Home/Blog/What is MITRE ATT&CK?
Security

What is MITRE ATT&CK?

Learn about the MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and techniques used in cyberattacks.

By Inventive HQ Team
What is MITRE ATT&CK?

Understanding MITRE ATT&CK Fundamentals

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is the gold standard framework for understanding how cybercriminals actually operate. Rather than academic theories, ATT&CK documents real-world tactics and techniques observed in actual cyberattacks. This real-world focus makes ATT&CK invaluable for security professionals, from threat hunters to policy makers.

The name itself describes the framework's structure: Tactics are the "why"—high-level goals adversaries try to achieve. Techniques are the "how"—specific methods for accomplishing those tactics. Common Knowledge includes code, tools, and documentation adversaries use.

ATT&CK was created by MITRE Corporation, a non-profit research organization, and is maintained with input from security researchers, security vendors, government agencies, and the broader cybersecurity community. Its collaborative development and public availability have made it the industry-standard threat model.

The framework is free and publicly available, making it accessible to organizations of all sizes. This democratization of threat intelligence has transformed how security teams approach defensive operations.

The History and Development of ATT&CK

MITRE ATT&CK emerged from MITRE's work defending United States government networks. Security teams needed a structured way to understand and discuss adversary behavior. Rather than creating theoretical models, they documented what they observed in actual intrusions.

The first version of ATT&CK focused on enterprise networks. Its success led to expansion into other domains: cloud environments, mobile devices, and industrial control systems. Today, ATT&CK spans multiple matrices each documenting adversary behavior in specific environments.

The framework started with knowledge distilled from intrusion data, research papers, and security vendor publications. Over time, the community has contributed data from real intrusions, transforming ATT&CK into a continuously updated knowledge base.

MITRE regularly updates ATT&CK with new techniques, tactics, and sub-techniques as adversaries evolve their methods. These updates are collaborative—security organizations worldwide contribute observations of new adversary behaviors.

The Structure of ATT&CK

ATT&CK is organized hierarchically: Tactics at the top level, Techniques beneath them, and Sub-techniques providing additional granularity. This structure enables both high-level strategic understanding and detailed tactical knowledge.

Tactics represent the adversary's objectives or goals. Why is the attacker doing something? The enterprise ATT&CK matrix includes tactics like Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command and Control, Exfiltration, and Impact.

Each tactic contains multiple techniques—specific methods for achieving that goal. For example, under "Initial Access," techniques include Phishing, Exploit Public-Facing Application, and Supply Chain Compromise.

Sub-techniques provide even greater specificity. For example, the Phishing technique includes sub-techniques like Phishing: Spearphishing Attachment, Phishing: Spearphishing Link, and Phishing: Spearphishing via Service.

Adversary Groups in ATT&CK

ATT&CK documents known adversary groups and their characteristic behaviors. Rather than using arbitrary names, MITRE references groups by identifiers (G-numbers) and also includes common aliases.

For each group, ATT&CK documents which tactics and techniques that group typically uses. This enables researchers to correlate observed activity with known groups. If you detect techniques commonly used by a known group, it suggests that group might be responsible for the attack.

This knowledge is invaluable for incident response, threat hunting, and defensive prioritization. Understanding which groups target your industry helps focus security investments on the most relevant threats.

Software and Tools in ATT&CK

ATT&CK documents tools used by adversaries in attacks. These include both malware and legitimate tools repurposed for attacks (living-off-the-land techniques).

Each tool is mapped to techniques it implements. This helps defenders understand what capabilities attackers might gain if they use specific malware or tools. If you detect a tool on your network, ATT&CK tells you what techniques and capabilities that tool provides.

This documentation helps security teams understand attack toolkits comprehensively. Rather than just knowing malware X exists, you know what X is designed to do and what techniques it implements.

The Practical Value of ATT&CK

ATT&CK provides a common language for security discussions. Rather than vague descriptions, teams can reference specific technique identifiers (T-numbers). "We detected T1083 (File and Directory Discovery)" is precise and understood globally.

For defensive prioritization, ATT&CK helps identify which techniques matter most for your organization. If certain techniques are commonly used against your industry and you haven't defended against them, that's a gap worth addressing.

ATT&CK enables objective assessment of your defensive capabilities. You can map your detection and prevention capabilities to specific ATT&CK techniques, identifying coverage gaps.

For threat hunting, ATT&CK provides a systematic framework. Rather than randomly searching for indicators of compromise, you can systematically hunt for each technique an adversary might use.

For incident response, ATT&CK helps understand adversary objectives and next steps. Recognizing tactics helps predict what an attacker might do next.

ATT&CK Matrices

MITRE maintains multiple matrices tailored to different environments:

Enterprise: The primary matrix covering Windows, Linux, and macOS systems in enterprise networks.

Mobile: Covers iOS and Android, documenting mobile-specific attack methods.

Cloud: Documents cloud-specific tactics and techniques relevant to AWS, Azure, Google Cloud, and other cloud providers.

ICS (Industrial Control Systems): Covers tactics and techniques specific to attacking industrial control systems and critical infrastructure.

Each matrix has the same structure but documents environment-specific techniques.

Common Misconceptions About ATT&CK

ATT&CK isn't a prioritized list. It's not ordered by importance or frequency. Every technique in ATT&CK has been observed in real attacks, but frequencies vary.

ATT&CK isn't a framework for building security solutions. It documents adversary behavior, not how to defend. Defense frameworks like NIST or CIS Controls map to ATT&CK but aren't part of it.

ATT&CK isn't just for large enterprises. Organizations of all sizes benefit from understanding these techniques. Even if sophisticated APTs aren't your primary concern, techniques in ATT&CK are used by various threat actors at all sophistication levels.

ATT&CK isn't static. It evolves constantly as new attack methods are discovered and documented. Staying current with ATT&CK updates is important.

Using ATT&CK in Your Organization

Start by reviewing the techniques relevant to your industry and organization type. What techniques do attackers commonly use against companies like yours?

Map your detection and prevention tools to ATT&CK techniques. Which techniques can you detect? Which can you prevent? Where are the gaps?

Use ATT&CK for threat hunting. Select a technique, search your logs and systems for indicators of that technique, and remediate if found.

Incorporate ATT&CK into incident response. When you detect activity, map it to ATT&CK techniques to understand the attack, predict next steps, and inform response actions.

Train your security team using ATT&CK. Ensure everyone understands the framework and can reference it in discussions and documentation.

ATT&CK Tools and Resources

MITRE provides the ATT&CK Navigator, a visualization tool for exploring the framework. Color-code techniques you can detect, techniques you're vulnerable to, or techniques used by specific adversaries.

Security vendors integrate ATT&CK into their platforms, enabling automated technique mapping of detections.

Open-source tools and scripts help analyze logs and correlate findings to ATT&CK techniques.

Dozens of training courses teach ATT&CK and how to apply it.

Conclusion

MITRE ATT&CK is the industry-standard framework for understanding how adversaries actually attack. It documents real-world tactics and techniques observed in actual cyberattacks, providing actionable intelligence for defensive operations. Understanding ATT&CK enables security teams to speak a common language, prioritize defenses effectively, and conduct systematic threat hunting. Whether you're responding to incidents, building security solutions, or planning defensive improvements, ATT&CK provides the framework for understanding and defending against real-world threats.

Need Expert IT & Security Guidance?

Our team is ready to help protect and optimize your business technology infrastructure.