This is a Splunk application containing several dashboards and over 120 reports that will facilitate initial hunting indicators to investigate.
You obviously need to be ingesting Sysmon data into Splunk, a good configuration can be found here
Note:
This application is not a magic bullet, it will require tuning and real investigative work to be truly effective in your environment.
Try to become best friends with your system administrators. They will be able to explain a lot of the initially discovered indicators.
Big credit goes out to MITRE for creating the ATT&CK framework!
Pull requests / issue tickets and new additions will be greatly appreciated!
I strive to map all searches to the ATT&CK framework.
A current ATT&CK navigator export of all linked configurations is found here and can be viewed here
Install the following apps to your SearchHead:
A more detailed explanation of all functions can be found here
New Features
- NEW REQUIREMENT : Event Timeline app
- GrantedAccess descriptions for the most common occurences
- Rare process chains dashboard finished
- Search based drilldown dashboard Added
- The threathunting index is now customizable in a macro
- lateral movement indicator dashboard overhaul, plus new panels
- user drilldown dashboard improved
- Network connection drilldown has clearer visualization for beaconing behavior, replaced punchcard by timeline visualization
- Updated the following changes to the whitelist dashboards:
- added OriginalFileName mapping to file_name
- working new searches
Compatible with Sysmon 13.30
Added user fields to all panels
Added a File Prevalence dashboard (requires additional index to be created)
Added a Newly observed hashes dashboard
Added a Sysmon tuning dashboard
Several bug fixes
Updated the downloadable lookup files
Maintenance release
New Features
- Splunk cloud compatible
Changes
- Rebuilt some dashboards to have a significant speed increase and more efficient searches
- Whitelisting has been improved
Tons of Bugfixes and code improvements
Special thanks to @contrablueteam / Outpost Security for addressing a lot of the issues
New Features
- Rare process chains dashboard (still wip)
- Colors sprinkled though-out the app according to the ATT&CK Rainbow of Tactics
Changes
- Rebuilt some dashboards to have a significant speed increase and more efficient searches
- Changed the searches on the (Parent)ProcessGuid dashboards to have slightly less detail but a huge speed improvement
Bugfixes
- fixed a typo in the lookups
- Some time pickers didn't properly translate to drilldowns
- Overlap with windows TA field mappings removed
- Fixed a faulty field name in one of the lookups
- Added the missing the blank lookup files
New Features
- NEW REQUIREMENT : Link Analysis app >> LINK
- Initial mapping of Windows 4768/9 events in props.conf
- Pipe Drilldown dashboard
- File create whitelist macro
- File create Drilldown dashboard
- Added Stacking tools section
- Added Mitre ATT&CK stacking page
- Added DNS stacking page with beaconing detection
- Added DNS whitelist
- Added User drilldown page
- Added Macro drilldown dashboard
- Added 24 new searches
- Added Credits pane
Changes
- Renamed pipe_created_whitelist macro to pipe_whitelist
- Renamed pipe_created_whitelist csv to pipe_whitelist throughout the app
- Replaced the force directed visual by link analysis for network connection drilldown
- Added a few fields to props.conf, including Sysmon DNS events
- Extended T1218,T1216,T1081,T1075 searches
- Rebuilt the whitelisting, searches are a LOT quicker now and take less resources
- Added original_file_name to event_id 1 and 7
- Top triggered techniques drilldown changed to technique_id
- more details on GitHub
New Features
- Added Technique and Host filtering options to the threat hunting overview page
- Added Timeline graph to the overview page
- Added Technique and Host filtering options to the mitre att&ck overview page
- Added New Files created page, based on Sysmon event_id 11
- Added File Create whitelist editor page
- Initial mapping of Windows 4688 events in props.conf
- Added 4688 events to 70 reports
- Added indextime macro
Changes
- Automated search distribution
- Index time searches instead of _time
- Cleaned up the code a bit
Bugfixes
- Fixed the Tactics and Technique(ID) filters on the mitre att&ck overview page
- Added the Initial Access tactic and properly sorted them on all pages
- Re-added the computer investigator page
- Changed sourcetype to source in macros
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.