icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading MITRE ATTACK App for Splunk
SHA256 checksum (mitre-attack-app-for-splunk_210.tgz) c923df64f6bd5ee2a522a60b954715dd352b1e7e50feca0cb9235f56973a1bc5 SHA256 checksum (mitre-attack-app-for-splunk_201.tgz) 2218b22d6c087f0ef9883f402c8b913f850ae83e81b564531c8e9a05ccfdfad8 SHA256 checksum (mitre-attack-app-for-splunk_200.tgz) 5c686d23ba012a3541361f127070e74730e7a307ad32308cd8218c65581f78d5 SHA256 checksum (mitre-attack-app-for-splunk_130.tgz) b6acad721ffadbe47291491eb17fab2ae0a7cce5fdce68c240d26e34c44dfd89 SHA256 checksum (mitre-attack-app-for-splunk_121.tgz) 468259b9128cbe06cca5603c5f9d2d3cb45f5c6927abab1ac0eb3da87d7967d1 SHA256 checksum (mitre-attack-app-for-splunk_120.tgz) bfe607d9e39ba671bf2625fbcbf1d48cd081395957667c6a4b32225cce9400c7 SHA256 checksum (mitre-attack-app-for-splunk_110.tgz) f232278bc5c87b3b025357d0fa693f9aafbdb8437ce8a7a950e7199dbd303d00 SHA256 checksum (mitre-attack-app-for-splunk_100.tgz) 2c934d0ff001ffeb9f591c27fb4da196cf823ed752f50ca9be98d2f3a5ac1f95
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

MITRE ATTACK App for Splunk

Splunk AppInspect Passed
Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
Overview
Details
This application provides compliance and triage dashboards for MITRE ATT&CK Framework that are fully integrated with Splunk Enterprise Security (https://splunkbase.splunk.com/app/263/) and Splunk ES Content Update (https://splunkbase.splunk.com/app/3449/) with drill-down capabilities.

MITRE ATT&CK App for Splunk®

Documentation

Detailed documentation can be found at: https://seynur.github.io/DA-ESS-MitreContent/

Overview

This application provides compliance and triage dashboards for MITRE ATT&CK Framework that are fully integrated with Splunk Enterprise Security(https://splunkbase.splunk.com/app/263/) and Splunk ES Content Update (https://splunkbase.splunk.com/app/3449/) with drill-down capabilities.

Required Splunk Apps:

Splunk Enterprise Security 5.2 or above (https://splunkbase.splunk.com/app/263/)
Sankey Diagram - Custom Visualization (https://splunkbase.splunk.com/app/3112/)

Recommended Splunk Apps:

Splunk ES Content Update 1.0.40 or above (https://splunkbase.splunk.com/app/3449/)
Lookup File Editor (https://splunkbase.splunk.com/app/1724/)

Note: Although the app will work without ES Content Update, it is highly recommended since it comes with many correlation rules that have mitre_attack annotations already.

Setup Instructions

Upon initial installation you will be on Compliance Dashboard. If the matrix is not populated, click on the table to run manually, which will direct you to the Setup dashboard (searches run automatically on that dashboard).

Saved Searches

This application comes with predefined saved searches. Lookup Gen searches are scheduled to run daily after midnight.
MITRE ATT&CK All Rules and Techniques Lookup Gen: This lookup generator checks currently enabled correlation rules via analytic stories and combines the searches with user-defined mitre_user_rule_technique_lookup.csv file that matches MITRE ATT&CK technique IDs with rules.
MITRE ATT&CK Compliance Lookup Gen: This lookup generator relies on mitre_all_rule_technique_lookup.csv in order to generate a new lookup to properly display MITRE ATT&CK Compliance martix.

Release Notes:

Version 2.1.0
- Date: 25 Feb 2020
- Added a new view for mapping rules to Techniques
- Updated lookup tables and some searches accordingly

Version 2.0.1
- Date: 12 Feb 2020
- Bug fix for appinspect validation
- Tactics overview displayed as table with updated js and css

Version 2.0.0
- Date: 08 Feb 2020
- Updated lookup tables to correctly define MITRE ATT&CK tactics and techniques
- Introduced a new macro to utilize technique and tactic IDs/names
- Updated dashboards to utilize new lookup table and macro
- Performance improvements
- Updated CSS and JS files
- Introduced a setup view for ease of initial lookup generation

Version 1.3.0
- Date: 09 Jan 2020
- Updated ATT&CK Matrix dashboard
- Added new dashboard for detailed view of triggered rules by notable assets and tactics/techniques
- Improved search performance and dependency on lookups
- Added a new lookup to match correlation rules to MITRE ATT&CK tactics/techniques

Version 1.2.1
- Date: 24 Oct 2019
- Bug fixes with javascript table population
- Ordering of table fields to align with MITRE ATT&CK content

Version 1.2.0
- Date: 24 Aug 2019
- Bug fixes & typos
- Sphinx documentation is added

Version 1.1.0
- Date: 06 Aug 2019
- Bug fixes & typos
- Added descriptions to dashboards
- Added improvements for initial lookup generator

Version 1.0.0
- Date: 25 Jul 2019
- Initial version for Splunkbase
- Test to run on 7.3.0 and ES App 5.3

Support

Contact information for reporting an issue: development@seynur.com

For latest fixes/changes: https://github.com/seynur/DA-ESS-MitreContent

Release Notes

Version 2.1.0
Feb. 25, 2020

Version 2.1.0
- Date: 25 Feb 2020
- Added a new view for mapping rules to Techniques
- Updated lookup tables and some searches accordingly

Version 2.0.1
Feb. 12, 2020

Version 2.0.1
- Date: 12 Feb 2020
- Bug fix for appinspect validation
- Tactics overview displayed as table with updated js and css

Version 2.0.0
Feb. 8, 2020

Version 2.0.0
- Updated lookup tables to correctly define MITRE ATT&CK tactics and techniques
- Introduced a new macro to utilize technique and tactic IDs/names
- Updated dashboards to utilize new lookup table and macro
- Performance improvements
- Updated CSS and JS files
- Introduced a setup view for ease of initial lookup generation

Version 1.3.0
Jan. 9, 2020

Version 1.3.0
- Updated ATT&CK Matrix dashboard
- Added new dashboard for detailed view of triggered rules by notable assets and tactics/techniques
- Improved search performance and dependency on lookups
- Added a new lookup file to match correlation rules to MITRE ATT&CK tactics/techniques

Version 1.2.1
Oct. 24, 2019

- Bug fixes with javascript table population
- Ordering of table fields to align with MITRE ATT&CK content

Version 1.2.0
Aug. 24, 2019

Version 1.2.0
- Date: 24 Aug 2019
- Bug fixes & typos
- Sphinx documentation is added

Version 1.1.0
Aug. 6, 2019

Bug fixes & typos
Added descriptions to dashboards
Added improvements for initial lookup generator

Version 1.0.0
July 25, 2019

Initial release

613
Installs
2,355
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2020 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.