- 18 Jul 2024
- 1 Minute to read
- PDF
How Red Canary Uses MITRE ATT&CK
- Updated on 18 Jul 2024
- 1 Minute to read
- PDF
A common language is essential when communicating between different security teams. When Red Canary uses a behavioral analytic to hunt for adversary behavior, or confirms threatening activity in your environment, it is important that you quickly understand what we’re communicating.
We found that the MITRE ATT&CK® taxonomy of behavioral techniques best fits our philosophy, so we exclusively use MITRE ATT&CK throughout Red Canary (supplemented by our own techniques when appropriate, which we contribute back to MITRE ATT&CK).
How does Red Canary use MITRE ATT&CK?
Many Red Canary objects are mapped to MITRE ATT&CK to aid your understanding and response:
Each detection analytic (detector) is mapped to one or more MITRE ATT&CK techniques the analytic identifies.
A coverage heatmap allows you to understand the total technique coverage that Red Canary contributes to your security program.
Potentially threatening events resulting from detection analytics show the set of MITRE ATT&CK techniques used to identify the event.
Confirmed threats (detections) published following the investigation of potentially threatening events show the set of MITRE ATT&CK techniques compiled from the underlying events.
Many reports and summary evaluations include MITRE ATT&CK as a dimension to help you understand what techniques are used in your environment (including a heatmap of techniques involved in confirmed threats).
What if Red Canary identifies a technique that is not in MITRE ATT&CK?
If Red Canary identifies an adversary technique that isn’t yet included in MITRE ATT&CK, we create a new technique identifier prefixed with RC (instead of the typical T prefix). We then submit that technique to the MITRE ATT&CK team. Once it is added to MITRE ATT&CK, we remove the RC prefix and replace it with the new identifier.
How can I see what MITRE ATT&CK techniques Red Canary detects?
We provide a MITRE ATT&CK matrix heatmap that shows the technique coverage Red Canary contributes to your security program.
Learn more about using MITRE ATT&CK heatmaps to understand Red Canary's threat coverage.
Does Red Canary support MITRE ATT&CK sub-techniques?
Red Canary has collaborated with the MITRE ATT&CK team throughout the definition of sub-techniques and is very excited about how they improve MITRE ATT&CK usage.