top of page
Search

Alternative MITRE ATT&CK Navigator: My MITRE ATT&CK Visualizer 2.0

  • Tech Man
  • Aug 16, 2025
  • 3 min read

Updated: Aug 17, 2025



MITRE ATT&CK Visualizer 2.0


  1. In cybersecurity, understanding adversary tactics and techniques is crucial for building effective defenses. The MITRE ATT&CK Enterprise Matrix is an invaluable framework that maps out how tactics and techniques used by adversaries to conduct cyberattacks. While the official MITRE ATT&CK Navigator is a powerful visualization tool, using it can be a manual and time-consuming process.


  2. To streamline this, I recently upgraded a custom Python script (See my github for the code) to achieve up to 99% automation. The new version significantly improves on the old one (see here), which could only visualize main techniques for a maximum of two adversaries. My updated program now includes sub-techniques, allows for annotating more than two adversaries, and shades the matrix to represent the frequency of their usage.


    Image 1. Snapshot of annotated MITRE ATT&CK Enterprise Matrix
    Image 1. Snapshot of annotated MITRE ATT&CK Enterprise Matrix


  3. Based on the frequency of techniques and sub-techniques, the program retrieves the top N (default: 5) recommended mitigation and detection measures from the MITRE ATT&CK website. The value of N can be customized in get_technique_information.py to suit the user's specific use case. The results are exported to an Excel file named defence_measure.xlsx."



Image 2. Defense Measures
Image 2. Defense Measures

Upgrading the Program: Sub-techniques and Frequency


  1. The new program focused on two key improvements:


    1. Incorporating Sub-techniques: Many techniques in the ATT&CK framework have sub-techniques that provide more granular detail. My upgraded program now includes these sub-techniques, offering a more precise and accurate representation of adversary behavior.


Frequency-Based Shading: This is the most significant enhancement. Instead of a simple highlight, the program now uses a color gradient to visualize the frequency of a technique's use across all the selected threat actors. A darker shade indicates a more frequently used technique, while a lighter shade suggests it's used less often.


Image 3. Frequency count using python counter function
Image 3. Frequency count using python counter function


How it Works ⚙️


The program is built using Python, and it leverages the MITRE ATT&CK Enterprise Matrix (MAEM). The process can be broken down into these steps:


  • MAEM to excel: Go to MITRE site and select "layout flat" and "show sub-techniques" for the MITRE ATT&CK Enterprise Matrix.




  • Manual Copy: Manually copy the MITRE ATT&CK Enterprise Matrix into excel.


    Image 5. Copy the MITRE ATT&CK Enterprise Matrix into excel
    Image 5. Copy the MITRE ATT&CK Enterprise Matrix into excel

  • Format Excel: The program will format the excel accordingly.

    Image 6. Formatted excel of the MITRE ATT&CK Enterprise Matrix
    Image 6. Formatted excel of the MITRE ATT&CK Enterprise Matrix
  • Retrieve Threat Actor Group(s) and associate TTs: The program includes a function that retrieves threat actor group(s), as tracked by MITRE, from a default text file (threat_actor_group.txt). Another function will then pull the associated tactics, techniques, and sub-techniques (TTs) for each group and annotates them in a formatted Excel file. User can modify the functions to pull TTs from their subscribed threat intelligence.


    Image 7. threat_actor_group.txt
    Image 7. threat_actor_group.txt
  • Frequency Counting: For each technique and sub-technique, the program tallies how many of the specified threat actors use it. This creates a simple but powerful frequency count.


    Image 8. Example of frequency count
    Image 8. Example of frequency count

  • Shade Matrix: Finally, the program will use the frequency count to apply a color gradient to each cell in the matrix. The more frequent the technique, the darker its shade in the visualization.


    Image 9. Shaded excel matrix
    Image 9. Shaded excel matrix
  • Defense Measures: Based on the frequency of techniques and sub-techniques, the program retrieves the top N (default: 5) recommended mitigation and detection measures from the MITRE ATT&CK website. The value of N can be customized in get_technique_information.py to suit the user's specific use case. The results are exported to an Excel file named defence_measure.xlsx."


    Image 10. Defense Measures
    Image 10. Defense Measures



Conclusion


  1. This visual representation offers a clear and intuitive way to understand shared adversary behaviors. Instead of cross-referencing multiple threat actor profiles, users can view a single, consolidated matrix of their collective tactics, techniques, and sub-techniques (TTs). It allows user to:


    1. Prioritize Defenses: By identifying the most frequently used techniques, user can prioritize resources on building and improving detections and mitigations for commonly used TTs.


    2. Enhance Threat Hunting: The visualization can serve as a starting point for threat hunts. By focusing on the darker-shaded techniques, user can search for indicators of the common TTs.


    3. Improve Adversary Emulation: The frequency data can help user to create more realistic and targeted red team or adversary emulation exercises that mimic the most common TTs of a group of relevant threat actors.

 
 
 

Comments


SIGN UP AND STAY UPDATED!

Thanks for submitting!

  • Grey Twitter Icon
  • Grey LinkedIn Icon
  • Grey Facebook Icon

© 2035 by Talking Business. Powered and secured by Wix

bottom of page