
Using Arachne’s Thread with MITRE ATT&CK Navigator for your cyber defense.
MITRE ATT&CK Navigator is a free, web‑based workspace that lets analysts “paint” directly on top of the ATT&CK matrices instead of scrolling through a static table. Inside Navigator you build layers, lightweight JSON files that store colours, numeric scores, comments and filters for every technique and sub‑technique. You can load several layers at once, toggle them on or off, search and filter by platform, data source or keyword, then export the exact view as JSON, SVG, Excel or STIX for sharing.
In practice this means you can create a heat‑map of an adversary’s favourite techniques, overlay it with your own detection coverage, and hand the resulting gap analysis to engineering or leadership, all without writing code.
Access MITRE ATT&CK Navigator on the web, or check out their GitHub repository.
Instant coverage gap analysis: Overlay your SIEM detections, EDR alerts or Sigma rules to spot white‑space in seconds (no spreadsheet macros required).
Threat‑actor playbook comparison: Import a layer of APT29 TTPs and compare it against APT28 or FIN7 to see overlaps and unique tradecraft.
Incident post‑mortems: Reconstruct what the attacker actually did, then pivot to “how many of these steps would we have caught?”
Purple‑team scoping: Red teams plan chained techniques; Blue teams pre‑build detections; both use the same visual language, cutting debate time.
Executive storytelling: One slide of red‑amber‑green boxes explains risk posture better than ten pages of text.
Navigator is only as powerful as the cyber threat intelligence (CTI) you feed it, and until now that meant labour‑intensive workflows, reading each threat report, copying technique IDs by hand, or writing custom Python to parse STIX bundles. Thread removes that friction. When you drop a URL into Thread, the platform automatically scrapes the text, applies its machine‑learning model to map every sentence to ATT&CK techniques or sub‑techniques, and presents the analyst with an accept/reject review screen. Once you’re satisfied, you can export the results as a ready‑to‑import Navigator layer.
That JSON layer opens instantly in Navigator, displaying the attacker’s path across the kill chain in vivid colour and revealing where your controls catch, or miss, each step.
Imagine Thread ingests an analysis of a recent QakBot campaign: it tags
T1566.002 (spear‑phishing link) → T1204.002 (user execution of a malicious ISO) → T1059.001 (PowerShell) → T1055.012 (process hollowing) → T1105 (ingress tool transfer).
Load this layer beside your “detections present” layer and Navigator instantly shows that you already alert on suspicious PowerShell and process hollowing, but T1204.002 glows red — your SOC currently logs ISO mounts yet has no analytic tied to them. (For Windows environments, the mount action is captured in Microsoft‑Windows‑VHDMP‑Operational Event ID 1 when a virtual disk, including an ISO, is mounted, and Event ID 2 when it is unmounted.) The visual gap tells you to start parsing those VHDMP events, or Sysmon’s FileCreate for .iso files, and build enrichment around image execution, rather than trying to alert every time an ordinary email attachment opens.
What once took hours of manual curation now happens in minutes, turning fresh CTI into an actionable dashboard before the next incident hits.
Navigator and Thread, used in tandem, eliminate several day‑to‑day pain points that keep CTI insights from turning into concrete defence improvements.
First, they slash the “report‑to‑action” cycle: instead of analysts laboriously extracting technique IDs and building slides, Thread’s layer export feeds fresh CTI straight into Navigator, where it can be visualised and acted on within minutes.
Second, they enforce consistent, standards‑based tagging. Thread’s ML model assigns the ATT&CK IDs up front, so every analyst starts from the same canonical technique list rather than individual interpretations.
Third, the pairing keeps your view perpetually current; because Thread can re‑analyse this morning’s blog post, layers in Navigator reflect the adversary’s latest tradecraft instead of last quarter’s snapshot.
Finally, sharing becomes effortless. Navigator layers are lightweight JSON files that drop into Git, wikis, chat threads or ticketing systems, ending the silo problem where hard‑won CTI lives only on a single analyst’s laptop.
Together, Navigator and Thread transform raw threat reporting into an always‑up‑to‑date, team‑ready map of defensive gaps and priorities.
Detection engineering: Marry your “detected” layer with a Thread‑generated “latest adversary” layer. Anything red = write a rule.
Threat hunting: Drag a Thread layer into your hunt workbook; query logs for every technique that is red/orange but should have telemetry.
Control validation: Feed techniques into Atomic Red Team, Caldera or Prelude Operator; compare executed atoms against expected defences.
Board reporting: Export Navigator SVG, drop it into the slide deck with a one‑sentence takeaway: “We now cover 87% of APT44’s playbook; Network Discovery remains a gap.”
Getting value from the Thread‑to‑Navigator workflow takes only a few minutes.
Begin by pasting the URL or raw text of any threat write‑up into Thread. Thread immediately scrapes the content and runs its model, proposing technique and sub‑technique matches; you simply accept or reject each one. When the list looks right, click Export Navigator JSON.
Next, open the MITRE ATT&CK Navigator in your browser, hit Open Existing Layer, and upload the file you just saved. The layer appears instantly on the matrix, showing every technique in colour.
At this point you can add your own detection‑coverage layer, assign colours, such as green for logged, yellow for alerted, red for gaps, and toggle the two views to see exactly where you stand. From first paste to actionable visual map, the whole process typically takes less than fifteen minutes. If you don’t have a CTI team and you want a curated feed already mapped to ATT&CK, reach out to us.
MITRE ATT&CK Navigator turns the ATT&CK knowledge base into a living, tactical whiteboard, but only if you feed it rich, current CTI. Thread automates that feed, translating any threat write‑up into a precise Navigator layer in seconds. Together they let SOC analysts, CTI teams and security leaders move from knowing an attacker’s playbook to closing the gaps before the next alert hits.
Want to see it yourself? Analyse any write-up in Thread and download your first Navigator layer today.

“Arachne Digital’s team works closely with us in integrating our tool, Speculo, with their data. Speculo is designed to help organisations get a full picture of their cyber risk with reliable analytics and a streamlined risk assessment process. The integration of Arachne Digital’s threat intelligence into Speculo provides evidence-based insights into cyber risks, making the tool more relevant to our customers. Arachne facilitated multiple face-to-face meetings and video calls, provided technical resources, comprehensive documentation, and example reports. This collaboration ensured that we could seamlessly integrate and utilize their data, significantly enriching the value we deliver to our clients.
Arachne Digital’s commitment to excellence and their proactive approach in supporting our needs have made them an indispensable partner. We highly recommend their services to any organisation looking to strengthen their threat intelligence capabilities.”
Arachne Digital is proud to partner with the DISARM Foundation as the inaugural member of their Partner Programme, launched at the beginning of 2024.
This partnership is crucial in supporting the DISARM Foundation’s mission to maintain and enhance the DISARM Framework, ensuring it remains a free and continuously updated resource in the fight against disinformation.
Through our collaboration, Arachne Digital provides valuable feedback, promotes the integration of the framework into our operations, and encourages wider adoption within the defender community. This partnership highlights our commitment to combating evolving threats and fostering a secure digital environment.