icon/x Created with Sketch.

Splunk Cookie Policy

We use our own and third-party cookies to provide you with a great online experience. We also use these cookies to improve our products and services, support our marketing campaigns, and advertise to you on our website and other websites. Some cookies may continue to collect information after you have left our website. Learn more (including how to update your settings) here.
Accept Cookie Policy

We are working on something new...

A Fresh New Splunkbase
We are designing a New Splunkbase to improve search and discoverability of apps. Check out our new and improved features like Categories and Collections. New Splunkbase is currently in preview mode, as it is under active development. We welcome you to navigate New Splunkbase and give us feedback.

Accept License Agreements

This app is provided by a third party and your right to use the app is in accordance with the license provided by that third-party licensor. Splunk is not responsible for any third-party apps and does not provide any warranty or support. If you have any questions, complaints or claims with respect to this app, please contact the licensor directly.

Thank You

Downloading Engaged Threat
SHA256 checksum (engaged-threat_11.tgz) 52231c71b9acd0b4c02fdd06ea6626a3e9cd89fb009bd4649e937e1c237133c5 SHA256 checksum (engaged-threat_10.tgz) d87d6db650ed5ecff493aeeff37c65b6a5f068daad8aea32caa63c84ee11ef45
To install your download
For instructions specific to your download, click the Details tab after closing this window.

Flag As Inappropriate

splunk

Engaged Threat

This app has been archived. Learn more about app archiving.
This app is NOT supported by Splunk. Please read about what that means for you here.
Overview
Details
The purpose of this is app is to provide dashboards and metrics to aid in increasing the engagement of attackers on your SSH honeypot. The goal of the metrics is to allow you to observe the behavioral changes of the attackers when configuration changes are made to the honeypot. By increasing the engagement level of your attackers you should be able to obtain higher quality threat intelligence than a default installation while still remaining low-interaction.

Overview

The purpose of this is app is to provide dashboards and metrics to aid in increasing the engagement of attackers on your SSH honeypot. The goal of the metrics is to allow you to observe the behavioral changes of the attackers when configuration changes are made to the honeypot. By increasing the engagement level of your attackers you should be able to obtain higher quality threat intelligence than a default installation while still remaining low-interaction.

Details

In order to fully utilize the visualizations in Engaged Threat you will need to install the "Sankey Diagram - Custom Visualization” App located here -

https://splunkbase.splunk.com/app/3112

Next install the “Virustotal Checker” Splunk app by following the link below. This will allow you to pull in Virus Total information for the files downloaded on your honeypot.

https://splunkbase.splunk.com/app/2671/

Restart Splunk after you’ve installed the above apps.

Key Notes

The Engaged Threat Splunk App is built using the JSON logging from Cowrie SSH Honeypot. Cowrie is an SSH honeypot that was forked from Kippo by Michael Oosterhof and can be found here.

https://github.com/micheloosterhof/cowrie

For Cowrie JSON logs to be indexed by Splunk it is suggested that you install the Splunk Universal Forwarder script for Engaged Threat by following the installation instructions here.

https://github.com/jamesbower/EngagedThreat

Using the Engaged Threat Splunk App

When you open up the Engaged Threat Splunk App you’ll be taken to the “Overview” section of the app by default. You will see that the app contains three other sections. The second section is “Session Analysis” and the third is “Session Engagement”. The fourth and final section of the app is the typical Splunk “Search” section. An synopsis of each section is provided below.

Overview

The “Overview” section provides some key analytics consisting of the following.

  • Successful Sessions
  • Human Attackers
  • Bots
  • Average Session Duration in Minutes
  • Percentage of New Sessions
  • Bounce Rate
  • Chart of New Attackers vs Returning Attackers
  • Top Successful Commands
  • Top Failed Commands

Session Analysis

  • Successful Sessions with Interaction
  • Session Flow
  • Cyber Kill Chain
  • Commands Entered During Session
  • Session Duration in Minutes
  • Files Downloaded During Session

Session Engagement

  • Unique Sessions
  • Commands
  • Unique Session Duration
  • Session Window Size
  • Top Session Flow Over 24 Hours

To-Do

  • Provide A/B Split testing of multiple sensors with different configurations.
  • Find a better way to calculate “Successful Sessions”.
  • Speed up queries and overall speed of the app.
  • Add the ability to manage remote sensors.
  • Expand Cyber Kill Chain integration.

Known Issues

Depending on the time frame used the “Average Session Duration” query takes a long time to calculate. I’m hoping to speed this up in the future.

Credits

Release Notes

Version 1.1
May 13, 2017

Added the specific search index for each query.

Version 1.0
May 10, 2017

Subscribe Share

Are you a developer?

As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.

Follow Us:
Splunk, Splunk>,Turn Data Into Doing, Data-to-Everything, and D2E are trademarks or registered trademarks of Splunk LLC in the United States and other countries. All other brand names,product names,or trademarks belong to their respective owners.