{"id":14754,"date":"2023-11-21T17:00:00","date_gmt":"2023-11-21T17:00:00","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=14754"},"modified":"2023-11-21T10:03:20","modified_gmt":"2023-11-21T10:03:20","slug":"mitre-attck-framework-everything-you-need-to-know","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/","title":{"rendered":"MITRE ATT&amp;CK Framework: Everything You Need to Know","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n<p>MITRE ATT&amp;CK\u00ae stands for MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK). The MITRE ATT&amp;CK framework is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary&#8217;s attack lifecycle and the platforms they are known to target. The tactics and techniques abstraction in the model provides a common taxonomy of individual adversary actions understood by both offensive and defensive sides of cybersecurity. <\/p>\n\n\n\n<p>It also provides an appropriate level of categorization for adversary action and specific ways of defending against it.<\/p>\n\n\n\n<p>The behavioral model presented by ATT&amp;CK contains the following core components:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tactics denoting short-term, tactical adversary goals during an attack (the columns)<\/li>\n\n\n\n<li>Techniques describing how adversaries achieve tactical goals (the individual cells)<\/li>\n\n\n\n<li>Documented adversary usage of techniques and other metadata (linked to techniques).<\/li>\n<\/ul>\n\n\n\n<p>MITRE ATT&amp;CK was created in 2013 in answer to the research question &#8220;How well are we doing at detecting documented adversary behavior?&#8221; It is a result of MITRE&#8217;s Fort Meade Experiment (FMX) where researchers emulated both adversary and defender behavior to improve post-compromise detection of threats through telemetry sensing and behavioral analysis. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-understanding-the-mitre-att-amp-ck-framework\"><span id=\"understanding-the-mitre-attck-framework\"><strong>Understanding the MITRE ATT&amp;CK framework<\/strong><\/span><\/h2>\n\n\n\n<p>The MITRE ATT&amp;CK (pronounced &#8220;miter attack&#8221;) framework is a free, globally accessible framework that provides comprehensive and up-to-date cyber threat information to organizations looking to strengthen their cybersecurity strategies.<\/p>\n\n\n\n<p>Businesses can use the framework\u00a0to evaluate and test their security methods, and cybersecurity vendors can use it to vet their products and services.<\/p>\n\n\n\n<p>The framework evaluation criteria are specific to each organization using it and focus on the details of a specific cybersecurity approach. The results of the evaluations are, therefore, noncompetitive; organizations cannot use results to gain a business advantage over other organizations that have been evaluated.<\/p>\n\n\n\n<p>The framework and knowledge base were created and curated by Mitre, a not-for-profit security research organization. The knowledge base is an ongoing project. It contains analyses based on real-world events that organizations can reference when developing threat models and methodologies, and it grows as organizations contribute their knowledge of cyber threats to the knowledge base. The knowledge base, in turn, informs the framework.<\/p>\n\n\n\n<p>Mitre aims to foster a stronger overall cybersecurity community with these free offerings.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"breakdownofthemitreattampckframework\"><span id=\"breakdown-of-the-mitre-attck-framework\"><strong>Breakdown of the MITRE ATT&amp;CK Framework<\/strong><\/span><\/h2>\n\n\n\n<p>Successful and\u00a0comprehensive threat detection\u00a0requires understanding common adversary techniques. This includes the ones that may especially pose a threat to your organization, and how to detect and mitigate these attacks. However, the\u00a0volume and breadth of attack tactics\u00a0make it nearly impossible for any single organization to monitor every single attack type. This is without taking into account cataloging and translating those findings in a constructive way to anyone outside of their organization.<\/p>\n\n\n\n<p>This was why MITRE developed the ATT&amp;CK framework. ATT&amp;CK, which is an acronym for Adversarial Tactics, Techniques, and Common Knowledge, is a knowledge base of adversary tactics and techniques. These techniques are indexed and broken down into detail the exact steps and methods that hackers use, making it easy for teams to understand the actions that may be used against a particular platform. <\/p>\n\n\n\n<p>To go a step further, MITRE also incorporates\u00a0cyber-threat intelligence\u00a0documenting adversary group behavior profiles to document which attack groups use which techniques.