Skip to main content

MITRE ATT&CK Framework

Ascend maps all agent actions to the MITRE ATT&CK framework for comprehensive threat detection and security analysis.

Framework Coverage

CategoryCoverageTacticsTechniques
EnterpriseFull14 tactics200+ techniques
CloudFullAWS, Azure, GCPPlatform-specific
ICSPartialIndustrial controlsCore techniques

Tactic Coverage

Enterprise Tactics

IDTacticDescriptionAscend Coverage
TA0001Initial AccessGain entry to networkMonitoring
TA0002ExecutionRun malicious codeFull detection
TA0003PersistenceMaintain footholdFull detection
TA0004Privilege EscalationGain higher permissionsFull detection
TA0005Defense EvasionAvoid detectionFull detection
TA0006Credential AccessSteal credentialsFull detection
TA0007DiscoveryLearn about environmentFull detection
TA0008Lateral MovementMove through networkFull detection
TA0009CollectionGather target dataFull detection
TA0010ExfiltrationSteal dataFull detection
TA0011Command and ControlCommunicate with compromised systemsFull detection
TA0040ImpactManipulate, interrupt, or destroyFull detection

Action-to-Tactic Mapping

TA0002 - Execution

Agent actions that could indicate code execution:

Action TypeTechniqueRisk LevelDetection
code_executeT1059CriticalImmediate alert
shell_executeT1059.004CriticalImmediate alert
script_runT1059.001HighAlert + approval
command_executeT1059HighAlert + approval

Detection Configuration:

{
"action_type": "code_execute",
"mitre_mapping": {
"tactic": "TA0002",
"tactic_name": "Execution",
"technique": "T1059",
"technique_name": "Command and Scripting Interpreter",
"detection_priority": "critical",
"auto_block": true,
"alert_immediate": true
}
}

TA0003 - Persistence

Agent actions that could establish persistence:

Action TypeTechniqueRisk LevelDetection
user_createT1136HighAlert + approval
service_createT1543CriticalImmediate alert
scheduled_taskT1053HighAlert + approval
config_modifyT1098HighAlert + approval

Persistence Detection:

# From enrichment.py - Persistence mappings
MITRE_MAPPINGS = {
"user_create": {
"mitre_tactic": "TA0003",
"mitre_tactic_name": "Persistence",
"mitre_technique": "T1136",
"mitre_technique_name": "Create Account"
},
"service_install": {
"mitre_tactic": "TA0003",
"mitre_tactic_name": "Persistence",
"mitre_technique": "T1543",
"mitre_technique_name": "Create or Modify System Process"
}
}

TA0004 - Privilege Escalation

Agent actions that could escalate privileges:

Action TypeTechniqueRisk LevelDetection
privilege_escalationT1078CriticalImmediate alert
role_assignT1098HighAlert + approval
permission_grantT1098.001HighAlert + approval
sudo_executeT1548CriticalImmediate alert

Escalation Alert:

{
"alert": {
"type": "privilege_escalation_attempt",
"severity": "critical",
"agent_id": "customer-service-agent",
"action_type": "role_assign",
"mitre": {
"tactic": "TA0004",
"technique": "T1098",
"sub_technique": "T1098.001"
},
"recommendation": "Verify legitimate business need for elevated access"
}
}

TA0005 - Defense Evasion

Agent actions that could evade detection:

Action TypeTechniqueRisk LevelDetection
log_deleteT1562.002CriticalImmediate alert
audit_disableT1562.001CriticalImmediate alert
process_hideT1564CriticalImmediate alert
indicator_removeT1070CriticalImmediate alert

Evasion Detection:

# From enrichment.py - Defense Evasion mappings
MITRE_MAPPINGS = {
"log_delete": {
"mitre_tactic": "TA0005",
"mitre_tactic_name": "Defense Evasion",
"mitre_technique": "T1562",
"mitre_technique_name": "Impair Defenses"
},
"audit_disable": {
"mitre_tactic": "TA0005",
"mitre_tactic_name": "Defense Evasion",
"mitre_technique": "T1562.001",
"mitre_technique_name": "Disable or Modify Tools"
}
}

TA0006 - Credential Access

Agent actions that could access credentials:

