Understanding Attack Frameworks

What is an Attack Framework?

Simply put, an attack framework is a playbook or set of strategies that are used in cyberattacks. These frameworks are used to plan and execute attacks on computer systems and networks.

Attack frameworks help dictate and outline various tactics, techniques, and procedures or TTP. The goal of these frameworks is to understand how attackers operate to decrease the impact of future attacks. In this post, I’ve included some popular attack frameworks and terms that are used commonly when discussing threats and threat actors.

What is a Cyber Kill Chain?

A kill chain is a term that is used by the military, and is a concept that helps distinguish a format of an attack. The cyber kill chain idea was brought along mimic this format since they can hold many different similarities.

A kill chain usually starts with:


The cyber kill chain idea was first developed by Lockheed Martin and has a similar order from start to finish:

What is the Diamond Model of Intrusion Analysis?

The Diamond Model of Intrusion Analysis is a framework that helps focus on understanding the attacker by analyzing four key components of every intrusion event.

These four components include:

Usually starts with the idea that every intrusion event has an adversary that uses a capability across an infrastructure against a victim.

These core components can be mapped to different phases of a cyber kill chain. The same adversary performs reconnaissance, delivers a weapon, exploits a vulnerability, and so on through the cyber kill chain.

The capabilities, infrastructure, and victim may change within the kill chain, but the adversary remains the same. By analyzing these components in multiple attacks, it reveals similarities.

What is the MITRE ATT&CK

The MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) framework is a knowledge base of tactics and techniques used in real-world attacks.

Tactics represent the adversary's tactical objective for performing an action or why the adversary is doing what he's doing.

The techniques document how an adversary achieve a tactical objective or what the adversary gains by performing an action.

MITRE ATT&CK is complementary to Lockheed's cyber kill chain, however, it isn't an ordered set of steps like the kill chain.

Instead, it’s a matrix of tactics and techniques used by attackers at different stages of an attack.

The tactics in the matrix are:

The matrix lists these tactics along the top, in each tactic column, it lists techniques used to achieve the tactic

MITRE is a not-for-profit organization that receives federal funding to perform research and development in cybersecurity.

They also maintain the Common Vulnerabilities and Exposures (CVE) system and the Common Weakness Enumeration (CWE) project.