Detect Tactics, Techniques & Combat Threats
 
 
 
 
 
 
Go to file
Ruben Bouman 111395c684 Merge branch 'development' of https://github.com/rabobank-cdc/DeTTACT into development 2019-05-15 14:43:32 +02:00
sample-data Provided a groups YAML file for the Red Canary threat detection 2019 report, listing all frequently used techniques including lists per sector. Adjusted functionality in DeTT&CT to support the use of 'weight' in group files. 2019-05-15 14:43:25 +02:00
LICENSE initial commit 2019-03-29 15:26:25 +01:00
README.md update on text 2019-05-08 10:31:08 +02:00
constants.py Created 3 constants for overlay_type 2019-05-02 20:15:43 +02:00
data_source_mapping.py Added support for multiple detections and visibility per technique in the technique administration YAML file. 2019-05-02 13:21:01 +02:00
dettact.py added a new option '--health' to check a technique administration YAML file on errors. 2019-05-14 12:58:06 +02:00
generic.py Merge branch 'development' of https://github.com/rabobank-cdc/DeTTACT into development 2019-05-15 14:43:32 +02:00
group_mapping.py Provided a groups YAML file for the Red Canary threat detection 2019 report, listing all frequently used techniques including lists per sector. Adjusted functionality in DeTT&CT to support the use of 'weight' in group files. 2019-05-15 14:43:25 +02:00
interactive_menu.py Small bugfix when using interactive menu: default overlay type should be 'group'. And when giving empty group, value is set to 'all'. 2019-05-07 15:40:15 +02:00
requirements.txt initial commit 2019-03-29 15:26:25 +01:00
scoring_table.xlsx Corrections/improvements on the data quality, visibility and detection scores. 2019-04-02 12:33:16 +02:00
technique_mapping.py added a new option '--health' to check a technique administration YAML file on errors. 2019-05-14 12:58:06 +02:00
upgrade.py Hide some functions 2019-04-23 14:19:25 +02:00

README.md

DeTT&CT

Detect Tactics, Techniques & Combat Threats

Latest version: 1.1

To get started with DeTT&CT, check out the Wiki.

DeTT&CT aims to assist blue teams using ATT&CK to score and compare data log source quality, visibility coverage, detection coverage and threat actor behaviours. All of which can help, in different ways, to get more resilient against attacks targeting your organisation. The DeTT&CT framework consists of a Python tool, YAML administration files and scoring tables for the different aspects.

DeTT&CT provides the following functionality:

  • Administrate and score the quality of your data sources.
  • Get insight on the visibility you have on for example endpoints.
  • Map your detection coverage.
  • Map threat actor behaviours.
  • Compare visibility, detections and threat actor behaviours in order to uncover possible improvements in detection and visibility. This can help you to prioritise your blue teaming efforts.

The coloured visualisations are created with the help of MITRE's ATT&CK™ Navigator.

Authors and contribution

This project is developed and maintained by Marcus Bakker (Twitter: @bakker3m) and Ruben Bouman (Twitter: @rubenb_2). Feel free to contact, DMs are open.

We welcome contributions! Contributions can be both in code, as well as in ideas you might have for further development, usability improvements, etc.

Work of others

Some functionality within DeTT&CT was inspired by work of others:

Example

YAML files are used for administrating scores and relevant metadata. All of which can be visualised by loading JSON layer files into the ATT&CK Navigator (some types of scores and metadata can also be written to Excel).

See below an example of mapping your data sources to ATT&CK which gives you a rough overview of your visibility coverage:

DeTT&CT - Data quality

Installation and requirements

See our GitHub Wiki: Installation and requirements.

License: GPL-3.0

DeTT&CT's GNU General Public License v3.0