Open navigation

Splunk Enterprise Security

Modified on: Wed, 28 Aug, 2024 at 3:55 PM

Overview

Splunk is a software platform used for monitoring, searching, analyzing, and visualizing machine-generated log data in real-time. Splunk provides insights to technology infrastructure, security systems, and various business applications that help drive operational performance and business results.


Splunk ES was developed to help make sense of machine-generated log data, and has become a popular choice among Security Information and Event Management (SIEM) solutions for many organizations worldwide. It is primarily used for searching, monitoring, and examining Big Data through a web-style interface.


The Splunk Enterprise integration for Maltego combines the full advantage of the Splunk Common Information Model (CIM) with the investigative capabilities of link analysis.


Using Splunk, SOC teams and cyber security and threat analysts alike can easily query the following CIM data models:

  • Authentication
  • Endpoint
  • Malware
  • Network Resolution
  • Network Sessions
  • Network Traffic
  • Vulnerabilities


Investigators can also perform raw searches, using Splunk’s Search Processing Language to get other events that may not yet be part of the data models.


Be sure to read our blog post: SIEM-plifying Investigations with Splunk and Maltego to learn more about how to leverage Splunk data and explore a use case showing how the Splunk Enterprise Security Transforms can query the Authentication data model, thus allowing you to retrieve information from authentication sources such as Active Directory (AD) directly on Maltego.


You can read more about the Splunk integration in the Hub item detail page on our website here.


Installation Guidelines

For customers with an internet-facing Splunk instance, simply install the Hub item and enter your details. For customers without an internet-facing Splunk instance, email support@maltego.com or reach out to us using the contact form on this page.


If you are a Maltego commeruser and are interested in learning how to integrate Splunk Enterprise into Maltego within your organization, email us at support@maltego.com Our integration experts are happy to discuss your needs and support the integration process!


Configuration Requirements

To enable the Maltego Splunk Enterprise Security Transforms to work, the Splunk Administrator must configure the following:


Common Information Model

  1. Enable the Common Information Model. Please refer to the Splunk User Setup - Common Information Model Add-on Documentation.


Authentication

The default Splunk ES role ESS_USER will be able to access the Transforms. The ideal authentication setup is as follows:

  1. Create a custom user profile with an ess_user role that allows the SPLUNK REST API to search data. Please refer to the Splunk Admin Management Documentation.
  2. The Transforms can be authenticated using a username and password, or a security token. Either of these can be created for authentication, please ensure that one is enabled should it be missing.


Troubleshooting

Should you experience failure to access the Transforms, please check that the following READ permissions are present.


Set the READ permissions for the following objects:

  1. Apps
  2. Custom Search Commands
  3. Search Scripts


Should you require additional support, please refer to the Splunk Object Permission Settings Documentation.


Splunk Enterprise Security Transforms

To Action (Phrase)

Description

Returns the value of the field ‘action’ as a Phrase Entity


Transform Meta Info

InformationValue
Display NameTo Action (Phrase)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘action’ as a Phrase Entity

Variants

Transform NameInput Entities
networksessionsallsessionstoactionphrasemaltego.splunk.AllSessions
endpointprocessestoactionphrasemaltego.splunk.Processes
endpointfilesystemtoactionphrasemaltego.splunk.Filesystem
endpointregistrytoactionphrasemaltego.splunk.Registry
authenticationtoactionphrasemaltego.splunk.Authentication
networktrafficalltraffictoactionphrasemaltego.splunk.AllTraffic
malwaremalwareattackstoactionphrasemaltego.splunk.MalwareAttacks

To Signature (Phrase)

Description

Returns the value of the field ‘signature’ as a Phrase Entity


Transform Meta Info

InformationValue
Display NameTo Signature (Phrase)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘signature’ as a Phrase Entity

Variants

Transform NameInput Entities
networksessionsallsessionstosignaturephrasemaltego.splunk.AllSessions
vulnerabilitiestosignaturephrasemaltego.splunk.Vulnerabilities
authenticationtosignaturephrasemaltego.splunk.Authentication
malwaremalwareattackstosignaturephrasemaltego.splunk.MalwareAttacks

To SrcIp (IPv4Address)

Description

Returns the value of the field ‘src_ip’ as a IPv4Address Entity


Transform Meta Info

InformationValue
Display NameTo SrcIp (IPv4Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘src_ip’ as a IPv4Address Entity

Variants

Transform NameInput Entities
networksessionsallsessionstosrcipipv4addressmaltego.splunk.AllSessions
networktrafficalltraffictosrcipipv4addressmaltego.splunk.AllTraffic

To SrcIp (IPv6Address)

Description

Returns the value of the field ‘src_ip’ as a IPv6Address Entity


Transform Meta Info

InformationValue
Display NameTo SrcIp (IPv6Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘src_ip’ as a IPv6Address Entity

Variants

Transform NameInput Entities
networksessionsallsessionstosrcipipv6addressmaltego.splunk.AllSessions
networktrafficalltraffictosrcipipv6addressmaltego.splunk.AllTraffic

To SrcNtHost (Domain)

Description

Returns the value of the field ‘src_nt_host’ as a Domain Entity


Transform Meta Info

InformationValue
Display NameTo SrcNtHost (Domain)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namenetworksessionsallsessionstosrcnthostdomain
Input Entitiesmaltego.splunk.AllSessions
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘src_nt_host’ as a Domain Entity

To DestIp (IPv4Address)

Description

Returns the value of the field ‘dest_ip’ as a IPv4Address Entity


Transform Meta Info

InformationValue
Display NameTo DestIp (IPv4Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘dest_ip’ as a IPv4Address Entity

Variants

Transform NameInput Entities
networksessionsallsessionstodestipipv4addressmaltego.splunk.AllSessions
networktrafficalltraffictodestipipv4addressmaltego.splunk.AllTraffic

To DestIp (IPv6Address)

Description

Returns the value of the field ‘dest_ip’ as a IPv6Address Entity


Transform Meta Info

InformationValue
Display NameTo DestIp (IPv6Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘dest_ip’ as a IPv6Address Entity

Variants

Transform NameInput Entities
networksessionsallsessionstodestipipv6addressmaltego.splunk.AllSessions
networktrafficalltraffictodestipipv6addressmaltego.splunk.AllTraffic

To DestNtHost (Domain)

Description

Returns the value of the field ‘dest_nt_host’ as a Domain Entity


Transform Meta Info

InformationValue
Display NameTo DestNtHost (Domain)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namenetworksessionsallsessionstodestnthostdomain
Input Entitiesmaltego.splunk.AllSessions
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘dest_nt_host’ as a Domain Entity

To User (Alias)

Description

Returns the value of the field ‘user’ as a Alias Entity


Transform Meta Info

InformationValue
Display NameTo User (Alias)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘user’ as a Alias Entity

Variants

Transform NameInput Entities
networksessionsallsessionstouseraliasmaltego.splunk.AllSessions
endpointportstouseraliasmaltego.splunk.Ports
endpointprocessestouseraliasmaltego.splunk.Processes
endpointservicestouseraliasmaltego.splunk.Services
endpointfilesystemtouseraliasmaltego.splunk.Filesystem
endpointregistrytouseraliasmaltego.splunk.Registry
vulnerabilitiestouseraliasmaltego.splunk.Vulnerabilities
authenticationtouseraliasmaltego.splunk.Authentication
networktrafficalltraffictouseraliasmaltego.splunk.AllTraffic
malwaremalwareattackstouseraliasmaltego.splunk.MalwareAttacks

To Src (IPv4Address)

Description

Returns the value of the field ‘src’ as a IPv4Address Entity


Transform Meta Info

InformationValue
Display NameTo Src (IPv4Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘src’ as a IPv4Address Entity

Variants

Transform NameInput Entities
networkresolutiondnstosrcipv4addressmaltego.splunk.Dns
endpointportstosrcipv4addressmaltego.splunk.Ports
authenticationtosrcipv4addressmaltego.splunk.Authentication
networktrafficalltraffictosrcipv4addressmaltego.splunk.AllTraffic
malwaremalwareattackstosrcipv4addressmaltego.splunk.MalwareAttacks

