Skip to content
OT Cybersecurity | | | 15 min read

MITRE ATT&CK - how to use the framework to protect your organization

A practical guide to MITRE ATT&CK - tactics, techniques, the ICS model, APT groups. How to implement the framework in your organization with a coverage matrix and prioritization.

S
Sylwia Sławińska
B
Bartłomiej Bojarczuk
MITRE ATT&CKATT&CK for ICSAPT groupsthreat intelligencered team
MITRE ATT&CK - how to use the framework to protect your organization
)}

In December 2025, a coordinated attack on Polish renewable energy infrastructure - over 30 wind farms, a combined heat and power plant, and a manufacturing company - damaged RTU controller firmware and severed operator communications (CERT Polska report, January 2026). Analyzing the incident using MITRE ATT&CK for ICS made it possible to identify 8 techniques used by the attackers - from Exploit Public-Facing Application (T0819) to Damage to Property (T0879). Without a structured framework, this kind of analysis would have been chaotic and incomplete.

MITRE ATT&CK for ICS enables incident analysis with a precision unavailable from generic threat models. Analyzing any campaign targeting operational technology (OT) infrastructure can reveal dozens of specific techniques - from the method of gaining initial access to the mechanism of destruction. Below we explain how the framework works, what models it covers, and then propose ways to use ATT&CK for security management in your organization. At SEQRED, we help clients move from framework awareness to practical decisions based on ATT&CK data.

What is MITRE ATT&CK and why it matters

From theory to practice - the origins of the framework

To effectively protect an organization, you need to understand how attackers operate. This premise underpins MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) - an open knowledge base of adversary tactics and techniques based exclusively on observations from real-world attacks.

MITRE ATT&CK was created in 2013 as an internal project at the MITRE Corporation, which supports US government agencies. The first public version was released in 2015. Since then, the framework has evolved from a small technique matrix into a comprehensive ecosystem covering three domains, hundreds of techniques, and tools for analyzing them.

Unlike earlier models - Cyber Kill Chain (Lockheed Martin, 2011) or the Diamond Model - MITRE ATT&CK does not merely describe general attack phases. Instead, it catalogs specific techniques: how attackers steal credentials, how they move through networks, what software they use. This is the leap from “what happens” to “how exactly they do it.”

Framework structure - tactics, techniques, procedures

The framework is built on three levels of detail, each answering a different question:

LevelWhat it describesQuestionExample
TacticThe attacker’s objective in a given phase”What do they want to achieve?”Initial Access - gaining first access
TechniqueThe method of executing a tactic”How do they do it?”Spearphishing Attachment (T1566.001)
ProcedureA specific implementation of a technique”With what tool?”APT28 sends a Word document with a VBA macro

Each technique in the MITRE database includes: a description of the mechanism, associated APT groups, known malicious software, recommended detection methods, and mitigations. Since version v18 (October 2025), techniques also include structured Detection Strategies with specific analytical queries.

Three ATT&CK domains

MITRE maintains three separate matrices, each covering a different attack domain. Current data comes from version v18 (October 2025):

ModelTacticsTechniquesSub-techniquesGroupsSoftwareApplication
Enterprise14203453150+600+Corporate networks (Windows, Linux, macOS, cloud, SaaS)
Mobile1489-15+100+Mobile devices (Android, iOS)
ICS1283-1522Industrial control systems (SCADA, PLC, DCS)

14 Enterprise tactics - anatomy of an attack

The Enterprise model describes the full attack cycle across 14 tactics. The order follows a typical sequence of actions, but attackers do not have to use all tactics or maintain the order.

No.TacticDescriptionExample techniques
1ReconnaissanceGathering information about the targetOSINT, infrastructure scanning
2Resource DevelopmentPreparing attack tools and infrastructureDomain registration, malware compilation
3Initial AccessGaining first access to the networkSpearphishing, exploit of a public-facing service
4ExecutionRunning malicious codePowerShell, scripts, system APIs
5PersistenceMaintaining access after rebootScheduled tasks, registry modification
6Privilege EscalationGaining higher privilegesKernel exploits, token manipulation
7Defense EvasionAvoiding detectionObfuscation, timestomping, rootkits
8Credential AccessStealing authentication dataMimikatz, brute force, keylogging
9DiscoveryReconnaissance of the victim environmentNetwork, service, and user enumeration
10Lateral MovementMoving through the networkRDP, SMB, pass-the-hash
11CollectionGathering data for exfiltrationScreenshots, email capture
12Command and ControlRemote communication with infected systemsDNS tunnels, HTTPS C2, Cobalt Strike
13ExfiltrationExtracting data from the organizationEncrypted channels, exfiltration via C2
14ImpactDestruction or disruption of operationsRansomware, wiper, data manipulation

ATT&CK for ICS - why industrial control systems need a separate model

OT networks differ fundamentally from IT: the priority is availability and physical safety, not data confidentiality. Attackers in an ICS environment have different objectives - manipulating the physical process, damaging equipment, disrupting production. That is why the ICS model includes tactics absent from Enterprise, such as Impair Process Control or Inhibit Response Function.

