Overview
The MITRE ATT&CK framework is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. Wazuh Dashboard integration enables:- Automatic alert mapping to MITRE ATT&CK tactics and techniques
- Visual dashboards displaying attack patterns and trends
- Tactic-based filtering for focused threat analysis
- Technique correlation across agents and time periods
- Threat intelligence context for security events
plugins/main/common/wazuh-modules.ts:96
MITRE ATT&CK module
The MITRE ATT&CK module in Wazuh Dashboard provides dedicated views for analyzing security alerts mapped to the framework:Alert mapping structure
Wazuh rules are enriched with MITRE ATT&CK metadata that includes:Tactic information
The high-level adversary goal:- Initial Access
- Execution
- Persistence
- Privilege Escalation
- Defense Evasion
- Credential Access
- Discovery
- Lateral Movement
- Collection
- Command and Control
- Exfiltration
- Impact
Technique information
The specific method used by the adversary:plugins/main/public/components/overview/mitre/dashboard/dashboard-panels.ts:132
MITRE ATT&CK dashboard
The MITRE ATT&CK dashboard provides comprehensive visualization of attack patterns.Dashboard configuration
The dashboard is defined using the dashboard configuration service:plugins/main/common/dashboards/dashboard-definitions/overview/mitre/overview/dashboard.ts:66
Dashboard layout
The dashboard layout includes multiple visualization panels:plugins/main/common/dashboards/dashboard-definitions/overview/mitre/overview/dashboard.ts:13
Visualization components
Alerts evolution over time
Line chart displaying temporal distribution of alerts by technique:plugins/main/public/components/overview/mitre/dashboard/dashboard-panels.ts:4
Top tactics
Pie chart showing the distribution of alerts by tactic:plugins/main/public/components/overview/mitre/dashboard/dashboard-panels.ts:163
Attacks by technique
Histogram displaying attack distribution across techniques and tactics:plugins/main/public/components/overview/mitre/dashboard/dashboard-panels.ts:249
Top tactics by agent
Area chart showing tactic distribution across monitored agents:plugins/main/public/components/overview/mitre/dashboard/dashboard-panels.ts:394
MITRE techniques by agent
Pie chart displaying technique distribution by agent:plugins/main/public/components/overview/mitre/dashboard/dashboard-panels.ts:552
Querying MITRE ATT&CK data
Filtering by tactic
Query alerts for specific tactics:Filtering by technique
Query alerts for specific techniques:Combined tactic and technique filters
Time-based analysis
Agent-specific queries
Advanced analysis techniques
Attack chain reconstruction
Identify sequences of tactics indicating attack progression:- Filter for Initial Access tactics
- Identify subsequent Execution or Persistence techniques on the same agent
- Trace Lateral Movement patterns across agents
- Detect Collection or Exfiltration activities
Threat hunting workflows
Proactive threat detection using MITRE ATT&CK:- Hypothesis formation: Select tactics and techniques associated with specific threat actors
- Query construction: Build queries targeting identified techniques
- Result analysis: Examine matching alerts for suspicious patterns
- Context enrichment: Correlate findings with external threat intelligence
- Documentation: Record findings and update detection rules
Coverage analysis
Assess detection coverage across the MITRE ATT&CK matrix:- Catalog which tactics and techniques generate alerts in your environment
- Identify gaps in coverage for critical techniques
- Develop or tune rules to address coverage gaps
- Validate detection effectiveness through testing
Integration with threat intelligence
Enhance MITRE ATT&CK analysis with external threat intelligence:Threat actor profiling
Map observed techniques to known threat actor groups:- Document tactics and techniques observed in your environment
- Cross-reference with threat intelligence reports
- Identify potential threat actor attribution
- Adjust monitoring priorities based on threat actor capabilities
Campaign detection
Identify coordinated attack campaigns:- Analyze temporal clustering of related techniques
- Correlate techniques across multiple agents
- Assess alignment with known campaign patterns
- Escalate suspected campaign activity for investigation
Dashboard customization
Customize MITRE ATT&CK dashboards for specific use cases:Focus on specific tactics
Modify queries to emphasize particular tactics:Agent group analysis
Filter visualizations for specific agent groups:Severity-based filtering
Focus on high-severity MITRE ATT&CK alerts:Best practices
Alert triage
- Prioritize alerts based on tactic progression along the attack lifecycle
- Focus immediate attention on tactics indicating active compromise (Lateral Movement, Exfiltration)
- Investigate technique clusters suggesting coordinated activity
- Correlate MITRE ATT&CK data with contextual information (user, asset, time)
Rule tuning
- Verify MITRE ATT&CK mappings accurately reflect detection intent
- Update mappings when techniques evolve or new sub-techniques are published
- Document rationale for technique assignments in rule descriptions
- Test rule effectiveness against known attack simulations
Knowledge management
- Maintain internal documentation mapping custom rules to MITRE ATT&CK
- Train analysts on framework navigation and interpretation
- Share technique-specific playbooks for consistent response
- Track coverage metrics over time
Metrics and reporting
- Generate periodic reports on tactic and technique distribution
- Trend analysis of technique prevalence over time
- Compare attack patterns across different network segments or asset types
- Measure detection coverage improvements following rule updates
Troubleshooting
Missing MITRE ATT&CK data
- Verify rule definitions include MITRE ATT&CK mappings
- Check index pattern includes
rule.mitre.tacticandrule.mitre.techniquefields - Confirm Wazuh ruleset version includes MITRE ATT&CK metadata
- Review alert generation to ensure rules are triggering correctly
Dashboard not displaying data
- Validate time range includes periods with MITRE ATT&CK alerts
- Verify index pattern configuration is correct
- Check query syntax for errors in custom filters
- Confirm user permissions allow access to MITRE ATT&CK module
Incorrect technique mappings
- Review rule definitions for mapping accuracy
- Consult MITRE ATT&CK framework documentation for technique descriptions
- Update rule metadata to correct mappings
- Test rule behavior to validate mapping alignment
Related resources
- MITRE ATT&CK official framework: https://attack.mitre.org/
- Custom dashboard creation for advanced MITRE ATT&CK visualizations
- Threat hunting module for proactive detection using MITRE ATT&CK
- Compliance dashboards demonstrating framework mapping (PCI DSS, NIST, HIPAA)