Home/Tools/Security/MITRE ATT&CK Navigator

MITRE ATT&CK Navigator

Explore adversary tactics, techniques, and procedures (TTPs) using the MITRE ATT&CK framework

100% Private - Runs Entirely in Your Browser
No data is sent to any server. All processing happens locally on your device.
Loading MITRE ATT&CK Navigator...
Loading interactive tool...

Need Professional Security Testing?

Our penetration testers find vulnerabilities before attackers do. Get a comprehensive security assessment.

What Is the MITRE ATT&CK Framework

The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. Maintained by the MITRE Corporation, it catalogs how threat actors operate—from initial access through data exfiltration—providing a common language for describing cyber threats, evaluating defenses, and prioritizing security investments.

ATT&CK has become the de facto standard for threat intelligence, security operations, and red/purple teaming. Over 80% of enterprise security teams use it to map detection coverage, assess security gaps, and communicate about threats. The framework covers Enterprise (Windows, macOS, Linux, cloud, containers, network), Mobile (Android, iOS), and ICS (Industrial Control Systems) platforms.

How MITRE ATT&CK Is Structured

The framework organizes adversary behavior into a hierarchical taxonomy:

LevelDescriptionExample
TacticThe adversary's goal (the "why")TA0001: Initial Access
TechniqueHow the goal is achievedT1566: Phishing
Sub-techniqueSpecific variation of a techniqueT1566.001: Spearphishing Attachment
ProcedureReal-world implementation by a threat groupAPT29 used spearphishing with COVID-19 lures

Enterprise ATT&CK Tactics (kill chain order):

  1. Reconnaissance (TA0043) — Gathering target information
  2. Resource Development (TA0042) — Setting up infrastructure
  3. Initial Access (TA0001) — Getting into the network
  4. Execution (TA0002) — Running malicious code
  5. Persistence (TA0003) — Maintaining access across restarts
  6. Privilege Escalation (TA0004) — Getting higher-level permissions
  7. Defense Evasion (TA0005) — Avoiding detection
  8. Credential Access (TA0006) — Stealing credentials
  9. Discovery (TA0007) — Understanding the environment
  10. Lateral Movement (TA0008) — Moving through the network
  11. Collection (TA0009) — Gathering target data
  12. Command and Control (TA0011) — Communicating with compromised systems
  13. Exfiltration (TA0010) — Stealing data
  14. Impact (TA0040) — Disrupting operations

Common Use Cases

  • Detection engineering: Map SIEM rules and EDR detections to ATT&CK techniques to identify coverage gaps
  • Threat intelligence: Describe adversary behavior using standardized technique IDs for consistent analysis
  • Red teaming: Structure penetration tests around specific techniques to test organizational defenses
  • Security assessments: Evaluate security posture by measuring coverage across ATT&CK tactics
  • Vendor evaluation: Compare security products based on which ATT&CK techniques they detect

Best Practices

  1. Start with the most common techniques — Focus detection efforts on T1059 (Command Interpreter), T1053 (Scheduled Task), T1566 (Phishing), and other frequently observed techniques first
  2. Map your existing detections — Inventory current SIEM rules and EDR capabilities against ATT&CK to find blind spots
  3. Use ATT&CK Navigator — MITRE's free visualization tool helps map coverage, plan improvements, and compare threat profiles
  4. Track adversary groups relevant to your industry — Not all techniques apply equally; prioritize based on threat actors targeting your sector
  5. Combine with other frameworks — Use ATT&CK alongside the NIST CSF, CIS Controls, and D3FEND for a comprehensive security strategy

References & Citations

  1. MITRE Corporation. (2024). MITRE ATT&CK. Retrieved from https://attack.mitre.org/ (accessed January 2025)
  2. MITRE Corporation. (2024). ATT&CK Navigator. Retrieved from https://mitre-attack.github.io/attack-navigator/ (accessed January 2025)
  3. MITRE Corporation. (2024). Getting Started with ATT&CK. Retrieved from https://attack.mitre.org/resources/getting-started/ (accessed January 2025)

Note: These citations are provided for informational and educational purposes. Always verify information with the original sources and consult with qualified professionals for specific advice related to your situation.

Frequently Asked Questions

Common questions about the MITRE ATT&CK Navigator

MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is globally-accessible knowledge base of adversary behaviors. Organized by 14 tactics (objectives) and 200+ techniques (methods). Covers: Enterprise (Windows, Linux, macOS, Cloud), Mobile, ICS (industrial). Used for: threat intelligence, detection engineering, red teaming, security assessments. Based on real-world observations. Free, community-driven. Updated quarterly. Essential reference for cybersecurity professionals.

0