To Src (IPv6Address)

Description

Returns the value of the field ‘src’ as a IPv6Address Entity


Transform Meta Info

InformationValue
Display NameTo Src (IPv6Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘src’ as a IPv6Address Entity

Variants

Transform NameInput Entities
networkresolutiondnstosrcipv6addressmaltego.splunk.Dns
endpointportstosrcipv6addressmaltego.splunk.Ports
authenticationtosrcipv6addressmaltego.splunk.Authentication
networktrafficalltraffictosrcipv6addressmaltego.splunk.AllTraffic
malwaremalwareattackstosrcipv6addressmaltego.splunk.MalwareAttacks

To Dest (IPv4Address)

Description

Returns the value of the field ‘dest’ as a IPv4Address Entity


Transform Meta Info

InformationValue
Display NameTo Dest (IPv4Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘dest’ as a IPv4Address Entity

Variants

Transform NameInput Entities
networkresolutiondnstodestipv4addressmaltego.splunk.Dns
endpointportstodestipv4addressmaltego.splunk.Ports
endpointprocessestodestipv4addressmaltego.splunk.Processes
endpointservicestodestipv4addressmaltego.splunk.Services
endpointfilesystemtodestipv4addressmaltego.splunk.Filesystem
endpointregistrytodestipv4addressmaltego.splunk.Registry
vulnerabilitiestodestipv4addressmaltego.splunk.Vulnerabilities
authenticationtodestipv4addressmaltego.splunk.Authentication
networktrafficalltraffictodestipv4addressmaltego.splunk.AllTraffic
malwaremalwareattackstodestipv4addressmaltego.splunk.MalwareAttacks
malwaremalwareoperationstodestipv4addressmaltego.splunk.MalwareOperations

To Dest (IPv6Address)

Description

Returns the value of the field ‘dest’ as a IPv6Address Entity


Transform Meta Info

InformationValue
Display NameTo Dest (IPv6Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘dest’ as a IPv6Address Entity

Variants

Transform NameInput Entities
networkresolutiondnstodestipv6addressmaltego.splunk.Dns
endpointportstodestipv6addressmaltego.splunk.Ports
endpointprocessestodestipv6addressmaltego.splunk.Processes
endpointservicestodestipv6addressmaltego.splunk.Services
endpointfilesystemtodestipv6addressmaltego.splunk.Filesystem
endpointregistrytodestipv6addressmaltego.splunk.Registry
vulnerabilitiestodestipv6addressmaltego.splunk.Vulnerabilities
authenticationtodestipv6addressmaltego.splunk.Authentication
networktrafficalltraffictodestipv6addressmaltego.splunk.AllTraffic
malwaremalwareattackstodestipv6addressmaltego.splunk.MalwareAttacks
malwaremalwareoperationstodestipv6addressmaltego.splunk.MalwareOperations

To ProcessHash (Hash)

Description

Returns the value of the field ‘process_hash’ as a Hash Entity


Transform Meta Info

InformationValue
Display NameTo ProcessHash (Hash)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Nameendpointprocessestoprocesshashhash
Input Entitiesmaltego.splunk.Processes
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘process_hash’ as a Hash Entity

To UserId (Alias)

Description

Returns the value of the field ‘user_id’ as a Alias Entity


Transform Meta Info

InformationValue
Display NameTo UserId (Alias)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘user_id’ as a Alias Entity

Variants

Transform NameInput Entities
endpointprocessestouseridaliasmaltego.splunk.Processes
authenticationtouseridaliasmaltego.splunk.Authentication

To Description (Phrase)

Description

Returns the value of the field ‘description’ as a Phrase Entity


Transform Meta Info

InformationValue
Display NameTo Description (Phrase)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Nameendpointservicestodescriptionphrase
Input Entitiesmaltego.splunk.Services
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘description’ as a Phrase Entity

To ServiceDllHash (Hash)

Description

Returns the value of the field ‘service_dll_hash’ as a Hash Entity


Transform Meta Info

InformationValue
Display NameTo ServiceDllHash (Hash)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Nameendpointservicestoservicedllhashhash
Input Entitiesmaltego.splunk.Services
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘service_dll_hash’ as a Hash Entity

To ServiceHash (Hash)

Description

Returns the value of the field ‘service_hash’ as a Hash Entity


Transform Meta Info

InformationValue
Display NameTo ServiceHash (Hash)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Nameendpointservicestoservicehashhash
Input Entitiesmaltego.splunk.Services
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘service_hash’ as a Hash Entity

To FileHash (Hash)

Description

Returns the value of the field ‘file_hash’ as a Hash Entity


Transform Meta Info

InformationValue
Display NameTo FileHash (Hash)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘file_hash’ as a Hash Entity

Variants

Transform NameInput Entities
endpointfilesystemtofilehashhashmaltego.splunk.Filesystem
malwaremalwareattackstofilehashhashmaltego.splunk.MalwareAttacks

To FileName (Phrase)

Description

Returns the value of the field ‘file_name’ as a Phrase Entity


Transform Meta Info

InformationValue
Display NameTo FileName (Phrase)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘file_name’ as a Phrase Entity

Variants

Transform NameInput Entities
endpointfilesystemtofilenamephrasemaltego.splunk.Filesystem
malwaremalwareattackstofilenamephrasemaltego.splunk.MalwareAttacks

To Url (URL)

Description

Returns the value of the field ‘url’ as a URL Entity


Transform Meta Info

InformationValue
Display NameTo Url (URL)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘url’ as a URL Entity

Variants

Transform NameInput Entities
vulnerabilitiestourlurlmaltego.splunk.Vulnerabilities
malwaremalwareattackstourlurlmaltego.splunk.MalwareAttacks

To Cve (CVE)

Description

Returns the value of the field ‘cve’ as a CVE Entity


Transform Meta Info

InformationValue
Display NameTo Cve (CVE)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namevulnerabilitiestocvecve
Input Entitiesmaltego.splunk.Vulnerabilities
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘cve’ as a CVE Entity

To Dvc (Alias)

Description

Returns the value of the field ‘dvc’ as a Alias Entity


Transform Meta Info

InformationValue
Display NameTo Dvc (Alias)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘dvc’ as a Alias Entity

Variants

Transform NameInput Entities
vulnerabilitiestodvcaliasmaltego.splunk.Vulnerabilities
networktrafficalltraffictodvcaliasmaltego.splunk.AllTraffic

To DestNtDomain (Domain)

Description

Returns the value of the field ‘dest_nt_domain’ as a Domain Entity


Transform Meta Info

InformationValue
Display NameTo DestNtDomain (Domain)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘dest_nt_domain’ as a Domain Entity

Variants

Transform NameInput Entities
authenticationtodestntdomaindomainmaltego.splunk.Authentication
malwaremalwareattackstodestntdomaindomainmaltego.splunk.MalwareAttacks
malwaremalwareoperationstodestntdomaindomainmaltego.splunk.MalwareOperations

To SrcNtDomain (Domain)

Description

Returns the value of the field ‘src_nt_domain’ as a Domain Entity


Transform Meta Info

InformationValue
Display NameTo SrcNtDomain (Domain)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Nameauthenticationtosrcntdomaindomain
Input Entitiesmaltego.splunk.Authentication
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘src_nt_domain’ as a Domain Entity

To SrcUserId (Alias)

Description

Returns the value of the field ‘src_user_id’ as a Alias Entity


Transform Meta Info

InformationValue
Display NameTo SrcUserId (Alias)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Nameauthenticationtosrcuseridalias
Input Entitiesmaltego.splunk.Authentication
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘src_user_id’ as a Alias Entity

To App (Phrase)

Description

Returns the value of the field ‘app’ as a Phrase Entity


Transform Meta Info

InformationValue
Display NameTo App (Phrase)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘app’ as a Phrase Entity

