Skip to content

[Security Solution] Updates MITRE ATT&CK framework to v15.1#183463

Merged
dplumlee merged 6 commits intoelastic:mainfrom
dplumlee:mitre-upgrade-v15.1
May 30, 2024
Merged

[Security Solution] Updates MITRE ATT&CK framework to v15.1#183463
dplumlee merged 6 commits intoelastic:mainfrom
dplumlee:mitre-upgrade-v15.1

Conversation

@dplumlee
Copy link
Copy Markdown
Contributor

@dplumlee dplumlee commented May 15, 2024

Summary

Addresses: #166152 for 8.15.0

Flaky test runner result (internal)

Updates MITRE ATT&CK mappings to v15.1. Last update was to v14.1 in #174120.

To update, I modified

const MITRE_CONTENT_VERSION = 'ATT&CK-v14.1'; // last updated when preparing for 8.14.0 release

to point to the ATT&CK-v15.1 tag.

Then ran yarn extract-mitre-attacks from the root security_solution plugin directory, and then node scripts/i18n_check.js --fix from Kibana root to regen the i18n files.

Acceptance Criteria

Test Criteria

  • Verify that new techniques (see the changelog link above) are available for mapping on the Rule Creation page under "Advanced settings"
  • Verify that new techniques are available on the MITRE ATT&CK coverage page

For maintainers

@dplumlee dplumlee added release_note:enhancement Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Feature:Rule Management Security Solution Detection Rule Management area Team:Detection Rule Management Security Detection Rule Management Team v8.15.0 labels May 15, 2024
@dplumlee dplumlee self-assigned this May 15, 2024
@dplumlee dplumlee requested review from a team as code owners May 15, 2024 05:00
@dplumlee dplumlee requested a review from xcrzx May 15, 2024 05:00
@elasticmachine
Copy link
Copy Markdown
Contributor

Pinging @elastic/security-detections-response (Team:Detections and Resp)

@elasticmachine
Copy link
Copy Markdown
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@elasticmachine
Copy link
Copy Markdown
Contributor

Pinging @elastic/security-detection-rule-management (Team:Detection Rule Management)

@kibanamachine
Copy link
Copy Markdown
Contributor

Flaky Test Runner Stats

🟠 Some tests failed. - kibana-flaky-test-suite-runner#5976

[❌] x-pack/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_management/basic_license_essentials_tier/configs/ess.config.ts: 25/50 tests passed.
[✅] x-pack/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_management/basic_license_essentials_tier/configs/serverless.config.ts: 50/50 tests passed.
[❌] Security Solution Rule Management - Cypress: 0/50 tests passed.
[✅] [Serverless] Security Solution Rule Management - Cypress: 50/50 tests passed.

see run history

@kibanamachine
Copy link
Copy Markdown
Contributor

Flaky Test Runner Stats

🟠 Some tests failed. - kibana-flaky-test-suite-runner#5996

[✅] x-pack/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_management/basic_license_essentials_tier/configs/ess.config.ts: 50/50 tests passed.
[✅] x-pack/test/security_solution_api_integration/test_suites/detections_response/rules_management/rule_management/basic_license_essentials_tier/configs/serverless.config.ts: 50/50 tests passed.
[❌] Security Solution Rule Management - Cypress: 32/50 tests passed.
[❌] [Serverless] Security Solution Rule Management - Cypress: 42/50 tests passed.

see run history

Copy link
Copy Markdown
Contributor

@xcrzx xcrzx left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@dplumlee
Copy link
Copy Markdown
Contributor Author

@elasticmachine merge upstream

@kibana-ci
Copy link
Copy Markdown

💛 Build succeeded, but was flaky

Failed CI Steps

Test Failures

  • [job] [logs] Jest Integration Tests #6 / migration v2 migrates saved objects normally when multiple Kibana instances are started with an average interval

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
securitySolution 15.2MB 15.2MB +4.2KB

History

To update your PR or re-run it, just comment with:
@elasticmachine merge upstream

cc @dplumlee

@dplumlee dplumlee merged commit dff2754 into elastic:main May 30, 2024
@kibanamachine kibanamachine added the backport:skip This PR does not require backporting label May 30, 2024
@dplumlee dplumlee deleted the mitre-upgrade-v15.1 branch May 30, 2024 17:54
dplumlee added a commit that referenced this pull request Apr 28, 2025
## Summary

Addresses: #166152 for `8.18.1`
and #203370

Updates MITRE ATT&CK mappings to `v16.1`. Last update was to `v15.1` in
#183463.

