As defenders, we see value in mapping active defense techniques to ATT&CK. In this section of the site, each tactic in the ATT&CK framework is shown individually. Clicking on a specific tactic in the ATT&CK Mapping menu will show a detail page with the following information:
ATT&CK Tactic | Description |
---|---|
TA0043 - Reconnaissance | The adversary is trying to gather information they can use to plan future operations. |
TA0042 - Resource Development | The adversary is trying to establish resources they can use to support operations. |
TA0001 - Initial Access | The adversary is trying to get into your network. |
TA0002 - Execution | The adversary is trying to run malicious code. |
TA0003 - Persistence | The adversary is trying to maintain their foothold. |
TA0004 - Privilege Escalation | The adversary is trying to gain higher-level permissions. |
TA0005 - Defense Evasion | The adversary is trying to avoid being detected. |
TA0006 - Credential Access | The adversary is trying to steal account names and passwords. |
TA0007 - Discovery | The adversary is trying to figure out your environment. |
TA0008 - Lateral Movement | The adversary is trying to move through your environment. |
TA0009 - Collection | The adversary is trying to gather data of interest to their goal. |
TA0010 - Exfiltration | The adversary is trying to steal data. |
TA0011 - Command and Control | The adversary is trying to communicate with compromised systems to control them. |
TA0040 - Impact | The adversary is trying to manipulate, interrupt, or destroy your systems and data. |