What is MITRE ATT&CK?

MITRE ATT&CK (Adversarial Tactics, Techniques & Common Knowledge) is an open framework providing a comprehensive knowledge base of attacker techniques observed in real-world cyber attacks.

It helps organisations understand, detect, analyse and defend against cyber attacks by mapping out known tactics and techniques — based on actual threats.


🧠 What does MITRE ATT&CK contain?

MITRE ATT&CK is built on three core components:

  1. Tactics – the objective of the attacker (such as gaining access or persistence)
  2. Techniqueshow that objective is achieved (such as credential dumping)
  3. Proceduresconcrete examples of how techniques have been used in practice by specific attackers

🧱 Example of an attack step

Tactic Technique Procedure
Initial Access Spear Phishing Attachment APT29 sent Word documents containing macros
Credential Access Credential Dumping Mimikatz used to extract passwords from RAM
Lateral Movement Remote Desktop Protocol Logging into internal systems with stolen credentials

🧰 Applications of MITRE ATT&CK

  • Threat modelling and Red Team planning
  • SIEM rule mapping and SOC analysis
  • Threat Hunting and behavioural detection
  • Gap analysis of detection capabilities
  • Reference for XDR, EDR and SOAR integrations

🗂 Different ATT&CK matrices

MITRE maintains separate matrices for:

  • Enterprise: Windows, Linux, macOS, cloud
  • Mobile: Android and iOS
  • ICS: Specifically for industrial systems (e.g. PLC, SCADA)
  • PRE-ATT&CK (deprecated): For attacks prior to actual access

🧭 Example tactics (Enterprise)

Tactic Description
Initial Access How the attacker gets in
Execution How code is run
Persistence How access is maintained
Privilege Escalation Elevating privileges
Defense Evasion Avoiding detection
Credential Access Stealing passwords and tokens
Discovery Reconnaissance of systems and networks
Lateral Movement Spreading within the network
Command and Control (C2) Establishing external communication
Exfiltration Stealing data
Impact Causing disruption, e.g. via Ransomware

✅ Benefits

  • Based on real threat intelligence
  • Helps identify detection gaps
  • Broadly applicable across EDR, SIEM, SOC and Threat Hunting
  • Many tools (such as Splunk, Sentinel, MISP) support ATT&CK integration
  • Supports Risk Management and maturity assessments

📌 In summary

MITRE ATT&CK is a globally recognised framework for understanding, detecting and preventing attacker techniques. It provides a common language and structure for security teams, auditors and management.