AIMIT
Home
Security Domains
Frameworks
Arch. Diagrams
Interview Q&A📖Glossary🎯Mock Interview📄Resume BuilderSecurity News
📱Download
Mobile App
Home / Security Domains / MITRE ATT&CK
MITRENIST

🎯 MITRE ATT&CK Framework

The MITRE ATT&CK knowledge base of adversary Tactics, Techniques, and Procedures (TTPs). 14 tactics covering the full attack lifecycle — from Reconnaissance to Impact — with key techniques, detection strategies, and mitigations.

🔍 Reconnaissance🛠️ Resource Development🚪 Initial Access⚡ Execution📌 Persistence⬆️ Privilege Escalation🥷 Defense Evasion🔑 Credential Access🗺️ Discovery↔️ Lateral Movement📂 Collection📡 Command & Control📤 Exfiltration💥 Impact

ATT&CK Lifecycle

🔍 Reconnaissance
TA0043
↓
🛠️ Resource Development
TA0042
↓
🚪 Initial Access
TA0001
↓
⚡ Execution
TA0002
↓
📌 Persistence
TA0003
↓
⬆️ Privilege Escalation
TA0004
↓
🥷 Defense Evasion
TA0005
↓
🔑 Credential Access
TA0006
↓
🗺️ Discovery
TA0007
↓
↔️ Lateral Movement
TA0008
↓
📂 Collection
TA0009
↓
📡 Command & Control
TA0011
↓
📤 Exfiltration
TA0010
↓
💥 Impact
TA0040

MITRE ATT&CK Enterprise — 14 Tactics

Each tactic represents WHY an adversary acts. Techniques describe HOW. Click any tactic to jump to details.

Tactics & Techniques Deep-Dive

🔍

Reconnaissance

TA0043

Adversary gathers information to plan future operations — target org, infrastructure, employees, and technology stack.

⚔️ Key Techniques

IDTechniqueDescription
T1595Active ScanningPort scanning, vulnerability scanning, banner grabbing
T1592Gather Victim Host InfoOS, hardware, installed software, patches
T1589Gather Victim Identity InfoEmails, credentials, employee names from LinkedIn, breaches
T1593Search Open Websites/DomainsOSINT from social media, DNS records, WHOIS, Shodan
T1598Phishing for InformationSpear-phishing to gather intel before attack, pretexting

🔎 Detection

  • Monitor for unusual scanning activity
  • Track WHOIS/DNS lookups to your infrastructure
  • Alert on social engineering attempts
  • Dark web monitoring for leaked credentials

🛡️ Mitigation

  • Minimize public exposure of infrastructure details
  • Implement strict email anti-phishing controls
  • Monitor for credential leaks
  • Network segmentation to limit reconnaissance value
🛠️

Resource Development

TA0042

Adversary creates, purchases, or compromises resources to support operations — domains, accounts, tools, and infrastructure.

⚔️ Key Techniques

IDTechniqueDescription
T1583Acquire InfrastructurePurchase domains, VPS, cloud accounts for C2
T1584Compromise InfrastructureHack third-party servers to use as attack infrastructure
T1587Develop CapabilitiesCustom malware, exploits, digital certificates
T1585Establish AccountsCreate social media/email accounts for social engineering
T1588Obtain CapabilitiesPurchase malware, exploits, tools from underground markets

🔎 Detection

  • Track newly registered domains similar to yours (typosquatting)
  • Monitor for look-alike domains
  • Threat intel feeds for IOCs
  • Certificate transparency log monitoring

🛡️ Mitigation

  • Domain monitoring and takedown services
  • Threat intelligence sharing (ISACs)
  • Brand protection monitoring
  • Preemptive domain registration of similar names
🚪

Initial Access

TA0001

Adversary gains a foothold in the target network — phishing, exploiting public-facing applications, or using valid accounts.

