MITRE ATT&CK Framework: A Practitioner's Guide to Using It for Detection and Hunting
MITRE ATT&CK is the most widely referenced framework in enterprise security, and also one of the most widely misused. Teams cite ATT&CK technique IDs in threat reports, require vendors to show ATT&CK heatmaps in procurement, and list ATT&CK alignment as a compliance checkbox — without ever systematically mapping their own detection coverage against it or using it to drive hunting hypotheses.
This guide covers how to actually use ATT&CK operationally: how to map your existing detections to the framework, identify the coverage gaps that matter most for your threat profile, build threat actor profiles relevant to your industry, and run structured threat hunts using ATT&CK as the hypothesis source.
Briefings like this, every morning before 9am.
Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.
Mapping Your Current Detection Coverage
The first operational use of ATT&CK is understanding what you already detect and what you do not. This requires mapping every detection rule, alert, and analytic in your SIEM and EDR against specific ATT&CK techniques.
Start with ATT&CK Navigator (attack.mitre.org/resources/attack-navigator/), the free browser-based tool for visualizing coverage. Create a layer representing your current detection coverage: color each technique green if you have at least one high-confidence detection for it, yellow if you have a low-confidence or easily bypassed detection, and leave uncovered techniques blank.
Be honest about detection quality. A rule that triggers on every PowerShell execution is not a detection for T1059.001 (PowerShell) — it is an alert factory that trains analysts to ignore PowerShell alerts. A detection counts as coverage only if it fires specifically on malicious patterns with an acceptable false positive rate in your environment.
The resulting heatmap will almost certainly reveal large gaps in specific tactic areas. Most organizations that do this exercise for the first time find strong coverage for Initial Access (phishing, exploit, etc.) and poor coverage for later-stage tactics: Defense Evasion, Credential Access, Lateral Movement, and Collection. These late-stage gaps are where attackers spend the most time before exfiltration and where early detection would have the most impact on breach cost.
Prioritizing Coverage Gaps Based on Your Threat Profile
Not all ATT&CK coverage gaps are equally important. A financial services organization faces different threat actors using different techniques than a healthcare provider or a defense contractor. Prioritization requires overlaying your coverage gaps with the techniques most commonly used by threat actors targeting your sector.
ATT&CK Groups (attack.mitre.org/groups/) documents the techniques associated with named threat actor groups. Identify the three to five groups most commonly reported targeting your industry — this information is available from sector-specific ISACs, vendor threat intelligence reports, and CISA alerts. Pull their technique lists into Navigator as a separate layer and overlay it with your coverage map. The intersection of 'techniques used by actors targeting your industry' and 'techniques you do not currently detect' is your highest-priority detection development backlog.
CISA's Known Exploited Vulnerabilities catalog and the techniques associated with major ransomware groups provide a useful baseline for organizations without sophisticated threat intelligence programs. The techniques most commonly used in financially motivated ransomware intrusions (phishing lure, credential dumping via LSASS, lateral movement via RDP and SMB, data staging before exfiltration) form a practical minimum coverage baseline for any organization regardless of industry.
Using ATT&CK for Hypothesis-Driven Threat Hunting
ATT&CK provides a structured vocabulary for generating threat hunting hypotheses. Instead of hunting based on intuition or ad-hoc IOC lists, ATT&CK-aligned hunting starts with a specific technique and asks: do we have evidence of this technique being used in our environment in the past 30, 60, or 90 days?
A well-formed ATT&CK hunting hypothesis follows this structure: 'Adversaries using [Technique ID] may be present in our environment, as evidenced by [specific observable data in our logs or telemetry].' For example: 'Adversaries using T1055 (Process Injection) may be present, as evidenced by non-standard parent-child process relationships where a browser process spawns a command shell.'
Effective ATT&CK-aligned hunting requires rich telemetry. Map your data sources against ATT&CK's data source model (attack.mitre.org/datasources/) before hunting. If you are hunting for T1003 (OS Credential Dumping) but you do not have Sysmon event ID 10 (process access to LSASS) in your SIEM, the hunt will find nothing regardless of whether credential dumping is occurring. Data source coverage assessment is a prerequisite to reliable hunting.
