Skip to content

[Security Solution] Updates kibana MITRE data to v16.1 #215026

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 9 commits into from
Apr 28, 2025

Conversation

dplumlee
Copy link
Contributor

@dplumlee dplumlee commented Mar 18, 2025

Summary

Addresses: #166152 for 8.18.1 and #203370

Updates MITRE ATT&CK mappings to v16.1. Last update was to v15.1 in #183463.

To update, I modified

const MITRE_CONTENT_VERSION = 'ATT&CK-v15.1'; // last updated when preparing for 8.15.0 release

to point to the ATT&CK-v16.1 tag.

Then ran yarn extract-mitre-attacks from the root security_solution plugin directory, and then node scripts/i18n_check.js --fix from Kibana root to regen the i18n files.

Acceptance Criteria

Test Criteria

This PR also updates our cypress tests which run with real MITRE data generated by the same extract_tactics_techniques_mitre script. Our tests would often break when the data was updated to a new version because the UI elements being tested would cover each other leading to flakiness or outright test failure. In order to ensure a more streamline update process the tests should no longer break because of this flakiness and only when there's a more serious issue.

  • Verify that new techniques (see the changelog link above) are available for mapping on the Rule Creation page under "Advanced settings"
  • Verify that new techniques are available on the MITRE ATT&CK coverage page

@dplumlee dplumlee added release_note:enhancement v9.0.0 Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. Team:Detection Rule Management Security Detection Rule Management Team backport:version Backport to applied version labels Feature:Rule MITRE ATT&CK® Security Solution Detection Rules MITRE ATT&CK® features v9.1.0 v8.19.0 labels Mar 18, 2025
@dplumlee dplumlee self-assigned this Mar 18, 2025
@dplumlee dplumlee added v9.0.1 and removed v9.0.0 labels Mar 25, 2025
@dplumlee dplumlee marked this pull request as ready for review March 25, 2025 22:37
@dplumlee dplumlee requested review from a team as code owners March 25, 2025 22:37
@dplumlee dplumlee requested a review from maximpn March 25, 2025 22:37
@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detections-response (Team:Detections and Resp)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-solution (Team: SecuritySolution)

@elasticmachine
Copy link
Contributor

Pinging @elastic/security-detection-rule-management (Team:Detection Rule Management)

Copy link
Contributor

@maximpn maximpn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@dplumlee Thanks for updating MIRE data to the latest version 🙏

New techniques and sub-techniques were added and Protocol Impersonation (T1001.003) has been renamed to Protocol or Service Impersonation (T1001.003). Nothing was removed making this upgrade safe.

I doubled checked rule management functionality works locally with this functionality and haven't found any issues.

@banderror
Copy link
Contributor

@elasticmachine merge upstream

@elasticmachine
Copy link
Contributor

💛 Build succeeded, but was flaky

Failed CI Steps

Test Failures

  • [job] [logs] FTR Configs #105 / InfraOps App Metrics UI Hosts View "after all" hook in "Hosts View"
  • [job] [logs] FTR Configs #105 / InfraOps App Metrics UI Hosts View "before all" hook in "Hosts View"

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
securitySolution 9.1MB 9.1MB +6.7KB

History

cc @dplumlee

@banderror
Copy link
Contributor

@dplumlee Can we merge the PR?

@dplumlee
Copy link
Contributor Author

@banderror yes, today is the day

@dplumlee
Copy link
Contributor Author

@elasticmachine merge upstream

@dplumlee dplumlee merged commit 203cfc6 into elastic:main Apr 28, 2025
9 checks passed
@kibanamachine
Copy link
Contributor

Starting backport for target branches: 8.18, 8.19, 9.0

https://github.com/elastic/kibana/actions/runs/14715518543

kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Apr 28, 2025
)

## Summary

Addresses: elastic#166152 for `8.18.1`
and elastic#203370

Updates MITRE ATT&CK mappings to `v16.1`. Last update was to `v15.1` in
elastic#183463.

To update,  I modified

https://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22

to point to the `ATT&CK-v16.1` tag.

Then ran `yarn extract-mitre-attacks` from the root `security_solution`
plugin directory, and then `node scripts/i18n_check.js --fix` from
Kibana root to regen the i18n files.

