├── LICENSE ├── MITRE_EDR_eval1.csv ├── MITRE_EDR_eval_round1.sh ├── README.md └── output.png /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2018 Ziyad Alshehri 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /MITRE_EDR_eval1.csv: -------------------------------------------------------------------------------- 1 | Vendor,None,Telemetry,IOC,GeneralBehavior,SpecificBehavior,Delayed,Tainted,ConfigChange,Enrichment 2 | CarbonBlack,35,213,0,5,29,0,0,0,113 3 | CounterTack,40,152,0,9,11,0,89,0,64 4 | CrowdStrike,31,207,0,144,60,87,79,0,14 5 | Endgame,35,180,0,35,49,49,150,0,59 6 | Microsoft,29,248,1,51,39,33,70,0,10 7 | RSA,62,160,0,0,0,0,0,0,1 8 | SentinelOne,37,207,0,5,0,0,91,0,10 9 | -------------------------------------------------------------------------------- /MITRE_EDR_eval_round1.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | # Requires jq, and an unbiased mind! 3 | 4 | # 🎨 5 | YELLOW="\033[0;33m" 6 | RED="\033[1;31m" 7 | GREEN="\033[1;32m" 8 | NOCOLOR="\033[0m" 9 | 10 | # Listing our contestants 🏎 11 | declare -a Vendors=("CarbonBlack" "CounterTack" "CrowdStrike" "Endgame" "Microsoft" "RSA" "SentinelOne") 12 | 13 | # Generating a CSV file, save as MITRE_EDR_eval1.csv 14 | echo "Vendor,None,Telemetry,IOC,GeneralBehavior,SpecificBehavior,Delayed,Tainted,ConfigChange,Enrichment" >> MITRE_EDR_eval1.csv 15 | 16 | echo 17 | for Vendor in "${Vendors[@]}" 18 | do 19 | echo -e "${YELLOW}$Vendor${NOCOLOR}" 20 | 21 | # Setting up variables for our metrics 22 | none=$(curl -s https://attackevals.mitre.org/$Vendor.1.APT3.1_Results.json | jq . | grep "None" | wc -l | awk '{printf("%s",$1)}' | awk '{printf("%s",$1)}') 23 | tele=$(curl -s https://attackevals.mitre.org/$Vendor.1.APT3.1_Results.json | jq . | grep "Telemetry" | wc -l | awk '{printf("%s",$1)}') 24 | ioc=$(curl -s https://attackevals.mitre.org/$Vendor.1.APT3.1_Results.json | jq . | grep "Indicator of Compromise" | wc -l | awk '{printf("%s",$1)}') 25 | g_behav=$(curl -s https://attackevals.mitre.org/$Vendor.1.APT3.1_Results.json | jq . | grep "General Behavior" | wc -l | awk '{printf("%s",$1)}') 26 | s_behav=$(curl -s https://attackevals.mitre.org/$Vendor.1.APT3.1_Results.json | jq . | grep "Specific Behavior" | wc -l | awk '{printf("%s",$1)}') 27 | delayed=$(curl -s https://attackevals.mitre.org/$Vendor.1.APT3.1_Results.json | jq . | grep "Delayed" | wc -l | awk '{printf("%s",$1)}') 28 | tainted=$(curl -s https://attackevals.mitre.org/$Vendor.1.APT3.1_Results.json | jq . | grep "Tainted" | wc -l | awk '{printf("%s",$1)}') 29 | conf_change=$(curl -s https://attackevals.mitre.org/$Vendor.1.APT3.1_Results.json | jq . | grep "Config Change" | wc -l | awk '{printf("%s",$1)}') 30 | enrichment=$(curl -s https://attackevals.mitre.org/$Vendor.1.APT3.1_Results.json | jq . | grep "Enrichment" | wc -l | awk '{printf("%s",$1)}') 31 | 32 | # Adding to the CSV file 33 | echo "$Vendor,`echo "$none"`,`echo "$tele"`,`echo "$ioc"`,`echo "$g_behav"`,`echo "$s_behav"`,`echo "$delayed"`,`echo "$tainted"`,`echo "$conf_change"`,`echo "$enrichment"`" >> MITRE_EDR_eval1.csv 34 | 35 | # Printing the main results, uncomment all lines for the additional ones 36 | # Review (https://attackevals.mitre.org/methodology/detection-categorization.html) 37 | echo -e "\t${RED}None${NOCOLOR} :\t\t\t `echo "$none"`" 38 | echo -e "\t${GREEN}Telemetry${NOCOLOR} :\t\t `echo "$tele"`" 39 | echo -e "\t${GREEN}IOC${NOCOLOR} :\t\t\t `echo "$ioc"`" 40 | echo -e "\t${GREEN}General Behavior${NOCOLOR} :\t `echo "$g_behav"`" 41 | echo -e "\t${GREEN}Specific Behavior${NOCOLOR} :\t `echo "$s_behav"`" 42 | # echo -e "\t${RED}Delayed${NOCOLOR} :\t\t `echo "$delayed"`" 43 | # echo -e "\t${RED}Tainted${NOCOLOR} :\t\t `echo "$tainted"`" 44 | # echo -e "\t${RED}Config Change${NOCOLOR} :\t\t `echo "$conf_change"`" 45 | echo -e "\t${GREEN}Enrichment${NOCOLOR} :\t\t `echo "$enrichment"`\n" 46 | echo "==========================================" 47 | echo 48 | 49 | done 50 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | ## MITRE EDR Evaluation Reporter 2 | 3 | MITRE recently published the results of their EDR evaluation (the very first round), which is purely based on the Adversary Emulation Approach, and the [ATT&CK](https://attack.mitre.org/) matrix. 4 | 5 | > MITRE ATT&CK™ is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community. 6 | 7 | ## Objectives 8 | 9 | MITRE posted the results in great detail [here](https://attackevals.mitre.org), however, parsing the different JSON report files is no fun. This script pulls the detection rate of the attack techniques on each product, and genearte a text & csv outputs. 10 | 11 |
12 |
13 |