⚔️ Key Techniques

IDTechniqueDescription
T1566PhishingSpear-phishing attachments, links, or via service (Teams, Slack)
T1190Exploit Public-Facing AppExploit vulns in web servers, VPNs, firewalls (Log4Shell, ProxyShell)
T1078Valid AccountsCompromised credentials from breaches, brute force, or buying on dark web
T1195Supply Chain CompromiseCompromise software updates or dependencies (SolarWinds, xz utils)
T1199Trusted RelationshipExploit MSPs, vendors, or partners with network access

🔎 Detection

  • Email security gateways with sandbox detonation
  • IDS/IPS for exploit signatures
  • Impossible travel detection for valid accounts
  • Monitor for unusual login patterns

🛡️ Mitigation

  • Security awareness training
  • Patch management for public-facing apps
  • MFA on all accounts
  • Network segmentation for vendors
  • Zero trust architecture
⚡

Execution

TA0002

Adversary runs malicious code on the target system — via scripting, command-line, or exploitation.

⚔️ Key Techniques

IDTechniqueDescription
T1059Command & Scripting InterpreterPowerShell, Bash, Python, VBScript, JavaScript
T1203Exploitation for Client ExecutionBrowser, Office, PDF exploits
T1204User ExecutionUser opens malicious attachment or clicks link
T1047WMI (Windows Management)Remote execution via WMI queries
T1053Scheduled Task/JobCron jobs, Windows Task Scheduler, AT commands

🔎 Detection

  • Script block logging (PowerShell)
  • EDR behavioral analysis
  • Application whitelisting alerts
  • Process creation monitoring (Sysmon)
  • Command-line auditing

🛡️ Mitigation

  • Application whitelisting (AppLocker, WDAC)
  • Disable macro execution in Office
  • Script execution policies
  • EDR with behavioral detection
  • Constrained Language Mode for PowerShell
📌

Persistence

TA0003

Adversary maintains access across restarts, credential changes, and remediation — via backdoors, scheduled tasks, or registry modifications.

⚔️ Key Techniques

IDTechniqueDescription
T1547Boot/Logon AutostartRegistry run keys, startup folders, login scripts
T1136Create AccountNew local/domain/cloud accounts for persistent access
T1053Scheduled Task/JobPersistent execution via scheduled tasks or cron
T1505Server Software ComponentWeb shells (Chopper, JSP shell), SQL triggers
T1098Account ManipulationAdd credentials, modify permissions, add SSH keys

🔎 Detection

  • Monitor registry autoruns and startup items
  • Track new account creation events
  • File integrity monitoring on web servers
  • Audit scheduled tasks and cron changes
  • Monitor SSH authorized_keys changes

🛡️ Mitigation

  • Privileged access management (PAM)
  • Regular audit of accounts and permissions
  • File integrity monitoring (FIM)
  • Restrict ability to create accounts
  • GPO controls for autorun locations
⬆️

Privilege Escalation

TA0004

Adversary gains higher-level permissions — exploiting misconfigurations, vulnerabilities, or credential theft to move from user to admin/root/SYSTEM.

⚔️ Key Techniques

IDTechniqueDescription
T1068Exploitation for Privilege EscalationKernel exploits, UAC bypass, local vulnerabilities
T1078Valid AccountsUsing compromised admin or service account credentials
T1548Abuse Elevation ControlUAC bypass, sudo abuse, setuid/setgid manipulation
T1134Access Token ManipulationToken impersonation, stealing tokens from other processes
T1484Domain Policy ModificationGPO abuse, trust relationship manipulation

🔎 Detection

  • Monitor for privilege escalation events (Event ID 4672, 4673)
  • Track UAC bypass attempts
  • Alert on unexpected admin group changes
  • Monitor for token manipulation behavior
  • GPO change auditing

🛡️ Mitigation

  • Least privilege principle
  • Patch local vulnerabilities promptly
  • Credential Guard on Windows
  • Harden UAC settings
  • PAM solutions with JIT access
🥷

Defense Evasion

TA0005

Adversary avoids detection — disabling security tools, obfuscating code, masquerading as legitimate processes, or clearing logs.

