Skip to content

seynur/TA_padas

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

TA for Padas;

Overview

This add-on provides integration with PADAS generated alerts and includes predefined inputs and field mappings to normalize the data to the Common Information Model.

Setup Instructions

1. Create an index (optional):

While it's possible to store everything in default (main) index, it is recommended to create a separate index to store Padas Alerts. An example configuration file indexes.conf.example is provided with this distribution (i.e. padas index).

indexes.conf

[padas]
homePath   = $SPLUNK_DB/padas/db
coldPath   = $SPLUNK_DB/padas/colddb
thawedPath = $SPLUNK_DB/padas/thaweddb

2. Define HEC Input:

In order to index Padas Alerts, you'll first need to define a HEC input. An example configuration file inputs.conf.example is provided with this distribution.

inputs.conf

[http]
disabled = 0

# Following is a sample HEC input for getting PADAS Alerts from Confluent Kafka Connect
# https://www.confluent.io/hub/splunk/kafka-connect-splunk
[http://padasinput]
disabled = 0
token = e8de5f0e-97b1-4485-b416-9391cbf89392
useACK = 0

3. Enrich with Padas Rules (optional):

This add-on has seamless integration with MITRE ATT&CK App for Splunk where you can simply populate MITRE ATT&CK related dashboards with alerts triggered via PADAS. In order to enrich padas:alert event with corresponding rule, you will need to perform the following:

  • Download Padas Rules: From Padas Manager interface you'll need to select Rules from the menu and click Download in order to download all applicable rules as a json file. For details please refer to https://padas.io/docs/user-guide.html#rules

  • Upload padasRules.json to Splunk: This add-on comes with a KV Store lookup definition for Padas Rules. You'll need to run the following command:

    Command

    curl -k -u <username>:<password> https://<SPLUNK SEARCH HEAD>:8089/servicesNS/nobody/TA-padas/storage/collections/data/padas_rules_collection/batch_save -H "Content-Type: application/json" -d @<DOWNLOADED JSON FILE>

    Example:

    curl -k -u admin:changeme https://localhost:8089/servicesNS/nobody/TA-padas/storage/collections/data/padas_rules_collection/batch_save -H "Content-Type: application/json" -d @padasRules.json

4. Send Data:

You will need to configure Confluent Kafka with Splunk Sink Connector to send data. Please refer to PADAS documentation on how to setup Splunk Sink Connector and its configuration to send data to Splunk HEC input.

5. Enable Scheduled Searches (optional):

This add-on comes with 2 scheduled searches in order to integrate padas:alert events to either notable index or alerts index to be used by Splunk Enterprise Security or Alert Manager.

Saved Searches (disabled by default):

Padas Detect Engine - Notable Event Gen
Padas Detect Engine - Alert Manager Event Gen

Please enable the one that is applicable to your platform.




Release Notes:

Version 1.0.0

  • Date: 15 Jan 2022
  • Initial version

Support

Contact information for reporting an issue: development@seynur.com

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published