Claude Skills Guide

Claude Code for MITRE ATT&CK Workflow Guide

Security teams face a persistent challenge: translating raw threat intelligence into actionable detections, mitigations, and compliance documentation. The MITRE ATT&CK framework provides the taxonomy, but the manual effort required to map techniques, write detection rules, and maintain coverage is substantial. This is where Claude Code transforms your workflow.

This guide demonstrates how to build Claude skills that automate and accelerate MITRE ATT&CK-related tasks, enabling your team to move from reactive threat response to proactive defense engineering.

Understanding the MITRE ATT&CK Integration Challenge

The MITRE ATT&CK framework contains over 190+ techniques across 14 tactic categories. When analyzing a new threat or conducting a purple team exercise, you typically need to:

  1. Identify relevant techniques from threat intelligence
  2. Map those techniques to your environment’s attack surface
  3. Detect existing coverage gaps
  4. Write or generate detection rules (Sigma, YARA, Snort, etc.)
  5. Document mitigation strategies
  6. Track coverage over time

Doing this manually for each incident or assessment is time-consuming. A well-designed Claude skill can guide you through this process, suggest appropriate detections, and even generate initial rule drafts.

Building a MITRE ATT&CK Skill

The foundation of your workflow automation is a Claude skill specifically designed for ATT&CK tasks. Here’s a practical skill structure:

---
name: mitre-attck-helper
description: "Assists with MITRE ATT&CK technique analysis, detection rule generation, and coverage mapping"
---

You are a MITRE ATT&CK expert assistant. When provided with:
- A technique ID (e.g., T1566) or name (e.g., Phishing)
- Threat intelligence data
- Detection requirements

Analyze the technique, identify relevant sub-techniques, suggest detection approaches, and generate initial detection rules.

## Available Resources
- ATT&CK Navigator for coverage visualization
- Sigma rules repository for detection patterns
- Your organization's detection engineering standards

This skill provides Claude with context about the ATT&CK framework and establishes the expected output format for its responses.

Practical Workflow: Incident Response to Detection

When a new incident arrives, you can use this workflow:

Step 1: Technique Extraction

Provide Claude with your incident details (threat report, sandbox analysis, or SIEM alerts). The skill analyzes the behavior and maps it to relevant ATT&CK techniques:

User: "Analyze this threat report about the recent ransomware 
campaign. The malware uses spearphishing attachments, 
creates scheduled tasks for persistence, and encrypts 
files using AES-256."

Claude: "Based on the behavior described, here's the technique 
mapping:
- T1566 (Phishing) - Spearphishing Attachment
- T1053.005 (Scheduled Task/Job) - Scheduled Task
- T1486 (Data Encrypted for Impact)

Would you like me to:
1. Detail detection approaches for each technique?
2. Generate Sigma rule drafts?
3. Check current detection coverage?"

Step 2: Detection Rule Generation

Once you’ve identified techniques, Claude can generate initial detection rules. Here’s a Sigma rule generated for detecting the scheduled task persistence:

title: Suspicious Scheduled Task Creation
id: 9e4f8c3a-5d7b-4a6e-9f1c-2b8d4e5f6a7c
status: experimental
description: Detects suspicious scheduled task creation related to ransomware persistence
author: Claude Code Generator
date: 2026/03/15
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    Image|endswith: '\svchost.exe'
    CommandLine|contains|all:
      - 'schtasks'
      - '/create'
  condition: selection
fields:
  - CommandLine
  - ParentImage
  - User
falsepositives:
  - Legitimate software updates
  - System maintenance tasks
level: high
tags:
  - attack.persistence
  - attack.t1053.005
  - mitre.tactics TA0003

Step 3: Coverage Gap Analysis

Integrate your detection rules with the ATT&CK Navigator to visualize coverage:

#!/usr/bin/env python3
import json
import csv

# Load your detection rules and map to techniques
def analyze_coverage(rules_file, technique_coverage_file):
    with open(rules_file) as f:
        rules = json.load(f)
    
    covered_techniques = set()
    for rule in rules.get('rules', []):
        tags = rule.get('tags', [])
        for tag in tags:
            if tag.startswith('attack.'):
                technique = tag.replace('attack.', 'T')
                covered_techniques.add(technique)
    
    # Generate coverage report
    print(f"Total covered techniques: {len(covered_techniques)}")
    print(f"Coverage: {len(covered_techniques)/190*100:.1f}%")
    return covered_techniques

if __name__ == "__main__":
    analyze_coverage('detections/sigma-rules.json', 'attack-coverage.json')

Actionable Advice for Implementation

Start with High-Impact Techniques

Don’t try to cover everything at once. Prioritize techniques relevant to your threat model:

  1. External-facing services (T1190, T1133) - often initial access vectors
  2. Credential access (T1110, T1555) - high-value targets for attackers
  3. Lateral movement (T1021, T1082) - critical for incident scope

Maintain a Technique Knowledge Base

Create a shared repository of technique documentation that your team can reference:

/mitre-techniques/
├── T1566-phishing/
│   ├── detection-sigma.md
│   ├── mitigation.md
│   ├── logsources.md
│   └── coverage-status.yaml
├── T1003-credential-dumping/
│   └── ...

Version Control Your Detection Rules

Track detection rules in Git with clear commit messages:

git commit -m "Add detection for T1566.001 - Phishing with malicious attachment
- Rule: sigma_spearphishing_attachment.yaml
- Coverage: new detection
- Testing: validated against C2 carver dataset"

Advanced: Automating the Full Pipeline

For mature security teams, consider integrating Claude with your SIEM or SOAR platform:

# Example: Automated detection deployment workflow
def deploy_detection(rule_name, technique_id, environment):
    # 1. Validate rule syntax
    validate_sigma_rule(rule_name)
    
    # 2. Test against historical data
    test_rule(rule_name, environment)
    
    # 3. Deploy to SIEM
    deploy_to_siem(rule_name)
    
    # 4. Update coverage tracking
    update_coverage(technique_id, "covered")
    
    # 5. Notify team
    notify_slack(f"New detection deployed: {technique_id}")

Conclusion

Claude Code transforms MITRE ATT&CK workflows from manual, time-intensive processes into accelerated, repeatable operations. By building specialized skills, generating detection rules, and automating coverage analysis, your team can focus on high-value security work rather than documentation and mapping.

Start small—build one skill for your most common use case—and expand as your detection engineering practice matures. The key is consistency in how you document techniques, version your rules, and track coverage over time.

Remember: the goal isn’t perfect coverage of all 190+ techniques, but rather meaningful detection of the techniques most relevant to your organization’s threat landscape.

Built by theluckystrike — More at zovo.one