<\/p>\n\n\n\n<p>The ATT&amp;CK matrix structure is similar to a periodic table, with column headers outlining phases in the attack chain (from Initial Access all the way to Impact). The rows below them detail specific techniques. Framework users can further explore any of the techniques to learn more about the tactics, platforms exploited, example procedures, mitigation, and detections.<\/p>\n\n\n\n<h2 id=\"what-is-in-the-mitre-attck-matrix\" class=\"wp-block-heading\"><strong>What is in the MITRE ATT&amp;CK Matrix?<\/strong><\/h2>\n\n\n\n<p>The MITRE ATT&amp;CK matrix contains a set of techniques used by adversaries to accomplish a specific objective. Those objectives are categorized as tactics in the ATT&amp;CK Matrix. <\/p>\n\n\n\n<p>The objectives are presented linearly from the point of reconnaissance to the final goal of exfiltration or &#8220;impact&#8221;. Looking at the broadest version of ATT&amp;CK for Enterprise, which includes Windows, macOS, Linux, PRE, Azure AD, Office 365, Google Workspace, SaaS, IaaS, Network, and Containers, the following adversary tactics are categorized:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reconnaissance<\/strong>. Gathering information to plan future adversary operations, i.e., information about the target organization<\/li>\n\n\n\n<li><strong>Resource Development<\/strong>. Establishing resources to support operations, i.e., setting up command and control infrastructure<\/li>\n\n\n\n<li><strong>Initial Access<\/strong>. Trying to get into your network, i.e., spear phishing<\/li>\n\n\n\n<li><strong>Execution<\/strong>. Trying the run malicious code, i.e., running a remote access tool<\/li>\n\n\n\n<li><strong>Persistence<\/strong>. Trying to maintain their foothold, i.e., changing configurations<\/li>\n\n\n\n<li><strong>Privilege Escalation<\/strong>. Trying to gain higher-level permissions, i.e., leveraging a vulnerability to elevate access<\/li>\n\n\n\n<li><strong>Defense Evasion<\/strong>. Trying to avoid being detected, i.e., using trusted processes to hide malware<\/li>\n\n\n\n<li><strong>Credential Access<\/strong>. Stealing account names and passwords, i.e., keylogging<\/li>\n\n\n\n<li><strong>Discovery<\/strong>. Trying to figure out your environment, i.e., exploring what they can control<\/li>\n\n\n\n<li><strong>Lateral Movement<\/strong>. Moving through your environment, i.e., using legitimate credentials to pivot through multiple systems<\/li>\n\n\n\n<li><strong>Collection<\/strong>. Gathering data of interest to the adversary goal, i.e., accessing data in cloud storage<\/li>\n\n\n\n<li><strong>Command and Control<\/strong>. Communicating with compromised systems to control them, i.e., mimicking normal web traffic to communicate with a victim network<\/li>\n\n\n\n<li><strong>Exfiltration<\/strong>. Stealing data, i.e., transferring data to a cloud account<\/li>\n\n\n\n<li><strong>Impact<\/strong>. Manipulate, interrupt, or destroy systems and data, i.e., encrypting data with ransomware<\/li>\n<\/ul>\n\n\n\n<p>Within each tactic of the MITRE ATT&amp;CK matrix, there are adversary techniques, which describe the actual activity carried out by the adversary. Some techniques have sub-techniques that explain how an adversary carries out a specific technique in greater detail.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"h-the-full-att-amp-ck-matrix-for-enterprise-from-the-mitre-att-amp-ck-navigator-is-represented-below\"><span id=\"the-full-attck-matrix-for-enterprise-from-the-mitre-attck-navigator-is-represented-below\">The full ATT&amp;CK Matrix for Enterprise from the MITRE ATT&amp;CK navigator is represented below:<\/span><\/h5>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"562\" src=\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/image-2-1024x562.png?resize=1024%2C562&#038;ssl=1\" alt=\"MITRE ATT&amp;CK Framework\" class=\"wp-image-14759\" srcset=\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/image-2.png?resize=1024%2C562&amp;ssl=1 1024w, https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/image-2.png?resize=300%2C165&amp;ssl=1 300w, https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/image-2.png?resize=768%2C421&amp;ssl=1 768w, https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/image-2.png?resize=1536%2C843&amp;ssl=1 1536w, https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/image-2.png?resize=380%2C209&amp;ssl=1 380w, https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/image-2.png?resize=800%2C439&amp;ssl=1 