<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How best MITRE ATT&amp;amp;CK be used for SIEM usecase built? in Threats</title>
    <link>https://community.isc2.org/t5/Threats/How-best-MITRE-ATT-amp-CK-be-used-for-SIEM-usecase-built/m-p/45780#M323</link>
    <description>&lt;OL&gt;&lt;LI&gt;Research what threat actors are targeting your specific industry&lt;/LI&gt;&lt;LI&gt;APT 29 Cozy Bear, just as an example&lt;/LI&gt;&lt;LI&gt;Look at the 'Techniques Used' section within APT29&amp;nbsp;&lt;A href="https://attack.mitre.org/groups/G0016/" target="_blank" rel="noopener"&gt;APT29&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Start at the top within the field 'ID' with T1548&amp;nbsp;&lt;A href="https://attack.mitre.org/techniques/T1548/" target="_blank" rel="noopener"&gt;Abuse Elevation Control Mechanism&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Use the 'Detection' section to look at what events need to be monitored and sent to the SIEM&lt;/LI&gt;&lt;LI&gt;Repeat until all techniques are able to be monitored by the SIEM&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Some techniques overlap with other APT groups so I wouldn't use it for attribution necessarily.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 01 Jun 2021 13:56:42 GMT</pubDate>
    <dc:creator>tmekelburg1</dc:creator>
    <dc:date>2021-06-01T13:56:42Z</dc:date>
    <item>
      <title>How best MITRE ATT&amp;CK be used for SIEM usecase built?</title>
      <link>https://community.isc2.org/t5/Threats/How-best-MITRE-ATT-amp-CK-be-used-for-SIEM-usecase-built/m-p/45777#M322</link>
      <description>&lt;P&gt;I'm interested to hear the practical usage of MITRE framework on building the SIEM usecase?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jun 2021 13:06:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/How-best-MITRE-ATT-amp-CK-be-used-for-SIEM-usecase-built/m-p/45777#M322</guid>
      <dc:creator>Debs</dc:creator>
      <dc:date>2021-06-01T13:06:48Z</dc:date>
    </item>
    <item>
      <title>Re: How best MITRE ATT&amp;CK be used for SIEM usecase built?</title>
      <link>https://community.isc2.org/t5/Threats/How-best-MITRE-ATT-amp-CK-be-used-for-SIEM-usecase-built/m-p/45780#M323</link>
      <description>&lt;OL&gt;&lt;LI&gt;Research what threat actors are targeting your specific industry&lt;/LI&gt;&lt;LI&gt;APT 29 Cozy Bear, just as an example&lt;/LI&gt;&lt;LI&gt;Look at the 'Techniques Used' section within APT29&amp;nbsp;&lt;A href="https://attack.mitre.org/groups/G0016/" target="_blank" rel="noopener"&gt;APT29&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Start at the top within the field 'ID' with T1548&amp;nbsp;&lt;A href="https://attack.mitre.org/techniques/T1548/" target="_blank" rel="noopener"&gt;Abuse Elevation Control Mechanism&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Use the 'Detection' section to look at what events need to be monitored and sent to the SIEM&lt;/LI&gt;&lt;LI&gt;Repeat until all techniques are able to be monitored by the SIEM&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Some techniques overlap with other APT groups so I wouldn't use it for attribution necessarily.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jun 2021 13:56:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/How-best-MITRE-ATT-amp-CK-be-used-for-SIEM-usecase-built/m-p/45780#M323</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2021-06-01T13:56:42Z</dc:date>
    </item>
  </channel>
</rss>

