An experimental, vibe-coded quick reference tool for Windows Security & Sysmon events, built with Gemini 2.5 Pro Preview.
This project started as a "vibe coding" session – an exploration into building a simple, yet genuinely useful tool for security analysts, particularly those in SOC roles or involved in threat hunting and incident response. The core idea was to create a fast, accessible way to look up Windows Security and Sysmon event IDs and get immediate context, including potential links to adversary tactics via MITRE ATT&CK®.
A significant part of this project involved collaborating with Google's Gemini 2.5 Pro Preview (03-25) AI model. From initial concept brainstorming based on Microsoft documentation to generating code snippets, refining UI/UX, debugging build errors, and even structuring data processing logic, Gemini served as a pair programmer and sounding board.
This is not intended as a production-ready, fully validated security product. Instead, think of it as a helpful utility born from experimentation, designed to speed up the common analyst task of looking up event details and understanding their potential significance.
At its heart, this tool provides a searchable interface to:
- Look up Windows Security and Sysmon event IDs.
- See the event's name/description.
- View potential MITRE ATT&CK® technique mappings.
- Access notes on common scenarios or analysis considerations.
- Filter events by source (Windows/Sysmon).
- Unified Event Data: Includes a broad range of Windows Security events and standard Sysmon events.
- Fast Client-Side Search: Instantly search across Event ID, Name, Category, MITRE ID/Name, and Notes.
- Source Filtering: Easily switch between Windows Security, Sysmon, or all events.
- Interactive List-Detail View: Clean list presentation with a dedicated panel showing full details for the selected event.
- MITRE ATT&CK® Integration:
- Displays potential technique mappings within the detail view.
- Uses tabs with horizontal scrolling for events mapped to multiple techniques.
- Shows Technique ID, Name, Tactics (as tags), and cleaned Description derived from processed STIX data.
- Includes important disclaimers about mapping interpretation.
- Contextual Notes: Displays event categories and analyst-curated notes/scenarios where available.
- Responsive Dark UI: Clean, professional interface inspired by modern security tools, built with Tailwind CSS.
- Framework: Next.js (React - App Router)
- Language: TypeScript
- Styling: Tailwind CSS (with
@tailwindcss/typography
) - Icons: React Icons
- AI Collaboration: Gemini 2.5 Pro Preview (03-25)
- Deployment: Vercel
- Code: GitHub
The tool relies on several data sources, processed and merged during the build:
-
Base Event Data (
/src/data/*.json
):- Contains Event ID, Source, Name, Description (often same as Name), and Official Link.
- Derived primarily from Microsoft documentation (Security Events, Sysmon) and user-provided datasets based on these sources.
-
Manual Mappings (
/src/data/mappings/*.ts
):categories.ts
: Manually assigns a category (e.g., "Authentication", "Process Execution") to each Event ID.scenarios.ts
: Manually curated notes, common legitimate uses, or analysis "gotchas" for specific Event IDs.mitre.ts
: Crucially, this file manually maps specific Event IDs to one or more MITRE ATT&CK® Technique IDs (e.g., "T1059", "T1110.003"). This requires analyst research and judgment.
-
Processed MITRE ATT&CK® Data (
/src/data/mitre_processed/techniques.json
):- Source: Generated offline using a separate Python script (
process_stix.py
- available in repo history, requires manual execution) that parses the officialenterprise-attack.json
STIX bundle from mitre-attack/attack-stix-data. - Content: Contains structured details (ID, Name, Description, Tactics, URL) for ATT&CK techniques referenced in the manual mapping. Descriptions are cleaned to remove citation markers.
- Source: Generated offline using a separate Python script (
-
Merging Logic (
/src/app/page.tsx
):- The Next.js app (server-side) loads all the above data.
- It iterates through the base events.
- For each event, it looks up its Category and Scenarios from the mapping files.
- It uses the manual
mitre.ts
mapping to find relevant Technique IDs. - It then looks up the full details for those Technique IDs in the processed
techniques.json
data. - This merged
EventDetail
object (including the rich MITRE data) is passed to the client-side components.
Explore the deployed tool here:
>>> [Windows Event Threat Navigator](<<<YOUR_VERCEL_DEPLOYMENT_URL>>>) <<<
- Search: Type an Event ID, keyword, category, or MITRE ID/Name.
- Filter: Click "Windows" or "Sysmon" buttons.
- Select: Click an event row in the left list.
- Explore: View details in the right panel. Use the tabs and scrollbars as needed.
Want to play around with the code?
- Prerequisites: Node.js (v18.17+), npm/yarn/pnpm.
- Clone:
https://github.com/packetwarden/WETNav.git && cd WETNav
- Install:
npm install
(or yarn/pnpm) - Run:
npm run dev
(or yarn/pnpm) - Open http://localhost:3000.
(Note: To update the MITRE technique details (techniques.json
), you need Python 3 and the enterprise-attack.json
STIX file to run the process_stix.py
script manually.)
- Experimental: This is a side project ("vibe coding") and NOT a production-ready security tool. Use it as a reference aid only.
- Data Accuracy: Event descriptions and mappings are based on public data and manual interpretation. They may contain errors, omissions, or become outdated. Always verify information against official documentation and your own analysis.
- MITRE Mapping Context: The ATT&CK® mappings are potential associations. An event occurring does not definitively mean the mapped technique was used maliciously. Context is absolutely critical. These mappings are intended as starting points for investigation.
- No Guarantees: This tool comes with no warranties. Use at your own discretion.
- Add "Key Fields" section to the detail view.
- Implement more advanced search syntax (AND, NOT, field specifiers).
- Add more comprehensive manual MITRE mappings and scenarios.
- Integrate Sysmon configuration guidance links.
- UI/UX refinements (loading states, animations).
- Theme toggle (Light/Dark).
- Microsoft: For providing comprehensive documentation on Windows Security Events and Sysmon.
- MITRE ATT&CK®: This project utilizes ATT&CK® content. ATT&CK® is a registered trademark of The MITRE Corporation. "© 2024 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation." (MITRE ATT&CK Website, License)
- Sysinternals: For the powerful Sysmon tool.
- Gemini 2.5 Pro Preview (03-25): For extensive assistance during the development process.
- Tailwind Labs & React Icons contributors.
This project is licensed under the MIT License - see the LICENSE file for details.