What it is
A curated knowledge base that catalogs how attackers behave, giving defenders a shared model to plan detection and testing against real techniques.
Key points
- Tactics describe an adversary goal, and techniques describe how the goal is achieved, often with sub techniques and procedures.
- Used for threat modeling, detection engineering, threat hunting, and red team and purple team planning.
- Helps teams map defensive coverage and gaps across the attack lifecycle.
- Supports structured use of data sources and telemetry for detection and investigation.
Concrete example
A SOC maps common attacker techniques such as credential dumping and lateral movement to required telemetry. It discovers gaps in endpoint logging and identity auditing, then improves data collection and detection, validating through purple team exercises.