CINXE.COM
MITRE ATT&CK® - Medium
<!DOCTYPE html><html xmlns:cc="http://creativecommons.org/ns#"><head prefix="og: http://ogp.me/ns# fb: http://ogp.me/ns/fb# medium-com: http://ogp.me/ns/fb/medium-com#"><meta http-equiv="Content-Type" content="text/html; charset=utf-8"><meta name="viewport" content="width=device-width, initial-scale=1.0, viewport-fit=contain"><title>MITRE ATT&CK® - Medium</title><link rel="canonical" href="https://medium.com/mitre-attack"><link id="feedLink" rel="alternate" type="application/rss+xml" title="RSS" href="https://medium.com/feed/mitre-attack"><meta name="robots" content="index,follow"><meta name="title" content="MITRE ATT&CK® - Medium"><meta name="referrer" content="unsafe-url"><meta name="description" content="This is the official blog for MITRE ATT&CK®, the MITRE-developed, globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The full website is located at https://attack.mitre.org."><meta name="keywords" content="CYBERSECURITY, THREAT INTELLIGENCE, THREAT HUNTING, RED TEAM, INCIDENT RESPONSE"><meta name="theme-color" content="#000000"><meta property="og:title" content="MITRE ATT&CK® – Medium"><meta property="twitter:title" content="MITRE ATT&CK® – Medium"><meta property="og:url" content="https://medium.com/mitre-attack"><meta property="og:image" content="https://cdn-images-1.medium.com/max/1200/1*Y6LKGEIzmF96lVHkv_RS9A.png"><meta property="fb:app_id" content="542599432471018"><meta property="og:description" content="This is the official blog for MITRE ATT&CK®, the MITRE-developed, globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The full website is located at https://attack.mitre.org."><meta name="twitter:description" content="This is the official blog for MITRE ATT&CK®, the MITRE-developed, globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The full website is located at https://attack.mitre.org."><meta name="twitter:image:src" content="https://cdn-images-1.medium.com/max/1200/1*Y6LKGEIzmF96lVHkv_RS9A.png"><meta property="og:type" content="medium-com:collection"><meta name="twitter:card" content="summary_large_image"><meta property="medium-com:creator" content="https://medium.com/@adamp_mitre"><meta name="twitter:site" content="@Medium"><meta property="og:site_name" content="Medium"><meta name="twitter:app:name:iphone" content="Medium"><meta name="twitter:app:id:iphone" content="828256236"><meta name="twitter:app:url:iphone" content="medium://mitre-attack"><meta property="al:ios:app_name" content="Medium"><meta property="al:ios:app_store_id" content="828256236"><meta property="al:android:package" content="com.medium.reader"><meta property="al:android:app_name" content="Medium"><meta property="al:ios:url" content="medium://mitre-attack"><meta property="al:android:url" content="medium://mitre-attack"><meta property="al:web:url" content="https://medium.com/mitre-attack"><link rel="search" type="application/opensearchdescription+xml" title="Medium" href="/osd.xml" /><link rel="alternate" href="android-app://com.medium.reader/https/medium.com/mitre-attack" /><script type="application/ld+json">{"@context": "http://schema.org", "@graph": [{"@type": "WebSite", "url": "https:\/\/medium.com", "name": "Medium", "alternateName": "Medium is a community of readers and writers offering unique perspectives on ideas large and small."},{"@type": "Organization", "url": "https:\/\/medium.com\/mitre-attack", "name": "MITRE ATT\x26CK®"}]}</script><link rel="stylesheet" href="https://cdn-static-1.medium.com/_/fp/css/main-branding-base.W9J-2zkF03j8TkriAGn1Tg.12.css"><script>!function(n,e){var t,o,i,c=[],f={passive:!0,capture:!0},r=new Date,a="pointerup",u="pointercancel";function p(n,c){t||(t=c,o=n,i=new Date,w(e),s())}function s(){o>=0&&o<i-r&&(c.forEach(function(n){n(o,t)}),c=[])}function l(t){if(t.cancelable){var o=(t.timeStamp>1e12?new Date:performance.now())-t.timeStamp;"pointerdown"==t.type?function(t,o){function i(){p(t,o),r()}function c(){r()}function r(){e(a,i,f),e(u,c,f)}n(a,i,f),n(u,c,f)}(o,t):p(o,t)}}function w(n){["click","mousedown","keydown","touchstart","pointerdown"].forEach(function(e){n(e,l,f)})}w(n),self.perfMetrics=self.perfMetrics||{},self.perfMetrics.onFirstInputDelay=function(n){c.push(n),s()}}(addEventListener,removeEventListener);</script><script>document.domain = document.domain;</script><script>if (window.top !== window.self) window.location = 'about:blank';var OB_startTime = new Date().getTime(); var OB_loadErrors = []; function _onerror(e) { OB_loadErrors.push(e) }; if (document.addEventListener) document.addEventListener("error", _onerror, true); else if (document.attachEvent) document.attachEvent("onerror", _onerror); function _asyncScript(u) {var d = document, f = d.getElementsByTagName("script")[0], s = d.createElement("script"); s.type = "text/javascript"; s.async = true; s.src = u; f.parentNode.insertBefore(s, f);}function _asyncStyles(u) {var d = document, f = d.getElementsByTagName("script")[0], s = d.createElement("link"); s.rel = "stylesheet"; s.href = u; f.parentNode.insertBefore(s, f); return s}(new Image()).src = "/_/stat?event=pixel.load&origin=" + encodeURIComponent(location.origin);</script><script>window.ga=window.ga||function(){(ga.q=ga.q||[]).push(arguments)};ga.l=+new Date; ga("create", "G-7JY7T788PK", "auto", {"allowLinker": true, "legacyCookieDomain": window.location.hostname});ga("send", "pageview");</script><script async src="https://www.google-analytics.com/analytics.js"></script><script>(function () {var height = window.innerHeight || document.documentElement.clientHeight || document.body.clientHeight; var width = window.innerWidth || document.documentElement.clientWidth || document.body.clientWidth; document.write("<style>section.section-image--fullBleed.is-backgrounded {padding-top: " + Math.round(1.1 * height) + "px;}section.section-image--fullScreen.is-backgrounded, section.section-image--coverFade.is-backgrounded {min-height: " + height + "px; padding-top: " + Math.round(0.5 * height) + "px;}.u-height100vh {height: " + height + "px !important;}.u-height110vh {height: " + Math.round(1.1 * height) + "px !important;}.u-minHeight100vh {min-height: " + height + "px !important;}.u-maxHeight100vh {max-height: " + height + "px !important;}section.section-image--coverFade {height: " + height + "px;}.section-aspectRatioViewportPlaceholder, .section-aspectRatioViewportCropPlaceholder {max-height: " + height + "px;}.section-aspectRatioViewportBottomSpacer, .section-aspectRatioViewportBottomPlaceholder {max-height: " + Math.round(0.5 * height) + "px;}.zoomable:before {top: " + (-1 * height) + "px; left: " + (-1 * width) + "px; padding: " + height + "px " + width + "px;}</style>");})()</script><!--[if lt IE 9]><script charset="UTF-8" src="https://cdn-static-1.medium.com/_/fp/js/shiv.RI2ePTZ5gFmMgLzG5bEVAA.12.js"></script><![endif]--><link rel="icon" href="https://miro.medium.com/v2/5d8de952517e8160e40ef9841c781cdc14a5db313057fa3c3de41c6f5b494b19" class="js-favicon"><link rel="apple-touch-icon" sizes="152x152" href="https://cdn-images-1.medium.com/fit/c/304/304/1*Y6LKGEIzmF96lVHkv_RS9A.png"><link rel="apple-touch-icon" sizes="120x120" href="https://cdn-images-1.medium.com/fit/c/240/240/1*Y6LKGEIzmF96lVHkv_RS9A.png"><link rel="apple-touch-icon" sizes="76x76" href="https://cdn-images-1.medium.com/fit/c/152/152/1*Y6LKGEIzmF96lVHkv_RS9A.png"><link rel="apple-touch-icon" sizes="60x60" href="https://cdn-images-1.medium.com/fit/c/120/120/1*Y6LKGEIzmF96lVHkv_RS9A.png"><link rel="mask-icon" href="https://cdn-static-1.medium.com/_/fp/icons/monogram-mask.KPLCSFEZviQN0jQ7veN2RQ.12.svg" color="#171717"></head><body itemscope class=" browser-ie os-windows v-unbound v-glyph v-glyph--m2-unbound-source-serif-pro is-noJs"><script>document.body.className = document.body.className.replace(/(^|\s)is-noJs(\s|$)/, "$1is-js$2")</script><div class="site-main" id="container"><div class="butterBar butterBar--error"></div><div class="surface"><div id="prerendered" class="screenContent"><div class="metabar u-clearfix js-metabar"><div class="branch-journeys-top"></div><div class="js-metabarMiddle metabar-inner u-marginAuto u-maxWidth1032 u-flexCenter u-justifyContentSpaceBetween u-height65 u-xs-height56 u-paddingHorizontal20"><div class="metabar-block u-flex1 u-flexCenter"><div class="js-metabarLogoLeft"><a href="https://medium.com/" data-log-event="home" class="siteNav-logo u-fillBlack u-flex0 u-flexCenter u-paddingTop0"><span class="svgIcon svgIcon--wordmarkMedium svgIcon--120x26px u-flex"><svg class="svgIcon-use" width="120" height="26" ><path d="M29.57 1.404l.036-.008V1.12h-7.27l-6.75 15.979-6.75-15.98H1.003v.278l.035.008c1.327.302 2 .752 2 2.374v18.993c0 1.623-.676 2.073-2.003 2.374L1 25.153v.279h5.315v-.278l-.035-.008c-1.327-.302-2-.751-2-2.374V4.88l8.67 20.552h.492l8.924-21.125V23.24c-.114 1.282-.782 1.677-1.983 1.95l-.036.009v.275h9.259V25.2l-.036-.008c-1.203-.274-1.886-.67-2-1.95l-.006-19.464h.006c0-1.622.674-2.072 2-2.374zm4.23 12.582c.15-3.412 1.367-5.875 3.41-5.918.629.01 1.157.219 1.568.62.872.852 1.282 2.634 1.219 5.298h-6.198zm-.092.962h10.85v-.046c-.03-2.61-.78-4.64-2.228-6.033-1.25-1.204-3.103-1.867-5.048-1.867h-.043c-1.01 0-2.248.246-3.13.693a7.316 7.316 0 00-2.623 2.086c-1.185 1.479-1.903 3.477-2.078 5.724a13.717 13.717 0 00-.04.755c-.004.195-.005.39-.001.587.117 5.087 2.846 9.153 7.692 9.153 4.254 0 6.73-3.132 7.348-7.336l-.312-.11c-1.085 2.259-3.034 3.628-5.252 3.461-3.028-.228-5.347-3.32-5.137-7.066m23.122 6.893c-.356.85-1.099 1.319-2.094 1.319-.995 0-1.905-.689-2.552-1.939-.694-1.342-1.06-3.24-1.06-5.487 0-4.678 1.445-7.704 3.68-7.704.937 0 1.674.468 2.026 1.284v12.527zm7.198 3.335c-1.327-.316-2-.787-2-2.492V0l-8.062 2.392v.293l.05-.004c1.111-.09 1.866.064 2.304.472.343.32.51.809.51 1.498v3.11C56.033 7.25 55.088 7 53.94 7c-2.326 0-4.453.987-5.986 2.779-1.599 1.867-2.444 4.42-2.444 7.38 0 5.287 2.584 8.84 6.43 8.84 2.25 0 4.06-1.242 4.888-3.336v2.811h7.233v-.29l-.035-.008zM70.94 3.085c0-1.65-1.236-2.896-2.875-2.896-1.632 0-2.908 1.272-2.908 2.896 0 1.624 1.278 2.896 2.908 2.896 1.64 0 2.875-1.245 2.875-2.896zm1.903 22.092c-1.327-.316-2-.787-2-2.492h-.006V7.055l-7.234 2.092v.284l.043.004c1.566.14 1.994.683 1.994 2.525v13.515h7.24v-.29l-.037-.008zm18.536 0c-1.327-.316-2-.787-2-2.492V7.055L82.49 9.078v.285l.04.004c1.28.136 1.65.71 1.65 2.56v9.88c-.426.85-1.227 1.356-2.196 1.39-1.573 0-2.439-1.07-2.439-3.012V7.055l-7.234 2.092v.284l.044.004c1.565.14 1.994.683 1.994 2.525v8.362a9.443 9.443 0 00.15 1.741l.13.57C75.243 24.845 76.848 26 79.362 26c2.129 0 3.996-1.328 4.818-3.405v2.885h7.233v-.291l-.034-.012zm28.102.298v-.291l-.035-.009c-1.44-.334-2.001-.964-2.001-2.248V12.295C117.445 8.98 115.597 7 112.5 7c-2.257 0-4.16 1.314-4.893 3.36-.582-2.168-2.257-3.36-4.734-3.36-2.175 0-3.88 1.156-4.612 3.11V7.056l-7.233 2.006v.286l.043.004c1.547.138 1.994.697 1.994 2.492v13.631h6.75v-.29l-.037-.01c-1.148-.271-1.519-.767-1.519-2.04V10.95c.304-.715.917-1.562 2.127-1.562 1.504 0 2.266 1.05 2.266 3.116v12.972h6.751v-.29l-.035-.01c-1.149-.271-1.52-.767-1.52-2.04V12.294a7.107 7.107 0 00-.095-1.21c.322-.777.97-1.696 2.23-1.696 1.524 0 2.265 1.02 2.265 3.116v12.972h7.233z"/></svg></span><span class="u-textScreenReader">Homepage</span></a></div><div class="u-paddingLeft10 u-sm-show r-paddingRight10"><a href="https://rsci.app.link/?%24canonical_url=https%3A%2F%2Fmedium.com/mitre-attack%3F~feature=LoMobileNavBar&~channel=ShowCollectionHome&~stage=m2">Open in app</a></div></div><div class="metabar-block u-flex0 u-flexCenter"><div class="u-flexCenter u-height65 u-xs-height56"><div class="buttonSet buttonSet--wide u-lineHeightInherit"><a class="button button--primary button--chromeless u-accentColor--buttonNormal is-inSiteNavBar u-xs-hide js-signInButton" href="https://medium.com/m/signin?redirect=https%3A%2F%2Fmedium.com%2Fmitre-attack&source=--------------------------nav_reg&operation=login" data-action="sign-in-prompt" data-redirect="https://medium.com/mitre-attack" data-action-source="--------------------------nav_reg">Sign in</a><a class="button button--primary button--withChrome u-accentColor--buttonNormal is-inSiteNavBar js-signUpButton" href="https://medium.com/m/signin?redirect=https%3A%2F%2Fmedium.com%2Fmitre-attack&source=--------------------------nav_reg&operation=register" data-action="sign-up-prompt" data-redirect="https://medium.com/mitre-attack" data-action-source="--------------------------nav_reg">Get started</a></div></div></div></div></div><div class="metabar metabar--spacer js-metabarSpacer u-height65 u-xs-height56"></div><div class="collectionHeader js-collectionHeaderContainer u-relative collectionHeader--layoutSmall collectionHeader--alignmentLeft collectionHeader--withoutLogo collectionHeader--withoutBackground collectionHeader--colorBehaviorSubtle collectionHeader--withNavigation collectionHeader--editorLayoutTitle is-modeView"><div class="collectionHeader-aspectRatioTable"><div class="collectionHeader-aspectRatioContent u-backgroundSizeCover js-collectionHeaderBackground"><div class="collectionHeader-overlayBackground u-height100vh"></div><header class="collectionHeader-heroAndInlineNav u-borderBox u-maxWidth1072 u-paddingLeft20 u-paddingRight20 u-marginAuto u-foreground js-collectionHeader"><div class="collectionHeader-hero js-collectionHeaderHero u-clearfix"><div class="collectionHeader-heroInner"><div class="collectionHeader-logo js-collectionHeaderLogo" style=""><a class="link u-baseColor--link" href="https://medium.com/mitre-attack" title="Go to MITRE ATT&CK®" aria-label="Go to MITRE ATT&CK®"><div class="u-relative u-marginAuto"><div style="padding-bottom: 75%"></div><img class="collectionHeader-logoImage js-collectionHeaderLogoImage" /></div></a></div><div class="collectionHeader-nameAndDescription"><a class="link link--noUnderline u-baseColor--link" href="https://medium.com/mitre-attack" title="Go to MITRE ATT&CK®" aria-label="Go to MITRE ATT&CK®"><h1 class="collectionHeader-name js-collectionName u-foreground u-baseColor--textDark u-paddingBottom4 u-lineHeightTightest u-contentSansBold u-fontSize40 u-xs-fontSize32">MITRE ATT&CK®</h1></a></div></div></div><nav class="collectionHeader-nav u-clearfix js-collectionHeaderNav u-lineHeight40 u-overflowHiddenY u-flex1"><div class="buttonSet u-flex1 u-noWrap u-overflowX u-paddingBottom100 u-xs-marginRight15"><li class="collectionHeader-navItem js-collectionNavItem u-inlineBlock u-fontSize13 u-textUppercase u-letterSpacing1px u-textColorNormal u-xs-paddingRight12 u-xs-marginRight0"><a class="link link--darken u-accentColor--textDarken link--noUnderline u-baseColor--link js-navItemLink" href="https://medium.com/mitre-attack/archive">Blog Archives</a></li><li class="collectionHeader-navItem js-collectionNavItem u-inlineBlock u-fontSize13 u-textUppercase u-letterSpacing1px u-textColorNormal u-xs-paddingRight12 u-xs-marginRight0"><a class="link link--darken u-accentColor--textDarken link--noUnderline u-baseColor--link js-navItemLink" href="https://medium.com/mitre-attack/getting-started/home">Getting Started</a></li><span class="u-borderLeft1 u-paddingLeft22 u-xs-paddingLeft12 u-baseColor--borderLight"></span><li class="collectionHeader-navItem js-collectionNavItem u-inlineBlock u-fontSize13 u-textUppercase u-letterSpacing1px u-textColorNormal u-xs-paddingRight12 u-xs-marginRight0 is-external"><a class="link link--darkenOnHover u-accentColor--textDarken link--noUnderline u-baseColor--link js-navItemLink" href="https://attack.mitre.org" rel="nofollow noopener" target="_blank">ATT&CK</a></li></div><div class="buttonSet u-textAlignRight u-marginLeft18 u-flex0 u-noWrap"><label class="button button--small button--chromeless button--withIcon button--withSvgIcon inputGroup u-sm-hide metabar-predictiveSearch u-baseColor--buttonNormal u-baseColor--placeholderNormal" title="Search"><span class="svgIcon svgIcon--search svgIcon--25px u-baseColor--iconLight"><svg class="svgIcon-use" width="25" height="25" ><path d="M20.067 18.933l-4.157-4.157a6 6 0 10-.884.884l4.157 4.157a.624.624 0 10.884-.884zM6.5 11c0-2.62 2.13-4.75 4.75-4.75S16 8.38 16 11s-2.13 4.75-4.75 4.75S6.5 13.62 6.5 11z"/></svg></span><input class="js-predictiveSearchInput textInput textInput--rounded textInput--darkText u-baseColor--textNormal textInput--transparent" type="search" placeholder="Search" required="true" data-collection-id="6da19bd08fba" /></label><a class="button button--chromeless is-touchIconBlackPulse u-baseColor--buttonNormal button--withIcon button--withSvgIcon button--chromeless u-verticalAlignMiddle" href="https://twitter.com/mitreattack" title="Visit “MITRE ATT&CK®” on X" aria-label="Visit “MITRE ATT&CK®” on X" rel="me" target="_blank"><span class="button-defaultState"><span class="svgIcon svgIcon--twitter svgIcon--25px"><svg class="svgIcon-use" width="25" height="25" fill="none" ><path d="M14.215 11.3l5.764-6.7h-1.366l-5.005 5.818L9.611 4.6H5l6.045 8.798L5 20.424h1.366l5.286-6.144 4.221 6.144h4.61L14.216 11.3zm-1.871 2.175l-.612-.876-4.874-6.97h2.098l3.933 5.625.613.876 5.112 7.312h-2.098l-4.172-5.966z" fill="#242424"/></svg></span></span></a><a class="button button--chromeless is-touchIconBlackPulse u-baseColor--buttonNormal button--withIcon button--withSvgIcon button--chromeless u-verticalAlignMiddle" href="https://instagram.com/mitreattack" title="Visit “MITRE ATT&CK®” on Instagram" aria-label="Visit “MITRE ATT&CK®” on Instagram" rel="me" target="_blank"><span class="button-defaultState"><span class="svgIcon svgIcon--instagram svgIcon--25px"><svg class="svgIcon-use" width="25" height="25" ><path d="M12.497 5.531c2.27 0 2.536.01 3.433.05.83.038 1.279.176 1.579.294.398.156.681.338.978.635.297.296.482.58.634.978.115.3.257.749.294 1.578.04.897.05 1.164.05 3.434 0 2.27-.01 2.537-.05 3.434-.037.83-.176 1.278-.294 1.578a2.637 2.637 0 01-.634.979 2.61 2.61 0 01-.978.634c-.3.114-.749.256-1.579.293-.897.04-1.163.05-3.433.05-2.27 0-2.537-.01-3.434-.05-.83-.037-1.278-.175-1.579-.293a2.638 2.638 0 01-.978-.634 2.596 2.596 0 01-.634-.979c-.115-.3-.256-.748-.293-1.578-.04-.897-.051-1.164-.051-3.434 0-2.27.01-2.537.05-3.434.038-.83.176-1.278.294-1.578.155-.398.337-.682.634-.978a2.6 2.6 0 01.978-.635c.3-.114.75-.256 1.579-.293.897-.044 1.164-.05 3.434-.05zm0-1.531c-2.307 0-2.598.01-3.505.05-.904.041-1.521.186-2.06.395-.56.216-1.033.51-1.505.982a4.214 4.214 0 00-.982 1.504c-.209.54-.354 1.157-.394 2.064C4.01 9.9 4 10.19 4 12.497c0 2.307.01 2.597.05 3.504.041.904.186 1.521.395 2.064.216.56.51 1.033.982 1.505s.948.762 1.504.981c.54.21 1.157.355 2.064.395.908.04 1.195.05 3.505.05 2.31 0 2.597-.01 3.505-.05.904-.04 1.52-.186 2.064-.395a4.14 4.14 0 001.504-.981c.472-.472.762-.948.982-1.505.209-.54.354-1.157.394-2.064.04-.907.051-1.194.051-3.504s-.01-2.598-.05-3.505c-.041-.904-.186-1.521-.395-2.064a4.142 4.142 0 00-.982-1.505 4.215 4.215 0 00-1.504-.981c-.54-.21-1.157-.354-2.064-.395C15.094 4.01 14.804 4 12.497 4z"/><path d="M12.496 8.132a4.365 4.365 0 000 8.73 4.367 4.367 0 004.365-4.365 4.367 4.367 0 00-4.365-4.365zm0 7.198a2.833 2.833 0 110-5.666 2.833 2.833 0 010 5.666z"/><path d="M17.034 8.979a1.019 1.019 0 100-2.038 1.019 1.019 0 000 2.038z"/></svg></span></span></a><button class="button button--primary button--smallest u-noUserSelect button--withChrome u-accentColor--buttonNormal js-relationshipButton is-smallPill" data-action="sign-up-prompt" data-sign-in-action="toggle-follow-collection" data-requires-token="true" data-redirect="https://medium.com/_/subscribe/collection/mitre-attack" data-action-source="pub_header----6da19bd08fba----------------------follow_pub" data-collection-id="6da19bd08fba"><span class="button-label js-buttonLabel">Follow</span></button></div></nav></header></div><div class="collectionHeader-aspectRatioCell"><div class="collectionHeader-aspectRatioFullWidth"></div></div></div></div><div class="u-marginBottom40 js-collectionStream"><div class="streamItem streamItem--section js-streamItem"><section class="u-marginTop30 u-xs-margin0 u-marginBottom15 u-maxWidth1032 u-sm-paddingLeft20 u-sm-paddingRight20 u-borderBox u-marginAuto"><div class="row u-marginTop30 u-marginLeftNegative12 u-marginRightNegative12"><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight15 u-size8of12" data-source="collection_home---4------0-----------------------" data-post-id="d9fca6ce4c58" data-index="0"><div class="u-lineHeightBase postItem u-marginRight3"><a href="https://medium.com/mitre-attack/introducing-taxii-2-1-and-a-fond-farewell-to-taxii-2-0-d9fca6ce4c58?source=collection_home---4------0-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/introducing-taxii-2-1-and-a-fond-farewell-to-taxii-2-0-d9fca6ce4c58?source=collection_home---4------0-----------------------" class="u-block u-xs-height170 u-height350 u-width100pct u-floatLeft u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/2000/1*0GQBfYbb0frVtyhYLi3yiA.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">Introducing TAXII 2.1 and a fond farewell to the TAXII 2.0 Server</span></a></div></div><div class="col u-xs-marginBottom10 u-paddingLeft9 u-paddingRight12 u-paddingTop0 u-sm-paddingTop20 u-paddingBottom25 u-size4of12 u-xs-size12of12 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/introducing-taxii-2-1-and-a-fond-farewell-to-taxii-2-0-d9fca6ce4c58?source=collection_home---4------0-----------------------" data-action-source="collection_home---4------0-----------------------" data-post-id="d9fca6ce4c58"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp4 u-fontSize30 u-size12of12 u-xs-size12of12 u-xs-fontSize24">Introducing TAXII 2.1 and a fond farewell to the TAXII 2.0 Server</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">We’re excited to introduce our new TAXII 2.1 server and the latest addition to the ATT&CK Workbench Software Suite</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@seansica" data-action="show-user-card" data-action-value="9b945ac87938" data-action-type="hover" data-user-id="9b945ac87938" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*dmbNkD5D-u45r44go_cf0g.png" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Sean Sica"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@seansica" data-action="show-user-card" data-action-value="9b945ac87938" data-action-type="hover" data-user-id="9b945ac87938" dir="auto">Sean Sica</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2024-08-22T16:33:32.771Z">Aug 22</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="6 min read"></span></div></div></div></div></div></div></section></div><div class="streamItem streamItem--section js-streamItem"><section class="u-marginTop30 u-xs-margin0 u-marginBottom15 u-maxWidth1032 u-sm-paddingLeft20 u-sm-paddingRight20 u-borderBox u-marginAuto"><div class="row u-marginTop30 u-marginLeftNegative12 u-marginRightNegative12"><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------0-----------------------" data-post-id="561c76af94cf" data-index="0"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/attack-v16-561c76af94cf?source=collection_home---4------0-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/attack-v16-561c76af94cf?source=collection_home---4------0-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*YEpt4gwe_KcB6O3mGJAzLA.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">v16 Cloud Rebalancing, Analytics,</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/attack-v16-561c76af94cf?source=collection_home---4------0-----------------------" data-action-source="collection_home---4------0-----------------------" data-post-id="561c76af94cf"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">v16 Cloud Rebalancing, Analytics,</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Fine-tuned cloud coverage, optimized defense with more analytics, expanded existing techniques/groups, and introduced new behaviors &…</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*HSqNMSnjesj-UnJGDPJi7g.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Amy L. Robertson"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto">Amy L. Robertson</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2024-10-31T15:43:23.724Z">Oct 31</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="6 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------1-----------------------" data-post-id="26685f300acc" data-index="1"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/attack-v15-26685f300acc?source=collection_home---4------1-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/attack-v15-26685f300acc?source=collection_home---4------1-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*9nefc6VVPUZWdnO9pxLoTA.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">ATT&CK v15 Brings the Action</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/attack-v15-26685f300acc?source=collection_home---4------1-----------------------" data-action-source="collection_home---4------1-----------------------" data-post-id="26685f300acc"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">ATT&CK v15 Brings the Action</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Upgraded Detections, New Analytic Format, & Cross-Domain Adversary Insights</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*HSqNMSnjesj-UnJGDPJi7g.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Amy L. Robertson"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto">Amy L. Robertson</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2024-04-23T15:35:40.785Z">Apr 23</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="7 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------2-----------------------" data-post-id="8dfc46d1ad1b" data-index="2"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/attack-2024-roadmap-8dfc46d1ad1b?source=collection_home---4------2-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/attack-2024-roadmap-8dfc46d1ad1b?source=collection_home---4------2-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*NdNL-P_jvIn29chXCd8RmA.jpeg"); background-position: 50% 50% !important;"><span class="u-textScreenReader">ATT&CK 2024 Roadmap</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/attack-2024-roadmap-8dfc46d1ad1b?source=collection_home---4------2-----------------------" data-action-source="collection_home---4------2-----------------------" data-post-id="8dfc46d1ad1b"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">ATT&CK 2024 Roadmap</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Enhancing usability, expanding scope, optimizing defenses</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*HSqNMSnjesj-UnJGDPJi7g.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Amy L. Robertson"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto">Amy L. Robertson</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2024-04-18T16:46:21.304Z">Apr 18</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="11 min read"></span></div></div></div></div></div></div></div><div class="row u-marginTop30 u-marginLeftNegative12 u-marginRightNegative12"><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------3-----------------------" data-post-id="fa473603f86b" data-index="3"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/attack-v14-fa473603f86b?source=collection_home---4------3-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/attack-v14-fa473603f86b?source=collection_home---4------3-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*8nBv3HtBj0KyhQYkcfWBog.jpeg"); background-position: 50% 50% !important;"><span class="u-textScreenReader">ATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured Detections</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/attack-v14-fa473603f86b?source=collection_home---4------3-----------------------" data-action-source="collection_home---4------3-----------------------" data-post-id="fa473603f86b"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">ATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured Detections</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">ATT&CK has been brewing up something eerie for this Halloween — ATT&CK v14</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*HSqNMSnjesj-UnJGDPJi7g.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Amy L. Robertson"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto">Amy L. Robertson</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2023-10-31T15:56:09.979Z">Oct 31, 2023</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="5 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------4-----------------------" data-post-id="5cef174c32ff" data-index="4"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/attack-v13-enters-the-room-5cef174c32ff?source=collection_home---4------4-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/attack-v13-enters-the-room-5cef174c32ff?source=collection_home---4------4-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*PkApzI8NMYPKdGGq2ZA1Vw.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">ATT&CK v13 Enters the Room</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/attack-v13-enters-the-room-5cef174c32ff?source=collection_home---4------4-----------------------" data-action-source="collection_home---4------4-----------------------" data-post-id="5cef174c32ff"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">ATT&CK v13 Enters the Room</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Pseudocode, Swifter Search, and Mobile Data Sources</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*HSqNMSnjesj-UnJGDPJi7g.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Amy L. Robertson"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto">Amy L. Robertson</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2023-04-25T14:56:21.249Z">Apr 25, 2023</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="6 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------5-----------------------" data-post-id="452fab541673" data-index="5"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/2023-attack-roadmap-452fab541673?source=collection_home---4------5-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/2023-attack-roadmap-452fab541673?source=collection_home---4------5-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*pZsmRwpPNtBygO-4zxDVLQ.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">2023 ATT&CK Roadmap</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/2023-attack-roadmap-452fab541673?source=collection_home---4------5-----------------------" data-action-source="collection_home---4------5-----------------------" data-post-id="452fab541673"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">2023 ATT&CK Roadmap</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">A Roadmap of 2023’s key efforts: From ICS Assets to more Linux and ATT&CKcon 4.0.</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*HSqNMSnjesj-UnJGDPJi7g.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Amy L. Robertson"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto">Amy L. Robertson</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2023-02-21T15:53:13.638Z">Feb 21, 2023</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="6 min read"></span></div></div></div></div></div></div></div><div class="row u-marginTop30 u-marginLeftNegative12 u-marginRightNegative12"><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------6-----------------------" data-post-id="6b15baa6cbb4" data-index="6"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/introducing-attack-campaigns-6b15baa6cbb4?source=collection_home---4------6-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/introducing-attack-campaigns-6b15baa6cbb4?source=collection_home---4------6-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*_CSbbgPWimTXkEud2wxlIA.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">Introducing ATT&CK Campaigns</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/introducing-attack-campaigns-6b15baa6cbb4?source=collection_home---4------6-----------------------" data-action-source="collection_home---4------6-----------------------" data-post-id="6b15baa6cbb4"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">Introducing ATT&CK Campaigns</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">By: Amy Robertson, Jared Ondricek, and Matt Malone</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@mmalone_36363" data-action="show-user-card" data-action-value="2138aa4a8cfa" data-action-type="hover" data-user-id="2138aa4a8cfa" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*khEfxRURqsM1l_kKG3kD_w.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Matt Malone"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@mmalone_36363" data-action="show-user-card" data-action-value="2138aa4a8cfa" data-action-type="hover" data-user-id="2138aa4a8cfa" dir="auto">Matt Malone</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2022-10-04T14:31:25.462Z">Oct 4, 2022</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="8 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------7-----------------------" data-post-id="599a9112a025" data-index="7"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/attack-goes-to-v11-599a9112a025?source=collection_home---4------7-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/attack-goes-to-v11-599a9112a025?source=collection_home---4------7-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*JB9ySNw5GWctTPIxbjYlng.jpeg"); background-position: 50% 50% !important;"><span class="u-textScreenReader">ATT&CK Goes to v11</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/attack-goes-to-v11-599a9112a025?source=collection_home---4------7-----------------------" data-action-source="collection_home---4------7-----------------------" data-post-id="599a9112a025"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">ATT&CK Goes to v11</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Structured Detections, Beta Sub-Techniques for Mobile, and ICS Joins the Band</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@adamp_mitre" data-action="show-user-card" data-action-value="37fd2c032d44" data-action-type="hover" data-user-id="37fd2c032d44" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*j5eMJS7aT-Nb1R3lI5OuKQ.