olafhartong / ThreatHunting

A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
MIT License
1.14k stars 178 forks source link

Documentation to Add more TTP's? #117

Open DerF66 opened 1 year ago

DerF66 commented 1 year ago

I want to add more TTP's, is there any documentation available on how one can add more to this tool? It seems the saveconference file is the file to edit.

dstaulcu commented 1 year ago

You are on the right track with observation that Signature of TTP would ultimately get expressed as scheduled search in savedsearches.conf. There is another GitHub project called Sigma where you can find newer signatures for TTPs and convert them to splunk searches. If you are looking to include signatures observed from sources other than sysmon, powershell or windows event logs there will of course by many more conf files to update in the app such as macros, inputs, and possibly props and transforms.