Query Details
// DefenderXDR MITRE ATT&CK Technique Analysis AlertEvidence |where Timestamp > ago(30d) | mv-expand parse_json(AttackTechniques) | where isnotempty(AttackTechniques) | summarize TechniqueCount=count() by tostring(AttackTechniques) | sort by TechniqueCount // Export the result as a CSV // Copilot Prompt: // Can you help me generate MITRE ATT&CK Techniques heatmap using standard MITRE ATT&CK Enterprise framework with the attached CSV data?
Sure! Here's a simple summary of the query:
AlertEvidence table.AttackTechniques field, which is in JSON format, into individual records.AttackTechniques is empty.The final result is a list of attack techniques and how often each one was observed in the last 30 days, sorted by frequency. This result can then be exported as a CSV file.
The Copilot prompt is asking for help to generate a heatmap of MITRE ATT&CK Techniques using the standard MITRE ATT&CK Enterprise framework and the data from the CSV file generated by this query.

Steven Lim
Released: September 8, 2024
Tables
Keywords
Operators