GNAT-o-sphere
An Ecosystem of Tools. One Mission.
Cyber Threat Intel Made Simple
Welcome. This session is the ecosystem overview — what GNAT-o-sphere is, why it exists, how the tools connect, and where each role in this room benefits. We'll cover the whole ecosystem end-to-end, then individual tool sessions go deeper on each one.
The Problem
Security teams keep rebuilding the same things
New vendor → new integration to write from scratch
New tool → new data model to normalize against
New workflow → starts from zero every time
Every API change upstream breaks something downstream
The actual analysis gets buried under integration work
This is the core observation. Security teams aren't short on tools — they're short on connective tissue. Every vendor relationship adds a maintenance burden. The threat landscape doesn't pause while you fix your plumbing. This is the problem space GNAT-o-sphere is designed to close.
The Cost
Integration work isn't analysis
Analyst hours spent on plumbing, not investigation
Brittle toolchains that break when APIs change
Workflows that can't survive a vendor switch
Intelligence siloed inside individual platforms
Reports rebuilt manually each cycle
Onboarding new tools resets your workflow investment
The problem isn't capability — it's the recurring cost of keeping everything wired together.
For analysts and investigators: this is time that should go toward understanding threats. For engineers: this is the maintenance burden that makes every tool evaluation painful. For managers: this is the hidden cost that doesn't show up in licensing but absolutely shows up in team capacity.
A Better Model
Standardize the surface. Liberate the workflow.
One integration framework — 159 connectors behind a single operating model
One data standard — STIX 2.1 as the stable contract between every tool and workflow
One investigation platform — your work travels with you regardless of what changes upstream
This is the philosophical bet GNAT-o-sphere makes: if you standardize the integration layer and use a stable, vendor-neutral data format, the rest of your workflow becomes durable. Tools can change. Vendors can change. Your investigations and workflows shouldn't have to.
The GNAT-o-sphere
Five tools. One connected platform.
GNAT
Core platform. Investigation hub. Connector framework. STIX-native.
SenseGNAT
Network profiling & behavioral anomaly detection.
SandGNAT
Automated malware detonation & artifact enrichment.
RedGNAT
Controlled adversary emulation & detection validation.
GNAT-gui
Desktop GUI — investigations, hypothesis tracking, rules authoring, automated reporting.
Each tool adds value independently. Together they close the full path from signal to validated, portable intelligence.
GNAT is the hub — everything flows through it. The addons extend its reach into specific analysis domains. GNAT-gui provides the analyst-facing interface layer — structured investigations without a CLI. You can adopt incrementally; value compounds as you add more.
Core Platform
GNAT — GNAT's Not A TIP
159 connectors — ingest from feeds, platforms, and APIs without custom code for each
STIX 2.1 native — every object, relationship, and finding expressed in a vendor-neutral standard
Investigation workflows — build repeatable paths from indicators to evidence to reports
Addon routing — direct artifacts and telemetry to SenseGNAT, SandGNAT, or RedGNAT
Portable output — export structured bundles, reports, and findings that travel independently of GNAT
Not a TIP
GNAT is an investigation and workflow platform built around a connector surface and a structured data contract — not a threat intelligence platform in the traditional sense. It's designed to reduce integration churn, not add to it.
Emphasize the "Not A TIP" positioning for the technical managers in the room — GNAT doesn't try to replace existing TIPs. It wraps them. If you have a TIP, GNAT connects to it. The value is in the connective tissue and the STIX-native workflow layer, not in replacing what you already have.