800w, https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/image-2.png?resize=1160%2C637&amp;ssl=1 1160w, https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/image-2.png?w=1875&amp;ssl=1 1875w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>MITRE ATT&amp;CK for Enterprise, 2021<\/em><\/figcaption><\/figure><\/div>\n\n\n<h2 id=\"how-to-use-the-mitre-attck-framework-matrix\" class=\"wp-block-heading\"><strong>How to use the MITRE ATT&amp;CK framework matrix<\/strong><\/h2>\n\n\n\n<p>The MITRE ATT&amp;CK framework can help an organization in several ways. In general, the following are applicable benefits to adopting MITRE ATT&amp;CK:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Adversary Emulation<\/strong>. Assesses security by applying intelligence about an adversary and how it operates to emulate a threat. ATT&amp;CK can be used to create adversary emulation scenarios to test and verify defenses.<\/li>\n\n\n\n<li><strong>Behavioral Analytics Development<\/strong>. Links together suspicious activity to monitor adversary activity. ATT&amp;CK can be used to simplify and organize patterns of suspicious activity deemed malicious.<\/li>\n\n\n\n<li><strong>Red Teaming<\/strong>. Acts as an adversary to demonstrate the impact of a breach. ATT&amp;CK can be used to create red team plans and organize operations.<\/li>\n\n\n\n<li><strong>Defensive Gap Assessment<\/strong>. Determines what parts of the enterprise lack defenses and\/or visibility. ATT&amp;CK can be used to assess existing tools or test new tools before purchasing, to determine security coverage and prioritize investment.<\/li>\n\n\n\n<li><strong>SOC Maturity Assessment<\/strong>. Similar to the Defensive Gap Assessment, ATT&amp;CK can be used to determine how effective a security operations center (SOC) is at detecting, analyzing, and responding to breaches.<\/li>\n\n\n\n<li><strong>Cyber Threat Intelligence Enrichment<\/strong>. Enhances information about threats and threat actors. ATT&amp;CK allows defenders to assess whether they are able to defend against specific Advanced Persistent Threats (ATP) and common behaviors across multiple threat actors.<\/li>\n<\/ol>\n\n\n\n<p>Implementing MITRE ATT&amp;CK typically involves either manual mapping or integration with cybersecurity tools, the most common of which are Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), and Cloud Access Security Broker (CASB).<\/p>\n\n\n\n<h2 id=\"use-cases-of-the-mitre-attck-framework\" class=\"wp-block-heading\"><strong>Use cases of the MITRE ATT&amp;CK framework<\/strong><\/h2>\n\n\n\n<p>Two broad use cases for the framework are penetration testing (pen testing) and cybersecurity service evaluation. <\/p>\n\n\n\n<p>In pen testing, organizations\u00a0designate a red team\u00a0&#8212; much like MITRE did in its Fort Meade eXperiment (FMX) research project &#8212; to simulate behavior and find vulnerabilities.\u00a0Pen testers\u00a0can use MITRE to learn how to accurately simulate behaviors so that they can eventually develop accurate defenses.<\/p>\n\n\n\n<p>Cybersecurity vendors can also use MITRE&#8217;s evaluations to determine the strength of their products and services. The evaluations provide objective insights into the use of specific commercial security products, offer a transparent analysis of a given product&#8217;s capabilities, and strengthen the cybersecurity community as a whole by strengthening vendors that develop products responsible for customer security across many industries.<\/p>\n\n\n\n<p>Other use cases include cybersecurity gap assessments, security operations maturity assessments,\u00a0user and entity behavior analytics, threat detection and threat intelligence.\u00a0MITRE ATT&amp;CK use cases continue to evolve\u00a0and emerge.<\/p>\n\n\n\n<h2 id=\"benefits-of-the-mitre-attck-framework\" class=\"wp-block-heading\">Benefits of the MITRE ATT&amp;CK framework<\/h2>\n\n\n\n<p>The broad benefits of the framework include the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A more concrete account of adversarial behaviors.<\/li>\n\n\n\n<li>An account of not just threat indicators, but threat groups as well. Businesses can use Mitre to not only detect behaviors but also make educated guesses about who is performing them and track behaviors across different attacker groups. Its attack page features group-based info.<\/li>\n\n\n\n<li>Widely used and trusted across many industries, with sector-specific threat information.<\/li>\n\n\n\n<li>Takes a communal approach to threat reporting that ensures info is up to date and checked by the public, as well as Mitre.