MITRE ATT&CK framework

Created by the MITRE Corporation, MITRE ATT&CK is an acronym that stands for MITRE Adversarial Tactics, Techniques, and Common Knowledge. It is a globally-accessible collection of observed real-world threat actor actions and behavior. The MITRE ATT&CK framework describes 14 tactics and several techniques that security analysts can use to identify attacks in progress. MITRE uses IDs to reference the tactic or technique employed by an adversary.

The Wazuh integration with MITRE ATT&CK framework is provided through an out-of-the-box module on the Wazuh dashboard. It allows users to map alerts generated by Wazuh to specific tactics and techniques. This gives security teams a better understanding of the nature of the threats they are facing and helps them develop effective mitigation strategies.

The Wazuh MITRE ATT&CK module is accessible under the THREAT DETECTION AND RESPONSE section of the main page of the Wazuh dashboard. It is shipped with various functionalities to help enhance your threat detection.

The Wazuh MITRE ATT&CK module


The Intelligence tab of the Wazuh dashboard includes information about known threat actors or groups that have been observed using particular Tactics, Techniques, and Procedures (TTPs). It also provides any relevant indicators of compromise (IOCs) or mitigations that can be used to detect or prevent attacks leveraging the TTPs.

Additionally, it contains links to relevant external sources such as MITRE ATT&CK pages, blog posts, and white papers that provide detailed information about each TTP.

Intelligence tab


The Framework tab of the Wazuh MITRE ATT&CK module provides a high-level overview of the tactics and techniques occurring in endpoints monitored by the Wazuh server. This tab enables users to filter and search for specific tactics and techniques, and view which endpoints the events occurred on. You can use this functionality to identify vulnerable areas in your environment.

Framework tab


The MITRE ATT&CK Dashboard tab provides an overview of the current state of your infrastructure with respect to known adversarial Tactics, Techniques, and Procedures (TTPs) in the MITRE ATT&CK framework. The dashboard displays key indicators such as the total number of events, alerts, and a summary of the top 10 TTPs detected within your environment. These indicators can be used to assess the effectiveness of existing security controls and identify areas that may require further attention. Additionally, you can customize the dashboard to display specific metrics that are most relevant to your organization's security posture.

Dashboard tab


The MITRE ATT&CK Events tab provides detailed information about each event that has been detected within your environment. It includes their correlation to specific TTPs as defined by the MITRE ATT&CK framework. The information shown in this tab is particularly useful for security teams who need to investigate suspicious activity. It allows them to drill down into the details of individual events and assess their potential impact on an environment.

You can filter the events based on various criteria such as severity, event type, and detection method, and also sort them by different fields to locate relevant information quickly. Additionally, the tab provides access to additional details, such as the full event log message and any related alerts that may have been generated in response to the event.

Events tab


The Wazuh MITRE ATT&CK module also supports a range of customization options. For example, users can define custom mappings between Wazuh alerts and specific tactics and techniques, allowing them to tailor the module to their unique needs and requirements.

Customization example

Wazuh offers out-of-the-box detection rules that are mapped against relevant MITRE IDs. In addition, you can also configure custom rules and assign corresponding MITRE ATT&CK IDs based on the techniques involved in the attack.

For this example, we require the following infrastructure:


Example description

Wazuh server

You can download the Wazuh OVA or install it using the installation guide.

Windows 11

We perform privilege escalation emulation attack on this endpoint.
You need to install and enroll a Wazuh agent on this endpoint. To install the Wazuh agent, refer to the Wazuh Windows installation guide.

Wazuh server

  1. Append the following rules to the /var/ossec/etc/rules/local_rules.xml file:

    <group name="windows,sysmon,privilege-escalation">
      <rule id="110011" level="10">
        <field name="win.eventdata.targetObject" type="pcre2">HKLM\\\\System\\\\CurrentControlSet\\\\Services\\\\PSEXESVC</field>
        <field name="win.eventdata.eventType" type="pcre2">^SetValue$</field>
        <field name="win.eventdata.user" type="pcre2">NT AUTHORITY\\\\SYSTEM</field>
        <description>PsExec service running as $(win.eventdata.user) has been created on $(</description>

    The rule 110011 creates an alert whenever there is a creation of a service named PSEXESVC, which occurs each time PsExec is executed on the Windows endpoint. It is mapped to the MITRE ATT&CK ID T1543.003, indicating the persistence and privilege escalation tactics.

