What Is the MITRE ATT&CK Framework?

The MITRE ATT&CK Framework is a cybersecurity knowledge base that maps real attacker tactics and techniques to help detect and respond to threats.
Published on
Updated on
February 17, 2026

Key Takeaways:

  • The MITRE ATT&CK Framework is a publicly available cybersecurity knowledge base that explains how real attackers plan, execute, and maintain cyberattacks.
  • It documents attacker behavior by breaking attacks into tactics (the attacker’s goal) and techniques (the methods used to achieve that goal), based on real incidents.
  • The framework is developed and maintained by MITRE Corporation, using continuously updated threat research and observed attack data.
  • Security teams use MITRE ATT&CK to understand attacker behavior, improve detection and response capabilities, and identify gaps in their existing security controls.

Overview of the MITRE ATT&CK Framework

The MITRE ATT&CK Framework applies across a wide range of computing environments, including enterprise IT systems, cloud platforms, mobile devices, and industrial control systems. This cross-environment coverage allows a single reference structure to be used regardless of where attacker activity occurs.

By using one unified framework, organizations can analyze threats that move between technologies without switching models or terminology. This consistency is especially important in modern attacks that cross on-premises, cloud, and operational environments.

Ongoing research by MITRE Corporation ensures the framework continues to reflect emerging attacker activity across different industries and platforms. As coverage expands, the framework remains applicable to both traditional and modern infrastructure.

How Does the MITRE ATT&CK Framework Work?

how mitre attack framework works

MITRE ATT&CK works by breaking real intrusion incidents into discrete attacker actions that can be studied independently. Each action is documented using a consistent structure so similar behavior can be recognized across unrelated attacks.

Those actions are then positioned relative to one another based on how attackers progress during an intrusion. This ordering reveals patterns in attacker movement, decision-making, and escalation over time.

Once organized, these behavior patterns form a reference system that supports deeper analysis in later stages of security operations. Subsequent sections build on this structure to explain classification, visualization, and practical use.

What are the MITRE ATT&CK Matrices?

The MITRE ATT&CK Framework uses multiple matrices to organize attacker behavior by environment, allowing techniques to be analyzed in the context where they are actually used.

what are mitre attack matrices

Enterprise ATT&CK Matrix

Enterprise ATT&CK Matrix includes techniques attackers use against corporate IT environments, such as credential access, lateral movement, command execution, and data exfiltration. These behaviors commonly target operating systems, identity services, email systems, and enterprise applications.

Cloud ATT&CK Matrix

Cloud ATT&CK Matrix documents techniques that exploit cloud-specific architectures, including abuse of cloud identities, permission escalation, service misuse, and control-plane manipulation. Activity here reflects how attackers operate within cloud service providers rather than traditional networks.

Mobile ATT&CK Matrix

Mobile ATT&CK Matrix captures techniques used to compromise smartphones and tablets, including application-based attacks, device exploitation, surveillance activity, and persistence on mobile operating systems. These behaviors account for the security constraints and sandboxing models unique to mobile platforms.

Industrial Control Systems (ICS) ATT&CK Matrix

ICS ATT&CK Matrix contains techniques associated with industrial and operational technology environments, such as manipulation of control logic, disruption of physical processes, and interference with safety systems. Behaviors in this matrix focus on reliability, availability, and physical impact rather than data theft.

What Are ATT&CK Tactics?

Within the MITRE ATT&CK Framework, tactics define the technical objectives adversaries pursue as an intrusion progresses, explaining why specific attacker behavior appears at each stage.

  • Reconnaissance: Attack activity often begins with information gathering, where adversaries identify potential targets, exposed services, or users before engaging directly.
  • Resource Development: Once targets are selected, attackers prepare by acquiring infrastructure such as domains, servers, or accounts that will support later operations.
  • Initial Access: Entry into the environment follows, using methods like phishing, exploitation, or trusted relationship abuse to establish a foothold.
  • Execution: After access is gained, malicious code is run to activate payloads or begin direct interaction with compromised systems.
  • Persistence: Continued access becomes a priority, leading attackers to establish mechanisms that survive reboots, updates, or credential changes.
  • Privilege Escalation: With a stable presence, efforts shift toward gaining higher permissions to reach restricted systems or sensitive resources.
  • Defense Evasion: To remain undetected, attackers adapt their behavior to bypass security controls, hide activity, or disable monitoring mechanisms.
  • Credential Access: Stealing authentication material allows broader access and supports movement across systems without triggering immediate suspicion.
  • Discovery: Understanding the internal environment becomes essential, including network layout, system roles, and user relationships.
  • Lateral Movement: Armed with knowledge and credentials, attackers move between systems to expand control within the environment.
  • Collection: Attention then turns to gathering valuable data such as documents, databases, or proprietary information.
  • Command and Control: Ongoing communication with attacker-controlled infrastructure enables coordination, tasking, and data transfer.
  • Exfiltration: Collected data is moved out of the environment in preparation for final objectives or monetization.
  • Impact: Some attacks culminate in disruption, destruction, or manipulation of systems and data to achieve strategic or operational goals.