Variants

Transform NameInput Entities
authenticationtoappphrasemaltego.splunk.Authentication
networktrafficalltraffictoappphrasemaltego.splunk.AllTraffic

To SrcUser (Alias)

Description

Returns the value of the field ‘src_user’ as a Alias Entity


Transform Meta Info

InformationValue
Display NameTo SrcUser (Alias)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘src_user’ as a Alias Entity

Variants

Transform NameInput Entities
authenticationtosrcuseraliasmaltego.splunk.Authentication
malwaremalwareattackstosrcuseraliasmaltego.splunk.MalwareAttacks

To DestTranslatedIp (IPv4Address)

Description

Returns the value of the field ‘dest_translated_ip’ as a IPv4Address Entity


Transform Meta Info

InformationValue
Display NameTo DestTranslatedIp (IPv4Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namenetworktrafficalltraffictodesttranslatedipipv4address
Input Entitiesmaltego.splunk.AllTraffic
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘dest_translated_ip’ as a IPv4Address Entity

To DestTranslatedIp (IPv6Address)

Description

Returns the value of the field ‘dest_translated_ip’ as a IPv6Address Entity


Transform Meta Info

InformationValue
Display NameTo DestTranslatedIp (IPv6Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namenetworktrafficalltraffictodesttranslatedipipv6address
Input Entitiesmaltego.splunk.AllTraffic
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘dest_translated_ip’ as a IPv6Address Entity

To DvcIp (IPv4Address)

Description

Returns the value of the field ‘dvc_ip’ as a IPv4Address Entity


Transform Meta Info

InformationValue
Display NameTo DvcIp (IPv4Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namenetworktrafficalltraffictodvcipipv4address
Input Entitiesmaltego.splunk.AllTraffic
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘dvc_ip’ as a IPv4Address Entity

To DvcIp (IPv6Address)

Description

Returns the value of the field ‘dvc_ip’ as a IPv6Address Entity


Transform Meta Info

InformationValue
Display NameTo DvcIp (IPv6Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namenetworktrafficalltraffictodvcipipv6address
Input Entitiesmaltego.splunk.AllTraffic
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘dvc_ip’ as a IPv6Address Entity

To SrcTranslatedIp (IPv4Address)

Description

Returns the value of the field ‘src_translated_ip’ as a IPv4Address Entity


Transform Meta Info

InformationValue
Display NameTo SrcTranslatedIp (IPv4Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namenetworktrafficalltraffictosrctranslatedipipv4address
Input Entitiesmaltego.splunk.AllTraffic
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘src_translated_ip’ as a IPv4Address Entity

To SrcTranslatedIp (IPv6Address)

Description

Returns the value of the field ‘src_translated_ip’ as a IPv6Address Entity


Transform Meta Info

InformationValue
Display NameTo SrcTranslatedIp (IPv6Address)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namenetworktrafficalltraffictosrctranslatedipipv6address
Input Entitiesmaltego.splunk.AllTraffic
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘src_translated_ip’ as a IPv6Address Entity

To Ssid (Phrase)

Description

Returns the value of the field ‘ssid’ as a Phrase Entity


Transform Meta Info

InformationValue
Display NameTo Ssid (Phrase)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namenetworktrafficalltraffictossidphrase
Input Entitiesmaltego.splunk.AllTraffic
Output EntitiesPhrase
Short DescriptionReturns the value of the field ‘ssid’ as a Phrase Entity

To Time (DateTime)

Description

Returns the value of the field ’_time’ as a DateTime Entity


Transform Meta Info

InformationValue
Display NameTo Time (DateTime)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namemalwaremalwareoperationstotimedatetime
Input Entitiesmaltego.splunk.MalwareOperations
Output EntitiesPhrase
Short DescriptionReturns the value of the field ’_time’ as a DateTime Entity

To All Interesting Fields

Description

Extracts interesting fields from the incoming Entity properties


Transform Meta Info

InformationValue
Display NameTo All Interesting Fields
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namebaseeventtointerestingfield
Input Entitiesmaltego.splunk.BaseEvent
Output EntitiesPhrase
Short DescriptionExtracts interesting fields from the incoming Entity properties

Get All Sessions Events by src_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet All Sessions Events by src_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworksessionsallsessionsusingsrcipmaltego.IPv4AddressThis Transform returns AllSessions events where the field ‘SrcIp’ is equal to the value of the input IPv4Address.The CIM defines the field name SrcIp as ‘The IP address of the client initializing a network session. Not applicable for DHCP events.’
ipv6addresstonetworksessionsallsessionsusingsrcipmaltego.IPv6AddressThis Transform returns AllSessions events where the field ‘SrcIp’ is equal to the value of the input IPv6Address.The CIM defines the field name SrcIp as ‘The IP address of the client initializing a network session. Not applicable for DHCP events.’

Get All Sessions Events by dest_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet All Sessions Events by dest_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworksessionsallsessionsusingdestipmaltego.IPv4AddressThis Transform returns AllSessions events where the field ‘DestIp’ is equal to the value of the input IPv4Address.The CIM defines the field name DestIp as ‘The internal IP address allocated to the client initializing a network session. For DHCP and VPN events this is the IP address leased to the client.’
ipv6addresstonetworksessionsallsessionsusingdestipmaltego.IPv6AddressThis Transform returns AllSessions events where the field ‘DestIp’ is equal to the value of the input IPv6Address.The CIM defines the field name DestIp as ‘The internal IP address allocated to the client initializing a network session. For DHCP and VPN events this is the IP address leased to the client.’

Get All Sessions Events by user [Splunk]

Description

This Transform returns AllSessions events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user in a network session event where applicable. For example a VPN session or an authenticated DHCP event.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet All Sessions Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastonetworksessionsallsessionsusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns AllSessions events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user in a network session event where applicable. For example a VPN session or an authenticated DHCP event.’

Get Session Start Events by src_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Session Start Events by src_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworksessionssessionstartusingsrcipmaltego.IPv4AddressThis Transform returns SessionStart events where the field ‘SrcIp’ is equal to the value of the input IPv4Address.The CIM defines the field name SrcIp as ‘The IP address of the client initializing a network session. Not applicable for DHCP events.’
ipv6addresstonetworksessionssessionstartusingsrcipmaltego.IPv6AddressThis Transform returns SessionStart events where the field ‘SrcIp’ is equal to the value of the input IPv6Address.The CIM defines the field name SrcIp as ‘The IP address of the client initializing a network session. Not applicable for DHCP events.’

Get Session End Events by src_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Session End Events by src_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworksessionssessionendusingsrcipmaltego.IPv4AddressThis Transform returns SessionEnd events where the field ‘SrcIp’ is equal to the value of the input IPv4Address.The CIM defines the field name SrcIp as ‘The IP address of the client initializing a network session. Not applicable for DHCP events.’
ipv6addresstonetworksessionssessionendusingsrcipmaltego.IPv6AddressThis Transform returns SessionEnd events where the field ‘SrcIp’ is equal to the value of the input IPv6Address.The CIM defines the field name SrcIp as ‘The IP address of the client initializing a network session. Not applicable for DHCP events.’

Get Dhcp Events by src_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Dhcp Events by src_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworksessionsdhcpusingsrcipmaltego.IPv4AddressThis Transform returns DHCP events where the field ‘SrcIp’ is equal to the value of the input IPv4Address.The CIM defines the field name SrcIp as ‘The IP address of the client initializing a network session. Not applicable for DHCP events.’
ipv6addresstonetworksessionsdhcpusingsrcipmaltego.IPv6AddressThis Transform returns DHCP events where the field ‘SrcIp’ is equal to the value of the input IPv6Address.The CIM defines the field name SrcIp as ‘The IP address of the client initializing a network session. Not applicable for DHCP events.’

Get Vpn Events by src_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Vpn Events by src_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworksessionsvpnusingsrcipmaltego.IPv4AddressThis Transform returns VPN events where the field ‘SrcIp’ is equal to the value of the input IPv4Address.The CIM defines the field name SrcIp as ‘The IP address of the client initializing a network session. Not applicable for DHCP events.’
ipv6addresstonetworksessionsvpnusingsrcipmaltego.IPv6AddressThis Transform returns VPN events where the field ‘SrcIp’ is equal to the value of the input IPv6Address.The CIM defines the field name SrcIp as ‘The IP address of the client initializing a network session. Not applicable for DHCP events.’

