Cyber Kill Chain Analysis Application

User Information

Executive Summary

This application facilitates analysis of cyber threats using the MITRE ATT&CK Framework as a kill chain model. It guides security teams through documenting adversary tactics and techniques across 14 tactics: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, and Impact. A dynamic table records observations, mitigations, and notes, with dropdowns for all MITRE ATT&CK tactics and techniques. A diagram visualizes the kill chain, dynamically updated with entries, and an Action Log tracks activities.

Kill Chain Diagram

Kill Chain Analysis Form

Kill Chain Table

Tactic Technique Observed Activity Mitigation Notes Action

Action Log

Please enter a name (either in User Information or Alternative Name) to add a timeline entry.