The MITRE ATT&CK framework is a scientifically based, publicly accessible knowledge model that systematically documents the behaviors and methods of attackers.
ATT&CK stands for adversarial tactics, techniques, and common knowledge. The nonprofit MITRE organization developed the framework and first published it in 2013. The framework is based on empirical data from actual cyberattacks and is used to categorize, analyze, and defend against threats in the field of cybersecurity.
The MITRE ATT&CK framework consists of multidimensional matrices that structure attack behavior. The best known is the enterprise matrix, which users can apply to operating systems such as Windows, macOS, and Linux, as well as cloud and network environments (see figure below). You can access the enterprise matrix here.
The hierarchical structure of the matrix is explained in this table.
| Level Number | Level Name | Description |
| 1 | Tactics | The top level describes the attacker’s objectives in the form of tactics (i.e., what an attacker is trying to achieve, such as reconnaissance, initial access, execution, or privilege escalation). The list under the tactic’s name shows the various tactics in the MITRE ATT&CK framework. |
| 2 | Techniques | The second level specifies how (i.e., with which techniques) the attacker can achieve these goals (e.g., through phishing). |
| 3 | Sebtechniques | The third level describes the subtechniques, which are detailed variants of the techniques (e.g., the spear phishing attachment as a subtechnique of phishing). |
| 4 | Mitigations and detections | The fourth level specifies possible countermeasures and detection options for each technique. |
The following tactics are used in the MITRE ATT&CK framework:
The figure below shows the hierarchical arrangement, using the example of the spearphishing attachment subtechnique.
Clicking on the subtechnique will take you to a detailed explanation of the subtechnique, which is structured as shown here.
There, you will find, for example, the assignment of the subtechnique to the corresponding technique. The tactics and techniques are represented by IDs, so, for example, the Spearphishing Attachment subtechnique has an ID of T1566.001. This subtechnique belongs to technique T1566 (Phishing), and if you click on that technique, you will be taken to an overview that lists the various subtechniques for phishing.
The countermeasures (a.k.a. mitigations) are described in the overview of the individual subtechniques. For T1566.001 (spear phishing attachment), for example, it looks like this.
The next figure illustrates specific real-world cases in which certain groups or malware families have used techniques from the MITRE ATT&CK framework.
You can find these entries in the Procedure Examples section. Procedures are specific steps, such as the sequence in which the attacker performs certain actions. However, procedures are not synonymous with a complete attack plan or a detailed timeline, such as in a kill chain or incident report. Rather, each procedure is an example of how a specific technique was used in practice by an attacker.
The procedure examples consist of several components:
The MITRE ATT&CK framework is typically used in the following areas:
You can also use MITRE ATT&CK Navigator to simulate APT groups and analyze their behavior in detail. You can find the tool here.
ATT&CK promotes a common language in the field of cybersecurity, to facilitate communication between companies and authorities, the sharing of incident reports, and the comparability of attacks, among other things. ATT&CK complements frameworks such as the NIST Cybersecurity Framework (CSF), ISO/IEC 27001, and the cyber kill chain.
However, the multitude of techniques can be overwhelming, especially for small organizations. New techniques emerge faster than they can be incorporated into the framework, and in addition, ATT&CK is context-free (i.e., it does not assess how likely or dangerous a technique is in a specific environment).
Editor’s note: This post has been adapted from a section of the book Ethical Hacking: The Practical Guide for Pentesting and Red Teaming by Florian Dalwigk. Florian is an expert in cybercrime, cyberespionage, and IT security. After studying computer science, he worked for a security agency and has been a volunteer lecturer since 2024, teaching modules on "Ethical Hacking," "IT Forensics," "Cyberespionage," "Cybercrime and Crypto Forensics," and "Post-Quantum Cryptography," among others. As an author of specialist books, he conveys his knowledge in a clear and practical way. He is interested in the interface between technological innovation and security, particularly in the context of state-controlled cyber operations and cryptographic resilience in the post-quantum era.
This post was originally published in 5/2026.