ASATA
Advanced Skills & Adversary Tactics Articulation
Search across 1 million Windows functions used in today’s most popular offensive tradecraft. Operators can filter their search criteria by Windows functions, function parameters and MITRE defined behavior types. ASATA observes real-time trends in the cybersecurity ecosystem so as to continually grow the offensive codebase made available to search.
Get a rapid understanding of how adversaries build their tactics by seeing a visual layout of the codebase. Further tactic comprehension is bolstered by being able to select MITRE defined behavior types and having the corresponding source code visualized. Interface users are able to click on called functions and their parameters to get the related MSDN documentation and jump directly into the source code to where those functions and parameters are used.
ASATA is built atop advanced cyber intelligence automation that continually monitors the cyber security ecosystem. Human activities within that ecosystem are measured and mapped, allowing ASATA to alert its users to new and emerging trends in exploitation.
ASATA is built atop advanced cyber intelligence automation that continually monitors the cyber security ecosystem. Human activities within that ecosystem are measured and mapped, allowing ASATA to alert its users to new and emerging trends in exploitation.