TOOLS / MITRE ATT&CK
MITRE ATT&CK Technique Lookup
Look up any MITRE Enterprise ATT&CK technique by ID — tactics, platforms, detection guidance, data sources, and mitigations. Backed by the official MITRE CTI STIX feed (cached 7 days).
What it does
The MITRE ATT&CK matrix is the most widely adopted framework for describing real-world adversary behavior. Each technique (e.g. T1059.001 — PowerShell) is mapped to one or more tactics (the why), platforms (where it works), data sources for detection (what logs to watch), and mitigations (what controls disrupt it). Our lookup queries the official MITRE CTI STIX feed and renders the technique with all those fields in one card — useful for SOC playbook annotation, detection-engineering prioritization, or red-team report writing.
How to use it
- Enter any ATT&CK Enterprise technique ID in TXXXX or TXXXX.XXX format (e.g. T1059, T1003.001, T1486).
- The card shows: tactic(s), platforms, description, data sources, detection guidance, and mitigations.
- Click "View on attack.mitre.org" for the full canonical page including procedure examples and sub-techniques.
- For mapping detections, focus on the "Data sources for detection" list — those tell you which log feeds carry the signal.
Common use cases
Frequently asked questions
Why aren’t mobile / ICS techniques here? +
How fresh is the data? +
What are "sub-techniques"? +
Why no procedure examples? +
Related tools
Related coverage on Ciphers Security
- CISA Contractor Leaked AWS GovCloud Keys on GitHub for Six Months
- Ghostwriter Deploys Prometheus Phishing Lures Against Ukraine Government Entities
- Screening Serpens: Iranian APT Fuses AppDomainManager Hijacking with New RATs in 2026 Espionage Campaign
- CVE-2026-9082: Critical Drupal SQL Injection Under Attack on Thousands of Sites
- CVE-2026-20182: Cisco Catalyst SD-WAN CVSS 10.0 Auth Bypass Actively Exploited
Free for everyone, no signup required. Tool runs at /tools/mitre-attack/ — bookmark or share.