From sector targeting
to SIEM queries.

Pick the industry you defend. Get a live threat model with every actor, malware family, technique, and tool that touches it, then export the queries to run in your SIEM.

Pick a sector. Get a live threat model.

Seventeen sectors covered today, from financial services and healthcare to energy, manufacturing, and government. Pick yours and ThreatCluster builds the threat model from the live knowledge graph.

Every actor, malware family, campaign, tool, and MITRE ATT&CK technique that co-occurs with that sector in the cluster data shows up. No manual curation. When a new group starts targeting healthcare, it surfaces in the healthcare model on the next refresh.

  • 17 industries, including CNI sub-sectors
  • Live model rebuilt from the knowledge graph
  • Co-occurrence sourced, not analyst-curated
Threat Hunt page with industry threat model click to expand
image · 1
Threat Hunt overview
Industry picker. Threat actor list, malware list, campaign list, relationship graph for the chosen sector.

Four views of the same model.

Overview shows actors, malware, campaigns, and a relationship graph alongside the consolidated IOC watchlist. Diamond Model renders the canonical intrusion picture with adversary, capability, infrastructure, and victim nodes.

ATT&CK Matrix lays every observed technique across the MITRE tactics columns, colour-graded by frequency, with sub-techniques toggleable. Tools & RMM Dashboard covers C2 frameworks, LOLBins, and remote access software used by the actors in the model.

Overview Diamond Model ATT&CK Matrix Tools & RMM
Four hunt view tabs click to expand
image · 2
View tabs
Tab strip for Overview / Diamond Model / ATT&CK Matrix / Tools & RMM. ATT&CK matrix in the foreground.

Hunting queries in your SIEM dialect.

Export queries in KQL for Microsoft Sentinel and Defender XDR, SPL for Splunk, or Lucene for Elastic and OpenSearch. Two query types ship together for every export.

IOC queries are built straight from the live entity graph. No model in the loop, so nothing's invented. TTP queries come from SigmaHQ and the Microsoft Sentinel rule libraries, mapped to every technique in the threat model.

Microsoft Sentinel (KQL)
Splunk (SPL)
Elastic / OpenSearch (Lucene)
Generated KQL queries for the threat model click to expand
image · 3
Hunt query export
Modal showing generated KQL queries grouped by ATT&CK technique. Copy buttons per query.

Hunt playbooks for the techniques that matter.

For the top 10 priority techniques in your threat model, the page renders a playbook block. The technique, what it looks like in practice, the actors and malware using it, and the curated detection rules already mapped to it.

Designed so an analyst can read the page top to bottom and walk away knowing what to hunt for and why. Source attribution on every rule. Severity grading carried through from the upstream library.

Hunt playbook entries with rules per technique click to expand
image · 4
Hunt playbooks
Playbook block for one MITRE technique. Used by carousel, platform list, "View clusters" link, attached rules.

Export bar for the whole model.

ATT&CK Navigator layer for visualising coverage in MITRE's own tool. Threat-model JSON for piping into internal systems. IOC blocklist as TXT or CSV for firewalls and proxies.

Plus the SIEM query exports for Sentinel, Splunk, and Elastic. Every export pinned to the timestamp of the underlying knowledge-graph snapshot, so you can replay "what did the model look like the day we hunted it".

Export bar with Navigator, JSON, IOC, SIEM exports click to expand
image · 5
Export bar
Row of buttons for Navigator layer, threat-model JSON, IOC blocklist (TXT/CSV), Sentinel/Splunk/Elastic queries.

Stop reading reports.
Start running queries.

Pick a sector, get a threat model, export the queries. The page is free to open and the export is in your SIEM dialect by default.