HSR Sector 6 · Bangalore +91 96110 27980 Mon–Sat · 09:30–20:30
Glossary · soc-detection · 17 min

MITRE ATT&CK explained with examples

MITRE ATT&CK is a structured framework that documents how real threat actors break into networks, move laterally, escalate privileges, and steal data—organized into 14 tactics and 193 techniques as of ATT&CK v15. Security Operations Centers worldwide use ATT&CK to map detection rules, prioritize threat hunting, and communicate findings in a vendor-neutral language. Unlike abstract security models, every ATT&CK technique references actual threat groups (APT29, Lazarus, FIN7) and malware families observed in the wild, making it the de facto standard for defensive cybersecurity in 2026. Indian CERTs, SOCs at HCL and Wipro, and Cisco Secure teams all structure their detection engineering around ATT&CK technique IDs.

What MITRE ATT&CK actually means in 2026 cybersecurity

ATT&CK stands for Adversarial Tactics, Techniques, and Common Knowledge. It is not a compliance checklist or vulnerability database—it is an adversary behavior encyclopedia. MITRE Corporation, a U.S. federally funded research organization, began publishing ATT&CK in 2013 after analyzing decades of intrusion data from government and commercial incident response engagements.

The framework divides adversary operations into tactics (the "why"—objectives like Initial Access or Credential Access), techniques (the "how"—methods like Spearphishing Attachment or OS Credential Dumping), and sub-techniques (granular variants like LSASS Memory dumping under OS Credential Dumping). Each technique page on attack.mitre.org lists real threat groups that use it, software that implements it, detection data sources, and mitigation strategies.

In 2026, ATT&CK has expanded to cover Enterprise (Windows, Linux, macOS, cloud IaaS, SaaS, containers), Mobile (Android, iOS), and Industrial Control Systems (ICS). The Enterprise matrix alone contains 14 tactics spanning pre-compromise reconnaissance through impact and exfiltration. Indian SOC analysts at Akamai India, Barracuda, and Movate map every SIEM correlation rule and EDR detection to at least one ATT&CK technique ID, enabling cross-team communication without vendor jargon.

ATT&CK is not a penetration testing methodology (that's the Cyber Kill Chain or PTES), nor is it a risk framework (that's NIST CSF or ISO 27001). It is a descriptive taxonomy of what attackers actually do, grounded in threat intelligence. When a SOC analyst says "we detected T1003.001," every defender globally knows they mean LSASS memory credential dumping—no ambiguity.

The framework is updated quarterly. Techniques are added when MITRE observes new adversary behaviors in the wild or when the community submits well-documented proposals. Deprecated techniques are rare but occur when behaviors are subsumed into broader categories. This living-document nature makes ATT&CK the single source of truth for threat-informed defense in enterprises, MSSPs, and government agencies worldwide.

How the ATT&CK matrix structure works under the hood

The ATT&CK Enterprise matrix is a 14-column grid where each column is a tactic and each cell is a technique. Tactics run left-to-right in rough chronological order of an intrusion: Reconnaissance → Resource Development → Initial Access → Execution → Persistence → Privilege Escalation → Defense Evasion → Credential Access → Discovery → Lateral Movement → Collection → Command and Control → Exfiltration → Impact.

Each technique has a unique ID (T1078 for Valid Accounts, T1059 for Command and Scripting Interpreter). Sub-techniques append a decimal (T1059.001 for PowerShell, T1059.003 for Windows Command Shell). This hierarchical ID system allows SOCs to tag alerts at varying granularity: a generic "suspicious script execution" might map to T1059, while a confirmed PowerShell Empire beacon maps to T1059.001.

Techniques are not mutually exclusive—an attacker using a stolen password (T1078 Valid Accounts) to RDP into a server (T1021.001 Remote Desktop Protocol) triggers two techniques across two tactics (Initial Access and Lateral Movement). This many-to-many mapping reflects real attack complexity and prevents oversimplification.

Each technique page contains:

  • Procedure examples: Real incidents where threat groups used the technique (e.g., "APT29 used spearphishing links to deliver BEACON backdoor").
  • Mitigations: Defensive controls mapped to technique (e.g., "Enable PowerShell ScriptBlock Logging" for T1059.001).
  • Detection data sources: Telemetry types needed (e.g., "Process: Process Creation" or "Network Traffic: Network Connection Creation").
  • Platforms: OS/environment where technique applies (Windows, Linux, macOS, Azure AD, AWS, GCP, Kubernetes).

MITRE also publishes ATT&CK Navigator, a web tool that lets analysts overlay heatmaps of threat group activity, detection coverage, or red team test results onto the matrix. A SOC might color-code techniques: green = we detect this reliably, yellow = partial visibility, red = blind spot. This visual gap analysis drives security investment decisions at Cisco India, HCL, and Infosys SOCs.

