Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner
Introduction to MITRE ATT&CK Framework

Uday Mittal January 13, 2021

Introduction to MITRE ATT&CK Framework

This post is part of our course Adversary Emulation 101: Mimicking a real-world cyber attack.

If you want to beat your adversaries, think like them. A common adage we have all heard. MITRE ATT&CK is just that. A framework to think like adversaries and beat them in their game. It is a culmination of years of efforts of studying various cyber Adversaries’ Tactics, Techniques and turning them into Common Knowledge (ATT&CK).

What is ATT&CK framework?

As per ATT&CK’s design and philosophy document, ATT&CK is a behavioral model that consists of the following core components:

  • Tactics, denoting short-term, tactical adversary goals during an attack;
  • Techniques, describing the means by which adversaries achieve tactical goals;
  • Sub-techniques, describing more specific means by which adversaries achieve tactical goals at a lower level than techniques;
  • Documented adversary usage of techniques, their procedures,and other metadata;
  • Software, used by adversaries to implement a technique or a sub-technique; and
  • Mitigations, preventing adversaries from achieving their tactical goal by blocking the execution of a technique or a sub-technique.

The following figure will help in understanding the relationship between various ATT&CK components.

MITRE ATT&CK Object Model
Source: ATT&CK Design and Philosophy Paper (page 27)

Why was ATT&CK created?

MITRE’s goal behind creating this framework was to improve post-compromise detection of threats by tracing out the steps that could have been taken by an adversary. It was born out of the need to categorize adversary behavior as part of conducting adversary emulation exercises within MITRE’s Fort Meade Experiment (FMX) research environment.

What does it contain?

There are three variants of ATT&CK framework:

  • Enterprise
  • Mobile
  • ICS (Industrial Control Systems)

Originally, the Enterprise variant focused only on Microsoft Windows. However, later it was expanded to include macOS, Linux, PRE, AWS, GCP, Azure, Azure AD, Office 365, SaaS, Network platforms as well.

Each variant contains various tactics, techniques, sub-techniques and procedures that could be used by an adversary. The best way to visualize the framework is ATT&CK Navigator. It is an interactive web application, through which you can create layered views of the framework, as per your requirement.

Use cases

ATT&CK can be used for various purposes, such as:

  • Adversary emulation
  • Red teaming
  • SOC assessments
  • Defensive gap assessments
  • Behavioral analytics development
  • Cyber threat intelligence enrichment

MITRE provides an excellent getting started guide that shows how to utilize ATT&CK framework for these use cases.

Related Posts

  • Red Team Operations Attack LifecycleRed Team Operations Attack Lifecycle
  • SPN Scanning using ADSI (Part 3)SPN Scanning using ADSI (Part 3)
mm
Uday Mittal

Uday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. He speaks on cybersecurity awareness, offensive security research etc. and has authored various articles on topics related to cyber security and software development for a leading magazine on open source software.

Filed Under: Adversary Emulation Tagged With: Penetration Testing, red teaming

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

Active directory Active directory lab adsecurity adsi adsisearcher Android attack active directory awareness blue whale challenge Certification CISSP crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden ellitedevs forest enumeration hacker Information Security ISACA Kali Linux lab environment lab hardware Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest powersploit Powerview privacy red team Risk Management Social Media user enumeration Wifi Windows

Top Posts

  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • DCPP: Everything You Need to Know
    DCPP: Everything You Need to Know
  • Active Directory Network Recon using PowerView
    Active Directory Network Recon using PowerView
  • Are you sharing sensitive information over WhatsApp?
    Are you sharing sensitive information over WhatsApp?
  • Web App Pentesting using BodgeIt Store (Part 1)
    Web App Pentesting using BodgeIt Store (Part 1)

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress