The Zurich release has arrived! Interested in new features and functionalities? Click here for more

Need help mapping MITRE Techniques from Azure Sentinel to map to SIR tactics and Technique

Pooja P
Tera Contributor

Hi Team,

 

We are building integration between Microsoft Azure sentinel to ServiceNow SIR record. Sentinel has MITRE Technique ID and we want to fetch that ID and map it to Tactics and techniques in SIR record fields.

 

Please be informed we have Threat Intelligence plugin active in our instance.

 

Any urgent response will help us.

 

Thanks,

Pooja

7 REPLIES 7

andy_ojha
ServiceNow Employee
ServiceNow Employee

Hi there.

 

By chance have you opened a ServiceNow Support Case for assistance?   

 

The Store App integration available today, combined with Threat Intelligence (from SIR, not TISC) should do the trick, with a few configuration updates.

 

After you install the Azure Sentinel for SIR Store App, you may need to update a property that sets what version of the Azure Sentinel Incident API is used.   This is because, the default version it is set to use, only pulls MITRE Tactics and not Techniques.

Then you would ensure you have the MITRE Technique Exraction Rule feature setup for Azure Sentinel 

 

 

 

Hi @andy_ojha ,

 

Thank you for the reply , we have already configured Integration between Sentinel and SIR in servicenow. Kindly correct me if my steps to be flowed for further is 

1. Update the version of system property "sentinel_security_incident_api_version".

2. Create Extraction rule as attached in screenshot.

Please be informed our Integration configuration and Azure profiles are in Particular domain.

 

are these steps enough or do we need to write any BR to map technique and tactics?

Kindly suggest. Thanks in advance!

Regards,

Pooja

 

andy_ojha
ServiceNow Employee
ServiceNow Employee

Hey there - that should work.

 

You may need to test that Extraction Rule (SIEM, with that Field Incident Raw).   Another object/field that may work (based on your testing) is -> `properties(additionalData(tactics))` ...if `IncidentRaw` does not work.

Hi @andy_ojha ,

After updating version below is the payload for technique and tactics

properties(additionalData(tactics))":{"value":"Persistence"},"properties(additionalData(techniques))":{"value":"T1078, T1098"}," 

OR

properties(additionalData(tactics))":{"value":"DefenseEvasion"},"properties(additionalData(techniques))":{"value":"T1562"}

 

But with extraction rule written as suggested are not updating SIR record field values for MITRE Technique and tactic.

 

Can you please suggest how can we update these SIR fields with provided payload.

 

Thanks in advance!

Pooja