Skip to main content

ATT&CK and D3FEND Mappings

The worked case includes a concrete mapping file:

examples/attack-mappings/det-001-attack-d3fend.yaml

DET-001 Mapping

ModelIDName
ATT&CK tacticTA0003Persistence
ATT&CK techniqueT1098Account Manipulation
Related ATT&CK techniqueT1485Data Destruction
Related ATT&CK techniqueT1490Inhibit System Recovery
D3FENDD3-AMAccount Monitoring
D3FENDD3-LAMLog Analysis
D3FENDD3-CAMCloud Account Monitoring

Mapping Rules

  • Every detection MUST name the behavior it detects and the evidence supporting that behavior.
  • A detection SHOULD map to an ATT&CK technique only when the behavior and source evidence support the mapping.
  • A detection MUST NOT force an ATT&CK technique to satisfy a coverage table.
  • If no defensible ATT&CK mapping exists, the detection MUST state ATT&CK mapping: Gap / Not mapped and explain why.
  • Every production candidate SHOULD map to at least one defensive countermeasure when a defensible mapping exists.
  • Mapping confidence MUST be documented when the technique is inferred rather than directly observed.

For the tradecraft standard behind this rule, use the Field Manual pages on ATT&CK as a working tool and ATT&CK mapping mistakes. For actor-specific examples, use the Israel CTI TTP To Detection Matrix.