MITRE ATT&CK Skill

MITRE ATT&CK framework mapping and analysis

509 stars

Best use case

MITRE ATT&CK Skill is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

MITRE ATT&CK framework mapping and analysis

Teams using MITRE ATT&CK Skill should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/mitre-attack/SKILL.md --create-dirs "https://raw.githubusercontent.com/a5c-ai/babysitter/main/library/specializations/security-research/skills/mitre-attack/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/mitre-attack/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How MITRE ATT&CK Skill Compares

Feature / AgentMITRE ATT&CK SkillStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

MITRE ATT&CK framework mapping and analysis

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# MITRE ATT&CK Skill

## Overview

This skill provides MITRE ATT&CK framework mapping, analysis, and adversary emulation capabilities.

## Capabilities

- Map TTPs to ATT&CK techniques
- Generate ATT&CK Navigator layers
- Query ATT&CK STIX data
- Create attack patterns and campaigns
- Analyze technique coverage
- Generate detection mappings
- Support ATT&CK ICS and Mobile
- Create adversary emulation plans

## Target Processes

- red-team-operations.js
- purple-team-exercise.js
- threat-intelligence-research.js
- malware-analysis.js

## Dependencies

- ATT&CK STIX data (via TAXII or local)
- ATT&CK Navigator
- mitreattack-python library
- Python 3.x

## Usage Context

This skill is essential for:
- Adversary emulation planning
- Detection gap analysis
- Threat intelligence correlation
- Red team operation planning
- Security posture assessment

## Integration Notes

- Supports all ATT&CK matrices (Enterprise, Mobile, ICS)
- Can generate Navigator layers for visualization
- Integrates with threat intelligence platforms
- Maps to detection rules and mitigations
- Supports campaign and group analysis