This application facilitates analysis of cyber threats using the MITRE ATT&CK Framework as a kill chain model. It guides security teams through documenting adversary tactics and techniques across 14 tactics: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, and Impact. A dynamic table records observations, mitigations, and notes, with dropdowns for all MITRE ATT&CK tactics and techniques. A diagram visualizes the kill chain, dynamically updated with entries, and an Action Log tracks activities.
Tactic | Technique | Observed Activity | Mitigation | Notes | Action |
---|
Please enter a name (either in User Information or Alternative Name) to add a timeline entry.