Understanding the MITRE ATT&CK Framework

15 min read
MITRE ATT&CK Threat Intelligence

A comprehensive guide to understanding and implementing the MITRE ATT&CK framework for enhanced threat detection, defense strategy development, and security program maturation.

What is MITRE ATT&CK?

MITRE ATT&CK (Adversarial Tactics, Techniques & Common Knowledge) is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. Created by MITRE Corporation, it serves as a foundation for developing threat models and methodologies in private sectors, government, and cybersecurity product/service communities.

The framework currently covers 14 tactics and over 200 techniques across multiple platforms including Windows, macOS, Linux, mobile, and cloud environments.

The ATT&CK Matrix Structure

Understanding Tactics vs. Techniques

Tactics (The "Why")

High-level goals adversaries want to achieve during an operation.

  • • Reconnaissance
  • • Initial Access
  • • Execution
  • • Persistence
  • • Privilege Escalation

Techniques (The "How")

Specific methods adversaries use to achieve tactical goals.

  • • Spearphishing Attachment
  • • PowerShell Execution
  • • Registry Run Keys
  • • Access Token Manipulation
  • • DLL Side-Loading

The 14 Tactics Breakdown

Pre-Attack & Initial Phases
  • TA0043 - Reconnaissance: Gathering information about targets
  • TA0042 - Resource Development: Establishing resources for operations
  • TA0001 - Initial Access: Getting into the network
  • TA0002 - Execution: Running malicious code
  • TA0003 - Persistence: Maintaining access
  • TA0004 - Privilege Escalation: Gaining higher permissions
  • TA0005 - Defense Evasion: Avoiding detection
Post-Compromise Phases
  • TA0006 - Credential Access: Stealing credentials
  • TA0007 - Discovery: Learning about the environment
  • TA0008 - Lateral Movement: Moving through the network
  • TA0009 - Collection: Gathering data of interest
  • TA0011 - Command and Control: Communicating with systems
  • TA0010 - Exfiltration: Stealing data
  • TA0040 - Impact: Manipulating, disrupting, or destroying systems

Practical Applications for Blue Teams

1. Threat Hunting

Hypothesis-Driven Hunting

Use ATT&CK techniques to develop hunting hypotheses based on known adversary behaviors:

T1003 - OS Credential Dumping:

Hunt for LSASS process access, memory dumps, or registry SAM access patterns

T1055 - Process Injection:

Look for unusual process relationships, hollowing, or DLL injection indicators

2. Detection Engineering

Map your detection rules to specific ATT&CK techniques to identify coverage gaps:

Coverage Assessment Matrix

Technique ID Technique Name Detection Quality Coverage Level
T1566.001 Spearphishing Attachment High Complete
T1059.001 PowerShell Medium Partial
T1547.001 Registry Run Keys Low Minimal

3. Security Control Validation

  • Purple team exercises: Test defenses against specific techniques
  • Red team assessments: Evaluate detection capabilities
  • Tabletop exercises: Scenario planning using ATT&CK tactics
  • Threat modeling: Assess risks using adversary behavior patterns

Implementation Strategies

Step 1: Current State Assessment

Security Control Mapping

  1. Inventory existing security tools and controls
  2. Map current detections to ATT&CK techniques
  3. Identify coverage gaps and blind spots
  4. Prioritize improvements based on threat landscape

Step 2: Threat Intelligence Integration

Leverage ATT&CK for contextualizing threat intelligence:

  • IOC enrichment: Add ATT&CK technique context to indicators
  • Campaign analysis: Map adversary groups to their TTPs
  • Threat briefings: Communicate risks using common language
  • Hunt prioritization: Focus on techniques used by relevant threats

Step 3: Detection Development

Data Source Requirements

  • • Process execution logs
  • • Network connection data
  • • File system activity
  • • Registry modifications
  • • Authentication events

Detection Logic Patterns

  • • Behavioral anomalies
  • • Signature-based rules
  • • Statistical outliers
  • • Correlation patterns
  • • Machine learning models

ATT&CK Tools and Resources

Official MITRE Tools

ATT&CK Navigator

Web-based tool for visualizing and annotating ATT&CK matrices with custom overlays and heatmaps.

CALDERA

Automated adversary emulation platform that executes ATT&CK techniques in controlled environments.

ATT&CK Workbench

Tool for exploring ATT&CK data and creating custom datasets for organizational use.

Community Tools

  • Atomic Red Team: Library of test cases mapped to ATT&CK techniques
  • DeTT&CT: Framework for measuring detection coverage
  • ATTACK-Python-Client: Python library for programmatic access
  • Metta: Information security preparedness tool

Real-World Case Study

APT29 (Cozy Bear) Analysis

Let's examine how ATT&CK helps analyze a real threat actor's campaign:

Initial Access (TA0001)

T1566.002 - Spearphishing Link: COVID-19 themed emails with malicious links

Execution (TA0002)

T1059.001 - PowerShell: Encoded PowerShell commands for payload delivery

Persistence (TA0003)

T1547.001 - Registry Run Keys: Persistence via registry modification

Command and Control (TA0011)

T1071.001 - Web Protocols: HTTPS C2 communications

Defense Recommendations:
  • • Implement email attachment sandboxing
  • • Monitor PowerShell execution and command-line arguments
  • • Alert on registry run key modifications
  • • Analyze SSL/TLS traffic for C2 indicators

Measuring Success with ATT&CK

85%
Technique Coverage

Percentage of relevant techniques with detection coverage

< 30 min
Detection Time

Average time to detect mapped techniques

95%
Test Success Rate

Percentage of technique tests that trigger detections

Getting Started Checklist

Conclusion

The MITRE ATT&CK framework has become an essential component of modern cybersecurity operations. By providing a common language for describing adversary behavior, it enables more effective communication, improved threat detection, and better strategic security planning.

Success with ATT&CK requires commitment to continuous learning and adaptation. Start with basic technique mapping and gradually evolve toward advanced threat hunting and detection engineering. Remember that ATT&CK is a tool to enhance your security program, not replace fundamental security practices and controls.