Comprehensive Guide on MITRE ATT&CK Framework

Ashish Khare
System Weakness
Published in
4 min readJan 4, 2023

--

Hey guys Ashish this side. In this article, we’ll take a tour of “The MITRE ATT&CK Framework”, So let’s hop into it.

What is the Mitre ATT&CK Framework?

MITRE ATT&CK stands for MITRE Adversarial Tactics, Techniques, and Common Knowledge. It was created by Mitre Corporation and released in 2013.

The MITRE ATT&CK framework is developed by MITRE, a non-profit organization funded by the Government of the U.S. The ATT&CK Framework is a cybersecurity knowledge base of adversary tactics and techniques based on real-world observations.

This framework is helpful in various aspects of cybersecurity. It helps organizations to strengthen their threat intelligence and thereby improve their defences against attacks.

The ATT&CK contains the core components:

  • Tactics — Referring to short-term, adversary goals during an attack.
  • Techniques — Contains different means through which adversaries may achieve tactical goals.
  • Documentation of usage and techniques adopted by the adversary.

The MITRE ATT&CK framework comes in three iterations:

  • ATT&CK for Enterprise: It focuses on the behaviour of adversaries in Windows, Mac, Linux, and Cloud Environments.
  • ATT&CK for Mobile: It focuses on the behaviour of adversaries in iOS and Android environments.
  • ATT&CK for ICS: It focuses on the behaviour of adversaries while operating within the ICS network.

Understanding the MITRE ATT&CK Matrix:

The MITRE ATT&CK matrix consists of a set of techniques used by adversaries to accomplish their goals. Those objectives are referred to as ‘Tactics’ in the ATT&CK matrix.

Tactics are the core of the ATT&CK Framework and represent the underlying motive behind an ATT&CK technique.

1. Enterprise MATRIX

Currently, the MITRE ATT&CK Enterprise Framework consists of 14 easy-to-understand tactics which are as follows:

1. Reconnaissance: The adversary gathers information to be used in further operations.

2. Resource Development: The adversary establishes resources which can be used to support the operation.

3. Initial Access: The adversary tries to get into the network.

4. Execution: The adversary tries to run a malicious code.

5. Persistence: The adversary tries to maintain their foothold.

6. Privilege Escalation: The adversary tries to gain a higher level of privilege by exploiting any existing vulnerability.

7. Defence Evasion: The adversary tries to escape detection. For example, using trusted processes to hide malware

8. Credential Access: The adversary tries to access usernames and passwords.

9. Discovery: The adversary tries to figure out the environment, to figure out further attacks.

10. Lateral Movement: The adversary moves through the environment, using legitimate credentials to pivot through multiple systems

11. Collection: The adversary gathers data of interest as per the attack objective.

12. Command and Control: The adversary communicates with compromised systems to control them.

13. Exfiltration: The adversary steals the gathered data.

14. Impact: The adversary changes, interrupt, or destroys systems and data.

2. Mobile matrix

The MITRE ATT&CK mobile framework also consists of 14 tactics that are similar to the Enterprise framework. They are as follows:

1. Initial Access: The adversary tries to get into your device.

2. Execution: The adversary tries to run malicious code.

3. Persistence: The adversary tries to maintain a foothold.

4. Privilege Escalation: The adversary tries to gain higher levels of permission.

5. Defence Evasion: The adversary tries to avoid detection.

6. Credential Access: The adversary tries to access credentials which can be used to access resources.

7. Discovery: The adversary tries to get an idea about the environment.

8. Lateral Movement: The adversary tries to move through the environment.

9. Collection: The adversary tries to collect data of their interest.

10. Command and Control: The adversary tries to communicate with compromised devices.

11. Exfiltration: The adversary tries to steal data.

12. Impact: The adversary tries to manipulate, interrupt, or destroy your devices and data.

13. Network effects: The adversary tries to intercept or manipulate the network to or from a device.

14. Remote Service Effects: The adversary tries to control the device using remote service.

Conclusion:

MITRE ATT&CK is a detail-oriented and cross-referenced repository of knowledge about actual adversary groups and their known behaviour. It also tells us about the strategies, tactics, and methods used by adversaries.

Reference:

--

--