Integration Surface
Works with the stack you already use
Threat Intel
CrowdStrike · Recorded Future · MISP · VirusTotal · Mandiant · Anomali · OpenCTI · MITRE ATT&CK · +16 more
SIEM & Log
Splunk · Microsoft Sentinel · Elastic · IBM QRadar · Google Chronicle · Wazuh · +6 more
SOAR & IR
Palo Alto XSOAR · TheHive · ServiceNow · Jira · FortiSOAR · +2 more
Endpoint & EDR
SentinelOne · Carbon Black · CrowdStrike · Tanium · Trellix · Sophos · +14 more
Network & NDR
Zeek · Suricata · Snort · Vectra AI · Darktrace · ExtraHop · +3 more
Cloud & ASM
Wiz · AWS Security Hub · Censys · Shodan · Palo Alto Prisma · +11 more
Vuln & Identity
Tenable · Rapid7 · Qualys · Okta · Microsoft Entra · +8 more
Sandboxes & More
ANY.RUN · Joe Sandbox · Hybrid Analysis · Intezer · +MDR, DFIR, Email, DevSecOps
159 connectors across 19 categories — full list at wrhalpin.github.io/GNAT
This slide answers the first question in every room: "does it work with what we already have?" Walk through a few categories relevant to the audience. For a SOC-heavy room, hit SIEM and endpoint. For an intel team, hit the threat intel platforms. The point isn't to read the list — it's to let them find their own tools in it.
The Addons
Extend the platform where you need it
SenseGNAT
Network & behavioral layer
Consumes Kafka telemetry stream
Anomaly detection & profiling
Runs before STIX conversion
SandGNAT
Malware analysis layer
Automated detonation
Static + dynamic analysis
CAPA, YARA findings
RedGNAT
Validation layer
Controlled adversary emulation
Explicit safety boundaries
Detection coverage testing
Three distinct analysis domains. A team with only network visibility starts with SenseGNAT. A team doing malware analysis starts with SandGNAT. A team focused on validating detections starts with RedGNAT. All three feed findings back into GNAT's investigation graph.
Addon — Network Intelligence
SenseGNAT
Behavioral profiling & anomaly detection on network telemetry
Why it exists
Indicators alone miss behavioral threats
STIX conversion strips flow-level detail that behavioral models need
SenseGNAT runs before that conversion on the raw Kafka stream
What it outputs
Anomaly findings with confidence scores
Behavioral narratives
Normalized detection outputs for GNAT
Enriched context for investigations
The key technical insight here for engineers: SenseGNAT taps the gnat.telemetry Kafka topic before GNAT normalizes records to STIX. At that point you still have raw fields — source/dest IP, ports, byte counts, session context. That's the data behavioral models need. Once it's STIX, those fields may be abstracted away.
Addon — Malware Analysis
SandGNAT
Automated malware detonation & artifact enrichment
What it does
Detonates suspicious files, URLs, and derived artifacts
Runs static and dynamic analysis
Applies CAPA and YARA rule sets
Feeds findings directly into GNAT investigations
What it outputs
Extracted indicators from detonation
Static & dynamic behavioral observations
CAPA / YARA-derived findings
Artifact bundles for investigation evidence
For analysts and investigators: SandGNAT closes the gap between "I have a suspicious file" and "I have structured findings in my investigation." The detonation workflow is triggered from within GNAT and results flow back automatically. No manual artifact handling between tools.
Addon — Detection Validation
RedGNAT
Continuous Automated Readiness Testing with explicit safety boundaries
What it does
Controlled adversary emulation against real TTPs
Explicit safety boundaries — no runaway execution
Tests detection coverage and response capability
Designed to run collaboratively, not covertly
What it outputs
Detection coverage gaps
Validation results by technique
Structured notes for investigation follow-up
Evidence for reporting and remediation tracking
The "explicit safety boundaries" point matters for managers: RedGNAT is not a red team framework in the traditional sense. It's a CART tool — designed to be used with explicit authorization, defined scope, and controlled execution. The goal is improving defensive posture, not simulating an adversary with no guardrails.
How It Fits Together
The Canonical Workflow
01 — Collect
Telemetry & Sources
External indicators and raw network telemetry enter the ecosystem
→
02 — Process
GNAT
Ingest, normalize, convert to STIX, route to addons
→
SenseGNAT
Behavioral profiling on raw telemetry
SandGNAT
Malware detonation & enrichment
RedGNAT
Adversary emulation & validation
→
04 — Report
Investigate & Act
Unified investigation graph, reporting, operator action
Walk through the flow left to right. Telemetry and sources come in, GNAT ingests and routes them. SenseGNAT gets the raw telemetry before normalization. SandGNAT gets suspicious artifacts. RedGNAT validates detection coverage. All findings converge in the GNAT investigation graph and flow out as structured reports.
