Executive Summary
The MITRE ATT&CK framework is one of the most widely adopted cyber threat intelligence models for mapping adversary tactics, techniques, and procedures (TTPs). ATT&CK mapping is the process of aligning observed security events, incident reports, and detection rules with ATT&CK techniques to standardize analysis, improve coverage, and enhance detection engineering.
This article provides a complete technical breakdown of ATT&CK mapping—covering its structure, mapping workflow, automation strategies, and practical use cases in SOCs, threat hunting, and detection-as-code pipelines.
1. Understanding MITRE ATT&CK
MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a knowledge base of adversary behavior observed in the wild, organized into:
- Tactics — The why (adversary’s objective)
- Techniques — The how (methods used to achieve objectives)
- Sub-techniques — Specific variations of a technique
- Procedures — Real-world, step-by-step implementations
Example:
- Tactic: Execution (TA0002)
- Technique: PowerShell (T1059.001)
- Procedure: Use
powershell.exe -enc ...to execute obfuscated payloads
2. Why ATT&CK Mapping Matters
Benefits for Cyber Defense
- Detection coverage measurement — Identify which TTPs you can detect and which you can’t.
- Threat-informed defense — Align defenses with adversary behaviors that matter most to your environment.
- Incident investigation — Standardized language for SOC, threat intel, and IR teams.
- Detection-as-Code integration — Enables automated testing and ATT&CK coverage reporting in CI/CD pipelines.
3. MITRE ATT&CK Matrix Structure
The ATT&CK Enterprise matrix is organized by tactics (columns) and techniques (rows):
| Tactic | Example Technique | ID | Example Sub-Technique |
|---|---|---|---|
| Reconnaissance | Search Open Websites/Domains | T1593 | Search Victim-Owned Websites (T1593.002) |
| Execution | Command and Scripting Interpreter | T1059 | PowerShell (T1059.001) |
| Persistence | Create or Modify System Process | T1543 | Launch Agent (T1543.001) |
| Credential Access | Brute Force | T1110 | Password Guessing (T1110.001) |
4. ATT&CK Mapping Workflow
Step 1 — Identify Data Sources
Determine where evidence of the TTP would appear:
- Endpoint telemetry — EDR logs, Sysmon, Windows Event Logs
- Network telemetry — NetFlow, Zeek, firewall logs
- Cloud/SaaS telemetry — CloudTrail, Azure Activity Logs, Okta logs
Step 2 — Parse and Normalize Data
- Ensure logs are in a consistent schema (e.g., Elastic Common Schema (ECS) or OSSEM).
- Extract key fields (process name, command line, network IP, user account, etc.).
Step 3 — Map to ATT&CK Technique IDs
For each detection or observation:
- Identify behavior (e.g., suspicious PowerShell execution)
- Match to ATT&CK technique (e.g., Command and Scripting Interpreter — PowerShell: T1059.001)
- Add metadata: Tactic, Data Sources, MITRE Version
Example mapping in YAML:
yamlCopyEditid: dac_rule_powershell_encoded
title: Suspicious PowerShell Encoded Command
tactic: execution
technique_id: T1059.001
data_sources:
- process_creation
- command_line
- script_execution
Step 4 — Store and Maintain Mappings
- Keep mappings version-controlled alongside detection rules.
- Update when MITRE releases new versions (2-3 times a year).
- Tag incident reports and threat hunts with corresponding technique IDs.
5. Example: ATT&CK Mapping in Detection-as-Code
Sigma Rule Example (with ATT&CK mapping)
yamlCopyEdittitle: Suspicious Certutil Download
logsource:
category: process_creation
detection:
selection:
Image|endswith: '\certutil.exe'
CommandLine|contains: 'http'
condition: selection
level: high
tags:
- attack.t1105 # Ingress Tool Transfer
- attack.t1140 # Deobfuscate/Decode Files
Here, one rule is mapped to multiple techniques because certutil can both transfer and decode payloads.
6. Automation for ATT&CK Mapping
Automation Goals:
- Reduce manual mapping errors
- Ensure consistent tagging across detections and incidents
- Enable automated ATT&CK coverage dashboards
Automation Approaches
- Static mapping libraries — Predefined mapping between log field patterns and technique IDs.
- ML-based classification — Use NLP to parse detection descriptions and suggest technique IDs.
- Integration with ATT&CK API — Pull the latest techniques and validate mapping accuracy.
Python example using MITRE ATT&CK STIX/TAXII API:
pythonCopyEditfrom taxii2client.v20 import Server
server = Server("https://cti-taxii.mitre.org/taxii/")
api_root = server.api_roots[0]
collection = api_root.collections[0]
techniques = [obj for obj in collection.get_objects()["objects"] if obj["type"] == "attack-pattern"]
for t in techniques:
print(t["name"], t["external_references"][0]["external_id"])
7. Measuring ATT&CK Coverage
Coverage Metrics:
- Technique coverage — % of ATT&CK techniques with at least one detection.
- Tactic coverage — % of tactics covered in total.
- Priority coverage — Coverage for high-risk techniques (e.g., KEV/EPSS correlated).
Visualization Tools:
- ATT&CK Navigator — MITRE’s official mapping tool.
- Open Source: ATT&CK Excel Mapper, Heatmap generators.
- SIEM dashboards with MITRE columns.
8. Best Practices for SOC Teams
- Map detections, incidents, and hunts to ATT&CK consistently.
- Focus on threat-informed priority techniques relevant to your industry.
- Maintain a central mapping library in your detection repository.
- Automate coverage reporting in SOC metrics dashboards.
- Validate coverage through adversary emulation (Atomic Red Team, Caldera).
Conclusion
MITRE ATT&CK mapping is more than just tagging—it’s a strategic enabler for threat-informed defense, detection engineering, and SOC performance measurement.
By integrating mapping into detection-as-code workflows, SOCs can continuously track coverage, reduce gaps, and prioritize defenses against the techniques adversaries are most likely to use.
Leave a comment