Our blog

Installation Guide for Supporting Add On for MITRE ATT&CK®

Using Splunk Statistical Commands: Eventstats and Streamstats by bitsIO

Supporting Add On for MITRE ATT&CK®

This app provides a method to ingest MITRE ATT&CK tactics, techniques, and subtechniques into Splunk events.  The app contains a mitre_techniques KVStore with the metadata provided from ATT&CK to help enrich alerts and ES Correlations without needing to navigate back to the ATT&CK website.

Sourcetypes

Source type Description
mitre:techniques ATT&CK tactic and techniques as defined https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json
mitre:subtechniques ATT&CK sub techniques as defined https://raw.githubusercontent.com/mitre/cti/subtechniques/enterprise-attack/enterprise-attack.json

Hardware and software requirements for SA-mitre

Outbound internet access to the following URLs:

https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json

https://raw.githubusercontent.com/mitre/cti/subtechniques/enterprise-attack/enterprise-attack.json

 

Install SA-mitre

Where to install this add-on

IMPORTANT:
Standalone Search Head (will not work on Search Head Cluster)
Direct internet connection required (no proxy)

This table provides a reference for installing this specific add-on to a distributed deployment of the Splunk platform.

 

Splunk instance type Supported Required Comments
Search Heads Yes Yes Install this add-on to all search heads where MITRE ATT&CK knowledge management is required.
Indexers No No KVStore replication to indexers does not require this to be deployed directly on indexers.
Heavy Forwarders No No This add-on does not contain any knowledge objects needed on forwarding tier. 
Universal Forwarders No No This add-on does not contain any knowledge objects needed on forwarding tier. 

 

Configure SA-mitre

  • Install SA-mitre on the search head(s) you would like the enriched ATT&CK data on.
  • Navigate to the SA-mitre app > Inputs tab.
  • Create new input > mitre_technique
mitre_technique
  • Provide a name for the modular input, frequency you want to download and ingest the framework data and index you want to save the data too.

 

Adding mitre technique
  • Update indexmitre macro with correct index and sourcetype if you are not using index=main. Settings > Advanced Search > Search Macros > indexmitre
mitre technique definition and arguments
  • Once data has been indexed, run the mitre_techniques Lookup Gen to populate the KVStore.
mitre_techniques Lookup Gen
  • Optional – Schedule the mitre_techniques Lookup Gen saved search to run on a daily/weekly schedule based on your Interval defined in the input.

How to use mitre_techniques KVStore

Given a MITRE Tactic or Technique you can use this KVStore to enrich events with contextual data. 

| makeresults
| eval mitre_technique_id = "T1001"
| lookup mitre_techniques mitre_technique_id OUTPUTNEW 
mitre statistics

Troubleshooting

Modular input logs can be found by searching:

index=_internal sourcetype="samitre:log"  

Appendix A: mitre_techniques KVStore Schema

Field name Data type Description
mitre_technique_id string The MITRE ATT&CK technique ID such as T1001.
mitre_technique string The MITRE ATT&CK technique name such as Data Obfuscation.
mitre_tactic_id string The MITRE ATT&CK tactic ID such as TA0001.
mitre_tactic string The MITRE ATT&CK tactic name such as Initial Access.
mitre_description string The MITRE ATT&CK technique description.
mitre_url string The MITRE ATT&CK technique URL for additional reference material.
mitre_detection string The MITRE ATT&CK technique detection information.
mitre_technique_platforms string The MITRE ATT&CK technique platforms such as windows, linux, or mac.
mitre_threat_group_name string The MITRE ATT&CK technique associated group names such as APT19.
mitre_threat_group_aliases string The MITRE ATT&CK associated group aliases.
mitre_threat_group_url string The MITRE ATT&CK group URL for additional reference material.
mitre_threat_group_id string The MITRE ATT&CK group ID such as G0073.
mitre_software_name string Associated software name such as Mimikatz.
mitre_software_type string Associated software type such as Tool.
mitre_software_platform string Associated software platforms such as windows, linux or mac.
mitre_software_url string Associated software URL for additional reference material.