To update,  I modified 


https://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22

to point to the `ATT&CK-v16.1` tag.

Then ran `yarn extract-mitre-attacks` from the root `security_solution`
plugin directory, and then `node scripts/i18n_check.js --fix` from
Kibana root to regen the i18n files.

## Acceptance Criteria

- [x] User can map and use new MITRE techniques in Security Solution
- [ ] The user-facing documentation is updated with the new version
- [ ] [MITRE ATT&CK®
coverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)
page
    - [ ] elastic/security-docs#6797
    - [ ] elastic/docs-content#1292

## Test Criteria

This PR also updates our cypress tests which run with real MITRE data
generated by the same `extract_tactics_techniques_mitre` script. Our
tests would often break when the data was updated to a new version
because the UI elements being tested would cover each other leading to
flakiness or outright test failure. In order to ensure a more streamline
update process the tests should no longer break because of this
flakiness and only when there's a more serious issue.

- [x] Verify that new techniques (see the changelog link above) are
available for mapping on the Rule Creation page under "Advanced
settings"
- [x] Verify that new techniques are available on the MITRE ATT&CK
coverage page

---------

Co-authored-by: Maxim Palenov <maxim.palenov@elastic.co>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Apr 28, 2025
)

## Summary

Addresses: elastic#166152 for `8.18.1`
and elastic#203370

Updates MITRE ATT&CK mappings to `v16.1`. Last update was to `v15.1` in
elastic#183463.

To update,  I modified

https://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22

to point to the `ATT&CK-v16.1` tag.

Then ran `yarn extract-mitre-attacks` from the root `security_solution`
plugin directory, and then `node scripts/i18n_check.js --fix` from
Kibana root to regen the i18n files.

## Acceptance Criteria

- [x] User can map and use new MITRE techniques in Security Solution
- [ ] The user-facing documentation is updated with the new version
- [ ] [MITRE ATT&CK®
coverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)
page
    - [ ] elastic/security-docs#6797
    - [ ] elastic/docs-content#1292

## Test Criteria

This PR also updates our cypress tests which run with real MITRE data
generated by the same `extract_tactics_techniques_mitre` script. Our
tests would often break when the data was updated to a new version
because the UI elements being tested would cover each other leading to
flakiness or outright test failure. In order to ensure a more streamline
update process the tests should no longer break because of this
flakiness and only when there's a more serious issue.

- [x] Verify that new techniques (see the changelog link above) are
available for mapping on the Rule Creation page under "Advanced
settings"
- [x] Verify that new techniques are available on the MITRE ATT&CK
coverage page

---------

Co-authored-by: Maxim Palenov <maxim.palenov@elastic.co>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
(cherry picked from commit 203cfc6)
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Apr 28, 2025
)

## Summary

Addresses: elastic#166152 for `8.18.1`
and elastic#203370

Updates MITRE ATT&CK mappings to `v16.1`. Last update was to `v15.1` in
elastic#183463.

To update,  I modified

https://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22

to point to the `ATT&CK-v16.1` tag.

Then ran `yarn extract-mitre-attacks` from the root `security_solution`
plugin directory, and then `node scripts/i18n_check.js --fix` from
Kibana root to regen the i18n files.

## Acceptance Criteria

- [x] User can map and use new MITRE techniques in Security Solution
- [ ] The user-facing documentation is updated with the new version
- [ ] [MITRE ATT&CK®
coverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)
page
    - [ ] elastic/security-docs#6797
    - [ ] elastic/docs-content#1292

## Test Criteria

This PR also updates our cypress tests which run with real MITRE data
generated by the same `extract_tactics_techniques_mitre` script. Our
tests would often break when the data was updated to a new version
because the UI elements being tested would cover each other leading to
flakiness or outright test failure. In order to ensure a more streamline
update process the tests should no longer break because of this
flakiness and only when there's a more serious issue.

