icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Stamus Networks App for Splunk
SHA256 checksum (stamus-networks-app-for-splunk_097.tgz) bb6460248fa323d6ca21e5e28bb6370413a9a54e35b81dbb2492ebe0225f93ab SHA256 checksum (stamus-networks-app-for-splunk_096.tgz) 34a40461826b704f5343cced443b0ea4e6bd79304cd574729d5d6d39fdfdd503 SHA256 checksum (stamus-networks-app-for-splunk_095.tgz) 3a5c60855be7697ae0a89843dfbf43dd9588d07a8a6fbb677801aa2faabd7647 SHA256 checksum (stamus-networks-app-for-splunk_094.tgz) 558af07c353bb96d537f1a6a63004a4e5ef465adc7ba3db606f9359cc97e243c SHA256 checksum (stamus-networks-app-for-splunk_092.tgz) 858609551bad7e29825604e3d6eb06f8091032db3839387355c332a469a8e9d5 SHA256 checksum (stamus-networks-app-for-splunk_091.tgz) 3428dd828256eff655ddceaa6aa997f6e9d7df26560929756c5247f3e5b202e7 SHA256 checksum (stamus-networks-app-for-splunk_090.tgz) 62b5b807b0bafecd7397568136474716a33e23481d6018807102bbaa7defd46a
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

Stamus Networks App for Splunk

Splunk AppInspect Passed
Admins: Please read about Splunk Enterprise 8.0 and the Python 2.7 end-of-life changes and impact on apps and upgradeshere.
Overview
Details
The Stamus Networks App for Splunk enables threat hunters, incident responders and other security practitioners who use Splunk to tap into the power of Scirius Security Platform (SSP) or Suricata to more effectively do their job.

Stamus Networks develops advanced network threat detection and response solutions, including the Scirius Security Platform and the open source SELKS.

Scirius Security Platform is used by security practitioners worldwide to expose real threats to their critical assets, empower their team’s rapid response, and mitigate their organization's risk. Its analytics engine that sits atop a unique combination of network traffic analysis (NTA), network intrusion detection (IDS) and organizational context allows users to quickly detect, investigate, and respond to threats and security policy violations.

The Stamus Networks App for Splunk allows Splunk Enterprise users to extract information and insights from both the Scirius Security Platform and open source Suricata sensors. It provides dashboards and reports but also a set of commands to interact with Scirius Security Platform via its REST API.

To learn more about Scirius Security Platform visit this page: https://www.stamus-networks.com/scirius-platform

The Stamus Networks App for Splunk enables threat hunters, incident responders and other security practitioners who use Splunk to tap into the power of Scirius Security Platform (SSP) or Suricata to more effectively do their job.

The Stamus Networks App for Splunk allows Splunk Enterprise users to extract information and insights from both the Scirius Security Platform and open source Suricata sensors. It provides dashboards and reports but also a set of commands to interact with Scirius Security Platform via its REST API.

Sources of the App are available on Github.

Initial Setup

Some visualizations depend on Timeline App that will have to be installed if not present on your Splunk® instance.

Scirius Security Platform users need to setup the connectivity with their SSP. To do so, you need to create a file local/ssp.conf under the application directory (/opt/splunk/etc/apps/stamus_for_splunk usually) and setup the following:

[config]
api_key = SSP_TOKEN
base_url = https://SSP_ADDRESS
check_tls = no

The SSP_TOKEN can be generated from Scirius Security Platform by going to Account Settings via the user icon on the top right and selecting Edit token. Only read access is necessary so a user with low privilege can be used.

Included dashboards and reports

Dashboards for Scirius Security Platform

  • Stamus Networks Dashboard
  • Stamus Networks IDS Dashboard
  • Stamus Networks IP Investigation Dashboard
  • Stamus Networks NTA Dashboard
  • Stamus Networks Scririus Threat Radar Dashboard

Dashboards for Suricata Sensors

  • Suricata Admin Dashboard
  • Suricata Events Dashboard
  • Suricata for Zeek Users Dashboard
  • Suricata for IDS Dashboard
  • Suricata for IP Investigation Dashboard

Reports

  • Assets under Attack
  • Domain Controllers List
  • HTTP Servers
  • HTTP Servers not running on port 80
  • New Services on Known Hosts by Stamus Networks
  • Recent services by Stamus Networks
  • TLS Servers
  • TLS servers not running on port 443
  • Threats by Network

Using data from Host Identification module of SSP

Concept

Scirius Security Platform features a Host Identification module that builds identity cards of IP addresses seen
in the network without storing all raw events. This provides a concise view of the major attributes that can be linked to an IP address.

