Incident Command Platform
← Glossary

MITRE ATT&CK - Adversary Tactics and Techniques Catalog

MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations of cyber intrusions. Developed by The MITRE Corporation and continuously updated, ATT&CK is the de facto reference for detection engineering, threat intelligence, red teaming, and incident response. The framework spans Enterprise, Mobile, and ICS matrices, with hundreds of techniques and thousands of sub-techniques and procedures.

Source: attack.mitre.org, maintained by The MITRE Corporation under U.S. government sponsorship.

ATT&CK Structure

ATT&CK Matrices

How ATT&CK Is Used in Incident Response

DFIR teams map observed adversary behavior to ATT&CK techniques during investigation, which improves communication across teams and tooling. Detection engineers measure coverage against ATT&CK to identify gaps. Threat intelligence reports describe campaigns using ATT&CK references. Red and purple teams plan exercises against ATT&CK techniques relevant to the organization's threat profile.

Map incidents to ATT&CK automatically

IR-OS supports ATT&CK technique tagging on incident events for cross-team communication, coverage measurement, and defensible record-keeping.

Start free