-
Notifications
You must be signed in to change notification settings - Fork 0
Add MITRE ATT&CK mapping to findings #5
Copy link
Copy link
Open
Labels
detectionThreat detection and analysisThreat detection and analysisenhancementNew feature or requestNew feature or request
Description
Summary
Systematically map all findings to MITRE ATT&CK techniques (Enterprise + ICS matrices).
Requirements
- Create a mapping table/enum of relevant ATT&CK technique IDs
- Ensure every Finding produced by analyzers includes
mitre_techniquewhen applicable - Support both Enterprise and ICS ATT&CK matrices
- Add a
--mitreCLI flag to show ATT&CK technique details in terminal output - Group findings by tactic in the report (Reconnaissance, Lateral Movement, C2, etc.)
Key Mappings
- Port scanning → T1046 (Network Service Discovery)
- DNS tunneling → T1071.004 (DNS Protocol)
- Beaconing → T1071/T1573
- Credential sniffing → T1040 (Network Sniffing)
- Modbus writes → T0855 (Unauthorized Command Message)
Acceptance Criteria
- ATT&CK technique enum/constants with descriptions
- All analyzers populate
mitre_techniquefield - Terminal reporter groups by tactic when
--mitreis set - JSON/CSV include technique IDs
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
detectionThreat detection and analysisThreat detection and analysisenhancementNew feature or requestNew feature or request