The MITRE Map is a lightweight, analyst‑oriented visualization of the MITRE ATT&CK Enterprise matrix. It helps you explore adversary behaviors, select techniques, and quickly reuse them in detection engineering workflows (Sigma, YARA, SIEM rules, etc.).
The MITRE ATT&CK framework models real‑world adversary behavior using:
In this map, tactics are displayed as columns and techniques are listed underneath. Sub‑techniques can be expanded on demand.
Each technique tile is fully interactive:
Selected techniques remain highlighted and are tracked in a persistent counter at the top of the page.
The MITRE Map supports URL‑based pre‑selection. This allows seamless integration with other tools such as Sigma or YARA builders.
?t= — comma‑separated list of MITRE technique IDs
Example:
/mitre/map?t=T1059,T1566
Once techniques are selected, they can be reused instantly:
This enables fast pivoting between threat modeling and detection engineering.
This MITRE Map is intentionally minimal. It focuses on speed, clarity and interoperability rather than full ATT&CK Navigator feature parity. The goal is to stay close to analyst workflows, not to replace MITRE tooling.