技能 编程开发 MITRE Navigator分析APT战术

MITRE Navigator分析APT战术

v20260317
analyzing-threat-actor-ttps-with-mitre-navigator
通过 attackcti 查询 STIX/TAXII 数据并生成 ATT&CK Navigator 图层,映射 APT 组织 TTP,评估检测覆盖缺口,便于防御团队联动研判。
获取技能
128 次下载
概览

Analyzing Threat Actor TTPs with MITRE Navigator

Overview

The MITRE ATT&CK Navigator is a web application for annotating and visualizing ATT&CK matrices. Combined with the attackcti Python library (which queries ATT&CK STIX data via TAXII), analysts can programmatically generate Navigator layer files mapping specific threat group TTPs, compare multiple groups, and assess detection coverage gaps against known adversaries.

Prerequisites

  • Python 3.8+ with attackcti and stix2 libraries installed
  • MITRE ATT&CK Navigator (web UI or local instance)
  • Understanding of STIX 2.1 objects and relationships

Steps

  1. Query ATT&CK STIX data for target threat group using attackcti
  2. Extract techniques associated with the group via STIX relationships
  3. Generate ATT&CK Navigator layer JSON with technique annotations
  4. Overlay detection coverage to identify gaps
  5. Export layer for team review and defensive planning

Expected Output

{
  "name": "APT29 TTPs",
  "domain": "enterprise-attack",
  "techniques": [
    {"techniqueID": "T1566.001", "score": 1, "comment": "Spearphishing Attachment"},
    {"techniqueID": "T1059.001", "score": 1, "comment": "PowerShell"}
  ]
}
信息
Category 编程开发
Name analyzing-threat-actor-ttps-with-mitre-navigator
版本 v20260317
大小 9.16KB
更新时间 2026-03-18
语言