Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Threat Intelligence Glossary

MITRE ATT&CK

A comprehensive, publicly accessible knowledge system that documents real-world attacker tactics, techniques, and procedures (TTPs). ATT&CK; (Adversarial Tactics, Techniques & Common Knowledge) is used by security teams worldwide as a common language for threat analysis, detection engineering, and purple teaming.

MITRE ATT&CK; is the lingua franca of modern threat analysis. What began as an internal knowledge repository at the MITRE Corporation is now the most comprehensive public database on attacker behavior—featuring 14 tactics, over 200 techniques, and thousands of documented examples from real APT groups.

Structure: Tactics → Techniques → Sub-Techniques

The hierarchy is: Tactic (Why?)Technique (How?)Sub-Technique (How exactly?)

Example:

  • TA0006: Credential Access (Tactic)
    • T1003: OS Credential Dumping (Technique)
      • .001 - LSASS Memory (Sub-Technique)
      • .002 - Security Account Manager (SAM)
      • .003 - NTDS
      • .006 - DCSync
    • T1558: Steal or Forge Kerberos Tickets
      • .001 - Golden Ticket
      • .002 - Silver Ticket
      • .003 - Kerberoasting
      • .004 - AS-REP Roasting

The 14 ATT&CK Tactics; (Enterprise Matrix)

IDTacticDescriptionExample Techniques
TA0001Initial AccessHow does the attacker gain access to the network?T1566 Phishing, T1190 Exploit Public-Facing App
TA0002ExecutionHow does the attacker execute code?T1059 Command and Scripting Interpreter (PowerShell, Bash)
TA0003PersistenceHow do they ensure they remain?T1547 Boot/Logon Autostart, T1053 Scheduled Task
TA0004Privilege EscalationHow do they elevate their privileges?T1055 Process Injection, T1068 Exploit Vulnerability
TA0005Defense EvasionHow does it bypass security tools?T1562 Impair Defenses, T1027 Obfuscated Files
TA0006Credential AccessHow does it steal credentials?T1003 OS Credential Dumping, T1558 Kerberos Tickets
TA0007DiscoveryWhat does it find on the network?T1018 Remote System Discovery, T1082 System Information
TA0008Lateral MovementHow does it spread?T1021 Remote Services, T1075 Pass the Hash
TA0009CollectionWhat does it collect?T1560 Archive Data, T1074 Data Staged
TA0010ExfiltrationHow does it exfiltrate data?T1048 Exfiltration Over Alternative Protocol
TA0011Command and ControlHow does it control malware?T1071 Application Layer Protocol, T1572 Protocol Tunneling
TA0040ImpactWhat is the final damage?T1486 Data Encrypted for Impact (Ransomware!), T1485 Data Destruction
TA0042Resource DevelopmentBuilding resources-
TA0043ReconnaissanceReconnaissanceT1595 Active Scanning

ATT&CK; in Practice

SIEM Rules Based on ATT&CK;

An IoC-based SIEM rule (ALERT if source_ip == "185.234.xx.xx") is useless as soon as the attacker uses a new IP. TTP-based rules, on the other hand, detect the behavior—regardless of the IP.

T1059.001 - PowerShell Encoded Commands:

ALERT if:
  Process == "powershell.exe"
  AND CommandLine matches "-enc|-EncodedCommand|-e [A-Za-z0-9+/=]{50,}"

T1003.001 - LSASS Memory Dump:

ALERT if:
  Process NOT IN whitelist
  AND TargetProcess == "lsass.exe"
  AND AccessRights includes "PROCESS_VM_READ"

T1486 - Ransomware Activity:

ALERT if:
  10+ different file extensions changed in 60 seconds
  AND new file extension unknown

ATT&CK for Threat Intelligence

Step 1 - Read the Threat Report (e.g., Mandiant APT41 Report)

> “APT41 uses spear-phishing with .lnk attachments (T1566.001) and performs DLL injection via certutil.exe (T1218.003)”

Step 2 - Mark techniques in the ATT&CK; Matrix

In the ATT&CK; Navigator, mark T1566.001 and T1218.003 and visualize which controls protect against them.

Step 3 - Identify detection gaps

Do we have a SIEM rule for T1218.003 (certutil misuse)? If not, create a rule:

ALERT if certutil.exe is called with -urlcache or -decode

Step 4 - Measure coverage

The Navigator displays coverage using colors:

  • Green: Detection present and tested
  • Red: No detection

ATT&CK; Navigator

The Navigator (https://mitre-attack.github.io/attack-navigator/) is an interactive visualization tool for ATT&CK; that can also be hosted locally.

Create layers:

  • Blue Layer: What do we detect? (SIEM rules)
  • Red Layer: What has been tested? (Penetration test)
  • Threat Layer: What does APT28 use?

Use Cases:

  1. Coverage Gap Analysis: “Red = no detection – Prioritization: Which red fields should be closed first?”
  2. Create Threat Profiles: “APT28 Layer” – What techniques does this group use? Focus detection on these techniques.
  3. Define Penetration Test Scope: “Test these 20 techniques – we want to measure coverage”
  4. Reporting: “We have X% ATT&CK coverage” – understandable for management

ATT&CK-based Threat Hunting

Hypothesis: “APT28 could attack our company (we are in the defense industry). Check whether T1558.003 (Kerberoasting) has occurred in our AD.”

Hunting query (Splunk/Sentinel):

# Event ID 4769: Kerberos ticket request
# RC4 encryption (0x17) is suspicious (weaker, susceptible to cracking)
index=wineventlog EventCode=4769
Ticket_Encryption_Type=0x17
Service_Name!=krbtgt
Service_Name!="*$"
| stats count by Account_Name, Service_Name, Client_Address
| where count > 10

Check for hits:

  • Account: regular user or service account?
  • Service: known SPN or unknown?
  • IP: internal, known?
  • Timeline: when did this happen? What happened before/after?

ATT&CK; for various platforms

MITRE ATT&CK; includes several matrices for different environments:

MatrixPlatformsFeatures
EnterpriseWindows, macOS, LinuxMain matrix, most comprehensive
MobileiOS, AndroidT1516 Input Injection, T1412 Capture SMS Messages
ICSOT/SCADAT0886 Remote Services, T0817 Drive-by Compromise
CloudAWS, Azure, GCP, SaaST1552.005 Cloud Instance Metadata API
PRE-ATT&CK;Reconnaissance & Resource DevelopmentT1595 Active Scanning, T1589 Gather Victim Identity Information