Get Dns Events by src [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Dns Events by src [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworkresolutiondnsusingsrcmaltego.IPv4AddressThis Transform returns DNS events where the field ‘Src’ is equal to the value of the input IPv4Address.The CIM defines the field name Src as ‘The source of the network resolution event. You can alias this from more specific fields such as src_host src_ip or src_name.’
ipv6addresstonetworkresolutiondnsusingsrcmaltego.IPv6AddressThis Transform returns DNS events where the field ‘Src’ is equal to the value of the input IPv6Address.The CIM defines the field name Src as ‘The source of the network resolution event. You can alias this from more specific fields such as src_host src_ip or src_name.’

Get Ports Events by src [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Ports Events by src [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstoendpointportsusingsrcmaltego.IPv4AddressThis Transform returns Ports events where the field ‘Src’ is equal to the value of the input IPv4Address.The CIM defines the field name Src as ‘The remote system connected to the listening port (if applicable).’
ipv6addresstoendpointportsusingsrcmaltego.IPv6AddressThis Transform returns Ports events where the field ‘Src’ is equal to the value of the input IPv6Address.The CIM defines the field name Src as ‘The remote system connected to the listening port (if applicable).’

Get Ports Events by user [Splunk]

Description

This Transform returns Ports events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user account associated with the listening port.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Ports Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoendpointportsusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Ports events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user account associated with the listening port.’

Get Processes Events by user_id [Splunk]

Description

This Transform returns Processes events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique identifier of the user account which spawned the process.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Processes Events by user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoendpointprocessesusinguserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Processes events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique identifier of the user account which spawned the process.’

Get Processes Events by user [Splunk]

Description

This Transform returns Processes events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user account which spawned the process.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Processes Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoendpointprocessesusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Processes events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user account which spawned the process.’

Get Processes Events by process_hash [Splunk]

Description

This Transform returns Processes events where the field ‘ProcessHash’ is equal to the value of the input Hash.The CIM defines the field name ProcessHash as ‘The digest(s) of the parent process such as etc.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Processes Events by process_hash [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namehashtoendpointprocessesusingprocesshash
Input Entitiesmaltego.Hash
Output EntitiesPhrase
Short DescriptionThis Transform returns Processes events where the field ‘ProcessHash’ is equal to the value of the input Hash.The CIM defines the field name ProcessHash as ‘The digest(s) of the parent process such as etc.’

Get Services Events by user [Splunk]

Description

This Transform returns Services events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user account associated with the service.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Services Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoendpointservicesusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Services events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user account associated with the service.’

Get Services Events by service_dll_hash [Splunk]

Description

This Transform returns Services events where the field ‘ServiceDllHash’ is equal to the value of the input Hash.The CIM defines the field name ServiceDllHash as ‘The digest(s) of the dynamic link library associated with the service such as etc.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Services Events by service_dll_hash [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namehashtoendpointservicesusingservicedllhash
Input Entitiesmaltego.Hash
Output EntitiesPhrase
Short DescriptionThis Transform returns Services events where the field ‘ServiceDllHash’ is equal to the value of the input Hash.The CIM defines the field name ServiceDllHash as ‘The digest(s) of the dynamic link library associated with the service such as etc.’

Get Services Events by service_hash [Splunk]

Description

This Transform returns Services events where the field ‘ServiceHash’ is equal to the value of the input Hash.The CIM defines the field name ServiceHash as ‘The digest(s) of the service such as etc.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Services Events by service_hash [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namehashtoendpointservicesusingservicehash
Input Entitiesmaltego.Hash
Output EntitiesPhrase
Short DescriptionThis Transform returns Services events where the field ‘ServiceHash’ is equal to the value of the input Hash.The CIM defines the field name ServiceHash as ‘The digest(s) of the service such as etc.’

Get Filesystem Events by user [Splunk]

Description

This Transform returns Filesystem events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user account associated with the filesystem access.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Filesystem Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoendpointfilesystemusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Filesystem events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user account associated with the filesystem access.’

Get Filesystem Events by file_hash [Splunk]

Description

This Transform returns Filesystem events where the field ‘FileHash’ is equal to the value of the input Hash.The CIM defines the field name FileHash as ‘A cryptographic identifier assigned to the file object affected by the event.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Filesystem Events by file_hash [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namehashtoendpointfilesystemusingfilehash
Input Entitiesmaltego.Hash
Output EntitiesPhrase
Short DescriptionThis Transform returns Filesystem events where the field ‘FileHash’ is equal to the value of the input Hash.The CIM defines the field name FileHash as ‘A cryptographic identifier assigned to the file object affected by the event.’

Get Registry Events by user [Splunk]

Description

This Transform returns Registry events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user account associated with the registry access.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Registry Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoendpointregistryusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Registry events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user account associated with the registry access.’

Get Vulnerabilities Events by user [Splunk]

Description

This Transform returns Vulnerabilities events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user involved in the discovered vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Vulnerabilities Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastovulnerabilitiesusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Vulnerabilities events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user involved in the discovered vulnerability.’

Get Vulnerabilities Events by dvc [Splunk]

Description

This Transform returns Vulnerabilities events where the field ‘Dvc’ is equal to the value of the input Alias.The CIM defines the field name Dvc as ‘The system that discovered the vulnerability. You can alias this from more specific fields such as dvc_host dvc_ip or dvc_name.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Vulnerabilities Events by dvc [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastovulnerabilitiesusingdvc
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Vulnerabilities events where the field ‘Dvc’ is equal to the value of the input Alias.The CIM defines the field name Dvc as ‘The system that discovered the vulnerability. You can alias this from more specific fields such as dvc_host dvc_ip or dvc_name.’

Get Vulnerabilities Events by url [Splunk]

Description

This Transform returns Vulnerabilities events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘The URL involved in the discovered vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Vulnerabilities Events by url [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Nameurltovulnerabilitiesusingurl
Input Entitiesmaltego.URL
Output EntitiesPhrase
Short DescriptionThis Transform returns Vulnerabilities events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘The URL involved in the discovered vulnerability.’

Get High Critical Vulnerabilities Events by user [Splunk]

Description

This Transform returns HighCriticalVulnerabilities events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user involved in the discovered vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet High Critical Vulnerabilities Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastovulnerabilitieshighcriticalvulnerabilitiesusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns HighCriticalVulnerabilities events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user involved in the discovered vulnerability.’

Get High Critical Vulnerabilities Events by url [Splunk]

Description

This Transform returns HighCriticalVulnerabilities events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘The URL involved in the discovered vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet High Critical Vulnerabilities Events by url [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Nameurltovulnerabilitieshighcriticalvulnerabilitiesusingurl
Input Entitiesmaltego.URL
Output EntitiesPhrase
Short DescriptionThis Transform returns HighCriticalVulnerabilities events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘The URL involved in the discovered vulnerability.’

Get Medium Vulnerabilities Events by user [Splunk]

Description

This Transform returns MediumVulnerabilities events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user involved in the discovered vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Medium Vulnerabilities Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastovulnerabilitiesmediumvulnerabilitiesusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns MediumVulnerabilities events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user involved in the discovered vulnerability.’

Get Medium Vulnerabilities Events by url [Splunk]

Description

This Transform returns MediumVulnerabilities events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘The URL involved in the discovered vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Medium Vulnerabilities Events by url [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Nameurltovulnerabilitiesmediumvulnerabilitiesusingurl
Input Entitiesmaltego.URL
Output EntitiesPhrase
Short DescriptionThis Transform returns MediumVulnerabilities events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘The URL involved in the discovered vulnerability.’