- [x] Verify that new techniques (see the changelog link above) are
available for mapping on the Rule Creation page under "Advanced
settings"
- [x] Verify that new techniques are available on the MITRE ATT&CK
coverage page

---------

Co-authored-by: Maxim Palenov <maxim.palenov@elastic.co>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
(cherry picked from commit 203cfc6)
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Apr 28, 2025
)

## Summary

Addresses: elastic#166152 for `8.18.1`
and elastic#203370

Updates MITRE ATT&CK mappings to `v16.1`. Last update was to `v15.1` in
elastic#183463.

To update,  I modified

https://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22

to point to the `ATT&CK-v16.1` tag.

Then ran `yarn extract-mitre-attacks` from the root `security_solution`
plugin directory, and then `node scripts/i18n_check.js --fix` from
Kibana root to regen the i18n files.

## Acceptance Criteria

- [x] User can map and use new MITRE techniques in Security Solution
- [ ] The user-facing documentation is updated with the new version
- [ ] [MITRE ATT&CK®
coverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)
page
    - [ ] elastic/security-docs#6797
    - [ ] elastic/docs-content#1292

## Test Criteria

This PR also updates our cypress tests which run with real MITRE data
generated by the same `extract_tactics_techniques_mitre` script. Our
tests would often break when the data was updated to a new version
because the UI elements being tested would cover each other leading to
flakiness or outright test failure. In order to ensure a more streamline
update process the tests should no longer break because of this
flakiness and only when there's a more serious issue.

- [x] Verify that new techniques (see the changelog link above) are
available for mapping on the Rule Creation page under "Advanced
settings"
- [x] Verify that new techniques are available on the MITRE ATT&CK
coverage page

---------

Co-authored-by: Maxim Palenov <maxim.palenov@elastic.co>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
(cherry picked from commit 203cfc6)
kibanamachine added a commit that referenced this pull request Apr 28, 2025
…) (#219448)

# Backport

This will backport the following commits from `main` to `9.0`:
- [[Security Solution] Updates kibana MITRE data to `v16.1`
(#215026)](#215026)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Davis
Plumlee","email":"56367316+dplumlee@users.noreply.github.com"},"sourceCommit":{"committedDate":"2025-04-28T18:51:36Z","message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<maxim.palenov@elastic.co>\nCo-authored-by: Elastic Machine
<elasticmachine@users.noreply.github.com>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:enhancement","Team:Detections
and Resp","Team: SecuritySolution","Team:Detection Rule
Management","backport:version","Feature:Rule MITRE
ATT&CK®","v9.1.0","v8.19.0","v8.18.1","v9.0.1"],"title":"[Security
Solution] Updates kibana MITRE data to
`v16.1`","number":215026,"url":"https://github.com/elastic/kibana/pull/215026","mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<maxim.palenov@elastic.co>\nCo-authored-by: Elastic Machine
<elasticmachine@users.noreply.github.com>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},"sourceBranch":"main","suggestedTargetBranches":["8.19","8.18","9.0"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/215026","number":215026,"mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<maxim.palenov@elastic.co>\nCo-authored-by: Elastic Machine
<elasticmachine@users.noreply.github.com>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.18","label":"v8.18.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"9.0","label":"v9.0.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}]
BACKPORT-->

Co-authored-by: Davis Plumlee <56367316+dplumlee@users.noreply.github.com>
Co-authored-by: Maxim Palenov <maxim.palenov@elastic.co>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
kibanamachine added a commit that referenced this pull request Apr 28, 2025
) (#219447)

# Backport

This will backport the following commits from `main` to `8.19`:
- [[Security Solution] Updates kibana MITRE data to `v16.1`
(#215026)](#215026)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Davis
Plumlee","email":"56367316+dplumlee@users.noreply.github.com"},"sourceCommit":{"committedDate":"2025-04-28T18:51:36Z","message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<maxim.palenov@elastic.co>\nCo-authored-by: Elastic Machine
<elasticmachine@users.noreply.github.com>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:enhancement","Team:Detections
and Resp","Team: SecuritySolution","Team:Detection Rule
Management","backport:version","Feature:Rule MITRE
ATT&CK®","v9.1.0","v8.19.0","v8.18.1","v9.0.1"],"title":"[Security
Solution] Updates kibana MITRE data to
`v16.1`","number":215026,"url":"https://github.com/elastic/kibana/pull/215026","mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<maxim.palenov@elastic.co>\nCo-authored-by: Elastic Machine
<elasticmachine@users.noreply.github.com>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},"sourceBranch":"main","suggestedTargetBranches":["8.19","8.18","9.0"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/215026","number":215026,"mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<maxim.palenov@elastic.co>\nCo-authored-by: Elastic Machine
<elasticmachine@users.noreply.github.com>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.18","label":"v8.18.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"9.0","label":"v9.0.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}]
BACKPORT-->

