Latest Version 1.2.1
April 18, 2024
This app provides a method to ingest MITRE ATT&CK® tactics, techniques, and subtechniques into Splunk events. The app contains a mitre_techniques KVStore with the metadata provided from ATT&CK to help enrich alerts and ES Correlations without needing to navigate back to the MITRE ATT&CK website. IMPORTANT: Standalone Search Head (will not work on Search Head Cluster) Direct internet connection required (no proxy)
(0)
Categories
Created By
Type
Downloads
Licensing
Splunk Answers
Resources