MITRE ATT&CK

An empirical knowledge base of adversary tactics, techniques, and procedures observed in real intrusions.

Status: seed Related: Cyber Kill Chain, Red Teaming, Overview


Structure

ATT&CK is organized as a matrix:

  • Tactics — the why. The adversary’s goal at this stage. (e.g. Initial Access, Persistence, Privilege Escalation, Lateral Movement, Exfiltration.)
  • Techniques — the how. A general method to achieve a tactic. (e.g. T1566 Phishing.)
  • Sub-techniques — a more specific how. (e.g. T1566.001 Spearphishing Attachment.)
  • Procedures — concrete implementations actually used by groups. (e.g. APT29 used Cobalt Strike beacon dropped via spearphishing attachment to a credential-harvesting site.)

Three matrices: Enterprise (Windows, macOS, Linux, Cloud, Containers, Network), Mobile (iOS, Android), ICS (industrial control).

Each technique page gives: definition, procedure examples by group, mitigations, detections, references.


Why operators use it

  • Common vocabularyT1003.001 LSASS Memory means the same thing to red, blue, threat-intel, and management.
  • Coverage map — heatmap your operation against the matrix; show what you exercised.
  • Adversary emulation — pick a group (FIN7, APT41, Lazarus, …), look up their techniques, replicate them.
  • Reporting — ATT&CK-tagged findings are immediately actionable for the defender.

Why blue uses it

  • Detection coverage — which techniques does our telemetry cover? Which don’t we see?
  • Threat intel correlation — observed activity → mapped technique → known groups using that technique.
  • Engineering targets — write detections per technique; track coverage as a metric.

The shared vocabulary is the point. Red-vs-blue conversations got noticeably better once both sides spoke ATT&CK.


Useful adjacent projects

  • MITRE ATLAS — same structure, but for ML system attacks.
  • MITRE D3FEND — defensive countermeasures, mapped to ATT&CK techniques they counter.
  • Atomic Red Team (Red Canary) — atomic test cases, one per technique, ready to run.
  • CALDERA — automation framework for adversary emulation against ATT&CK.

References