Home MITRE-ATT&CK
Post
Cancel

MITRE-ATT&CK

Hello World

As a security analyst/cyber security person we might know about MITRE as a framework, but the actual intent of MITRE is safety,stability and well-being of nation(includes cyber space, artificial intelligence)

Actually i’m also new to the defense field, every level of defense position will demand a good understanding on MITRE framework. So i tried to explain a basic overview about this in this post

Understanding of industry standard threat frameworks (Lockheed Martin Cyber Kill Chain, Diamond Model, MITRE ATT&CK)

https://web.archive.org/web/20211021134011/https://www.amazon.jobs/en/jobs/1595880/cyber-threat-intelligence-security-engineer-iii-malware

ATT&CK® (Adversarial Tactics, Techniques, and Common Knowledge) Framework is the projects developed by MITRE

MITRE began to address the need to record and document common TTPs (Tactics, Techniques, and Procedures) that APT (Advanced Persistent Threat) groups used against enterprise Windows networks.

Earlier ATT&CK was focused only on windows, then it was expanded to linux and macos. It is also useful for red teamers/pentesters

https://mitre-attack.github.io/attack-navigator/
From the above mentioned link we can find the navigation of ATT&CK metrices

It can be modified and added to the teams need in the organisation

To summarize, we can use the ATT&CK Matrix to map a threat group to their tactics and techniques. There are various methods the search can be initiated.

It was also built on github pages like this blog

search option usage

Reference:

https://tryhackme.com/room/mitre
https://www.mitre.org/

This post is licensed under CC BY 4.0 by the author.