Skip to content
Infilux AppSec Logo
Glossary · MITRE ATT&CK

What is MITRE ATT&CK?

MITRE ATT&CK is an open knowledge base of adversary tactics, techniques, and procedures (TTPs) observed in real-world attacks, organised across 14 tactical categories (initial access, execution, persistence, privilege escalation, defence evasion, credential access, discovery, lateral movement, collection, command-and-control, exfiltration, impact, etc.). Security teams use it to measure detection coverage, structure red-team objectives, and standardise threat intelligence reporting. It is the de facto common language for offensive security worldwide.

ATT&CK's value is its specificity. Rather than say 'an attacker phished a user,' ATT&CK lets you say 'the attacker used T1566.002 (Spearphishing Link), then T1059.001 (PowerShell), then T1003.001 (LSASS Memory dump) for credential access, then T1021.001 (Remote Services: RDP) for lateral movement.' Every technique has an ID, a description, real-world adversary references, and detection guidance.

Three matrices cover different domains: Enterprise (Windows, Linux, macOS, cloud, network, containers), Mobile (Android, iOS), and ICS (industrial control systems). Most defensive work happens in the Enterprise matrix, which currently lists 14 tactics, ~200 techniques, and ~400 sub-techniques.

Practical applications: SOCs use ATT&CK Navigator to visualise their detection coverage (green = we detect, red = we don't). Red teams plan engagements by selecting specific techniques to exercise. Threat intel teams tag IOCs with the techniques the actor was using. Procurement teams ask vendors to map their detections to ATT&CK techniques to compare apples-to-apples.

Key points

  • Open framework maintained by MITRE Corporation (free, version-controlled).
  • Three matrices: Enterprise, Mobile, ICS.
  • 14 tactic categories, ~200 techniques, ~400 sub-techniques (Enterprise).
  • Each technique has detection guidance, mitigation references, and real-world adversary citations.
  • ATT&CK Navigator: free visualisation tool for coverage analysis.

Frequently asked

ATT&CK vs Cyber Kill Chain — when to use which?+
The Lockheed Martin Cyber Kill Chain is a linear 7-stage model good for executive narratives. ATT&CK is non-linear and granular — better for technical work like detection engineering, red-team planning, and TI reporting. Most organisations use both: Kill Chain for board slides, ATT&CK for the SOC.
How does an SOC use ATT&CK in practice?+
Three ways: (1) Coverage assessment — map every detection rule to the ATT&CK technique it covers; visualise gaps in the Navigator. (2) Threat hunt planning — pick a high-impact technique you don't yet detect and design a hunt. (3) Adversary emulation — choose a real threat actor (e.g. APT29) and exercise the specific techniques attributed to them.
Is ATT&CK only for big enterprises?+
No. Even SMBs benefit by aligning their security tooling vocabulary to ATT&CK. When a vendor markets 'we detect ransomware,' ATT&CK lets you ask 'specifically which techniques — T1486 (Data Encrypted for Impact)? T1490 (Inhibit System Recovery)? T1218 (System Binary Proxy Execution)?' — and compare vendors apples-to-apples.