The framework's power lies in its composability: threat intelligence teams export ATT&CK-tagged IOCs, detection engineers import them into SIEM, red teams map penetration test findings to technique IDs, and executives see a unified risk picture without needing to understand YARA rules or Sigma signatures.

Real-world ATT&CK examples from Indian SOC operations

Example 1: Detecting credential dumping in a Bangalore fintech SOC. An EDR agent on a Windows 10 workstation flags process rundll32.exe accessing lsass.exe memory. The SOC analyst maps this to T1003.001 (OS Credential Dumping: LSASS Memory). Checking ATT&CK, they see APT28, FIN6, and Carbanak all use this technique. The analyst pivots to network logs, finds the workstation beaconing to a suspicious IP in Eastern Europe, and escalates to incident response. Without ATT&CK, the alert might have been dismissed as a false positive; with it, the analyst knows this is a high-confidence credential theft attempt.

Example 2: Threat hunting for lateral movement at an MSSP in Hyderabad. A threat hunter hypothesizes that attackers who gained initial access via phishing (T1566.001) will attempt SMB-based lateral movement (T1021.002). They query Splunk for Event ID 4624 (logon) with Logon Type 3 (network) where the source workstation is not a known admin jump box. The hunt surfaces 47 anomalous lateral movements in 30 days, three of which lead to confirmed compromises. The hunt is documented as "ATT&CK-aligned hunt: T1021.002 detection via Windows Event Logs," enabling other MSSPs to replicate it.

Example 3: Red team engagement at Wipro using ATT&CK emulation. Wipro's internal red team uses MITRE Caldera (an open-source ATT&CK emulation platform) to simulate APT29 tactics. They execute T1566.002 (Spearphishing Link), T1204.001 (User Execution: Malicious Link), T1059.001 (PowerShell), T1055 (Process Injection), and T1041 (Exfiltration Over C2 Channel). The blue team's detection rate is 60%—they catch PowerShell and exfiltration but miss process injection. This ATT&CK-mapped gap analysis drives a $2M investment in memory forensics tooling.

Example 4: Compliance reporting for RBI at a Mumbai bank. The Reserve Bank of India's cybersecurity framework requires banks to demonstrate defense against "advanced persistent threats." The bank's CISO exports ATT&CK coverage from their SIEM: 78% of Enterprise techniques have at least one detection rule, 34% have automated response playbooks. This ATT&CK-based metric satisfies RBI auditors more effectively than vague "we have a SOC" statements, because it quantifies defensive posture against documented adversary behaviors.

These examples show ATT&CK's versatility: detection engineering, threat hunting, red teaming, and compliance all use the same technique IDs, creating a common operational language across security functions.

ATT&CK tactics explained: the 14 stages of an intrusion

Tactics answer "what is the adversary trying to achieve?" They represent the attacker's goals at each stage of an operation. The 14 Enterprise tactics are:

  1. Reconnaissance (TA0043): Gathering information about the target (OSINT, scanning public IPs, scraping LinkedIn for employee names). Example: T1592 (Gather Victim Host Information).
  2. Resource Development (TA0042): Acquiring infrastructure and capabilities (registering domains, buying exploits, compromising third-party infrastructure). Example: T1583 (Acquire Infrastructure).
  3. Initial Access (TA0001): Getting into the network (phishing, exploiting public-facing apps, using stolen VPN credentials). Example: T1190 (Exploit Public-Facing Application).
  4. Execution (TA0002): Running malicious code (PowerShell scripts, malicious macros, scheduled tasks). Example: T1059.001 (PowerShell).
  5. Persistence (TA0003): Maintaining foothold across reboots (registry run keys, scheduled tasks, web shells). Example: T1053.005 (Scheduled Task).
  6. Privilege Escalation (TA0004): Gaining higher-level permissions (exploiting kernel vulnerabilities, abusing sudo, token impersonation). Example: T1068 (Exploitation for Privilege Escalation).
  7. Defense Evasion (TA0005): Avoiding detection (disabling AV, obfuscating scripts, masquerading processes). Example: T1562.001 (Disable or Modify Tools).
  8. Credential Access (TA0006): Stealing passwords and tokens (keylogging, dumping LSASS, brute-forcing). Example: T1003.001 (LSASS Memory).
  9. Discovery (TA0007): Learning about the environment (network scanning, enumerating domain trusts, listing running processes). Example: T1018 (Remote System Discovery).
  10. Lateral Movement (TA0008): Moving to other systems (RDP, PsExec, SSH, exploiting trust relationships). Example: T1021.001 (Remote Desktop Protocol).
  11. Collection (TA0009): Gathering data of interest (screen capture, clipboard data, email harvesting). Example: T1114 (Email Collection).
  12. Command and Control (TA0011): Communicating with compromised systems (DNS tunneling, HTTPS beacons, cloud service abuse). Example: T1071.001 (Web Protocols).
  13. Exfiltration (TA0010): Stealing data out of the network (FTP upload, cloud sync, physical media). Example: T1567.002 (Exfiltration to Cloud Storage).
  14. Impact (TA0040): Disrupting availability or integrity (ransomware, data destruction, defacement). Example: T1486 (Data Encrypted for Impact).

