Skip to main content
Version: Version 8.0

MITRE ATT&CK Framework Integration

The MITRE ATT&CK® integration in Trisul Network Analytics enables mapping of network detections to the MITRE ATT&CK framework. This provides structured visibility into observed adversarial techniques, helping analysts correlate alerts with known tactics and techniques.


Overview

Trisul integrates with Suricata-generated alerts and maps them to MITRE ATT&CK techniques. Once configured, detections are visualized in the MITRE ATT&CK Matrix, allowing users to:

  • View alerts categorized by ATT&CK techniques
  • Identify attack patterns across time ranges
  • Drill down into individual alerts
  • Access MITRE knowledge base references directly

Prerequisites

Before using the MITRE ATT&CK feature, ensure the following:

1. Switch to NSM Mode

Use the Product Mode Selector to enable NSM (Network Security Monitoring) mode.

2. Install Suricata App

Follow the official setup guide:
https://www.trisul.org/devzone/doku.php/tips:suricata-eve-unixsocket

This enables ingestion of Suricata EVE JSON alerts into Trisul.


Configure MITRE Rules for Suricata

After installing the Suricata app, you must configure the MITRE rules and Suricata settings.

1. Add MITRE Rules File

Copy the provided mitre.rules file to: /var/lib/suricata/rules/

2. Update Suricata Configuration

Replace or update the Suricata configuration file with the provided suricata.yaml at: /etc/suricata/suricata.yaml

This step ensures that Suricata generates alerts enriched with MITRE ATT&CK technique mappings.


Verifying Alert Flow

After completing setup:

  • Confirm that Suricata alerts are being received by Trisul
  • Ensure alerts are visible in the system before proceeding
  • MITRE ATT&CK mapping depends on incoming alert data

If no alerts are present, the matrix will remain empty.


Navigation

👉 Go to MITRE from the main sidebar
👉 Click on MITRE Matrix

This opens the ATT&CK Matrix view within Trisul.


Understanding the MITRE Matrix

The matrix displays techniques organized according to the MITRE ATT&CK framework.

  • Each cell represents a Technique ID.
  • The number of alerts mapped to that technique is flagged inside the cell.
  • Visualization updates based on selected filters.

Time and Alert Filters

You can refine the matrix using:

  • Time Frame – Define the duration for analysis
  • Max Count – Set the minimum number of alerts to display

Provide the time frame and the number of alerts to be displayed in that time frame and click Search

Understanding the MITRE ATT&CK Matrix Parameters

ParameterSectionDescriptionHow to Use
Total AlertsSummary MetricsDisplays the total number of alerts retrieved based on applied filters.Use this to understand overall alert volume in the selected timeframe.
Techniques HitSummary MetricsIndicates the number of unique MITRE techniques triggered.Helps assess how widespread the activity is across different attack techniques.
DurationSummary MetricsShows the time span covered by the selected data.Useful for understanding alert density and activity frequency.
Selected TimeSummary MetricsDisplays the exact time range currently applied.Confirms the active filter window before analyzing results.
Technique Cells (Txxxx)MITRE MatrixEach cell represents a MITRE ATT&CK technique and shows the number of alerts mapped to it.Click on a technique to view all associated alerts and investigate further.
Alert Count per TechniqueMITRE MatrixNumber displayed within each technique cell indicating alert frequency.Use this to identify high-activity techniques that may require immediate attention.
Technique DrilldownMITRE MatrixOpens detailed view of alerts for a selected technique.Click a technique → view alerts → use Action button to inspect full alert details and MITRE mappings.

Investigating Alerts

Viewing Alerts by Technique

  • Click on any highlighted Technique ID in the matrix
  • This opens a detailed view showing all alerts mapped to that technique within the selected time range