⚔️ Key Techniques

IDTechniqueDescription
T1027Obfuscated Files/InformationEncoded payloads, packed executables, steganography
T1070Indicator RemovalClear event logs, delete files, timestomp
T1036MasqueradingRename malware to svchost.exe, spoof file extensions
T1562Impair DefensesDisable AV, tamper with EDR, stop logging services
T1055Process InjectionDLL injection, process hollowing, thread hijacking

🔎 Detection

  • EDR with tamper protection
  • SIEM correlation for log gaps
  • Monitor for AV/EDR service stops
  • Behavioral analysis (not just signature)
  • Memory scanning for injected code

🛡️ Mitigation

  • Tamper-proof EDR with kernel-level protection
  • Centralize logs to prevent local deletion
  • Code signing enforcement
  • Protected Process Light (PPL) for critical services
  • Attack surface reduction rules
🔑

Credential Access

TA0006

Adversary steals credentials — password hashes, tokens, tickets, keys — to move laterally and escalate privileges.

⚔️ Key Techniques

IDTechniqueDescription
T1003OS Credential DumpingLSASS dump (Mimikatz), SAM database, /etc/shadow, DCSync
T1110Brute ForcePassword spraying, credential stuffing, dictionary attacks
T1558Steal/Forge Kerberos TicketsKerberoasting, Golden Ticket, Silver Ticket attacks
T1557Adversary-in-the-MiddleLLMNR/NBT-NS poisoning, ARP spoofing, HTTPS interception
T1552Unsecured CredentialsPasswords in files, registry, scripts, environment variables

🔎 Detection

  • Monitor LSASS access patterns
  • Detect Kerberos anomalies (RC4 encryption, TGS for SPNs)
  • Alert on password spray patterns (many accounts, few passwords)
  • Network traffic analysis for AitM
  • Honey tokens / honey credentials

🛡️ Mitigation

  • Credential Guard / LSA protection
  • Disable NTLM where possible
  • Managed Service Accounts (gMSA)
  • Privileged Access Workstations (PAWs)
  • Regular password rotation for service accounts
🗺️

Discovery

TA0007

Adversary explores the environment — network mapping, system enumeration, account discovery — to understand what to target.

⚔️ Key Techniques

IDTechniqueDescription
T1087Account DiscoveryEnumerate local/domain/cloud accounts and groups
T1046Network Service DiscoveryPort scanning, service enumeration within the network
T1083File & Directory DiscoverySearch for sensitive files, configs, databases
T1069Permission Groups DiscoveryEnumerate admin groups, Domain Admins, cloud IAM roles
T1018Remote System DiscoveryIdentify other reachable hosts (net view, ping sweeps)

🔎 Detection

  • Monitor for excessive LDAP/AD queries
  • Alert on network scanning from internal hosts
  • Track directory listing commands (dir, ls, find)
  • Detect BloodHound/SharpHound collection
  • Honey files and canary tokens

🛡️ Mitigation

  • Network segmentation to limit discovery
  • Restrict LDAP query scope
  • Tiered administration model
  • Disable unnecessary network protocols
  • Deploy canary tokens and honeypots
↔️

Lateral Movement

TA0008

Adversary moves through the network — using stolen credentials, RDP, SMB, WMI, or exploiting trusts to reach high-value targets.