<\/li>\n<\/ul>\n\n\n\n<p>Using the framework, a business can do the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>associate attack behavior to different groups;<\/li>\n\n\n\n<li>pen test its network;<\/li>\n\n\n\n<li>find vulnerabilities in its network and map ATT&amp;CK methodologies to threats;<\/li>\n\n\n\n<li>discover\u00a0network misconfigurations;<\/li>\n\n\n\n<li>share its cybersecurity knowledge with the broader community; and<\/li>\n\n\n\n<li>standardize disparate security tools and techniques to create a more\u00a0cohesive security strategy.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recommended-articles\"><span id=\"recommended-articles\"><strong>Recommended Articles <\/strong><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/pii-in-cybersecurity-what-is-it-and-how-does-it-work\/\">PII In Cybersecurity: What Is It And How Does It Work?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/what-is-soar-in-cybersecurity-definition-tools-benefits\/\">What Is SOAR In Cybersecurity? Definition, Tools &amp; Benefits<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/cybersecurity-risk-assessment-what-it-is-how-to-perform-it\/\">Cybersecurity Risk Assessment: What It Is &amp; How To Perform It<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/\">What Is Keylogging &amp; How Does It Work?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/cia-triad-in-cybersecurity-what-is-it-why-is-it-important\/\">CIA Triad in Cybersecurity: What Is It &amp; Why Is It Important?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/what-is-tailgating-in-cybersecurity-how-to-prevent-it\/\">What is Tailgating in Cybersecurity &amp; How to Prevent It<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><span id=\"references\"><strong>References<\/strong><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.trellix.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Trellix<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.rapid7.com\/fundamentals\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Rapid7<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">TechTarget<\/a><\/li>\n<\/ul>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"MITRE ATT&amp;CK\u00ae stands for MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&amp;CK). The MITRE ATT&amp;CK framework is a&hellip;\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":290,"featured_media":14758,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[302],"tags":[],"class_list":{"0":"post-14754","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>MITRE ATT&amp;CK Framework: Everything You Need to Know - Business Yield Technology<\/title>\n<meta name=\"description\" content=\"The MITRE ATT&amp;CK framework is a curated knowledge base and model for cyber adversary behavior that helps predict cyber attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MITRE ATT&amp;CK Framework: Everything You Need to Know - Business Yield Technology\" \/>\n<meta property=\"og:description\" content=\"The MITRE ATT&amp;CK framework is a curated knowledge base and model for cyber adversary behavior that helps predict cyber attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Business Yield Technology\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/Jay.Arnis\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-21T17:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/MITREAttack_Framework_V2.webp?fit=1600%2C900&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Jimmy Anisulowo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/forlahjay\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jimmy Anisulowo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/\",\"url\":\"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/\",\"name\":\"MITRE ATT&amp;CK Framework: Everything You Need to Know - Business Yield Technology\",\"isPartOf\":{\"@id\":\"https:\/\/businessyield.com\/tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/MITREAttack_Framework_V2.webp?fit=1600%2C900&ssl=1\",\"datePublished\":\"2023-11-21T17:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff\"},\"description\":\"The MITRE ATT&CK framework is a curated knowledge base and model for cyber adversary behavior that helps predict cyber attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/MITREAttack_Framework_V2.webp?fit=1600%2C900&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/MITREAttack_Framework_V2.webp?fit=1600%2C900&ssl=1\",\"width\":1600,\"height\":900,\"caption\":\"MITRE ATT&CK Framework\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/businessyield.com\/tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MITRE