MITRE ATT&CK® Framework

Global knowledge base of adversary tactics and techniques based on real-world observations

14
Tactics
250
Techniques
401
Sub-techniques
136+
APT Groups

What is MITRE ATT&CK?

MITRE ATT&CK (Adversarial Tactics, Techniques & Common Knowledge) is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

The ATT&CK matrix is used as the foundation for developing threat models and methodologies specific to the private sector, government, and the cybersecurity products and services community.

The 14 ATT&CK Tactics

Tactics represent the "why" of a technique or sub-technique. It is the tactical objective of the adversary.

TA0043

1. Reconnaissance

11 techniques

Gathering information to plan future operations

Examples of techniques:

Active Scanning
Search Open Websites
Gather Victim Identity Information
TA0042

2. Resource development

8 techniques

Establishment of resources to support operations

Examples of techniques:

Acquire Infrastructure
Develop Capabilities
Obtain Capabilities
TA0001

3. Initial access

11 techniques

Entry point into the target network

Examples of techniques:

Phishing
Exploit Public-Facing Application
Valid Accounts
TA0002

4. Execution

17 techniques

Execution of malicious code on the system

Examples of techniques:

Command and Scripting Interpreter
Native API
User Execution
TA0003

5. Persistence

23 techniques

Maintenance of access to compromised systems

Examples of techniques:

Boot or Logon Autostart
Create Account
Scheduled Task
TA0004

6. Privilege escalation

14 techniques

Obtaining higher-level permissions

Examples of techniques:

Abuse Elevation Control
Access Token Manipulation
Process Injection
TA0005

7. Defense evasion

47 techniques

Avoiding detection during an operation

Examples of techniques:

Obfuscated Files
Process Injection
Masquerading
TA0006

8. Credential access

17 techniques

Theft of account names and passwords

Examples of techniques:

Brute Force
Credentials from Password Stores
OS Credential Dumping
TA0007

9. Discovery

34 techniques

Exploration of the compromised environment

Examples of techniques:

Account Discovery
File and Directory Discovery
Network Service Discovery
TA0008

10. Lateral movement

9 techniques

Movement through the environment

Examples of techniques:

Remote Services
Software Deployment Tools
Taint Shared Content
TA0009

11. Collection

17 techniques

Gathering information of interest

Examples of techniques:

Archive Collected Data
Audio Capture
Screen Capture
TA0011

12. Command and control

18 techniques

Communication with compromised systems

Examples of techniques:

Application Layer Protocol
Encrypted Channel
Web Service
TA0010

13. Exfiltration

9 techniques

Theft of data from the compromised environment

Examples of techniques:

Exfiltration Over Web Service
Exfiltration Over C2 Channel
Transfer Data to Cloud
TA0040

14. Impact

15 techniques

Manipulation, interruption or destruction of systems

Examples of techniques:

Data Encrypted for Impact
Defacement
Service Stop

ATT&CK Use Cases

The ATT&CK framework serves as the basis for many cybersecurity use cases

Threat Intelligence

Structure and communicate intelligence about threats

Benefits:

  • Mapping of adversary behaviors
  • Identification of attack trends
  • Threat prioritization
  • Standardized CTI sharing

Detection & Analytics

Develop and test detection capabilities

Benefits:

  • Identification of coverage gaps
  • Creation of detection rules
  • Effectiveness testing
  • Continuous improvement

Adversary Emulation

Simulate the behaviors of real attackers

Benefits:

  • Red Team operations
  • Purple Team exercises
  • Validation of defenses
  • Team training

Assessment & Engineering

Evaluate and improve security posture

Benefits:

  • Security gap analysis
  • Defense roadmap
  • Secure architecture
  • Solution selection

Best Practices for Use

Tips to get the most out of the MITRE ATT&CK framework

Start gradually

Do not attempt to cover all techniques at once

  • Identify the most relevant techniques for your sector
  • Focus on current threats
  • Gradually expand your coverage

Contextualize ATT&CK

Adapt the framework to your specific environment

  • Document techniques observed in your environment
  • Create custom annotations
  • Share knowledge internally

Integrate into processes

Make ATT&CK a daily tool

  • Use ATT&CK in incident response
  • Reference techniques in alerts
  • Base Red Team exercises on ATT&CK

Keep up to date

The framework evolves regularly

  • Follow MITRE updates
  • Review your mappings periodically
  • Participate in the community

Ready to master MITRE ATT&CK?

Put your knowledge into practice with our practical cases based on real scenarios

Explore Practical Cases