Air Force Logo
Thundercats Logo
All lab projects
Live

MITRE ATT&CK 3D Explorer

An interactive 3D graph of MITRE ATT&CK Enterprise — techniques, threat groups, and software, with multi-dimensional filtering and search.

  • React
  • Three.js
  • R3F
  • TypeScript
MITRE ATT&CK 3D Explorer

What it is

The ATT&CK matrix as most people know it is a 2D grid — tactics across the top, techniques in each column. It's useful but flat. The relationships between techniques, the threat groups that use them, and the malware that implements them all collapse into footnotes and external links.

This explorer treats the full corpus as a 3D graph: tactics arc across the top, technique clouds hang below each one, sub-techniques sit just behind their parents, and threat groups and software float in back-planes with translucent arcs to the techniques they touch. Search and multi-dimensional filtering make intersections obvious — “persistence techniques on Linux that APT29 has used and Lazarus hasn't” becomes a few clicks instead of a spreadsheet query.

How to use it

Open the explorer. Drag to orbit, scroll to zoom. Search by technique name or ID (T1059, PowerShell) or threat group (APT29,Cozy Bear). Stack filters in the left sidebar to find intersections. Click any node to inspect its full info and pivot to related nodes.

Data: MITRE ATT&CK Enterprise v19.1, auto-refreshed monthly via GitHub Actions.