The Contract
STIX 2.1 — Why It Matters
Industry standard — structured, vendor-neutral threat intelligence format
Stable contract — your downstream workflows don't break when upstream tools change
Portable intelligence — investigations and reports travel independently of any platform
Reproducible — the same indicators and relationships produce the same structured output
What it prevents
Rebuilding report templates, re-normalizing data, and re-wiring workflows every time a vendor changes their API or data model.
What it enables
Sharing investigation context across teams, tools, and organizations without translation layers.
For engineers: STIX is the reason you can swap out an upstream connector without rebuilding your entire downstream workflow. For analysts: it's why your investigation export from GNAT can be read by your partner organization's platform without custom integration work.
Analysts
Correlate broadly. Keep your work portable.
Ingest from 159 sources without managing individual connectors
Correlate indicators, behavioral findings, and detonation results in one investigation
STIX-native output means reports survive tool changes
SenseGNAT surfaces behavioral anomalies you'd miss with indicators alone
GNAT-gui provides a desktop interface if you prefer not to work in the CLI — same workflows, no terminal required
The shift
From: spending cycles normalizing feeds and rebuilding report templates To: spending cycles on the actual analysis — with all sources and findings already connected
Speak directly to the analysts in the room. The value proposition here is time — specifically, giving it back. If you currently spend 30% of your investigation time on data wrangling and report assembly, GNAT's goal is to reclaim most of that for actual analysis work.
Investigators
A repeatable path from signal to report.
Start from any seed indicator — IP, hash, domain, artifact
Investigation graph links indicators, observations, and findings automatically
SandGNAT detonates suspicious artifacts mid-investigation without leaving the workflow
Structured export: STIX bundles, operator reports, case notes
The same workflow runs the same way every time — reproducibility by design
The result
Investigations that don't rely on a specific analyst knowing the right steps — because the steps are encoded in the workflow, not in someone's head.
The reproducibility angle is especially important for teams where institutional knowledge is a risk. If your senior investigator leaves, their workflows shouldn't leave with them. GNAT's investigation model is designed to make the process explicit and repeatable.
Engineers
One integration surface. Durable workflows.
159 connectors behind one operating model — no custom connector per source
API changes upstream don't cascade to your investigation workflows
STIX as the stable downstream contract between tools
Addon architecture: add SenseGNAT, SandGNAT, RedGNAT independently
Apache 2.0 — no licensing risk, full source access
The maintenance difference
Instead of maintaining N connectors and N data model mappings, you maintain one integration surface. Vendor churn becomes a connector update, not a workflow rebuild.
Engineers care about maintenance surface area. Be concrete: if you're currently maintaining bespoke integrations with 10 different data sources, each with their own auth model, rate limits, and data format — that's N things to break and N things to fix. GNAT's connector framework collapses that to one.
Getting Started
Start small. Expand where it matters.
Deploy GNAT Core — connect your existing sources, build your first investigation workflow
Validate the connector surface — confirm your key feeds and platforms are covered, add any missing connectors
Add SenseGNAT — if you have network telemetry, extend behavioral visibility before it's normalized away
Add SandGNAT — bring malware and artifact analysis directly into investigation workflows
Add RedGNAT — validate detection coverage and close the loop from investigation to readiness
Each step delivers value independently. You don't need the full ecosystem on day one — but the full ecosystem is available when you're ready.
Resist the urge to present this as "deploy everything at once." The modular adoption story is one of GNAT-o-sphere's real strengths. Start with GNAT Core and one source that matters to your team. Get a workflow running. Then expand. The full ecosystem value emerges gradually, which also means the adoption risk is low.
Start here
Leave time for questions here. The individual tool sessions will go deep on each platform. If the room wants to continue on a specific tool today, the SandGNAT, SenseGNAT, and RedGNAT decks are available. Otherwise, point people to the ecosystem hub and let them self-direct.