Current ThreatQ Version Filter

MITRE ATT&CK Navigator Operation

The web format of this guide reflects the most current release.  Guides for older iterations are available in PDF format.  

Integration Details

ThreatQuotient provides the following details for this integration:

Introduction

The MITRE ATT&CK Navigator Operation for ThreatQ allows an analyst to export an Adversary, and its related Attack Patterns, for use in the MITRE ATT&CK Navigator.

The operation provides the following action:

  • Generate Layer - export Adversary and related Attack Patterns as JSON following the MITRE ATT&CK Navigator 4.2 specification.

The operation is compatible with the following system objects:

  • Adversaries
  • Campaigns
  • Events
  • Malware
  • Reports
  • Tools

Installation

Perform the following steps to install the integration:

The same steps can be used to upgrade the integration to a new version.

  1. Log into https://marketplace.threatq.com/.
  2. Locate and download the integration file.
  3. Navigate to the integrations management page on your ThreatQ instance.
  4. Click on the Add New Integration button.
  5. Upload the integration file using one of the following methods:
    • Drag and drop the file into the dialog box
    • Select Click to Browse to locate the integration file on your local machine

    ThreatQ will inform you if the operation already exists on the platform and will require user confirmation before proceeding. ThreatQ will also inform you if the new version of the operation contains changes to the user configuration. The new user configurations will overwrite the existing ones for the operation and will require user confirmation before proceeding.

The operation is now installed and will be displayed in the ThreatQ UI. You will still need to configure and then enable the operation.

Configuration

ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.

To configure the integration:

  1. Navigate to your integrations management page in ThreatQ.
  2. Select the Operation option from the Type dropdown (optional).
  3. Click on the integration entry to open its details page.
  4. Enter the following parameters under the Configuration tab:
    Parameter Description
    Enable SSL Certificate Verification Enable this parameter for the integration to validate the host-provided SSL certificate. 
    Disable Proxies Enable this parameter if the integration should not honor proxies set in the ThreatQ UI. 
  5. Review any additional settings, make any changes if needed, and click on Save.
  6. Click on the toggle switch, located above the Additional Information section, to enable it.

Actions

The operation provides the following action:

Action Description Object Type Object Subtype
Generate Layer Export Adversary and related Attack Patterns as JSON following the MITRE ATTACK Navigator 4.4 specification. Adversaries, Campaigns, Events, Tools,  Malware, Reports N/A

Generate Layer

The Generate Layer action exports Adversary and related Attack Patterns as JSON following the MITRE ATTACK Navigator 4.4 specification.

Sample Response:

{
    "versions": {
        "layer": "4.4",
        "navigator": "4.8.0"
    },
    "hideDisabled": false,
    "description": "Generated: 2026-03-05 08:29:05",
    "domain": "enterprise-attack",
    "legendItems": [
        {
            "label": "Is part of 'None'",
            "color": "#ff6666"
        }
    ],
    "sorting": 0,
    "filters": {
        "platforms": [
            "PRE",
            "Windows",
            "Linux",
            "macOS",
            "Network",
            "AWS",
            "GCP",
            "Azure",
            "Azure AD",
            "Office 365",
            "SaaS",
            "Google Workspace",
            "Containers"
        ]
    },
    "techniques": [],
    "name": "FIN6"
}

ThreatQuotient provides the following default mapping for this operation action based on each item with the .adversary.

Feed Data Path ThreatQ Entity ThreatQ Object Type or Attribute Key Examples Notes
versions.layer / versions.navigator Integration Layer Hardcoded values { "layer": "4.4", "navigator": "4.8.0" } Always set by plugin to match MITRE Navigator spec.
.hideDisabled Integration Layer Default value false Defaults to False unless explicitly changed.
.description Source Object Object description or generated timestamp "Generated: 2026-03-05 08:29:05" Uses ThreatQ description if use_tq_description is enabled, otherwise timestamp.
.domain Integration Layer User parameter "enterprise-attack" Selected between Enterprise or Mobile domains.
.legendItems Integration Layer Derived from config [{"label": "Is part of 'None'", "color": "#ff6666"}] Added when add_technique_score is False.
.sorting Integration Layer Default value 0 Always set to 0.
.filters.platforms Integration Layer Domain filter map [PRE, Windows, Linux, macOS, Network, AWS, GCP, Azure, Azure AD, Office 365, SAAS, Google Workspace, Containers] Populated from filter_map dictionary in script.
.techniques Attack Pattern Related Attack Pattern attributes [] (empty in FIN6 sample) Built dynamically from linked Attack Patterns.
.name Source Object Object value "FIN6" Uses obj.get("value"), obj.get("name"), or obj.get("title").
.metadata Source Object Object attributes [{"name":"Sector","value":"Finance"}] (if present) Only included if attribute_metadata option is enabled.
techniques[].techniqueID Attack Pattern Attribute: Technique ID "T1078" Extracted via regex or attribute.
techniques[].tactic Attack Pattern Attribute: Tactic "defense-evasion" Lowercased and hyphenated.
techniques[].score Attack Pattern Attribute: MITRE Navigator Score 75 Used if add_technique_score is enabled; defaults to 50 if missing.
techniques[].color Attack Pattern Default color "#ff6666" Used when scores are not enabled.
techniques[].enabled Attack Pattern Hardcoded value true Always set to true by the plugin.
techniques[].metadata Attack Pattern All attributes [{"name":"Source","value":"ThreatQ"}, {"divider":true}] Added if attribute_metadata option is enabled.
techniques[].showSubtechniques Attack Pattern Derived from technique ID true Ensures parent techniques expand properly when subtechniques exist.

Run Configuration Options

These configuration options are set after selecting the action to run against an object and are not set from the operation's configuration screen.

The following configuration options are available for this action:

Run Option description
Layer Name Name for this layer. If left blank, the name will be the object's value.
Description Enter a description for the layer.

A description is not needed if you have enabled the Use the description in ThreatQ instead of the providing one option.

Use the description in ThreatQ instead of the providing one Enable this option to have the integration use the description in ThreatQ opposed to the one entered in the Description option.
MITRE Domain Select the MITRE Domain for the layer.  Options include Enterprise and Mobile.
Show techniques by default in Navigator Enable this option to show techniques by default in Navigator. 
Include object attributes as metadata Enable this option to include object attributes as metadata.    
Use the attribute 'MITRE Navigator Score' as the Attack Pattern score Enable this option to use the value of the Attack Pattern's attribute MITRE Navigator Score to color the technique. 

 

Run Options

Change Log

  • Version 1.0.3
    • Updated the integration to prevent crashes caused by duplicate uploads by ensuring file contents are unique and adding improved error handling.
    • Added the following configuration parameters:
      • Enable SSL Certificate Verification - determine if the integration should validate the host-provided SSL certificate.
      • Disable Proxies - determine if the integration should honor proxies set in the ThreatQ UI. 
  • Version 1.0.2
    • Added the Run Parameter, Use the attribute 'MITRE Navigator Score' as the Attack Pattern score, to set a score for each Attack Pattern.  
  • Version 1.0.1
    • The operation is now compatible with Tools and Events object types.  
  • Version 1.0.0
    • Initial release

PDF Guides

Document ThreatQ Version
MITRE ATT&CK Navigator Operation v1.0.3 4.30 or Greater
MITRE ATT&CK Operation v1.0.2 4.30 or Greater
MITRE ATT&CK Operation v1.0.1 4.30 or Greater
MITRE ATT&CK Operation v1.0.0 4.30 or Greater