Action TypeTechniqueRisk LevelDetection
credential_accessT1003CriticalImmediate alert
credential_dumpT1003CriticalImmediate alert
password_sprayT1110.003CriticalImmediate alert
keylog_captureT1056CriticalImmediate alert

Credential Detection:

# From enrichment.py - Credential Access mappings
MITRE_MAPPINGS = {
"credential_access": {
"mitre_tactic": "TA0006",
"mitre_tactic_name": "Credential Access",
"mitre_technique": "T1003",
"mitre_technique_name": "OS Credential Dumping"
},
"credential_read": {
"mitre_tactic": "TA0006",
"mitre_tactic_name": "Credential Access",
"mitre_technique": "T1552",
"mitre_technique_name": "Unsecured Credentials"
}
}

TA0007 - Discovery

Agent actions that could discover system information:

Action TypeTechniqueRisk LevelDetection
network_scanT1046MediumAlert
system_discoveryT1082MediumAlert
account_discoveryT1087MediumAlert
permission_discoveryT1069MediumAlert

TA0009 - Collection

Agent actions that could collect data:

Action TypeTechniqueRisk LevelDetection
data_collectionT1005HighAlert + approval
screen_captureT1113HighAlert + approval
clipboard_captureT1115HighAlert + approval
archive_dataT1560HighAlert + approval

Collection Detection:

# From enrichment.py - Collection mappings
MITRE_MAPPINGS = {
"data_collection": {
"mitre_tactic": "TA0009",
"mitre_tactic_name": "Collection",
"mitre_technique": "T1005",
"mitre_technique_name": "Data from Local System"
},
"database_read": {
"mitre_tactic": "TA0009",
"mitre_tactic_name": "Collection",
"mitre_technique": "T1005",
"mitre_technique_name": "Data from Local System"
}
}

TA0010 - Exfiltration

Agent actions that could exfiltrate data:

Action TypeTechniqueRisk LevelDetection
data_exportT1041CriticalImmediate alert
data_exfiltrationT1041CriticalImmediate alert
bulk_transferT1048CriticalImmediate alert
cloud_uploadT1567HighAlert + approval

Exfiltration Detection:

# From enrichment.py - Exfiltration mappings
MITRE_MAPPINGS = {
"data_export": {
"mitre_tactic": "TA0010",
"mitre_tactic_name": "Exfiltration",
"mitre_technique": "T1041",
"mitre_technique_name": "Exfiltration Over C2 Channel"
},
"data_exfiltration": {
"mitre_tactic": "TA0010",
"mitre_tactic_name": "Exfiltration",
"mitre_technique": "T1041",
"mitre_technique_name": "Exfiltration Over C2 Channel"
}
}

TA0011 - Command and Control

Agent actions that could establish C2:

Action TypeTechniqueRisk LevelDetection
external_connectionT1071HighAlert
remote_accessT1219HighAlert + approval
proxy_setupT1090HighAlert + approval
dns_tunnelT1071.004CriticalImmediate alert

C2 Detection:

# From enrichment.py - C2 mappings
MITRE_MAPPINGS = {
"external_connection": {
"mitre_tactic": "TA0011",
"mitre_tactic_name": "Command and Control",
"mitre_technique": "T1071",
"mitre_technique_name": "Application Layer Protocol"
}
}

TA0040 - Impact

Agent actions that could cause impact:

Action TypeTechniqueRisk LevelDetection
data_destroyT1485CriticalImmediate alert
service_stopT1489CriticalImmediate alert
data_encryptT1486CriticalImmediate alert
data_wipeT1561CriticalImmediate alert

Impact Detection:

# From enrichment.py - Impact mappings
MITRE_MAPPINGS = {
"data_destroy": {
"mitre_tactic": "TA0040",
"mitre_tactic_name": "Impact",
"mitre_technique": "T1485",
"mitre_technique_name": "Data Destruction"
},
"service_stop": {
"mitre_tactic": "TA0040",
"mitre_tactic_name": "Impact",
"mitre_technique": "T1489",
"mitre_technique_name": "Service Stop"
},
"data_modify": {
"mitre_tactic": "TA0040",
"mitre_tactic_name": "Impact",
"mitre_technique": "T1565",
"mitre_technique_name": "Data Manipulation"
}
}

Complete Technique Reference

Critical Techniques (Auto-Block)

