AttackRuleMap Logo

AttackRuleMap

0
Free
Visit Website

AttackRuleMap (ARM) is a mapping tool that correlates open-source detection rules and atomic tests to help security teams understand detection coverage. The tool provides a comprehensive mapping between: - MITRE ATT&CK techniques and tactics - Atomic Red Team test cases - Sigma detection rules - Splunk detection rules Key capabilities include: - Mapping of atomic test cases to corresponding detection rules - Cross-referencing between different detection rule formats - Platform-specific detection coverage analysis - Identification of gaps in detection capabilities - Support for Windows, Linux and ESXi platforms The mapping data is organized in a tabular format containing: - Technique IDs - Atomic attack names and GUIDs - Platform information - Associated Sigma rules - Corresponding Splunk detection rules This correlation helps security teams: - Validate detection coverage against known attack techniques - Identify areas requiring additional detection rules - Plan and prioritize detection engineering efforts - Test detection capabilities using mapped atomic tests

FEATURES

ALTERNATIVES

QRadio is a tool/framework designed to consolidate cyber threats intelligence sources.

Scan files with Yara, match findings to VirusTotal comments.

Maltrail is a malicious traffic detection system utilizing blacklists and heuristic mechanisms.

An extendable tool to extract and aggregate IOCs from threat feeds, integrates with ThreatKB and MISP.

A library of Amazon S3 attack scenarios with mitigation strategies.

A set of rules for detecting threats in various formats, including Snort, Yara, ClamAV, and HXIOC.

Aggregates security threats from online sources and outputs to various formats.

CINSscore.com provides Threat Intelligence database with accurate IP scores and collective defense through community and Sentinel IPS unit sourced data.

PINNED