    When the rule triggers, the alert contains information about the MITRE ATT&CK ID T1543.003.

  2. Restart the Wazuh manager service to apply the changes:

    $ sudo systemctl restart wazuh-manager.service

Windows 11

Perform the following steps to configure the Wazuh agent to capture Sysmon logs and send them to the Wazuh server for analysis.

  1. Download Sysmon and the configuration file sysmonconfig.xml.

  2. Launch PowerShell with administrative privilege, and install Sysmon as follows:

    > .\Sysmon64.exe -accepteula -i .\sysmonconfig.xml
  3. Edit the Wazuh agent C:\Program Files (x86)\ossec-agent\ossec.conf file and include the following settings within the <ossec_config> block:

    <!-- Configure Wazuh agent to receive events from Sysmon -->
  4. Restart the Wazuh agent for the changes to take effect:

    > Restart-Service -Name wazuh

PsExec execution

Download the PsTools archive from the Microsoft Sysinternals page and extract the PsExec binary from the archive. The following command escalates a Windows PowerShell process from an administrator user to a SYSTEM user:

> .\psexec -i -s powershell /accepteula

Run the command below to confirm that the new instance of PowerShell is running as SYSTEM user:

> whoami
PS C:\Windows\system32> whoami
nt authority\system

Visualize the alerts

We use filters on the Security Module > MITRE ATT&CK > Events tab of the Wazuh dashboard to query for specific MITRE IDs, tactics, or techniques, as shown in the figure below.

Visualize the alerts
Events filters

Expand the alert with rule ID 110011 alert to view the MITRE ID T1543.003 information.

MITRE ID T1053.005 information

Click on the JSON tab to view the details of the alert in JSON format:

  "agent": {
    "ip": "",
    "name": "Windows11",
    "id": "002"
  "manager": {
    "name": "wazuh-server"
  "data": {
    "win": {
      "eventdata": {
        "image": "C:\\\\Windows\\\\system32\\\\services.exe",
        "targetObject": "HKLM\\\\System\\\\CurrentControlSet\\\\Services\\\\PSEXESVC\\\\ObjectName",
        "processGuid": "{45cd4aff-93d1-6501-0b00-000000000b00}",
        "processId": "720",
        "utcTime": "2023-10-16 12:12:15.759",
        "ruleName": "technique_id=T1543,technique_name=Service Creation",
        "details": "LocalSystem",
        "eventType": "SetValue",
        "user": "NT AUTHORITY\\\\SYSTEM"
      "system": {
        "eventID": "13",
        "keywords": "0x8000000000000000",
        "providerGuid": "{5770385f-c22a-43e0-bf4c-06f5698ffbd9}",
        "level": "4",
        "channel": "Microsoft-Windows-Sysmon/Operational",
        "opcode": "0",
        "message": "\"Registry value set:\r\nRuleName: technique_id=T1543,technique_name=Service Creation\r\nEventType: SetValue\r\nUtcTime: 2023-10-16 12:12:15.759\r\nProcessGuid: {45cd4aff-93d1-6501-0b00-000000000b00}\r\nProcessId: 720\r\nImage: C:\\Windows\\system32\\services.exe\r\nTargetObject: HKLM\\System\\CurrentControlSet\\Services\\PSEXESVC\\ObjectName\r\nDetails: LocalSystem\r\nUser: NT AUTHORITY\\SYSTEM\"",
        "version": "2",
        "systemTime": "2023-10-16T12:12:15.7636688Z",
        "eventRecordID": "118081",
        "threadID": "3644",
        "computer": "Windows11",
        "task": "13",
        "processID": "3140",
        "severityValue": "INFORMATION",
        "providerName": "Microsoft-Windows-Sysmon"
  "rule": {
    "firedtimes": 4,
    "mail": false,
    "level": 10,
    "description": "PsExec service running as NT AUTHORITY\\\\SYSTEM has been created on Windows11",
    "groups": [
    "mitre": {
      "technique": [
        "Windows Service"
      "id": [
      "tactic": [
        "Privilege Escalation"
    "id": "110011"
  "location": "EventChannel",
  "decoder": {
    "name": "windows_eventchannel"
  "id": "1694607138.3688437",
  "timestamp": "2023-10-16T12:12:18.684+0000"

The alerts display the MITRE ATT&CK ID and its associated tactics and techniques. This helps users quickly understand the nature of the attack and take appropriate actions.