IDNameActionsResponse
T1003OS Credential Dumpingcredential_access, credential_dumpBlock + alert
T1059Command and Scripting Interpretercode_execute, shell_executeBlock + alert
T1485Data Destructiondata_destroy, data_wipeBlock + alert
T1486Data Encrypted for Impactdata_encryptBlock + alert
T1489Service Stopservice_stopBlock + alert
T1562Impair Defenseslog_delete, audit_disableBlock + alert

High-Risk Techniques (Alert + Approval)

IDNameActionsResponse
T1005Data from Local Systemdata_collection, database_readAlert + approval
T1041Exfiltration Over C2data_export, data_exfiltrationAlert + approval
T1078Valid Accountsprivilege_escalationAlert + approval
T1098Account Manipulationuser_create, role_assignAlert + approval
T1136Create Accountuser_createAlert + approval
T1552Unsecured Credentialscredential_readAlert + approval
T1565Data Manipulationdata_modifyAlert + approval

Medium-Risk Techniques (Monitor)

IDNameActionsResponse
T1046Network Service Discoverynetwork_scanMonitor + log
T1071Application Layer Protocolexternal_connectionMonitor + log
T1082System Information Discoverysystem_discoveryMonitor + log
T1087Account Discoveryaccount_discoveryMonitor + log

Detection Rules

Smart Rule Integration

Create MITRE-aligned smart rules:

# Create MITRE-based detection rule
curl -X POST "https://pilot.owkai.app/api/smart-rules/generate-from-nl" \
-H "Cookie: access_token=your_session_cookie" \
-H "Content-Type: application/json" \
-d '{
"natural_language": "Block any credential access attempts and alert security team",
"context": "mitre_attack"
}'

Generated Rule:

{
"condition": "mitre_technique IN ('T1003', 'T1552', 'T1110') OR action_type LIKE 'credential%'",
"action": "block_and_alert",
"risk_level": "critical",
"mitre_alignment": {
"tactic": "TA0006",
"techniques": ["T1003", "T1552", "T1110"]
}
}

Threat Hunting

Hunt Queries

Query for specific MITRE techniques:

# Hunt for credential access attempts
curl "https://pilot.owkai.app/api/analytics/trends?mitre_technique=T1003" \
-H "X-API-Key: your_api_key"

# Hunt for exfiltration attempts
curl "https://pilot.owkai.app/api/analytics/trends?mitre_tactic=TA0010" \
-H "X-API-Key: your_api_key"

Response:

{
"hunt_results": {
"mitre_tactic": "TA0006",
"mitre_technique": "T1003",
"total_matches": 3,
"time_period": "24h",
"events": [
{
"timestamp": "2025-01-15T10:30:00Z",
"agent_id": "data-agent",
"action_type": "credential_access",
"status": "blocked",
"risk_score": 95
}
],
"recommendation": "Review agent permissions and investigate blocked attempts"
}
}

MITRE ATT&CK Navigator Export

Export detection coverage to ATT&CK Navigator:

# Export to Navigator format
curl "https://pilot.owkai.app/api/compliance/export/mitre-navigator" \
-H "X-API-Key: your_api_key"

Response:

{
"name": "Ascend Detection Coverage",
"version": "4.5",
"domain": "enterprise-attack",
"techniques": [
{"techniqueID": "T1003", "score": 100, "color": "#ff0000", "comment": "Full detection"},
{"techniqueID": "T1059", "score": 100, "color": "#ff0000", "comment": "Full detection"},
{"techniqueID": "T1005", "score": 80, "color": "#ff6600", "comment": "Detection with approval"}
]
}

Reporting

MITRE Coverage Report

# Generate MITRE coverage report
curl -X POST "https://pilot.owkai.app/api/compliance/export/mitre" \
-H "X-API-Key: your_api_key" \
-H "Content-Type: application/json" \
-d '{
"period_start": "2025-01-01",
"period_end": "2025-01-31",
"tactics": ["TA0006", "TA0010", "TA0040"],
"format": "json"
}'

Report Contents

SectionDescription
Coverage MatrixTactics and techniques covered
Detection EventsEvents mapped to MITRE
Gap AnalysisUncovered techniques
RecommendationsCoverage improvement suggestions

For MITRE ATT&CK integration questions, contact security@owkai.app