THREAT HUNTING
MITRE ATT&CK Analytics
Technique-level hunting coverage, trend shifts, and high-priority detections in one unified workflow.
5 critical techniques are active
Critical techniques should be prioritized for rule tuning and hunt task allocation.
7 techniques are trending up
Use trend filters and date range controls to focus on fast-changing behavior.
TOTAL DETECTIONS
1,211
Across mapped techniques
CRITICAL TECHNIQUES
5
Priority triage
TRENDING UP
7
Potential escalation
AVG COVERAGE
77%
Tactic coverage baseline
TECHNIQUE INVENTORY
| ID | Technique | Tactic | Detections | Severity | Trend | Last Seen | |
|---|---|---|---|---|---|---|---|
| T1566 | Phishing | Initial Access | 89 | HIGH | ↑ | 2h ago | |
| T1059 | Command and Scripting Interpreter | Execution | 234 | CRITICAL | ↑ | 15m ago | |
| T1078 | Valid Accounts | Persistence | 156 | HIGH | — | 1h ago | |
| T1068 | Exploitation for Privilege Escalation | Privilege Escalation | 34 | CRITICAL | ↑ | 30m ago | |
| T1027 | Obfuscated Files or Information | Defense Evasion | 178 | MEDIUM | ↓ | 3h ago |
Total 11 · Page 1 of 3
TACTIC COVERAGE
Initial Access78%
Execution91%
Persistence82%
Privilege Escalation71%
Defense Evasion58%
Credential Access85%
Lateral Movement74%
Exfiltration67%
Impact88%
TOP DETECTIONS
T1083
File and Directory Discovery
245—
T1059
Command and Scripting Interpre...
234↑
T1027
Obfuscated Files or Informatio...
178↓
T1078
Valid Accounts
156—
T1021
Remote Services
123↑