Supporting Add On for MITRE – SA-mitre
This app provides a method to ingest MITRE ATT&CK tactics, techniques, and subtechniques into Splunk events. The app contains a mitre_techniques KVStore with the metadata provided from MITRE to help enrich alerts and ES Correlations without needing to navigate back to MITRE.
Supporting documentaiton on how to implement and configure can be found here:
Fixed time stamping issue with techniques
Added URL as parameter to collections in case it changes in the future
Removed index=main from macro (If the index is not searched by default you may need to adjust the macro still)
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.