Get Low Informational Vulnerabilities Events by user [Splunk]

Description

This Transform returns LowInformationalVulnerabilities events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user involved in the discovered vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Low Informational Vulnerabilities Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastovulnerabilitieslowinformationalvulnerabilitiesusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns LowInformationalVulnerabilities events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user involved in the discovered vulnerability.’

Get Low Informational Vulnerabilities Events by url [Splunk]

Description

This Transform returns LowInformationalVulnerabilities events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘The URL involved in the discovered vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Low Informational Vulnerabilities Events by url [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Nameurltovulnerabilitieslowinformationalvulnerabilitiesusingurl
Input Entitiesmaltego.URL
Output EntitiesPhrase
Short DescriptionThis Transform returns LowInformationalVulnerabilities events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘The URL involved in the discovered vulnerability.’

Get Authentication Events by src [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Authentication Events by src [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstoauthenticationusingsrcmaltego.IPv4AddressThis Transform returns Authentication events where the field ‘Src’ is equal to the value of the input IPv4Address.The CIM defines the field name Src as ‘The source involved in the authentication. In the case of endpoint protection authentication the src is the client. You can alias this from more specific fields such as src_host src_ip or src_nt_host.’
ipv6addresstoauthenticationusingsrcmaltego.IPv6AddressThis Transform returns Authentication events where the field ‘Src’ is equal to the value of the input IPv6Address.The CIM defines the field name Src as ‘The source involved in the authentication. In the case of endpoint protection authentication the src is the client. You can alias this from more specific fields such as src_host src_ip or src_nt_host.’

Get Authentication Events by src_user_id [Splunk]

Description

This Transform returns Authentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Authentication Events by src_user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationusingsrcuserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Authentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’

Get Authentication Events by src_user [Splunk]

Description

This Transform returns Authentication events where the field ‘SrcUser’ is equal to the value of the input Alias.The CIM defines the field name SrcUser as ‘In privilege escalation events src_user represents the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Authentication Events by src_user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationusingsrcuser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Authentication events where the field ‘SrcUser’ is equal to the value of the input Alias.The CIM defines the field name SrcUser as ‘In privilege escalation events src_user represents the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’

Get Authentication Events by user_id [Splunk]

Description

This Transform returns Authentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Authentication Events by user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationusinguserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Authentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’

Get Authentication Events by user [Splunk]

Description

This Transform returns Authentication events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The name of the user involved in the event or who initiated the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Authentication Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns Authentication events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The name of the user involved in the event or who initiated the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’

Get Failed Authentication Events by src_user_id [Splunk]

Description

This Transform returns FailedAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Failed Authentication Events by src_user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationfailedauthenticationusingsrcuserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns FailedAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’

Get Failed Authentication Events by user_id [Splunk]

Description

This Transform returns FailedAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Failed Authentication Events by user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationfailedauthenticationusinguserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns FailedAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’

Get Successful Authentication Events by src_user_id [Splunk]

Description

This Transform returns SuccessfulAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Successful Authentication Events by src_user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationsuccessfulauthenticationusingsrcuserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns SuccessfulAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’

Get Successful Authentication Events by user_id [Splunk]

Description

This Transform returns SuccessfulAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Successful Authentication Events by user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationsuccessfulauthenticationusinguserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns SuccessfulAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’

Get Default Authentication Events by src_user_id [Splunk]

Description

This Transform returns DefaultAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Default Authentication Events by src_user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationdefaultauthenticationusingsrcuserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns DefaultAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’

Get Default Authentication Events by user_id [Splunk]

Description

This Transform returns DefaultAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Default Authentication Events by user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationdefaultauthenticationusinguserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns DefaultAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’

Get Failed Default Authentication Events by src_user_id [Splunk]

Description

This Transform returns FailedDefaultAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Failed Default Authentication Events by src_user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationfaileddefaultauthenticationusingsrcuserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns FailedDefaultAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’

Get Failed Default Authentication Events by user_id [Splunk]

Description

This Transform returns FailedDefaultAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Failed Default Authentication Events by user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationfaileddefaultauthenticationusinguserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns FailedDefaultAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’

Get Successful Default Authentication Events by src_user_id [Splunk]

Description

This Transform returns SuccessfulDefaultAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Successful Default Authentication Events by src_user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationsuccessfuldefaultauthenticationusingsrcuserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns SuccessfulDefaultAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’

Get Successful Default Authentication Events by user_id [Splunk]

Description

This Transform returns SuccessfulDefaultAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Successful Default Authentication Events by user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationsuccessfuldefaultauthenticationusinguserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns SuccessfulDefaultAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’

Get Insecure Authentication Events by src_user_id [Splunk]

Description

This Transform returns InsecureAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Insecure Authentication Events by src_user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationinsecureauthenticationusingsrcuserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns InsecureAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’

Get Insecure Authentication Events by user_id [Splunk]

Description

This Transform returns InsecureAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Insecure Authentication Events by user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationinsecureauthenticationusinguserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns InsecureAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’

Get Privileged Authentication Events by src_user_id [Splunk]

Description

This Transform returns PrivilegedAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Privileged Authentication Events by src_user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationprivilegedauthenticationusingsrcuserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns PrivilegedAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’

Get Privileged Authentication Events by user_id [Splunk]

Description

This Transform returns PrivilegedAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Privileged Authentication Events by user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationprivilegedauthenticationusinguserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns PrivilegedAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’

Get Failed Privileged Authentication Events by src_user_id [Splunk]

Description

This Transform returns FailedPrivilegedAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Failed Privileged Authentication Events by src_user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationfailedprivilegedauthenticationusingsrcuserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns FailedPrivilegedAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’

Get Failed Privileged Authentication Events by user_id [Splunk]

Description

This Transform returns FailedPrivilegedAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Failed Privileged Authentication Events by user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationfailedprivilegedauthenticationusinguserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns FailedPrivilegedAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’

Get Successful Privileged Authentication Events by src_user_id [Splunk]

Description

This Transform returns SuccessfulPrivilegedAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Successful Privileged Authentication Events by src_user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationsuccessfulprivilegedauthenticationusingsrcuserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns SuccessfulPrivilegedAuthentication events where the field ‘SrcUserId’ is equal to the value of the input Alias.The CIM defines the field name SrcUserId as ‘The unique id of the user who initiated the privilege escalation. This field is unnecessary when an escalation has not been performed.’

Get Successful Privileged Authentication Events by user_id [Splunk]

Description

This Transform returns SuccessfulPrivilegedAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Successful Privileged Authentication Events by user_id [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastoauthenticationsuccessfulprivilegedauthenticationusinguserid
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns SuccessfulPrivilegedAuthentication events where the field ‘UserId’ is equal to the value of the input Alias.The CIM defines the field name UserId as ‘The unique id of the user involved in the event. For authentication privilege escalation events this should represent the user targeted by the escalation.’

Get All Traffic Events by src_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet All Traffic Events by src_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworktrafficalltrafficusingsrcipmaltego.IPv4AddressThis Transform returns AllTraffic events where the field ‘SrcIp’ is equal to the value of the input IPv4Address.The CIM defines the field name SrcIp as ‘The ip address of the source.’
ipv6addresstonetworktrafficalltrafficusingsrcipmaltego.IPv6AddressThis Transform returns AllTraffic events where the field ‘SrcIp’ is equal to the value of the input IPv6Address.The CIM defines the field name SrcIp as ‘The ip address of the source.’

Get All Traffic Events by src [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet All Traffic Events by src [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworktrafficalltrafficusingsrcmaltego.IPv4AddressThis Transform returns AllTraffic events where the field ‘Src’ is equal to the value of the input IPv4Address.The CIM defines the field name Src as ‘The source of the network traffic (the client requesting the connection). You can alias this from more specific fields such as src_host src_ip or src_name.’
ipv6addresstonetworktrafficalltrafficusingsrcmaltego.IPv6AddressThis Transform returns AllTraffic events where the field ‘Src’ is equal to the value of the input IPv6Address.The CIM defines the field name Src as ‘The source of the network traffic (the client requesting the connection). You can alias this from more specific fields such as src_host src_ip or src_name.’