⚔️ Key Techniques

IDTechniqueDescription
T1021Remote ServicesRDP, SSH, SMB/Windows Admin Shares, VNC, WinRM
T1550Use Alternate Auth MaterialPass-the-Hash, Pass-the-Ticket, web session cookies
T1570Lateral Tool TransferCopy tools to remote systems via SMB, SCP, or C2
T1563Remote Service Session HijackingRDP hijacking, SSH session hijacking
T1210Exploitation of Remote ServicesExploit vulns in SMB (EternalBlue), RDP (BlueKeep)

🔎 Detection

  • Monitor for unusual RDP/SMB connections
  • Detect Pass-the-Hash (NTLM Type 3, LogonType 9)
  • Track lateral tool transfer (PsExec, wmic)
  • Network traffic analysis for anomalous east-west traffic
  • Alert on new admin logons to servers

🛡️ Mitigation

  • Network segmentation and micro-segmentation
  • Restrict admin protocols to PAWs only
  • Disable NTLM, enforce Kerberos
  • Local admin password solution (LAPS)
  • Just-in-Time (JIT) privileged access
📂

Collection

TA0009

Adversary gathers data of interest — emails, files, databases, screenshots, keystrokes — before exfiltration.

⚔️ Key Techniques

IDTechniqueDescription
T1114Email CollectionMailbox access, Exchange server scraping, forwarding rules
T1056Input CaptureKeylogger, credential interception, web portal capture
T1113Screen CaptureScreenshots at intervals or on-demand
T1005Data from Local SystemSensitive files, databases, configuration files
T1560Archive Collected DataCompress and encrypt before exfiltration (zip, rar, 7z)

🔎 Detection

  • Monitor for mass file access patterns
  • Detect email forwarding rule creation
  • DLP tools for sensitive data movement
  • Alert on unusual archive creation
  • Keystroke logging detection via EDR

🛡️ Mitigation

  • Data Loss Prevention (DLP) policies
  • Restrict email forwarding rules
  • File access monitoring and classification
  • Encrypt sensitive data at rest
  • Limit access to sensitive repositories
📡

Command & Control

TA0011

Adversary communicates with compromised systems to maintain control — using encrypted channels, legitimate services, or covert protocols.

⚔️ Key Techniques

IDTechniqueDescription
T1071Application Layer ProtocolC2 over HTTPS, DNS, email, WebSocket
T1573Encrypted ChannelTLS/SSL encrypted C2 traffic, custom encryption
T1105Ingress Tool TransferDownload tools from C2 server or legitimate services
T1572Protocol TunnelingDNS tunneling, ICMP tunneling, SSH tunneling
T1102Web ServiceC2 via cloud services (GitHub, Google Drive, Slack, Telegram)

🔎 Detection

  • DNS query analysis for tunneling (high entropy, unusual TXT records)
  • Network traffic analysis for beaconing patterns
  • JA3/JA3S TLS fingerprinting
  • Monitor connections to uncommon cloud services
  • Detect long-duration connections and periodic callbacks

🛡️ Mitigation

  • DNS filtering and monitoring
  • TLS inspection / SSL decryption
  • Network segmentation and egress filtering
  • Block known C2 infrastructure (threat intel)
  • Application-aware firewalls (NGFW)
📤

Exfiltration

TA0010

Adversary steals data from the network — transferring it via C2 channels, cloud storage, alternative protocols, or physical media.

⚔️ Key Techniques

IDTechniqueDescription
T1041Exfiltration Over C2 ChannelData sent through existing C2 connection
T1567Exfiltration Over Web ServiceUpload to cloud storage (Mega, Google Drive, S3)
T1048Exfiltration Over Alternative ProtocolDNS exfil, ICMP exfil, FTP, email attachments
T1537Transfer Data to Cloud AccountCopy data to attacker-controlled cloud subscription
T1029Scheduled TransferExfiltrate at specific times to blend with normal traffic

🔎 Detection

  • DLP monitoring for outbound data patterns
  • DNS exfiltration detection (unusually large TXT responses)
  • Monitor cloud storage uploads from corporate endpoints
  • Network baseline comparison for data volume anomalies
  • Alert on large outbound transfers to new destinations

🛡️ Mitigation

  • DLP at network edge and endpoints
  • Restrict cloud storage access (CASB)
  • Egress filtering and proxy inspection
  • Block unapproved file sharing services
  • Encrypt sensitive data (limits value if exfiltrated)
💥

Impact

TA0040

Adversary disrupts availability, destroys data, or manipulates systems — ransomware, wipers, defacement, or business process manipulation.

⚔️ Key Techniques

IDTechniqueDescription
T1486Data Encrypted for ImpactRansomware — encrypt files and demand payment (LockBit, BlackCat)
T1485Data DestructionWiper malware (NotPetya, WhisperGate, HermeticWiper)
T1489Service StopStop critical services, databases, security tools before encryption
T1490Inhibit System RecoveryDelete shadow copies, disable backup agents, corrupt boot records
T1491DefacementInternal/external website defacement for hacktivism or distraction

🔎 Detection

  • Monitor for mass file encryption (rapid file extension changes)
  • Alert on shadow copy deletion (vssadmin, wmic)
  • Track backup service/agent disruption
  • File integrity monitoring for critical systems
  • Canary files for ransomware early detection

🛡️ Mitigation

  • Immutable backups (air-gapped, cloud with object lock)
  • Ransomware protection in EDR
  • Network segmentation to limit blast radius
  • Incident response playbook for ransomware
  • Cyber insurance with tested recovery plans

Threat Intelligence (CTI)

CTI Lifecycle

Cyber Threat Intelligence follows a structured lifecycle: 1) Direction — Define intelligence requirements (what threats matter to your org). 2) Collection — Gather data from OSINT, dark web, ISACs, commercial feeds, internal telemetry. 3) Processing — Normalize, enrich, and deduplicate raw data. 4) Analysis — Produce actionable intelligence: strategic (for executives), tactical (for SOC/hunting), operational (for IR/defense). 5) Dissemination — Share via reports, SIEM integration, automated feeds. 6) Feedback — Evaluate effectiveness and refine requirements. Levels: Strategic (geopolitical, industry trends), Operational (TTPs, campaigns), Tactical (IOCs, signatures).

Diamond Model of Intrusion Analysis

Framework for analyzing and tracking cyber intrusions through four core features: Adversary — Who is attacking (threat actor, APT group). Capability — What tools/techniques they use (malware, exploits, TTPs). Infrastructure — What resources they use (C2 servers, domains, email accounts). Victim — Who is being targeted (org, person, system). Every intrusion event has these 4 vertices. Pivoting between vertices reveals new intelligence: from an IOC (infrastructure) → find related adversary → discover other campaigns → identify additional victims. Complements MITRE ATT&CK by adding adversary attribution and relationship context.

IOC Management & Enrichment

Indicators of Compromise (IOCs) are forensic artifacts — IP addresses, domains, file hashes, URLs, email addresses — that indicate a breach. Pyramid of Pain: Hash values (trivial to change) → IP addresses → domain names → network artifacts → host artifacts → tools → TTPs (hardest to change). Enrichment: Correlate IOCs with VirusTotal, Shodan, AbuseIPDB, GreyNoise, and AlienVault OTX. Key principle: Focus on TTP-based detection (top of pyramid) rather than low-level IOCs that adversaries change frequently. Automate IOC ingestion into SIEM/EDR via threat intel platform (MISP, ThreatConnect, Anomali).

STIX / TAXII Standards

STIX (Structured Threat Information Expression) — JSON-based language for describing threat intelligence: threat actors, campaigns, malware, vulnerabilities, indicators, attack patterns, and their relationships. STIX Domain Objects (SDOs) include Indicator, Malware, Attack Pattern, Threat Actor, Campaign. TAXII (Trusted Automated Exchange of Intelligence Information) — Transport protocol for sharing STIX data. Supports Collection (pull) and Channel (push) models. Enables automated sharing between organizations. Together: STIX defines WHAT to share; TAXII defines HOW to share it. Industry standard adopted by ISACs, MITRE, and most TIP platforms.

Interview Preparation

💡 Interview Question

Walk me through the MITRE ATT&CK framework and how you've used it.

MITRE ATT&CK is a knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations. It has 14 tactics (the WHY — from Reconnaissance to Impact) and hundreds of techniques (the HOW). I've used it for:

1Detection engineering — mapping SIEM rules to specific technique IDs to measure detection coverage.

