This guide is meant to help you get started with the MITRE ATT&CK framework using the Threatcare App & Agent. 

MITRE ATT&CK describes adversary behavior and provides a common taxonomy for all practitioners, reflecting phases of an adversary’s attack.

The 11 tactic categories within ATT&CK for Enterprise were derived from the later stages of a seven-stage Cyber Attack Lifecycle (exploit, control, maintain, and execute), which was first articulated by Lockheed Martin as the Cyber Kill Chain™ . 

The MITRE ATT&CK  framework tactics include:

  • Initial Access
  • Execution
  • Persistence
  • Privilege Escalation
  • Defense Evasion
  • Credential Access
  • Discovery
  • Lateral Movement
  • Collection
  • Exfiltration
  • Command and Control

Find out more about overcoming common tactic and technique challenges view the MITRE ATT&CK Framework with Threatcare document, or Click Here. 

Did this answer your question?