KANVAS is an IR (incident response) case management tool with an intuitive desktop interface, built using Python. It provides a unified workspace for investigators working with SOD (Spreadsheet of Doom) or similar spreadsheets, enabling key workflows to be completed without switching between multiple applications.

- Built on the SOD (Spreadsheet of Doom): All data remains within the spreadsheet, making distribution and collaboration simpleβeven outside the application.
- Multi-User support: Files can reside on local machines or shared drives, enabling active collaboration among multiple investigators. File locking ensures that editing is properly managed and conflicts are avoided.
- One-Click Sanitize: Allows spreadsheet dataβsuch as domains, URLs, IP addresses, etc.βto be sanitized with a single click, making it easy to share and store.
Tip
The SOD template is slightly modified. Use the included sod.xlsx file from the package.
- πAttack Chain Visualization: Visualizes lateral movement for quick review of the adversaryβs attack path. The re-draw options help display the diagram in multiple ways.
- πIncident Timeline: The incident timeline is presented in chronological order, helping investigators quickly understand the sequence and timing of the overall incident.
- πMITRE Flow Builder: Lets you visualize & share sequences of adversary actions. You can populate flows with attacker TTP, then link them to map the sequence of techniques seen during an incident..
- Export for Reporting: The lateral movement & timeline visualizations can be exported as image files or CSV, allowing direct use in presentations or investigation reports.
Tip
Ensure the following column names exist and match exactly if you're using your own spreadsheet.
SOD Spreadsheets/
βββ Timeline/
β βββ Timestamp_UTC_0
β βββ EvidenceType
β βββ Event System
β βββ <->
β βββ Remote System
β βββ MITRE Tactic
β βββ MITRE Techniques
β βββ Visualize
βββ Systems/
βββ HostName
βββ IPAddress
βββ SystemType
- IP Reputation: IP reputation, geolocation, open ports, known vulnerabilities, and more using various API integrations.
- Domain / URL Insights: WHOIS data, DNS records, and more using various API integrations.
- File Hash Insights: Lookup binary file insights on various platforms based on hash values.
- CVE Insights: Information on known exploit usage based on CISA and other vulnerability intelligence sources.
- Email Insights: Information on whether the email address has appeared in any known data breaches.
- πRansomware Victim: Verify if a customer or organizationβs data has been published online following a ransomware attack.
Tip
Configure API keys such as VirusTotal, Shodan, and othersβbefore using the lookup features.
- MITRE ATT&CK Mapping: Provides up-to-date MITRE tactics and techniques for mapping adversary activities.
- πMITRE D3FEND Mapping: Helps map defense strategies based on the identified ATT&CK techniques. This is especially useful when responding to an incident from a defenderβs perspective.
- V.E.R.I.S. Reporting: Provides an interface to track VERIS data, which can be shared post-incident with various government entities and contribute to the Verizon Data Breach Report.
- Bookmarks: Offers a curated list of security tool, an up-to-date list of Microsoft portal URLs, and the ability to create custom investigation-specific bookmarks.
- πMarkdown Editor: Provides an interface to create and update Markdown documentsβideal for note-taking or loading investigative playbooks during investigations.
- πLLM Assaitance: This taps into LLM APIs like OpenAI / Anthropic and you can save your own predefined prompts.
- Event ID Reference: Consolidates Windows Event IDs in one place, organized by categories like persistence, lateral movement, and moreβmaking it easy to cross-reference during investigations.
- Entra ID Reference: Provides a searchable list of known and malicious Microsoft Entra ID AppIDsβuseful for investigating Business Email Compromise (BEC) cases.
- Living Off the Land Binaries: Provides a searchable list of known Microsoft living-off-the-land (LOLBAS) binaries that threat actors have abused.
- Microsoft Azure Portals: Provides a searchable list of constantly changing Microsoft Azure / Entra URLs, useful when responding to Azure cloud incidents.
Tip
For easy access, keep all Markdown files in the markdown_files folder.
-
Clone the Repository
git clone https://github.com/WithSecureLabs/Kanvas.git cd Kanvas -
Create Virtual Environment
# On Windows python3 -m venv venv venv\Scripts\activate # On MacOs / Linux python3 -m venv venv source venv/bin/activate
-
Install Dependencies
pip3 install -r requirements.txt
-
Run KANVAS
python3 kanvas.py
Important
When using the tool for the first time, ensure that you download the latest updates by clicking on Download Updates.
- The
incident timelinelogic only works if youβve mapped the MITRE TTPs in the timeline sheet for each entry. - MITRE
Flow Builderuses QT WebBrowser (Chromium-based). It may sometimes have performance issues, especially on Windows.
- Publicly disclosed ransomware victim data by Julien Mousqueton
- Microsoft First Party App Names & Graph Permissions by Merill Fernando
- Curated list of Microsoft portals by (Adam Fowler)