2Threat modeling — understanding which techniques adversaries targeting our industry commonly use.

3Red team exercises — structuring attack simulations around specific tactics.

4Gap analysis — overlaying our security controls against the ATT&CK matrix to identify coverage gaps. Tools like MITRE ATT&CK Navigator help visualize this mapping.

💡 Interview Question

Explain the difference between Tactics, Techniques, and Procedures in ATT&CK.

Tactics are the adversary's goals — WHY they perform an action (e.g., Privilege Escalation to gain higher access). Techniques are HOW they achieve those goals (e.g., T1068 Exploitation for Privilege Escalation). Sub-techniques are more specific variations (e.g., T1059.001 PowerShell under Command & Scripting Interpreter). Procedures are the specific implementation details — exactly how a particular threat group uses a technique (e.g., APT29 uses PowerShell encoded commands for execution). This hierarchy helps defenders at different levels: tactics for strategic planning, techniques for detection rules, procedures for threat intelligence.

💡 Interview Question

How would you use ATT&CK to assess your SOC's detection coverage?

Step 1: Map existing SIEM rules, EDR detections, and network monitoring to ATT&CK technique IDs using ATT&CK Navigator. Step 2: Identify gaps — techniques with no detection rules. Step 3: Prioritize using threat intel — which techniques do adversaries targeting your industry commonly use (use groups like APT28, FIN7 as reference). Step 4: Build new detections for high-priority gaps. Step 5: Validate with purple team exercises — run atomic tests for each technique and verify alerts fire. Step 6: Create a heatmap showing coverage levels (none, partial, full) per technique. Track improvement quarterly. This gives leadership a visual, data-driven view of detection maturity.

💡 Interview Question

What is Kerberoasting (T1558.003) and how do you detect/prevent it?

Kerberoasting exploits Kerberos by requesting TGS tickets for Service Principal Names (SPNs) — these tickets are encrypted with the service account's NTLM hash, which can be cracked offline. Detection: Monitor for anomalous TGS requests (Event

4

7

6

9especially with RC4 encryption (versus AES), requests from unusual sources, or high volume TGS requests from a single user. Prevention: Use Managed Service Accounts (gMSA) with auto-rotating 120-char passwords. Set long, complex passwords (25+ chars) on service accounts. Enforce AES encryption for Kerberos. Minimize SPNs — remove unnecessary ones. Alert on service account usage from non-service hosts.

Related Domains

📊

SOC Operations

Detection & response workflows

🛡️

OWASP Top 10

Web, API & LLM vulnerabilities

🌐

Network Security

Network defense & monitoring

🔍

Vulnerability Management

Finding & remediating vulns

Enterprise-grade cybersecurity knowledge platform for training, interview preparation, and continuous learning. Master frameworks, architectures, and best practices.

Built by Security Professionals, for Security Enthusiasts.

Security Domains

  • AI Sec
  • AI/ML SecOps
  • API Sec
  • AppSec
  • Cloud
  • Data Sec

More Domains

  • DevSecOps
  • Crypto
  • GRC
  • IAM / IGA
  • MITRE ATT&CK
  • Network
  • OWASP Top 10
  • SAST/DAST
  • SIEM/Logs
  • SOC
  • VulnMgmt
  • ZTA

Frameworks

  • OWASP
  • NIST CSF
  • NIST SP 800
  • MITRE ATT&CK
  • ISO 27001/27002
  • CISA
  • CIS Controls
  • CVSS / CVE / KEV
  • CWE / SANS Top 25
  • SOX
  • PCI-DSS
  • GLBA
  • FFIEC / Federal Banking
  • GDPR
  • Architecture Diagrams
  • 📖 Glossary
© 2026 AIMIT — Cybersecurity Solutions PlatformA GenAgeAI Product
AIMIT
AIMIT 🛡️
On Duty AvatarVani