All Projects → splunk → Security_content

splunk / Security_content

Licence: apache-2.0
Splunk Security Content

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Security content

Congress
Helping humanity evolve
Stars: ✭ 191 (-11.98%)
Mutual labels:  engineering
Front End Guide
📚 Study guide and introduction to the modern front end stack.
Stars: ✭ 14,073 (+6385.25%)
Mutual labels:  engineering
Com.unity.perception
Perception toolkit for sim2real training and validation
Stars: ✭ 208 (-4.15%)
Mutual labels:  detection
Can Autoplay
The auto-play feature detection in HTMLMediaElement (<audio> or <video>).
Stars: ✭ 196 (-9.68%)
Mutual labels:  detection
Clandmark
Open Source Landmarking Library
Stars: ✭ 204 (-5.99%)
Mutual labels:  detection
Hourglass Facekeypoints Detection
face keypoints deteciton based on stackedhourglass
Stars: ✭ 206 (-5.07%)
Mutual labels:  detection
Lidc nodule detection
lidc nodule detection with CNN and LSTM network
Stars: ✭ 187 (-13.82%)
Mutual labels:  detection
Reverse Engineering Tutorials
Some Reverse Engineering Tutorials for Beginners
Stars: ✭ 217 (+0%)
Mutual labels:  engineering
Raspberrypi Facedetection Mtcnn Caffe With Motion
MTCNN with Motion Detection, on Raspberry Pi with Love
Stars: ✭ 204 (-5.99%)
Mutual labels:  detection
Caffe Faster Rcnn
faster rcnn c++ version. joint train; please checkout into dev branch (git checkout dev)
Stars: ✭ 210 (-3.23%)
Mutual labels:  detection
Asl
Official Pytorch Implementation of: "Asymmetric Loss For Multi-Label Classification"(2020) paper
Stars: ✭ 195 (-10.14%)
Mutual labels:  detection
Pine
🌲 Aimbot powered by real-time object detection with neural networks, GPU accelerated with Nvidia. Optimized for use with CS:GO.
Stars: ✭ 202 (-6.91%)
Mutual labels:  detection
Autocadcodepack
AutoCAD Code Pack: A powerful library that helps you to develop AutoCAD plugins using the AutoCAD .NET API
Stars: ✭ 207 (-4.61%)
Mutual labels:  engineering
Rpnplus
RPN+(Tensorflow) for people detection
Stars: ✭ 191 (-11.98%)
Mutual labels:  detection
Bccd dataset
BCCD (Blood Cell Count and Detection) Dataset is a small-scale dataset for blood cells detection.
Stars: ✭ 216 (-0.46%)
Mutual labels:  detection
Paddle2onnx
PaddlePaddle to ONNX model converter
Stars: ✭ 185 (-14.75%)
Mutual labels:  detection
Labelimg
🖍️ LabelImg is a graphical image annotation tool and label object bounding boxes in images
Stars: ✭ 16,088 (+7313.82%)
Mutual labels:  detection
Vermin
Concurrently detect the minimum Python versions needed to run code
Stars: ✭ 218 (+0.46%)
Mutual labels:  detection
Libscout
LibScout: Third-party library detector for Java/Android apps
Stars: ✭ 217 (+0%)
Mutual labels:  detection
Faster Rcnn tf
Faster-RCNN in Tensorflow
Stars: ✭ 2,349 (+982.49%)
Mutual labels:  detection

Splunk Security Content

security_content

Welcome to the Splunk Security Content

This project gives you access to our repository of Analytic Stories that are security guides the provide background on TTPs, mapped to the MITRE framework, the Lockheed Martin Kill Chain, and CIS controls. They include Splunk searches, machine-learning algorithms, and Splunk Phantom playbooks (where available)—all designed to work together to detect, investigate, and respond to threats.

Get Content🛡

The latest Splunk Security Content can be obtained via:

SSE App

Grab the latest release of Splunk Security Essentials App and install it on a Splunk instance. You can download it from splunkbase, it is a Splunk Supported App. SSE Splunk app today supports push updates for security content release, this is the preferred way to get content!

ESCU App

Grab the latest release of DA-ESS-ContentUpdate.spl and install it on a Splunk instance. Alternatively, you can download it from splunkbase, it is currently a Splunk Supported App.

API

curl -s https://content.splunkresearch.com | jq
{
  "hello": "welcome to Splunks Research security content api"
}

Usage 🧰

contentctl.py

The Content Control tool allows you to manipulate Splunk Security Content via the following actions:

  1. new - Creates new content (detection, story, baseline)
  2. validate - Validates written content
  3. generate - Generates a deployment package for different platforms (splunk_app)

pre-requisites

git clone [email protected]:splunk/security_content.git
cd security_content
pip install virtualenv
virtualenv venv
source venv/bin/activate
pip install -r requirements.txt

create a new detection

python contentctl.py new

for a more indepth write up on how to write content see our guide.

create a new analytic story

python contentctl.py new -t story

validate written content a new analytic story

python contentctl.py --verbose validate

generate a splunk app from current content

python contentctl.py --path . --verbose generate --output package

MITRE ATT&CK ⚔️

Detection Coverage

To view an up-to-date detection coverage map for all the content tagged with MITRE techniques visit: https://mitremap.splunkresearch.com/ under the Detection Coverage layer. Below is a snapshot in time of what technique we currently have some detection coverage for. The darker the shade of blue the more detections we have for this particular technique. This map is automatically updated on every release and generated from the generate-coverage-map.py.

Detection Priority by Threat Actors

If curious about how the Threat Research team prioritizes what content to build refer to our Detection Priority by Threat Actors layer in https://mitremap.splunkresearch.com/. Using the actor data from MITRE CTI we add a point for every threat actor that uses a particular technique, and then subtract a point of every detection we have mapped to that technique. The resulting map below is how we prioritize what techniques and detections to focus on next. This map is automatically updated on every release and is generated by the generate-actors-map.py script.

Customize to your Environment 🏗

Customize your content to change how often detections run, or what the right source type for sysmon in your environment is please follow this guide.

What's in an Analytic Story? 🗺

A complete use case, specifically built to detect, investigate, and respond to a specific threat like Credential Dumping or Ransomware. A group of detections and a response make up an analytic story, they are associated with the tag analytic_story: <name>.

Content Parts 🧩

  • detections/: Contains all 209 detection searches to-date and growing.
  • stories/: All Analytic Stories that are group detections or also known as Use Cases
  • deployments/: Configuration for the schedule and alert action for all content
  • responses/: Incident Response Playbooks/Workflow for responding to a specific Use Case or Threat.
  • response_tasks/: Individual steps in responses that help the user investigate via a Splunk search, automate via a phantom playbook, and visualize via dashboards threats.
  • baselines/: Searches that must be executed before a detection runs. It is specifically useful for collecting data on a system before running your detection on the collected data.
  • dashboards/: JSON definitions of Mission Control dashboards, to be used as a response task. Currently not used.
  • macros/: Implements Splunk’s search macros, shortcuts to commonly used search patterns like sysmon source type. More on how macros are used to customize content below.
  • lookups/: Implements Splunk’s lookup, usually to provide a list of static values like commonly used ransomware extensions.

Contribution 🥰

We welcome feedback and contributions from the community! Please see our contributing to the project for more information on how to get involved.

Support 💪

Please use the GitHub Issue Tracker to submit bugs or request features.

If you have questions or need support, you can:

License

Copyright 2020 Splunk Inc.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].