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Adam Pennington"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@adamp_mitre" data-action="show-user-card" data-action-value="37fd2c032d44" data-action-type="hover" data-user-id="37fd2c032d44" dir="auto">Adam Pennington</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2022-04-25T12:02:23.606Z">Apr 25, 2022</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="9 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------8-----------------------" data-post-id="35be8d12884" data-index="8"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/intelligence-failures-of-lincolns-top-spies-what-cti-analysts-can-learn-from-the-civil-war-35be8d12884?source=collection_home---4------8-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/intelligence-failures-of-lincolns-top-spies-what-cti-analysts-can-learn-from-the-civil-war-35be8d12884?source=collection_home---4------8-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*Lt18htHq69IsEJ-3staO2w.jpeg"); background-position: 50% 50% !important;"><span class="u-textScreenReader">Intelligence Failures of Lincoln’s Top Spies: What CTI Analysts Can Learn From the Civil War</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/intelligence-failures-of-lincolns-top-spies-what-cti-analysts-can-learn-from-the-civil-war-35be8d12884?source=collection_home---4------8-----------------------" data-action-source="collection_home---4------8-----------------------" data-post-id="35be8d12884"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">Intelligence Failures of Lincoln’s Top Spies: What CTI Analysts Can Learn From the Civil War</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">By examining the intelligence reporting failures documented by modern historians, threat intelligence analysts can be better prepared</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@selenalarson" data-action="show-user-card" data-action-value="dd8d40428430" data-action-type="hover" data-user-id="dd8d40428430" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*zWnlpX5kj976PwYilzYdng.png" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Selena Larson"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@selenalarson" data-action="show-user-card" data-action-value="dd8d40428430" data-action-type="hover" data-user-id="dd8d40428430" dir="auto">Selena Larson</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2022-03-29T13:17:48.171Z">Mar 29, 2022</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="9 min read"></span></div></div></div></div></div></div></div><div class="row u-marginTop30 u-marginLeftNegative12 u-marginRightNegative12"><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------9-----------------------" data-post-id="4fdb40a88a48" data-index="9"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/attack-for-mobile-2022-roadmap-4fdb40a88a48?source=collection_home---4------9-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/attack-for-mobile-2022-roadmap-4fdb40a88a48?source=collection_home---4------9-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*RUcsdzXAWMeoDxjWmxKOqg.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">ATT&CK for Mobile: Reintroduction and 2022 Goals</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/attack-for-mobile-2022-roadmap-4fdb40a88a48?source=collection_home---4------9-----------------------" data-action-source="collection_home---4------9-----------------------" data-post-id="4fdb40a88a48"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">ATT&CK for Mobile: Reintroduction and 2022 Goals</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">What is it, and where are we taking it?</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@jason_ajmo" data-action="show-user-card" data-action-value="a4d96b83d947" data-action-type="hover" data-user-id="a4d96b83d947" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*tknhYcDTamzzy2AodDW3Tg.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Jason Ajmo"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@jason_ajmo" data-action="show-user-card" data-action-value="a4d96b83d947" data-action-type="hover" data-user-id="a4d96b83d947" dir="auto">Jason Ajmo</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2022-02-23T16:25:56.307Z">Feb 23, 2022</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="6 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------10-----------------------" data-post-id="cd5a1a3387c7" data-index="10"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/attack-2022-roadmap-cd5a1a3387c7?source=collection_home---4------10-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/attack-2022-roadmap-cd5a1a3387c7?source=collection_home---4------10-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*0bpIw9Lf7WUPYBukKdXdMw.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">ATT&CK 2022 Roadmap</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/attack-2022-roadmap-cd5a1a3387c7?source=collection_home---4------10-----------------------" data-action-source="collection_home---4------10-----------------------" data-post-id="cd5a1a3387c7"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">ATT&CK 2022 Roadmap</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Where We’ve Been and Where We’re Going</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*HSqNMSnjesj-UnJGDPJi7g.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Amy L. Robertson"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto">Amy L. Robertson</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2022-02-02T15:02:28.867Z">Feb 2, 2022</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="7 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------11-----------------------" data-post-id="7743870b37e3" data-index="11"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/introducing-attack-v10-7743870b37e3?source=collection_home---4------11-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/introducing-attack-v10-7743870b37e3?source=collection_home---4------11-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*aghj7RR33HlT_i1FVYx_eQ.jpeg"); background-position: 50% 50% !important;"><span class="u-textScreenReader">Introducing ATT&CK v10: More Objects, Parity and Features</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/introducing-attack-v10-7743870b37e3?source=collection_home---4------11-----------------------" data-action-source="collection_home---4------11-----------------------" data-post-id="7743870b37e3"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">Introducing ATT&CK v10: More Objects, Parity and Features</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Detailing the content and feature updates just released in ATT&CK v10</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*HSqNMSnjesj-UnJGDPJi7g.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Amy L. Robertson"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto">Amy L. Robertson</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2021-10-21T15:50:37.317Z">Oct 21, 2021</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="6 min read"></span></div></div></div></div></div></div></div><div class="row u-marginTop30 u-marginLeftNegative12 u-marginRightNegative12"><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------12-----------------------" data-post-id="39accaf23c81" data-index="12"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/attack-april-2021-release-39accaf23c81?source=collection_home---4------12-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/attack-april-2021-release-39accaf23c81?source=collection_home---4------12-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*x9njnXWLa5PGfhy3UMuxJA.gif"); background-position: 50% 50% !important;"><span class="u-textScreenReader">What’s New in ATT&CK v9?</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/attack-april-2021-release-39accaf23c81?source=collection_home---4------12-----------------------" data-action-source="collection_home---4------12-----------------------" data-post-id="39accaf23c81"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">What’s New in ATT&CK v9?</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Data Sources, Containers, Cloud, and More</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@jcwilliams_43363" data-action="show-user-card" data-action-value="1dfd16769165" data-action-type="hover" data-user-id="1dfd16769165" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/2*GSsGswhrtP4MQcOolzM3Kw.png" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Jamie Williams"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@jcwilliams_43363" data-action="show-user-card" data-action-value="1dfd16769165" data-action-type="hover" data-user-id="1dfd16769165" dir="auto">Jamie Williams</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2021-04-29T14:21:09.630Z">Apr 29, 2021</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="6 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------13-----------------------" data-post-id="68bab3886fa2" data-index="13"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/att-ck-2021-roadmap-68bab3886fa2?source=collection_home---4------13-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/att-ck-2021-roadmap-68bab3886fa2?source=collection_home---4------13-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*WPRfQhFyxa2Qc7oAbhupKA.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">ATT&CK 2021 Roadmap</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/att-ck-2021-roadmap-68bab3886fa2?source=collection_home---4------13-----------------------" data-action-source="collection_home---4------13-----------------------" data-post-id="68bab3886fa2"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">ATT&CK 2021 Roadmap</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">A review of how we navigated 2020 and where we’re heading in 2021</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*HSqNMSnjesj-UnJGDPJi7g.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Amy L. Robertson"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@arobertson_79988" data-action="show-user-card" data-action-value="13b16fa8065d" data-action-type="hover" data-user-id="13b16fa8065d" dir="auto">Amy L. Robertson</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2021-03-16T19:43:57.411Z">Mar 16, 2021</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="9 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------14-----------------------" data-post-id="50516fb7de85" data-index="14"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/mobile-attack-mitigating-android-abuse-50516fb7de85?source=collection_home---4------14-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/mobile-attack-mitigating-android-abuse-50516fb7de85?source=collection_home---4------14-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*emdC5k0jVlBY6XPGn0FghA.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">Mitigating Abuse of Android Application Permissions and Special App Accesses</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/mobile-attack-mitigating-android-abuse-50516fb7de85?source=collection_home---4------14-----------------------" data-action-source="collection_home---4------14-----------------------" data-post-id="50516fb7de85"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">Mitigating Abuse of Android Application Permissions and Special App Accesses</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Part 1 of a series on ATT&CK® for Mobile (Android and iOS) devices</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@mpeck2" data-action="show-user-card" data-action-value="a63006eeacc2" data-action-type="hover" data-user-id="a63006eeacc2" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/0*kgS8e64YZi2wwFH_" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Michael Peck"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@mpeck2" data-action="show-user-card" data-action-value="a63006eeacc2" data-action-type="hover" data-user-id="a63006eeacc2" dir="auto">Michael Peck</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2021-01-26T16:26:53.935Z">Jan 26, 2021</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="7 min read"></span></div></div></div></div></div></div></div><div class="row u-marginTop30 u-marginLeftNegative12 u-marginRightNegative12"><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------15-----------------------" data-post-id="9f7b6c7f3714" data-index="15"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/identifying-unc2452-related-techniques-9f7b6c7f3714?source=collection_home---4------15-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/identifying-unc2452-related-techniques-9f7b6c7f3714?source=collection_home---4------15-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*MRE2K9GbE7cvy1QmKX-fBg.jpeg"); background-position: 50% 50% !important;"><span class="u-textScreenReader">Identifying UNC2452-Related Techniques for ATT&CK</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/identifying-unc2452-related-techniques-9f7b6c7f3714?source=collection_home---4------15-----------------------" data-action-source="collection_home---4------15-----------------------" data-post-id="9f7b6c7f3714"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">Identifying UNC2452-Related Techniques for ATT&CK</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Tracking UNC2452-related reporting as we look to update ATT&CK.</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@mmalone_36363" data-action="show-user-card" data-action-value="2138aa4a8cfa" data-action-type="hover" data-user-id="2138aa4a8cfa" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*khEfxRURqsM1l_kKG3kD_w.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Matt Malone"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@mmalone_36363" data-action="show-user-card" data-action-value="2138aa4a8cfa" data-action-type="hover" data-user-id="2138aa4a8cfa" dir="auto">Matt Malone</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2020-12-22T15:05:48.262Z">Dec 22, 2020</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="4 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------16-----------------------" data-post-id="4b73ffecd3d3" data-index="16"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/the-retirement-of-pre-attack-4b73ffecd3d3?source=collection_home---4------16-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/the-retirement-of-pre-attack-4b73ffecd3d3?source=collection_home---4------16-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*m7y6QEAr6XSnsk4sBNejqw.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">Bringing PRE into Enterprise</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/the-retirement-of-pre-attack-4b73ffecd3d3?source=collection_home---4------16-----------------------" data-action-source="collection_home---4------16-----------------------" data-post-id="4b73ffecd3d3"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">Bringing PRE into Enterprise</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Integrating the scope of PRE-ATT&CK into Enterprise ATT&CK</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@adamp_mitre" data-action="show-user-card" data-action-value="37fd2c032d44" data-action-type="hover" data-user-id="37fd2c032d44" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*j5eMJS7aT-Nb1R3lI5OuKQ.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Adam Pennington"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@adamp_mitre" data-action="show-user-card" data-action-value="37fd2c032d44" data-action-type="hover" data-user-id="37fd2c032d44" dir="auto">Adam Pennington</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2020-10-27T14:43:40.779Z">Oct 27, 2020</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="6 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------17-----------------------" data-post-id="1fc98738ba5b" data-index="17"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/defining-attack-data-sources-part-ii-1fc98738ba5b?source=collection_home---4------17-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/defining-attack-data-sources-part-ii-1fc98738ba5b?source=collection_home---4------17-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*uRsHxbsYty0UtF1wW5ZmFg.jpeg"); background-position: 50% 50% !important;"><span class="u-textScreenReader">Defining ATT&CK Data Sources, Part II: Operationalizing the Methodology</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/defining-attack-data-sources-part-ii-1fc98738ba5b?source=collection_home---4------17-----------------------" data-action-source="collection_home---4------17-----------------------" data-post-id="1fc98738ba5b"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">Defining ATT&CK Data Sources, Part II: Operationalizing the Methodology</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Describing how a new data sources methodology can be implemented with ATT&CK data sources.</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@cyb3rpandah" data-action="show-user-card" data-action-value="b8f2906f3de3" data-action-type="hover" data-user-id="b8f2906f3de3" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*zBEtYyYevfO-BWl3JPwHAg.png" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Jose Luis Rodriguez"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@cyb3rpandah" data-action="show-user-card" data-action-value="b8f2906f3de3" data-action-type="hover" data-user-id="b8f2906f3de3" dir="auto">Jose Luis Rodriguez</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2020-10-20T15:29:47.684Z">Oct 20, 2020</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="9 min read"></span></div></div></div></div></div></div></div><div class="row u-marginTop30 u-marginLeftNegative12 u-marginRightNegative12"><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------18-----------------------" data-post-id="3523daa7b580" data-index="18"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/in-pursuit-of-a-gestalt-visualization-merging-mitre-att-ck-for-enterprise-and-ics-to-communicate-3523daa7b580?source=collection_home---4------18-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/in-pursuit-of-a-gestalt-visualization-merging-mitre-att-ck-for-enterprise-and-ics-to-communicate-3523daa7b580?source=collection_home---4------18-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*HQGZ-UfjwP8VsJkWl4lUag.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/in-pursuit-of-a-gestalt-visualization-merging-mitre-att-ck-for-enterprise-and-ics-to-communicate-3523daa7b580?source=collection_home---4------18-----------------------" data-action-source="collection_home---4------18-----------------------" data-post-id="3523daa7b580"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">A joint post exploring leveraging ATT&CK for Enterprise and ICS together in a visualization.</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@oa.mitre" data-action="show-user-card" data-action-value="383ac795dbd9" data-action-type="hover" data-user-id="383ac795dbd9" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/2*PNZD4NNKdt_2NgUE0FVyHQ.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Otis Alexander"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@oa.mitre" data-action="show-user-card" data-action-value="383ac795dbd9" data-action-type="hover" data-user-id="383ac795dbd9" dir="auto">Otis Alexander</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2020-09-29T12:02:55.869Z">Sep 29, 2020</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="10 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------19-----------------------" data-post-id="4c39e581454f" data-index="19"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/defining-attack-data-sources-part-i-4c39e581454f?source=collection_home---4------19-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/defining-attack-data-sources-part-i-4c39e581454f?source=collection_home---4------19-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*8T1qZBntj3IDduun3HBpdA.jpeg"); background-position: 50% 50% !important;"><span class="u-textScreenReader">Defining ATT&CK Data Sources, Part I: Enhancing the Current State</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/defining-attack-data-sources-part-i-4c39e581454f?source=collection_home---4------19-----------------------" data-action-source="collection_home---4------19-----------------------" data-post-id="4c39e581454f"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">Defining ATT&CK Data Sources, Part I: Enhancing the Current State</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">Outlining a new methodology to extend the concepts around data sources</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@cyb3rpandah" data-action="show-user-card" data-action-value="b8f2906f3de3" data-action-type="hover" data-user-id="b8f2906f3de3" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*zBEtYyYevfO-BWl3JPwHAg.png" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Jose Luis Rodriguez"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@cyb3rpandah" data-action="show-user-card" data-action-value="b8f2906f3de3" data-action-type="hover" data-user-id="b8f2906f3de3" dir="auto">Jose Luis Rodriguez</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2020-09-10T19:19:09.255Z">Sep 10, 2020</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="10 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------20-----------------------" data-post-id="8fc20997d8de" data-index="20"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/attack-with-sub-techniques-is-now-just-attack-8fc20997d8de?source=collection_home---4------20-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/attack-with-sub-techniques-is-now-just-attack-8fc20997d8de?source=collection_home---4------20-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*2r4afYIsWDYQZSgakoU6uQ.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">“ATT&CK with Sub-Techniques” is Now Just ATT&CK</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/attack-with-sub-techniques-is-now-just-attack-8fc20997d8de?source=collection_home---4------20-----------------------" data-action-source="collection_home---4------20-----------------------" data-post-id="8fc20997d8de"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">“ATT&CK with Sub-Techniques” is Now Just ATT&CK</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">ATT&CK with Sub-Techniques is Now Live: The what, why, and how to leverage sub-techniques.</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@adamp_mitre" data-action="show-user-card" data-action-value="37fd2c032d44" data-action-type="hover" data-user-id="37fd2c032d44" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*j5eMJS7aT-Nb1R3lI5OuKQ.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Adam Pennington"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@adamp_mitre" data-action="show-user-card" data-action-value="37fd2c032d44" data-action-type="hover" data-user-id="37fd2c032d44" dir="auto">Adam Pennington</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2020-07-08T15:50:48.851Z">Jul 8, 2020</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="11 min read"></span></div></div></div></div></div></div></div><div class="row u-marginTop30 u-marginLeftNegative12 u-marginRightNegative12"><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------21-----------------------" data-post-id="74844e86e2b0" data-index="21"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/dissecting-a-detection-part-2-74844e86e2b0?source=collection_home---4------21-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/dissecting-a-detection-part-2-74844e86e2b0?source=collection_home---4------21-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*gpECA4CW3BkKVAyVY_hdGA.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">Actionable Detections: An Analysis of ATT&CK Evaluations Data Part 2 of 2</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/dissecting-a-detection-part-2-74844e86e2b0?source=collection_home---4------21-----------------------" data-action-source="collection_home---4------21-----------------------" data-post-id="74844e86e2b0"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">Actionable Detections: An Analysis of ATT&CK Evaluations Data Part 2 of 2</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">With the recent release of the APT29 Evaluations results, and with Carbanak+FIN7 launching soon, we’re providing more context.</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@jcwilliams_43363" data-action="show-user-card" data-action-value="1dfd16769165" data-action-type="hover" data-user-id="1dfd16769165" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/2*GSsGswhrtP4MQcOolzM3Kw.png" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Jamie Williams"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@jcwilliams_43363" data-action="show-user-card" data-action-value="1dfd16769165" data-action-type="hover" data-user-id="1dfd16769165" dir="auto">Jamie Williams</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2020-06-18T18:18:47.616Z">Jun 18, 2020</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="8 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------22-----------------------" data-post-id="19fd8f00266c" data-index="22"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/dissecting-a-detection-part-1-19fd8f00266c?source=collection_home---4------22-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/dissecting-a-detection-part-1-19fd8f00266c?source=collection_home---4------22-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*eypSeiebIMkPDrg1MtV3Mg.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">Dissecting a Detection: An Analysis of ATT&CK Evaluations Data (Sources) Part 1 of 2</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/dissecting-a-detection-part-1-19fd8f00266c?source=collection_home---4------22-----------------------" data-action-source="collection_home---4------22-----------------------" data-post-id="19fd8f00266c"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">Dissecting a Detection: An Analysis of ATT&CK Evaluations Data (Sources) Part 1 of 2</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">With the recent release of the APT29 Evaluations results, and with Carbanak+FIN7 launching soon, we’re providing more context to the…</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@jcwilliams_43363" data-action="show-user-card" data-action-value="1dfd16769165" data-action-type="hover" data-user-id="1dfd16769165" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/2*GSsGswhrtP4MQcOolzM3Kw.png" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Jamie Williams"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@jcwilliams_43363" data-action="show-user-card" data-action-value="1dfd16769165" data-action-type="hover" data-user-id="1dfd16769165" dir="auto">Jamie Williams</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2020-05-19T16:17:53.536Z">May 19, 2020</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="8 min read"></span></div></div></div></div></div></div><div class="col u-xs-size12of12 js-trackPostPresentation u-paddingLeft12 u-marginBottom15 u-paddingRight12 u-size4of12" data-source="collection_home---4------23-----------------------" data-post-id="cd30b3686ad9" data-index="23"><div class="u-lineHeightBase postItem"><a href="https://medium.com/mitre-attack/attack-apt29-results-released-cd30b3686ad9?source=collection_home---4------23-----------------------" data-action="open-post" data-action-value="https://medium.com/mitre-attack/attack-apt29-results-released-cd30b3686ad9?source=collection_home---4------23-----------------------" class="u-block u-xs-height170 u-height172 u-backgroundSizeCover u-backgroundOriginBorderBox u-backgroundColorGrayLight u-borderLighter" style="background-image: url("https://cdn-images-1.medium.com/max/800/1*gt6UGR1dUjlEzmkqjE6-9Q.png"); background-position: 50% 50% !important;"><span class="u-textScreenReader">ATT&CK Evaluations: Understanding the Newly Released APT29 Results</span></a></div><div class="col u-xs-marginBottom10 u-paddingLeft0 u-paddingRight0 u-paddingTop15 u-marginBottom30"><a class="" href="https://medium.com/mitre-attack/attack-apt29-results-released-cd30b3686ad9?source=collection_home---4------23-----------------------" data-action-source="collection_home---4------23-----------------------" data-post-id="cd30b3686ad9"><h3 class="u-contentSansBold u-lineHeightTightest u-xs-fontSize24 u-paddingBottom2 u-paddingTop5 u-fontSize32"><div class="u-letterSpacingTight u-lineHeightTighter u-breakWord u-textOverflowEllipsis u-lineClamp3 u-fontSize24">ATT&CK Evaluations: Understanding the Newly Released APT29 Results</div></h3><div class="u-contentSansThin u-lineHeightBaseSans u-fontSize24 u-xs-fontSize18 u-textColorNormal u-baseColor--textNormal"><div class="u-fontSize18 u-letterSpacingTight u-lineHeightTight u-marginTop7 u-textColorNormal u-baseColor--textNormal">In late 2019, the ATT&CK Evaluations team evaluated 21 endpoint security vendors using an evaluation methodology based on APT29.</div></div></a><div class="u-clearfix u-marginTop20"><div class="u-flexCenter"><div class="postMetaInline-avatar u-flex0"><a class="link u-baseColor--link avatar" href="https://medium.com/@fduff" data-action="show-user-card" data-action-value="dd95f448f732" data-action-type="hover" data-user-id="dd95f448f732" dir="auto"><img src="https://cdn-images-1.medium.com/fit/c/72/72/1*4IkVg3KcPy35k2ibhWmaag.jpeg" class="avatar-image u-size36x36 u-xs-size32x32" alt="Go to the profile of Frank Duff"></a></div><div class="postMetaInline postMetaInline-authorLockup ui-captionStrong u-flex1 u-noWrapWithEllipsis"><a class="ds-link ds-link--styleSubtle link link--darken link--accent u-accentColor--textNormal u-accentColor--textDarken" href="https://medium.com/@fduff" data-action="show-user-card" data-action-value="dd95f448f732" data-action-type="hover" data-user-id="dd95f448f732" dir="auto">Frank Duff</a><div class="ui-caption u-fontSize12 u-baseColor--textNormal u-textColorNormal js-postMetaInlineSupplemental"><time datetime="2020-04-21T16:30:27.644Z">Apr 21, 2020</time><span class="middotDivider u-fontSize12"></span><span class="readingTime" title="8 min read"></span></div></div></div></div></div></div></div></section></div></div><style class="js-collectionStyle"> .u-accentColor--borderLight {border-color: #DA4E2A !important;} .u-accentColor--borderNormal {border-color: #DA4E2A !important;} .u-accentColor--borderDark {border-color: #B94628 !important;} .u-accentColor--iconLight .svgIcon,.u-accentColor--iconLight.svgIcon {fill: #DA4E2A !important;} .u-accentColor--iconNormal .svgIcon,.u-accentColor--iconNormal.svgIcon {fill: #DA4E2A !important;} .u-accentColor--iconDark .svgIcon,.u-accentColor--iconDark.svgIcon {fill: #B94628 !important;} .u-accentColor--textNormal {color: #B94628 !important;} .u-accentColor--hoverTextNormal:hover {color: #B94628 !important;} .u-accentColor--textNormal.u-accentColor--textDarken:hover {color: #A84227 !important;} .u-accentColor--textDark {color: #A84227 !important;} .u-accentColor--backgroundLight {background-color: #DA4E2A !important;} .u-accentColor--backgroundNormal {background-color: #DA4E2A !important;} .u-accentColor--backgroundDark {background-color: #B94628 !important;} .u-accentColor--buttonDark {border-color: #B94628 !important; color: #A84227 !important;} .u-accentColor--buttonDark:hover {border-color: #A84227 !important;} .u-accentColor--buttonDark .icon:before,.u-accentColor--buttonDark .svgIcon{color: #B94628 !important; fill: #B94628 !important;} .u-accentColor--buttonNormal:not(.clapButton--largePill) {border-color: #DA4E2A !important; color: #B94628 !important;} .u-accentColor--buttonNormal:hover {border-color: #B94628 !important;} .u-accentColor--buttonNormal .icon:before,.u-accentColor--buttonNormal .svgIcon{color: #DA4E2A !important; fill: #DA4E2A !important;} .u-accentColor--buttonNormal.button--filled .icon:before,.u-accentColor--buttonNormal.button--filled .svgIcon{color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .u-accentColor--buttonDark.button--filled,.u-accentColor--buttonDark.button--withChrome.is-active,.u-accentColor--fillWhenActive.is-active {background-color: #B94628 !important; border-color: #B94628 !important; color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .u-accentColor--buttonNormal.button--filled:not(.clapButton--largePill),.u-accentColor--buttonNormal.button--withChrome.is-active:not(.clapButton--largePill) {background-color: #DA4E2A !important; border-color: #DA4E2A !important; color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .postArticle.is-withAccentColors .markup--user,.postArticle.is-withAccentColors .markup--query {color: #B94628 !important;}.u-tintBgColor {background-color: rgba(198, 63, 29, 1) !important;}.u-tintBgColor .u-fadeLeft:before {background-image: linear-gradient(to right, rgba(198, 63, 29, 1) 0%, rgba(198, 63, 29, 0) 100%) !important;}.u-tintBgColor .u-fadeRight:after {background-image: linear-gradient(to right, rgba(198, 63, 29, 0) 0%, rgba(198, 63, 29, 1) 100%) !important;} .u-tintSpectrum .u-baseColor--borderLight {border-color: #FF9C7F !important;} .u-tintSpectrum .u-baseColor--borderNormal {border-color: #FFBFA7 !important;} .u-tintSpectrum .u-baseColor--borderDark {border-color: #FFE1D0 !important;} .u-tintSpectrum .u-baseColor--iconLight .svgIcon,.u-tintSpectrum .u-baseColor--iconLight.svgIcon {fill: #FF9C7F !important;} .u-tintSpectrum .u-baseColor--iconNormal .svgIcon,.u-tintSpectrum .u-baseColor--iconNormal.svgIcon {fill: #FFBFA7 !important;} .u-tintSpectrum .u-baseColor--iconDark .svgIcon,.u-tintSpectrum .u-baseColor--iconDark.svgIcon {fill: #FFE1D0 !important;} .u-tintSpectrum .u-baseColor--textNormal {color: #FFBFA7 !important;} .u-tintSpectrum .u-baseColor--textNormal.u-baseColor--textDarken:hover {color: #FFF2E4 !important;} .u-tintSpectrum .u-baseColor--textDark {color: #FFF2E4 !important;} .u-tintSpectrum .u-baseColor--textDarker {color: #FFF2E4 !important;} .u-tintSpectrum .u-baseColor--backgroundLight {background-color: #FF9C7F !important;} .u-tintSpectrum .u-baseColor--backgroundNormal {background-color: #FFBFA7 !important;} .u-tintSpectrum .u-baseColor--backgroundDark {background-color: #FFE1D0 !important;} .u-tintSpectrum .u-baseColor--buttonLight {border-color: #FF9C7F !important; color: #FF9C7F !important;} .u-tintSpectrum .u-baseColor--buttonLight:hover {border-color: #FF9C7F !important;} .u-tintSpectrum .u-baseColor--buttonLight .icon:before,.u-tintSpectrum .u-baseColor--buttonLight .svgIcon {color: #FF9C7F !important; fill: #FF9C7F !important;} .u-tintSpectrum .u-baseColor--buttonDark {border-color: #FFE1D0 !important; color: #FFF2E4 !important;} .u-tintSpectrum .u-baseColor--buttonDark:hover {border-color: #FFF2E4 !important;} .u-tintSpectrum .u-baseColor--buttonDark .icon:before,.u-tintSpectrum .u-baseColor--buttonDark .svgIcon {color: #FFE1D0 !important; fill: #FFE1D0 !important;} .u-tintSpectrum .u-baseColor--buttonNormal {border-color: #FFBFA7 !important; color: #FFBFA7 !important;} .u-tintSpectrum .u-baseColor--buttonNormal:hover {border-color: #FFE1D0 !important;} .u-tintSpectrum .u-baseColor--buttonNormal .icon:before,.u-tintSpectrum .u-baseColor--buttonNormal .svgIcon {color: #FFBFA7 !important; fill: #FFBFA7 !important;} .u-tintSpectrum .u-baseColor--buttonDark.button--filled,.u-tintSpectrum .u-baseColor--buttonDark.button--withChrome.is-active {background-color: #FFE1D0 !important; border-color: #FFE1D0 !important; color: rgba(198, 63, 29, 1) !important; fill: rgba(198, 63, 29, 1) !important;} .u-tintSpectrum .u-baseColor--buttonNormal.button--filled,.u-tintSpectrum .u-baseColor--buttonNormal.button--withChrome.is-active {background-color: #FFBFA7 !important; border-color: #FFBFA7 !important; color: rgba(198, 63, 29, 1) !important; fill: rgba(198, 63, 29, 1) !important;} .u-tintSpectrum .u-baseColor--link {color: #FFBFA7 !important;} .u-tintSpectrum .u-baseColor--link.link--darkenOnHover:hover {color: #FFF2E4 !important;} .u-tintSpectrum .u-baseColor--link.link--darken:hover,.u-tintSpectrum .u-baseColor--link.link--darken:focus,.u-tintSpectrum .u-baseColor--link.link--darken:active {color: #FFF2E4 !important;} .u-tintSpectrum .u-baseColor--link.link--dark {color: #FFF2E4 !important;} .u-tintSpectrum .u-baseColor--link.link--dark.link--darken:hover,.u-tintSpectrum .u-baseColor--link.link--dark.link--darken:focus,.u-tintSpectrum .u-baseColor--link.link--dark.link--darken:active {color: #FFF2E4 !important;} .u-tintSpectrum .u-baseColor--link.link--darker {color: #FFF2E4 !important;} .u-tintSpectrum .u-baseColor--placeholderNormal ::-webkit-input-placeholder {color: #FF9C7F;} .u-tintSpectrum .u-baseColor--placeholderNormal ::-moz-placeholder {color: #FF9C7F;} .u-tintSpectrum .u-baseColor--placeholderNormal :-ms-input-placeholder {color: #FF9C7F;} .u-tintSpectrum .ui-h1,.u-tintSpectrum .ui-h2,.u-tintSpectrum .ui-h3,.u-tintSpectrum .ui-h4,.u-tintSpectrum .ui-brand1,.u-tintSpectrum .ui-brand2,.u-tintSpectrum .ui-captionStrong {color: #FFF2E4 !important; fill: #FFF2E4 !important;} .u-tintSpectrum .ui-body,.u-tintSpectrum .ui-caps {color: #FFF2E4 !important; fill: #FFF2E4 !important;} .u-tintSpectrum .ui-summary,.u-tintSpectrum .ui-caption {color: #FF9C7F !important; fill: #FF9C7F !important;} .u-tintSpectrum .u-accentColor--borderLight {border-color: #FF9C7F !important;} .u-tintSpectrum .u-accentColor--borderNormal {border-color: #FFBFA7 !important;} .u-tintSpectrum .u-accentColor--borderDark {border-color: #FFE1D0 !important;} .u-tintSpectrum .u-accentColor--iconLight .svgIcon,.u-tintSpectrum .u-accentColor--iconLight.svgIcon {fill: #FF9C7F !important;} .u-tintSpectrum .u-accentColor--iconNormal .svgIcon,.u-tintSpectrum .u-accentColor--iconNormal.svgIcon {fill: #FFBFA7 !important;} .u-tintSpectrum .u-accentColor--iconDark .svgIcon,.u-tintSpectrum .u-accentColor--iconDark.svgIcon {fill: #FFE1D0 !important;} .u-tintSpectrum .u-accentColor--textNormal {color: #FFBFA7 !important;} .u-tintSpectrum .u-accentColor--hoverTextNormal:hover {color: #FFBFA7 !important;} .u-tintSpectrum .u-accentColor--textNormal.u-accentColor--textDarken:hover {color: #FFF2E4 !important;} .u-tintSpectrum .u-accentColor--textDark {color: #FFF2E4 !important;} .u-tintSpectrum .u-accentColor--backgroundLight {background-color: #FF9C7F !important;} .u-tintSpectrum .u-accentColor--backgroundNormal {background-color: #FFBFA7 !important;} .u-tintSpectrum .u-accentColor--backgroundDark {background-color: #FFE1D0 !important;} .u-tintSpectrum .u-accentColor--buttonDark {border-color: #FFE1D0 !important; color: #FFF2E4 !important;} .u-tintSpectrum .u-accentColor--buttonDark:hover {border-color: #FFF2E4 !important;} .u-tintSpectrum .u-accentColor--buttonDark .icon:before,.u-tintSpectrum .u-accentColor--buttonDark .svgIcon{color: #FFE1D0 !important; fill: #FFE1D0 !important;} .u-tintSpectrum .u-accentColor--buttonNormal:not(.clapButton--largePill) {border-color: #FFBFA7 !important; color: #FFBFA7 !important;} .u-tintSpectrum .u-accentColor--buttonNormal:hover {border-color: #FFE1D0 !important;} .u-tintSpectrum .u-accentColor--buttonNormal .icon:before,.u-tintSpectrum .u-accentColor--buttonNormal .svgIcon{color: #FFBFA7 !important; fill: #FFBFA7 !important;} .u-tintSpectrum .u-accentColor--buttonNormal.button--filled .icon:before,.u-tintSpectrum .u-accentColor--buttonNormal.button--filled .svgIcon{color: rgba(198, 63, 29, 1) !important; fill: rgba(198, 63, 29, 1) !important;} .u-tintSpectrum .u-accentColor--buttonDark.button--filled,.u-tintSpectrum .u-accentColor--buttonDark.button--withChrome.is-active,.u-tintSpectrum .u-accentColor--fillWhenActive.is-active {background-color: #FFE1D0 !important; border-color: #FFE1D0 !important; color: rgba(198, 63, 29, 1) !important; fill: rgba(198, 63, 29, 1) !important;} .u-tintSpectrum .u-accentColor--buttonNormal.button--filled:not(.clapButton--largePill),.u-tintSpectrum .u-accentColor--buttonNormal.button--withChrome.is-active:not(.clapButton--largePill) {background-color: #FFBFA7 !important; border-color: #FFBFA7 !important; color: rgba(198, 63, 29, 1) !important; fill: rgba(198, 63, 29, 1) !important;} .u-tintSpectrum .postArticle.is-withAccentColors .markup--user,.u-tintSpectrum .postArticle.is-withAccentColors .markup--query {color: #FFBFA7 !important;} .u-accentColor--highlightFaint {background-color: rgba(255, 222, 203, 1) !important;} .u-accentColor--highlightStrong.is-active .svgIcon {fill: rgba(255, 177, 139, 1) !important;} .postArticle.is-withAccentColors .markup--quote.is-other {background-color: rgba(255, 222, 203, 1) !important;} body.is-withMagicUnderlines .postArticle.is-withAccentColors .markup--quote.is-other {background-color: transparent !important; background-image: linear-gradient(to bottom, rgba(255, 222, 203, 1), rgba(255, 222, 203, 1));} .postArticle.is-withAccentColors .markup--quote.is-me {background-color: rgba(255, 198, 167, 1) !important;} body.is-withMagicUnderlines .postArticle.is-withAccentColors .markup--quote.is-me {background-color: transparent !important; background-image: linear-gradient(to bottom, rgba(255, 198, 167, 1), rgba(255, 198, 167, 1));} .postArticle.is-withAccentColors .markup--quote.is-targeted {background-color: rgba(255, 177, 139, 1) !important;} body.is-withMagicUnderlines .postArticle.is-withAccentColors .markup--quote.is-targeted {background-color: transparent !important; background-image: linear-gradient(to bottom, rgba(255, 177, 139, 1), rgba(255, 177, 139, 1));} .postArticle.is-withAccentColors .markup--quote.is-selected {background-color: rgba(255, 177, 139, 1) !important;} body.is-withMagicUnderlines .postArticle.is-withAccentColors .markup--quote.is-selected {background-color: transparent !important; background-image: linear-gradient(to bottom, rgba(255, 177, 139, 1), rgba(255, 177, 139, 1));} .postArticle.is-withAccentColors .markup--highlight {background-color: rgba(255, 177, 139, 1) !important;} body.is-withMagicUnderlines .postArticle.is-withAccentColors .markup--highlight {background-color: transparent !important; background-image: linear-gradient(to bottom, rgba(255, 177, 139, 1), rgba(255, 177, 139, 1));}</style><style class="js-collectionStyleConstant">.u-imageBgColor {background-color: rgba(0, 0, 0, 0.24705882352941178);} .u-imageSpectrum .u-baseColor--borderLight {border-color: rgba(255, 255, 255, 0.6980392156862745) !important;} .u-imageSpectrum .u-baseColor--borderNormal {border-color: rgba(255, 255, 255, 0.8980392156862745) !important;} .u-imageSpectrum .u-baseColor--borderDark {border-color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-baseColor--iconLight .svgIcon,.u-imageSpectrum .u-baseColor--iconLight.svgIcon {fill: rgba(255, 255, 255, 0.8) !important;} .u-imageSpectrum .u-baseColor--iconNormal .svgIcon,.u-imageSpectrum .u-baseColor--iconNormal.svgIcon {fill: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-baseColor--iconDark .svgIcon,.u-imageSpectrum .u-baseColor--iconDark.svgIcon {fill: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--textNormal {color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-baseColor--textNormal.u-baseColor--textDarken:hover {color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--textDark {color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--textDarker {color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--backgroundLight {background-color: rgba(255, 255, 255, 0.8980392156862745) !important;} .u-imageSpectrum .u-baseColor--backgroundNormal {background-color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-baseColor--backgroundDark {background-color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--buttonLight {border-color: rgba(255, 255, 255, 0.6980392156862745) !important; color: rgba(255, 255, 255, 0.8) !important;} .u-imageSpectrum .u-baseColor--buttonLight:hover {border-color: rgba(255, 255, 255, 0.6980392156862745) !important;} .u-imageSpectrum .u-baseColor--buttonLight .icon:before,.u-imageSpectrum .u-baseColor--buttonLight .svgIcon {color: rgba(255, 255, 255, 0.8) !important; fill: rgba(255, 255, 255, 0.8) !important;} .u-imageSpectrum .u-baseColor--buttonDark {border-color: rgba(255, 255, 255, 0.9490196078431372) !important; color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--buttonDark:hover {border-color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--buttonDark .icon:before,.u-imageSpectrum .u-baseColor--buttonDark .svgIcon {color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--buttonNormal {border-color: rgba(255, 255, 255, 0.8980392156862745) !important; color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-baseColor--buttonNormal:hover {border-color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-baseColor--buttonNormal .icon:before,.u-imageSpectrum .u-baseColor--buttonNormal .svgIcon {color: rgba(255, 255, 255, 0.9490196078431372) !important; fill: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-baseColor--buttonDark.button--filled,.u-imageSpectrum .u-baseColor--buttonDark.button--withChrome.is-active {background-color: rgba(255, 255, 255, 1) !important; border-color: rgba(255, 255, 255, 1) !important; color: rgba(0, 0, 0, 0.24705882352941178) !important; fill: rgba(0, 0, 0, 0.24705882352941178) !important;} .u-imageSpectrum .u-baseColor--buttonNormal.button--filled,.u-imageSpectrum .u-baseColor--buttonNormal.button--withChrome.is-active {background-color: rgba(255, 255, 255, 0.9490196078431372) !important; border-color: rgba(255, 255, 255, 0.9490196078431372) !important; color: rgba(0, 0, 0, 0.24705882352941178) !important; fill: rgba(0, 0, 0, 0.24705882352941178) !important;} .u-imageSpectrum .u-baseColor--link {color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-baseColor--link.link--darkenOnHover:hover {color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--link.link--darken:hover,.u-imageSpectrum .u-baseColor--link.link--darken:focus,.u-imageSpectrum .u-baseColor--link.link--darken:active {color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--link.link--dark {color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--link.link--dark.link--darken:hover,.u-imageSpectrum .u-baseColor--link.link--dark.link--darken:focus,.u-imageSpectrum .u-baseColor--link.link--dark.link--darken:active {color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--link.link--darker {color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-baseColor--placeholderNormal ::-webkit-input-placeholder {color: rgba(255, 255, 255, 0.8);} .u-imageSpectrum .u-baseColor--placeholderNormal ::-moz-placeholder {color: rgba(255, 255, 255, 0.8);} .u-imageSpectrum .u-baseColor--placeholderNormal :-ms-input-placeholder {color: rgba(255, 255, 255, 0.8);} .u-imageSpectrum .ui-h1,.u-imageSpectrum .ui-h2,.u-imageSpectrum .ui-h3,.u-imageSpectrum .ui-h4,.u-imageSpectrum .ui-brand1,.u-imageSpectrum .ui-brand2,.u-imageSpectrum .ui-captionStrong {color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .ui-body,.u-imageSpectrum .ui-caps {color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .ui-summary,.u-imageSpectrum .ui-caption {color: rgba(255, 255, 255, 0.8) !important; fill: rgba(255, 255, 255, 0.8) !important;} .u-imageSpectrum .u-accentColor--borderLight {border-color: rgba(255, 255, 255, 0.6980392156862745) !important;} .u-imageSpectrum .u-accentColor--borderNormal {border-color: rgba(255, 255, 255, 0.8980392156862745) !important;} .u-imageSpectrum .u-accentColor--borderDark {border-color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-accentColor--iconLight .svgIcon,.u-imageSpectrum .u-accentColor--iconLight.svgIcon {fill: rgba(255, 255, 255, 0.8) !important;} .u-imageSpectrum .u-accentColor--iconNormal .svgIcon,.u-imageSpectrum .u-accentColor--iconNormal.svgIcon {fill: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-accentColor--iconDark .svgIcon,.u-imageSpectrum .u-accentColor--iconDark.svgIcon {fill: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-accentColor--textNormal {color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-accentColor--hoverTextNormal:hover {color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-accentColor--textNormal.u-accentColor--textDarken:hover {color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-accentColor--textDark {color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-accentColor--backgroundLight {background-color: rgba(255, 255, 255, 0.8980392156862745) !important;} .u-imageSpectrum .u-accentColor--backgroundNormal {background-color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-accentColor--backgroundDark {background-color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-accentColor--buttonDark {border-color: rgba(255, 255, 255, 0.9490196078431372) !important; color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-accentColor--buttonDark:hover {border-color: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-accentColor--buttonDark .icon:before,.u-imageSpectrum .u-accentColor--buttonDark .svgIcon{color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .u-imageSpectrum .u-accentColor--buttonNormal:not(.clapButton--largePill) {border-color: rgba(255, 255, 255, 0.8980392156862745) !important; color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-accentColor--buttonNormal:hover {border-color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-accentColor--buttonNormal .icon:before,.u-imageSpectrum .u-accentColor--buttonNormal .svgIcon{color: rgba(255, 255, 255, 0.9490196078431372) !important; fill: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-accentColor--buttonNormal.button--filled .icon:before,.u-imageSpectrum .u-accentColor--buttonNormal.button--filled .svgIcon{color: rgba(0, 0, 0, 0.24705882352941178) !important; fill: rgba(0, 0, 0, 0.24705882352941178) !important;} .u-imageSpectrum .u-accentColor--buttonDark.button--filled,.u-imageSpectrum .u-accentColor--buttonDark.button--withChrome.is-active,.u-imageSpectrum .u-accentColor--fillWhenActive.is-active {background-color: rgba(255, 255, 255, 1) !important; border-color: rgba(255, 255, 255, 1) !important; color: rgba(0, 0, 0, 0.24705882352941178) !important; fill: rgba(0, 0, 0, 0.24705882352941178) !important;} .u-imageSpectrum .u-accentColor--buttonNormal.button--filled:not(.clapButton--largePill),.u-imageSpectrum .u-accentColor--buttonNormal.button--withChrome.is-active:not(.clapButton--largePill) {background-color: rgba(255, 255, 255, 0.9490196078431372) !important; border-color: rgba(255, 255, 255, 0.9490196078431372) !important; color: rgba(0, 0, 0, 0.24705882352941178) !important; fill: rgba(0, 0, 0, 0.24705882352941178) !important;} .u-imageSpectrum .postArticle.is-withAccentColors .markup--user,.u-imageSpectrum .postArticle.is-withAccentColors .markup--query {color: rgba(255, 255, 255, 0.9490196078431372) !important;} .u-imageSpectrum .u-accentColor--highlightFaint {background-color: rgba(255, 255, 255, 0.2) !important;} .u-imageSpectrum .u-accentColor--highlightStrong.is-active .svgIcon {fill: rgba(255, 255, 255, 0.6) !important;} .postArticle.is-withAccentColors .u-imageSpectrum .markup--quote.is-other {background-color: rgba(255, 255, 255, 0.2) !important;} body.is-withMagicUnderlines .postArticle.is-withAccentColors .u-imageSpectrum .markup--quote.is-other {background-color: transparent !important; background-image: linear-gradient(to bottom, rgba(255, 255, 255, 0.2), rgba(255, 255, 255, 0.2));} .postArticle.is-withAccentColors .u-imageSpectrum .markup--quote.is-me {background-color: rgba(255, 255, 255, 0.4) !important;} body.is-withMagicUnderlines .postArticle.is-withAccentColors .u-imageSpectrum .markup--quote.is-me {background-color: transparent !important; background-image: linear-gradient(to bottom, rgba(255, 255, 255, 0.4), rgba(255, 255, 255, 0.4));} .postArticle.is-withAccentColors .u-imageSpectrum .markup--quote.is-targeted {background-color: rgba(255, 255, 255, 0.6) !important;} body.is-withMagicUnderlines .postArticle.is-withAccentColors .u-imageSpectrum .markup--quote.is-targeted {background-color: transparent !important; background-image: linear-gradient(to bottom, rgba(255, 255, 255, 0.6), rgba(255, 255, 255, 0.6));} .postArticle.is-withAccentColors .u-imageSpectrum .markup--quote.is-selected {background-color: rgba(255, 255, 255, 0.6) !important;} body.is-withMagicUnderlines .postArticle.is-withAccentColors .u-imageSpectrum .markup--quote.is-selected {background-color: transparent !important; background-image: linear-gradient(to bottom, rgba(255, 255, 255, 0.6), rgba(255, 255, 255, 0.6));} .postArticle.is-withAccentColors .u-imageSpectrum .markup--highlight {background-color: rgba(255, 255, 255, 0.6) !important;} body.is-withMagicUnderlines .postArticle.is-withAccentColors .u-imageSpectrum .markup--highlight {background-color: transparent !important; background-image: linear-gradient(to bottom, rgba(255, 255, 255, 0.6), rgba(255, 255, 255, 0.6));}.u-resetSpectrum .u-tintBgColor {background-color: rgba(255, 255, 255, 1) !important;}.u-resetSpectrum .u-tintBgColor .u-fadeLeft:before {background-image: linear-gradient(to right, rgba(255, 255, 255, 1) 0%, rgba(255, 255, 255, 0) 100%) !important;}.u-resetSpectrum .u-tintBgColor .u-fadeRight:after {background-image: linear-gradient(to right, rgba(255, 255, 255, 0) 0%, rgba(255, 255, 255, 1) 100%) !important;} .u-resetSpectrum .u-baseColor--borderLight {border-color: rgba(0, 0, 0, 0.2980392156862745) !important;} .u-resetSpectrum .u-baseColor--borderNormal {border-color: rgba(0, 0, 0, 0.4980392156862745) !important;} .u-resetSpectrum .u-baseColor--borderDark {border-color: rgba(0, 0, 0, 0.6) !important;} .u-resetSpectrum .u-baseColor--iconLight .svgIcon,.u-resetSpectrum .u-baseColor--iconLight.svgIcon {fill: rgba(0, 0, 0, 0.2980392156862745) !important;} .u-resetSpectrum .u-baseColor--iconNormal .svgIcon,.u-resetSpectrum .u-baseColor--iconNormal.svgIcon {fill: rgba(0, 0, 0, 0.4980392156862745) !important;} .u-resetSpectrum .u-baseColor--iconDark .svgIcon,.u-resetSpectrum .u-baseColor--iconDark.svgIcon {fill: rgba(0, 0, 0, 0.6) !important;} .u-resetSpectrum .u-baseColor--textNormal {color: rgba(0, 0, 0, 0.4980392156862745) !important;} .u-resetSpectrum .u-baseColor--textNormal.u-baseColor--textDarken:hover {color: rgba(0, 0, 0, 0.6) !important;} .u-resetSpectrum .u-baseColor--textDark {color: rgba(0, 0, 0, 0.6) !important;} .u-resetSpectrum .u-baseColor--textDarker {color: rgba(0, 0, 0, 0.8) !important;} .u-resetSpectrum .u-baseColor--backgroundLight {background-color: rgba(0, 0, 0, 0.09803921568627451) !important;} .u-resetSpectrum .u-baseColor--backgroundNormal {background-color: rgba(0, 0, 0, 0.2) !important;} .u-resetSpectrum .u-baseColor--backgroundDark {background-color: rgba(0, 0, 0, 0.2980392156862745) !important;} .u-resetSpectrum .u-baseColor--buttonLight {border-color: rgba(0, 0, 0, 0.2980392156862745) !important; color: rgba(0, 0, 0, 0.2980392156862745) !important;} .u-resetSpectrum .u-baseColor--buttonLight:hover {border-color: rgba(0, 0, 0, 0.2980392156862745) !important;} .u-resetSpectrum .u-baseColor--buttonLight .icon:before,.u-resetSpectrum .u-baseColor--buttonLight .svgIcon {color: rgba(0, 0, 0, 0.2980392156862745) !important; fill: rgba(0, 0, 0, 0.2980392156862745) !important;} .u-resetSpectrum .u-baseColor--buttonDark {border-color: rgba(0, 0, 0, 0.6) !important; color: rgba(0, 0, 0, 0.6) !important;} .u-resetSpectrum .u-baseColor--buttonDark:hover {border-color: rgba(0, 0, 0, 0.8) !important;} .u-resetSpectrum .u-baseColor--buttonDark .icon:before,.u-resetSpectrum .u-baseColor--buttonDark .svgIcon {color: rgba(0, 0, 0, 0.6) !important; fill: rgba(0, 0, 0, 0.6) !important;} .u-resetSpectrum .u-baseColor--buttonNormal {border-color: rgba(0, 0, 0, 0.4980392156862745) !important; color: rgba(0, 0, 0, 0.4980392156862745) !important;} .u-resetSpectrum .u-baseColor--buttonNormal:hover {border-color: rgba(0, 0, 0, 0.6) !important;} .u-resetSpectrum .u-baseColor--buttonNormal .icon:before,.u-resetSpectrum .u-baseColor--buttonNormal .svgIcon {color: rgba(0, 0, 0, 0.4980392156862745) !important; fill: rgba(0, 0, 0, 0.4980392156862745) !important;} .u-resetSpectrum .u-baseColor--buttonDark.button--filled,.u-resetSpectrum .u-baseColor--buttonDark.button--withChrome.is-active {background-color: rgba(0, 0, 0, 0.2980392156862745) !important; border-color: rgba(0, 0, 0, 0.2980392156862745) !important; color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .u-resetSpectrum .u-baseColor--buttonNormal.button--filled,.u-resetSpectrum .u-baseColor--buttonNormal.button--withChrome.is-active {background-color: rgba(0, 0, 0, 0.2) !important; border-color: rgba(0, 0, 0, 0.2) !important; color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .u-resetSpectrum .u-baseColor--link {color: rgba(0, 0, 0, 0.4980392156862745) !important;} .u-resetSpectrum .u-baseColor--link.link--darkenOnHover:hover {color: rgba(0, 0, 0, 0.6) !important;} .u-resetSpectrum .u-baseColor--link.link--darken:hover,.u-resetSpectrum .u-baseColor--link.link--darken:focus,.u-resetSpectrum .u-baseColor--link.link--darken:active {color: rgba(0, 0, 0, 0.6) !important;} .u-resetSpectrum .u-baseColor--link.link--dark {color: rgba(0, 0, 0, 0.6) !important;} .u-resetSpectrum .u-baseColor--link.link--dark.link--darken:hover,.u-resetSpectrum .u-baseColor--link.link--dark.link--darken:focus,.u-resetSpectrum .u-baseColor--link.link--dark.link--darken:active {color: rgba(0, 0, 0, 0.8) !important;} .u-resetSpectrum .u-baseColor--link.link--darker {color: rgba(0, 0, 0, 0.8) !important;} .u-resetSpectrum .u-baseColor--placeholderNormal ::-webkit-input-placeholder {color: rgba(0, 0, 0, 0.2980392156862745);} .u-resetSpectrum .u-baseColor--placeholderNormal ::-moz-placeholder {color: rgba(0, 0, 0, 0.2980392156862745);} .u-resetSpectrum .u-baseColor--placeholderNormal :-ms-input-placeholder {color: rgba(0, 0, 0, 0.2980392156862745);} .u-resetSpectrum .ui-h1,.u-resetSpectrum .ui-h2,.u-resetSpectrum .ui-h3,.u-resetSpectrum .ui-h4,.u-resetSpectrum .ui-brand1,.u-resetSpectrum .ui-brand2,.u-resetSpectrum .ui-captionStrong {color: rgba(0, 0, 0, 0.8) !important; fill: rgba(0, 0, 0, 0.8) !important;} .u-resetSpectrum .ui-body,.u-resetSpectrum .ui-caps {color: rgba(0, 0, 0, 0.6) !important; fill: rgba(0, 0, 0, 0.6) !important;} .u-resetSpectrum .ui-summary,.u-resetSpectrum .ui-caption {color: rgba(0, 0, 0, 0.2980392156862745) !important; fill: rgba(0, 0, 0, 0.2980392156862745) !important;} .u-resetSpectrum .u-accentColor--borderLight {border-color: rgba(26, 137, 23, 1) !important;} .u-resetSpectrum .u-accentColor--borderNormal {border-color: rgba(26, 137, 23, 1) !important;} .u-resetSpectrum .u-accentColor--borderDark {border-color: rgba(17, 128, 14, 1) !important;} .u-resetSpectrum .u-accentColor--iconLight .svgIcon,.u-resetSpectrum .u-accentColor--iconLight.svgIcon {fill: rgba(26, 137, 23, 1) !important;} .u-resetSpectrum .u-accentColor--iconNormal .svgIcon,.u-resetSpectrum .u-accentColor--iconNormal.svgIcon {fill: rgba(17, 128, 14, 1) !important;} .u-resetSpectrum .u-accentColor--iconDark .svgIcon,.u-resetSpectrum .u-accentColor--iconDark.svgIcon {fill: rgba(15, 115, 12, 1) !important;} .u-resetSpectrum .u-accentColor--textNormal {color: rgba(17, 128, 14, 1) !important;} .u-resetSpectrum .u-accentColor--hoverTextNormal:hover {color: rgba(17, 128, 14, 1) !important;} .u-resetSpectrum .u-accentColor--textNormal.u-accentColor--textDarken:hover {color: rgba(15, 115, 12, 1) !important;} .u-resetSpectrum .u-accentColor--textDark {color: rgba(15, 115, 12, 1) !important;} .u-resetSpectrum .u-accentColor--backgroundLight {background-color: rgba(26, 137, 23, 1) !important;} .u-resetSpectrum .u-accentColor--backgroundNormal {background-color: rgba(17, 128, 14, 1) !important;} .u-resetSpectrum .u-accentColor--backgroundDark {background-color: rgba(15, 115, 12, 1) !important;} .u-resetSpectrum .u-accentColor--buttonDark {border-color: rgba(17, 128, 14, 1) !important; color: rgba(15, 115, 12, 1) !important;} .u-resetSpectrum .u-accentColor--buttonDark:hover {border-color: rgba(15, 115, 12, 1) !important;} .u-resetSpectrum .u-accentColor--buttonDark .icon:before,.u-resetSpectrum .u-accentColor--buttonDark .svgIcon{color: rgba(15, 115, 12, 1) !important; fill: rgba(15, 115, 12, 1) !important;} .u-resetSpectrum .u-accentColor--buttonNormal:not(.clapButton--largePill) {border-color: rgba(26, 137, 23, 1) !important; color: rgba(17, 128, 14, 1) !important;} .u-resetSpectrum .u-accentColor--buttonNormal:hover {border-color: rgba(17, 128, 14, 1) !important;} .u-resetSpectrum .u-accentColor--buttonNormal .icon:before,.u-resetSpectrum .u-accentColor--buttonNormal .svgIcon{color: rgba(17, 128, 14, 1) !important; fill: rgba(17, 128, 14, 1) !important;} .u-resetSpectrum .u-accentColor--buttonNormal.button--filled .icon:before,.u-resetSpectrum .u-accentColor--buttonNormal.button--filled .svgIcon{color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .u-resetSpectrum .u-accentColor--buttonDark.button--filled,.u-resetSpectrum .u-accentColor--buttonDark.button--withChrome.is-active,.u-resetSpectrum .u-accentColor--fillWhenActive.is-active {background-color: rgba(15, 115, 12, 1) !important; border-color: rgba(15, 115, 12, 1) !important; color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .u-resetSpectrum .u-accentColor--buttonNormal.button--filled:not(.clapButton--largePill),.u-resetSpectrum .u-accentColor--buttonNormal.button--withChrome.is-active:not(.clapButton--largePill) {background-color: rgba(17, 128, 14, 1) !important; border-color: rgba(17, 128, 14, 1) !important; color: rgba(255, 255, 255, 1) !important; fill: rgba(255, 255, 255, 1) !important;} .u-resetSpectrum .postArticle.is-withAccentColors .markup--user,.u-resetSpectrum .postArticle.is-withAccentColors .markup--query {color: rgba(17, 128, 14, 1) !important;}</style><div class="js-collectionFooter u-hide"><div class="container u-maxWidth1040"><div class="u-marginTop10 u-paddingTop10 u-paddingBottom30 u-borderTopLighter"><div class="linkSet u-clearfix"><div class="u-floatRight u-textColorNormal u-baseColor--textNormal u-xs-floatLeft"><a class="button button--chromeless u-baseColor--buttonNormal u-marginLeft15 u-lineHeight35 u-xs-block u-xs-marginLeft0" href="https://medium.com/mitre-attack/about" title="About MITRE ATT&CK®" aria-label="About MITRE ATT&CK®">About MITRE ATT&CK®</a><span class="middotDivider u-xs-hide"></span><a class="button button--chromeless u-baseColor--buttonNormal u-lineHeight35 u-xs-block" href="https://medium.com/mitre-attack/latest" title="Latest Stories for MITRE ATT&CK®" aria-label="Latest Stories for MITRE ATT&CK®">Latest Stories</a><span class="middotDivider u-xs-hide"></span><a class="button button--chromeless u-baseColor--buttonNormal u-lineHeight35 u-xs-block" href="https://medium.com/mitre-attack/archive" title="Archive for MITRE ATT&CK®" aria-label="Archive for MITRE ATT&CK®">Archive</a><span class="middotDivider u-xs-hide"></span><a class="button button--chromeless u-baseColor--buttonNormal u-lineHeight35 u-xs-block" href="https://medium.com/about">About Medium</a><span class="middotDivider u-xs-hide"></span><a class="button button--chromeless u-baseColor--buttonNormal u-lineHeight35 u-xs-block" href="https://policy.medium.com/medium-terms-of-service-9db0094a1e0f">Terms</a><span class="middotDivider u-xs-hide"></span><a class="button button--chromeless u-baseColor--buttonNormal u-lineHeight35 u-xs-block" href="https://policy.medium.com/medium-privacy-policy-f03bf92035c9">Privacy</a><span class="middotDivider u-xs-hide"></span><a class="button button--chromeless u-baseColor--buttonNormal u-lineHeight35 u-xs-block" href="https://medium.com/business">Teams</a></div></div></div></div></div></div></div></div><div class="loadingBar"></div><script>// <![CDATA[ window["obvInit"] = function (opt_embedded) {window["obvInit"]["embedded"] = opt_embedded; window["obvInit"]["ready"] = true;} // ]]></script><script>// <![CDATA[ var GLOBALS = {"audioUrl":"https://d1fcbxp97j4nb2.cloudfront.net","baseUrl":"https://medium.com","buildLabel":"20241122-2326-root","currentUser":{"userId":"lo_ae8a8cba9697","isVerified":false,"subscriberEmail":"","hasPastMemberships":false,"isEnrolledInHightower":false,"isEligibleForHightower":true,"hightowerLastLockedAt":0,"isWriterProgramEnrolled":true,"isWriterProgramInvited":false,"isWriterProgramOptedOut":false,"writerProgramVersion":0,"writerProgramEnrolledAt":0,"friendLinkOnboarding":0,"hasAdditionalUnlocks":false,"hasApiAccess":false,"writerProgramDistributionSettingOptedIn":false,"isSuspended":false,"collectionOnboardingSeen":0,"atsQualifiedAt":0},"currentUserHasUnverifiedEmail":false,"isAuthenticated":false,"isCurrentUserVerified":false,"miroUrl":"https://cdn-images-1.medium.com","moduleUrls":{"base":"https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.jgL7zdhxfcJMjkJjEjB6xg.12.js","common-async":"https://cdn-static-1.medium.com/_/fp/gen-js/main-common-async.bundle.fULbttUzdHyewyAazMUYXw.12.js","hightower":"https://cdn-static-1.medium.com/_/fp/gen-js/main-hightower.bundle.NQoDXJuDHPBqR63_AdMDaA.12.js","home-screens":"https://cdn-static-1.medium.com/_/fp/gen-js/main-home-screens.bundle.m76-07Q1DcEMKgEwzJjhDA.12.js","misc-screens":"https://cdn-static-1.medium.com/_/fp/gen-js/main-misc-screens.bundle.2CLT5j6rDReEhG2bjr3NdA.12.js","notes":"https://cdn-static-1.medium.com/_/fp/gen-js/main-notes.bundle.yrGWoeoBrJB7GBGv--gr1g.12.js","payments":"https://cdn-static-1.medium.com/_/fp/gen-js/main-payments.bundle.Cc_nfCICljMx7aW6-Pr_9w.12.js","posters":"https://cdn-static-1.medium.com/_/fp/gen-js/main-posters.bundle.QCX6B3q-KqcSv8hiUNsQ9Q.12.js","power-readers":"https://cdn-static-1.medium.com/_/fp/gen-js/main-power-readers.bundle.nxgYPC9-BrhdicIoMMuzoA.12.js","pubs":"https://cdn-static-1.medium.com/_/fp/gen-js/main-pubs.bundle.SOwTEi0SkdYAS9MQpioQXw.12.js","stats":"https://cdn-static-1.medium.com/_/fp/gen-js/main-stats.bundle.hA1c7rerc_dk3N05UG54qQ.12.js"},"previewConfig":{"weightThreshold":1,"weightImageParagraph":0.51,"weightIframeParagraph":0.8,"weightTextParagraph":0.08,"weightEmptyParagraph":0,"weightP":0.003,"weightH":0.005,"weightBq":0.003,"minPTextLength":60,"truncateBoundaryChars":20,"detectTitle":true,"detectTitleLevThreshold":0.15},"productName":"Medium","supportsEdit":false,"termsUrl":"//policy.medium.com/medium-terms-of-service-9db0094a1e0f","textshotHost":"textshot.textshot-production.svc.cluster.local","transactionId":"1732420577668:1c9f20c0ea73","useragent":{"browser":"ie","family":"ie","os":"windows","version":7,"supportsDesktopEdit":false,"supportsInteract":false,"supportsView":true,"isMobile":false,"isTablet":false,"isNative":false,"supportsFileAPI":false,"isTier1":false,"clientVersion":"","clientChannel":"","supportsRealScrollEvents":false,"supportsVhUnits":false,"ruinsViewportSections":false,"supportsHtml5Video":false,"supportsMagicUnderlines":false,"isWebView":false,"isFacebookWebView":false,"supportsProgressiveMedia":false,"supportsPromotedPosts":true,"isBot":false,"isNativeIphone":false,"supportsCssVariables":false,"supportsVideoSections":true,"emojiSupportLevel":1,"isSearchBot":false,"isSyndicationBot":false,"isNativeAndroid":false,"isNativeIos":false,"isSeoAuditBot":false,"isInternalApp":false,"supportsApplePay":false,"supportsScrollableMetabar":false},"variants":{"allow_access":true,"allow_signup":true,"allow_test_auth":"disallow","android_enable_editor_new_publishing_flow":true,"android_enable_friend_links_creation":true,"android_enable_friend_links_postpage_banners":true,"android_enable_image_sharer":true,"android_enable_lists_v2":true,"android_enable_syntax_highlight":true,"android_enable_topic_portals":true,"android_rating_prompt_stories_read_threshold":2,"android_two_hour_refresh":true,"available_annual_plan":"2c754bcc2995","available_annual_premium_plan":"4a442ace1476","available_monthly_plan":"60e220181034","available_monthly_premium_plan":"12a660186432","browsable_stream_config_bucket":"curated-topics","can_receive_tips_v0":true,"can_send_tips_v0":true,"coronavirus_topic_recirc":true,"disable_partner_program_enrollment":true,"enable_abandoned_cart_promotion_email":true,"enable_android_dynamic_aspirational_paywall":true,"enable_android_dynamic_programming_paywall":true,"enable_android_miro_v2":true,"enable_android_offline_reading":true,"enable_android_verified_author":true,"enable_app_flirty_thirty":true,"enable_apple_sign_in":true,"enable_apple_webhook":true,"enable_aurora_pub_follower_page":true,"enable_author_cards":true,"enable_author_cards_byline":true,"enable_auto_follow_on_subscribe":true,"enable_automod":true,"enable_bayesian_average_pub_search":true,"enable_bg_post_post":true,"enable_billing_frequency_on_step2":"control","enable_boost_nia_v01":true,"enable_braintree_apple_pay":true,"enable_braintree_client":true,"enable_braintree_google_pay":true,"enable_braintree_integration":true,"enable_braintree_paypal":true,"enable_braintree_trial_membership":true,"enable_braintree_webhook":true,"enable_branch_io":true,"enable_cache_less_following_feed":true,"enable_configure_pronouns":true,"enable_conversion_model_v2":"group_2","enable_conversion_ranker_v2":"control","enable_creator_welcome_email":true,"enable_deprecate_legacy_providers_v3":true,"enable_diversification_rex":true,"enable_entities_to_follow_v2":true,"enable_eventstats_event_processing":true,"enable_explicit_signals":true,"enable_explicit_signals_updated_post_previews":true,"enable_footer_app_buttons":true,"enable_google_one_tap":true,"enable_google_webhook":true,"enable_group_gifting":true,"enable_iceland_forced_android":true,"enable_import":true,"enable_intrinsic_automatic_actions":true,"enable_ios_autorefresh":true,"enable_ios_dynamic_paywall_aspiriational":true,"enable_ios_dynamic_paywall_programming":true,"enable_ios_easy_resubscribe":true,"enable_ios_offline_reading":true,"enable_legacy_feed_in_iceland":true,"enable_lite_archive_page":true,"enable_lite_continue_this_thread":true,"enable_lite_homepage":true,"enable_lite_response_markup":true,"enable_lite_server_upstream_deadlines":true,"enable_lo_homepage":"control","enable_maim_the_meter":true,"enable_marketing_emails":true,"enable_mastodon_avatar_upload":true,"enable_mastodon_for_members":true,"enable_mastodon_for_members_username_selection":true,"enable_medium2_kbfd":true,"enable_members_only_audio":true,"enable_ml_rank_rex_anno":true,"enable_moc_load_processor_all_recs_surfaces":true,"enable_moc_load_processor_c":true,"enable_moc_load_processor_first_story":true,"enable_new_manage_membership_flow":true,"enable_new_stripe_customers":true,"enable_newsletter_lo_flow_custom_domains":true,"enable_pill_based_home_feed":true,"enable_post_bottom_responses":true,"enable_post_bottom_responses_input":true,"enable_pp_country_expansion":true,"enable_pp_v4":true,"enable_pre_pp_v4":true,"enable_premium_tier":true,"enable_premium_tier_badge":true,"enable_publication_hierarchy_web":true,"enable_ranker_v10":"control","enable_recaptcha_enterprise":true,"enable_recirc_model":true,"enable_recommended_publishers_query":true,"enable_rex_aggregator_v2":true,"enable_rex_new_push_notification_endpoint":true,"enable_rex_reading_history":true,"enable_rito_upstream_deadlines":true,"enable_seamless_social_sharing":true,"enable_see_pronouns":true,"enable_sharer_create_post_share_key":true,"enable_sharer_validate_post_share_key":true,"enable_simplified_digest_v2_b":true,"enable_speechify_ios":true,"enable_speechify_widget":true,"enable_sprig":true,"enable_starspace":true,"enable_susi_redesign_android":true,"enable_susi_redesign_ios":true,"enable_switch_plan_premium_tier":true,"enable_tag_recs":true,"enable_tick_landing_page":true,"enable_tipping_v0_android":true,"enable_tipping_v0_ios":true,"enable_tribute_landing_page":true,"enable_update_explore_wtf":true,"enable_update_topic_portals_wtf":true,"enable_updated_pub_recs_ui":true,"enable_verifications_service":true,"glyph_font_set":"m2-unbound-source-serif-pro","goliath_externalsearch_enable_comment_deindexation":true,"ios_display_paywall_after_onboarding":true,"ios_enable_friend_links_creation":true,"ios_enable_friend_links_postpage_banners":true,"ios_enable_home_post_menu":true,"ios_enable_lock_responses":true,"ios_enable_verified_book_author":true,"ios_iceland_nux":true,"ios_in_app_free_trial":true,"ios_remove_twitter_onboarding_step":true,"ios_social_share_sheet":true,"limit_post_referrers":true,"limit_user_follows":true,"mobile_custom_app_icon":true,"num_post_bottom_responses_to_show":"1","onboarding_tags_from_top_views":true,"reader_fair_distribution_non_qp":true,"redefined_top_posts":true,"reengagement_notification_duration":3,"rex_generator_max_candidates":1000,"signin_services":"twitter,facebook,google,email,google-fastidv,google-one-tap,apple","signup_services":"twitter,facebook,google,email,google-fastidv,google-one-tap,apple","skip_fs_cache_user_vals":true},"xsrfToken":"","iosAppId":"828256236","supportEmail":"yourfriends@medium.com","fp":{"/icons/monogram-mask.svg":"https://cdn-static-1.medium.com/_/fp/icons/monogram-mask.KPLCSFEZviQN0jQ7veN2RQ.12.svg","/icons/favicon-medium-editor.ico":"https://cdn-static-1.medium.com/_/fp/icons/favicon-medium-editor.PiakrZWB7Yb80quUVQWM6g.12.ico"},"authBaseUrl":"https://medium.com","imageUploadSizeMb":25,"isAuthDomainRequest":true,"algoliaApiEndpoint":"https://MQ57UUUQZ2-dsn.algolia.net","algoliaAppId":"MQ57UUUQZ2","algoliaSearchOnlyApiKey":"394474ced050e3911ae2249ecc774921","iosAppStoreUrl":"https://itunes.apple.com/app/medium-everyones-stories/id828256236?pt=698524&mt=8","iosAppLinkBaseUrl":"medium:","algoliaIndexPrefix":"medium_","androidPlayStoreUrl":"https://play.google.com/store/apps/details?id=com.medium.reader","googleClientId":"216296035834-k1k6qe060s2tp2a2jam4ljdcms00sttg.apps.googleusercontent.com","androidPackage":"com.medium.reader","androidPlayStoreMarketScheme":"market://details?id=com.medium.reader","googleAuthUri":"https://accounts.google.com/o/oauth2/auth","androidScheme":"medium","layoutData":{"useDynamicScripts":false,"googleAnalyticsTrackingCode":"G-7JY7T788PK","jsShivUrl":"https://cdn-static-1.medium.com/_/fp/js/shiv.RI2ePTZ5gFmMgLzG5bEVAA.12.js","useDynamicCss":false,"faviconUrl":"https://miro.medium.com/v2/5d8de952517e8160e40ef9841c781cdc14a5db313057fa3c3de41c6f5b494b19","faviconImageId":"5d8de952517e8160e40ef9841c781cdc14a5db313057fa3c3de41c6f5b494b19","fontSets":[{"id":8,"url":"https://glyph.medium.com/css/e/sr/latin/e/ssr/latin/e/ssb/latin/m2-unbound-source-serif-pro.css"},{"id":11,"url":"https://glyph.medium.com/css/m2-unbound-source-serif-pro.css"},{"id":9,"url":"https://glyph.medium.com/css/mkt.css"}],"glyphUrl":"https://glyph.medium.com"},"authBaseUrlRev":"moc.muidem//:sptth","stripePublishableKey":"pk_live_7FReX44VnNIInZwrIIx6ghjl","archiveUploadSizeMb":100,"previewConfig2":{"weightThreshold":1,"weightImageParagraph":0.05,"raiseImage":true,"enforceHeaderHierarchy":true,"isImageInsetRight":true},"isAmp":false,"iosScheme":"medium","facebook":{"key":"542599432471018","namespace":"medium-com","scope":{"default":["public_profile","email"],"connect":["public_profile","email"],"login":["public_profile","email"],"share":["public_profile","email"]}},"memberContentTopicId":"13d7efd82fb2","audioContentTopicId":"3792abbd134","isDoNotAuth":false,"buggle":{"videoUrl":"https://cdn-videos-1.medium.com","audioUrl":"https://cdn-audio-1.medium.com"},"referrerType":5,"partnerProgramEmail":"partnerprogram@medium.com","recaptchaKey":"6Lfc37IUAAAAAKGGtC6rLS13R1Hrw_BqADfS1LRk","countryCode":"SG","bypassMeter":false,"branchKey":"key_live_ofxXr2qTrrU9NqURK8ZwEhknBxiI6KBm","paypal":{"clientMode":"production","oneYearGift":{"name":"Medium