Co-authored-by: Davis Plumlee <56367316+dplumlee@users.noreply.github.com>
Co-authored-by: Maxim Palenov <maxim.palenov@elastic.co>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
kibanamachine added a commit that referenced this pull request Apr 28, 2025
) (#219446)

# Backport

This will backport the following commits from `main` to `8.18`:
- [[Security Solution] Updates kibana MITRE data to `v16.1`
(#215026)](#215026)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Davis
Plumlee","email":"56367316+dplumlee@users.noreply.github.com"},"sourceCommit":{"committedDate":"2025-04-28T18:51:36Z","message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<maxim.palenov@elastic.co>\nCo-authored-by: Elastic Machine
<elasticmachine@users.noreply.github.com>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:enhancement","Team:Detections
and Resp","Team: SecuritySolution","Team:Detection Rule
Management","backport:version","Feature:Rule MITRE
ATT&CK®","v9.1.0","v8.19.0","v8.18.1","v9.0.1"],"title":"[Security
Solution] Updates kibana MITRE data to
`v16.1`","number":215026,"url":"https://github.com/elastic/kibana/pull/215026","mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<maxim.palenov@elastic.co>\nCo-authored-by: Elastic Machine
<elasticmachine@users.noreply.github.com>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},"sourceBranch":"main","suggestedTargetBranches":["8.19","8.18","9.0"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/215026","number":215026,"mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<maxim.palenov@elastic.co>\nCo-authored-by: Elastic Machine
<elasticmachine@users.noreply.github.com>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.18","label":"v8.18.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"9.0","label":"v9.0.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}]
BACKPORT-->

Co-authored-by: Davis Plumlee <56367316+dplumlee@users.noreply.github.com>
Co-authored-by: Maxim Palenov <maxim.palenov@elastic.co>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
akowalska622 pushed a commit to akowalska622/kibana that referenced this pull request May 29, 2025
)

## Summary

Addresses: elastic#166152 for `8.18.1`
and elastic#203370

Updates MITRE ATT&CK mappings to `v16.1`. Last update was to `v15.1` in
elastic#183463.

To update,  I modified 


https://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22

to point to the `ATT&CK-v16.1` tag.

Then ran `yarn extract-mitre-attacks` from the root `security_solution`
plugin directory, and then `node scripts/i18n_check.js --fix` from
Kibana root to regen the i18n files.

## Acceptance Criteria

- [x] User can map and use new MITRE techniques in Security Solution
- [ ] The user-facing documentation is updated with the new version
- [ ] [MITRE ATT&CK®
coverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)
page
    - [ ] elastic/security-docs#6797
    - [ ] elastic/docs-content#1292

## Test Criteria

This PR also updates our cypress tests which run with real MITRE data
generated by the same `extract_tactics_techniques_mitre` script. Our
tests would often break when the data was updated to a new version
because the UI elements being tested would cover each other leading to
flakiness or outright test failure. In order to ensure a more streamline
update process the tests should no longer break because of this
flakiness and only when there's a more serious issue.

- [x] Verify that new techniques (see the changelog link above) are
available for mapping on the Rule Creation page under "Advanced
settings"
- [x] Verify that new techniques are available on the MITRE ATT&CK
coverage page

---------

Co-authored-by: Maxim Palenov <maxim.palenov@elastic.co>
Co-authored-by: Elastic Machine <elasticmachine@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport:skip This PR does not require backporting Feature:Rule Management Security Solution Detection Rule Management area release_note:enhancement Team:Detection Rule Management Security Detection Rule Management Team Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v8.15.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants