MITRE ATT&CK Framework
This framework is a knowledge base of common tactics, techniques, and procedures (TTP) that your organization can access to develop specific threat models and methodologies against cyberattacks.
Last updated
This framework is a knowledge base of common tactics, techniques, and procedures (TTP) that your organization can access to develop specific threat models and methodologies against cyberattacks.
Last updated
MITRE is a non-profit corporation based in the United States, Bedford, Massachusetts. It supports numerous US government agencies and manages many federally funded research and development centers (also known as FFRDCs).
The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework documents and tracks various adversarial techniques that are used during different stages of a cyberattack.
By using the MITRE-ATT&CK framework's knowledge base, the cyberthreat intelligence community can quickly identify threats and coordinate cyberattack responses.
Mitre Att&ck Official Site Link
YouTube Link
ATT&CK Navigator Link
Explanation of Mitre Att&ck Link
S.No
Steps in MITRE ATT&CK
Explanation
1
Reconnaissance
The adversary is trying to gather information they can use to plan future operations.
2
Resource Development
The adversary is trying to establish resources they can use to support operations.
3
Initial Access
The adversary is trying to get into your network.
4
Execution
The adversary is trying to run malicious code.
5
Persistence
The adversary is trying to maintain their foothold.
6
Privilege Escalation
The adversary is trying to gain higher-level permissions.
7
Defense Evasion
The adversary is trying to avoid being detected.
8
Credential Access
The adversary is trying to steal account names and passwords.
9
Discovery
The adversary is trying to figure out your environment.
10
Lateral Movement
The adversary is trying to move through your environment.
11
Collection
The adversary is trying to gather data of interest to their goal.
12
Command and Control
The adversary is trying to communicate with compromised systems to control them.
13
Exfiltration
The adversary is trying to steal data.
14
Impact
The adversary is trying to manipulate, interrupt, or destroy your systems and data.