ParameterSectionDescriptionHow to Use
Search CriteriaFilter PanelAllows filtering of alerts using parameters like IP Address, Port, Time Frame, Priority, Classification, Signature, Description, and MITRE IDs.Use these filters to narrow down alerts for precise investigation. Combine multiple fields to refine results.
IP AddressSearch CriteriaFilters alerts based on source or destination IP.Enter a specific IP to isolate activity related to a host.
PortSearch CriteriaFilters alerts based on network port.Useful for identifying service-specific attacks (e.g., HTTP, FTP).
Time FrameSearch CriteriaDefines the time range for displayed alerts.Adjust to focus on a specific incident window.
PrioritySearch CriteriaFilters alerts based on severity or priority level.Use to focus on high-priority or critical alerts first.
ClassificationSearch CriteriaCategorizes alerts based on type (e.g., reconnaissance, exploitation).Helps group alerts by attack nature.
SignatureSearch CriteriaFilters based on Suricata rule/signature ID or name.Use known signatures (e.g., sid:1390) to track specific detections.
DescriptionSearch CriteriaText or regex-based filter on alert descriptions.Useful when searching for keywords like "scan" or "exploit".
MITRE Tactic IDSearch CriteriaFilters alerts by MITRE tactic.Helps isolate alerts under a specific attack phase.
MITRE Technique / Sub-techniqueSearch CriteriaFilters alerts using specific MITRE technique or sub-technique IDs.Enter IDs (e.g., T1595) to focus on a particular behavior.
Find AlertsAction ButtonExecutes the search based on selected filters.Click to refresh the alert list after applying filters.
Grouped ByAlert SummaryDisplays alerts grouped by Source IP, Destination IP, Signature, and Description.Use this to quickly identify patterns or repeated behaviors.
Alert TableResults TableLists individual alerts with detailed fields such as ID, Priority, IPs, Ports, Type, Description, Timestamp, and Probe.Scan rows for anomalies and click into specific alerts for deeper inspection.
Priority IndicatorAlert TableVisual label indicating alert severity (e.g., allowed, high priority).Helps quickly identify critical alerts.
Scan CheckAlert TableIndicates scan-related detection or classification.Useful for identifying reconnaissance activities.
TimestampAlert TableShows when the alert was triggered.Correlate events across time for incident analysis.
ProbeAlert TableIdentifies the sensor or probe that generated the alert.Useful in multi-probe deployments.
Download / PCAP / ActionsControlsOptions to download alert data or packet captures.Use for offline analysis or sharing with other teams.

Alert Details

Each alert entry provides:

  • Technique ID
  • Sub-technique ID
  • Tactic ID

Use the Action button to view detailed alert information.

ParameterSectionDescriptionHow to Use
Alert IDAlert DetailsUnique identifier for the alert.Use this ID to track, reference, or correlate the alert across systems.
Sensor IDAlert DetailsIdentifier of the sensor generating the alert.Useful in multi-sensor environments to trace alert origin.
TimeAlert DetailsTimestamp when the alert was generated.Helps correlate with other network events.
ProbeAlert DetailsIndicates the probe or monitoring instance.Useful for identifying where the alert was captured.
Source IPNetworkOriginating IP address of the activity.Identify the potential attacker or source system.
Source PortNetworkPort used by the source.Helps determine the type of communication initiated.
Destination IPNetworkTarget IP address.Identify the affected system.
Destination PortNetworkTarget service port (e.g., HTTP 80).Helps understand the targeted service.
SignatureSignature & ClassificationID of the detection rule (e.g., Suricata SID).Use to identify the rule that triggered the alert.
DescriptionSignature & ClassificationHuman-readable description of the alert.Quickly understand the nature of the activity.
ClassificationSignature & ClassificationCategory of the alert (e.g., scanning, exploitation).Helps group alerts by attack type.
PrioritySignature & ClassificationSeverity level of the alert.Focus on higher priority alerts first.
StatusSignature & ClassificationIndicates if the alert was allowed or blocked.Helps assess whether action was taken.
Ack FlagSignature & ClassificationIndicates if the alert has been acknowledged.Use for tracking investigation progress.
Extra TextAdditional InfoAdditional contextual information.Provides extended insight into the alert.
MITRE MappingMITRE ATT&CKDisplays associated Tactic ID, Technique ID, and Sub-technique ID.Click on IDs to view details in the MITRE ATT&CK knowledge base.
Snort/External LookupMore LinksOption to look up the alert externally (e.g., Snort ID).Use for additional threat intelligence.
FlowsDeep InspectionShows related network flows.Investigate traffic patterns related to the alert.
Pull PacketsRaw PacketsDownloads packet-level data (PCAP).Use for deep packet inspection and forensic analysis.
Suppress RuleSuppressionProvides rule syntax to suppress similar alerts.Use to reduce noise from known or benign alerts.
CloseActionCloses the alert details view.Return to the alert list.

Accessing MITRE Knowledge Base

From the alert details view:

  • Click on:
    • Technique ID
    • Sub-technique ID
    • Tactic ID

These links redirect to the official MITRE ATT&CK knowledge base for deeper context.


Summary

Once configured, the MITRE ATT&CK integration provides:

  • Structured mapping of detections to ATT&CK techniques
  • Visual representation via the ATT&CK matrix
  • Drill-down analysis of alerts
  • Direct linkage to MITRE knowledge base