<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Add Mitre Att&amp;amp;ck TTP data to splunk core in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-Mitre-Att-amp-ck-TTP-data-to-splunk-core/m-p/752592#M23030</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/254178"&gt;@elend&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can grab the MITRE ATT&amp;amp;CK data and bring it into Splunk as a lookup table or KV Store. That way, you can add MITRE TTP details to your detections or events in your searches and dashboards.&lt;BR /&gt;You can also try out the Security Essentials app, which gives you lots of built-in detections already mapped to MITRE ATT&amp;amp;CK techniques and analytics use cases.&lt;/P&gt;&lt;P&gt;#&lt;A href="https://docs.splunk.com/Documentation/SSE/3.8.2/User/MITREFramework" target="_blank"&gt;https://docs.splunk.com/Documentation/SSE/3.8.2/User/MITREFramework&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Prewin&lt;BR /&gt;If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!&lt;/P&gt;</description>
    <pubDate>Tue, 02 Sep 2025 04:10:06 GMT</pubDate>
    <dc:creator>PrewinThomas</dc:creator>
    <dc:date>2025-09-02T04:10:06Z</dc:date>
    <item>
      <title>Add Mitre Att&amp;ck TTP data to splunk core</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-Mitre-Att-amp-ck-TTP-data-to-splunk-core/m-p/752569#M23023</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;BR /&gt;I'm exploring several possibilities in Splunk Core for security purposes without using Splunk Enterprise Security. I'm currently trying to add TTP information from Mitre to Splunk Core. Is that possible or some of you ever did this before? really appreciate for any information given.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2025 09:30:00 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Add-Mitre-Att-amp-ck-TTP-data-to-splunk-core/m-p/752569#M23023</guid>
      <dc:creator>elend</dc:creator>
      <dc:date>2025-09-01T09:30:00Z</dc:date>
    </item>
    <item>
      <title>Re: Add Mitre Att&amp;ck TTP data to splunk core</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-Mitre-Att-amp-ck-TTP-data-to-splunk-core/m-p/752578#M23026</link>
      <description>&lt;P&gt;What do you mean by that? You could implement your own method of storing TTP info about... something (a search result, most probably) in a KV-store. But that would mean you're effectively reimplementing core ES functionality. You'd have to first have a way of storing those results (akin to notables or findings) and "tagging" those, which is exactly what ES does.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2025 11:22:14 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Add-Mitre-Att-amp-ck-TTP-data-to-splunk-core/m-p/752578#M23026</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2025-09-01T11:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: Add Mitre Att&amp;ck TTP data to splunk core</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-Mitre-Att-amp-ck-TTP-data-to-splunk-core/m-p/752591#M23029</link>
      <description>&lt;P&gt;yes, i think it tag and trigger by created alert that have been made before. But still wonder how to store it. I've read some documentation like using&amp;nbsp;&lt;SPAN&gt;Splunk Security Essentials&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Sep 2025 02:54:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Add-Mitre-Att-amp-ck-TTP-data-to-splunk-core/m-p/752591#M23029</guid>
      <dc:creator>elend</dc:creator>
      <dc:date>2025-09-02T02:54:23Z</dc:date>
    </item>
    <item>
      <title>Re: Add Mitre Att&amp;ck TTP data to splunk core</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Add-Mitre-Att-amp-ck-TTP-data-to-splunk-core/m-p/752592#M23030</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/254178"&gt;@elend&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can grab the MITRE ATT&amp;amp;CK data and bring it into Splunk as a lookup table or KV Store. That way, you can add MITRE TTP details to your detections or events in your searches and dashboards.&lt;BR /&gt;You can also try out the Security Essentials app, which gives you lots of built-in detections already mapped to MITRE ATT&amp;amp;CK techniques and analytics use cases.&lt;/P&gt;&lt;P&gt;#&lt;A href="https://docs.splunk.com/Documentation/SSE/3.8.2/User/MITREFramework" target="_blank"&gt;https://docs.splunk.com/Documentation/SSE/3.8.2/User/MITREFramework&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Prewin&lt;BR /&gt;If this answer helped you, please consider marking it as the solution or giving a Karma. Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 02 Sep 2025 04:10:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Add-Mitre-Att-amp-ck-TTP-data-to-splunk-core/m-p/752592#M23030</guid>
      <dc:creator>PrewinThomas</dc:creator>
      <dc:date>2025-09-02T04:10:06Z</dc:date>
    </item>
  </channel>
</rss>