Membership (1 Year, Digital Gift Code)","description":"Unlimited access to the best and brightest stories on Medium. Gift codes can be redeemed at medium.com/redeem.","price":"50.00","currency":"USD","sku":"membership-gift-1-yr"}},"collectionConfig":{"mediumOwnedAndOperatedCollectionIds":["8a9336e5bb4","b7e45b22fec3","193b68bd4fba","8d6b8a439e32","54c98c43354d","3f6ecf56618","d944778ce714","92d2092dc598","ae2a65f35510","1285ba81cada","544c7006046e","fc8964313712","40187e704f1c","88d9857e584e","7b6769f2748b","bcc38c8f6edf","cef6983b292","cb8577c9149e","444d13b52878","713d7dbc99b0","ef8e90590e66","191186aaafa0","55760f21cdc5","9dc80918cc93","bdc4052bbdba","8ccfed20cbb2"]},"bypassMeterWithShareKey":false,"recaptcha3Key":"6Lf8R9wUAAAAABMI_85Wb8melS7Zj6ziuf99Yot5","braintreeClientKey":"production_zjkj96jm_m56f8fqpf7ngnrd4","cdcMessaging":[{"text":"For more information on the novel coronavirus and Covid-19, visit ","href":"","type":"text","start":0,"end":0},{"text":"cdc.gov","href":"https://www.cdc.gov/coronavirus/2019-nCoV","type":"link","start":66,"end":73},{"text":".","href":"","type":"text","start":0,"end":0}],"braintree":{"merchantId":"m56f8fqpf7ngnrd4"},"diagnostics":{},"domain":"medium.com"} // ]]></script><script charset="UTF-8" src="https://cdn-static-1.medium.com/_/fp/gen-js/main-base.bundle.jgL7zdhxfcJMjkJjEjB6xg.12.js" async></script><script>// <![CDATA[ window["obvInit"]({"references":{"Collection":{"6da19bd08fba":{"id":"6da19bd08fba","name":"MITRE ATT&CK®","slug":"mitre-attack","tags":["CYBERSECURITY","THREAT INTELLIGENCE","THREAT HUNTING","RED TEAM","INCIDENT RESPONSE"],"creatorId":"37fd2c032d44","description":"This is the official blog for MITRE ATT&CK®, the MITRE-developed, globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The full website is located at https://attack.mitre.org.","shortDescription":"This is the official blog for MITRE ATT&CK®, the…","image":{"imageId":"1*Y6LKGEIzmF96lVHkv_RS9A.png","filter":"","backgroundSize":"","originalWidth":1162,"originalHeight":1162,"strategy":"resample","height":0,"width":0},"metadata":{"followerCount":6517,"activeAt":1730389403805},"virtuals":{"permissions":{"canPublish":false,"canPublishAll":false,"canRepublish":false,"canRemove":false,"canManageAll":false,"canSubmit":false,"canEditPosts":false,"canAddWriters":false,"canViewStats":false,"canSendNewsletter":false,"canViewLockedPosts":false,"canViewCloaked":false,"canEditOwnPosts":false,"canBeAssignedAuthor":false,"canEnrollInHightower":false,"canLockPostsForMediumMembers":false,"canLockOwnPostsForMediumMembers":false,"canViewNewsletterV2Stats":false,"canCreateNewsletterV3":false},"isSubscribed":false,"isEnrolledInHightower":false,"isEligibleForHightower":false,"isSubscribedToCollectionEmails":false,"isMuted":false,"canToggleEmail":false,"isWriter":false},"logo":{"imageId":"1*8epIYX1PfgfnVfDYfZ5loQ.png","filter":"","backgroundSize":"","originalWidth":796,"originalHeight":164,"strategy":"resample","height":0,"width":0},"twitterUsername":"mitreattack","publicEmail":"attack@mitre.org","sections":[{"type":2,"collectionHeaderMetadata":{"title":"MITRE ATT&CK®","backgroundImage":{},"logoImage":{},"alignment":2,"layout":4}},{"type":1,"postListMetadata":{"source":3,"layout":4,"number":1,"postIds":["d9fca6ce4c58"]}},{"type":1,"postListMetadata":{"source":1,"layout":4,"number":24,"postIds":[]}},{"type":1,"postListMetadata":{"source":1,"layout":4,"number":15,"postIds":[],"sectionHeader":"Latest"}},{"type":1,"postListMetadata":{"source":1,"layout":4,"number":24,"postIds":[],"sectionHeader":"Latest"}}],"tintColor":"#FFC63F1D","lightText":false,"favicon":{"imageId":"","filter":"","backgroundSize":"","originalWidth":0,"originalHeight":0,"strategy":"resample","height":0,"width":0},"colorPalette":{"defaultBackgroundSpectrum":{"colorPoints":[{"color":"#FFDA4E2A","point":0},{"color":"#FFCA4A29","point":0.1},{"color":"#FFB94628","point":0.2},{"color":"#FFA84227","point":0.3},{"color":"#FF973D25","point":0.4},{"color":"#FF863823","point":0.5},{"color":"#FF753220","point":0.6},{"color":"#FF632B1C","point":0.7},{"color":"#FF512417","point":0.8},{"color":"#FF3E1B12","point":0.9},{"color":"#FF2A120B","point":1}],"backgroundColor":"#FFFFFFFF"},"tintBackgroundSpectrum":{"colorPoints":[{"color":"#FFC63F1D","point":0},{"color":"#FFD65331","point":0.1},{"color":"#FFE46644","point":0.2},{"color":"#FFF17858","point":0.3},{"color":"#FFFC8B6B","point":0.4},{"color":"#FFFF9C7F","point":0.5},{"color":"#FFFFAE93","point":0.6},{"color":"#FFFFBFA7","point":0.7},{"color":"#FFFFD0BB","point":0.8},{"color":"#FFFFE1D0","point":0.9},{"color":"#FFFFF2E4","point":1}],"backgroundColor":"#FFC63F1D"},"highlightSpectrum":{"colorPoints":[{"color":"#FFFFE3D3","point":0},{"color":"#FFFFDECB","point":0.1},{"color":"#FFFFD9C4","point":0.2},{"color":"#FFFFD4BD","point":0.3},{"color":"#FFFFD0B5","point":0.4},{"color":"#FFFFCBAE","point":0.5},{"color":"#FFFFC6A7","point":0.6},{"color":"#FFFFC1A0","point":0.7},{"color":"#FFFFBC99","point":0.8},{"color":"#FFFFB792","point":0.9},{"color":"#FFFFB18B","point":1}],"backgroundColor":"#FFFFFFFF"},"darkBackgroundSpectrum":{"colorPoints":[{"color":"#FFFA643E","point":0},{"color":"#FFFF724C","point":0.1},{"color":"#FFFF7F5B","point":0.2},{"color":"#FFFF8C69","point":0.3},{"color":"#FFFF9878","point":0.4},{"color":"#FFFFA587","point":0.5},{"color":"#FFFFB196","point":0.6},{"color":"#FFFFBDA5","point":0.7},{"color":"#FFFFCAB5","point":0.8},{"color":"#FFFFD6C4","point":0.9},{"color":"#FFFFE1D4","point":1}],"backgroundColor":"#FF000000"}},"navItems":[{"type":5,"title":"Blog Archives","url":"https://medium.com/mitre-attack/archive"},{"type":4,"title":"Getting Started","url":"https://medium.com/mitre-attack/getting-started/home","topicId":"ff05a5fd64","source":"topicId"},{"type":3,"title":"ATT&CK","url":"https://attack.mitre.org"}],"colorBehavior":1,"ampLogo":{"imageId":"","filter":"","backgroundSize":"","originalWidth":0,"originalHeight":0,"strategy":"resample","height":0,"width":0},"header":{"title":"MITRE ATT&CK®","backgroundImage":{},"logoImage":{},"alignment":2,"layout":4},"subscriberCount":6517,"tagline":"This is the official blog for MITRE ATT&CK®, the…","instagramUsername":"mitreattack","isOptedIntoAurora":false,"isCurationAllowedByDefault":false,"polarisCoverImage":{"imageId":"","filter":"","backgroundSize":"","originalWidth":0,"originalHeight":0,"strategy":"resample","height":0,"width":0},"ptsQualifiedAt":1616092842777,"type":"Collection"}},"User":{"9b945ac87938":{"userId":"9b945ac87938","name":"Sean Sica","username":"seansica","createdAt":1702917135636,"imageId":"1*dmbNkD5D-u45r44go_cf0g.png","backgroundImageId":"","bio":"","twitterScreenName":"","allowNotes":1,"mediumMemberAt":1702917192370,"isWriterProgramEnrolled":true,"isSuspended":false,"firstOpenedIosApp":1703533913227,"isMembershipTrialEligible":true,"facebookDisplayName":"","optInToIceland":true,"hasCompletedProfile":false,"userDismissableFlags":[29],"hasSeenIcelandOnboarding":true,"postSubscribeMembershipUpsellShownAt":0,"languageCode":"en-us","type":"User"},"13b16fa8065d":{"userId":"13b16fa8065d","name":"Amy L. Robertson","username":"arobertson_79988","createdAt":1579638798533,"imageId":"1*HSqNMSnjesj-UnJGDPJi7g.jpeg","backgroundImageId":"","bio":"","twitterScreenName":"","allowNotes":1,"mediumMemberAt":0,"isWriterProgramEnrolled":true,"isSuspended":false,"isMembershipTrialEligible":true,"facebookDisplayName":"","optInToIceland":true,"hasCompletedProfile":false,"userDismissableFlags":[29,12,41,8,19,2,1,33],"hasSeenIcelandOnboarding":false,"postSubscribeMembershipUpsellShownAt":0,"languageCode":"en-us","type":"User"},"2138aa4a8cfa":{"userId":"2138aa4a8cfa","name":"Matt Malone","username":"mmalone_36363","createdAt":1608575739602,"imageId":"1*khEfxRURqsM1l_kKG3kD_w.jpeg","backgroundImageId":"","bio":"MITRE ATT&CK Team Member and CTI Lead.","allowNotes":1,"mediumMemberAt":0,"isWriterProgramEnrolled":true,"isSuspended":false,"firstOpenedIosApp":1608606998814,"isMembershipTrialEligible":true,"optInToIceland":true,"hasCompletedProfile":false,"userDismissableFlags":[32,29,12,8,21,30,2,1,33],"hasSeenIcelandOnboarding":true,"postSubscribeMembershipUpsellShownAt":0,"languageCode":"en-us","type":"User"},"37fd2c032d44":{"userId":"37fd2c032d44","name":"Adam Pennington","username":"adamp_mitre","createdAt":1541534363368,"imageId":"1*j5eMJS7aT-Nb1R3lI5OuKQ.jpeg","backgroundImageId":"","bio":"MITRE ATT&CK Lead","twitterScreenName":"","allowNotes":1,"mediumMemberAt":0,"isWriterProgramEnrolled":true,"isSuspended":false,"isMembershipTrialEligible":true,"facebookDisplayName":"","optInToIceland":true,"hasCompletedProfile":false,"userDismissableFlags":[32,15,12,8,21,2,18,33],"hasSeenIcelandOnboarding":true,"postSubscribeMembershipUpsellShownAt":0,"languageCode":"en-us","type":"User"},"dd8d40428430":{"userId":"dd8d40428430","name":"Selena Larson","username":"selenalarson","createdAt":1364056375225,"imageId":"1*zWnlpX5kj976PwYilzYdng.png","backgroundImageId":"","bio":"writing things","twitterScreenName":"selenalarson","allowNotes":1,"mediumMemberAt":0,"isWriterProgramEnrolled":true,"isSuspended":false,"isMembershipTrialEligible":true,"facebookDisplayName":"","optInToIceland":true,"hasCompletedProfile":false,"userDismissableFlags":[12,2,29],"hasSeenIcelandOnboarding":false,"postSubscribeMembershipUpsellShownAt":0,"languageCode":"en-us","type":"User"},"a4d96b83d947":{"userId":"a4d96b83d947","name":"Jason Ajmo","username":"jason_ajmo","createdAt":1612678384988,"imageId":"1*tknhYcDTamzzy2AodDW3Tg.jpeg","backgroundImageId":"","bio":"MITRE ATT&CK for Mobile Lead","twitterScreenName":"","allowNotes":1,"mediumMemberAt":0,"isWriterProgramEnrolled":true,"isSuspended":false,"isMembershipTrialEligible":true,"facebookDisplayName":"Jason Ajmo","optInToIceland":true,"hasCompletedProfile":false,"userDismissableFlags":[29,12,8,21,2,18,1],"hasSeenIcelandOnboarding":false,"postSubscribeMembershipUpsellShownAt":0,"languageCode":"en-us","type":"User"},"1dfd16769165":{"userId":"1dfd16769165","name":"Jamie Williams","username":"jcwilliams_43363","createdAt":1586391068831,"imageId":"2*GSsGswhrtP4MQcOolzM3Kw.png","backgroundImageId":"","bio":"ATT&CK® and ATT&CK Accessories","twitterScreenName":"","allowNotes":1,"mediumMemberAt":0,"isWriterProgramEnrolled":true,"isSuspended":false,"isMembershipTrialEligible":true,"facebookDisplayName":"","optInToIceland":true,"hasCompletedProfile":false,"userDismissableFlags":[3,2,1],"hasSeenIcelandOnboarding":false,"postSubscribeMembershipUpsellShownAt":0,"languageCode":"en-us","type":"User"},"a63006eeacc2":{"userId":"a63006eeacc2","name":"Michael Peck","username":"mpeck2","createdAt":1611595760395,"imageId":"0*kgS8e64YZi2wwFH_","backgroundImageId":"","bio":"Former Principal Cybersecurity Engineer and Mobile Security Capability Area Lead at MITRE","twitterScreenName":"mpeck2","allowNotes":1,"mediumMemberAt":0,"isWriterProgramEnrolled":true,"isSuspended":false,"firstOpenedIosApp":1614181963873,"firstOpenedAndroidApp":1622209176824,"isMembershipTrialEligible":true,"facebookDisplayName":"","optInToIceland":true,"hasCompletedProfile":false,"userDismissableFlags":[2,50,1],"hasSeenIcelandOnboarding":true,"postSubscribeMembershipUpsellShownAt":0,"languageCode":"en-us","type":"User"},"b8f2906f3de3":{"userId":"b8f2906f3de3","name":"Jose Luis Rodriguez","username":"cyb3rpandah","createdAt":1532236030173,"imageId":"1*zBEtYyYevfO-BWl3JPwHAg.png","backgroundImageId":"","bio":"Developing of methodologies for effective cyber threat hunting campaigns. Web: https://blog.openthreatresearch.com Twitter: @Cyb3rPandaH","twitterScreenName":"","allowNotes":1,"mediumMemberAt":0,"isWriterProgramEnrolled":true,"isSuspended":false,"isMembershipTrialEligible":true,"facebookDisplayName":"","optInToIceland":true,"hasCompletedProfile":false,"userDismissableFlags":[8,5,2,1],"hasSeenIcelandOnboarding":false,"postSubscribeMembershipUpsellShownAt":0,"languageCode":"en-us","type":"User"},"383ac795dbd9":{"userId":"383ac795dbd9","name":"Otis Alexander","username":"oa.mitre","createdAt":1577804534810,"imageId":"2*PNZD4NNKdt_2NgUE0FVyHQ.jpeg","backgroundImageId":"","bio":"","twitterScreenName":"","allowNotes":1,"mediumMemberAt":0,"isWriterProgramEnrolled":true,"isSuspended":false,"isMembershipTrialEligible":true,"facebookDisplayName":"","optInToIceland":true,"hasCompletedProfile":false,"userDismissableFlags":[2],"hasSeenIcelandOnboarding":false,"postSubscribeMembershipUpsellShownAt":0,"languageCode":"en-us","type":"User"},"dd95f448f732":{"userId":"dd95f448f732","name":"Frank Duff","username":"fduff","createdAt":1541608363371,"imageId":"1*4IkVg3KcPy35k2ibhWmaag.jpeg","backgroundImageId":"","bio":"Frank Duff (@FrankDuff) is the Director of ATT&CK Evaluations for MITRE Engenuity, providing open and transparent evaluation methodologies and results.","twitterScreenName":"","allowNotes":1,"mediumMemberAt":0,"isWriterProgramEnrolled":true,"isSuspended":false,"isMembershipTrialEligible":true,"facebookDisplayName":"","optInToIceland":true,"hasCompletedProfile":false,"userDismissableFlags":[8,21,12,2,18,17],"hasSeenIcelandOnboarding":false,"postSubscribeMembershipUpsellShownAt":0,"languageCode":"en-us","type":"User"}},"Post":{"d9fca6ce4c58":{"id":"d9fca6ce4c58","versionId":"250b9c5dec00","creatorId":"9b945ac87938","homeCollectionId":"6da19bd08fba","title":"Introducing TAXII 2.1 and a fond farewell to the TAXII 2.0 Server","detectedLanguage":"en","latestVersion":"250b9c5dec00","latestPublishedVersion":"250b9c5dec00","hasUnpublishedEdits":false,"latestRev":408,"createdAt":1724331442081,"updatedAt":1731887518415,"acceptedAt":0,"firstPublishedAt":1724344412771,"latestPublishedAt":1724344412771,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"We’re excited to introduce our new TAXII 2.1 server and the latest addition to the ATT&CK Workbench Software Suite","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*0GQBfYbb0frVtyhYLi3yiA.png","filter":"","backgroundSize":"","originalWidth":1230,"originalHeight":555,"strategy":"resample","height":0,"width":0},"wordCount":1460,"imageCount":1,"readingTime":5.709433962264151,"subtitle":"We’re excited to introduce our new TAXII 2.1 server and the latest addition to the ATT&CK Workbench Software Suite","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":1,"isBookmarked":false,"tags":[{"slug":"taxii","name":"Taxii","postCount":6,"metadata":{"postCount":6,"coverImage":{"id":"1*0GQBfYbb0frVtyhYLi3yiA.png","originalWidth":1230,"originalHeight":555,"isFeatured":true}},"type":"Tag"},{"slug":"mitre-attck","name":"Mitre Attck","postCount":81,"metadata":{"postCount":81,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"},{"slug":"cyber-threat-intelligence","name":"Cyber Threat Intelligence","postCount":1390,"metadata":{"postCount":1390,"coverImage":{"id":"1*Y948CdgjUJ3BZKw5QTBYtQ.png","originalWidth":1024,"originalHeight":1024,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":0,"links":{"entries":[{"url":"/mitre-attack/attack-2024-roadmap-8dfc46d1ad1b","alts":[],"httpStatus":0},{"url":"/mitre-attack/attack-v15-26685f300acc","alts":[],"httpStatus":0},{"url":"https://en.wikipedia.org/wiki/Publish%E2%80%93subscribe_pattern","alts":[],"httpStatus":200},{"url":"https://www.usebruno.com/","alts":[],"httpStatus":200},{"url":"https://attack-taxii.mitre.org/api-docs/","alts":[],"httpStatus":200},{"url":"https://attack-taxii.mitre.org/","alts":[],"httpStatus":406},{"url":"https://en.wikipedia.org/wiki/Request%E2%80%93response","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/att-ck-content-available-in-stix-2-0-via-public-taxii-2-0-server-317e5c41e214","alts":[{"type":3,"url":"medium://p/317e5c41e214"},{"type":2,"url":"medium://p/317e5c41e214"}],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-workbench-taxii-server/issues/new/choose","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-workbench-taxii-server/tree/main/bruno","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-workbench-taxii-server/blob/main/docs/USAGE.md","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-workbench-taxii-server","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-workbench-deployment/blob/main/compose.yaml","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-workbench-taxii-server/pkgs/container/attack-workbench-taxii-server","alts":[],"httpStatus":200},{"url":"https://docs.oasis-open.org/cti/taxii/v2.1/os/taxii-v2.1-os.html#_Toc31107497","alts":[],"httpStatus":200},{"url":"https://docs.oasis-open.org/cti/taxii/v2.1/os/taxii-v2.1-os.html#_Toc31107500","alts":[],"httpStatus":200},{"url":"https://docs.oasis-open.org/cti/taxii/v2.1/os/taxii-v2.1-os.html#_Toc31107539","alts":[],"httpStatus":200},{"url":"https://docs.oasis-open.org/cti/taxii/v2.1/os/taxii-v2.1-os.html#_Toc31107514","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-workbench-deployment","alts":[],"httpStatus":200},{"url":"http://cti-taxii.mitre.org/","alts":[],"httpStatus":404}],"version":"0.3","generatedAt":1724344414200},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":14,"sectionCount":1,"readingList":0,"topics":[{"topicId":"decb52b64abf","slug":"programming","createdAt":1493934116328,"deletedAt":0,"image":{"id":"1*iPa136b1cGEO7lvoXg6uHQ@2x.jpeg","originalWidth":6016,"originalHeight":4016},"name":"Programming","description":"The good, the bad, the buggy.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Programming News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"introducing-taxii-2-1-and-a-fond-farewell-to-the-taxii-2-0-server","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"introducing-taxii-2-1-and-a-fond-farewell-to-taxii-2-0-d9fca6ce4c58","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*0GQBfYbb0frVtyhYLi3yiA.png","originalWidth":1230,"originalHeight":555,"isFeatured":true}},{"name":"7150","type":3,"text":"Introducing TAXII 2.1 and a fond farewell to the TAXII 2.0 Server","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"We’re excited to introduce our new TAXII 2.1 server and the latest addition to the ATT&CK Workbench Software Suite"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"121f","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*0GQBfYbb0frVtyhYLi3yiA.png","originalWidth":1230,"originalHeight":555,"isFeatured":true}},{"name":"7150","type":3,"text":"Introducing TAXII 2.1 and a fond farewell to the TAXII 2.0 Server","markups":[]},{"name":"1632","type":1,"text":"As mentioned in our 2024 Roadmap and the v15 release blog, we’re excited to introduce our new TAXII server and the latest addition to the ATT&CK Workbench software suite: the MITRE ATT&CK Workbench TAXII 2.1 Server. We’ve open-sourced the TAXII 2.1 code on GitHub, allowing you to set up your…","markups":[{"type":3,"start":20,"end":32,"href":"/mitre-attack/attack-2024-roadmap-8dfc46d1ad1b","title":"","rel":"","anchorType":0},{"type":3,"start":41,"end":57,"href":"/mitre-attack/attack-v15-26685f300acc","title":"","rel":"","anchorType":0},{"type":3,"start":175,"end":214,"href":"https://attack-taxii.mitre.org/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":257,"end":263,"href":"https://github.com/mitre-attack/attack-workbench-taxii-server","title":"","rel":"noreferrer noopener","anchorType":0},{"type":2,"start":330,"end":334}]}],"sections":[{"name":"1b49","startIndex":0}]},"isFullContent":false,"subtitle":"We’re excited to introduce our new TAXII 2.1 server and the latest addition to the ATT&CK Workbench Software Suite"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"561c76af94cf":{"id":"561c76af94cf","versionId":"b33719189b51","creatorId":"13b16fa8065d","homeCollectionId":"6da19bd08fba","title":"v16 Cloud Rebalancing, Analytics,","detectedLanguage":"en","latestVersion":"b33719189b51","latestPublishedVersion":"b33719189b51","hasUnpublishedEdits":false,"latestRev":302,"createdAt":1730128184134,"updatedAt":1731566614564,"acceptedAt":0,"firstPublishedAt":1730389403724,"latestPublishedAt":1730404219250,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Fine-tuned cloud coverage, optimized defense with more analytics, expanded existing techniques/groups, and introduced new behaviors &…","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*YEpt4gwe_KcB6O3mGJAzLA.png","filter":"","backgroundSize":"","originalWidth":1242,"originalHeight":1233,"strategy":"resample","height":0,"width":0},"wordCount":1348,"imageCount":1,"readingTime":5.286792452830189,"subtitle":"Fine-tuned cloud coverage, optimized defense with more analytics, expanded existing techniques/groups, and introduced new behaviors &…","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":13,"isBookmarked":false,"tags":[{"slug":"mitre-attck","name":"Mitre Attck","postCount":81,"metadata":{"postCount":81,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"},{"slug":"cloud","name":"Cloud","postCount":47041,"metadata":{"postCount":47041,"coverImage":{"id":"1*D_fS0oMlnROsP6CJKqL3VQ.png","originalWidth":3024,"originalHeight":4032,"isFeatured":true}},"type":"Tag"},{"slug":"detection-engineering","name":"Detection Engineering","postCount":507,"metadata":{"postCount":507,"coverImage":{"id":"1*ryrEllOrsTGskuL74vaz8g.png","originalWidth":643,"originalHeight":668,"isFeatured":true}},"type":"Tag"},{"slug":"cybercrime","name":"Cybercrime","postCount":13295,"metadata":{"postCount":13295,"coverImage":{"id":"1*8he9qt2hcL7s8J25UNrK9Q.jpeg","originalWidth":612,"originalHeight":408}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":0,"links":{"entries":[{"url":"https://attacksite.mitre.org/changes/changelog.json","alts":[],"httpStatus":0},{"url":"https://attack.mitre.org/tactics/TA0002/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1546/017/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1496/004/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G1037/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0006/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0005/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/mitigations/M1015/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1213/005/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1558/005/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1557/004/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G1040/","alts":[],"httpStatus":200},{"url":"https://attack-taxii.mitre.org/","alts":[],"httpStatus":406},{"url":"https://attack.mitre.org/groups/G1032/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/mitigations/enterprise/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/updates-october-2024/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G0034/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1213/004/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G0007/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1666/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/identityprovider/","alts":[],"httpStatus":200},{"url":"http://attack@mitre.org","alts":[],"httpStatus":403},{"url":"http://attack@mitre.org/","alts":[],"httpStatus":403},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/saas/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/introducing-taxii-2-1-and-a-fond-farewell-to-taxii-2-0-d9fca6ce4c58","alts":[{"type":3,"url":"medium://p/d9fca6ce4c58"},{"type":2,"url":"medium://p/d9fca6ce4c58"}],"httpStatus":200},{"url":"https://attack.mitre.org/resources/engage-with-attack/contribute/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/mitigations/M1060/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/officesuite/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/iaas/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/docs/changelogs/v15.1-v16.0/changelog-detailed.html","alts":[],"httpStatus":200},{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C036RA0B7EX","alts":[],"httpStatus":200},{"url":"https://twitter.com/MITREattack","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/mitreattack-python/blob/master/examples/analytic_extractor.py","alts":[],"httpStatus":200},{"url":"https://www.linkedin.com/showcase/mitre-att&ck/","alts":[{"type":2,"url":"https://www.linkedin.com/showcase/mitre-att&ck/"},{"type":3,"url":"https://www.linkedin.com/showcase/mitre-att&ck/"}],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-workbench-taxii-server","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1730404221227},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":18,"sectionCount":2,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"v16-cloud-rebalancing-analytics","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"attack-v16-561c76af94cf","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*YEpt4gwe_KcB6O3mGJAzLA.png","originalWidth":1242,"originalHeight":1233,"isFeatured":true}},{"name":"previewTitle","type":3,"text":"v16 Cloud Rebalancing, Analytics,","alignment":1},{"name":"previewSubtitle","type":13,"text":"Fine-tuned cloud coverage, optimized defense with more analytics…","alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Fine-tuned cloud coverage, optimized defense with more analytics, expanded existing techniques/groups, and introduced new behaviors &…"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"f0dd9fac4104","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":6,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"5f91","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*YEpt4gwe_KcB6O3mGJAzLA.png","originalWidth":1242,"originalHeight":1233,"isFeatured":true}},{"name":"36be","type":3,"text":"V16 Brings (Re)Balance: Restructured Cloud, New Analytics, and More Cybercriminals","markups":[{"type":1,"start":0,"end":82}]},{"name":"a258","type":1,"text":"In v16, we’re all about balance — striking that perfect chord between familiar and pioneering to keep things real and actionable.","markups":[]},{"name":"c096","type":1,"text":"This update fine-tunes how we cover cloud environments, finding equilibrium between depth and practicality to ensure it remains practical for defenders. As part of our balancing act, we’re also…","markups":[{"type":2,"start":407,"end":415}]}],"sections":[{"name":"8564","startIndex":0}]},"isFullContent":false,"subtitle":"Fine-tuned cloud coverage, optimized defense with more analytics, expanded existing techniques/groups, and introduced new behaviors &…"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":true,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"26685f300acc":{"id":"26685f300acc","versionId":"5cc83dcfd95c","creatorId":"13b16fa8065d","homeCollectionId":"6da19bd08fba","title":"ATT&CK v15 Brings the Action","detectedLanguage":"en","latestVersion":"5cc83dcfd95c","latestPublishedVersion":"5cc83dcfd95c","hasUnpublishedEdits":false,"latestRev":233,"createdAt":1713816983680,"updatedAt":1714082130417,"acceptedAt":0,"firstPublishedAt":1713886540785,"latestPublishedAt":1713889110137,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Upgraded Detections, New Analytic Format, & Cross-Domain Adversary Insights","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*9nefc6VVPUZWdnO9pxLoTA.png","filter":"","backgroundSize":"","originalWidth":3024,"originalHeight":1876,"strategy":"resample","height":0,"width":0},"wordCount":1467,"imageCount":3,"readingTime":6.085849056603774,"subtitle":"Upgraded Detections, New Analytic Format, & Cross-Domain Adversary Insights","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":18,"isBookmarked":false,"tags":[{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"},{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"},{"slug":"detection-engineering","name":"Detection Engineering","postCount":507,"metadata":{"postCount":507,"coverImage":{"id":"1*ryrEllOrsTGskuL74vaz8g.png","originalWidth":643,"originalHeight":668,"isFeatured":true}},"type":"Tag"},{"slug":"cti","name":"Cti","postCount":537,"metadata":{"postCount":537,"coverImage":{"id":"1*4sYTsAW7qCJR9dwBk7SDhQ.png","originalWidth":1655,"originalHeight":760,"isFeatured":true}},"type":"Tag"},{"slug":"cloud","name":"Cloud","postCount":47041,"metadata":{"postCount":47041,"coverImage":{"id":"1*D_fS0oMlnROsP6CJKqL3VQ.png","originalWidth":3024,"originalHeight":4032,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":0,"links":{"entries":[{"url":"/mitre-attack/attack-2024-roadmap-8dfc46d1ad1b","alts":[],"httpStatus":0},{"url":"https://attack.mitre.org/techniques/T1665/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G0099/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1584/008/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1072/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G1002/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1484/002/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G0056/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1588/007/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1556/009/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0002/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G1026/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1556/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/campaigns/C0034/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1664/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/engage-with-attack/benefactors/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1651/","alts":[],"httpStatus":200},{"url":"https://attack-taxii.mitre.org/","alts":[],"httpStatus":406},{"url":"https://attack.mitre.org/techniques/T1027/013/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/campaigns/C0031/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/campaigns/C0032/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/campaigns/C0033/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1422/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T0894/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T0895/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/campaigns/C0030/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/mitigations/M1059/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1136/003/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/updates-april-2024/index.html","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/docs/changelogs/v14.1-v15.0/changelog-detailed.html","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/engage-with-attack/contribute/","alts":[],"httpStatus":200},{"url":"https://blog.morphisec.com/mispadu-infiltration-beyond-latam","alts":[{"type":1,"url":"https://cdn.ampproject.org/c/s/blog.morphisec.com/mispadu-infiltration-beyond-latam?hs_amp=true"}],"httpStatus":200},{"url":"https://attack.mitre.org/docs/changelogs/v14.1-v15.0/changelog.json","alts":[],"httpStatus":200},{"url":"http://github.com/mitre-attack/attack-workbench-taxii-server","alts":[],"httpStatus":200},{"url":"https://youtu.be/v24a5IOwObc?si=C9CZzBThVfLS19zH","alts":[{"type":2,"url":"vnd.youtube://www.youtube.com/watch?si=C9CZzBThVfLS19zH&v=v24a5IOwObc&feature=youtu.be&feature=applinks"},{"type":3,"url":"vnd.youtube://www.youtube.com/watch?si=C9CZzBThVfLS19zH&v=v24a5IOwObc&feature=youtu.be&feature=applinks"}],"httpStatus":200},{"url":"https://blog.scilabs.mx/en/cyber-threat-profile-malteiro/","alts":[],"httpStatus":200},{"url":"https://cti-taxii.mitre.org/","alts":[],"httpStatus":404}],"version":"0.3","generatedAt":1713889111191},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":62,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"att-ck-v15-brings-the-action","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"attack-v15-26685f300acc","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*9nefc6VVPUZWdnO9pxLoTA.png","originalWidth":3024,"originalHeight":1876,"isFeatured":true}},{"name":"94c2","type":3,"text":"ATT&CK