Not every intrusion uses all 14 tactics. A ransomware gang might skip Collection and Exfiltration, jumping straight from Credential Access to Impact. A nation-state APT might spend months in Reconnaissance and Discovery before any Impact. ATT&CK's tactic structure accommodates both smash-and-grab and low-and-slow campaigns.

Indian SOC playbooks at Akamai India and Barracuda map incident response phases to ATT&CK tactics: "Containment" actions target Lateral Movement and Command and Control techniques, "Eradication" removes Persistence mechanisms, "Recovery" addresses Impact techniques.

Techniques vs sub-techniques vs procedures: understanding ATT&CK granularity

Techniques are broad methods; sub-techniques are specific implementations; procedures are real-world instances. This three-level hierarchy balances abstraction with actionable detail.

Technique example: T1059 (Command and Scripting Interpreter). This covers any use of command-line interfaces or scripting engines to execute code. It's intentionally broad because the defensive response (log script execution, apply application whitelisting) is similar across variants.

Sub-technique examples under T1059:

  • T1059.001 PowerShell
  • T1059.003 Windows Command Shell (cmd.exe)
  • T1059.004 Unix Shell (bash, sh, zsh)
  • T1059.005 Visual Basic
  • T1059.006 Python
  • T1059.007 JavaScript

A SOC might detect "suspicious script execution" generically (T1059) but enrich alerts with sub-technique IDs when the interpreter is known. This granularity helps prioritize: PowerShell Empire (T1059.001) is higher-risk than a benign Python admin script (T1059.006).

Procedure example: "APT29 used PowerShell to download and execute a Cobalt Strike beacon from a compromised WordPress site." This is a procedure—a specific instance of T1059.001 by a named threat actor. MITRE documents hundreds of procedures per technique, sourced from public threat reports by CrowdStrike, Mandiant, Kaspersky, and others.

Why this matters: A detection engineer building a SIEM rule for T1059.001 can study 50+ documented APT29, FIN7, and Lazarus procedures to understand evasion tricks (base64 encoding, AMSI bypass, download cradles), then write a rule that catches variations. Without procedures, the rule might only catch textbook examples.

Indian cybersecurity training often conflates these levels. A CCNA-level student might say "the attacker used PowerShell"—that's a technique. A CCIE Security-level analyst says "the attacker used T1059.001 with AMSI bypass via memory patching, consistent with FIN7 procedures documented in 2024"—that's operationally useful intelligence.

ATT&CK Navigator allows filtering by technique, sub-technique, or specific threat group procedures, enabling SOCs to tailor defenses to the adversaries most likely to target their vertical (financial services SOCs prioritize FIN7/Carbanak techniques; defense contractors prioritize APT28/APT29).

How SOC analysts use ATT&CK for detection engineering and threat hunting

Detection engineering: SOC teams map every SIEM correlation rule, EDR signature, and IDS alert to ATT&CK technique IDs. A Splunk alert for "Suspicious PowerShell Execution" is tagged mitre_attack: ["T1059.001"]. This tagging enables three workflows:

  1. Coverage assessment: Export all detection rules, group by technique ID, overlay on ATT&CK Navigator. Identify gaps (e.g., "we have zero detections for T1550 Use Alternate Authentication Material"). Prioritize new rule development based on threat intelligence (if APT29 is targeting your industry and uses T1550.001, build that detection first).
  2. Alert triage: When an alert fires, the analyst sees the ATT&CK context immediately. An alert for T1003.001 (LSASS dumping) is high-severity because it's a direct precursor to lateral movement. An alert for T1082 (System Information Discovery) might be lower-priority unless correlated with other techniques in a chain.
  3. Playbook automation: SOAR platforms like Splunk SOAR or Palo Alto Cortex XSOAR have ATT&CK-tagged playbooks. When T1566.001 (Spearphishing Attachment) fires, the playbook auto-quarantines the email, sandboxes the attachment, checks VirusTotal, and hunts for T1204.002 (User Execution: Malicious File) on the recipient's endpoint—all without human intervention.

Threat hunting: Hunters develop hypotheses in ATT&CK language. "Hypothesis: Attackers who achieve Initial Access via T1078 (Valid Accounts) will attempt T1087 (Account Discovery) within 24 hours to map the domain." The hunter queries Active Directory logs for unusual LDAP queries (Event ID 1644) from non-admin accounts, surfaces anomalies, and investigates. This hypothesis-driven approach is more efficient than random log spelunking.

