Post

Decoding the MITRE ATT&CK Framework

Decoding the MITRE ATT&CK Framework

What is MITRE ATT&CK?

The MITRE ATT&CK® framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. It provides a common language for both offensive and defensive security professionals.

ATT&CK stands for Adversarial Tactics, Techniques, and Common Knowledge.

Tactics vs Techniques

Term Definition Example
Tactic The “Why” - the adversary’s tactical goal. Initial Access (TA0001)
Technique The “How” - the method used to achieve the goal. Phishing (T1566)
Procedure The exact execution of a technique. Sending an email with an Excel macro.

Why Purple Teams Love It

For Purple Teaming, MITRE ATT&CK is the gold standard. It allows Red Teams to emulate specific threat actors (like APT29) by chaining techniques together, while Blue Teams can map their SIEM detections directly to the framework to identify coverage gaps.

Learn more on the official MITRE ATT&CK website.

If your SOC is tracking alerts without mapping them to ATT&CK, you are missing out on identifying the broader kill chain!

This post is licensed under CC BY 4.0 by the author.