If you have both Carbon Black Cloud Endpoint Standard and Carbon Black Cloud Enterprise EDR, you can combine CB Analytics Alerts and Watchlist Hits for a unified view of MITRE.

Required Product: Carbon Black Cloud Endpoint Standard and Carbon Black Cloud Enterprise EDR

Required Data: Alerts (App Input or Data Forwarder), Watchlist Hits (Data Forwarder)

Top MITRE TIDs by Endpoint Count, including Technique Name and Data Source

eventtype="vmware_cbc_cb_analytics" 
| rename threat_indicators{}.ttps{} as mitre_ttps
| mvexpand mitre_ttps
| rex field=mitre_ttps "^MITRE_(?<mitre_tid>T\d+(\_\d{3})?)_(?<mitre_tid_name>.*)$" 
| where not isnull(mitre_tid)
| eval mitre_tid = lower(mitre_tid), source = "CB Analytics Alerts"
| fields device_id, device_name, mitre_tid, mitre_tid_name, source
| append [
  search eventtype="vmware_cbc_base_index" sourcetype="vmware:cbc:s3:watchlist:hits" 
  | rename report_tags{} as mitre_tids
  | mvexpand mitre_tids 
  | regex mitre_tids="^t\d+$" 
  | eval mitre_tid_name = report_name, source = "Watchlist Hits"
  | fields device_id, device_name, mitre_tid, mitre_tid_name, source
]
| stats 
  dc(mitre_tid) as mitre_tid_count 
  values(mitre_tid) as mitre_tids,
  values(mitre_tid_name) as mitre_tid_names,
  values(source) as sources
  by device_id, device_name
| sort -mitre_tid_count

Combined query results using CB Analytics and MITRE data