Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Detection Engineering

MITRE ATT&CK Framework

A globally accessible knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations, used to understand, detect, and respond to cyber threats.

Definition

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a curated knowledge base maintained by MITRE Corporation that catalogs how threat actors operate across the full attack lifecycle. It organizes adversary behavior into 14 tactics — from Initial Access to Impact — each containing specific techniques and sub-techniques observed in the wild. The framework covers multiple platforms including Windows, macOS, Linux, cloud environments, and mobile.

Why It Matters

ATT&CK provides a common language for describing attacker behavior, enabling security teams to communicate precisely about threats, prioritize defensive gaps, and benchmark detection coverage. For DFIR analysts, it transforms raw IOCs and log anomalies into structured intelligence that can be compared across incidents, threat actors, and industries. Organizations that map their detections to ATT&CK can measure coverage objectively and identify blind spots before attackers exploit them.

How It Works

The framework is organized into a matrix where columns represent tactics (the adversary's goal, e.g., Persistence, Lateral Movement) and rows represent techniques (the method used, e.g., T1053 Scheduled Task/Job). Each technique entry includes a description, real-world procedure examples, detection guidance, and mitigation recommendations. Analysts use ATT&CK during threat hunting by hypothesizing which techniques an adversary likely used and building queries around them. During incident response, findings are mapped to ATT&CK IDs to reconstruct the attack chain and attribute behavior to known threat groups.

DFIR Platform

AI Triage & Analysis

DFIR Lab's AI Triage feature automatically maps investigation findings to MITRE ATT&CK techniques in real time. It identifies relevant tactics and techniques from alert data, suggests corresponding detection rules, and builds TTP-based threat actor profiles. The dfir-lab.ch research blog also publishes ATT&CK-mapped threat actor profiles refreshed daily — browse them at dfir-lab.ch/actors.

View Documentation

Related Concepts

Sigma RulesIOC EnrichmentPhishing AnalysisBusiness Email Compromise (BEC)

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free