At Networkers Home's HSR Layout lab, our 4-month paid cybersecurity internship places students in a live SOC environment where they write Sigma rules (an open-source detection rule format) tagged with ATT&CK IDs. Interns learn to translate a threat intelligence report ("FIN7 uses mshta.exe to execute HTA files") into a detection rule for T1218.005 (Mshta), test it against benign and malicious samples, and tune false positive rates—skills that make them job-ready at Akamai India, Barracuda, and Cisco Secure on day one.

Indian MSSPs increasingly require ATT&CK proficiency in SOC analyst job descriptions. A typical Bangalore SOC analyst role at HCL or Wipro lists "map security events to MITRE ATT&CK framework" as a core competency, alongside SIEM query languages and incident response.

ATT&CK for cloud and container environments: IaaS, SaaS, Kubernetes

ATT&CK v10 (2021) introduced cloud-specific techniques; v15 (2024) expanded Kubernetes and SaaS coverage. Cloud tactics mirror on-prem but techniques differ due to API-driven infrastructure.

Cloud Initial Access techniques:

  • T1078.004 (Valid Accounts: Cloud Accounts) — stolen AWS IAM keys, Azure AD credentials, GCP service account tokens.
  • T1190 (Exploit Public-Facing Application) — exploiting misconfigured S3 buckets, exposed Kubernetes dashboards, vulnerable Lambda functions.

Cloud Persistence:

  • T1098 (Account Manipulation) — adding a backdoor IAM user, creating a rogue Azure AD service principal.
  • T1525 (Implant Internal Image) — poisoning a container image in ECR/ACR/GCR so every pod deployment includes a backdoor.

Cloud Credential Access:

  • T1552.005 (Unsecured Credentials: Cloud Instance Metadata API) — querying EC2 metadata endpoint http://169.254.169.254/latest/meta-data/iam/security-credentials/ to steal IAM role credentials from a compromised instance.

Cloud Defense Evasion:

  • T1562.008 (Disable Cloud Logs) — disabling AWS CloudTrail, Azure Activity Logs, or GCP Cloud Audit Logs to hide attacker actions.
  • T1578.002 (Modify Cloud Compute Infrastructure: Create Snapshot) — snapshotting an EBS volume to exfiltrate data without triggering DLP.

Kubernetes-specific techniques:

  • T1611 (Escape to Host) — breaking out of a container to the underlying node via kernel exploits or misconfigured capabilities.
  • T1613 (Container and Resource Discovery) — listing pods, services, secrets via kubectl or Kubernetes API.

Indian cloud-native startups and enterprises (Razorpay, Freshworks, Zoho) face these techniques daily. A 2025 CERT-In advisory highlighted T1552.005 (metadata API abuse) as the #2 cloud compromise vector in India after T1078.004 (stolen credentials). SOC teams at Akamai India now hunt for anomalous metadata API calls in CloudTrail logs, mapping findings to ATT&CK for executive reporting.

Detection in cloud requires different telemetry: CloudTrail/Activity Logs replace Windows Event Logs, VPC Flow Logs replace NetFlow, container runtime security (Falco, Sysdig) replaces EDR. But the ATT&CK taxonomy remains constant—T1078 is T1078 whether it's a stolen domain password or a leaked AWS access key. This consistency lets SOC analysts transfer skills from on-prem to cloud without relearning threat models.

Common ATT&CK pitfalls and CCIE Security interview gotchas

Pitfall 1: Confusing ATT&CK with the Cyber Kill Chain. Lockheed Martin's Cyber Kill Chain (Reconnaissance → Weaponization → Delivery → Exploitation → Installation → Command and Control → Actions on Objectives) is a linear model of intrusion phases. ATT&CK is a matrix of adversary behaviors that can occur in any order. An attacker might achieve Persistence before Privilege Escalation, or skip Collection entirely. Interview gotcha: "Is ATT&CK a kill chain?" Answer: "No, it's a behavior taxonomy; tactics are loosely chronological but techniques can repeat or occur out of order."

Pitfall 2: Treating ATT&CK as a compliance checklist. Some vendors claim "100% ATT&CK coverage." This is meaningless—ATT&CK has 193 techniques, many mutually exclusive (you can't simultaneously be a Windows and Linux target). Mature SOCs measure coverage for techniques relevant to their threat model. A financial services SOC prioritizes FIN7/Carbanak techniques; a defense contractor prioritizes APT29/APT28. Interview question: "How do you measure ATT&CK coverage?" Answer: "Map detection rules to techniques, filter by threat groups targeting our vertical, calculate coverage percentage for that subset, identify gaps, prioritize based on exploitability and business impact."