Get All Traffic Events by dest_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet All Traffic Events by dest_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworktrafficalltrafficusingdestipmaltego.IPv4AddressThis Transform returns AllTraffic events where the field ‘DestIp’ is equal to the value of the input IPv4Address.The CIM defines the field name DestIp as ‘The IP address of the destination.’
ipv6addresstonetworktrafficalltrafficusingdestipmaltego.IPv6AddressThis Transform returns AllTraffic events where the field ‘DestIp’ is equal to the value of the input IPv6Address.The CIM defines the field name DestIp as ‘The IP address of the destination.’

Get All Traffic Events by dvc_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet All Traffic Events by dvc_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworktrafficalltrafficusingdvcipmaltego.IPv4AddressThis Transform returns AllTraffic events where the field ‘DvcIp’ is equal to the value of the input IPv4Address.The CIM defines the field name DvcIp as ‘The ip address of the device.’
ipv6addresstonetworktrafficalltrafficusingdvcipmaltego.IPv6AddressThis Transform returns AllTraffic events where the field ‘DvcIp’ is equal to the value of the input IPv6Address.The CIM defines the field name DvcIp as ‘The ip address of the device.’

Get All Traffic Events by dvc [Splunk]

Description

This Transform returns AllTraffic events where the field ‘Dvc’ is equal to the value of the input Alias.The CIM defines the field name Dvc as ‘The device that reported the traffic event. You can alias this from more specific fields such as dvc_host dvc_ip or dvc_name.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet All Traffic Events by dvc [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastonetworktrafficalltrafficusingdvc
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns AllTraffic events where the field ‘Dvc’ is equal to the value of the input Alias.The CIM defines the field name Dvc as ‘The device that reported the traffic event. You can alias this from more specific fields such as dvc_host dvc_ip or dvc_name.’

Get All Traffic Events by user [Splunk]

Description

This Transform returns AllTraffic events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user that requested the traffic flow.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet All Traffic Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastonetworktrafficalltrafficusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns AllTraffic events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user that requested the traffic flow.’

Get Allowed Traffic Events by src_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Allowed Traffic Events by src_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworktrafficallowedtrafficusingsrcipmaltego.IPv4AddressThis Transform returns AllowedTraffic events where the field ‘SrcIp’ is equal to the value of the input IPv4Address.The CIM defines the field name SrcIp as ‘The ip address of the source.’
ipv6addresstonetworktrafficallowedtrafficusingsrcipmaltego.IPv6AddressThis Transform returns AllowedTraffic events where the field ‘SrcIp’ is equal to the value of the input IPv6Address.The CIM defines the field name SrcIp as ‘The ip address of the source.’

Get Allowed Traffic Events by dest_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Allowed Traffic Events by dest_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworktrafficallowedtrafficusingdestipmaltego.IPv4AddressThis Transform returns AllowedTraffic events where the field ‘DestIp’ is equal to the value of the input IPv4Address.The CIM defines the field name DestIp as ‘The IP address of the destination.’
ipv6addresstonetworktrafficallowedtrafficusingdestipmaltego.IPv6AddressThis Transform returns AllowedTraffic events where the field ‘DestIp’ is equal to the value of the input IPv6Address.The CIM defines the field name DestIp as ‘The IP address of the destination.’

Get Allowed Traffic Events by dvc_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Allowed Traffic Events by dvc_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworktrafficallowedtrafficusingdvcipmaltego.IPv4AddressThis Transform returns AllowedTraffic events where the field ‘DvcIp’ is equal to the value of the input IPv4Address.The CIM defines the field name DvcIp as ‘The ip address of the device.’
ipv6addresstonetworktrafficallowedtrafficusingdvcipmaltego.IPv6AddressThis Transform returns AllowedTraffic events where the field ‘DvcIp’ is equal to the value of the input IPv6Address.The CIM defines the field name DvcIp as ‘The ip address of the device.’

Get Blocked Traffic Events by src_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Blocked Traffic Events by src_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworktrafficblockedtrafficusingsrcipmaltego.IPv4AddressThis Transform returns BlockedTraffic events where the field ‘SrcIp’ is equal to the value of the input IPv4Address.The CIM defines the field name SrcIp as ‘The ip address of the source.’
ipv6addresstonetworktrafficblockedtrafficusingsrcipmaltego.IPv6AddressThis Transform returns BlockedTraffic events where the field ‘SrcIp’ is equal to the value of the input IPv6Address.The CIM defines the field name SrcIp as ‘The ip address of the source.’

Get Blocked Traffic Events by dest_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Blocked Traffic Events by dest_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworktrafficblockedtrafficusingdestipmaltego.IPv4AddressThis Transform returns BlockedTraffic events where the field ‘DestIp’ is equal to the value of the input IPv4Address.The CIM defines the field name DestIp as ‘The IP address of the destination.’
ipv6addresstonetworktrafficblockedtrafficusingdestipmaltego.IPv6AddressThis Transform returns BlockedTraffic events where the field ‘DestIp’ is equal to the value of the input IPv6Address.The CIM defines the field name DestIp as ‘The IP address of the destination.’

Get Blocked Traffic Events by dvc_ip [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Blocked Traffic Events by dvc_ip [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstonetworktrafficblockedtrafficusingdvcipmaltego.IPv4AddressThis Transform returns BlockedTraffic events where the field ‘DvcIp’ is equal to the value of the input IPv4Address.The CIM defines the field name DvcIp as ‘The ip address of the device.’
ipv6addresstonetworktrafficblockedtrafficusingdvcipmaltego.IPv6AddressThis Transform returns BlockedTraffic events where the field ‘DvcIp’ is equal to the value of the input IPv6Address.The CIM defines the field name DvcIp as ‘The ip address of the device.’

Get Malware Attacks Events by src [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Malware Attacks Events by src [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstomalwaremalwareattacksusingsrcmaltego.IPv4AddressThis Transform returns MalwareAttacks events where the field ‘Src’ is equal to the value of the input IPv4Address.The CIM defines the field name Src as ‘The source of the endpoint event such as a DAT file relay server. You can alias this from more specific fields such as src_host src_ip or src_name.’
ipv6addresstomalwaremalwareattacksusingsrcmaltego.IPv6AddressThis Transform returns MalwareAttacks events where the field ‘Src’ is equal to the value of the input IPv6Address.The CIM defines the field name Src as ‘The source of the endpoint event such as a DAT file relay server. You can alias this from more specific fields such as src_host src_ip or src_name.’

Get Malware Attacks Events by src_user [Splunk]

Description

This Transform returns MalwareAttacks events where the field ‘SrcUser’ is equal to the value of the input Alias.The CIM defines the field name SrcUser as ‘The reported sender of an email-based attack.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Malware Attacks Events by src_user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastomalwaremalwareattacksusingsrcuser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns MalwareAttacks events where the field ‘SrcUser’ is equal to the value of the input Alias.The CIM defines the field name SrcUser as ‘The reported sender of an email-based attack.’

Get Malware Attacks Events by user [Splunk]

Description

This Transform returns MalwareAttacks events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user involved in the malware event.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Malware Attacks Events by user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastomalwaremalwareattacksusinguser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns MalwareAttacks events where the field ‘User’ is equal to the value of the input Alias.The CIM defines the field name User as ‘The user involved in the malware event.’

Get Malware Attacks Events by url [Splunk]

Description

This Transform returns MalwareAttacks events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘A URL containing more information about the vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Malware Attacks Events by url [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Nameurltomalwaremalwareattacksusingurl
Input Entitiesmaltego.URL
Output EntitiesPhrase
Short DescriptionThis Transform returns MalwareAttacks events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘A URL containing more information about the vulnerability.’