What Are ATT&CK Techniques?

ATT&CK techniques show how attackers carry out actions inside an environment after deciding what they want to achieve.

  • Direct Actions: Techniques cover concrete attacker activity such as running commands, stealing credentials, accessing remote systems, or transferring data during an intrusion.
  • Multiple Options: The same attacker objective can be achieved using different techniques, which explains why adversaries change methods when defenses block a specific approach.
  • Environment Dependent: Technique selection is influenced by operating systems, identity models, and infrastructure, causing attacks to look different across enterprise, cloud, and mobile environments.
  • Behavior First: ATT&CK techniques focus on observable behavior rather than malware or tools, allowing activity to be recognized even when attackers rotate payloads or scripts.
  • Detection Alignment: Security logs, alerts, and telemetry map naturally to techniques, making them the foundation for detection engineering and threat hunting.
  • Common Patterns: Repeated use of the same techniques across unrelated incidents highlights behaviors that persist across threat groups and campaigns.

What Are ATT&CK Sub-Techniques?

ATT&CK sub-techniques exist to show how the same attacker behavior changes in execution depending on access, environment, and technical constraints.

  • Execution Variants: The same attacker action can be carried out in multiple ways, such as dumping credentials from memory versus extracting them from system files, even though the broader technique remains unchanged.
  • Practical Detail: Sub-techniques capture low-level differences that matter during investigations, especially when similar activity produces different system artifacts.
  • Platform Influence: Operating system design, permissions, and security controls often dictate which variation an attacker can realistically use.
  • Detection Accuracy: Broad detections may identify the technique, but precise detections usually align with a specific sub-technique observed in logs or telemetry.
  • Behavior Patterns: Repeated reliance on a particular sub-technique can signal attacker preference, automation, or maturity rather than random choice.
  • Investigation Clarity: Sub-techniques help analysts understand exactly how an action occurred, reducing ambiguity during incident response.

What Is MITRE ATT&CK Technique T1595 (Active Scanning)?

MITRE ATT&CK Technique T1595 refers to attackers actively sending network traffic to target systems to identify exposed hosts, services, and applications before attempting access. This activity falls under the Reconnaissance phase, where adversaries reduce uncertainty and identify viable entry points.

T1595 includes Scanning IP Blocks (T1595.001), Vulnerability Scanning (T1595.002), and Wordlist Scanning (T1595.003), which collectively reveal live infrastructure, reachable services, and potential weaknesses. Responses from these probes often expose service banners, software versions, misconfigurations, or hidden paths that inform later exploitation decisions.

Active scanning generates direct interaction with target systems and frequently appears in firewall logs, IDS/IPS alerts, WAF telemetry, and cloud flow logs. In a large-scale cloud traffic study, 64% of scanning IP addresses were observed only once over a four-month period, highlighting how quickly scanning infrastructure rotates and why detection must rely on behavioral patterns rather than static IP reputation.

What Is the MITRE ATT&CK Navigator?

The MITRE ATT&CK Navigator is a visualization tool designed to work directly with the MITRE ATT&CK Framework and its matrices. It enables teams to represent attacker behavior, defensive coverage, and analysis results in the same structure used by ATT&CK.

Security data such as detections, adversary activity, or simulated attacks can be overlaid onto ATT&CK tactics, techniques, and sub-techniques. Visual representation helps teams identify coverage gaps, overlaps, and priorities more effectively than reviewing raw logs or tables.

Navigator is widely used during threat modeling, purple team exercises, and security reviews. Layered views support clear communication of security posture to both technical teams and leadership using attacker behavior as the reference point.

Why Is the MITRE ATT&CK Framework Important for Cybersecurity?

The MITRE ATT&CK Framework is important because it helps organizations understand attacks through attacker behavior rather than isolated tools or alerts.

Behavior Focus

Attack tools and infrastructure change frequently, but attacker actions remain consistent across campaigns. Focusing on behavior allows threats to be identified even when malware or indicators rotate.

Post-Breach Visibility

Many attacks succeed after initial access without being immediately detected. ATT&CK improves visibility into what happens inside an environment once an attacker is already present.

Coverage Gaps

Security controls often exist without clarity on what they actually protect against. Mapping defenses to ATT&CK highlights which attacker behaviors are monitored and which remain exposed.

Measurable Defense

Security maturity is difficult to assess without a shared reference. ATT&CK provides a structured way to measure detection depth and response capability over time.

Shared Language

Different teams often describe the same threat activity in different ways. ATT&CK creates a common vocabulary that aligns analysts, engineers, and leadership around the same behaviors.

How Do Security Teams Use the MITRE ATT&CK Framework?

Security teams use the MITRE ATT&CK Framework to apply attacker behavior knowledge across detection, response, testing, and strategic security planning.

Detection Mapping

Logs and alerts are aligned to ATT&CK techniques to show which attacker actions are visible in the environment. Coverage becomes measurable when detections are tied to behaviors instead of individual tools.

