Evidence-first • Navigator-style • Built for defenders

Real-world incidents, mapped into an ATT&CK view you can actually work from.

A living threat repository where real-world incidents are continuously mapped to ATT&CK tactics and techniques, in a Navigator-style view. Filter the data, open a report, highlight its technique chain, and move into Attack Path and Hunt Pack for deeper operational context.

Threat hunting Detection engineering Incident triage Attack Path Hunt Pack
Navigator preview
Living MITRE Repository interface preview
Fast analyst flow

Filter → open technique → select incident → highlight ATT&CK chain → open Attack Path → use Hunt Pack.

Platform at a glance

The page is intentionally concise: what the platform shows, how it works, and where it helps the most.

What it shows

Navigator-style ATT&CK layout

Technique cards are grouped by tactic so incidents become easier to compare, track, and explain.

What each card contains

Technique + evidence context

Each card shows technique ID, technique name, a short description, rank or weight indicators, and a report list entry point.

What happens next

From report to attack flow

Selecting a report highlights the incident's ATT&CK technique chain and opens the path toward Attack Path and Hunt Pack.

ATT&CK tactics included

All mapped techniques are organized under standard ATT&CK tactics for a consistent view across incidents.

Reconnaissance
Resource Development
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Command and Control
Exfiltration
Impact

A more visual look at the interface

These screenshots show the Navigator-style layout, technique cards, and the operational feel of the platform.

How the workflow actually works

Designed to be readable and fast: narrow the view, inspect the techniques, and pivot into investigation support.

Step 1

Tailor the view

  • Filter by severity, actor, tool, sector, country, software, breach type, and access vector.
  • Reduce noise before the investigation starts.
Step 2

Select the time range

  • Choose the period that best matches the investigation.
  • Focus on the most relevant reporting window.
Step 3

Review the Navigator

  • Technique cards are arranged under their ATT&CK tactics.
  • Red, yellow, and blue visually indicate priority.
Step 4

Select an incident

  • Open the report list from a technique card.
  • Choose a report to highlight its ATT&CK technique chain.
Step 5

Open Attack Path

  • View the selected incident through a Cyber Kill Chain perspective.
  • Understand likely adversary flow across stages.
Step 6

Use Hunt Pack

  • Access deeper context, investigative guidance, and remediation-oriented information.
  • Refresh, reset, or share the exact view when needed.
Operational flow: Filter → Set time range → Review techniques → Select report → Attack Path → Hunt Pack.

Guide, help text, and use cases

Everything below is short on purpose, so the page stays easy to read while still being useful for onboarding and sharing.

Overview

Short website summary

A living threat repository where real-world incidents are continuously mapped to ATT&CK tactics and techniques, in a Navigator-style view. The platform turns raw incident reporting into structured, reusable threat context. Analysts can filter the dataset, inspect technique cards, open linked reports, highlight incident technique chains, and use Attack Path plus Hunt Pack for deeper operational guidance.

Help modal

Short help text

The Living MITRE Repository maps real-world incidents to ATT&CK tactics and techniques in a Navigator-style view. Each technique card links to incident reports, selected reports highlight their ATT&CK flow, and Attack Path plus Hunt Pack provide deeper context, investigation guidance, and remediation support.

1

Start with filters

Use severity, actor, tool, sector, country, software, breach type, access vector, and time range to narrow the dataset fast.

2

Use technique cards

Open a technique card to see the supporting incident reports, then pick one to highlight the mapped ATT&CK chain.

3

Move to action

Use Attack Path for stage flow and Hunt Pack for deeper guidance, context, and remediation-oriented insight.

SOC analyst / threat hunter

Threat hunting acceleration

Filter by actor, tool, sector, or time range, select an incident, and turn reporting into hunt hypotheses.

Detection engineer

Detection engineering support

Review recurring techniques across incidents and use Hunt Pack context to improve real-world detections.

SOC triage analyst

Incident triage enrichment

Search similar techniques, tools, or CVEs during alert review to get faster context around suspicious activity.

Incident responder / IR lead

Attack-path understanding

Select a report, inspect the mapped technique progression, then open Attack Path to understand likely attacker flow.

CTI analyst

Threat intelligence operationalization

Convert static reports into ATT&CK-aligned, reusable intelligence that security teams can navigate and action.

Sector SOC / national SOC / MSSP

Sector-focused monitoring

Filter by sector, geography, breach type, software, or access vector to see incidents most relevant to the environment.

SOC manager / cyber lead

Executive prioritization

Use ranked techniques and operational priorities to decide what deserves immediate attention and resources.

SOC team / shift lead

Knowledge sharing

Share the exact filtered page and selected incident view with teammates for faster alignment and handover.

Junior analyst / students

Training and analyst development

Explore real incidents through ATT&CK, Attack Path, and Hunt Pack to understand how attacks unfold in practice.

Security architect / defensive planner

Proactive exposure review

Review recurring techniques and patterns to identify control gaps, visibility gaps, and weak playbooks.

MITRE ATT&CK® is a registered trademark of The MITRE Corporation. This project is not affiliated with or endorsed by MITRE.