## Acceptance Criteria

- [x] User can map and use new MITRE techniques in Security Solution
- [ ] The user-facing documentation is updated with the new version
- [ ] [MITRE ATT&CK®
coverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)
page
    - [ ] elastic/security-docs#6797
    - [ ] elastic/docs-content#1292

## Test Criteria

This PR also updates our cypress tests which run with real MITRE data
generated by the same `extract_tactics_techniques_mitre` script. Our
tests would often break when the data was updated to a new version
because the UI elements being tested would cover each other leading to
flakiness or outright test failure. In order to ensure a more streamline
update process the tests should no longer break because of this
flakiness and only when there's a more serious issue.

- [x] Verify that new techniques (see the changelog link above) are
available for mapping on the Rule Creation page under "Advanced
settings"
- [x] Verify that new techniques are available on the MITRE ATT&CK
coverage page

---------

Co-authored-by: Maxim Palenov <[email protected]>
Co-authored-by: Elastic Machine <[email protected]>
(cherry picked from commit 203cfc6)
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Apr 28, 2025
)

## Summary

Addresses: elastic#166152 for `8.18.1`
and elastic#203370

Updates MITRE ATT&CK mappings to `v16.1`. Last update was to `v15.1` in
elastic#183463.

To update,  I modified

https://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22

to point to the `ATT&CK-v16.1` tag.

Then ran `yarn extract-mitre-attacks` from the root `security_solution`
plugin directory, and then `node scripts/i18n_check.js --fix` from
Kibana root to regen the i18n files.

## Acceptance Criteria

- [x] User can map and use new MITRE techniques in Security Solution
- [ ] The user-facing documentation is updated with the new version
- [ ] [MITRE ATT&CK®
coverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)
page
    - [ ] elastic/security-docs#6797
    - [ ] elastic/docs-content#1292

## Test Criteria

This PR also updates our cypress tests which run with real MITRE data
generated by the same `extract_tactics_techniques_mitre` script. Our
tests would often break when the data was updated to a new version
because the UI elements being tested would cover each other leading to
flakiness or outright test failure. In order to ensure a more streamline
update process the tests should no longer break because of this
flakiness and only when there's a more serious issue.

- [x] Verify that new techniques (see the changelog link above) are
available for mapping on the Rule Creation page under "Advanced
settings"
- [x] Verify that new techniques are available on the MITRE ATT&CK
coverage page

---------

Co-authored-by: Maxim Palenov <[email protected]>
Co-authored-by: Elastic Machine <[email protected]>
(cherry picked from commit 203cfc6)
kibanamachine pushed a commit to kibanamachine/kibana that referenced this pull request Apr 28, 2025
)

## Summary

Addresses: elastic#166152 for `8.18.1`
and elastic#203370

Updates MITRE ATT&CK mappings to `v16.1`. Last update was to `v15.1` in
elastic#183463.

To update,  I modified

https://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22

to point to the `ATT&CK-v16.1` tag.

Then ran `yarn extract-mitre-attacks` from the root `security_solution`
plugin directory, and then `node scripts/i18n_check.js --fix` from
Kibana root to regen the i18n files.

## Acceptance Criteria

- [x] User can map and use new MITRE techniques in Security Solution
- [ ] The user-facing documentation is updated with the new version
- [ ] [MITRE ATT&CK®
coverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)
page
    - [ ] elastic/security-docs#6797
    - [ ] elastic/docs-content#1292

## Test Criteria

This PR also updates our cypress tests which run with real MITRE data
generated by the same `extract_tactics_techniques_mitre` script. Our
tests would often break when the data was updated to a new version
because the UI elements being tested would cover each other leading to
flakiness or outright test failure. In order to ensure a more streamline
update process the tests should no longer break because of this
flakiness and only when there's a more serious issue.

- [x] Verify that new techniques (see the changelog link above) are
available for mapping on the Rule Creation page under "Advanced
settings"
- [x] Verify that new techniques are available on the MITRE ATT&CK
coverage page

---------

Co-authored-by: Maxim Palenov <[email protected]>
Co-authored-by: Elastic Machine <[email protected]>
(cherry picked from commit 203cfc6)
@kibanamachine
Copy link
Contributor

💚 All backports created successfully

Status Branch Result
8.18
8.19
9.0

Note: Successful backport PRs will be merged automatically after passing CI.

Questions ?

