster and more effectively.

App Version2.5.1
App Version 2.5.1
App Build 161
Splunk Enterprise Versions 9.X, 8.2, 8.1 (Dashboard Studio: 9.X Only)
Platforms Splunk Enterprise, Splunk Cloud
Splunkbase Url https://splunkbase.splunk.com/app/3884
Author Aplura, LLC. and Corelight, Inc.
Creates an index False
Implements summarization No
Summary Indexing False
Report Acceleration False
Release Date 11/25/2024
When upgrading from Corelight App For Splunk version 2.4.4 or earlier, remove the previous app before installing the latest Corelight App For Splunk app release. Additionally, check in the `local/data/ui/views` folder for conflicting dashboards.

Corelight App For Splunk - Dashboard Overview

The Corelight App For Splunk transforms complex network data into actionable security intelligence, enabling faster threat detection and incident response. By seamlessly integrating with Corelight Sensors and Zeek data, the app provides security teams with comprehensive visibility through specialized dashboards covering alert aggregation, protocol analysis, threat intelligence matching, and network behavior analytics. Built for security analysts, incident responders, and threat hunters, the app streamlines investigation workflows and enhances threat hunting capabilities with features like MITRE ATT&CK framework integration, automated alert correlation, and detailed traffic analysis.

Security Workflows Dashboards

  • Alert Aggregations: Consolidates and prioritizes security alerts with MITRE ATT&CK mapping for streamlined threat response

  • Intel: Monitors IOC matches from external threat intelligence sources in network traffic

  • IP Interrogation: Analyzes specific IP addresses for connection patterns, protocol usage, and network interactions

  • Log Hunting: Enables detailed investigation of network events with customizable filters and search criteria

  • Notices: Tracks system-generated security notices and intelligence alerts with severity classification

  • Security Posture: Provides comprehensive overview of network security status including alerts, encryption, and DNS health

  • RDP Inferences: Monitors Remote Desktop Protocol connections, authentication patterns, and security protocols

  • SSH Inferences: Analyzes SSH connection patterns, authentication methods, and potential security issues

  • Suricata IDS Alert Overview: Displays intrusion detection alerts with temporal patterns and severity levels

  • VPN Insights: Tracks VPN usage patterns, connections, and user activity across the network

Data Explorer Dashboards

  • Connections: Visualizes top services, ports, dataflows, and network connection patterns

  • DNS: Monitors DNS query patterns and potential exfiltration attempts through domain analysis

  • Files: Identifies suspicious files, executables, and compressed file transfers

  • HTTP: Analyzes HTTP transactions for suspicious patterns in headers, user agents, and requests

  • Software: Tracks software versions and usage patterns across monitored network traffic

  • SSL and x509: Monitors SSL/TLS certificates and validation status for encrypted traffic

Data Insights Dashboards

  • Secure Channel Insights: Analyzes encrypted and non-encrypted SSL, SSH, TLS, and x509 traffic

  • Name Resolution Insights: Provides deep analysis of DNS traffic patterns and potential threats

  • Remote Activity Insights: Monitors remote access patterns and authentication attempts

Corelight Menu Dashboards

  • Configuration: Manages app settings, indexes, and logging configuration

  • Lookup Generation: Creates and manages lookup files for dashboard filtering

  • Sensor Overview: Provides operational status of Corelight sensors

  • About: Displays app version information and documentation

User Guide

Custom Search Commands

cid is a custom command provided to turn a tuple of src_ip, src_port, dest_ip, and dest_port into a community string.

Lookups

Corelight App For Splunk contains several lookup files.