v15 Brings the Action: Upgraded Detections, New Analytic Format, & Cross-Domain Adversary Insights","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Upgraded Detections, New Analytic Format, & Cross-Domain Adversary Insights"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"c529fafd8ed7","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":4,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"94c2","type":3,"text":"ATT&CK v15 Brings the Action: Upgraded Detections, New Analytic Format, & Cross-Domain Adversary Insights","markups":[]},{"name":"7c73","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*9nefc6VVPUZWdnO9pxLoTA.png","originalWidth":3024,"originalHeight":1876,"isFeatured":true}},{"name":"fcc3","type":1,"text":"v15 is all about actionability and bringing defenders’ reality into focus — we prioritized what you need to detect, and how you can do it more effectively with detection engineering upgrades, and deeper intelligence insights across platforms. This release also reflects the new expansion rhythm, balancing both well-known and emerging…","markups":[{"type":2,"start":91,"end":96},{"type":2,"start":120,"end":124}]}],"sections":[{"name":"3b68","startIndex":0}]},"isFullContent":false,"subtitle":"Upgraded Detections, New Analytic Format, & Cross-Domain Adversary Insights"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":true,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"8dfc46d1ad1b":{"id":"8dfc46d1ad1b","versionId":"80fb4279e62d","creatorId":"13b16fa8065d","homeCollectionId":"6da19bd08fba","title":"ATT&CK 2024 Roadmap","detectedLanguage":"en","latestVersion":"80fb4279e62d","latestPublishedVersion":"80fb4279e62d","hasUnpublishedEdits":false,"latestRev":338,"createdAt":1713387133377,"updatedAt":1716299920300,"acceptedAt":0,"firstPublishedAt":1713458781304,"latestPublishedAt":1716299920300,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Enhancing usability, expanding scope, optimizing defenses","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*NdNL-P_jvIn29chXCd8RmA.jpeg","filter":"","backgroundSize":"","originalWidth":2048,"originalHeight":1536,"strategy":"resample","height":0,"width":0},"wordCount":2689,"imageCount":2,"readingTime":10.530503144654087,"subtitle":"Enhancing usability, expanding scope, optimizing defenses","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":10,"isBookmarked":false,"tags":[{"slug":"mitre-attck","name":"Mitre Attck","postCount":81,"metadata":{"postCount":81,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"},{"slug":"detection-engineering","name":"Detection Engineering","postCount":507,"metadata":{"postCount":507,"coverImage":{"id":"1*ryrEllOrsTGskuL74vaz8g.png","originalWidth":643,"originalHeight":668,"isFeatured":true}},"type":"Tag"},{"slug":"cyber-threat-intelligence","name":"Cyber Threat Intelligence","postCount":1390,"metadata":{"postCount":1390,"coverImage":{"id":"1*Y948CdgjUJ3BZKw5QTBYtQ.png","originalWidth":1024,"originalHeight":1024,"isFeatured":true}},"type":"Tag"},{"slug":"roadmaps","name":"Roadmaps","postCount":6343,"metadata":{"postCount":6343,"coverImage":{"id":"0*D-ieHZMS5IWWRJUG","originalWidth":1800,"originalHeight":1013,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":1,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"https://attack.mitre.org/techniques/T1657/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1656/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0043/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1660/","alts":[],"httpStatus":200},{"url":"http://attack.mitre.org/datasources/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/learn-more-about-attack/attackcon/october-2023/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/changelog.html","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0042/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/assets/","alts":[],"httpStatus":200},{"url":"https://car.mitre.org/","alts":[],"httpStatus":200},{"url":"https://attack-taxii.mitre.org","alts":[],"httpStatus":406},{"url":"https://attack.mitre.org/resources/engage-with-attack/benefactors/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1598/","alts":[],"httpStatus":200},{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://na.eventscloud.com/esurvey/index.php?surveyid=119679&st=11ed3b2537a57f262963e9006f1f47b114c68f6f","alts":[],"httpStatus":200},{"url":"https://cti-taxii.mitre.org.","alts":[],"httpStatus":404},{"url":"https://twitter.com/MITREattack","alts":[],"httpStatus":200},{"url":"http://attack@mitre.org/","alts":[],"httpStatus":403},{"url":"https://mitreattack.slack.com/archives/C0351D4AU1J","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C035Z0AL8R0","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C035BUEMMHP","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C061YMN07M1","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C036RA0B7EX","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C036CEG4VRP","alts":[],"httpStatus":200},{"url":"https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/bzar","alts":[],"httpStatus":200},{"url":"http://github.com/mitre-attack/attack-workbench-taxii-server","alts":[],"httpStatus":200},{"url":"https://na.eventscloud.com/website/67610/","alts":[],"httpStatus":200},{"url":"https://www.linkedin.com/showcase/mitre-att&ck/","alts":[{"type":3,"url":"https://www.linkedin.com/showcase/mitre-att&ck/"},{"type":2,"url":"https://www.linkedin.com/showcase/mitre-att&ck/"}],"httpStatus":200},{"url":"https://www.attack-community.org","alts":[],"httpStatus":200},{"url":"https://www.attack-community.org/event/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-v14-fa473603f86b","alts":[{"type":3,"url":"medium://p/fa473603f86b"},{"type":2,"url":"medium://p/fa473603f86b"}],"httpStatus":200},{"url":"https://ccb.belgium.be/en","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1716299922271},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":11,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"},{"topicId":"decb52b64abf","slug":"programming","createdAt":1493934116328,"deletedAt":0,"image":{"id":"1*iPa136b1cGEO7lvoXg6uHQ@2x.jpeg","originalWidth":6016,"originalHeight":4016},"name":"Programming","description":"The good, the bad, the buggy.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Programming News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"att-ck-2024-roadmap","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"attack-2024-roadmap-8dfc46d1ad1b","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*NdNL-P_jvIn29chXCd8RmA.jpeg","originalWidth":2048,"originalHeight":1536,"isFeatured":true}},{"name":"4a0d","type":3,"text":"ATT&CK 2024 Roadmap","markups":[],"alignment":1},{"name":"7e7c","type":13,"text":"Enhancing usability, expanding scope, optimizing defenses","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Enhancing usability, expanding scope, optimizing defenses"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"31bd6b7a5334","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":4,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"7ce7","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*NdNL-P_jvIn29chXCd8RmA.jpeg","originalWidth":2048,"originalHeight":1536,"isFeatured":true}},{"name":"4a0d","type":3,"text":"ATT&CK 2024 Roadmap","markups":[]},{"name":"7e7c","type":13,"text":"Enhancing usability, expanding scope, optimizing defenses","markups":[]},{"name":"18b7","type":1,"text":"2023 was dynamic year for ATT&CK. We marked a decade of progress since the framework’s inception and achieved some key milestones to make ATT&CK more accessible for a wider community. Our scope (slightly) expanded to encompass activities adjacent to direct Enterprise interactions, such as non-technical, deceptive practices and social engineering…","markups":[{"type":3,"start":360,"end":375,"href":"https://attack.mitre.org/techniques/T1657/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":377,"end":390,"href":"https://attack.mitre.org/techniques/T1656/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":396,"end":415,"href":"https://attack.mitre.org/techniques/T1598/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":492,"end":495,"href":"https://car.mitre.org/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":501,"end":505,"href":"https://github.com/mitre-attack/bzar","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":563,"end":569,"href":"https://attack.mitre.org/assets/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":651,"end":663,"href":"http://attack.mitre.org/datasources/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":707,"end":738,"href":"https://attack.mitre.org/techniques/T1660/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":855,"end":879,"href":"https://attack.mitre.org/resources/changelog.html","title":"","rel":"","anchorType":0}]}],"sections":[{"name":"170c","startIndex":0}]},"isFullContent":false,"subtitle":"Enhancing usability, expanding scope, optimizing defenses"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":true,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"fa473603f86b":{"id":"fa473603f86b","versionId":"b96a10269605","creatorId":"13b16fa8065d","homeCollectionId":"6da19bd08fba","title":"ATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured Detections","detectedLanguage":"en","latestVersion":"b96a10269605","latestPublishedVersion":"b96a10269605","hasUnpublishedEdits":false,"latestRev":135,"createdAt":1698695395807,"updatedAt":1707166281444,"acceptedAt":0,"firstPublishedAt":1698767769979,"latestPublishedAt":1698768680089,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"ATT&CK has been brewing up something eerie for this Halloween — ATT&CK v14","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*8nBv3HtBj0KyhQYkcfWBog.jpeg","filter":"","backgroundSize":"","originalWidth":3184,"originalHeight":1219,"strategy":"resample","height":0,"width":0},"wordCount":925,"imageCount":7,"readingTime":4.540566037735849,"subtitle":"ATT&CK has been brewing up something eerie for this Halloween — ATT&CK v14","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":28,"isBookmarked":false,"tags":[{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"},{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"},{"slug":"cti","name":"Cti","postCount":537,"metadata":{"postCount":537,"coverImage":{"id":"1*4sYTsAW7qCJR9dwBk7SDhQ.png","originalWidth":1655,"originalHeight":760,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":2,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"https://mitre-attack.github.io/attack-navigator/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/ics/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1656/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1598/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1657/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/assets/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/updates-october-2023/index.html","alts":[],"httpStatus":200},{"url":"https://car.mitre.org/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1660/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/mitigations/M1058","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/docs/changelogs/v13.1-v14.0/changelog-detailed.html","alts":[],"httpStatus":200},{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/docs/changelogs/v13.1-v14.0/changelog.json","alts":[],"httpStatus":200},{"url":"https://twitter.com/MITREattack","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C036CEG4VRP","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C061YMN07M1","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C036RA0B7EX","alts":[],"httpStatus":200},{"url":"https://flic.kr/p/dzyK9x","alts":[],"httpStatus":403},{"url":"https://github.com/mitre-attack/bzar","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-goes-to-v11-599a9112a025","alts":[{"type":3,"url":"medium://p/599a9112a025"},{"type":2,"url":"medium://p/599a9112a025"}],"httpStatus":200}],"version":"0.3","generatedAt":1698768681451},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":54,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"att-ck-v14-unleashes-detection-enhancements-ics-assets-and-mobile-structured-detections","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"attack-v14-fa473603f86b","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*8nBv3HtBj0KyhQYkcfWBog.jpeg","originalWidth":3184,"originalHeight":1219,"isFeatured":true}},{"name":"e638","type":3,"text":"ATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured Detections","markups":[{"type":1,"start":0,"end":89}],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"ATT&CK has been brewing up something eerie for this Halloween — ATT&CK v14"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"e638","type":3,"text":"ATT&CK v14 Unleashes Detection Enhancements, ICS Assets, and Mobile Structured Detections","markups":[{"type":1,"start":0,"end":89}]},{"name":"207e","type":4,"text":"Credit: https://flic.kr/p/dzyK9x CC BY-SA 2.0","markups":[{"type":3,"start":8,"end":32,"href":"https://flic.kr/p/dzyK9x","title":"","rel":"nofollow","anchorType":0}],"layout":3,"metadata":{"id":"1*8nBv3HtBj0KyhQYkcfWBog.jpeg","originalWidth":3184,"originalHeight":1219,"isFeatured":true}},{"name":"e81b","type":1,"text":"ATT&CK has been brewing up something eerie for this Halloween — a release so hauntingly powerful that it will send a chill down the spine of even the most formidable adversaries. As v14 emerges from the depths, we’re proud to present a more robust and finely-tuned knowledge base. So, grab…","markups":[]}],"sections":[{"name":"799b","startIndex":0}]},"isFullContent":false,"subtitle":"ATT&CK has been brewing up something eerie for this Halloween — ATT&CK v14"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"5cef174c32ff":{"id":"5cef174c32ff","versionId":"a0bd11f89d38","creatorId":"13b16fa8065d","homeCollectionId":"6da19bd08fba","title":"ATT&CK v13 Enters the Room","detectedLanguage":"en","latestVersion":"a0bd11f89d38","latestPublishedVersion":"a0bd11f89d38","hasUnpublishedEdits":false,"latestRev":234,"createdAt":1682027326650,"updatedAt":1683034960168,"acceptedAt":0,"firstPublishedAt":1682434581249,"latestPublishedAt":1682434581249,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Pseudocode, Swifter Search, and Mobile Data Sources","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*PkApzI8NMYPKdGGq2ZA1Vw.png","filter":"","backgroundSize":"","originalWidth":1973,"originalHeight":1115,"strategy":"resample","height":0,"width":0},"wordCount":1191,"imageCount":4,"readingTime":5.194339622641509,"subtitle":"Pseudocode, Swifter Search, and Mobile Data Sources","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":13,"isBookmarked":false,"tags":[{"slug":"mitre-attck","name":"Mitre Attck","postCount":81,"metadata":{"postCount":81,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"},{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"},{"slug":"mitre-attack-framework","name":"Mitre Attack Framework","postCount":224,"metadata":{"postCount":224,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"},{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":0,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"https://mitre-attack.github.io/attack-navigator/","alts":[],"httpStatus":200},{"url":"http://attack.mitre.org/campaigns/C0023/","alts":[],"httpStatus":200},{"url":"http://attack.mitre.org/campaigns/C0017/","alts":[],"httpStatus":200},{"url":"http://attack.mitre.org/campaigns/C0018/","alts":[],"httpStatus":200},{"url":"http://attack.mitre.org/campaigns/C0025/","alts":[],"httpStatus":200},{"url":"http://attack.mitre.org/datasources/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/updates-april-2023/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/attackcon/","alts":[],"httpStatus":200},{"url":"https://car.mitre.org/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/2023-attack-roadmap-452fab541673","alts":[{"type":3,"url":"medium://p/452fab541673"},{"type":2,"url":"medium://p/452fab541673"}],"httpStatus":200},{"url":"http://attack.mitre.org/campaigns/C0024/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/updates-april-2023/index.html","alts":[],"httpStatus":200},{"url":"http://attack@mitre.org/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-goes-to-v11-599a9112a025?source=collection_home---4------0-----------------------","alts":[{"type":3,"url":"medium://p/599a9112a025"},{"type":2,"url":"medium://p/599a9112a025"}],"httpStatus":200},{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://twitter.com/MITREattack?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C035Z0AL8R0","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/docs/changelogs/v12.1-v13.0/changelog-detailed.html","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C035BUEMMHP","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C036RA0B7EX","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/docs/changelogs/v12.1-v13.0/changelog.json","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/mitreattack-python/blob/master/mitreattack/diffStix/README.md","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1682434581690},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":60,"sectionCount":1,"readingList":0,"topics":[{"topicId":"decb52b64abf","slug":"programming","createdAt":1493934116328,"deletedAt":0,"image":{"id":"1*iPa136b1cGEO7lvoXg6uHQ@2x.jpeg","originalWidth":6016,"originalHeight":4016},"name":"Programming","description":"The good, the bad, the buggy.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Programming News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"att-ck-v13-enters-the-room","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"attack-v13-enters-the-room-5cef174c32ff","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*PkApzI8NMYPKdGGq2ZA1Vw.png","originalWidth":1973,"originalHeight":1115,"isFeatured":true}},{"name":"4e28","type":3,"text":"ATT&CK v13 Enters the Room: Pseudocode, Swifter Search, and Mobile Data Sources","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Pseudocode, Swifter Search, and Mobile Data Sources"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":6,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"ATT&CK v13 Enters the Room: Pseudocode, Swifter Search, and Mobile Data Sources","previewContent2":{"bodyModel":{"paragraphs":[{"name":"7d89","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*PkApzI8NMYPKdGGq2ZA1Vw.png","originalWidth":1973,"originalHeight":1115,"isFeatured":true}},{"name":"4e28","type":3,"text":"ATT&CK v13 Enters the Room: Pseudocode, Swifter Search, and Mobile Data Sources","markups":[]},{"name":"6b68","type":1,"text":"It’s not like a regular Tuesday, it’s a lucky Tuesday — ATT&CK v13 has arrived. As we outlined in our Roadmap, we’re working toward enhanced tools for lower-resourced defenders, improving ATT&CK’s website usability, enhancing ICS and Mobile parity with Enterprise, and evolving overall content and structure this year. ATT&CK v13…","markups":[{"type":3,"start":102,"end":109,"href":"https://medium.com/mitre-attack/2023-attack-roadmap-452fab541673","title":"","rel":"","anchorType":0},{"type":3,"start":593,"end":606,"href":"https://attack.mitre.org/resources/updates/updates-april-2023/index.html","title":"","rel":"","anchorType":0},{"type":3,"start":618,"end":636,"href":"https://attack.mitre.org/docs/changelogs/v12.1-v13.0/changelog-detailed.html","title":"","rel":"","anchorType":0},{"type":3,"start":651,"end":665,"href":"https://attack.mitre.org/docs/changelogs/v12.1-v13.0/changelog.json","title":"","rel":"","anchorType":0}]}],"sections":[{"name":"68f5","startIndex":0}]},"isFullContent":false,"subtitle":"Pseudocode, Swifter Search, and Mobile Data Sources"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"452fab541673":{"id":"452fab541673","versionId":"fd1eb71d902d","creatorId":"13b16fa8065d","homeCollectionId":"6da19bd08fba","title":"2023 ATT&CK Roadmap","detectedLanguage":"en","latestVersion":"fd1eb71d902d","latestPublishedVersion":"fd1eb71d902d","hasUnpublishedEdits":false,"latestRev":488,"createdAt":1644936310487,"updatedAt":1677505900725,"acceptedAt":0,"firstPublishedAt":1676994793638,"latestPublishedAt":1676994793638,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"A Roadmap of 2023’s key efforts: From ICS Assets to more Linux and ATT&CKcon 4.0.","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*pZsmRwpPNtBygO-4zxDVLQ.png","filter":"","backgroundSize":"","originalWidth":1920,"originalHeight":1080,"strategy":"resample","height":0,"width":0},"wordCount":1321,"imageCount":1,"readingTime":5.184905660377359,"subtitle":"A Roadmap of 2023’s key efforts: From ICS Assets to more Linux and ATT&CKcon 4.0.","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":33,"isBookmarked":false,"tags":[{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"},{"slug":"cti","name":"Cti","postCount":537,"metadata":{"postCount":537,"coverImage":{"id":"1*4sYTsAW7qCJR9dwBk7SDhQ.png","originalWidth":1655,"originalHeight":760,"isFeatured":true}},"type":"Tag"},{"slug":"cybersecurity","name":"Cybersecurity","postCount":204824,"metadata":{"postCount":204824,"coverImage":{"id":"1*KtQ6g0rkIl-Z8x_6O23Ukw.png","originalWidth":856,"originalHeight":347,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":1,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"mailto:attackcon@mitre.org","alts":[],"httpStatus":0},{"url":"https://attack.mitre.org/datasources/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/updates-october-2019/index.html","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/datasources/DS0039/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/introducing-attack-campaigns-6b15baa6cbb4","alts":[{"type":3,"url":"medium://p/6b15baa6cbb4"},{"type":2,"url":"medium://p/6b15baa6cbb4"}],"httpStatus":200},{"url":"https://attack.mitre.org/resources/attackcon/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-goes-to-v11-599a9112a025","alts":[{"type":3,"url":"medium://p/599a9112a025"},{"type":2,"url":"medium://p/599a9112a025"}],"httpStatus":200},{"url":"http://attack@mitre.org/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-goes-to-v11-599a9112a025?source=collection_home---4------0-----------------------","alts":[{"type":3,"url":"medium://p/599a9112a025"},{"type":2,"url":"medium://p/599a9112a025"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-2022-roadmap-cd5a1a3387c7","alts":[{"type":3,"url":"medium://p/cd5a1a3387c7"},{"type":2,"url":"medium://p/cd5a1a3387c7"}],"httpStatus":200},{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C035Z0AL8R0","alts":[],"httpStatus":200},{"url":"https://twitter.com/mitreattack/","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C035BUEMMHP","alts":[],"httpStatus":200},{"url":"https://mitreattack.slack.com/archives/C036RA0B7EX","alts":[],"httpStatus":200},{"url":"https://twitter.com/mitreattack","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/introducing-attack-v10-7743870b37e3","alts":[{"type":3,"url":"medium://p/7743870b37e3"},{"type":2,"url":"medium://p/7743870b37e3"}],"httpStatus":200},{"url":"https://medium.com/mitre-engenuity/research-partnership-matures-att-ck-for-cloud-d232998968ce","alts":[{"type":3,"url":"medium://p/d232998968ce"},{"type":2,"url":"medium://p/d232998968ce"}],"httpStatus":200},{"url":"https://www.linkedin.com/showcase/mitre-att&ck","alts":[{"type":3,"url":"https://www.linkedin.com/showcase/mitre-att&ck/"},{"type":2,"url":"https://www.linkedin.com/showcase/mitre-att&ck/"}],"httpStatus":200}],"version":"0.3","generatedAt":1676994794535},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":184,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"2023-att-ck-roadmap","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"2023-attack-roadmap-452fab541673","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*pZsmRwpPNtBygO-4zxDVLQ.png","originalWidth":1920,"originalHeight":1080,"isFeatured":true}},{"name":"5315","type":3,"text":"2023 ATT&CK Roadmap","markups":[{"type":1,"start":0,"end":19}],"alignment":1},{"name":"48a2","type":13,"text":"A Roadmap of 2023’s key efforts: From ICS Assets to more Linux and ATT&CKcon 4.0.","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"A Roadmap of 2023’s key efforts: From ICS Assets to more Linux and ATT&CKcon 4.0."},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":6,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"primaryTopicId":"d4e7f4144ac5","isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"5315","type":3,"text":"2023 ATT&CK Roadmap","markups":[{"type":1,"start":0,"end":19}]},{"name":"48a2","type":13,"text":"A Roadmap of 2023’s key efforts: From ICS Assets to more Linux and ATT&CKcon 4.0.","markups":[]},{"name":"b8f3","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*pZsmRwpPNtBygO-4zxDVLQ.png","originalWidth":1920,"originalHeight":1080,"isFeatured":true}},{"name":"b6e6","type":1,"text":"It’s 2023 and we’re all a little older, including ATT&CK, which will be celebrating its 8th (!) release anniversary in a few short months. Last year we matured, expanded, deconflicted, and renovated the knowledge base, persevering through challenges to meet our 2022 goals. Some of our most notable efforts including…","markups":[{"type":3,"start":262,"end":272,"href":"https://medium.com/mitre-attack/attack-2022-roadmap-cd5a1a3387c7","title":"","rel":"","anchorType":0},{"type":3,"start":327,"end":359,"href":"https://medium.com/mitre-attack/attack-goes-to-v11-599a9112a025","title":"","rel":"","anchorType":0},{"type":3,"start":372,"end":393,"href":"https://medium.com/mitre-attack/attack-goes-to-v11-599a9112a025","title":"","rel":"","anchorType":0},{"type":3,"start":407,"end":421,"href":"https://attack.mitre.org/resources/updates/","title":"","rel":"","anchorType":0},{"type":3,"start":423,"end":451,"href":"https://medium.com/mitre-attack/attack-goes-to-v11-599a9112a025","title":"","rel":"","anchorType":0},{"type":3,"start":504,"end":513,"href":"https://medium.com/mitre-attack/introducing-attack-campaigns-6b15baa6cbb4","title":"","rel":"","anchorType":0},{"type":3,"start":527,"end":540,"href":"https://attack.mitre.org/resources/attackcon/","title":"","rel":"","anchorType":0}]}],"sections":[{"name":"0889","startIndex":0}]},"isFullContent":false,"subtitle":"A Roadmap of 2023’s key efforts: From ICS Assets to more Linux and ATT&CKcon 4.0."},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"6b15baa6cbb4":{"id":"6b15baa6cbb4","versionId":"1234a7f6dc1a","creatorId":"2138aa4a8cfa","homeCollectionId":"6da19bd08fba","title":"Introducing ATT&CK Campaigns","detectedLanguage":"en","latestVersion":"1234a7f6dc1a","latestPublishedVersion":"1234a7f6dc1a","hasUnpublishedEdits":false,"latestRev":655,"createdAt":1664376806141,"updatedAt":1673469349733,"acceptedAt":0,"firstPublishedAt":1664893885462,"latestPublishedAt":1673469341083,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"By: Amy Robertson, Jared Ondricek, and Matt Malone","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*_CSbbgPWimTXkEud2wxlIA.png","filter":"","backgroundSize":"","originalWidth":1920,"originalHeight":1080,"strategy":"resample","height":0,"width":0},"wordCount":1767,"imageCount":8,"readingTime":7.80125786163522,"subtitle":"By: Amy Robertson, Jared Ondricek, and Matt Malone","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":28,"isBookmarked":false,"tags":[{"slug":"cti","name":"Cti","postCount":537,"metadata":{"postCount":537,"coverImage":{"id":"1*4sYTsAW7qCJR9dwBk7SDhQ.png","originalWidth":1655,"originalHeight":760,"isFeatured":true}},"type":"Tag"},{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":2,"links":{"entries":[{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-2022-roadmap-cd5a1a3387c7","alts":[{"type":3,"url":"medium://p/cd5a1a3387c7"},{"type":2,"url":"medium://p/cd5a1a3387c7"}],"httpStatus":200},{"url":"http://attack@mitre.org","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G0016/","alts":[],"httpStatus":200},{"url":"http://docs.oasis-open.org/cti/stix/v2.0/csprd01/part2-stix-objects/stix-v2.0-csprd01-part2-stix-objects.html#_Toc476230925","alts":[],"httpStatus":200},{"url":"https://twitter.com/mitreattack","alts":[],"httpStatus":200},{"url":"https://github.com/mitre/cti/blob/master/USAGE.md#the-attck-data-model","alts":[],"httpStatus":200},{"url":"https://github.com/mitre/cti/blob/master/USAGE.md","alts":[],"httpStatus":200},{"url":"https://github.com/mitre/cti/blob/master/USAGE.md#relationships-microlibrary","alts":[],"httpStatus":200},{"url":"https://www.youtube.com/watch?v=Jd2yLBfg8xE","alts":[{"type":2,"url":"vnd.youtube://www.youtube.com/watch?v=Jd2yLBfg8xE&feature=applinks"},{"type":3,"url":"vnd.youtube://www.youtube.com/watch?v=Jd2yLBfg8xE&feature=applinks"}],"httpStatus":200},{"url":"https://www.youtube.com/watch?v=yP0upd-65Yc&list=PLkTApXQou_8Jo2B27kq62Md4bypcBqBAw&index=13","alts":[{"type":3,"url":"vnd.youtube://www.youtube.com/watch?v=yP0upd-65Yc&list=PLkTApXQou_8Jo2B27kq62Md4bypcBqBAw&index=13&feature=applinks"},{"type":2,"url":"vnd.youtube://www.youtube.com/watch?v=yP0upd-65Yc&list=PLkTApXQou_8Jo2B27kq62Md4bypcBqBAw&index=13&feature=applinks"}],"httpStatus":200}],"version":"0.3","generatedAt":1673469341746},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":74,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"introducing-att-ck-campaigns","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"introducing-attack-campaigns-6b15baa6cbb4","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*_CSbbgPWimTXkEud2wxlIA.png","originalWidth":1920,"originalHeight":1080,"isFeatured":true}},{"name":"previewTitle","type":3,"text":"Introducing ATT&CK Campaigns","alignment":1},{"name":"previewSubtitle","type":13,"text":"By: Amy Robertson, Jared Ondricek, and Matt Malone","alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"By: Amy Robertson, Jared Ondricek, and Matt Malone"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"7139","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*_CSbbgPWimTXkEud2wxlIA.png","originalWidth":1920,"originalHeight":1080,"isFeatured":true}},{"name":"6f81","type":3,"text":"Introducing Campaigns to MITRE ATT&CK","markups":[{"type":1,"start":0,"end":37}]},{"name":"e58a","type":1,"text":"By: Amy Robertson, Jared Ondricek, and Matt Malone","markups":[{"type":1,"start":0,"end":4},{"type":2,"start":0,"end":50}]},{"name":"9ec0","type":1,"text":"We’ve talked about building Campaigns into ATT&CK in our ATT&CK 2022 roadmap, at ATT&CKCon 3.0, and most recently on the SANS Threat Analysis Rundown but their release is now nigh! Our initial collection of Campaigns will be available starting with our ATT&CK…","markups":[{"type":3,"start":58,"end":76,"href":"https://medium.com/mitre-attack/attack-2022-roadmap-cd5a1a3387c7","title":"","rel":"","anchorType":0},{"type":3,"start":81,"end":94,"href":"https://www.youtube.com/watch?v=yP0upd-65Yc&list=PLkTApXQou_8Jo2B27kq62Md4bypcBqBAw&index=13","title":"","rel":"","anchorType":0},{"type":3,"start":121,"end":149,"href":"https://www.youtube.com/watch?v=Jd2yLBfg8xE","title":"","rel":"","anchorType":0}]}],"sections":[{"name":"2232","startIndex":0}]},"isFullContent":false,"subtitle":"By: Amy Robertson, Jared Ondricek, and Matt Malone"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"599a9112a025":{"id":"599a9112a025","versionId":"e7ef6727219","creatorId":"37fd2c032d44","homeCollectionId":"6da19bd08fba","title":"ATT&CK Goes to v11","detectedLanguage":"en","latestVersion":"e7ef6727219","latestPublishedVersion":"e7ef6727219","hasUnpublishedEdits":false,"latestRev":266,"createdAt":1650342329681,"updatedAt":1651284897341,"acceptedAt":0,"firstPublishedAt":1650888143606,"latestPublishedAt":1650888143606,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Structured Detections, Beta Sub-Techniques for Mobile, and ICS Joins the Band","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*JB9ySNw5GWctTPIxbjYlng.jpeg","filter":"","backgroundSize":"","originalWidth":1440,"originalHeight":820,"strategy":"resample","height":0,"width":0},"wordCount":1858,"imageCount":12,"readingTime":8.361320754716981,"subtitle":"Structured Detections, Beta Sub-Techniques for Mobile, and ICS Joins the Band","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":18,"isBookmarked":false,"tags":[{"slug":"mitre-attck","name":"Mitre Attck","postCount":81,"metadata":{"postCount":81,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"},{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":1,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"https://twitter.com/MITREattack?