Pitfall 3: Over-tagging alerts. Tagging every alert with 5 ATT&CK techniques dilutes signal. A single PowerShell execution might map to T1059.001 (execution), T1105 (ingress tool transfer if it downloads a file), T1027 (obfuscated files if base64-encoded), T1071.001 (web protocols if it beacons out). Tag the primary technique the alert detects, not every possible technique in the attack chain. Interview question: "An EDR alert shows PowerShell downloading a file via HTTPS and executing it. Which ATT&CK techniques apply?" Answer: "Primary: T1059.001 (PowerShell execution). Secondary: T1105 (Ingress Tool Transfer) if the download is the focus, T1071.001 (Web Protocols) if C2 communication is the focus. Tag based on what the detection rule actually identifies."

Pitfall 4: Ignoring data sources. Each ATT&CK technique lists required data sources (Process: Process Creation, Network Traffic: Network Connection Creation, File: File Modification). If your environment doesn't collect those logs, you cannot detect that technique. Interview question: "Your SIEM has no EDR integration. Can you detect T1003.001 (LSASS dumping)?" Answer: "Partially. We can detect some variants via Windows Event ID 4656 (handle to LSASS) or Sysmon Event ID 10 (process access), but without memory forensics from EDR, we'll miss in-memory-only dumps. Detection confidence is low."

Pitfall 5: Not updating ATT&CK mappings. ATT&CK evolves quarterly. Techniques are added, deprecated, or re-numbered. A detection rule tagged T1086 (PowerShell) in 2020 should now be T1059.001 (T1086 was deprecated and merged). SOCs must version-control ATT&CK mappings and re-tag rules after each release. Interview question: "How do you handle ATT&CK version updates?" Answer: "Subscribe to MITRE's ATT&CK release notes, maintain a mapping table in our SIEM, run a quarterly audit to re-tag deprecated techniques, update detection rule metadata, and retrain analysts on new techniques relevant to our threat landscape."

At Networkers Home, our CCIE Security instructors (including founder Vikas Swami, Dual CCIE #22239) drill these pitfalls in mock interviews. Students who can articulate ATT&CK's limitations and proper use cases stand out in technical screens at Cisco India, Palo Alto Networks, and Fortinet.

How Cisco, Palo Alto, and Microsoft integrate ATT&CK into products

Cisco Secure (formerly Cisco Security): Cisco Secure Endpoint (formerly AMP for Endpoints) tags malware detections with ATT&CK technique IDs. When Secure Endpoint blocks a process, the alert includes "MITRE Tactics: Execution, Defense Evasion | Techniques: T1059.001, T1027." Cisco SecureX (threat response platform) aggregates alerts from Secure Endpoint, Umbrella, Firepower, and third-party tools, correlates them into incidents, and maps the incident to an ATT&CK attack path. A SecureX incident might show: Initial Access (T1566.001 phishing) → Execution (T1204.002 malicious file) → Defense Evasion (T1562.001 disable AV) → Credential Access (T1003.001 LSASS dump). This visual attack chain helps SOC analysts understand the full intrusion scope. Cisco's Talos threat intelligence team publishes ATT&CK-tagged threat reports, which SecureX auto-imports to update detection rules.

Palo Alto Networks: Cortex XDR (EDR/XDR platform) uses ATT&CK-based behavioral analytics. Instead of signature-based detection, XDR chains low-confidence events (process creation, network connection, registry modification) into high-confidence ATT&CK technique detections. For example, three benign events—powershell.exe spawns, makes an HTTPS connection, writes to HKCU\Software\Microsoft\Windows\CurrentVersion\Run—individually are not alerts, but chained together match the ATT&CK pattern for T1059.001 + T1071.001 + T1547.001 (persistence via registry run key). Cortex XSOAR (SOAR platform) ships with 200+ ATT&CK-tagged playbooks. When XDR detects T1003.001, XSOAR auto-executes the "Credential Dumping Response" playbook: isolate host, dump memory, reset compromised account passwords, hunt for lateral movement.

Microsoft Defender: Microsoft 365 Defender and Azure Sentinel (now Microsoft Sentinel) tag every alert with ATT&CK techniques. Sentinel's built-in hunting queries are organized by ATT&CK tactic. A SOC analyst hunting for Credential Access opens the "TA0006 Credential Access" query pack, which includes KQL queries for T1003 (OS Credential Dumping), T1110 (Brute Force), T1555 (Credentials from Password Stores). Microsoft Threat Intelligence Center publishes ATT&CK-mapped threat actor profiles ("NOBELIUM uses T1195.002 supply chain compromise"), which Sentinel imports to auto-tune detection rules for active campaigns.

