Most of you will have heard of the MITRE ATT&CK framework. For new people who want to understand the basics and get a detailed overview, refer to my article below for a simple and creative explanation.
Once you understand what this framework is about. The next question will be: how do I know more, or how do I find more information about specific parts of this framework? Today, we will explore the framework so that you can navigate and self-study.
MITRE ATT&CK framework focuses on the process of a cyber-attack similar to a cyber kill chain, and it also provides details of the techniques and details of that process. It covers an entire 360-degree view of attack and defence.
It also has details of the data sources that can be used to detect those attacks. It also keeps a record of the attacker groups. MITRE ATT&CK’s website connects all these details for easy reference and navigation within the website. Below is the URL for the MITRE ATT&CK framework.
Usually, organizations follow an enterprise matrix. But you can also choose other matrices based on specific industries.
This website has the entire matrix, and you can also list the tactics.
- TA0043 — Reconnaissance — This is about information gathering.