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor","alts":[],"httpStatus":404},{"url":"https://attack.mitre.org/resources/updates/updates-april-2022/","alts":[],"httpStatus":200},{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/mitigations/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/docs/subtechniques/mobile-subtechniques-crosswalk.json","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-2022-roadmap-cd5a1a3387c7","alts":[{"type":3,"url":"medium://p/cd5a1a3387c7"},{"type":2,"url":"medium://p/cd5a1a3387c7"}],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/ics/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/datasources/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/versions/v10/matrices/mobile/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/introducing-attack-v10-7743870b37e3","alts":[{"type":3,"url":"medium://p/7743870b37e3"},{"type":2,"url":"medium://p/7743870b37e3"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-for-mobile-2022-roadmap-4fdb40a88a48","alts":[{"type":3,"url":"medium://p/4fdb40a88a48"},{"type":2,"url":"medium://p/4fdb40a88a48"}],"httpStatus":200},{"url":"https://github.com/mitre/cti/tree/master/ics-attack","alts":[],"httpStatus":200},{"url":"https://github.com/mitre/cti/releases/tag/ATT%26CK-v11.0-mobile-beta","alts":[],"httpStatus":200},{"url":"https://github.com/mitre/cti/tree/master/mobile-attack","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-with-sub-techniques-is-now-just-attack-8fc20997d8de","alts":[{"type":3,"url":"medium://p/8fc20997d8de"},{"type":2,"url":"medium://p/8fc20997d8de"}],"httpStatus":200},{"url":"https://attack.mitre.org","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1558/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/macos/","alts":[],"httpStatus":200},{"url":"https://github.com/center-for-threat-informed-defense/attack-control-framework-mappings","alts":[],"httpStatus":200},{"url":"https://github.com/mitre/cti/blob/master/USAGE.md","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/linux/","alts":[],"httpStatus":200},{"url":"https://www.slideshare.net/MITREATTACK/attck-updates-campaigns","alts":[],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics/index.php/Main_Page","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/launching-attack-for-ics-2be4d2fb9b8","alts":[{"type":3,"url":"medium://p/2be4d2fb9b8"},{"type":2,"url":"medium://p/2be4d2fb9b8"}],"httpStatus":200}],"version":"0.3","generatedAt":1650888144570},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":61,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"att-ck-goes-to-v11","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"attack-goes-to-v11-599a9112a025","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*JB9ySNw5GWctTPIxbjYlng.jpeg","originalWidth":1440,"originalHeight":820,"isFeatured":true}},{"name":"a00f","type":3,"text":"ATT&CK Goes to v11: Structured Detections, Beta Sub-Techniques for Mobile, and ICS Joins the Band","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Structured Detections, Beta Sub-Techniques for Mobile, and ICS Joins the Band"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"706087a46130","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":3,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"primaryTopicId":"d4e7f4144ac5","isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"a00f","type":3,"text":"ATT&CK Goes to v11: Structured Detections, Beta Sub-Techniques for Mobile, and ICS Joins the Band","markups":[]},{"name":"8dfe","type":4,"text":"These go to eleven","markups":[],"layout":1,"metadata":{"id":"1*JB9ySNw5GWctTPIxbjYlng.jpeg","originalWidth":1440,"originalHeight":820,"isFeatured":true}},{"name":"1416","type":1,"text":"By Adam Pennington and Jason Ajmo","markups":[{"type":3,"start":3,"end":18,"anchorType":2,"userId":"37fd2c032d44"},{"type":3,"start":23,"end":33,"anchorType":2,"userId":"a4d96b83d947"}]},{"name":"99b4","type":1,"text":"Right on cue, ATT&CK’s latest release is out, and this time we’ve gone to v11! If you’ve been following along with our roadmap there shouldn’t be any huge surprises in store, but we wanted to take a chance to go over our latest changes…","markups":[{"type":3,"start":119,"end":126,"href":"https://medium.com/mitre-attack/attack-2022-roadmap-cd5a1a3387c7","title":"","rel":"","anchorType":0},{"type":3,"start":241,"end":253,"href":"https://attack.mitre.org/resources/updates/updates-april-2022/","title":"","rel":"","anchorType":0}]}],"sections":[{"name":"7b53","startIndex":0}]},"isFullContent":false,"subtitle":"Structured Detections, Beta Sub-Techniques for Mobile, and ICS Joins the Band"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":true,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"35be8d12884":{"id":"35be8d12884","versionId":"56909feeed91","creatorId":"dd8d40428430","homeCollectionId":"6da19bd08fba","title":"Intelligence Failures of Lincoln’s Top Spies: What CTI Analysts Can Learn From the Civil War","detectedLanguage":"en","latestVersion":"56909feeed91","latestPublishedVersion":"56909feeed91","hasUnpublishedEdits":false,"latestRev":108,"createdAt":1648502326460,"updatedAt":1648865710875,"acceptedAt":0,"firstPublishedAt":1648559868171,"latestPublishedAt":1648559868171,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"By examining the intelligence reporting failures documented by modern historians, threat intelligence analysts can be better prepared","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*Lt18htHq69IsEJ-3staO2w.jpeg","filter":"","backgroundSize":"","originalWidth":6147,"originalHeight":4375,"strategy":"resample","height":0,"width":0},"wordCount":2328,"imageCount":1,"readingTime":8.984905660377358,"subtitle":"By examining the intelligence reporting failures documented by modern historians, threat intelligence analysts can be better prepared","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":20,"isBookmarked":false,"tags":[{"slug":"mitre-attck","name":"Mitre Attck","postCount":81,"metadata":{"postCount":81,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"},{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"},{"slug":"cti","name":"Cti","postCount":537,"metadata":{"postCount":537,"coverImage":{"id":"1*4sYTsAW7qCJR9dwBk7SDhQ.png","originalWidth":1655,"originalHeight":760,"isFeatured":true}},"type":"Tag"},{"slug":"threat-intelligence","name":"Threat Intelligence","postCount":5337,"metadata":{"postCount":5337,"coverImage":{"id":"1*rjwV_i5paNopPBsWGNVGJQ.png","originalWidth":936,"originalHeight":574,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":1,"links":{"entries":[{"url":"https://attack.mitre.org/techniques/T1221/","alts":[],"httpStatus":200},{"url":"https://www.technologyreview.com/2022/03/02/1046646/the-propaganda-war-has-eclipsed-cyberwar-in-ukraine/","alts":[{"type":1,"url":"https://cdn.ampproject.org/c/s/www.technologyreview.com/2022/03/02/1046646/the-propaganda-war-has-eclipsed-cyberwar-in-ukraine/amp/"}],"httpStatus":200},{"url":"https://www.ncsc.gov.uk/files/Cyclops-Blink-Malware-Analysis-Report.pdf","alts":[],"httpStatus":200},{"url":"https://www.proofpoint.com/us/blog/threat-insight/injection-new-black-novel-rtf-template-inject-technique-poised-widespread","alts":[],"httpStatus":200},{"url":"https://www.youtube.com/watch?v=ba5jh8uhTBU&ab_channel=mitrecorp","alts":[{"type":2,"url":"vnd.youtube://www.youtube.com/watch?v=ba5jh8uhTBU&ab_channel=mitrecorp&feature=applinks"},{"type":3,"url":"vnd.youtube://www.youtube.com/watch?v=ba5jh8uhTBU&ab_channel=mitrecorp&feature=applinks"}],"httpStatus":200},{"url":"https://archive.org/details/onsomedeficienci00trenrich/page/n7/mode/2up","alts":[],"httpStatus":200},{"url":"https://www.ncsc.gov.uk/files/Joint-Sandworm-Advisory.pdf","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1648559870016},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":66,"sectionCount":1,"readingList":0,"topics":[{"topicId":"aa97b7f5ff87","slug":"history","createdAt":1490119192344,"deletedAt":0,"image":{"id":"1*S9T-8nvdl7zGno2oHKdK0w@2x.jpeg","originalWidth":4752,"originalHeight":3168},"name":"History","description":"The past is prologue.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Articles About History — Medium","type":"Topic"}]},"coverless":true,"slug":"intelligence-failures-of-lincolns-top-spies-what-cti-analysts-can-learn-from-the-civil-war","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"intelligence-failures-of-lincolns-top-spies-what-cti-analysts-can-learn-from-the-civil-war-35be8d12884","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*Lt18htHq69IsEJ-3staO2w.jpeg","originalWidth":6147,"originalHeight":4375,"isFeatured":true}},{"name":"cfc1","type":3,"text":"Intelligence Failures of Lincoln’s Top Spies: What CTI Analysts Can Learn From the Civil War","markups":[{"type":1,"start":0,"end":92}],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"By examining the intelligence reporting failures documented by modern historians, threat intelligence analysts can be better prepared"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"cfc1","type":3,"text":"Intelligence Failures of Lincoln’s Top Spies: What CTI Analysts Can Learn From the Civil War","markups":[{"type":1,"start":0,"end":92}]},{"name":"82fc","type":1,"text":"Guest Post by ATT&CKcon 3.0 Keynote Speaker, Selena Larson","markups":[{"type":2,"start":0,"end":58}]},{"name":"6338","type":4,"text":"Allan Pinkerton (Alexander Gardner — Library of Congress)","markups":[],"layout":1,"metadata":{"id":"1*Lt18htHq69IsEJ-3staO2w.jpeg","originalWidth":6147,"originalHeight":4375,"isFeatured":true}},{"name":"c106","type":1,"text":"At the onset of the Civil War, a man whose name would eventually become synonymous with famous American detectives was reportedly providing false reports to the Union’s top general. Allan Pinkerton, who once successfully smuggled Abraham Lincoln into Washington, D.C. to…","markups":[]}],"sections":[{"name":"bb4d","startIndex":0}]},"isFullContent":false,"subtitle":"By examining the intelligence reporting failures documented by modern historians, threat intelligence analysts can be better prepared"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"4fdb40a88a48":{"id":"4fdb40a88a48","versionId":"2f4323db8039","creatorId":"a4d96b83d947","homeCollectionId":"6da19bd08fba","title":"ATT&CK for Mobile: Reintroduction and 2022 Goals","detectedLanguage":"en","latestVersion":"2f4323db8039","latestPublishedVersion":"2f4323db8039","hasUnpublishedEdits":false,"latestRev":410,"createdAt":1644936352394,"updatedAt":1645843643166,"acceptedAt":0,"firstPublishedAt":1645633556307,"latestPublishedAt":1645719410339,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"What is it, and where are we taking it?","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*RUcsdzXAWMeoDxjWmxKOqg.png","filter":"","backgroundSize":"","originalWidth":1066,"originalHeight":1137,"strategy":"resample","height":0,"width":0},"wordCount":1201,"imageCount":5,"readingTime":5.365408805031446,"subtitle":"What is it, and where are we taking it?","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":7,"isBookmarked":false,"tags":[{"slug":"mitre-attck","name":"Mitre Attck","postCount":81,"metadata":{"postCount":81,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"},{"slug":"mobile","name":"Mobile","postCount":68824,"metadata":{"postCount":68824,"coverImage":{"id":"1*zIMHJgPqYqmIed35x1771w.jpeg","originalWidth":481,"originalHeight":281}},"type":"Tag"},{"slug":"datasource","name":"Data Sources","postCount":2,"metadata":{"postCount":2,"coverImage":{"id":"1*_e083heil76BR5Y0GrukLg.png","originalWidth":600,"originalHeight":360}},"type":"Tag"},{"slug":"sub-techniques","name":"Sub Techniques","postCount":0,"metadata":{"postCount":0,"coverImage":{"id":"1*RUcsdzXAWMeoDxjWmxKOqg.png","originalWidth":1066,"originalHeight":1137,"isFeatured":true}},"type":"Tag"},{"slug":"roadmaps","name":"Roadmaps","postCount":6343,"metadata":{"postCount":6343,"coverImage":{"id":"0*D-ieHZMS5IWWRJUG","originalWidth":1800,"originalHeight":1013,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":0,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"https://attack.mitre.org/resources/contribute/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/mobile/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/","alts":[],"httpStatus":200},{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://pages.nist.gov/mobile-threat-catalogue/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-2022-roadmap-cd5a1a3387c7","alts":[{"type":3,"url":"medium://p/cd5a1a3387c7"},{"type":2,"url":"medium://p/cd5a1a3387c7"}],"httpStatus":200},{"url":"https://www.welivesecurity.com/2021/09/07/bladehawk-android-espionage-kurdish/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/mobile-attack-mitigating-android-abuse-50516fb7de85","alts":[{"type":3,"url":"medium://p/50516fb7de85"},{"type":2,"url":"medium://p/50516fb7de85"}],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics/index.php/Main_Page","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-subs-what-you-need-to-know-99bce414ae0b","alts":[{"type":3,"url":"medium://p/99bce414ae0b"},{"type":2,"url":"medium://p/99bce414ae0b"}],"httpStatus":200},{"url":"https://twitter.com/MITREattack?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/introducing-attack-v10-7743870b37e3","alts":[{"type":3,"url":"medium://p/7743870b37e3"},{"type":2,"url":"medium://p/7743870b37e3"}],"httpStatus":200},{"url":"https://www.dhs.gov/publication/st-mobile-device-security-study","alts":[],"httpStatus":200},{"url":"https://csrc.nist.gov/csrc/media/publications/nistir/8144/draft/documents/nistir8144_draft.pdf","alts":[],"httpStatus":200},{"url":"https://www.nccoe.nist.gov/projects/building-blocks/mobile-device-security","alts":[],"httpStatus":200},{"url":"https://research.checkpoint.com/2020/new-joker-variant-hits-google-play-with-an-old-trick/","alts":[{"type":1,"url":"https://cdn.ampproject.org/c/s/research.checkpoint.com/2020/new-joker-variant-hits-google-play-with-an-old-trick/amp/"}],"httpStatus":200},{"url":"https://www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born","alts":[{"type":1,"url":"https://cdn.ampproject.org/c/s/www.cybereason.com/blog/eventbot-a-new-mobile-banking-trojan-is-born?hs_amp=true"}],"httpStatus":200},{"url":"https://www.mcafee.com/blogs/other-blogs/mcafee-labs/brata-keeps-sneaking-into-google-play-now-targeting-usa-and-spain/","alts":[],"httpStatus":200},{"url":"https://blog.cyble.com/2021/09/17/sophisticated-spyware-posing-as-a-banking-application-to-target-korean-users/","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1645719411557},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":7,"sectionCount":2,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"att-ck-for-mobile-reintroduction-and-2022-goals","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"attack-for-mobile-2022-roadmap-4fdb40a88a48","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*RUcsdzXAWMeoDxjWmxKOqg.png","originalWidth":1066,"originalHeight":1137,"isFeatured":true}},{"name":"7ea1","type":3,"text":"ATT&CK for Mobile: Reintroduction and 2022 Goals","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"What is it, and where are we taking it?"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":3,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"primaryTopicId":"d4e7f4144ac5","isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"7f56","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*RUcsdzXAWMeoDxjWmxKOqg.png","originalWidth":1066,"originalHeight":1137,"isFeatured":true}},{"name":"7ea1","type":3,"text":"ATT&CK for Mobile: Reintroduction and 2022 Goals","markups":[]},{"name":"c7a5","type":1,"text":"With the huge rise in critical work data on smartphones over the past couple of years, mobile security is more important than ever before. With this in mind, since early 2021 we’ve been re-designing and rewriting the entirety of ATT&CK for Mobile. We’ve also spent a lot of time considering…","markups":[]}],"sections":[{"name":"d83a","startIndex":0},{"name":"cd47","startIndex":2}]},"isFullContent":false,"subtitle":"What is it, and where are we taking it?"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"cd5a1a3387c7":{"id":"cd5a1a3387c7","versionId":"17b18f3d57e9","creatorId":"13b16fa8065d","homeCollectionId":"6da19bd08fba","title":"ATT&CK 2022 Roadmap","detectedLanguage":"en","latestVersion":"17b18f3d57e9","latestPublishedVersion":"17b18f3d57e9","hasUnpublishedEdits":false,"latestRev":438,"createdAt":1643655461105,"updatedAt":1644508510506,"acceptedAt":0,"firstPublishedAt":1643814148867,"latestPublishedAt":1644508503606,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Where We’ve Been and Where We’re Going","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*0bpIw9Lf7WUPYBukKdXdMw.png","filter":"","backgroundSize":"","originalWidth":1548,"originalHeight":860,"strategy":"resample","height":0,"width":0},"wordCount":1588,"imageCount":3,"readingTime":6.542452830188679,"subtitle":"Where We’ve Been and Where We’re Going","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":20,"isBookmarked":false,"tags":[{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"},{"slug":"2022-roadmap","name":"2022 Roadmap","postCount":9,"metadata":{"postCount":9,"coverImage":{"id":"1*0bpIw9Lf7WUPYBukKdXdMw.png","originalWidth":1548,"originalHeight":860,"isFeatured":true}},"type":"Tag"},{"slug":"detection","name":"Detection","postCount":824,"metadata":{"postCount":824,"coverImage":{"id":"0*STkVJWKulOixmgZ9.jpg","originalWidth":1024,"originalHeight":1024,"isFeatured":true}},"type":"Tag"},{"slug":"campaign","name":"Campaign","postCount":7968,"metadata":{"postCount":7968,"coverImage":{"id":"0*Jco4uqectfk2PPqS","originalWidth":3840,"originalHeight":2160,"isFeatured":true,"unsplashPhotoId":"upMISxb0WD0"}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":2,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"https://mitre-attack.github.io/attack-navigator/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/updates-october-2021/index.html","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/mitigations/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/datasources/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/containers/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/iaas/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G0016/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G0032/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-april-2021-release-39accaf23c81","alts":[{"type":3,"url":"medium://p/39accaf23c81"},{"type":2,"url":"medium://p/39accaf23c81"}],"httpStatus":200},{"url":"https://www.mitre.org/attackcon","alts":[],"httpStatus":200},{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/att-ck-2021-roadmap-68bab3886fa2","alts":[{"type":3,"url":"medium://p/68bab3886fa2"},{"type":2,"url":"medium://p/68bab3886fa2"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-subs-what-you-need-to-know-99bce414ae0b","alts":[{"type":3,"url":"medium://p/99bce414ae0b"},{"type":2,"url":"medium://p/99bce414ae0b"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/mobile-attack-mitigating-android-abuse-50516fb7de85","alts":[{"type":3,"url":"medium://p/50516fb7de85"},{"type":2,"url":"medium://p/50516fb7de85"}],"httpStatus":200},{"url":"https://github.com/center-for-threat-informed-defense/attack-control-framework-mappings","alts":[],"httpStatus":200},{"url":"https://twitter.com/mitreattack","alts":[],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics/index.php/All_Assets","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1644508504464},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":74,"sectionCount":1,"readingList":0,"topics":[{"topicId":"decb52b64abf","slug":"programming","createdAt":1493934116328,"deletedAt":0,"image":{"id":"1*iPa136b1cGEO7lvoXg6uHQ@2x.jpeg","originalWidth":6016,"originalHeight":4016},"name":"Programming","description":"The good, the bad, the buggy.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Programming News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"att-ck-2022-roadmap","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"attack-2022-roadmap-cd5a1a3387c7","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*0bpIw9Lf7WUPYBukKdXdMw.png","originalWidth":1548,"originalHeight":860,"isFeatured":true}},{"name":"49e7","type":3,"text":"ATT&CK 2022 Roadmap","markups":[],"alignment":1},{"name":"b3d2","type":13,"text":"Where We’ve Been and Where We’re Going","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Where We’ve Been and Where We’re Going"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"c1cf8a7505bb","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"689c","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*0bpIw9Lf7WUPYBukKdXdMw.png","originalWidth":1548,"originalHeight":860,"isFeatured":true}},{"name":"49e7","type":3,"text":"ATT&CK 2022 Roadmap","markups":[]},{"name":"b3d2","type":13,"text":"Where We’ve Been and Where We’re Going","markups":[]},{"name":"9058","type":1,"text":"In 2021, as we navigated a pandemic and moved into a new normal, we continued evolving ATT&CK without any significant structural overhauls (as promised). We were able to make strides in many areas — including the ATT&CK data sources methodology, to more effectively represent adversary behavior from a data perspective…","markups":[{"type":3,"start":220,"end":244,"href":"https://medium.com/mitre-attack/attack-april-2021-release-39accaf23c81","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":276,"end":318,"href":"https://attack.mitre.org/datasources/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":382,"end":403,"href":"https://attack.mitre.org/matrices/enterprise/containers/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":510,"end":514,"href":"https://attack.mitre.org/matrices/enterprise/cloud/iaas/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":640,"end":656,"href":"https://mitre-attack.github.io/attack-navigator/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":729,"end":830,"href":"https://attack.mitre.org/resources/updates/updates-october-2021/index.html","title":"","rel":"noreferrer noopener","anchorType":0}]}],"sections":[{"name":"1274","startIndex":0}]},"isFullContent":false,"subtitle":"Where We’ve Been and Where We’re Going"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":true,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"7743870b37e3":{"id":"7743870b37e3","versionId":"49d927d50d9e","creatorId":"13b16fa8065d","homeCollectionId":"6da19bd08fba","title":"Introducing ATT&CK v10: More Objects, Parity and Features","detectedLanguage":"en","latestVersion":"49d927d50d9e","latestPublishedVersion":"49d927d50d9e","hasUnpublishedEdits":false,"latestRev":269,"createdAt":1634738599732,"updatedAt":1641331294086,"acceptedAt":0,"firstPublishedAt":1634831437317,"latestPublishedAt":1634831437317,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Detailing the content and feature updates just released in ATT&CK v10","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*aghj7RR33HlT_i1FVYx_eQ.jpeg","filter":"","backgroundSize":"","originalWidth":512,"originalHeight":312,"strategy":"resample","height":0,"width":0},"wordCount":1296,"imageCount":5,"readingTime":5.723899371069182,"subtitle":"Detailing the content and feature updates just released in ATT&CK v10","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":34,"isBookmarked":false,"tags":[{"slug":"attck-v10","name":"Attck V10","postCount":0,"metadata":{"postCount":0,"coverImage":{"id":"1*aghj7RR33HlT_i1FVYx_eQ.jpeg","originalWidth":512,"originalHeight":312,"isFeatured":true}},"type":"Tag"},{"slug":"attck-release","name":"Attck Release","postCount":0,"metadata":{"postCount":0,"coverImage":{"id":"1*aghj7RR33HlT_i1FVYx_eQ.jpeg","originalWidth":512,"originalHeight":312,"isFeatured":true}},"type":"Tag"},{"slug":"datasource","name":"Data Sources","postCount":2,"metadata":{"postCount":2,"coverImage":{"id":"1*_e083heil76BR5Y0GrukLg.png","originalWidth":600,"originalHeight":360}},"type":"Tag"},{"slug":"release-notes","name":"Release Notes","postCount":4066,"metadata":{"postCount":4066,"coverImage":{"id":"1*QjKICvs7xsJWljFSiSnT2w.jpeg","originalWidth":4608,"originalHeight":3072,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":0,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"https://attack.mitre.org/datasources/","alts":[],"httpStatus":404},{"url":"https://attack.mitre.org/resources/updates/updates-october-2021/","alts":[],"httpStatus":404},{"url":"https://attack.mitre.org/resources/contribute/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/mitigations/enterprise/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/linux/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/macos/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-april-2021-release-39accaf23c81","alts":[{"type":2,"url":"medium://p/39accaf23c81"},{"type":3,"url":"medium://p/39accaf23c81"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/in-pursuit-of-a-gestalt-visualization-merging-mitre-att-ck-for-enterprise-and-ics-to-communicate-3523daa7b580","alts":[{"type":3,"url":"medium://p/3523daa7b580"},{"type":2,"url":"medium://p/3523daa7b580"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/att-ck-2021-roadmap-68bab3886fa2","alts":[{"type":3,"url":"medium://p/68bab3886fa2"},{"type":2,"url":"medium://p/68bab3886fa2"}],"httpStatus":200},{"url":"https://twitter.com/MITREattack?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor","alts":[],"httpStatus":200},{"url":"https://twitter.com/MITREattack/status/1445060354703245321","alts":[],"httpStatus":200},{"url":"https://github.com/mitre/cti/blob/master/USAGE.md","alts":[],"httpStatus":200},{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://github.com/mitre/cti","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-datasources","alts":[],"httpStatus":200},{"url":"https://ctid.mitre-engenuity.org/our-work/attack-workbench/","alts":[],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics/index.php/All_Assets","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1634831438223},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":63,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"},{"topicId":"decb52b64abf","slug":"programming","createdAt":1493934116328,"deletedAt":0,"image":{"id":"1*iPa136b1cGEO7lvoXg6uHQ@2x.jpeg","originalWidth":6016,"originalHeight":4016},"name":"Programming","description":"The good, the bad, the buggy.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Programming News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"introducing-att-ck-v10-more-objects-parity-and-features","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"introducing-attack-v10-7743870b37e3","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*aghj7RR33HlT_i1FVYx_eQ.jpeg","originalWidth":512,"originalHeight":312,"isFeatured":true}},{"name":"9221","type":3,"text":"Introducing ATT&CK v10: More Objects, Parity, and Features","markups":[{"type":1,"start":0,"end":58}],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Detailing the content and feature updates just released in ATT&CK v10"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"Introducing ATT&CK v10: More Objects, Parity, and Features","previewContent2":{"bodyModel":{"paragraphs":[{"name":"f7bd","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*aghj7RR33HlT_i1FVYx_eQ.jpeg","originalWidth":512,"originalHeight":312,"isFeatured":true}},{"name":"9221","type":3,"text":"Introducing ATT&CK v10: More Objects, Parity, and Features","markups":[{"type":1,"start":0,"end":58}]},{"name":"cda8","type":1,"text":"By Amy L. Robertson (MITRE), Alexia Crumpton (MITRE), and Chris Ante (MITRE)","markups":[{"type":3,"start":3,"end":19,"anchorType":2,"userId":"13b16fa8065d"},{"type":3,"start":29,"end":44,"anchorType":2,"userId":"35dc9bd08e61"},{"type":3,"start":58,"end":68,"anchorType":2,"userId":"d182dc9a9096"}]},{"name":"6eeb","type":1,"text":"As announced a couple of weeks ago, we’re back with the latest release and we’re thrilled to reveal all the updates and features waiting for you in ATT&CK v10. The v10 release includes the next episode in our…","markups":[{"type":3,"start":3,"end":12,"href":"https://twitter.com/MITREattack/status/1445060354703245321","title":"","rel":"","anchorType":0},{"type":3,"start":400,"end":413,"href":"https://attack.mitre.org/resources/updates/updates-october-2021/","title":"","rel":"","anchorType":0}]}],"sections":[{"name":"ae52","startIndex":0}]},"isFullContent":false,"subtitle":"Detailing the content and feature updates just released in ATT&CK v10"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"39accaf23c81":{"id":"39accaf23c81","versionId":"23630adccc77","creatorId":"1dfd16769165","homeCollectionId":"6da19bd08fba","title":"What’s New in ATT&CK v9?","detectedLanguage":"en","latestVersion":"23630adccc77","latestPublishedVersion":"23630adccc77","hasUnpublishedEdits":false,"latestRev":323,"createdAt":1619625386202,"updatedAt":1641510676571,"acceptedAt":0,"firstPublishedAt":1619706069630,"latestPublishedAt":1619706069630,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Data Sources, Containers, Cloud, and More","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*x9njnXWLa5PGfhy3UMuxJA.gif","filter":"","backgroundSize":"","originalWidth":1350,"originalHeight":1080,"strategy":"resample","height":0,"width":0},"wordCount":1324,"imageCount":6,"readingTime":5.94622641509434,"subtitle":"Data Sources, Containers, Cloud, and More","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":59,"isBookmarked":false,"tags":[{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"},{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"},{"slug":"containers","name":"Containers","postCount":15793,"metadata":{"postCount":15793,"coverImage":{"id":"1*E6q73zAYBh3-lbbTdAm9Lg.jpeg","originalWidth":832,"originalHeight":448,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":2,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/contribute/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/","alts":[],"httpStatus":200},{"url":"https://ossemproject.com/dm/mitre_attack/data_sources.html","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/googleworkspace/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/office365/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/iaas/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/macos/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1003/001/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/att-ck-2021-roadmap-68bab3886fa2","alts":[{"type":3,"url":"medium://p/68bab3886fa2"},{"type":2,"url":"medium://p/68bab3886fa2"}],"httpStatus":200},{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/linux/","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-datasources/tree/main/contribution","alts":[],"httpStatus":200},{"url":"https://medium.com/@olafhartong/assess-your-data-potential-with-att-ck-datamap-f44884cfed11","alts":[{"type":2,"url":"medium://p/f44884cfed11"},{"type":3,"url":"medium://p/f44884cfed11"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/defining-attack-data-sources-part-i-4c39e581454f","alts":[{"type":3,"url":"medium://p/4c39e581454f"},{"type":2,"url":"medium://p/4c39e581454f"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/defining-attack-data-sources-part-ii-1fc98738ba5b","alts":[{"type":3,"url":"medium://p/1fc98738ba5b"},{"type":2,"url":"medium://p/1fc98738ba5b"}],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-datasources/blob/main/contribution/process.yml","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-datasources/blob/main/contribution/image.yml","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-datasources/blob/main/contribution/cloud_storage.yml","alts":[],"httpStatus":200},{"url":"https://twitter.com/MITREattack/status/1377615020465520640","alts":[],"httpStatus":200},{"url":"https://twitter.com/MITREattack?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor","alts":[],"httpStatus":200},{"url":"https://github.com/mitre-attack/attack-datasources","alts":[],"httpStatus":200},{"url":"https://mitre-engenuity.org/ctid/","alts":[],"httpStatus":200},{"url":"https://youtu.be/eKeydMrXsOE","alts":[{"type":2,"url":"vnd.youtube://www.youtube.com/watch?v=eKeydMrXsOE&feature=youtu.be&feature=applinks"},{"type":3,"url":"vnd.youtube://www.youtube.com/watch?v=eKeydMrXsOE&feature=youtu.be&feature=applinks"}],"httpStatus":200},{"url":"https://www.mbsecure.nl/blog/2019/5/dettact-mapping-your-blue-team-to-mitre-attack","alts":[{"type":1,"url":"https://cdn.ampproject.org/c/s/www.mbsecure.nl/blog/2019/5/dettact-mapping-your-blue-team-to-mitre-attack?format=amp"}],"httpStatus":200},{"url":"https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1619706070640},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":107,"sectionCount":1,"readingList":0,"topics":[{"topicId":"decb52b64abf","slug":"programming","createdAt":1493934116328,"deletedAt":0,"image":{"id":"1*iPa136b1cGEO7lvoXg6uHQ@2x.jpeg","originalWidth":6016,"originalHeight":4016},"name":"Programming","description":"The good, the bad, the buggy.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Programming News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"whats-new-in-att-ck-v9","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"attack-april-2021-release-39accaf23c81","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*x9njnXWLa5PGfhy3UMuxJA.gif","originalWidth":1350,"originalHeight":1080,"isFeatured":true}},{"name":"4d1a","type":3,"text":"Data Sources, Containers, Cloud, and More: What’s New in ATT&CK v9?","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Data Sources, Containers, Cloud, and More"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"What’s New in ATT&CK v9?. Data Sources, Containers, Cloud, and more","previewContent2":{"bodyModel":{"paragraphs":[{"name":"4d1a","type":3,"text":"Data Sources, Containers, Cloud, and More: What’s New in ATT&CK v9?","markups":[]},{"name":"6f49","type":1,"text":"By Jamie Williams (MITRE), Jen Burns (MITRE), Cat Self (MITRE), and Adam Pennington (MITRE)","markups":[{"type":3,"start":3,"end":17,"anchorType":2,"userId":"1dfd16769165"},{"type":3,"start":27,"end":36,"anchorType":2,"userId":"44c28447cfae"},{"type":3,"start":46,"end":54,"anchorType":2,"userId":"727c9e5054e4"},{"type":3,"start":68,"end":83,"anchorType":2,"userId":"37fd2c032d44"}]},{"name":"71a1","type":1,"text":"As we promised in the ATT&CK 2021 Roadmap, today marks our April release (ATT&CK v9) and we’re thrilled to share the additions with you, and how to use them. So, what changed with this release?","markups":[{"type":3,"start":22,"end":41,"href":"https://medium.com/mitre-attack/att-ck-2021-roadmap-68bab3886fa2","title":"","rel":"","anchorType":0}]},{"name":"fb13","type":9,"text":"Updated…","markups":[]}],"sections":[{"name":"6e42","startIndex":0}]},"isFullContent":false,"subtitle":"Data Sources, Containers, Cloud, and More"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"68bab3886fa2":{"id":"68bab3886fa2","versionId":"5e2f2952d5b5","creatorId":"13b16fa8065d","homeCollectionId":"6da19bd08fba","title":"ATT&CK 2021 Roadmap","detectedLanguage":"en","latestVersion":"5e2f2952d5b5","latestPublishedVersion":"5e2f2952d5b5","hasUnpublishedEdits":false,"latestRev":223,"createdAt":1615919304875,"updatedAt":1693331066868,"acceptedAt":0,"firstPublishedAt":1615923837411,"latestPublishedAt":1616529685487,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"A review of how we navigated 2020 and where we’re heading in 2021","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*WPRfQhFyxa2Qc7oAbhupKA.png","filter":"","backgroundSize":"","originalWidth":1439,"originalHeight":246,"strategy":"resample","height":0,"width":0},"wordCount":1952,"imageCount":9,"readingTime":8.566037735849056,"subtitle":"A review of how we navigated 2020 and where we’re heading in 2021","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":40,"isBookmarked":false,"tags":[{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"},{"slug":"mitre-attck","name":"Mitre Attck","postCount":81,"metadata":{"postCount":81,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"},{"slug":"2021","name":"2021","postCount":15327,"metadata":{"postCount":15327,"coverImage":{"id":"1*q0bLJtZ3THngO64RNvoFNg.jpeg","originalWidth":1920,"originalHeight":827,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":2,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"https://mitre-attack.github.io/attack-navigator/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/azuread/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0009/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0042/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/gcp/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0010/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/azure/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/contribute/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0043/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/network/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/aws/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/saas/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/cloud/office365/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/in-pursuit-of-a-gestalt-visualization-merging-mitre-att-ck-for-enterprise-and-ics-to-communicate-3523daa7b580","alts":[{"type":3,"url":"medium://p/3523daa7b580"},{"type":2,"url":"medium://p/3523daa7b580"}],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1496/","alts":[],"httpStatus":200},{"url":"https://www.mitre.org/attackcon","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-engenuity/update-help-shape-att-ck-for-containers-bfcd24515df5","alts":[{"type":3,"url":"medium://p/bfcd24515df5"},{"type":2,"url":"medium://p/bfcd24515df5"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/the-retirement-of-pre-attack-4b73ffecd3d3","alts":[{"type":3,"url":"medium://p/4b73ffecd3d3"},{"type":2,"url":"medium://p/4b73ffecd3d3"}],"httpStatus":200},{"url":"https://join.slack.com/t/mitreattack/shared_invite/zt-ny1a3yon-XkT_OS1IF~ZYrESq8Xtqjg","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/identifying-unc2452-related-techniques-9f7b6c7f3714","alts":[{"type":3,"url":"medium://p/9f7b6c7f3714"},{"type":2,"url":"medium://p/9f7b6c7f3714"}],"httpStatus":200},{"url":"https://medium.com/mitre-engenuity/evaluating-mobile-security-products-def71dcf9187","alts":[{"type":3,"url":"medium://p/def71dcf9187"},{"type":2,"url":"medium://p/def71dcf9187"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/mobile-attack-mitigating-android-abuse-50516fb7de85","alts":[{"type":3,"url":"medium://p/50516fb7de85"},{"type":2,"url":"medium://p/50516fb7de85"}],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1531/","alts":[],"httpStatus":200},{"url":"https://github.com/center-for-threat-informed-defense/public-resources/blob/master/solorigate/README.md","alts":[],"httpStatus":200},{"url":"https://mitre-engenuity.org/ctid/","alts":[],"httpStatus":200},{"url":"https://twitter.com/MITREattack?