Ashfaaq Farzaan

Technique Inference Engine (TIE) 🎯

🎯 Project Overview

The Technique Inference Engine (TIE) is a powerful tool designed to help cyber defenders forecast an adversary’s next steps. By analyzing previously observed MITRE ATT&CK® techniques, TIE predicts likely associated techniques that may not have been detected yet or are planned by the attacker.

This project is an extension of the MITRE Center for Threat-Informed Defense (CTID) TIE project, adding trained models, evaluation scripts, and enhanced inference utilities.


🚀 Key Features

  • 🧠 Predictive Modeling: Uses Weighted Alternating Least Squares (WALS) matrix factorization to learn latent embeddings for threat reports and ATT&CK techniques.

  • 📊 Co-occurrence Analysis: Learns from technique co-occurrence data to identify patterns in adversary behavior.

  • 🛠️ Comprehensive Utilities: Includes scripts for training models with full hyperparameter search, evaluating performance, and running inference on new data.


🧪 How it Works

The engine maps observed behavior to the MITRE ATT&CK framework and uses recommendation system algorithms to suggest the most probable “next” or “missing” techniques. This allows SOC analysts and threat hunters to:

  • Fill gaps in visibility.
  • Anticipate attacker maneuvers.
  • Prioritize defensive telemetry.

🔗 Explore the Repository