Copyright (c) 2015, 2020, DCSO Deutsche Cyber-Sicherheitsorganisation GmbH
Splunk App (Dashboard) for DCSO Threat Intelligence Engine (TIE).
- Python v3.7 or greater
- Splunk Enterprise 8 or greater
- DCSO TIE (legacy) or Portal API token (with Pinkback permission)
- Connection from your Splunk instance(s) to https://tie.dcso.de:443 (check your firewall setup)
You can install the DCSO TIE App within the Splunk Enterprise Web interface:
- click on the
splunk>enterprise
-logo - click on the wheel next next to 'Apps'
- click 'Install app from file'
- choose the file, navigating to the folder on your local machine containing a file called like
DCSO_TIE_Splunk_App2-2.0.0b1.zip
- if you are upgrading, make sure to check 'Upgrade app'
- click 'Upload'
You can also install the app through the Splunk CLI (Command Line Interface):
${SPLUNK_HOME}/bin/splunk install app DCSO_TIE_Splunk_App2-2.0.0b1.zip
After installation, the app needs to be configured.
After installation you must setup the app or add-on.
Important: when a configuration is not correct, it is stored, but an error appears in the Splunk Web tool. This error, however, does not tell you exactly what is wrong. You have to open the log file (see below) to find out what exactly is wrong.
An API or Machine Token is required to access the Threat Intelligence Engine or TIE. Both the legacy
token created through tie.dcso.de
and the newer tokens created through portal.dcso.de
are supported.
If you have any questions about this Token, please contact DCSO (see below).
There are few more details about the configuration:
- API Token: either a legacy tie.dcso.de token, or new one created through the DCSO Portal.
Pingback is a function to report observations of the given IoCs. Only timestamp, count per second, data type and value is transferred.
For a working retro hunt please enable/accelerate the CIM datamodels "Web" and "Network Traffic".
This app will log errors, warnings, and other informative messages to a separate log file within
the folder ${SPLUNK_HOME}/var/log/splunk
. The file is called dcso_tie.log
and is rotated 6 times.
The entries in this log file are stored, when executed by Splunk, as JSON. This makes it ready to be monitored by Splunk itself.
- Email: ti-support [a] dcso.de
- Website: https://dcso.de
The app can be packaged using the normal distutils
command. However, for Splunk we need
to adapt a bit so that it is easy to create, deploy and install.
This app has it's own distutils
command called splunkdist
:
$ python setup.py splunkdist --format=zip
The above command will create a ZIP archive in the folder dist/
. The name of the file is so that
it contains the major and full version of this app. The folder it unpacks too has simply the
major version, for example:
$ python setup.py splunkdist --format=zip
# creates:
dist/DCSO_TIE_Splunk_App2-2.0.0b1.zip
$ unzip -l dist/DCSO_TIE_Splunk_App2-2.0.0b6.zip
Archive: dist/DCSO_TIE_Splunk_App2-2.0.0b6.zip
Length Date Time Name
--------- ---------- ----- ----
0 05-26-2020 13:36 DCSO_TIE_App2/
0 05-26-2020 13:36 DCSO_TIE_App2/bin/
0 05-26-2020 13:36 DCSO_TIE_App2/default/
0 05-26-2020 13:36 DCSO_TIE_App2/static/
...
See LICENSE file included in the repository.