Назад към всички

MITRE ATT&CK Skill

// MITRE ATT&CK framework mapping and analysis

$ git log --oneline --stat
stars:384
forks:73
updated:March 4, 2026
SKILL.mdreadonly
SKILL.md Frontmatter
nameMITRE ATT&CK Skill
descriptionMITRE ATT&CK framework mapping and analysis
allowed-toolsBash,Read,Write,Edit,Glob,Grep,WebFetch

MITRE ATT&CK Skill

Overview

This skill provides MITRE ATT&CK framework mapping, analysis, and adversary emulation capabilities.

Capabilities

  • Map TTPs to ATT&CK techniques
  • Generate ATT&CK Navigator layers
  • Query ATT&CK STIX data
  • Create attack patterns and campaigns
  • Analyze technique coverage
  • Generate detection mappings
  • Support ATT&CK ICS and Mobile
  • Create adversary emulation plans

Target Processes

  • red-team-operations.js
  • purple-team-exercise.js
  • threat-intelligence-research.js
  • malware-analysis.js

Dependencies

  • ATT&CK STIX data (via TAXII or local)
  • ATT&CK Navigator
  • mitreattack-python library
  • Python 3.x

Usage Context

This skill is essential for:

  • Adversary emulation planning
  • Detection gap analysis
  • Threat intelligence correlation
  • Red team operation planning
  • Security posture assessment

Integration Notes

  • Supports all ATT&CK matrices (Enterprise, Mobile, ICS)
  • Can generate Navigator layers for visualization
  • Integrates with threat intelligence platforms
  • Maps to detection rules and mitigations
  • Supports campaign and group analysis