Integrating Tines’ automation platform with the MITRE ATT&CK framework empowers security teams to streamline incident response and enhance threat detection with actionable intelligence.
Explore pre-built workflows for MITRE. Use them for inspiration or as a starting point to build your custom automation solution.
Generate MITRE ATT&CK technique and tactic tags for security alerts using a send to story. Add the MITRE ATT&CK tags to new Tines cases using a webhook, or old cases.
Tools: MITRE
Retrieve objects from specified MITRE ATT&CK collections using TAXII. Post a Slack message with details on any new objects.
Tools: MITRE, Slack
Filter cases in your tenant using a Tines page. Access a MITRE ATT&CK Navigator page showing techniques color-coded by the number of associated cases.
Tools: MITRE
This workflow creates an index of the MITRE ATT&CK framework in Elasticsearch with semantic search capabilities. It enables analysts to efficiently search and correlate MITRE techniques to an alert or ticket description even when exact keywords aren’t used. This enhances threat detection, incident response, and security strategy by providing deeper insights into potential threats.
Tools: Elastic, MITRE
With Tines, you can easily take any action that has a defined API using an HTTP request. To build even more quickly, copy a cURL command and paste it into the storyboard.
cURL request
curl -v -X GET --location "https://api.nasa.gov/neo/rest/v1/neo/browse?api_key=DEMO_KEY" -H 'Content-Type: application/json'
Paste in your Tines story
It takes minutes, not months, to connect to tools in Tines.
Check out our blogs, browse our learning paths, and more.
Tines blog
Update from Tines; the smart, secure workflow builder for your whole team.
Go to blog
Case studies
Discover how companies – from Fortune 10 to startups – apply Tines to transform the way their teams operate.
Read case studies
Learn
Build your knowledge with dedicated learning paths at all levels.
Start learning
Learn
Go to docs