Why this matters for Indian enterprises: HCL, Wipro, TCS, and Infosys SOCs use multi-vendor stacks (Cisco + Palo Alto + Microsoft is common). ATT&CK is the interoperability layer—a Cisco Secure Endpoint alert for T1059.001 can trigger a Palo Alto XSOAR playbook that queries Microsoft Sentinel for correlated T1003.001 events. Without ATT&CK, these tools speak different languages; with it, they form a unified defense.

Networkers Home's HSR Layout lab runs a hybrid stack (Cisco Secure Endpoint, Palo Alto VM-Series, Microsoft Sentinel) so students experience real-world multi-vendor SOC operations. Our 8-month verified experience letter documents hands-on ATT&CK-based detection engineering, making graduates competitive for SOC roles at Akamai India, Barracuda, and Movate.

Building an ATT&CK-based threat hunting program from scratch

Step 1: Baseline your detection coverage. Export all SIEM rules, EDR signatures, IDS alerts. Tag each with ATT&CK technique IDs (if not already tagged, do this manually—it takes 2–4 weeks for a 500-rule SOC). Import into ATT&CK Navigator, generate a heatmap. You'll likely see 40–60% technique coverage for a mature SOC, 15–30% for an immature one. Identify the largest gaps (entire tactics with zero coverage, high-risk techniques like T1003.001 with no detection).

Step 2: Prioritize based on threat intelligence. Subscribe to threat intel feeds (MITRE's CTI repository, Recorded Future, Anomali, or free sources like CISA alerts, CERT-In advisories). Filter for threat groups targeting your geography (for India: APT36/Transparent Tribe, SideCopy, Bitter) and vertical (financial, IT services, pharma). Extract the top 20 techniques these groups use. Cross-reference with your coverage heatmap—techniques that are high-threat + low-coverage are your hunt priorities.

Step 3: Develop hunt hypotheses. A hypothesis is a testable statement: "If an attacker achieved Initial Access via T1078.004 (stolen cloud credentials), they will perform T1087.004 (Cloud Account Discovery) within 48 hours to map IAM permissions." Write the hypothesis in a wiki, document the ATT&CK techniques involved, list required data sources (AWS CloudTrail, Azure AD sign-in logs), and define success criteria (find at least one true positive, or confidently rule out the threat).

Step 4: Hunt. Query your SIEM/data lake for the hypothesis. For the above example: index=cloudtrail eventName IN ("ListUsers", "GetUser", "ListRoles") | where user NOT IN (known_admin_accounts) | stats count by user, sourceIPAddress | where count > 10. Investigate anomalies. If you find a compromised account, escalate to incident response. If you find nothing, document "hypothesis tested, no findings, environment likely not vulnerable to this technique."

Step 5: Operationalize findings. If the hunt found a gap, build a detection rule. If it found a true positive, document the procedure ("Attacker used aws-cli from IP X.X.X.X to enumerate IAM users") and add it to your threat intelligence platform. If it found a false positive pattern, tune existing rules to reduce noise.

Step 6: Repeat weekly. Mature SOCs run 2–4 hunts per week. Each hunt targets 1–3 ATT&CK techniques. Over a year, you'll hunt 100+ techniques, dramatically improving coverage and analyst skill.

Indian SOC example: A Bangalore-based MSSP serving e-commerce clients hypothesized that attackers targeting payment gateways would use T1552.001 (Credentials In Files) to steal API keys from developer workstations. They hunted for .env, config.json, secrets.yaml files containing strings like api_key, secret_key, password on endpoints. The hunt surfaced 200+ files with plaintext credentials, none actively exploited but all high-risk. The MSSP built a detection rule for file access to these paths, reducing credential exposure risk by 80%.

Networkers Home's cybersecurity internship includes a capstone project where students design and execute an ATT&CK-based hunt in our lab environment, document findings in a threat report, and present to a mock SOC leadership team—mirroring real-world workflows at HCL, Wipro, and Akamai India.

Exam relevance

At Networkers Home's HSR Layout lab, our 4-month paid cybersecurity internship places students in a live SOC environment where they write Sigma detection rules tagged with MITRE ATT&CK technique IDs, test them against MITRE Caldera adversary emulation scenarios, and tune false positive rates using our 24×7 rack access. Interns map real threat intelligence reports (APT36, SideCopy campaigns targeting India) to ATT&CK Navigator heatmaps, identify detection gaps, and build custom SIEM correlation rules—graduating with an 8-month verified experience letter documenting hands-on ATT&CK-based detection engineering that makes them job-ready at Akamai India, Barracuda, Cisco Secure, and Movate on day one. For AI-mediated threat-intelligence — adversary narratives and brand-impersonation propagation through AI assistants — Networkers Home's founder Vikas Swami ships AEONITI, the observability platform tracking brand citations across Claude, GPT-4o, Perplexity, Gemini, Grok, and DeepSeek with daily refresh.

Frequently asked questions

What is the difference between MITRE ATT&CK and the Cyber Kill Chain? +
The Cyber Kill Chain is a linear seven-stage model (Reconnaissance → Weaponization → Delivery → Exploitation → Installation → Command and Control → Actions on Objectives) developed by Lockheed Martin to describe intrusion phases. MITRE ATT&CK is a matrix of 193 techniques across 14 tactics that can occur in any order, repeat, or be skipped entirely. Kill Chain is prescriptive ("attacks follow this sequence"); ATT&CK is descriptive ("attackers use these behaviors"). Kill Chain is useful for high-level communication; ATT&CK is operationally actionable for detection engineering. Most modern SOCs use ATT&CK because it reflects real adversary flexibility—an attacker might establish Persistence before Privilege Escalation, or achieve Impact without Exfiltration. ATT&CK's granularity (technique IDs, sub-techniques, documented procedures) makes it superior for building detection rules, whereas Kill Chain lacks this detail.
How do I map my SIEM alerts to MITRE ATT&CK techniques? +
Start by reviewing each SIEM correlation rule's logic. Ask: "What adversary behavior does this detect?" For example, a rule detecting powershell.exe -EncodedCommand maps to T1059.001 (PowerShell) and possibly T1027 (Obfuscated Files). Add a custom field to your SIEM alert schema called mitre_attack_techniques (array of technique IDs). Tag rules manually or use Sigma rules (open-source detection format with built-in ATT&CK tags) and convert them to your SIEM's query language via sigmac. For commercial tools, Splunk ES ships with ATT&CK tags in its Correlation Searches; Microsoft Sentinel's built-in analytics rules are pre-tagged; Palo Alto Cortex XDR auto-tags alerts. After tagging, export to ATT&CK Navigator to visualize coverage. Update tags quarterly when MITRE releases new ATT&CK versions. This process takes 2–4 weeks for a 500-rule SOC but pays dividends in gap analysis and threat hunting.
Which MITRE ATT&CK techniques are most common in Indian cyberattacks? +
Based on 2024–2025 CERT-In advisories and Indian MSSP telemetry, the top 10 techniques targeting Indian enterprises are: T1566.001 (Spearphishing Attachment) and T1566.002 (Spearphishing Link) for Initial Access—phishing remains the #1 entry vector. T1078.004 (Valid Accounts: Cloud Accounts)—stolen AWS/Azure credentials from misconfigured S3 buckets or leaked GitHub repos. T1059.001 (PowerShell)—used by APT36, SideCopy, and ransomware gangs for execution. T1003.001 (LSASS Memory)—credential dumping via Mimikatz or custom tools. T1021.001 (Remote Desktop Protocol)—lateral movement in Windows-heavy Indian enterprises. T1190 (Exploit Public-Facing Application)—exploiting unpatched WordPress, Joomla, or custom PHP apps. T1486 (Data Encrypted for Impact)—ransomware (LockBit, Conti variants) targeting manufacturing and healthcare. T1071.001 (Web Protocols)—C2 over HTTPS to evade DPI. T1562.001 (Disable or Modify Tools)—disabling Windows Defender or EDR agents. T1053.005 (Scheduled Task/Job: Scheduled Task)—persistence mechanism. Indian SOCs should prioritize detection for these techniques, as they account for 70%+ of confirmed intrusions in the region.
Can MITRE ATT&CK be used for compliance reporting to RBI or CERT-In? +
Yes, increasingly so. The Reserve Bank of India's cybersecurity framework and CERT-In guidelines require financial institutions and critical infrastructure to demonstrate defense against "advanced persistent threats" and "known attack vectors." ATT&CK provides a quantifiable metric: "We have detection coverage for 78% of ATT&CK Enterprise techniques relevant to financial services threat actors (FIN7, Carbanak, Lazarus)." This is more concrete than vague statements like "we have a 24×7 SOC." Export your ATT&CK coverage heatmap, filter for techniques used by threat groups targeting your sector, calculate percentage coverage, and include in compliance reports. Some Indian auditors now explicitly request ATT&CK mappings. Additionally, DPDP Act 2023 (India's data protection law) requires "appropriate technical and organizational measures"—documenting ATT&CK-based detection engineering demonstrates technical rigor. While ATT&CK is not a compliance standard itself (like ISO 27001 or PCI-DSS), it is a recognized best practice for operationalizing threat-informed defense, which satisfies many compliance requirements.
What is MITRE ATT&CK Navigator and how do SOC teams use it? +
