MITRE ATT&CK Coverage
CHAD maps your detection rules to the MITRE ATT&CK framework, helping you visualize coverage gaps and prioritize rule development.What is MITRE ATT&CK?
MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations. It’s the standard framework for describing attacker behavior.Structure
- Tactic: Credential Access
- Technique: T1110 - Brute Force
- Sub-technique: T1110.001 - Password Guessing
Viewing Coverage
Navigate to ATT&CK Matrix in the sidebar.Matrix View
The matrix shows:- Columns: Tactics (Initial Access → Impact)
- Rows: Techniques within each tactic
- Colors: Coverage level by deployed rules
Coverage Colors
| Color | Meaning |
|---|---|
| 🟢 Green | Good coverage (3+ rules) |
| 🟡 Yellow | Partial coverage (1-2 rules) |
| ⚪ Gray | No coverage |
Drill Down
Click any technique to see:- Rules covering this technique
- Detection quality assessment
- Gaps in sub-technique coverage
Tagging Rules
Rules are mapped via Sigma tags:Tag Format
attack.{tactic}- Maps to tacticattack.t{number}- Maps to techniqueattack.t{number}.{sub}- Maps to sub-technique
Common Tactic Tags
| Tag | Tactic |
|---|---|
attack.initial_access | Initial Access |
attack.execution | Execution |
attack.persistence | Persistence |
attack.privilege_escalation | Privilege Escalation |
attack.defense_evasion | Defense Evasion |
attack.credential_access | Credential Access |
attack.discovery | Discovery |
attack.lateral_movement | Lateral Movement |
attack.collection | Collection |
attack.exfiltration | Exfiltration |
attack.impact | Impact |
Coverage Analysis
Gap Identification
Use the matrix to identify:- Uncovered tactics - No rules at all
- Uncovered techniques - Specific gaps
- Thin coverage - Only 1 rule (single point of failure)
Prioritization
Focus on:- High-impact tactics - Execution, Persistence, Credential Access
- Common techniques - T1059 (Scripting), T1078 (Valid Accounts)
- Your threat model - Techniques relevant to your environment
Importing Coverage
From SigmaHQ
SigmaHQ rules include ATT&CK tags:- Go to SigmaHQ
- Filter by technique
- Import rules for gap coverage
Bulk Tagging
Add tags to existing rules:- Open the rule
- Add
tagsto the YAML - Save and redeploy
Coverage Reports
Export
Export coverage data:- Click Export on the ATT&CK page
- Choose format (CSV, JSON)
- Download for reporting
Metrics
Track coverage over time:- Percentage of techniques covered
- Rules per technique
- Coverage by tactic
ATT&CK Navigator Integration
Export to ATT&CK Navigator for advanced visualization:- Click Export to Navigator
- Download Navigator JSON
- Import at mitre-attack.github.io/attack-navigator
- Custom coloring
- Multi-layer comparison
- Annotations
Best Practices
Tag all rules
Tag all rules
Every detection rule should have ATT&CK tags.
Use specific tags
Use specific tags
Review regularly
Review regularly
Check coverage monthly; ATT&CK is updated regularly.
Quality over quantity
Quality over quantity
One good rule beats five poorly-tuned rules.
Align with threat model
Align with threat model
Not all techniques are relevant to your environment.
Sync Updates
CHAD syncs the ATT&CK framework:- Go to Settings > ATT&CK
- Click Sync Framework
- Latest techniques are downloaded
Troubleshooting
Rules not appearing in matrix
- Check rule has ATT&CK tags
- Verify tag format is correct
- Rule must be deployed
- Sync ATT&CK framework
Coverage seems low
- Review rule tags for accuracy
- Import SigmaHQ rules for gaps
- Consider technique relevance to your environment
Outdated techniques
- Sync latest ATT&CK framework
- Update deprecated technique tags
- Review MITRE changelog for changes