Microsoft Azure Security Control Mappings to MITRE ATT&CK®(MITRE CTID) https://center-for-threat-informed-defense.github.io/security-stack-mappings/Azure/README.html
% vi tmp/proxy_susp_flash_download_loc.yml % sigmac -t splunk -c splunk-windows tmp/proxy_susp_flash_download_loc.yml (((c-uri="*/flash_install.php*" OR c-uri="*/install_flash_player.exe") NOT ((cs-host="*.adobe.com"))))
DeTTECT % python dettect.py editor Editor started at port 8080 Opening webbrowser: http://localhost:8080/
実行すると自動的にブラウザが起動し、以下の画面が表示されます。
ScreenshotDeTT&CT起動直後
<参考サイト>
・How to Download DeTT&CT Editor For MITRE ATT&ACK Techniques(https://systemweakness.com/how-to-download-dett-ct-editor-for-mitre-att-ack-techniques-dd41b21ebcfe) ・MITRE Practical Use Cases(Youtube、https://www.youtube.com/watch?v=1zgpTR6D3M8&list=LL&index=2&t=168s) ・MITRE DeTTECT – Data Source Visibility and Mapping(Youtube、https://www.youtube.com/watch?v=EXnutTLKS5o)