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/defining-attack-data-sources-part-i-4c39e581454f","alts":[{"type":3,"url":"medium://p/4c39e581454f"},{"type":2,"url":"medium://p/4c39e581454f"}],"httpStatus":200},{"url":"https://medium.com/mitre-engenuity/research-partnership-matures-att-ck-for-cloud-d232998968ce","alts":[{"type":3,"url":"medium://p/d232998968ce"},{"type":2,"url":"medium://p/d232998968ce"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/launching-attack-for-ics-2be4d2fb9b8","alts":[{"type":3,"url":"medium://p/2be4d2fb9b8"},{"type":2,"url":"medium://p/2be4d2fb9b8"}],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics/index.php/Software/S0010","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-engenuity/evaluating-mobile-security-products-malicious-applications-df7b5fc20145","alts":[{"type":3,"url":"medium://p/df7b5fc20145"},{"type":2,"url":"medium://p/df7b5fc20145"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/defining-attack-data-sources-part-ii-1fc98738ba5b","alts":[{"type":3,"url":"medium://p/1fc98738ba5b"},{"type":2,"url":"medium://p/1fc98738ba5b"}],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics/index.php/Software/S0001","alts":[],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics/index.php/Software/S0013","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-engenuity/help-shape-att-ck-for-containers-7fe4905623c5","alts":[{"type":3,"url":"medium://p/7fe4905623c5"},{"type":2,"url":"medium://p/7fe4905623c5"}],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics/index.php/Mitigations","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-with-sub-techniques-is-now-just-attack-8fc20997d8de","alts":[{"type":3,"url":"medium://p/8fc20997d8de"},{"type":2,"url":"medium://p/8fc20997d8de"}],"httpStatus":200}],"version":"0.3","generatedAt":1616529691365},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":140,"sectionCount":1,"readingList":0,"topics":[{"topicId":"decb52b64abf","slug":"programming","createdAt":1493934116328,"deletedAt":0,"image":{"id":"1*iPa136b1cGEO7lvoXg6uHQ@2x.jpeg","originalWidth":6016,"originalHeight":4016},"name":"Programming","description":"The good, the bad, the buggy.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Programming News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"att-ck-2021-roadmap","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"att-ck-2021-roadmap-68bab3886fa2","previewContent":{"bodyModel":{"paragraphs":[{"name":"ab0a","type":4,"text":"","markups":[],"layout":9,"metadata":{"id":"1*WPRfQhFyxa2Qc7oAbhupKA.png","originalWidth":1439,"originalHeight":246}},{"name":"1b05","type":3,"text":"ATT&CK 2021 Roadmap","markups":[],"alignment":1},{"name":"b84f","type":1,"text":"A review of how we navigated 2020 and where we’re heading in 2021","markups":[{"type":2,"start":0,"end":65}],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"A review of how we navigated 2020 and where we’re heading in 2021"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"ab0a","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*WPRfQhFyxa2Qc7oAbhupKA.png","originalWidth":1439,"originalHeight":246}},{"name":"1b05","type":3,"text":"ATT&CK 2021 Roadmap","markups":[]},{"name":"b84f","type":1,"text":"A review of how we navigated 2020 and where we’re heading in 2021","markups":[{"type":2,"start":0,"end":65}]},{"name":"9d80","type":1,"text":"With the monumental disruptions, challenges, and hybrid work environments of 2020, we found innovative ways to collaborate and maintain momentum. We started off 2020 by launching ATT&CK for ICS and expanding it over the next few months…","markups":[{"type":3,"start":169,"end":193,"href":"https://medium.com/mitre-attack/launching-attack-for-ics-2be4d2fb9b8","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":247,"end":258,"href":"https://collaborate.mitre.org/attackics/index.php/Mitigations","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":299,"end":323,"href":"https://medium.com/mitre-attack/defining-attack-data-sources-part-i-4c39e581454f","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":387,"end":429,"href":"https://medium.com/mitre-attack/defining-attack-data-sources-part-ii-1fc98738ba5b","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":440,"end":454,"href":"https://medium.com/mitre-attack/attack-with-sub-techniques-is-now-just-attack-8fc20997d8de","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":579,"end":635,"href":"https://medium.com/mitre-attack/the-retirement-of-pre-attack-4b73ffecd3d3","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":658,"end":672,"href":"https://attack.mitre.org/tactics/TA0043/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":677,"end":697,"href":"https://attack.mitre.org/tactics/TA0042/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":740,"end":755,"href":"https://attack.mitre.org/matrices/enterprise/network/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":870,"end":920,"href":"https://medium.com/mitre-engenuity/research-partnership-matures-att-ck-for-cloud-d232998968ce","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":954,"end":970,"href":"https://mitre-attack.github.io/attack-navigator/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":1068,"end":1087,"href":"https://www.mitre.org/attackcon","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":1164,"end":1236,"href":"https://medium.com/mitre-attack/identifying-unc2452-related-techniques-9f7b6c7f3714","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":1238,"end":1291,"href":"https://attack.mitre.org/","title":"","rel":"noreferrer noopener","anchorType":0},{"type":3,"start":1297,"end":1321,"href":"https://github.com/center-for-threat-informed-defense/public-resources/blob/master/solorigate/README.md","title":"","rel":"","anchorType":0}]}],"sections":[{"name":"4c25","startIndex":0}]},"isFullContent":false,"subtitle":"A review of how we navigated 2020 and where we’re heading in 2021"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"50516fb7de85":{"id":"50516fb7de85","versionId":"221b8f57d5b0","creatorId":"a63006eeacc2","homeCollectionId":"6da19bd08fba","title":"Mitigating Abuse of Android Application Permissions and Special App Accesses","detectedLanguage":"en","latestVersion":"221b8f57d5b0","latestPublishedVersion":"221b8f57d5b0","hasUnpublishedEdits":false,"latestRev":159,"createdAt":1611603257606,"updatedAt":1640702856225,"acceptedAt":0,"firstPublishedAt":1611678413935,"latestPublishedAt":1616000286533,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Part 1 of a series on ATT&CK® for Mobile (Android and iOS) devices","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*emdC5k0jVlBY6XPGn0FghA.png","filter":"","backgroundSize":"","originalWidth":954,"originalHeight":644,"strategy":"resample","height":0,"width":0},"wordCount":1524,"imageCount":6,"readingTime":6.700943396226415,"subtitle":"Part 1 of a series on ATT&CK® for Mobile (Android and iOS) devices","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":13,"isBookmarked":false,"tags":[{"slug":"mitre-attck","name":"Mitre Attck","postCount":81,"metadata":{"postCount":81,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"},{"slug":"android","name":"Android","postCount":143459,"metadata":{"postCount":143459,"coverImage":{"id":"1*JZHO5lsnXJ3BvUdHHbN8xA.png","originalWidth":8418,"originalHeight":2506,"isFeatured":true}},"type":"Tag"},{"slug":"application-permissions","name":"Application Permissions","postCount":1,"metadata":{"postCount":1,"coverImage":{"id":"1*emdC5k0jVlBY6XPGn0FghA.png","originalWidth":954,"originalHeight":644,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":0,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"https://www.mitre.org/publications/technical-papers/analyzing-the-effectiveness-of-app-vetting-tools-in-the-enterprise","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1417/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/mobile/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/mitigations/M1005/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1513/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1516/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1447/","alts":[],"httpStatus":200},{"url":"https://arxiv.org/abs/1904.05572","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1517/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1411/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1541/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1429/","alts":[],"httpStatus":200},{"url":"https://developer.android.com/training/data-storage/manage-all-files#operations-allowed-manage-external-storage","alts":[],"httpStatus":200},{"url":"https://developer.android.com/reference/android/accessibilityservice/AccessibilityService","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1616000287186},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":11,"sectionCount":2,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"mitigating-abuse-of-android-application-permissions-and-special-app-accesses","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"mobile-attack-mitigating-android-abuse-50516fb7de85","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*emdC5k0jVlBY6XPGn0FghA.png","originalWidth":954,"originalHeight":644,"isFeatured":true}},{"name":"c47e","type":3,"text":"Mitigating Abuse of Android Application Permissions and Special App Accesses","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Part 1 of a series on ATT&CK® for Mobile (Android and iOS) devices"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"c47e","type":3,"text":"Mitigating Abuse of Android Application Permissions and Special App Accesses","markups":[]},{"name":"8724","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*emdC5k0jVlBY6XPGn0FghA.png","originalWidth":954,"originalHeight":644,"isFeatured":true}},{"name":"6e2f","type":1,"text":"ATT&CK® for Mobile is an ATT&CK matrix of adversary behavior against mobile devices (smartphones and tablets running the Android or iOS/iPadOS operating systems). We started the ATT&CK for Mobile journey with the goal of highlighting the broader mobile threat landscape and adversary behavior exploiting the distinct security architectures in mobile…","markups":[{"type":3,"start":0,"end":18,"href":"https://attack.mitre.org/matrices/mobile/","title":"","rel":"noopener nofollow","anchorType":0}]}],"sections":[{"name":"43e4","startIndex":0}]},"isFullContent":false,"subtitle":"Part 1 of a series on ATT&CK® for Mobile (Android and iOS) devices"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"9f7b6c7f3714":{"id":"9f7b6c7f3714","versionId":"8abcd036c7a4","creatorId":"2138aa4a8cfa","homeCollectionId":"6da19bd08fba","title":"Identifying UNC2452-Related Techniques for ATT&CK","detectedLanguage":"en","latestVersion":"8abcd036c7a4","latestPublishedVersion":"8abcd036c7a4","hasUnpublishedEdits":false,"latestRev":1502,"createdAt":1608586120303,"updatedAt":1651078143149,"acceptedAt":0,"firstPublishedAt":1608649548262,"latestPublishedAt":1651078138743,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Tracking UNC2452-related reporting as we look to update ATT&CK.","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*MRE2K9GbE7cvy1QmKX-fBg.jpeg","filter":"","backgroundSize":"","originalWidth":1640,"originalHeight":1383,"strategy":"resample","height":0,"width":0},"wordCount":791,"imageCount":2,"readingTime":3.368238993710692,"subtitle":"Tracking UNC2452-related reporting as we look to update ATT&CK.","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":58,"isBookmarked":false,"tags":[{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"},{"slug":"cti","name":"Cti","postCount":537,"metadata":{"postCount":537,"coverImage":{"id":"1*4sYTsAW7qCJR9dwBk7SDhQ.png","originalWidth":1655,"originalHeight":760,"isFeatured":true}},"type":"Tag"},{"slug":"threat-intelligence","name":"Threat Intelligence","postCount":5337,"metadata":{"postCount":5337,"coverImage":{"id":"1*rjwV_i5paNopPBsWGNVGJQ.png","originalWidth":936,"originalHeight":574,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":4,"links":{"entries":[{"url":"mailto:attack@mitre.org","alts":[],"httpStatus":0},{"url":"https://mitre-attack.github.io/attack-navigator/#layerURL=https://raw.githubusercontent.com/center-for-threat-informed-defense/public-resources/master/solorigate/UNC2452.json","alts":[],"httpStatus":200},{"url":"https://raw.githubusercontent.com/center-for-threat-informed-defense/public-resources/master/solorigate/UNC2452.json","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/groups/G0118/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1098/001/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1484/002/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1606/001/","alts":[],"httpStatus":200},{"url":"https://github.com/center-for-threat-informed-defense/public-resources/blob/master/solorigate/README.md","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1195/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1070/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1218/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/software/S0552/","alts":[],"httpStatus":200},{"url":"https://www.youtube.com/watch?v=USDHmKiLNJM","alts":[{"type":2,"url":"vnd.youtube://www.youtube.com/watch?v=USDHmKiLNJM&feature=applinks"},{"type":3,"url":"vnd.youtube://www.youtube.com/watch?v=USDHmKiLNJM&feature=applinks"}],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1606/002/","alts":[],"httpStatus":200},{"url":"https://msrc-blog.microsoft.com/2020/12/13/customer-guidance-on-recent-nation-state-cyber-attacks/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1059/","alts":[],"httpStatus":200},{"url":"https://www.volexity.com/blog/2020/12/14/dark-halo-leverages-solarwinds-compromise-to-breach-organizations/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1098/002/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/software/S0560/","alts":[],"httpStatus":200},{"url":"https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/software/S0562/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/software/S0559/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1105/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1552/004/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/software/S0565/","alts":[],"httpStatus":200},{"url":"https://mitre-engenuity.org/ctid/","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1651078139588},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":76,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"identifying-unc2452-related-techniques-for-att-ck","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"identifying-unc2452-related-techniques-9f7b6c7f3714","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*MRE2K9GbE7cvy1QmKX-fBg.jpeg","originalWidth":1640,"originalHeight":1383,"isFeatured":true}},{"name":"d4ce","type":3,"text":"Identifying UNC2452-Related Techniques for ATT&CK","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Tracking UNC2452-related reporting as we look to update ATT&CK."},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"d4ce","type":3,"text":"Identifying UNC2452-Related Techniques for ATT&CK","markups":[]},{"name":"8d0e","type":1,"text":"By Matt Malone (MITRE), Jamie Williams (MITRE), Jen Burns (MITRE), and Adam Pennington (MITRE)","markups":[{"type":3,"start":3,"end":14,"anchorType":2,"userId":"2138aa4a8cfa"},{"type":3,"start":24,"end":38,"anchorType":2,"userId":"1dfd16769165"},{"type":3,"start":48,"end":57,"anchorType":2,"userId":"44c28447cfae"},{"type":3,"start":71,"end":86,"anchorType":2,"userId":"37fd2c032d44"}]},{"name":"508a","type":1,"text":"Last updated 27 April 2022 12:00pm EDT","markups":[]},{"name":"ac5b","type":1,"text":"Reporting regarding activity related to the SolarWinds supply chain injection has grown quickly since initial disclosure on 13 December 2020. A significant amount of press reporting has focused on…","markups":[]}],"sections":[{"name":"5378","startIndex":0}]},"isFullContent":false,"subtitle":"Tracking UNC2452-related reporting as we look to update ATT&CK."},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"4b73ffecd3d3":{"id":"4b73ffecd3d3","versionId":"c38e358fe7a0","creatorId":"37fd2c032d44","homeCollectionId":"6da19bd08fba","title":"Bringing PRE into Enterprise","detectedLanguage":"en","latestVersion":"c38e358fe7a0","latestPublishedVersion":"c38e358fe7a0","hasUnpublishedEdits":false,"latestRev":162,"createdAt":1603568742794,"updatedAt":1639647017053,"acceptedAt":0,"firstPublishedAt":1603809820779,"latestPublishedAt":1603821111074,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Integrating the scope of PRE-ATT&CK into Enterprise ATT&CK","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*m7y6QEAr6XSnsk4sBNejqw.png","filter":"","backgroundSize":"","originalWidth":1465,"originalHeight":920,"strategy":"resample","height":0,"width":0},"wordCount":1161,"imageCount":6,"readingTime":5.331132075471698,"subtitle":"Integrating the scope of PRE-ATT&CK into Enterprise ATT&CK","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":27,"isBookmarked":false,"tags":[{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"},{"slug":"cti","name":"Cti","postCount":537,"metadata":{"postCount":537,"coverImage":{"id":"1*4sYTsAW7qCJR9dwBk7SDhQ.png","originalWidth":1655,"originalHeight":760,"isFeatured":true}},"type":"Tag"},{"slug":"threat-intelligence","name":"Threat Intelligence","postCount":5337,"metadata":{"postCount":5337,"coverImage":{"id":"1*rjwV_i5paNopPBsWGNVGJQ.png","originalWidth":936,"originalHeight":574,"isFeatured":true}},"type":"Tag"},{"slug":"cyber-kill-chain","name":"Cyber Kill Chain","postCount":213,"metadata":{"postCount":213,"coverImage":{"id":"0*w-THOh2eUy095lPo.jpg","originalWidth":1200,"originalHeight":1203,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":2,"links":{"entries":[{"url":"mailto:attack@mitre.org?subject=PRE-ATT&CK%20Integration%20Feedback&CK%20Integration%20Feedbac&CK%20Integration%20Feedba&CK%20Integration%20Feedb&CK%20Integration%20Feed&CK%20Integration%20Fee&CK%20Integration%20Fe&CK%20Integration%20F&CK%20Integration%20&CK%20Integration&CK%20Integratio&CK%20Integrati&CK%20Integrat&CK%20Integra&CK%20Integr&CK%20Integ&CK%20Inte&CK%20Int&CK%20In&CK%20I&CK%20IN&CK%20INt&CK%20IN&CK%20I&CK%20&CK&C&","alts":[],"httpStatus":0},{"url":"https://mitre-attack.github.io/attack-navigator/enterprise/","alts":[],"httpStatus":200},{"url":"https://mitre-attack.github.io/attack-navigator/v2/enterprise/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/working-with-attack/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0001/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/contribute/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/matrices/enterprise/pre/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0043/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0042/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/updates-october-2020/index.html","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/versions/v7/matrices/pre/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/mitigations/M1056/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1589/","alts":[],"httpStatus":200},{"url":"https://www.mitre.org/capabilities/cybersecurity/threat-based-defense","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/","alts":[],"httpStatus":200},{"url":"https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json","alts":[],"httpStatus":200},{"url":"https://github.com/mitre/cti/tree/ATT%26CK-v7.2","alts":[],"httpStatus":200},{"url":"https://www.slideshare.net/attackcon2018/mitre-attckcon-20-attck-updates-pre-attck-integration-adam-pennington-mitre","alts":[{"type":2,"url":"slideshare-app://ss/193680123"},{"type":3,"url":"slideshare-app://ss/193680123"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-with-sub-techniques-is-now-just-attack-8fc20997d8de","alts":[{"type":3,"url":"medium://p/8fc20997d8de"},{"type":2,"url":"medium://p/8fc20997d8de"}],"httpStatus":200}],"version":"0.3","generatedAt":1603821112184},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":43,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"bringing-pre-into-enterprise","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"the-retirement-of-pre-attack-4b73ffecd3d3","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*m7y6QEAr6XSnsk4sBNejqw.png","originalWidth":1465,"originalHeight":920,"isFeatured":true}},{"name":"previewTitle","type":3,"text":"Bringing PRE into Enterprise","alignment":1},{"name":"previewSubtitle","type":13,"text":"Integrating the scope of PRE-ATT&CK into Enterprise ATT&CK","alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Integrating the scope of PRE-ATT&CK into Enterprise ATT&CK"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"ba66","type":3,"text":"Bringing PRE into Enterprise","markups":[]},{"name":"af25","type":1,"text":"Written by Adam Pennington and Jen Burns","markups":[{"type":2,"start":0,"end":40}]},{"name":"59ee","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*D08H2DgiCJ2Cc-uHPSm6Pw.png","originalWidth":936,"originalHeight":274}},{"name":"c298","type":1,"text":"We’re excited to announce that we’ve released the latest version of MITRE ATT&CK (v8), which includes the integration of PRE-ATT&CK’s scope into Enterprise ATT&CK! This integration removes the PRE-ATT&CK domain from ATT&CK and adds two new tactics to Enterprise — Reconnaissance and…","markups":[{"type":3,"start":50,"end":80,"href":"https://attack.mitre.org/resources/updates/updates-october-2020/index.html","title":"","rel":"","anchorType":0},{"type":3,"start":264,"end":278,"href":"https://attack.mitre.org/tactics/TA0043/","title":"","rel":"","anchorType":0},{"type":3,"start":283,"end":303,"href":"https://attack.mitre.org/tactics/TA0042/","title":"","rel":"","anchorType":0},{"type":3,"start":320,"end":350,"href":"https://medium.com/mitre-attack/attack-with-sub-techniques-is-now-just-attack-8fc20997d8de","title":"","rel":"","anchorType":0},{"type":3,"start":465,"end":479,"href":"https://attack.mitre.org/","title":"","rel":"","anchorType":0},{"type":3,"start":488,"end":504,"href":"https://mitre-attack.github.io/attack-navigator/enterprise/","title":"","rel":"","anchorType":0},{"type":3,"start":506,"end":513,"href":"https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json","title":"","rel":"","anchorType":0},{"type":3,"start":523,"end":539,"href":"https://attack.mitre.org/resources/working-with-attack/","title":"","rel":"","anchorType":0}]}],"sections":[{"name":"a0d5","startIndex":0}]},"isFullContent":false,"subtitle":"Integrating the scope of PRE-ATT&CK into Enterprise ATT&CK"},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"1fc98738ba5b":{"id":"1fc98738ba5b","versionId":"932028ba4c00","creatorId":"b8f2906f3de3","homeCollectionId":"6da19bd08fba","title":"Defining ATT&CK Data Sources, Part II: Operationalizing the Methodology","detectedLanguage":"en","latestVersion":"932028ba4c00","latestPublishedVersion":"932028ba4c00","hasUnpublishedEdits":false,"latestRev":629,"createdAt":1602858876985,"updatedAt":1639639492467,"acceptedAt":0,"firstPublishedAt":1603207787684,"latestPublishedAt":1603207787684,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Describing how a new data sources methodology can be implemented with ATT&CK data sources.","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*uRsHxbsYty0UtF1wW5ZmFg.jpeg","filter":"","backgroundSize":"","originalWidth":1098,"originalHeight":532,"strategy":"resample","height":0,"width":0},"wordCount":1916,"imageCount":20,"readingTime":8.980188679245284,"subtitle":"Describing how a new data sources methodology can be implemented with ATT&CK data sources.","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":34,"isBookmarked":false,"tags":[{"slug":"mitre","name":"Mitre","postCount":168,"metadata":{"postCount":168,"coverImage":{"id":"1*_yiZUiinals4sN1JI9F-CQ.jpeg","originalWidth":6016,"originalHeight":4016,"isFeatured":true}},"type":"Tag"},{"slug":"datasource","name":"Data Sources","postCount":2,"metadata":{"postCount":2,"coverImage":{"id":"1*_e083heil76BR5Y0GrukLg.png","originalWidth":600,"originalHeight":360}},"type":"Tag"},{"slug":"cybersecurity","name":"Cybersecurity","postCount":204824,"metadata":{"postCount":204824,"coverImage":{"id":"1*KtQ6g0rkIl-Z8x_6O23Ukw.png","originalWidth":856,"originalHeight":347,"isFeatured":true}},"type":"Tag"},{"slug":"infosec","name":"Infosec","postCount":13876,"metadata":{"postCount":13876,"coverImage":{"id":"0*bLXOEknfH2qhMzRf.jpg","originalWidth":1090,"originalHeight":770,"isFeatured":true}},"type":"Tag"},{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":2,"links":{"entries":[{"url":"https://github.com/mitre-attack/attack-datasources","alts":[],"httpStatus":200},{"url":"https://github.com/OTRF/OSSEM","alts":[],"httpStatus":200},{"url":"https://github.com/rabobank-cdc/DeTTECT","alts":[],"httpStatus":200},{"url":"https://github.com/olafhartong/ATTACKdatamap","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/defining-attack-data-sources-part-i-4c39e581454f","alts":[{"type":3,"url":"medium://p/4c39e581454f"},{"type":2,"url":"medium://p/4c39e581454f"}],"httpStatus":200}],"version":"0.3","generatedAt":1603207788394},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":128,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"},{"topicId":"decb52b64abf","slug":"programming","createdAt":1493934116328,"deletedAt":0,"image":{"id":"1*iPa136b1cGEO7lvoXg6uHQ@2x.jpeg","originalWidth":6016,"originalHeight":4016},"name":"Programming","description":"The good, the bad, the buggy.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Programming News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"defining-att-ck-data-sources-part-ii-operationalizing-the-methodology","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"defining-attack-data-sources-part-ii-1fc98738ba5b","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*uRsHxbsYty0UtF1wW5ZmFg.jpeg","originalWidth":1098,"originalHeight":532,"isFeatured":true}},{"name":"d367","type":3,"text":"Defining ATT&CK Data Sources, Part II: Operationalizing the Methodology","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Describing how a new data sources methodology can be implemented with ATT&CK data sources."},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"d367","type":3,"text":"Defining ATT&CK Data Sources, Part II: Operationalizing the Methodology","markups":[]},{"name":"1996","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*cfXGChCVmIvYdletwStMAQ.png","originalWidth":1054,"originalHeight":630}},{"name":"3266","type":1,"text":"In Part I of this two-part blog series, we reviewed the current state of the data sources and an initial approach to enhancing them through data modeling. We also defined what an ATT&CK data source object represents and extended it to introduce the concept of data components.","markups":[{"type":3,"start":3,"end":9,"href":"https://medium.com/mitre-attack/defining-attack-data-sources-part-i-4c39e581454f","title":"","rel":"","anchorType":0}]},{"name":"07c5","type":1,"text":"In Part…","markups":[{"type":3,"start":198,"end":248,"href":"https://github.com/mitre-attack/attack-datasources","title":"","rel":"nofollow noopener","anchorType":0}]}],"sections":[{"name":"34ce","startIndex":0}]},"isFullContent":false,"subtitle":"Describing how a new data sources methodology can be implemented with ATT&CK data sources."},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"3523daa7b580":{"id":"3523daa7b580","versionId":"15c90da57177","creatorId":"383ac795dbd9","homeCollectionId":"6da19bd08fba","title":"In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate","detectedLanguage":"en","latestVersion":"15c90da57177","latestPublishedVersion":"15c90da57177","hasUnpublishedEdits":false,"latestRev":66,"createdAt":1601380695108,"updatedAt":1639620905920,"acceptedAt":0,"firstPublishedAt":1601380975869,"latestPublishedAt":1601385791896,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"A joint post exploring leveraging ATT&CK for Enterprise and ICS together in a visualization.","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*HQGZ-UfjwP8VsJkWl4lUag.png","filter":"","backgroundSize":"","originalWidth":624,"originalHeight":791,"strategy":"resample","height":0,"width":0},"wordCount":2359,"imageCount":4,"readingTime":9.601886792452829,"subtitle":"A joint post exploring leveraging ATT&CK for Enterprise and ICS together in a visualization.","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":19,"isBookmarked":false,"tags":[{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"},{"slug":"mitre-attck","name":"Mitre Attck","postCount":81,"metadata":{"postCount":81,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"},{"slug":"industrial-control-system","name":"Industrial Control System","postCount":179,"metadata":{"postCount":179,"coverImage":{"id":"1*e8bx9-3lAgrHAZ50Eb56kw.png","originalWidth":940,"originalHeight":795,"isFeatured":true}},"type":"Tag"},{"slug":"operational-technology","name":"Operational Technology","postCount":203,"metadata":{"postCount":203,"coverImage":{"id":"1*99fYPuZDHEKF1CjGDIdQNw.jpeg","originalWidth":740,"originalHeight":493,"isFeatured":true}},"type":"Tag"},{"slug":"critical-infrastructure","name":"Critical Infrastructure","postCount":431,"metadata":{"postCount":431,"coverImage":{"id":"1*eCB-fwMQ4H_415xYRlkXsA.jpeg","originalWidth":768,"originalHeight":432,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":1,"links":{"entries":[{"url":"https://collaborate.mitre.org/attackics/img_auth.php/7/7b/GRAF-1308.MITRE_ATT%26CK_Hybrid_Visualization_blog_big.jpg","alts":[],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics/img_auth.php/e/e8/Hybrid_Visualization.xlsx","alts":[],"httpStatus":200},{"url":"https://www.fireeye.com/blog/threat-research/2019/12/fireeye-approach-to-operational-technology-security.html","alts":[],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics","alts":[],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics/img_auth.php/3/37/ATT%26CK_for_ICS_-_Philosophy_Paper.pdf","alts":[],"httpStatus":200},{"url":"https://www.fireeye.com/blog/executive-perspective/2020/09/merging-mitre-attack-for-enterprise-and-ics-to-communicate-adversary-behaviors.html","alts":[],"httpStatus":404},{"url":"https://attack.mitre.org/matrices/enterprise/","alts":[],"httpStatus":200},{"url":"https://www.mitre.org/sites/default/files/publications/pr-18-0944-11-mitre-attack-design-and-philosophy.pdf","alts":[],"httpStatus":200},{"url":"https://collaborate.mitre.org/attackics/index.php/All_Levels","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1601385792026},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":28,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"in-pursuit-of-a-gestalt-visualization-merging-mitre-att-ck-for-enterprise-and-ics-to-communicate","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"in-pursuit-of-a-gestalt-visualization-merging-mitre-att-ck-for-enterprise-and-ics-to-communicate-3523daa7b580","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*HQGZ-UfjwP8VsJkWl4lUag.png","originalWidth":624,"originalHeight":791,"isFeatured":true}},{"name":"31e3","type":3,"text":"In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate Adversary…","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"A joint post exploring leveraging ATT&CK for Enterprise and ICS together in a visualization."},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":1601380878504,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"31e3","type":3,"text":"In Pursuit of a Gestalt Visualization: Merging MITRE ATT&CK® for Enterprise and ICS to Communicate Adversary Behaviors","markups":[]},{"name":"6ebf","type":1,"text":"(Note: The content of this post is being released jointly with Mandiant. It is co-authored with Daniel Kapellmann Zafra, Keith Lunden, Nathan Brubaker and Gabriel Agboruche. The Mandiant post can be found here.)","markups":[{"type":3,"start":205,"end":209,"href":"https://www.fireeye.com/blog/executive-perspective/2020/09/merging-mitre-attack-for-enterprise-and-ics-to-communicate-adversary-behaviors.html","title":"","rel":"noopener","anchorType":0},{"type":2,"start":0,"end":211}]},{"name":"5c29","type":1,"text":"Understanding the increasingly complex threats faced by industrial and critical infrastructure organizations is not a simple task…","markups":[{"type":3,"start":610,"end":639,"href":"https://collaborate.mitre.org/attackics","title":"","rel":"noopener","anchorType":0}]}],"sections":[{"name":"b6ff","startIndex":0}]},"isFullContent":false,"subtitle":"A joint post exploring leveraging ATT&CK for Enterprise and ICS together in a visualization."