Adversarial Tactics, Techniques, and Common Knowledge, or MITRE ATT&CK, is a knowledge base for classifying and describing cyberattacks and intrusions. It was created by the Mitre Corporation and released in 2013. The ATT&CK framework was loosely based on the Lockheed Martin Cyber Kill Chain but with vastly more detail. A Tactic represents each stage in the Cyber Kill Chain in the ATT&CK Framework and should be read from left to right in the same way. The horizontal position of the Tactics indicates the stage in the attack lifecycle where the specific Technique is used. For instance, a phishing email is probably near the beginning of an attack and data exfiltration is likely toward the end.
In the last couple of years, the ATT&CK framework has become the most popular cybersecurity framework by a wide margin. Moreover, it has proven helpful for many use cases beyond its original purpose.
The Mitre Corporation updates the framework at least a couple of times per year with new Techniques, objects, and even new matrices. In addition, the framework’s solid foundation means many technology providers can natively adopt it into products, including us here at Splunk. Even Gartner and Forrester include some form of MITRE ATT&CK support in their evaluation of products.
Splunk added support for MITRE ATT&CK in our content library and Splunk Security Essentials (SSE) app around 2018. We mapped our detections with Techniques and Tactics to make it easier for defenders to understand where this type of detection is placed in the attack lifecycle. We added Sub-Techniques, Threat Groups, Platforms, and Software in later versions. Many of these capabilities were added under the moniker Analytics Advisor.
In the current version of SSE, you can use the ATT&CK framework for a wide array of use cases and to answer a wide range of questions:
Many of these examples rely on additional context and enrichment collected by Splunk Security Essentials as part of the initial setup.
SSE includes some predefined sets of Techniques that might interest you, such as the Top 10 Techniques for Ransomware, created by MITRE.
You can also find a visual of the same Techniques on the ATT&CK Matrix.
A subset of the ATT&CK Matrix showing the selected Techniques
The selected techniques and the coverage metrics in the current environment
Splunk Security Essentials bundles a few other premade lists of ATT&CK Techniques such as the MITRE Engenuity Adversary Sightings Top 15 project. This project has done quantitative research on a large number of Threat Reports for the past years, with more than 6 million Technique usage observations. One of the conclusions of this work is that 15 Techniques represent 90% of all observations. Want to protect yourself against the 90%? Filter the panels as above using this premade list.
Flip between the panels and tabs to view the current coverage in the environment in different ways
The charts show 2% coverage on the ATT&CK Matrix by the six active detections
Flip between the panels and tabs to look at the current coverage in the environment in different ways.
Which source type provides the most potential detection coverage?
The chart shows 73% coverage on the ATT&CK Matrix by the 985 available detections in the environment
Orange highlighted cells represent the Techniques used by the Babuk ransomware. The blue background color represents the detections available.
Ten Threat Groups are known for targeting the healthcare industry.
A subset of the ATT&CK Matrix featuring Techniques that have been observed in the healthcare industry.
The image shows detections and other content available in Security Essentials covering the subset of Techniques that have been observed in the healthcare industry.
The ATT&CK Cloud Matrix and the active detections in the environment (blue).
The number of detections and other content available in Security Essentials split by data source.
Let’s dive into the meaning and use of the word “coverage.”
Coverage means we have at least some content (either available or active) that aligns with the specified Technique. Furthermore, MITRE ATT&CK only has a portion of “known” threat actors that only capture what has happened and do not project all possible outcomes of things that could happen.
Good coverage, therefore, means we have lots of content covering many techniques. However, this is only part of the picture. Coverage doesn’t tell us how much of the environment is protected. If the data source powering the detection is only available for a small subset of the organization, the level of protection will not be as great. It might even be misleading when only looking at the colors in the matrix without realizing the context.
In conclusion, coverage does not mean completeness.
You’ve made it this far; go and try it out yourself. Splunk Security Essentials is available on Splunkbase, and version 3.7.0 was recently released on Dec. 8, 2022.
To learn more about how MITRE ATT&CK Tactics are mapped to detections developed by the Splunk Threat Research Team, check out the new eBook “Top Cybersecurity Threat Detections with Splunk and MITRE ATT&CK.”
- Johan
As always, security at Splunk is a family business. Credit to authors and collaborators: Johan Bjerke, Audra Streetman, Ryan Becwar. Feature photo by Torsten Dettlaff from Pexels.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.