Skip to content

BMR7AICyber/ThreatPath-Explorer

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ATT&CK Path Explorer

This repository provides a Plotly Dash application for cybersecurity analysts to interactively explore attack paths within the MITRE ATT&CK Enterprise matrix. It loads ATT&CK data from a local STIX 2.1 file and allows analysts to build and confirm probable paths across tactics and techniques.

Features

  • Renders the full ATT&CK Enterprise matrix as an interactive grid.
  • Click a technique to highlight potential previous and next steps based on tactic order and ATT&CK relationships.
  • Confirm a traversal path and export it as YAML for use in incident notes.
  • Lightweight modular code separated into data loading and matrix utilities.

Installation

  1. Clone the repository and optionally create a virtual environment:
    python3 -m venv venv
    source venv/bin/activate
  2. Install dependencies
    pip install -r requirements.txt
  3. Download ATT&CK Data Download enterprise-attack.json from the MITRE CTI repo and place it under data/. See data/README.md for details.

Running the App

python dash_app.py

Open the printed local URL in your browser to interact with the matrix.

Exporting Paths

After selecting techniques, click Confirm Path to lock your traversal. The confirmed path is shown in YAML format and can be copied into notes or reports.

License

See LICENSE.

About

This project explores how interactive ATT&CK traversal can assist human analysts in reasoning about attack progression. Rather than static ATT&CK mapping, it focuses on analyst-guided exploration of attacker behavior across tactics.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages