Overview
This application provides compliance and triage dashboards for MITRE ATT&CK Framework with drill-down capabilities. It is recommended to utilize Splunk Enterprise Security and Splunk ES Content Update.
Required Splunk Apps:
Starting with version 2.3.0, we added ssupport for non-ES (Enterprise Security App) deployments as well.
Splunk Enterprise Security is required:
- Splunk Enterprise Security 5.2 or above
For one of the views:
For use cases:
- Splunk ES Content Update 1.0.40 or above
For data model searches:
Recommended Splunk Apps:
Setup Instructions
After installation of the application you will be on Setup page. Review your desired configuration for scheduled searches and simply hit Save to continue. Default view will be the Compliance Dashboard. If the matrix is not populated, click on the table to run manually, which will direct you to the Lookup Generation dashboard (searches run automatically on that dashboard).
Saved Searches
This application comes with predefined saved searches. Lookup Gen searches are scheduled to run daily after midnight.
- MITRE ATT&CK All Rules and Techniques Lookup Gen: This lookup generator checks currently enabled correlation rules via analytic stories and combines the searches with user-defined
mitre_user_rule_technique_lookup.csv
file that matches MITRE ATT&CK technique/sub-technique IDs with rules. - MITRE ATT&CK Compliance Lookup Gen: This lookup generator relies on
mitre_all_rule_technique_lookup.csv
in order to generate a new lookup to properly display MITRE ATT&CK Compliance martix.
Quick Links
Release Notes: This section provides details on system requirements and how to install and run MITRE ATT&CK App for Splunk in production environments.
Using MITRE ATT&CK App: This guide provides information on how to use MITRE ATT&CK App for Splunk.
Release Notes: This section provides details on release notes.