Please refer to the Backport tool documentation

@dplumlee dplumlee deleted the mitre-16.1-update branch April 28, 2025 19:02
kibanamachine added a commit that referenced this pull request Apr 28, 2025
…) (#219448)

# Backport

This will backport the following commits from `main` to `9.0`:
- [[Security Solution] Updates kibana MITRE data to `v16.1`
(#215026)](#215026)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Davis
Plumlee","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-04-28T18:51:36Z","message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<[email protected]>\nCo-authored-by: Elastic Machine
<[email protected]>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:enhancement","Team:Detections
and Resp","Team: SecuritySolution","Team:Detection Rule
Management","backport:version","Feature:Rule MITRE
ATT&CK®","v9.1.0","v8.19.0","v8.18.1","v9.0.1"],"title":"[Security
Solution] Updates kibana MITRE data to
`v16.1`","number":215026,"url":"https://github.com/elastic/kibana/pull/215026","mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<[email protected]>\nCo-authored-by: Elastic Machine
<[email protected]>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},"sourceBranch":"main","suggestedTargetBranches":["8.19","8.18","9.0"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/215026","number":215026,"mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<[email protected]>\nCo-authored-by: Elastic Machine
<[email protected]>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.18","label":"v8.18.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"9.0","label":"v9.0.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}]
BACKPORT-->

Co-authored-by: Davis Plumlee <[email protected]>
Co-authored-by: Maxim Palenov <[email protected]>
Co-authored-by: Elastic Machine <[email protected]>
kibanamachine added a commit that referenced this pull request Apr 28, 2025
) (#219447)

# Backport

This will backport the following commits from `main` to `8.19`:
- [[Security Solution] Updates kibana MITRE data to `v16.1`
(#215026)](#215026)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Davis
Plumlee","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-04-28T18:51:36Z","message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<[email protected]>\nCo-authored-by: Elastic Machine
<[email protected]>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:enhancement","Team:Detections
and Resp","Team: SecuritySolution","Team:Detection Rule
Management","backport:version","Feature:Rule MITRE
ATT&CK®","v9.1.0","v8.19.0","v8.18.1","v9.0.1"],"title":"[Security
Solution] Updates kibana MITRE data to
`v16.1`","number":215026,"url":"https://github.com/elastic/kibana/pull/215026","mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<[email protected]>\nCo-authored-by: Elastic Machine
<[email protected]>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},"sourceBranch":"main","suggestedTargetBranches":["8.19","8.18","9.0"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/215026","number":215026,"mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<[email protected]>\nCo-authored-by: Elastic Machine
<[email protected]>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.18","label":"v8.18.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"9.0","label":"v9.0.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}]
BACKPORT-->

Co-authored-by: Davis Plumlee <[email protected]>
Co-authored-by: Maxim Palenov <[email protected]>
Co-authored-by: Elastic Machine <[email protected]>
kibanamachine added a commit that referenced this pull request Apr 28, 2025
) (#219446)

# Backport

This will backport the following commits from `main` to `8.18`:
- [[Security Solution] Updates kibana MITRE data to `v16.1`
(#215026)](#215026)

