Companies Home Search Profile

MITRE TRAM: Mapping Threat Reports to ATT&CK

Focused View

Vipul Dabhi

1:13:38

89 View
  • 1. TRAM Intro & Understanding why we need TRAM.mp4
    13:22
  • 2. Understanding Why we need TRAM..html
  • 1. Understanding TRAM.mp4
    19:16
  • 1. TRAM UBUNTU VM Setup.mp4
    11:15
  • 2. Ubuntu GUI Setup & TRAM Setup.mp4
    09:10
  • 3. TRAM Hands on.mp4
    20:35
  • Description


    Threat ATT&CK Report Mapper

    What You'll Learn?


    • Better Understanding of Threat generated and their mapping with Att&ck Live Framework
    • MITRE ATT&CK
    • TRAM Tool for Threat Report ATT&CK Mapper
    • Hands on TRAM Exercises

    Who is this for?


  • Security Professional
  • More details


    Description

    TRAM is a web-based tool that automates the extraction of adversary behaviors for the purpose of mapping them to ATT&CK.

    TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE ATT&®. TRAM enables researchers to test and refine Machine Learning (ML) models for identifying ATT&CK techniques in prose-based threat intel reports and allows threat intel analysts to train ML models and validate ML results.

    Through research into automating the mapping of cyber threat intel reports to ATT&CK, TRAM aims to reduce the cost and increase the effectiveness of integrating ATT&CK into cyber threat intelligence across the community. Threat intel providers, threat intel platforms, and analysts should be able to use TRAM to integrate ATT&CK more easily and consistently into their products.

    Threat Report ATT&CK Mapper (TRAM) aims to provide a streamlined approach for analyzing reports and extracting ATT&CK techniques. Our hope is that automating mapping to ATT&CK can reduce analyst fatigue, increase ATT&CK coverage, and improve consistency and accuracy of threat intelligence mappings. We are excited to now share a public beta of TRAM with the ATT&CK community.


    TRAM Under the Hood:


    1. Get Data : STIX & TAXII >> TIP

    2. Clean the Data.

    3. Train Model.

    4. Collect Reports. >> Report Uploading

    5. Test Data.(Through ML Models).

    6. Accept or Review Model Decisions.(Score & Technique).

    7. Feedback loop.


    How TRAM is a Enabler:


    1. Make it easier to get started with ATT&CK.

    2. Remembering 266+ techniques is hard.>> Not only 266+ but is ever growing..>> MITRE ATT&CK is a Live framework.

    3. Use Reporting which is important.

    Who this course is for:

    • Security Professional

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    This is Vipul Dabhi your course Instructor, I am Cyber Security & Cloud Security Practitoner from various cloud provider like Oracle Cloud Infrastructure, Amazon Web Service, Azure Cloud, Alibaba Cloud.I have certification in :Azure Cloud(AZ 900 Azure Fundamentals, AZ 500 Azure Security Specialization), Alibaba Cloud (Alibaba Fundamentals & Alibaba Cloud Security Associate) & Oracle Cloud Infrastructure.(OCI Associate).With this Udemy Channel my motive is to bring information on various Cloud Security, Emerging Cloud Security tools like Sentinel, Defender ATP,MCAS, Cyber threat, Attacks,Payload they carry to breach your native system.Will include Case Studies and other emerging cyber security labs and Course through this very native Udemy Channel.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 5
    • duration 1:13:38
    • Release Date 2023/02/14