icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading APT Falconer
SHA256 checksum (apt-falconer_203.tgz) 60c9347ac5d0d1496d320df8ee675fb7df02dbb934733c0f69bb11a78693b4b5 SHA256 checksum (apt-falconer_202.tgz) b4ae5f2c69d9eb4b4d20c17ecbc08195c175e76cb188f56295413e3ff5af7a23 SHA256 checksum (apt-falconer_201.tgz) b0cbe9e448e7179c6cecca9c8bcd5ea7e8379d9edb56ef3a96ef8712a1a9adde SHA256 checksum (apt-falconer_200.tgz) 0d090b381a2574030b331db6b53ce2354b12001df269b78dd00c335eee043a29
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

APT Falconer

Splunk Cloud
Splunk Labs
Overview
Details
APT Falconer is a threat hunting app built for Splunk, with over 500 pre-built analytics.
Created with Incident Response Teams (IRT) in mind, data feeds are mapped to individual roles.

APT Falconer

Current Version: 2.0.1

Description:

APT Falconer is a threat hunting app built for Splunk, with over 500 pre-built analytics.
Created with Incident Response Teams (IRT) in mind, data feeds are mapped to individual roles.

  • Network Analyst workspace provides dashboards from data ingested by Bro/Zeek, Splunk Stream and Cisco Devices.
  • Host Analyst workspace provides dashboards from data ingested by Windows Event logs (EVTX), Sysmon and are mapped to MITRE ATT&CK Matrix.
  • Intel Analyst allows for querying data at rest for indicators of compromise(IOC) as well as set up alerts for future data.

Required Splunk Apps:

Setup:

APT Falconer is easy to configure to work with your current environment. Utilizing the including Splunk Search Macros you simple navigate to Settings > Advanced Search > Search Macros and change the proper macro to mimic your environment.
EX: If your Sysmon index is named my_sysmon_data change the sysmon_index macro to read index=my_sysmon_data

Contribution:

If you would like to contribute to this project please feel free.

Release Notes

Version 2.0.3
Jan. 14, 2025
Version 2.0.2
Jan. 13, 2025

Updated for MITRE ATT&CK v15
Improved macro clutter
Simplified view of most dashboards using stats instead of table.

Version 2.0.1
July 15, 2024
Version 2.0.0
July 15, 2024
Current Version: 2.0.0

Description:

APT Falconer is a threat hunting app built for Splunk, with over 500 pre-built analytics.
Created with Cyber Protection Teams(CPT) in mind, data feeds are mapped to individual roles.

  • Network Analyst workspace provides dashboards from data ingested by Bro/Zeek, Splunk Stream and Cisco Devices.
  • Host Analyst workspace provides dashboards from data ingested by Windows Event logs (EVTX), Sysmon and are mapped to MITRE ATT&CK Matrix.
  • Intel Analyst allows for querying data at rest for indicators of compromise(IOC) as well as set up alerts for future data.

Required Splunk Apps:

Setup:

APT Falconer is easy to configure to work with your current environment. Utilizing the including Splunk Search Macros you simple navigate to Settings > Advanced Search > Search Macros and change the proper macro to mimic your environment.
EX: If your Sysmon index is named my_sysmon_data change the sysmon_index macro to read index=my_sysmon_data

Contribution:

If you would like to contribute to this project please feel free.

Notice:

This app is still in beta, you will find bugs please email bmatlock@splunk.com


Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.