<!--- Backport version: 9.6.6 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Davis
Plumlee","email":"[email protected]"},"sourceCommit":{"committedDate":"2025-04-28T18:51:36Z","message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<[email protected]>\nCo-authored-by: Elastic Machine
<[email protected]>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:enhancement","Team:Detections
and Resp","Team: SecuritySolution","Team:Detection Rule
Management","backport:version","Feature:Rule MITRE
ATT&CK®","v9.1.0","v8.19.0","v8.18.1","v9.0.1"],"title":"[Security
Solution] Updates kibana MITRE data to
`v16.1`","number":215026,"url":"https://github.com/elastic/kibana/pull/215026","mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<[email protected]>\nCo-authored-by: Elastic Machine
<[email protected]>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},"sourceBranch":"main","suggestedTargetBranches":["8.19","8.18","9.0"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/215026","number":215026,"mergeCommit":{"message":"[Security
Solution] Updates kibana MITRE data to `v16.1` (#215026)\n\n##
Summary\n\nAddresses: #166152
for `8.18.1`\nand
https://github.com/elastic/kibana/issues/203370\n\nUpdates MITRE ATT&CK
mappings to `v16.1`. Last update was to `v15.1`
in\nhttps://github.com//pull/183463.\n\nTo update, I
modified
\n\n\nhttps://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22\n\nto
point to the `ATT&CK-v16.1` tag.\n\nThen ran `yarn
extract-mitre-attacks` from the root `security_solution`\nplugin
directory, and then `node scripts/i18n_check.js --fix` from\nKibana root
to regen the i18n files.\n\n## Acceptance Criteria\n\n- [x] User can map
and use new MITRE techniques in Security Solution\n- [ ] The user-facing
documentation is updated with the new version\n- [ ] [MITRE
ATT&CK®\ncoverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)\npage\n
- [ ] https://github.com/elastic/security-docs/pull/6797\n - [ ]
https://github.com/elastic/docs-content/pull/1292\n\n## Test
Criteria\n\nThis PR also updates our cypress tests which run with real
MITRE data\ngenerated by the same `extract_tactics_techniques_mitre`
script. Our\ntests would often break when the data was updated to a new
version\nbecause the UI elements being tested would cover each other
leading to\nflakiness or outright test failure. In order to ensure a
more streamline\nupdate process the tests should no longer break because
of this\nflakiness and only when there's a more serious issue.\n\n- [x]
Verify that new techniques (see the changelog link above) are\navailable
for mapping on the Rule Creation page under \"Advanced\nsettings\"\n-
[x] Verify that new techniques are available on the MITRE
ATT&CK\ncoverage page\n\n---------\n\nCo-authored-by: Maxim Palenov
<[email protected]>\nCo-authored-by: Elastic Machine
<[email protected]>","sha":"203cfc67ea5be4afdbb969a8ead2f45acd94a702"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"8.18","label":"v8.18.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"},{"branch":"9.0","label":"v9.0.1","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}]
BACKPORT-->

Co-authored-by: Davis Plumlee <[email protected]>
Co-authored-by: Maxim Palenov <[email protected]>
Co-authored-by: Elastic Machine <[email protected]>
dplumlee added a commit to elastic/docs-content that referenced this pull request May 6, 2025
## Summary
Related to: elastic/kibana#215026

Updates MITRE related documentation to currently used version `16.1`

Co-authored-by: Nastasha Solomon <[email protected]>
akowalska622 pushed a commit to akowalska622/kibana that referenced this pull request May 29, 2025
)

## Summary

Addresses: elastic#166152 for `8.18.1`
and elastic#203370

Updates MITRE ATT&CK mappings to `v16.1`. Last update was to `v15.1` in
elastic#183463.

To update,  I modified 


https://github.com/elastic/kibana/blob/df55627b2d695b8721928cb453db31e2b5cb73a4/x-pack/solutions/security/plugins/security_solution/scripts/extract_tactics_techniques_mitre.js#L22

to point to the `ATT&CK-v16.1` tag.

Then ran `yarn extract-mitre-attacks` from the root `security_solution`
plugin directory, and then `node scripts/i18n_check.js --fix` from
Kibana root to regen the i18n files.

## Acceptance Criteria

- [x] User can map and use new MITRE techniques in Security Solution
- [ ] The user-facing documentation is updated with the new version
- [ ] [MITRE ATT&CK®
coverage](https://www.elastic.co/guide/en/security/master/rules-coverage.html)
page
    - [ ] elastic/security-docs#6797
    - [ ] elastic/docs-content#1292

## Test Criteria

This PR also updates our cypress tests which run with real MITRE data
generated by the same `extract_tactics_techniques_mitre` script. Our
tests would often break when the data was updated to a new version
because the UI elements being tested would cover each other leading to
flakiness or outright test failure. In order to ensure a more streamline
update process the tests should no longer break because of this
flakiness and only when there's a more serious issue.

- [x] Verify that new techniques (see the changelog link above) are
available for mapping on the Rule Creation page under "Advanced
settings"
- [x] Verify that new techniques are available on the MITRE ATT&CK
coverage page

---------

Co-authored-by: Maxim Palenov <[email protected]>
Co-authored-by: Elastic Machine <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport:version Backport to applied version labels Feature:Rule MITRE ATT&CK® Security Solution Detection Rules MITRE ATT&CK® features release_note:enhancement Team:Detection Rule Management Security Detection Rule Management Team Team:Detections and Resp Security Detection Response Team Team: SecuritySolution Security Solutions Team working on SIEM, Endpoint, Timeline, Resolver, etc. v8.18.1 v8.19.0 v9.0.1 v9.1.0
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants