• Stars
    star
    342
  • Rank 123,697 (Top 3 %)
  • Language
    PowerShell
  • License
    MIT License
  • Created over 5 years ago
  • Updated about 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework

license Maintenance GitHub last commit Twitter

ATTACKdatamap

A datasource assessment on an event level to show potential coverage of the "MITRE ATT&CK" framework.

This tool is developed by me and has no affiliation with "MITRE" nor with its great "ATT&CK" team, it is developed with the intention to ease the mapping of data sources to assess one's potential coverate.

More details in a blogpost here

Start

This tool requires module ImportExcel, Install it like this PS C:\> Install-Module ImportExcel

Import the module with Import-Module .\ATTACKdatamap.psd1

OS X Only, ImportExcel Module Cannot Autosize by default, install: brew install mono-libgdiplus

Request-ATTACKjson

Generates a JSON file to be imported into the ATT&CK Navigator. The mitre_data_assessment.xlsx file contains all Techniques, which can be updated via Invoke-ATTACK-UpdateExcel.

Each technique contains DataSources, which are individually scored by me with a weight. The DataSourceEventTypes need to be scored per environment.

This script multiplies the respective DataSource scores and adds them to a total technique score. The generation date is added to the description.

EXAMPLE

PS C:\> Request-ATTACKjson -Excelfile .\mitre_data_assessment.xlsx -Template .\template.json -Output 2019-03-23-ATTACKcoverage.json

This is all gathered into a JSON file which can be opened here; MITRE ATT&CK Navigator/enterprise/

Invoke-ATTACKUpdateExcel

This generates all MITRE ATT&CK relevant fields into a table and creates or updates the REF-DataSources worksheet in an Excel sheet

EXAMPLE

PS C:\> Invoke-ATTACKUpdateExcel -AttackPath .\enterprise-attack.json -Excelfile .\mitre_data_assessment.xlsx

The -AttackPath and -Excelfile parameters are optional

Get-ATTACKdata

This downloads the MITRE ATT&CK Enterprise JSON file

EXAMPLE

PS C:\> Get-ATTACKdata -AttackPath ./enterprise-attack.json

The -AttackPath parameter is optional

More Repositories

1

sysmon-modular

A repository of sysmon configuration modules
PowerShell
2,381
star
2

ThreatHunting

A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
1,090
star
3

sysmon-cheatsheet

All sysmon event types and their fields explained
507
star
4

MDE-AuditCheck

MDE relies on some of the Audit settings to be enabled
PowerShell
92
star
5

Presentations

My conference presentations
63
star
6

detection-sources

51
star
7

DefenderHarvester

Expose a lot of MDE telemetry that is not easily accessible in any searchable form
Go
48
star
8

TA-Sysmon-deploy

Deploy and maintain Symon through the Splunk Deployment Sever
Batchfile
31
star
9

WDACme

A WDAC configuration repository with the sole intention of enriching MDE
20
star
10

parsoalto

Palo Alto Networks Rule Parser
PHP
16
star
11

Sentinel-template-parser

Azure Sentinel Template parser
PowerShell
15
star
12

SA-Threat-Hunting

Splunk app for Threat hunting
13
star
13

sysmon-modular-linux

A repository of Sysmon For Linux configuration modules
12
star
14

sysmon-parser

Automatically generated Sysmon parser for Azure Sentinel
PowerShell
10
star
15

unfetter-discover

Unfetter-Discover Vagrant script for the Unfetter-Discover docker release
Shell
8
star
16

scripts

just random simple scripts
Shell
5
star
17

disposable-windows

A packer project to quickly have a test / dev / IR box
2
star
18

olafhartong

2
star
19

Clear-dminline

After migrating a Cisco ASA config to a Palo Alto config you remain with all these horrible DMINLINE objects, this tool resolves all members and replaces the ogroup object by its members
Python
2
star
20

BHCEupload

A small go tool to upload JSON files to the BloodHound community edition API
Go
1
star