You see the acronym everywhere, from vendor sales pitches to compliance checklists. But do you actually know how to use it during a live incident? Let’s break down the world’s most important cybersecurity framework and see why it’s the definitive playbook of defender strategy.
Welcome to a new series. After spending over a decade in the enterprise defense trenches—including nearly nine years at Trellix/McAfee architecting SIEM and XDR solutions for over 100 global organizations—I’ve learned one absolute truth:
You cannot defend against what you do not understand.

Legacy security architecture focused on “Known Bad” indicators, like malicious IP addresses or file hashes (IoCs). The problem? Hackers change these every single day.
Modern cybersecurity defense has shifted. We no longer focus on the weapon; we focus on the behavior.
That is the exact purpose of the MITRE ATT&CK Framework.
Maintained by the MITRE Corporation, a government-funded research non-profit, this framework is a globally accessible, free matrix that documents the actual behaviors, tactics, and techniques used by real-world threat actors in successful data breaches.
1. Tactics vs. Techniques (The ‘Why’ vs. The ‘How’)
To understand the framework, you must understand its core vocabulary. When you look at the master matrix, you are looking at columns and rows. The columns are Tactics, and the rows are Techniques. Understanding the difference is critical for mapping an alert.
Tactics (The Goal: ‘The Why’)
A Tactic represents the attacker’s immediate operational goal. Why are they performing an action?
- Examples: They want to get inside your network (Initial Access), they want to steal administrative passwords (Credential Access), or they want to jump from the receptionist’s laptop to the financial server (Lateral Movement).
Techniques (The Method: ‘The How’)
A Technique represents the actual, technical method the attacker uses to achieve that goal. How are they doing it?
- Example: If their Tactic is Credential Access, their Technique might be Brute Force (T1110) or OS Credential Dumping (T1003) (which we discussed in the PowerShell article).
The MITRE Hierarchy:
- Tactic (Why): Credential Access
- Technique (How): OS Credential Dumping (T1003)
- Sub-Technique: NTDS Dumping (T1003.003)
- Technique (How): OS Credential Dumping (T1003)
2. The Golden Triangle: Tactics, Techniques, and Procedures (TTPs)
In the SOC, you will constantly hear the term TTPs. This is the framework in action.
Let’s look at a technically sound example:
- Tactics (The Goal): Lateral Movement (TA0008). The hacker needs access to a different system.
- Techniques (The Method): Remote Services (T1021). They decide to move by exploiting a remote protocol like Remote Desktop Protocol (RDP).
- Procedures (The Specific Action): (This is the secret sauce!) The Procedure is the exact command line or tool the hacker used to implement the technique. For example, the hacker uses a known tool called Mimikatz to execute a Pass-the-Hash (PtH) attack to authenticate over RDP without ever typing a password.
MITRE isn’t just a list of techniques; it is a repository that maps specific malware families and specific hacker groups (APT groups) to their preferred TTPs.
3. The Power of the Matrix: From Passive to Active Defense
As a Tier-3 escalation engineer and a Customer Success Staff Engineer, I don’t just use MITRE to look up hacker behavior definitions. I use it strategically. Here are the three main ways a technically sound SOC operates using the framework:
1. Predictive Threat Hunting (The Chess Master)
If you know your opponent’s playbook, you can predict their next move. If your SIEM alerts you to a Persistence technique (meaning the hacker is making sure they have a backdoor), you consult the matrix. You know that once they have Persistence, their very next logical step is usually Privilege Escalation or Discovery.
You don’t just wait. You actively hunt for those techniques on the affected host, catching the attacker before they can act.
2. Heat Mapping & Gap Analysis
Modern Next-Gen SIEMs have a specialized “MITRE Heat Map” dashboard. It colors the matrix based on your active detection rules.
- Green boxes mean you are successfully collecting logs and have reliable alerts for that technique.
- Red boxes mean you are completely blind.
This map is your engineering roadmap. If your heat map shows zero coverage for Lateral Movement, your team knows exactly which log sources and custom rules they need to build next week.
3. Standardized Language & Reporting
When a breach occurs, the CISO, the Board of Directors, the SOC analysts, and the Incident Response team all need to be on the same page. In the past, analysts communicated in confusing jargon (e.g., “Event 4624 type 3 with an odd process”).
Today, we speak MITRE. When I say “We are seeing Lateral Movement via T1021 (Remote Services) on the SQL cluster,” every security professional in the company understands the exact scope and severity of the threat immediately.
Coming Up Next…
You now understand the framework’s architecture. You know why we are mapping behaviors (Tactics and Techniques) instead of weapons (IoCs).
But how do you actually apply this to a complex, multi-stage alert during a live firefight?
In Part 2: The Attack Mapping, we are going to roll up our sleeves and perform a Tier-3 escalation. We will take one single, technically dense alert, dissect it, and map every technical indicator directly to the MITRE matrix to reveal the hacker’s complete battle plan and predict their final move.
Stay tactical.
Leave a Reply