Detection Engineering

ATT&CK guides the creation of new detection logic by highlighting common attacker behaviors that should be observable. Engineers use it to prioritize detections that cover multiple threats with minimal overlap.

Threat Hunting

Hunters use ATT&CK to search for attacker behavior that may exist without triggering alerts. This approach focuses investigations on behavior patterns rather than known indicators.

Incident Response

ATT&CK provides structure for tracking attacker progress during an investigation. Responders use tactics and techniques to understand where an attacker has been and what may come next.

Coverage Analysis

Security controls are compared against ATT&CK to identify behavioral blind spots. Gaps become clear when common attacker actions lack monitoring or response capability.

Purple Teaming

Offensive and defensive teams use ATT&CK as a shared reference during simulated attacks. Exercises focus on validating detection and response against realistic attacker behavior.

Adversary Emulation

Red teams model real-world threats by replaying ATT&CK techniques associated with known adversaries. Defensive readiness improves when testing mirrors actual attack behavior.

Control Validation

ATT&CK helps verify whether security tools detect the behaviors they claim to cover. Validation focuses on outcomes rather than vendor feature lists.

Risk Communication

ATT&CK translates technical findings into attacker-centric language that leadership can understand. Security posture discussions shift from tool metrics to behavioral risk.

Who Should Use the MITRE ATT&CK Framework?

The MITRE ATT&CK Framework is used by a wide range of roles that need to understand, detect, or communicate attacker behavior.

SOC Analysts

Security operations analysts use ATT&CK to interpret alerts and investigations through attacker behavior. Tactics and techniques provide context that helps prioritize response actions.

Threat Hunters

Hunters rely on ATT&CK to guide proactive searches for malicious behavior that may not trigger alerts. Behavior-focused hunting reduces dependence on indicators and signatures.

Detection Engineers

Detection engineers use ATT&CK to design and validate detection logic tied to real attacker actions. Coverage can be expanded systematically instead of adding isolated alerts.

Incident Responders

Responders use ATT&CK to track attacker progression during an active incident. Understanding likely next steps helps contain threats faster.

Red Teams

Offensive teams reference ATT&CK to simulate realistic attacker behavior during testing. Exercises become more valuable when aligned with real-world techniques.

Security Leaders

Managers and executives use ATT&CK to understand risk in behavioral terms. Security posture becomes easier to communicate without relying on tool-specific metrics.

Cyber Kill Chain vs MITRE ATT&CK

Both the Cyber Kill Chain and the MITRE ATT&CK Framework are used to understand how cyberattacks unfold, but they differ fundamentally in structure, depth, and defensive purpose.

Aspect Cyber Kill Chain MITRE ATT&CK
Core Purpose Describes a high-level sequence of attack stages to stop threats early Documents detailed attacker behavior across the entire intrusion lifecycle
Structure Linear and sequential Matrix-based and non-linear
Primary Focus Prevention, especially before initial compromise Detection, response, and analysis before and after compromise
Level of Detail Broad stages with limited granularity Deep granularity using tactics, techniques, and sub-techniques
Attack Progression Assumes attacks follow a fixed order Allows attackers to move between behaviors in flexible paths
Behavior Coverage Identifies when an attack is happening Explains what attackers do and how they do it
Post-Compromise Visibility Limited insight after initial access Strong coverage of lateral movement, persistence, and impact
Defensive Usage Strategic modeling and high-level communication Operational use for detection engineering, threat hunting, and incident response
Adaptability Less flexible against modern, multi-stage attacks Designed to adapt to evolving attacker behavior
Common Users Executives, risk planners, security architects SOC teams, threat hunters, detection engineers, incident responders

Final Thoughts

The MITRE ATT&CK Framework matters because it explains cyber threats through attacker behavior rather than tools, malware, or alerts. This perspective helps organizations understand how attacks actually unfold in real environments.

Using ATT&CK allows security teams to improve detection, response, testing, and communication using a shared behavioral reference. As threats continue to evolve, behavior-based understanding remains one of the most reliable ways to assess and strengthen cybersecurity defenses.

Related Posts
O que é roubo de credenciais? Como funciona, detecção e prevenção
O roubo de credenciais é o roubo não autorizado de credenciais de login, como nomes de usuário, senhas, tokens de sessão ou chaves de API, que permitem que invasores acessem sistemas usando identidades confiáveis.
O que é engenharia social? O guia completo
A engenharia social é um ataque cibernético que manipula as pessoas para revelar informações confidenciais ou conceder acesso não autorizado.
O que é falsificação de ARP?
A falsificação de ARP é um ataque de rede em que mensagens ARP falsas vinculam um endereço MAC falso a um endereço IP confiável, redirecionando o tráfego da rede local para o dispositivo do invasor.

Start your demo now!

Schedule a Demo
Free 7-day trial
No Commitments
100% value guaranteed

Related Knowledge Base Articles

No items found.