Get Malware Attacks Events by file_hash [Splunk]

Description

This Transform returns MalwareAttacks events where the field ‘FileHash’ is equal to the value of the input Hash.The CIM defines the field name FileHash as ‘The hash of the file with suspected malware.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Malware Attacks Events by file_hash [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namehashtomalwaremalwareattacksusingfilehash
Input Entitiesmaltego.Hash
Output EntitiesPhrase
Short DescriptionThis Transform returns MalwareAttacks events where the field ‘FileHash’ is equal to the value of the input Hash.The CIM defines the field name FileHash as ‘The hash of the file with suspected malware.’

Get Allowed Malware Events by src [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Allowed Malware Events by src [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstomalwareallowedmalwareusingsrcmaltego.IPv4AddressThis Transform returns AllowedMalware events where the field ‘Src’ is equal to the value of the input IPv4Address.The CIM defines the field name Src as ‘The source of the endpoint event such as a DAT file relay server. You can alias this from more specific fields such as src_host src_ip or src_name.’
ipv6addresstomalwareallowedmalwareusingsrcmaltego.IPv6AddressThis Transform returns AllowedMalware events where the field ‘Src’ is equal to the value of the input IPv6Address.The CIM defines the field name Src as ‘The source of the endpoint event such as a DAT file relay server. You can alias this from more specific fields such as src_host src_ip or src_name.’

Get Allowed Malware Events by src_user [Splunk]

Description

This Transform returns AllowedMalware events where the field ‘SrcUser’ is equal to the value of the input Alias.The CIM defines the field name SrcUser as ‘The reported sender of an email-based attack.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Allowed Malware Events by src_user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastomalwareallowedmalwareusingsrcuser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns AllowedMalware events where the field ‘SrcUser’ is equal to the value of the input Alias.The CIM defines the field name SrcUser as ‘The reported sender of an email-based attack.’

Get Allowed Malware Events by url [Splunk]

Description

This Transform returns AllowedMalware events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘A URL containing more information about the vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Allowed Malware Events by url [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Nameurltomalwareallowedmalwareusingurl
Input Entitiesmaltego.URL
Output EntitiesPhrase
Short DescriptionThis Transform returns AllowedMalware events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘A URL containing more information about the vulnerability.’

Get Allowed Malware Events by file_hash [Splunk]

Description

This Transform returns AllowedMalware events where the field ‘FileHash’ is equal to the value of the input Hash.The CIM defines the field name FileHash as ‘The hash of the file with suspected malware.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Allowed Malware Events by file_hash [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namehashtomalwareallowedmalwareusingfilehash
Input Entitiesmaltego.Hash
Output EntitiesPhrase
Short DescriptionThis Transform returns AllowedMalware events where the field ‘FileHash’ is equal to the value of the input Hash.The CIM defines the field name FileHash as ‘The hash of the file with suspected malware.’

Get Blocked Malware Events by src [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Blocked Malware Events by src [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstomalwareblockedmalwareusingsrcmaltego.IPv4AddressThis Transform returns BlockedMalware events where the field ‘Src’ is equal to the value of the input IPv4Address.The CIM defines the field name Src as ‘The source of the endpoint event such as a DAT file relay server. You can alias this from more specific fields such as src_host src_ip or src_name.’
ipv6addresstomalwareblockedmalwareusingsrcmaltego.IPv6AddressThis Transform returns BlockedMalware events where the field ‘Src’ is equal to the value of the input IPv6Address.The CIM defines the field name Src as ‘The source of the endpoint event such as a DAT file relay server. You can alias this from more specific fields such as src_host src_ip or src_name.’

Get Blocked Malware Events by src_user [Splunk]

Description

This Transform returns BlockedMalware events where the field ‘SrcUser’ is equal to the value of the input Alias.The CIM defines the field name SrcUser as ‘The reported sender of an email-based attack.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Blocked Malware Events by src_user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastomalwareblockedmalwareusingsrcuser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns BlockedMalware events where the field ‘SrcUser’ is equal to the value of the input Alias.The CIM defines the field name SrcUser as ‘The reported sender of an email-based attack.’

Get Blocked Malware Events by url [Splunk]

Description

This Transform returns BlockedMalware events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘A URL containing more information about the vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Blocked Malware Events by url [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Nameurltomalwareblockedmalwareusingurl
Input Entitiesmaltego.URL
Output EntitiesPhrase
Short DescriptionThis Transform returns BlockedMalware events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘A URL containing more information about the vulnerability.’

Get Blocked Malware Events by file_hash [Splunk]

Description

This Transform returns BlockedMalware events where the field ‘FileHash’ is equal to the value of the input Hash.The CIM defines the field name FileHash as ‘The hash of the file with suspected malware.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Blocked Malware Events by file_hash [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namehashtomalwareblockedmalwareusingfilehash
Input Entitiesmaltego.Hash
Output EntitiesPhrase
Short DescriptionThis Transform returns BlockedMalware events where the field ‘FileHash’ is equal to the value of the input Hash.The CIM defines the field name FileHash as ‘The hash of the file with suspected malware.’

Get Deferred Malware Events by src [Splunk]

Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Deferred Malware Events by src [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Output EntitiesPhrase

Variants

Transform NameInput EntitiesShort Description
ipv4addresstomalwaredeferredmalwareusingsrcmaltego.IPv4AddressThis Transform returns DeferredMalware events where the field ‘Src’ is equal to the value of the input IPv4Address.The CIM defines the field name Src as ‘The source of the endpoint event such as a DAT file relay server. You can alias this from more specific fields such as src_host src_ip or src_name.’
ipv6addresstomalwaredeferredmalwareusingsrcmaltego.IPv6AddressThis Transform returns DeferredMalware events where the field ‘Src’ is equal to the value of the input IPv6Address.The CIM defines the field name Src as ‘The source of the endpoint event such as a DAT file relay server. You can alias this from more specific fields such as src_host src_ip or src_name.’

Get Deferred Malware Events by src_user [Splunk]

Description

This Transform returns DeferredMalware events where the field ‘SrcUser’ is equal to the value of the input Alias.The CIM defines the field name SrcUser as ‘The reported sender of an email-based attack.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Deferred Malware Events by src_user [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namealiastomalwaredeferredmalwareusingsrcuser
Input Entitiesmaltego.Alias
Output EntitiesPhrase
Short DescriptionThis Transform returns DeferredMalware events where the field ‘SrcUser’ is equal to the value of the input Alias.The CIM defines the field name SrcUser as ‘The reported sender of an email-based attack.’

Get Deferred Malware Events by url [Splunk]

Description

This Transform returns DeferredMalware events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘A URL containing more information about the vulnerability.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Deferred Malware Events by url [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Nameurltomalwaredeferredmalwareusingurl
Input Entitiesmaltego.URL
Output EntitiesPhrase
Short DescriptionThis Transform returns DeferredMalware events where the field ‘Url’ is equal to the value of the input URL.The CIM defines the field name Url as ‘A URL containing more information about the vulnerability.’

Get Deferred Malware Events by file_hash [Splunk]

Description

This Transform returns DeferredMalware events where the field ‘FileHash’ is equal to the value of the input Hash.The CIM defines the field name FileHash as ‘The hash of the file with suspected malware.’


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Deferred Malware Events by file_hash [Splunk]
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data SourceSplunk
Transform Namehashtomalwaredeferredmalwareusingfilehash
Input Entitiesmaltego.Hash
Output EntitiesPhrase
Short DescriptionThis Transform returns DeferredMalware events where the field ‘FileHash’ is equal to the value of the input Hash.The CIM defines the field name FileHash as ‘The hash of the file with suspected malware.’

Get All Sessions Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet All Sessions Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchallsessionsusingipv4addressmaltego.IPv4Address
rawsearchallsessionsusingipv6addressmaltego.IPv6Address
rawsearchallsessionsusinghashmaltego.Hash
rawsearchallsessionsusingaliasmaltego.Alias
rawsearchallsessionsusingemailaddressmaltego.EmailAddress
rawsearchallsessionsusingphrasemaltego.Phrase
rawsearchallsessionsusingdomainmaltego.Domain
rawsearchallsessionsusingcvemaltego.CVE

Get DHCP Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet DHCP Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchdhcpusingipv4addressmaltego.IPv4Address
rawsearchdhcpusingipv6addressmaltego.IPv6Address
rawsearchdhcpusinghashmaltego.Hash
rawsearchdhcpusingaliasmaltego.Alias
rawsearchdhcpusingemailaddressmaltego.EmailAddress
rawsearchdhcpusingphrasemaltego.Phrase
rawsearchdhcpusingdomainmaltego.Domain
rawsearchdhcpusingcvemaltego.CVE

Get DNS Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet DNS Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchdnsusingipv4addressmaltego.IPv4Address
rawsearchdnsusingipv6addressmaltego.IPv6Address
rawsearchdnsusinghashmaltego.Hash
rawsearchdnsusingaliasmaltego.Alias
rawsearchdnsusingemailaddressmaltego.EmailAddress
rawsearchdnsusingphrasemaltego.Phrase
rawsearchdnsusingdomainmaltego.Domain
rawsearchdnsusingcvemaltego.CVE

Get Ports Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Ports Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchportsusingipv4addressmaltego.IPv4Address
rawsearchportsusingipv6addressmaltego.IPv6Address
rawsearchportsusinghashmaltego.Hash
rawsearchportsusingaliasmaltego.Alias
rawsearchportsusingemailaddressmaltego.EmailAddress
rawsearchportsusingphrasemaltego.Phrase
rawsearchportsusingdomainmaltego.Domain
rawsearchportsusingcvemaltego.CVE

Get Processes Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Processes Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchprocessesusingipv4addressmaltego.IPv4Address
rawsearchprocessesusingipv6addressmaltego.IPv6Address
rawsearchprocessesusinghashmaltego.Hash
rawsearchprocessesusingaliasmaltego.Alias
rawsearchprocessesusingemailaddressmaltego.EmailAddress
rawsearchprocessesusingphrasemaltego.Phrase
rawsearchprocessesusingdomainmaltego.Domain
rawsearchprocessesusingcvemaltego.CVE

Get Services Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Services Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchservicesusingipv4addressmaltego.IPv4Address
rawsearchservicesusingipv6addressmaltego.IPv6Address
rawsearchservicesusinghashmaltego.Hash
rawsearchservicesusingaliasmaltego.Alias
rawsearchservicesusingemailaddressmaltego.EmailAddress
rawsearchservicesusingphrasemaltego.Phrase
rawsearchservicesusingdomainmaltego.Domain
rawsearchservicesusingcvemaltego.CVE

Get Filesystem Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Filesystem Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchfilesystemusingipv4addressmaltego.IPv4Address
rawsearchfilesystemusingipv6addressmaltego.IPv6Address
rawsearchfilesystemusinghashmaltego.Hash
rawsearchfilesystemusingaliasmaltego.Alias
rawsearchfilesystemusingemailaddressmaltego.EmailAddress
rawsearchfilesystemusingphrasemaltego.Phrase
rawsearchfilesystemusingdomainmaltego.Domain
rawsearchfilesystemusingcvemaltego.CVE

Get Registry Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Registry Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchregistryusingipv4addressmaltego.IPv4Address
rawsearchregistryusingipv6addressmaltego.IPv6Address
rawsearchregistryusinghashmaltego.Hash
rawsearchregistryusingaliasmaltego.Alias
rawsearchregistryusingemailaddressmaltego.EmailAddress
rawsearchregistryusingphrasemaltego.Phrase
rawsearchregistryusingdomainmaltego.Domain
rawsearchregistryusingcvemaltego.CVE

Get Vulnerabilities Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Vulnerabilities Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchvulnerabilitiesusingipv4addressmaltego.IPv4Address
rawsearchvulnerabilitiesusingipv6addressmaltego.IPv6Address
rawsearchvulnerabilitiesusinghashmaltego.Hash
rawsearchvulnerabilitiesusingaliasmaltego.Alias
rawsearchvulnerabilitiesusingemailaddressmaltego.EmailAddress
rawsearchvulnerabilitiesusingphrasemaltego.Phrase
rawsearchvulnerabilitiesusingdomainmaltego.Domain
rawsearchvulnerabilitiesusingcvemaltego.CVE

Get Authentication Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Authentication Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchauthenticationusingipv4addressmaltego.IPv4Address
rawsearchauthenticationusingipv6addressmaltego.IPv6Address
rawsearchauthenticationusinghashmaltego.Hash
rawsearchauthenticationusingaliasmaltego.Alias
rawsearchauthenticationusingemailaddressmaltego.EmailAddress
rawsearchauthenticationusingphrasemaltego.Phrase
rawsearchauthenticationusingdomainmaltego.Domain
rawsearchauthenticationusingcvemaltego.CVE

Get All Traffic Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet All Traffic Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchalltrafficusingipv4addressmaltego.IPv4Address
rawsearchalltrafficusingipv6addressmaltego.IPv6Address
rawsearchalltrafficusinghashmaltego.Hash
rawsearchalltrafficusingaliasmaltego.Alias
rawsearchalltrafficusingemailaddressmaltego.EmailAddress
rawsearchalltrafficusingphrasemaltego.Phrase
rawsearchalltrafficusingdomainmaltego.Domain
rawsearchalltrafficusingcvemaltego.CVE

Get Malware Attacks Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Malware Attacks Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchmalwareattacksusingipv4addressmaltego.IPv4Address
rawsearchmalwareattacksusingipv6addressmaltego.IPv6Address
rawsearchmalwareattacksusinghashmaltego.Hash
rawsearchmalwareattacksusingaliasmaltego.Alias
rawsearchmalwareattacksusingemailaddressmaltego.EmailAddress
rawsearchmalwareattacksusingphrasemaltego.Phrase
rawsearchmalwareattacksusingdomainmaltego.Domain
rawsearchmalwareattacksusingcvemaltego.CVE

Get Malware Operations Events (any field)

Description

Returns events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameGet Malware Operations Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns events where the input Entity value was observed

Variants

Transform NameInput Entities
rawsearchmalwareoperationsusingipv4addressmaltego.IPv4Address
rawsearchmalwareoperationsusingipv6addressmaltego.IPv6Address
rawsearchmalwareoperationsusinghashmaltego.Hash
rawsearchmalwareoperationsusingaliasmaltego.Alias
rawsearchmalwareoperationsusingemailaddressmaltego.EmailAddress
rawsearchmalwareoperationsusingphrasemaltego.Phrase
rawsearchmalwareoperationsusingdomainmaltego.Domain
rawsearchmalwareoperationsusingcvemaltego.CVE

Search All Events (any field)

Description

Returns Splunk events where the input Entity value was observed


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameSearch All Events (any field)
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Output EntitiesPhrase
Short DescriptionReturns Splunk events where the input Entity value was observed

Variants

Transform NameInput Entities
rawmultisearchallmodelsusingipv4addressmaltego.IPv4Address
rawmultisearchallmodelsusingipv6addressmaltego.IPv6Address
rawmultisearchallmodelsusinghashmaltego.Hash
rawmultisearchallmodelsusingaliasmaltego.Alias
rawmultisearchallmodelsusingemailaddressmaltego.EmailAddress
rawmultisearchallmodelsusingphrasemaltego.Phrase
rawmultisearchallmodelsusingdomainmaltego.Domain
rawmultisearchallmodelsusingcvemaltego.CVE

Run Raw Splunk Query

Description

Transform executes the given Splunk query


Transform Settings

Display NameSetting TypeDefault ValueOptionalPopupAuthentication
Date Rangedaterange Falsefalsefalse
Hoststring Falsefalsefalse
Passwordstring Falsefalsefalse
Portint Falsefalsefalse
Tokenstring Falsefalsefalse
Usernamestring Falsefalsefalse

Transform Meta Info

InformationValue
Display NameRun Raw Splunk Query
OwnerMaltego Technologies GmbH
Authordev@maltego.com
Data Source 
Transform Namephrasetorawquery
Input Entitiesmaltego.Phrase
Output EntitiesPhrase
Short DescriptionTransform executes the given Splunk query

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.