The ICS model (version v17/v18) covers 12 tactics, 83 techniques, 15 identified threat groups, and 22 types of malicious software. The most active groups and malware in the ICS domain are:

ICS threat groups - top 5 by number of techniques:

GroupAttributionICS techniquesKey campaigns
Sandworm TeamGRU (Russia)29Industroyer (Ukraine 2016), Industroyer2 (Ukraine 2022), CaddyWiper
DragonflyFSB (Russia)7Campaigns against US and European energy sector, Backdoor.Oldrea
TEMP.VelesCNIIHM (Russia)6TRITON/TRISIS - attack on SIS systems at a petrochemical plant
OilRigIran5Campaigns against Middle East energy sector
HEXANEIran5Telecommunications and energy sector in the Middle East

Source: MITRE ATT&CK for ICS v17 (April 2025), data from attack.mitre.org.

ICS malware - top 5 by number of techniques:

Each of the programs below is a specialized tool designed to interact with industrial control systems. Unlike typical IT malware, they operate at the OT protocol level and can directly affect physical processes.

MalwareICS techniquesYearAttack targetImpact
Industroyer312016Ukrainian power grid (IEC 61850, IEC 60870-5-104, OPC DA)Blackout in Kyiv - 225,000 consumers without power
Stuxnet292010Iranian nuclear program (S7-300 PLC, WinCC)Destruction of ~1,000 uranium centrifuges
TRITON262017Triconex SIS systems at a petrochemical plant (Saudi Arabia)Attempted shutdown of safety systems - could have led to a catastrophe
INCONTROLLER172022Schneider and OMRON controllers (Modbus, OPC UA, CODESYS)Discovered before deployment - capable of disabling SIS
Backdoor.Oldrea122014Reconnaissance in energy companies (OPC, process lists, network configuration)OT infrastructure data collection - preparation for further operations

Source: MITRE ATT&CK for ICS v17, Mandiant Threat Research, CISA advisories.

ATT&CK Navigator - visualization tool

ATT&CK Navigator is a free web-based tool enabling interactive work with the matrix. It allows you to:

  • Color techniques used by specific APT groups
  • Overlay layers (e.g., detection coverage vs. threat techniques)
  • Export visualizations for reports and presentations
  • Compare profiles of different groups

In practice, this lets you see within minutes which techniques of a specific APT group are not covered by your organization’s defenses. The tool is available at attack.mitre.org/matrices/ and as a standalone application on GitHub (mitre-attack/attack-navigator).


How to use ATT&CK in security management

5 steps from framework to decision

Knowing the framework alone is not enough. The value of ATT&CK emerges when it becomes a decision-making tool - helping to prioritize security investments, assess detection coverage, and plan attack simulations. Here is how to approach this systematically.

Step 1: Identify threats relevant to your industry

Instead of analyzing all 200+ Enterprise techniques, start with APT groups active in your industry and region. For the energy sector in Europe, the key groups will be Sandworm Team and Dragonfly; for manufacturing - groups using ransomware with an OT component; for finance - APT38 and FIN7.

Key questions:

  • Which APT groups target our industry and region?
  • What techniques do they use most frequently?
  • What malicious software is associated with them?
  • What entry vectors do they prefer?

Step 2: Map existing defenses

Assess which techniques from the threat profile are covered by the organization’s existing defenses (firewalls, EDR, SIEM, network segmentation, access control). Result: a coverage map showing what the organization is protected against and where the gaps are.

Step 3: Analyze gaps and set priorities

Based on comparing threats with defenses, identify critical gaps. Prioritize them according to three criteria: frequency of technique use by threat groups, potential impact on the organization, and cost of mitigation.

Step 4: Build a detection and response plan

For priority techniques, develop detection rules (SIEM, EDR, NDR), response scenarios, and incident playbooks. Since ATT&CK v18, the framework provides ready-made Detection Strategies with specific analytical queries - these are worth using as a starting point.

Step 5: Validate through simulations

The best way to verify is testing under conditions close to real-world scenarios. Penetration testing and Red Team operations simulate real threats mapped to ATT&CK, testing the effectiveness of defenses under controlled conditions. The result of such a test is not just a vulnerability report, but a mapping onto the ATT&CK matrix - you can see exactly which techniques were detected and which went unnoticed.

Example: detection coverage matrix

One of the most practical applications of ATT&CK is the detection coverage matrix - a document mapping techniques to existing and planned detection mechanisms. Below is an example excerpt for the energy sector:

ATT&CK techniqueIDExisting detectionPlanned detectionPriority
Spearphishing AttachmentT1566.001Email sandbox, anti-spamBehavioral analysis of attachmentsMedium
Valid AccountsT1078AD logs, SIEMMFA enforcement, UEBAHigh
Lateral Movement via RDPT1021.001Windows Event logsNDR, RDP segmentationHigh
Command and Scripting InterpreterT1059EDR on workstationsAMSI logging, script block loggingMedium
Data Encrypted for ImpactT1486Canary filesEDR behavioral, immutable backupsCritical
Exploit Public-Facing ApplicationT0819 (ICS)Firewall IDSOT patch management, anomaly monitoringCritical
Manipulation of ControlT0831 (ICS)NoneDPI of OT protocols, process monitoringCritical
Remote ServicesT0886 (ICS)VPN logs2FA, session recording, JIT accessHigh

APT group comparison for the energy sector

ATT&CK Navigator allows you to visually compare the profiles of two groups and identify shared and unique techniques. Below is a comparison of the two most active groups in the energy sector - Sandworm Team and Dragonfly.