For teams building a hunting program, the ATT&CK Evaluations results (attackevals.mitre-engenuity.org) provide a useful technique prioritization guide: the techniques that appear most frequently in evaluation scenarios represent the techniques that detection vendors consider most important to cover, which correlates with real-world adversary prevalence.
Building ATT&CK-Aligned Threat Actor Profiles
ATT&CK threat actor profiles let you answer the specific question: if [Actor Group] targeted our organization today, using their documented TTPs, which of their actions would we detect and which would we miss?
Start with the ATT&CK Groups page and identify the actor groups most relevant to your sector. For each group, export their technique list and overlay it against your coverage map in Navigator. The result tells you exactly which phases of their kill chain you would see and which you would miss.
Update these profiles quarterly. ATT&CK is continuously updated with newly documented techniques and group attributions. A technique that was not associated with a given group six months ago may have been added based on recent incident reports. Treat your threat actor profiles as living documents that require the same maintenance cadence as your vulnerability management program.
For organizations with access to commercial threat intelligence, the ATT&CK mapping in platforms like Recorded Future, Mandiant Advantage, and ThreatConnect allows you to pull real-time technique-to-group associations rather than relying only on the public ATT&CK database. The public database lags real-world attribution by weeks to months; commercial platforms narrow that gap significantly.
Subscribe to unlock Remediation & Mitigation steps
Free subscribers unlock full IOC lists, remediation steps, and every daily briefing.
The bottom line
ATT&CK is most valuable as an operational tool when used to answer three questions on a continuous cycle: what do we currently detect, what are we missing that matters most for our threat profile, and what evidence of adversary activity exists in our environment right now? Teams that use the framework only for vendor evaluation and compliance reporting are leaving its most valuable capability unused.
Frequently asked questions
What is the difference between ATT&CK techniques and sub-techniques?
Techniques describe the general method an adversary uses (e.g., T1059 Command and Scripting Interpreter). Sub-techniques describe specific implementations of that method (e.g., T1059.001 PowerShell, T1059.003 Windows Command Shell). Detection rules can target techniques broadly or sub-techniques specifically. Sub-technique targeting is generally more precise but requires more specific telemetry. Most mature detection programs implement rules at the sub-technique level for high-priority coverage areas.
How do I get started with ATT&CK Navigator?
ATT&CK Navigator is a free browser-based tool at mitre-attack.github.io/attack-navigator/. You can run it locally by cloning the GitHub repository or use the hosted version at that URL. Create a new layer, select the Enterprise matrix, and begin coloring techniques to represent your coverage state. The tool supports importing and exporting layers as JSON, which allows team members to collaborate on coverage maps and version-control them alongside detection rule repositories.
How many ATT&CK techniques should a mature security program cover?
Coverage of 100% of ATT&CK techniques is not achievable or a useful goal. A realistic target for a mature enterprise security program with good endpoint, identity, and network telemetry is 60 to 70% technique coverage in the Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, and Lateral Movement tactics. Focus coverage depth (high-confidence, low-FP detections) over breadth (rules that technically cover a technique but fire on everything).
What is the difference between ATT&CK and the Cyber Kill Chain?
Lockheed Martin's Cyber Kill Chain describes a linear attack progression from reconnaissance through actions on objectives in seven stages. ATT&CK is a non-linear, comprehensive taxonomy of adversary techniques organized by tactic, with documented associations to specific threat actor groups and malware families. ATT&CK is significantly more granular and operationally useful for detection development and hunting. The Kill Chain is more useful as a communication framework for explaining attack phases to non-technical leadership.
Is ATT&CK useful for cloud environments?
Yes. ATT&CK maintains separate matrices for Cloud (AWS, Azure, GCP, Office 365, Google Workspace), ICS (industrial control systems), and Mobile in addition to Enterprise (Windows, macOS, Linux). The Cloud matrix covers techniques specific to cloud-native attacks: account manipulation, storage object discovery, cloud service exploitation, and serverless function abuse. Organizations with significant cloud infrastructure should maintain coverage maps across both the Enterprise and Cloud matrices.
Sources & references
Free resources
Critical CVE Reference Card 2025–2026
25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.
Ransomware Incident Response Playbook
Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.
Get threat intel before your inbox does.
50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.
Unsubscribe anytime. We never sell your data.

Founder & Cybersecurity Evangelist, Decryption Digest
Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.