It is a best practice and recommendation to **not** use the direct CSV name, as these will change between versions. Use the `transforms` name as listed in the table.
Transforms Filename Description
port_descriptions port_desc_2.5.1.csv Gives port descriptions to ports.
corelight_systems corelight_systems_2.5.1.csv Auto-generated from sensor data
corelight_services corelight_services_2.5.1.csv Auto-generated from services data
corelight_dns_ports corelight_dns_ports_2.5.1.csv Auto-generated from DNS data
orelight_dns_record_types corelight_dns_record_type_2.5.1.csv Auto-generated from NDS data
corelight_files_mime_types corelight_files_mime_types_2.5.1.csv Auto-generated from files data
corelight_software_types corelight_software_types_2.5.1.csv Auto-generated from software data
corelight_dns_reply_code corelight_dns_reply_code_2.5.1.csv Provided to lookup reply code types
corelight_conn_state_description corelight_conn_state_description_2.5.1.csv Describes connection states
corelight_status_action corelight_status_action_2.5.1.csv Describes Corelight action and status
ssh_inference ssh_inference_lookup_2.5.1.csv Describes inferences
corelight_inferences_description corelight_inferences_description_2.5.1.csv Describes inferences
corelight_severity corelight_severities_2.5.1.csv Maps severity ids and severity text
corelight_error_messages corelight_error_messages_2.5.1.csv Contains information on Corelight Error messages.
corelight_alert_aggregations corelight_alert_aggregations_enrichment.csv Provides enrichments for Suricata alerts.

Scripts and binaries

This App provides the following scripts:

  • cid.py
    • Script for use with the cid command.
  • Diag.py
    • Custom diag generation
  • Utilities.py
    • Splunk utilities for python scripts
  • version.py
    • The splunk app version for logging purposes
  • app_properties.py
    • The Splunk extension properties.

Event Generator

Corelight App For Splunk does not make use of an event generator.

Acceleration

  1. Summary Indexing: No
  2. Data Model Acceleration: No
  3. Report Acceleration: No

Release Notes

Version 2.5.1
Nov. 25, 2024
  • Introducing a new suite of dashboards designed to aggregate Suricata alerts. These dashboards feature AI-driven enrichments and mappings to the MITRE ATT&CK framework, offering a comprehensive analytical perspective.
  • New Dashboards:
    • Alert Aggregations
    • Alert Aggregations Details
  • Added corelight_ssh to the CIM framework with accurate tagging and mapping to their respective Splunk Data Models.
  • Removed versioning from generated lookups to prevent upgrade issues between generations.
  • Enhanced search performance on Security Posture panels, including SMBv1, FTP, and DNS.
  • Updated corelight_http, corelight_http_red, and corelight_http2 stanzas in props.conf to correctly handle field aliases for bytes_in and bytes_out.
  • Removed versioning from generated lookups to prevent upgrade issues between generations.
  • Updated various dashboards for formatting and search optimizations.
  • Upgraded splunk-sdk to 2.0.2.
Version 2.5.0
May 17, 2024

Version 2.5.0

  • Dashboard Updates
  • Updated the Welcome dashboard
  • Added Security Posture
  • Added Secure Channel Insights
  • Added Name Resolution Insights
  • Added Remote Activity Insights
Version 2.4.9
Nov. 16, 2023

Version 2.4.9

  • Dashboard Enhancements
  • HTTP
    • Added dropdown filter for User Agents. Shows Top 100 only.
  • VPN Insights
    • Added dropdown filter for Inferences.
    • Fixed incorrect query for Largest Transfers Between Host Pairs Over VPN
  • Intel
    • Added dropdown filter for Incident Types.
  • Notices
    • Added a textual filter field for msg or note fields.
  • Updated Corelight Suricata IDS Alerts dashboard.
  • Extractions
  • Updated various sourcetypes to remove confusion around src/dest fields relating to id.* fields.
Version 2.4.8
July 7, 2023

Version 2.4.8

  • Updated TA for proper permissions to pass Splunk Cloud
  • Updated corelight_ntp sourcetype: correct an if statement
Version 2.4.7
June 1, 2023
  • Removed KV_MODE on corelight_tsv as invalid against INDEXED_EXTRACTIONS
  • Updated lookups to a version based file-naming convention to facilitate Splunk Cloud updates.
  • Additional CIM additions for additional sourcetypes
Version 2.4.6
March 31, 2023

= Version 2.4.6

  • Updated to CIM v5.1
  • Fixed bug in cid search command relating to icmp6 with IPv6 src_ips.
  • Updated inferences props for better extractions.
Version 2.4.5
Sept. 2, 2022
  • Converted cid custom command to a v2 Search Command.
  • Updated splunklib to current version.
  • Updated Configuration Management page
  • Added additional support easier diagnostic gathering
Version 2.4.4
Dec. 3, 2021
  • [New] Added "Passive Identification" dashboard under "Security Workflows".
  • [Enhancemnet] Removed unused jQuery code for improved Splunk Cloud support.

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.