AspectSandworm Team (GRU)Dragonfly (FSB)
Active since20092011
Target regionUkraine, Europe, USAUSA, Europe (including Poland)
Strategic objectiveDestruction - blackouts, wipersReconnaissance - preparation for future operations
Initial AccessSpearphishing, supply chain, exploitsWatering hole, supply chain (trojanized updaters)
ICS malwareIndustroyer, Industroyer2, CaddyWiperBackdoor.Oldrea (Havex)
OT protocolsIEC 61850, IEC 60870-5-104, OPC DAOPC DA (OPC server scanning)
ImpactDirect process manipulation (blackout)OT topology data collection
ICS techniques297

Example: technique prioritization matrix

Not all techniques require equal attention. The matrix below helps establish priorities based on three criteria. Scale: 1 (low) - 5 (critical).

TechniqueFrequencyImpactEase of mitigationFinal priority
Spearphishing (T1566)533High
Valid Accounts (T1078)552Critical
Exploit Public-Facing App (T1190)453Critical
Supply Chain Compromise (T1195)351High
Data Encrypted for Impact (T1486)453Critical
Manipulation of Control (T0831)252High
Remote Services (T0886)444High
Scripting/PowerShell (T1059)534Medium

Frequency: how often the technique appears in threat intelligence reports for the given sector. Impact: potential consequences (5 = impact on physical safety/business continuity). Ease of mitigation: 1 = difficult/costly, 5 = easy to implement.

Framework limitations

MITRE ATT&CK has real limitations worth keeping in mind:

  • Technique overlap - complex malware can implement multiple techniques simultaneously (e.g., a PowerShell script executed via CMD, containing exfiltration code). Classification is not always clear-cut
  • Lag time - new techniques appear in the database after they have been documented by researchers, which means a delay relative to the latest threats
  • Does not replace risk analysis - the framework catalogs “how,” but does not answer “does this apply to my organization.” It requires industry context and risk assessment
  • The ICS model is younger - 83 ICS techniques compared to 200+ Enterprise means that certain scenarios may not yet be cataloged

NIST SP 800-53 control mapping

Once you know which techniques are priorities, the natural question is: which NIST SP 800-53 controls address them? Below are key mappings for the most common techniques - useful when preparing compliance documentation (NIS2, DORA, IEC 62443):

ATT&CK techniqueNIST SP 800-53 controlsControl description
Spearphishing (T1566)SI-3, SI-4, SI-8Malware protection, system monitoring, spam protection
Valid Accounts (T1078)IA-2, IA-5, AC-2Multi-factor authentication, credential management, account management
Lateral Movement (T1021)AC-3, AC-4, SC-7Access enforcement, information flow control, boundary protection
Data Encrypted for Impact (T1486)CP-9, CP-10, SI-4Backups, system recovery, monitoring
Exploit Public-Facing App (T1190)SI-2, RA-5, CM-7Patching, vulnerability scanning, function minimization
Remote Services OT (T0886)AC-17, IA-2, AU-2Remote access, authentication, event auditing
Manipulation of Control (T0831)SI-4, SC-7, PE-3Monitoring, boundary protection, physical access control

Source: NIST SP 800-53 Rev. 5, MITRE ATT&CK Mitigations mapping.

ATT&CK implementation readiness checklist

The checklist below helps assess what stage the organization is at and what needs to be addressed before full framework implementation.

StageElementDescription
1. Threat identificationIndustry profileIdentified APT groups active in the industry and region
Priority techniquesList of 15-20 most relevant techniques for the organization
Threat intelligence sourcesCTI feed subscriptions (MITRE, CISA, sector ISACs)
2. Coverage assessmentTool inventoryList of security tools mapped to ATT&CK techniques
Coverage matrixVisualization in ATT&CK Navigator - covered vs. uncovered techniques
Gap analysisReport with critical gaps and recommendations
3. Detection buildingSIEM/EDR rulesDetection rules for priority techniques
Incident playbooksResponse procedures mapped to ATT&CK tactics
Detection strategies (v18)Leveraging Detection Strategies from the ATT&CK database
4. ValidationPenetration testingSimulation of selected techniques under controlled conditions
Red Team / Purple TeamComprehensive APT campaign simulation
Detection metricsTime to detect (TTD), technique coverage percentage, false positive rate
5. Continuous improvementDatabase updatesTracking new ATT&CK versions (releases approximately every 6 months)
Incident retrospectivesMapping every incident to ATT&CK techniques
ReportingPeriodic coverage reports for management and technical teams

Sources

Omówimy zakres, metodykę i harmonogram.