The PurpleLab Integration App for Splunk enhances your security operations by seamlessly integrating with PurpleLab. This app enables users to effortlessly launch Atomic Red Team tests on the PurpleLab platform and conduct threat hunting directly from within Splunk's interface. Designed for security analysts and operations teams, it streamlines the process of testing and validating detection rules against a wide range of simulated attack techniques.
Ta-purplelab.mp4
- Atomic Red Team Test Execution: Initiate Atomic Red Team tests on the PurpleLab platform directly from Splunk.
- Threat Hunting Dashboard: Utilize a dedicated dashboard within Splunk for efficient threat hunting, powered by data from PurpleLab.
- Seamless Integration: Easy setup and configuration to interconnect PurpleLab with Splunk for enhanced security operations.
Some configuration steps are required to fully integrate the app with your PurpleLab environment:
- Ensure to have sysmon on the VM of Purplelab installed and well configured
- Install Microsoft Sysmon Add-on & Sysmon App for Splunk
To install the PurpleLab Integration App for Splunk, follow these simple steps:
- Download the app package .spl
- In Splunk, navigate to
Manage Apps > Install app from file
. - Upload the downloaded app package and click
Upload
. - Create new lookup name "atomictest.csv" with this CSV file https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/Indexes/Indexes-CSV/index.csv
- rename the field to have "Test Technique TechniqueName ExecutorName TestName Tactic TestGUID"
- go to /opt/splunk/etc/apps/Ta-Purplelab/bin/mitrepurplelab.py and change the Token with the token you generate on the Purplelab Tool and the IP of the purplelab server & restart Splunk to apply the changes.
- Go to the PurpleLab Integration App dashboard within Splunk.
- Select the
Atomic Red Team
dashboard. - Choose the desired tests and type it on "List technique test" to have further information and click ENTER, to execute a test, type the id on Technique ID MITRE ATTACK and click
Submit
.
- Access the
Hunting
dashboard from the app's main menu. - Use the provided filters and search capabilities to hunt for threats based on the data collected from PurpleLab VM.
PurpleLab Integration Dashboard
For support and further assistance, please open an issue