Skip to content

jhodgkinson-splunk/splunk_wineventcode_secanalysis

 
 

Repository files navigation

splunk_wineventcode_secanalysis

REQUIRES COMMON INFORMATION MODEL 4.14+ with properly populated signature_id field!

Version 1.5.2 of Windows Event Code Security Analysis app for Splunk. Direct questions to @james_brodsky on Twitter. Or, to [email protected].

Thanks to all security researchers that provided public info on event code recommendations - sources for this are linked from the Lookup Overview page, Count of Codes by Authority panel.

If you want a .spl version of this look in the root of this repo. Yes, I need to get this on Splunkbase.

3-21-23: Added another version of this app in .spl format in the root of this repo that passes appinspect.

1-6-23: Drew Church merged in another fix to ensure app passes appinspect.

12-29-22: Added Michel de CREVOISIER's work as an additional piece of guidance, as well as extended the MITRE ATT&CK mapping from his work to the previous ATT&CK mapping in this app. There are now 84 events with new MITRE Tactics and Techniques in two new fields in the main lookup (pipe delimited) and the amount of events mapped to MITRE have increased from 96 to 131. You can drill from a new panel in the Lookup Overview to see the tactics and techniques details. Also added new sourcetype selection to one of the dashboards and merged in changes to pass appinspect (Thanks, Shay Harding!) NOTE: There's a .spl version of the app in the root of the repo but I haven't tested it fully and it doesn't include Shay's merges yet.

12-23-22: I have returned to Splunk and will be updating this app soon to include some new sources!

01-30-22: Merged in addition of JSCU-NL Logging Essentials guidance, thank you David Andre!

05-17-21: Added Defender event codes to lookup; fixed readme format. Thank you Drew Church!

01-27-21: Fixed lookup link to ACSC guidance.

01-12-21: Fixed a bug with missing host input, fixed drilldowns from timecharts.

01-07-21: updated lookup for code 1007,1200,1202,307,510.

12-25-20: added Golden SAML event code guidance.

10-09-20: added an option to specify index wildcards.

10-08-20: added Splunk UBA event codes from Splunk docs - thank you @drewchurch.

09-14-20: added auto lookup support for XML data sources, added a few new event volume changes to main lookup.

06-11-20: added support in four dashboards for the Event Signatures data model. You must have CIM 4.14+ and you must have accelerated your data in the Event Signatures data model for improved dashboards to work. Windows TA 8.0+ supports population of the critical signature_id field needed.

04-18-20: added Australian Signals Directorate/ACSC's latest event code guidance.

About

Windows Event Code Security Analysis app for Splunk.

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • CSS 100.0%