An host identification entry includes:

  • List of hostnames associated with the IP
  • List of usernames that connected to this IP
  • List of network services
  • List of HTTP user agents
  • List of TLS agents (using JA3 technology)
  • List of SSH agents

All this information is associated with a first-seen and last-seen timestamp, so it is possible to know
precisely when a username or a HTTP user agent was first seen on a given IP address.

Host ID search

To get software version of all HTTP server in a network (here internet):

| snhostsearch filter="services.values.app_proto=http net_info.agg=internet"| spath "services{}.values{}.http.server" | top "services{}.values{}.http.server"

To get all hosts that are not running a version curl:

| snhostsearch filter="http_user_agent.agent!=curl*" | spath http_user_agent{}.agent output=agent | spath ip | top ip, agent

Host ID filter

The snhostfilter commands allow you to select only events where src_ip or dest_ip is in the host ID set defined by the filter.

The following search returns all alerts for hosts running a service on port 443.

event_type="alert" | snhostfilter filter="services.port=443"

Host ID lookup

The snhostlookup lookup resolves ip to hostname (and reverse) using the hostname information collected by SSP.

The following search returns all alert events and resolve destination ip to hostname.

event_type="alert"| lookup snhostlookup ip as dest_ip| stats count by hostname

Using data from Stamus Threat events

Concept

The Scirius Threat Radar inside SSP generates events with type stamus that are high fidelity events generated from signatures or custom algorithms. These events are also mapped to the cyber kill chain to identify the phase of the attack.

Thread ID lookup

Get threat by network and use snthreatfilter to do threat_id resolution:

event_type="stamus" | eval Network = if('stamus.asset_net_info' == "", "Unknown", 'stamus.asset_net_info') | snthreatfilter | stats dc(stamus.asset) as Assets by Network, threat_name

You can also lookup the Threat Family information via the snthreatfamilylookup:

event_type="stamus" | lookup snthreatfamilylookup family_id as stamus.family_id | top family_name

Release Notes

Version 0.9.7
Oct. 16, 2020

- Add drill down to dashboards
- Minor display fixes in dashboards

Version 0.9.6
Oct. 13, 2020

- Add compatibility with Splunk 7.x

Version 0.9.5
Oct. 12, 2020

- Better navigation
- Update colors
- Fix admin dashboard for multiple probes

Version 0.9.4
Oct. 5, 2020

- CIM 4.x compatibility
- keys option added to snhostfilter for easy cross source filtering
- rename all commands with a sn prefix for better completion
- performance optimizations of dashboards

Version 0.9.2
Sept. 30, 2020

- Improve IDS dashboards
- Fix timestamp pickers in Suricata admin Dashboard

Version 0.9.1
Sept. 30, 2020

Fix errors and warnings found by the application checker.

Version 0.9.0
Sept. 30, 2020

Initial release.

Features:
- dashboards for Suricata and Scirius Security Platform from Stamus Networks
- hostidsearch: search host identification entries in Scirius Security Platform
- hostidfilter: filter query on host matching a request done in host identification entries
- stamusthreatfilter: resolves Stamus threat id to Stamus threat name
- hostidlookup: do ip to hostname resolution and reverse using host identification data

21
Installs
40
Downloads
Share Subscribe LOGIN TO DOWNLOAD

Subscribe Share

AppInspect Tooling

Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
© 2005-2020 Splunk Inc. All rights reserved.
Splunk®, Splunk>®, Listen to Your Data®, The Engine for Machine Data®, Hunk®, Splunk Cloud™, Splunk Light™, SPL™ and Splunk MINT™ are trademarks and registered trademarks of Splunk Inc. in the United States and other countries. All other brand names, product names, or trademarks belong to their respective owners.