Skip to content

Threat actor group mapping

Marcus Bakker edited this page Dec 20, 2021 · 10 revisions

The group functionality of DeTT&CT allows you to:

  • Get an overall heat map based on all threat actor group data present in ATT&CK. Please note that like all data there is bias. As very well explained by MITRE: Building an ATT&CK Sightings Ecosystem.
  • Create heat maps based on a subset of groups present in the ATT&CK data of MITRE.
  • Create your heat maps based on the intelligence you get from your intelligence team or on techniques performed in red team exercises.
  • Compare techniques used by threat actors with your level of visibility or detection to uncover possible gaps and improvements.
  • Compare threat actor groups.
  • Visualise the potential capabilities of a threat actor based on the software they use (--software-group)

What information can be recorded

You can record the following information on threat actors in YAML group administration files:

  • The name of the threat actor.
  • A possible threat actor campaign name.
  • Techniques used by this threat actor.
  • Software used by this threat actor (also see the option: --software-group)
  • A flag to indicate if the group must be enabled when DeTT&CT loads the YAML file.

Visualise in the ATT&CK Navigator

ATT&CK groups

The generated layer file below contains a heat map based on all threat actor data within ATT&CK. The darker the colour in the heat map, the more often the technique is being used among groups.

python dettect.py g
DeTT&CT - Group mapping

Custom group(s)

The generated layer file below contains a mapping based on threat actor data stored in a group YAML file.

python dettect.py g -g sample-data/groups.yaml
DeTT&CT - Group mapping
Clone this wiki locally