Skip to main content

MITRE ATT&CK Framework

What It Is

A globally accessible knowledge base of adversary tactics and techniques based on real-world observations. Used for threat detection, red/blue teaming, and security gap analysis.

14 Tactics (Enterprise)

#TacticDescription
TA0043ReconnaissanceGather info before attacking
TA0042Resource DevelopmentSet up infrastructure/accounts
TA0001Initial AccessGet into the network
TA0002ExecutionRun malicious code
TA0003PersistenceMaintain foothold
TA0004Privilege EscalationGain higher permissions
TA0005Defense EvasionAvoid detection
TA0006Credential AccessSteal credentials
TA0007DiscoveryExplore the environment
TA0008Lateral MovementMove through the network
TA0009CollectionGather data of interest
TA0010ExfiltrationSteal data out
TA0011Command & ControlCommunicate with compromised systems
TA0040ImpactDisrupt, destroy, or manipulate

Key Concepts

  • Tactics — The why (adversary goal)
  • Techniques — The how (method used to achieve goal)
  • Sub-techniques — More specific implementations
  • Procedures — Specific real-world usage by threat actors

Common Use Cases

Threat Detection     → Map detections to ATT&CK techniques
Red Teaming          → Use TTPs of known threat groups
Gap Analysis         → Identify coverage blind spots
Incident Response    → Classify attacker behavior
Threat Intelligence  → Enrich IOCs with context

ATT&CK Navigator

Web tool to visualize coverage: attack.mitre.org/navigator

  • Color-code techniques by detection coverage
  • Layer and compare threat group profiles
  • Export as JSON or SVG

Threat Group Example

APT29 (Cozy Bear) commonly uses:

  • T1566.001 — Spearphishing Attachment (Initial Access)
  • T1059.001 — PowerShell (Execution)
  • T1027 — Obfuscated Files or Information (Defense Evasion)
  • T1078 — Valid Accounts (Persistence)