ATT&CK Navigator is a free web-based tool (attack.mitre.org/navigator) that visualizes the ATT&CK matrix as an interactive heatmap. SOC teams use it to overlay data: detection coverage (green = we detect this technique, red = blind spot), threat group activity (heatmap intensity = how often APT29 uses each technique), red team test results (techniques successfully executed during penetration test), or incident findings (techniques observed in last quarter's breaches). You can export Navigator layers as JSON, share with stakeholders, or import into SIEM dashboards. Common workflows: (1) Gap analysis—import your SIEM's detection rule tags, generate coverage heatmap, identify red (undetected) techniques, prioritize new rule development. (2) Threat profiling—select a threat group (e.g., APT36), Navigator highlights their techniques, you assess if your defenses counter them. (3) Executive reporting—export a heatmap showing "before/after" coverage improvement over 6 months to justify security budget. Indian SOCs at HCL, Wipro, and Akamai India use Navigator in quarterly security reviews with CISOs.
How does MITRE ATT&CK apply to cloud security and Kubernetes? +
ATT&CK v10 (2021) added cloud-specific techniques for AWS, Azure, GCP, and SaaS platforms. Key cloud tactics: Initial Access via T1078.004 (stolen IAM credentials) or T1190 (exploiting misconfigured S3/blob storage). Persistence via T1098 (adding backdoor IAM users) or T1525 (poisoning container images). Credential Access via T1552.005 (querying EC2 metadata API for IAM role tokens). Defense Evasion via T1562.008 (disabling CloudTrail/Activity Logs). For Kubernetes, techniques include T1611 (container escape to host), T1613 (pod/service discovery via kubectl), and T1609 (deploying malicious containers). Detection requires cloud-native telemetry: CloudTrail, VPC Flow Logs, Kubernetes audit logs, container runtime monitoring (Falco, Sysdig). Indian cloud-native companies (Razorpay, Freshworks, Zoho) face these techniques daily. A 2025 CERT-In advisory highlighted T1552.005 as the #2 cloud compromise vector in India. SOC teams must adapt ATT&CK hunting techniques from on-prem (Windows Event Logs, NetFlow) to cloud (CloudTrail queries, Kubernetes API audit logs), but the technique taxonomy remains consistent—T1078 is T1078 whether it's a stolen domain password or leaked AWS key.
What is the relationship between MITRE ATT&CK and threat intelligence feeds? +
Threat intelligence feeds (Recorded Future, Anomali, AlienVault OTX, MISP) increasingly tag indicators of compromise (IOCs) and threat actor profiles with ATT&CK technique IDs. For example, a threat report might state: "APT29 campaign uses T1566.001 (Spearphishing Attachment) to deliver T1204.002 (User Execution: Malicious File), then T1059.001 (PowerShell) for T1071.001 (C2 over HTTPS)." SOC teams import these ATT&CK-tagged IOCs into their SIEM or TIP (Threat Intelligence Platform), which auto-tunes detection rules. If a new APT29 campaign emerges using T1550.001 (Use Alternate Authentication Material: Pass-the-Hash) and your SOC has no detection for T1550.001, the TIP flags this as a gap and recommends building a rule. Conversely, if your SIEM detects T1003.001 (LSASS dumping) and your TIP shows FIN7 actively using T1003.001 in campaigns this month, the alert is prioritized higher. ATT&CK is the common language that links threat intelligence ("what adversaries are doing in the wild") to detection engineering ("what we can detect in our environment"). MITRE's own CTI (Cyber Threat Intelligence) repository on GitHub publishes ATT&CK-mapped threat actor profiles, which many commercial feeds repackage.
How do I prepare for MITRE ATT&CK questions in a CCIE Security or SOC analyst interview? +
Interviewers test three levels: (1) Conceptual—"What is ATT&CK? How does it differ from Cyber Kill Chain?" Study the 14 tactics, understand tactic vs technique vs procedure hierarchy. (2) Operational—"Given this SIEM alert, which ATT&CK technique does it detect?" Practice mapping real-world scenarios (e.g., "PowerShell downloads a file via HTTPS and executes it" → T1059.001 + T1105 + T1071.001). (3) Strategic—"How would you measure ATT&CK coverage for a financial services SOC?" Answer: "Map detection rules to techniques, filter for FIN7/Carbanak/Lazarus techniques (threat groups targeting finance), calculate coverage percentage, identify gaps, prioritize based on exploitability and business impact." Hands-on prep: Use ATT&CK Navigator to build a coverage heatmap for a hypothetical SOC. Write 3–5 Sigma rules tagged with ATT&CK IDs. Study real threat reports (CrowdStrike, Mandiant) and extract ATT&CK technique chains. At Networkers Home, our CCIE Security instructors (including Dual CCIE #22239 Vikas Swami) conduct mock interviews with ATT&CK scenario-based questions, drilling students on technique ID recall, detection logic, and gap analysis—skills that differentiate candidates in technical screens at Cisco India, Palo Alto Networks, and Fortinet.

Related concepts