},"cardType":0,"isDistributionAlertDismissed":true,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"4c39e581454f":{"id":"4c39e581454f","versionId":"ab54623a3912","creatorId":"b8f2906f3de3","homeCollectionId":"6da19bd08fba","title":"Defining ATT&CK Data Sources, Part I: Enhancing the Current State","detectedLanguage":"en","latestVersion":"ab54623a3912","latestPublishedVersion":"ab54623a3912","hasUnpublishedEdits":false,"latestRev":529,"createdAt":1599704287703,"updatedAt":1639602999414,"acceptedAt":0,"firstPublishedAt":1599765549255,"latestPublishedAt":1599807453210,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"Outlining a new methodology to extend the concepts around data sources","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*8T1qZBntj3IDduun3HBpdA.jpeg","filter":"","backgroundSize":"","originalWidth":1100,"originalHeight":676,"strategy":"resample","height":0,"width":0},"wordCount":1932,"imageCount":23,"readingTime":9.190566037735849,"subtitle":"Outlining a new methodology to extend the concepts around data sources","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":136,"isBookmarked":false,"tags":[{"slug":"mitre","name":"Mitre","postCount":168,"metadata":{"postCount":168,"coverImage":{"id":"1*_yiZUiinals4sN1JI9F-CQ.jpeg","originalWidth":6016,"originalHeight":4016,"isFeatured":true}},"type":"Tag"},{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"},{"slug":"datasource","name":"Data Sources","postCount":2,"metadata":{"postCount":2,"coverImage":{"id":"1*_e083heil76BR5Y0GrukLg.png","originalWidth":600,"originalHeight":360}},"type":"Tag"},{"slug":"cybersecurity","name":"Cybersecurity","postCount":204824,"metadata":{"postCount":204824,"coverImage":{"id":"1*KtQ6g0rkIl-Z8x_6O23Ukw.png","originalWidth":856,"originalHeight":347,"isFeatured":true}},"type":"Tag"},{"slug":"infosec","name":"Infosec","postCount":13876,"metadata":{"postCount":13876,"coverImage":{"id":"0*bLXOEknfH2qhMzRf.jpg","originalWidth":1090,"originalHeight":770,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":6,"links":{"entries":[{"url":"https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_2020.pdf","alts":[],"httpStatus":200},{"url":"https://github.com/hunters-forge/OSSEM/tree/master/data_dictionaries/windows/sysmon","alts":[],"httpStatus":200},{"url":"https://github.com/OTRF/OSSEM","alts":[],"httpStatus":200},{"url":"https://www.youtube.com/watch?v=eM0c_Gil-38&feature=youtu.be&list=PLkTApXQou_8KXWrk0G83QQbNLvspAo-Qk","alts":[],"httpStatus":429},{"url":"https://www.youtube.com/watch?v=QCDBjFJ_C3g&list=PLkTApXQou_8JrhtrFDfAskvMqk97Yu2S2&index=21&t=0s","alts":[],"httpStatus":429},{"url":"https://medium.com/mitre-attack/attack-with-sub-techniques-is-now-just-attack-8fc20997d8de","alts":[{"type":3,"url":"medium://p/8fc20997d8de"},{"type":2,"url":"medium://p/8fc20997d8de"}],"httpStatus":200}],"version":"0.3","generatedAt":1599807454178},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":576,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"defining-att-ck-data-sources-part-i-enhancing-the-current-state","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"defining-attack-data-sources-part-i-4c39e581454f","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*8T1qZBntj3IDduun3HBpdA.jpeg","originalWidth":1100,"originalHeight":676,"isFeatured":true}},{"name":"6ca8","type":3,"text":"Defining ATT&CK Data Sources, Part I: Enhancing the Current State","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"Outlining a new methodology to extend the concepts around data sources"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":3,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":1599709069570,"primaryTopicId":"d4e7f4144ac5","isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"6ca8","type":3,"text":"Defining ATT&CK Data Sources, Part I: Enhancing the Current State","markups":[]},{"name":"cbcc","type":4,"text":"Figure 1: Example of Mapping of Process Data Source to Event Logs","markups":[{"type":2,"start":0,"end":65}],"layout":1,"metadata":{"id":"1*RxoZUkh3iqEjKP9iVNxZ6w.jpeg","originalWidth":1096,"originalHeight":594}},{"name":"6ad3","type":1,"text":"Discussion around ATT&CK often involves tactics, techniques, procedures, detections, and mitigations, but a significant element is often overlooked: data sources. Data sources for every technique provide valuable context and opportunities to improve your security posture and impact your…","markups":[]}],"sections":[{"name":"c695","startIndex":0}]},"isFullContent":false,"subtitle":"Outlining a new methodology to extend the concepts around data sources"},"cardType":0,"isDistributionAlertDismissed":true,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"8fc20997d8de":{"id":"8fc20997d8de","versionId":"5be54afed77","creatorId":"37fd2c032d44","homeCollectionId":"6da19bd08fba","title":"“ATT&CK with Sub-Techniques” is Now Just ATT&CK","detectedLanguage":"en","latestVersion":"5be54afed77","latestPublishedVersion":"5be54afed77","hasUnpublishedEdits":false,"latestRev":577,"createdAt":1594147375604,"updatedAt":1639540361285,"acceptedAt":0,"firstPublishedAt":1594223448851,"latestPublishedAt":1594752412279,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"ATT&CK with Sub-Techniques is Now Live: The what, why, and how to leverage sub-techniques.","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*2r4afYIsWDYQZSgakoU6uQ.png","filter":"","backgroundSize":"","originalWidth":3086,"originalHeight":1502,"strategy":"resample","height":0,"width":0},"wordCount":2255,"imageCount":18,"readingTime":10.159433962264151,"subtitle":"ATT&CK with Sub-Techniques is Now Live: The what, why, and how to leverage sub-techniques.","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":52,"isBookmarked":false,"tags":[{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"},{"slug":"mitre-attck","name":"Mitre Attck","postCount":81,"metadata":{"postCount":81,"coverImage":{"id":"0*bCxSW4J_ISAWm4t7.png","originalWidth":1024,"originalHeight":391,"isFeatured":true}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":2,"links":{"entries":[{"url":"https://mitre-attack.github.io/attack-navigator/v2/enterprise/","alts":[],"httpStatus":200},{"url":"https://mitre-attack.github.io/attack-navigator/enterprise/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/working-with-attack/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/docs/subtechniques/subtechniques-crosswalk.json","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/versions/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/versions/v6/techniques/T1098/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/docs/subtechniques/subtechniques-csv.zip","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1055/001/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1098/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/resources/updates/updates-july-2020/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_2020.pdf","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1055/","alts":[],"httpStatus":200},{"url":"https://github.com/mitre/cti/blob/master/USAGE.md","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-subs-what-you-need-to-know-99bce414ae0b","alts":[{"type":2,"url":"medium://p/99bce414ae0b"},{"type":3,"url":"medium://p/99bce414ae0b"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/attack-sub-techniques-preview-b79ff0ba669a","alts":[{"type":3,"url":"medium://p/b79ff0ba669a"},{"type":2,"url":"medium://p/b79ff0ba669a"}],"httpStatus":200},{"url":"https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1594752413382},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":89,"sectionCount":1,"readingList":0,"topics":[{"topicId":"decb52b64abf","slug":"programming","createdAt":1493934116328,"deletedAt":0,"image":{"id":"1*iPa136b1cGEO7lvoXg6uHQ@2x.jpeg","originalWidth":6016,"originalHeight":4016},"name":"Programming","description":"The good, the bad, the buggy.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Programming News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"att-ck-with-sub-techniques-is-now-just-att-ck","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"attack-with-sub-techniques-is-now-just-attack-8fc20997d8de","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*2r4afYIsWDYQZSgakoU6uQ.png","originalWidth":3086,"originalHeight":1502,"isFeatured":true}},{"name":"7c6c","type":3,"text":"“ATT&CK with Sub-Techniques” is Now Just ATT&CK","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"ATT&CK with Sub-Techniques is Now Live: The what, why, and how to leverage sub-techniques."},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"7c6c","type":3,"text":"“ATT&CK with Sub-Techniques” is Now Just ATT&CK","markups":[]},{"name":"ccc2","type":1,"text":"(Note: Much of the content in this post was consolidated and updated from previous posts written by Blake Strom with new content from Adam Pennington, Jamie Williams, and Amy L. Robertson)","markups":[{"type":3,"start":74,"end":82,"href":"https://medium.com/mitre-attack/attack-sub-techniques-preview-b79ff0ba669a","title":"","rel":"","anchorType":0},{"type":3,"start":83,"end":88,"href":"https://medium.com/mitre-attack/attack-subs-what-you-need-to-know-99bce414ae0b","title":"","rel":"","anchorType":0},{"type":3,"start":100,"end":111,"anchorType":2,"userId":"3a4282aef31"},{"type":3,"start":134,"end":149,"anchorType":2,"userId":"37fd2c032d44"},{"type":3,"start":151,"end":165,"anchorType":2,"userId":"1dfd16769165"},{"type":3,"start":171,"end":187,"anchorType":2,"userId":"13b16fa8065d"},{"type":2,"start":0,"end":188}]},{"name":"1788","type":1,"text":"We’re thrilled to announce that ATT&CK with sub-techniques is now live! This change has been a long time coming…","markups":[{"type":3,"start":132,"end":152,"href":"https://medium.com/mitre-attack/attack-sub-techniques-preview-b79ff0ba669a","title":"","rel":"","anchorType":0},{"type":3,"start":285,"end":319,"href":"https://medium.com/mitre-attack/attack-subs-what-you-need-to-know-99bce414ae0b","title":"","rel":"","anchorType":0},{"type":3,"start":448,"end":462,"href":"https://attack.mitre.org/","title":"","rel":"","anchorType":0},{"type":3,"start":472,"end":488,"href":"https://mitre-attack.github.io/attack-navigator/enterprise/","title":"","rel":"","anchorType":0},{"type":3,"start":490,"end":497,"href":"https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json","title":"","rel":"","anchorType":0},{"type":3,"start":507,"end":523,"href":"https://attack.mitre.org/resources/working-with-attack/","title":"","rel":"","anchorType":0},{"type":3,"start":530,"end":565,"href":"https://attack.mitre.org/docs/ATTACK_Design_and_Philosophy_March_2020.pdf","title":"","rel":"","anchorType":0}]}],"sections":[{"name":"9c49","startIndex":0}]},"isFullContent":false,"subtitle":"ATT&CK with Sub-Techniques is Now Live: The what, why, and how to leverage sub-techniques."},"cardType":0,"isDistributionAlertDismissed":false,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"74844e86e2b0":{"id":"74844e86e2b0","versionId":"317584284bed","creatorId":"1dfd16769165","homeCollectionId":"6da19bd08fba","title":"Actionable Detections: An Analysis of ATT&CK Evaluations Data Part 2 of 2","detectedLanguage":"en","latestVersion":"317584284bed","latestPublishedVersion":"317584284bed","hasUnpublishedEdits":false,"latestRev":353,"createdAt":1591882477150,"updatedAt":1639519313226,"acceptedAt":0,"firstPublishedAt":1592504327616,"latestPublishedAt":1592504327616,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"With the recent release of the APT29 Evaluations results, and with Carbanak+FIN7 launching soon, we’re providing more context.","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*gpECA4CW3BkKVAyVY_hdGA.png","filter":"","backgroundSize":"","originalWidth":679,"originalHeight":509,"strategy":"resample","height":0,"width":0},"wordCount":1596,"imageCount":10,"readingTime":7.272641509433963,"subtitle":"With the recent release of the APT29 Evaluations results, and with Carbanak+FIN7 launching soon, we’re providing more context.","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":18,"isBookmarked":false,"tags":[{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"},{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":0,"links":{"entries":[{"url":"mailto:evals@mitre-engenuity.org?subject=ATT&CK%20Evaluations%20Feedback","alts":[],"httpStatus":0},{"url":"https://twitter.com/matthewdunwoody/status/1091462541341949952","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/APT3/detection-categories.html","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/carbanak-fin7/detection-categories.html","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/carbanak-fin7/protection-categories.html","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/APT29/detection-categories.html","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/tactics/TA0007/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1003/","alts":[],"httpStatus":200},{"url":"https://github.com/PowerShellMafia/PowerSploit/blob/master/Exfiltration/Invoke-Mimikatz.ps1","alts":[],"httpStatus":200},{"url":"https://www.youtube.com/watch?v=dnHdxlwqgME","alts":[],"httpStatus":429},{"url":"https://github.com/mitre-attack/attack-arsenal/blob/master/adversary_emulation/APT29/Emulation_Plan/Day%202/payloads/stepFourteen_credDump.ps1","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-engenuity/getting-ready-for-the-carbanak-and-fin7-evaluations-441df646756e","alts":[{"type":3,"url":"medium://p/441df646756e"},{"type":2,"url":"medium://p/441df646756e"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/dissecting-a-detection-part-1-19fd8f00266c","alts":[{"type":3,"url":"medium://p/19fd8f00266c"},{"type":2,"url":"medium://p/19fd8f00266c"}],"httpStatus":200}],"version":"0.3","generatedAt":1592504328367},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":22,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"actionable-detections-an-analysis-of-att-ck-evaluations-data-part-2-of-2","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"dissecting-a-detection-part-2-74844e86e2b0","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*gpECA4CW3BkKVAyVY_hdGA.png","originalWidth":679,"originalHeight":509,"isFeatured":true}},{"name":"de3a","type":3,"text":"Actionable Detections: An Analysis of ATT&CK Evaluations Data Part 2 of 2","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"With the recent release of the APT29 Evaluations results, and with Carbanak+FIN7 launching soon, we’re providing more context."},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":1591890259603,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"de3a","type":3,"text":"Actionable Detections: An Analysis of ATT&CK Evaluations Data Part 2 of 2","markups":[]},{"name":"729e","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*gpECA4CW3BkKVAyVY_hdGA.png","originalWidth":679,"originalHeight":509,"isFeatured":true}},{"name":"4437","type":1,"text":"In part 1 of this blog series, we introduced how you can break down and understand detections by security products. When analyzing ATT&CK Evaluations results, we have found it helpful to assess and deconstruct each detection based on three key benchmarks:","markups":[{"type":3,"start":3,"end":9,"href":"https://medium.com/mitre-attack/dissecting-a-detection-part-1-19fd8f00266c","title":"","rel":"noreferrer","anchorType":0},{"type":3,"start":131,"end":157,"href":"https://attackevals.mitre.org/","title":"","rel":"noreferrer noopener noopener","anchorType":0}]},{"name":"be0f","type":10,"text":"Availability — Is the detection capability gathering the necessary…","markups":[{"type":1,"start":0,"end":12}]}],"sections":[{"name":"1857","startIndex":0}]},"isFullContent":false,"subtitle":"With the recent release of the APT29 Evaluations results, and with Carbanak+FIN7 launching soon, we’re providing more context."},"cardType":0,"isDistributionAlertDismissed":true,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"19fd8f00266c":{"id":"19fd8f00266c","versionId":"919894002161","creatorId":"1dfd16769165","homeCollectionId":"6da19bd08fba","title":"Dissecting a Detection: An Analysis of ATT&CK Evaluations Data (Sources) Part 1 of 2","detectedLanguage":"en","latestVersion":"919894002161","latestPublishedVersion":"919894002161","hasUnpublishedEdits":false,"latestRev":387,"createdAt":1589812706008,"updatedAt":1639492856895,"acceptedAt":0,"firstPublishedAt":1589905073536,"latestPublishedAt":1589905073536,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"With the recent release of the APT29 Evaluations results, and with Carbanak+FIN7 launching soon, we’re providing more context to the…","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*eypSeiebIMkPDrg1MtV3Mg.png","filter":"","backgroundSize":"","originalWidth":528,"originalHeight":685,"strategy":"resample","height":0,"width":0},"wordCount":1721,"imageCount":11,"readingTime":7.794339622641509,"subtitle":"With the recent release of the APT29 Evaluations results, and with Carbanak+FIN7 launching soon, we’re providing more context to the…","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":32,"isBookmarked":false,"tags":[{"slug":"attck","name":"Attck","postCount":76,"metadata":{"postCount":76,"coverImage":{"id":"1*GExpD6-qohS6b1Q-u89Ryg.png","originalWidth":668,"originalHeight":527,"isFeatured":true}},"type":"Tag"},{"slug":"mitre-attack","name":"Mitre Attack","postCount":723,"metadata":{"postCount":723,"coverImage":{"id":"1*Vph3HdVf0BdP05bdIgcCNQ.jpeg","originalWidth":1200,"originalHeight":675,"isFeatured":true,"alt":"ATT&CK Navigator"}},"type":"Tag"}],"socialRecommendsCount":0,"responsesCreatedCount":0,"links":{"entries":[{"url":"https://attackevals.mitre.org/carbanak-fin7/detection-categories.html","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/APT3/detection-categories.html","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/APT29/detection-categories.html","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/evaluations.html?round=APT29","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1088/","alts":[],"httpStatus":200},{"url":"https://attack.mitre.org/techniques/T1083/","alts":[],"httpStatus":200},{"url":"https://d1zq5d3dtjfcoj.cloudfront.net/EG-14-4.png","alts":[],"httpStatus":200},{"url":"https://d1zq5d3dtjfcoj.cloudfront.net/MS-14.A.1-1.png","alts":[],"httpStatus":200},{"url":"https://d1zq5d3dtjfcoj.cloudfront.net/FE-3.A.1-4.png","alts":[],"httpStatus":200},{"url":"https://github.com/hunters-forge/ATTACK-Python-Client","alts":[],"httpStatus":200},{"url":"https://d1zq5d3dtjfcoj.cloudfront.net/MS-14.A.1-3.png","alts":[],"httpStatus":200},{"url":"https://d1zq5d3dtjfcoj.cloudfront.net/Using-Results-to-Evaluate-Endpoint-Detection-Products_Booklet.pdf","alts":[],"httpStatus":200},{"url":"https://github.com/EmpireProject/Empire/blob/master/data/module_source/privesc/Invoke-BypassUACTokenManipulation.ps1","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/announcing-2020s-attack-evaluation-6755650b68c2","alts":[{"type":3,"url":"medium://p/6755650b68c2"},{"type":2,"url":"medium://p/6755650b68c2"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/would-a-detection-by-any-other-name-detect-as-well-part-1-1577eba255bc","alts":[{"type":3,"url":"medium://p/1577eba255bc"},{"type":2,"url":"medium://p/1577eba255bc"}],"httpStatus":200},{"url":"https://d1zq5d3dtjfcoj.cloudfront.net/EG-14-2.png","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1589905074296},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":90,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"dissecting-a-detection-an-analysis-of-att-ck-evaluations-data-sources-part-1-of-2","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"dissecting-a-detection-part-1-19fd8f00266c","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*eypSeiebIMkPDrg1MtV3Mg.png","originalWidth":528,"originalHeight":685,"isFeatured":true}},{"name":"853f","type":3,"text":"Dissecting a Detection: An Analysis of ATT&CK Evaluations Data (Sources) Part 1 of 2","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"With the recent release of the APT29 Evaluations results, and with Carbanak+FIN7 launching soon, we’re providing more context to the…"},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":1589818425667,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"853f","type":3,"text":"Dissecting a Detection: An Analysis of ATT&CK Evaluations Data (Sources) Part 1 of 2","markups":[]},{"name":"2f64","type":4,"text":"","markups":[],"layout":1,"metadata":{"id":"1*eypSeiebIMkPDrg1MtV3Mg.png","originalWidth":528,"originalHeight":685,"isFeatured":true}},{"name":"99bb","type":1,"text":"With the recent release of the APT29 ATT&CK Evaluations results, and with evaluations based on an emulation of Carbanak+FIN7 launching soon, we’d like to provide more context to the ATT&CK Evaluations process. This two-part post will walk you through the data sources associated with Evaluations detections and help you understand…","markups":[{"type":3,"start":56,"end":63,"href":"https://attackevals.mitre.org/evaluations.html?round=APT29","title":"","rel":"","anchorType":0},{"type":3,"start":111,"end":124,"href":"https://medium.com/mitre-attack/announcing-2020s-attack-evaluation-6755650b68c2","title":"","rel":"","anchorType":0},{"type":3,"start":377,"end":411,"href":"https://attackevals.mitre.org/carbanak-fin7/detection-categories.html","title":"","rel":"","anchorType":0}]}],"sections":[{"name":"7a08","startIndex":0}]},"isFullContent":false,"subtitle":"With the recent release of the APT29 Evaluations results, and with Carbanak+FIN7 launching soon, we’re providing more context to the…"},"cardType":0,"isDistributionAlertDismissed":true,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"},"cd30b3686ad9":{"id":"cd30b3686ad9","versionId":"fa2bf91a2560","creatorId":"dd95f448f732","homeCollectionId":"6da19bd08fba","title":"ATT&CK Evaluations: Understanding the Newly Released APT29 Results","detectedLanguage":"en","latestVersion":"fa2bf91a2560","latestPublishedVersion":"fa2bf91a2560","hasUnpublishedEdits":false,"latestRev":93,"createdAt":1587481373687,"updatedAt":1639464588296,"acceptedAt":0,"firstPublishedAt":1587486627644,"latestPublishedAt":1587486627644,"vote":false,"experimentalCss":"","displayAuthor":"","content":{"subtitle":"In late 2019, the ATT&CK Evaluations team evaluated 21 endpoint security vendors using an evaluation methodology based on APT29.","postDisplay":{"coverless":true}},"virtuals":{"statusForCollection":"APPROVED","allowNotes":true,"previewImage":{"imageId":"1*gt6UGR1dUjlEzmkqjE6-9Q.png","filter":"","backgroundSize":"","originalWidth":468,"originalHeight":244,"strategy":"resample","height":0,"width":0},"wordCount":1893,"imageCount":3,"readingTime":7.693396226415095,"subtitle":"In late 2019, the ATT&CK Evaluations team evaluated 21 endpoint security vendors using an evaluation methodology based on APT29.","publishedInCount":1,"usersBySocialRecommends":[],"noIndex":false,"recommends":31,"isBookmarked":false,"tags":[],"socialRecommendsCount":0,"responsesCreatedCount":0,"links":{"entries":[{"url":"mailto:evals@mitre-engenuity.org","alts":[],"httpStatus":0},{"url":"https://attackevals.mitre.org/do-it-yourself.html","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/APT29/","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/APT3/","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/evaluations.html?round=APT29","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/technique_comparison.html","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/APT29/detection-categories.html","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/APT29/operational-flow.html","alts":[],"httpStatus":200},{"url":"https://attackevals.mitre.org/data_analysis_tool.html","alts":[],"httpStatus":200},{"url":"https://mitre-engenuity.org/","alts":[],"httpStatus":200},{"url":"https://medium.com/mitre-attack/announcing-2020s-attack-evaluation-6755650b68c2","alts":[{"type":3,"url":"medium://p/6755650b68c2"},{"type":2,"url":"medium://p/6755650b68c2"}],"httpStatus":200},{"url":"https://medium.com/mitre-attack/open-invitation-to-share-cyber-threat-intelligence-on-apt29-for-adversary-emulation-plan-831c8c929f31","alts":[{"type":3,"url":"medium://p/831c8c929f31"},{"type":2,"url":"medium://p/831c8c929f31"}],"httpStatus":200},{"url":"https://d1zq5d3dtjfcoj.cloudfront.net/Using-Results-to-Evaluate-Endpoint-Detection-Products_Booklet.pdf","alts":[],"httpStatus":200}],"version":"0.3","generatedAt":1587486628415},"isLockedPreviewOnly":false,"metaDescription":"","totalClapCount":97,"sectionCount":1,"readingList":0,"topics":[{"topicId":"d4e7f4144ac5","slug":"cybersecurity","createdAt":1493946839810,"deletedAt":0,"image":{"id":"1*JpJUz3WBPiQG5vkJ9WY8rw@2x.jpeg","originalWidth":6000,"originalHeight":4000},"name":"Cybersecurity","description":"Towards a more perfect password.","relatedTopics":[],"visibility":1,"relatedTags":[],"relatedTopicIds":[],"seoTitle":"Cybersecurity News and Articles — Medium","type":"Topic"}]},"coverless":true,"slug":"att-ck-evaluations-understanding-the-newly-released-apt29-results","translationSourcePostId":"","translationSourceCreatorId":"","isApprovedTranslation":false,"inResponseToPostId":"","inResponseToRemovedAt":0,"isTitleSynthesized":false,"allowResponses":true,"importedUrl":"","importedPublishedAt":0,"visibility":0,"uniqueSlug":"attack-apt29-results-released-cd30b3686ad9","previewContent":{"bodyModel":{"paragraphs":[{"name":"previewImage","type":4,"text":"","layout":10,"metadata":{"id":"1*gt6UGR1dUjlEzmkqjE6-9Q.png","originalWidth":468,"originalHeight":244,"isFeatured":true}},{"name":"e9d7","type":3,"text":"ATT&CK Evaluations: Understanding the Newly Released APT29 Results","markups":[],"alignment":1}],"sections":[{"startIndex":0}]},"isFullContent":false,"subtitle":"In late 2019, the ATT&CK Evaluations team evaluated 21 endpoint security vendors using an evaluation methodology based on APT29."},"license":0,"inResponseToMediaResourceId":"","canonicalUrl":"","approvedHomeCollectionId":"6da19bd08fba","isNewsletter":false,"newsletterId":"","webCanonicalUrl":"","mediumUrl":"","migrationId":"","notifyFollowers":true,"notifyTwitter":false,"notifyFacebook":false,"responseHiddenOnParentPostAt":0,"isSeries":false,"isSubscriptionLocked":false,"seriesLastAppendedAt":0,"audioVersionDurationSec":0,"sequenceId":"","isEligibleForRevenue":false,"isBlockedFromHightower":false,"deletedAt":0,"lockedPostSource":0,"hightowerMinimumGuaranteeStartsAt":0,"hightowerMinimumGuaranteeEndsAt":0,"featureLockRequestAcceptedAt":0,"mongerRequestType":1,"layerCake":0,"socialTitle":"","socialDek":"","editorialPreviewTitle":"","editorialPreviewDek":"","curationEligibleAt":0,"isProxyPost":false,"proxyPostFaviconUrl":"","proxyPostProviderName":"","proxyPostType":0,"isSuspended":false,"isLimitedState":false,"seoTitle":"","previewContent2":{"bodyModel":{"paragraphs":[{"name":"e9d7","type":3,"text":"ATT&CK Evaluations: Understanding the Newly Released APT29 Results","markups":[]},{"name":"99d0","type":1,"text":"In late 2019, the ATT&CK Evaluations team evaluated 21 endpoint security vendors using an evaluation methodology based on APT29. Today we’re publicly releasing the results of those evaluations. We hope these results provide insight into how various endpoint security vendors detect behaviors aligned to ATT&CK.","markups":[{"type":3,"start":122,"end":127,"href":"https://attackevals.mitre.org/APT29/","title":"","rel":"","anchorType":0},{"type":3,"start":164,"end":171,"href":"https://attackevals.mitre.org/evaluations.html?round=APT29","title":"","rel":"","anchorType":0}]},{"name":"21c4","type":4,"text":"ATT&CK Evaluation APT29 Participants","markups":[],"layout":4,"metadata":{"id":"1*RkLL8V6ApxJBmbMiiu8Xiw.png","originalWidth":258,"originalHeight":391}},{"name":"935f","type":1,"text":"The…","markups":[]}],"sections":[{"name":"f8c1","startIndex":0}]},"isFullContent":false,"subtitle":"In late 2019, the ATT&CK Evaluations team evaluated 21 endpoint security vendors using an evaluation methodology based on APT29."},"cardType":0,"isDistributionAlertDismissed":true,"isShortform":false,"shortformType":0,"responsesLocked":false,"isLockedResponse":false,"isPublishToEmail":false,"responseDistribution":0,"isMarkedPaywallOnly":false,"type":"Post"}}},"paging":{"path":"/_/api/collections/6da19bd08fba/stream","next":{"to":"1587486627644","ignoredIds":[],"page":3}},"collection":{"id":"6da19bd08fba","name":"MITRE ATT&CK®","slug":"mitre-attack","tags":["CYBERSECURITY","THREAT INTELLIGENCE","THREAT HUNTING","RED TEAM","INCIDENT RESPONSE"],"creatorId":"37fd2c032d44","description":"This is the official blog for MITRE ATT&CK®, the MITRE-developed, globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The full website is located at https://attack.mitre.org.","shortDescription":"This is the official blog for MITRE ATT&CK®, the…","image":{"imageId":"1*Y6LKGEIzmF96lVHkv_RS9A.png","filter":"","backgroundSize":"","originalWidth":1162,"originalHeight":1162,"strategy":"resample","height":0,"width":0},"metadata":{"followerCount":6517,"activeAt":1730389403805},"virtuals":{"permissions":{"canPublish":false,"canPublishAll":false,"canRepublish":false,"canRemove":false,"canManageAll":false,"canSubmit":false,"canEditPosts":false,"canAddWriters":false,"canViewStats":false,"canSendNewsletter":false,"canViewLockedPosts":false,"canViewCloaked":false,"canEditOwnPosts":false,"canBeAssignedAuthor":false,"canEnrollInHightower":false,"canLockPostsForMediumMembers":false,"canLockOwnPostsForMediumMembers":false,"canViewNewsletterV2Stats":false,"canCreateNewsletterV3":false},"isSubscribed":false,"isEnrolledInHightower":false,"isEligibleForHightower":false,"isSubscribedToCollectionEmails":false,"isMuted":false,"canToggleEmail":false,"isWriter":false},"logo":{"imageId":"1*8epIYX1PfgfnVfDYfZ5loQ.png","filter":"","backgroundSize":"","originalWidth":796,"originalHeight":164,"strategy":"resample","height":0,"width":0},"twitterUsername":"mitreattack","publicEmail":"attack@mitre.org","sections":[{"type":2,"collectionHeaderMetadata":{"title":"MITRE ATT&CK®","backgroundImage":{},"logoImage":{},"alignment":2,"layout":4}},{"type":1,"postListMetadata":{"source":3,"layout":4,"number":1,"postIds":["d9fca6ce4c58"]}},{"type":1,"postListMetadata":{"source":1,"layout":4,"number":24,"postIds":["561c76af94cf","26685f300acc","8dfc46d1ad1b","fa473603f86b","5cef174c32ff","452fab541673","6b15baa6cbb4","599a9112a025","35be8d12884","4fdb40a88a48","cd5a1a3387c7","7743870b37e3","39accaf23c81","68bab3886fa2","50516fb7de85","9f7b6c7f3714","4b73ffecd3d3","1fc98738ba5b","3523daa7b580","4c39e581454f","8fc20997d8de","74844e86e2b0","19fd8f00266c","cd30b3686ad9"]}},{"type":1,"postListMetadata":{"source":1,"layout":4,"number":15,"postIds":[],"sectionHeader":"Latest"}},{"type":1,"postListMetadata":{"source":1,"layout":4,"number":24,"postIds":[],"sectionHeader":"Latest"}}],"tintColor":"#FFC63F1D","lightText":false,"favicon":{"imageId":"","filter":"","backgroundSize":"","originalWidth":0,"originalHeight":0,"strategy":"resample","height":0,"width":0},"colorPalette":{"defaultBackgroundSpectrum":{"colorPoints":[{"color":"#FFDA4E2A","point":0},{"color":"#FFCA4A29","point":0.1},{"color":"#FFB94628","point":0.2},{"color":"#FFA84227","point":0.3},{"color":"#FF973D25","point":0.4},{"color":"#FF863823","point":0.5},{"color":"#FF753220","point":0.6},{"color":"#FF632B1C","point":0.7},{"color":"#FF512417","point":0.8},{"color":"#FF3E1B12","point":0.9},{"color":"#FF2A120B","point":1}],"backgroundColor":"#FFFFFFFF"},"tintBackgroundSpectrum":{"colorPoints":[{"color":"#FFC63F1D","point":0},{"color":"#FFD65331","point":0.1},{"color":"#FFE46644","point":0.2},{"color":"#FFF17858","point":0.3},{"color":"#FFFC8B6B","point":0.4},{"color":"#FFFF9C7F","point":0.5},{"color":"#FFFFAE93","point":0.6},{"color":"#FFFFBFA7","point":0.7},{"color":"#FFFFD0BB","point":0.8},{"color":"#FFFFE1D0","point":0.9},{"color":"#FFFFF2E4","point":1}],"backgroundColor":"#FFC63F1D"},"highlightSpectrum":{"colorPoints":[{"color":"#FFFFE3D3","point":0},{"color":"#FFFFDECB","point":0.1},{"color":"#FFFFD9C4","point":0.2},{"color":"#FFFFD4BD","point":0.3},{"color":"#FFFFD0B5","point":0.4},{"color":"#FFFFCBAE","point":0.5},{"color":"#FFFFC6A7","point":0.6},{"color":"#FFFFC1A0","point":0.7},{"color":"#FFFFBC99","point":0.8},{"color":"#FFFFB792","point":0.9},{"color":"#FFFFB18B","point":1}],"backgroundColor":"#FFFFFFFF"},"darkBackgroundSpectrum":{"colorPoints":[{"color":"#FFFA643E","point":0},{"color":"#FFFF724C","point":0.1},{"color":"#FFFF7F5B","point":0.2},{"color":"#FFFF8C69","point":0.3},{"color":"#FFFF9878","point":0.4},{"color":"#FFFFA587","point":0.5},{"color":"#FFFFB196","point":0.6},{"color":"#FFFFBDA5","point":0.7},{"color":"#FFFFCAB5","point":0.8},{"color":"#FFFFD6C4","point":0.9},{"color":"#FFFFE1D4","point":1}],"backgroundColor":"#FF000000"}},"navItems":[{"type":5,"title":"Blog Archives","url":"https://medium.com/mitre-attack/archive"},{"type":4,"title":"Getting Started","url":"https://medium.com/mitre-attack/getting-started/home","topicId":"ff05a5fd64","source":"topicId"},{"type":3,"title":"ATT&CK","url":"https://attack.mitre.org"}],"colorBehavior":1,"ampLogo":{"imageId":"","filter":"","backgroundSize":"","originalWidth":0,"originalHeight":0,"strategy":"resample","height":0,"width":0},"header":{"title":"MITRE ATT&CK®","backgroundImage":{},"logoImage":{},"alignment":2,"layout":4},"subscriberCount":6517,"tagline":"This is the official blog for MITRE ATT&CK®, the…","instagramUsername":"mitreattack","isOptedIntoAurora":false,"isCurationAllowedByDefault":false,"polarisCoverImage":{"imageId":"","filter":"","backgroundSize":"","originalWidth":0,"originalHeight":0,"strategy":"resample","height":0,"width":0},"ptsQualifiedAt":1616092842777,"type":"Collection"},"header":{"title":"MITRE ATT&CK®","backgroundImage":{},"logoImage":{},"alignment":2,"layout":4},"streamItems":[{"createdAt":1732420577740,"randomId":"fd3dbae1eed6","section":{"items":[{"post":{"postId":"d9fca6ce4c58"},"itemType":"post"}],"layout":4},"itemType":"section","type":"StreamItem"},{"createdAt":1732420577740,"randomId":"f29e2cf3b3e0","section":{"items":[{"post":{"postId":"561c76af94cf"},"itemType":"post"},{"post":{"postId":"26685f300acc"},"itemType":"post"},{"post":{"postId":"8dfc46d1ad1b"},"itemType":"post"},{"post":{"postId":"fa473603f86b"},"itemType":"post"},{"post":{"postId":"5cef174c32ff"},"itemType":"post"},{"post":{"postId":"452fab541673"},"itemType":"post"},{"post":{"postId":"6b15baa6cbb4"},"itemType":"post"},{"post":{"postId":"599a9112a025"},"itemType":"post"},{"post":{"postId":"35be8d12884"},"itemType":"post"},{"post":{"postId":"4fdb40a88a48"},"itemType":"post"},{"post":{"postId":"cd5a1a3387c7"},"itemType":"post"},{"post":{"postId":"7743870b37e3"},"itemType":"post"},{"post":{"postId":"39accaf23c81"},"itemType":"post"},{"post":{"postId":"68bab3886fa2"},"itemType":"post"},{"post":{"postId":"50516fb7de85"},"itemType":"post"},{"post":{"postId":"9f7b6c7f3714"},"itemType":"post"},{"post":{"postId":"4b73ffecd3d3"},"itemType":"post"},{"post":{"postId":"1fc98738ba5b"},"itemType":"post"},{"post":{"postId":"3523daa7b580"},"itemType":"post"},{"post":{"postId":"4c39e581454f"},"itemType":"post"},{"post":{"postId":"8fc20997d8de"},"itemType":"post"},{"post":{"postId":"74844e86e2b0"},"itemType":"post"},{"post":{"postId":"19fd8f00266c"},"itemType":"post"},{"post":{"postId":"cd30b3686ad9"},"itemType":"post"}],"layout":4},"itemType":"section","type":"StreamItem"}]}) // ]]></script><script>(function(){function c(){var b=a.contentDocument||a.contentWindow.document;if(b){var d=b.createElement('script');d.innerHTML="window.__CF$cv$params={r:'8e7677e17ed65f53',t:'MTczMjQyMDU3OC4wMDAwMDA='};var a=document.createElement('script');a.nonce='';a.src='/cdn-cgi/challenge-platform/scripts/jsd/main.js';document.getElementsByTagName('head')[0].appendChild(a);";b.getElementsByTagName('head')[0].appendChild(d)}}if(document.body){var a=document.createElement('iframe');a.height=1;a.width=1;a.style.position='absolute';a.style.top=0;a.style.left=0;a.style.border='none';a.style.visibility='hidden';document.body.appendChild(a);if('loading'!==document.readyState)c();else if(window.addEventListener)document.addEventListener('DOMContentLoaded',c);else{var e=document.onreadystatechange||function(){};document.onreadystatechange=function(b){e(b);'loading'!==document.readyState&&(document.onreadystatechange=e,c())}}}})();</script></body></html>