ATT&amp;CK Framework: Everything You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/businessyield.com\/tech\/#website\",\"url\":\"https:\/\/businessyield.com\/tech\/\",\"name\":\"Business Yield Technology\",\"description\":\"Best Tech Reviews, Apps, Phones, &amp; Gaming\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/businessyield.com\/tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff\",\"name\":\"Jimmy Anisulowo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g\",\"caption\":\"Jimmy Anisulowo\"},\"description\":\"Jimmy generally lives his life by one dogma: steady improvement. This has taken him on a relentless pursuit of knowledge in diverse fields such as business, tech, insurance, health and many others. With a background in content creation and digital marketing plus over ten years of writing and research experience, he implements an expert's view to help his audiences gain valuable insight. He is also an avid reader, gamer, drummer, full-blown metalhead, and all-round fun gi.\",\"sameAs\":[\"https:\/\/www.facebook.com\/Jay.Arnis\",\"https:\/\/www.instagram.com\/forlahjay\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/forlahjay\"],\"url\":\"https:\/\/businessyield.com\/tech\/author\/jimmy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MITRE ATT&amp;CK Framework: Everything You Need to Know - Business Yield Technology","description":"The MITRE ATT&CK framework is a curated knowledge base and model for cyber adversary behavior that helps predict cyber attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"MITRE ATT&amp;CK Framework: Everything You Need to Know - Business Yield Technology","og_description":"The MITRE ATT&CK framework is a curated knowledge base and model for cyber adversary behavior that helps predict cyber attacks.","og_url":"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/","og_site_name":"Business Yield Technology","article_author":"https:\/\/www.facebook.com\/Jay.Arnis","article_published_time":"2023-11-21T17:00:00+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/MITREAttack_Framework_V2.webp?fit=1600%2C900&ssl=1","type":"image\/webp"}],"author":"Jimmy Anisulowo","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/forlahjay","twitter_misc":{"Written by":"Jimmy Anisulowo","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/","url":"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/","name":"MITRE ATT&amp;CK Framework: Everything You Need to Know - Business Yield Technology","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/MITREAttack_Framework_V2.webp?fit=1600%2C900&ssl=1","datePublished":"2023-11-21T17:00:00+00:00","author":{"@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff"},"description":"The MITRE ATT&CK framework is a curated knowledge base and model for cyber adversary behavior that helps predict cyber attacks.","breadcrumb":{"@id":"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/#primaryimage","url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/MITREAttack_Framework_V2.webp?fit=1600%2C900&ssl=1","contentUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/MITREAttack_Framework_V2.webp?fit=1600%2C900&ssl=1","width":1600,"height":900,"caption":"MITRE ATT&CK Framework"},{"@type":"BreadcrumbList","@id":"https:\/\/businessyield.com\/tech\/cyber-security\/mitre-attck-framework-everything-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/businessyield.com\/tech\/"},{"@type":"ListItem","position":2,"name":"MITRE ATT&amp;CK Framework: Everything You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/businessyield.com\/tech\/#website","url":"https:\/\/businessyield.com\/tech\/","name":"Business Yield Technology","description":"Best Tech Reviews, Apps, Phones, &amp; Gaming","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/businessyield.com\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff","name":"Jimmy Anisulowo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g","caption":"Jimmy Anisulowo"},"description":"Jimmy generally lives his life by one dogma: steady improvement. This has taken him on a relentless pursuit of knowledge in diverse fields such as business, tech, insurance, health and many others. With a background in content creation and digital marketing plus over ten years of writing and research experience, he implements an expert's view to help his audiences gain valuable insight. He is also an avid reader, gamer, drummer, full-blown metalhead, and all-round fun gi.","sameAs":["https:\/\/www.facebook.com\/Jay.Arnis","https:\/\/www.instagram.com\/forlahjay\/","https:\/\/x.com\/https:\/\/twitter.com\/forlahjay"],"url":"https:\/\/businessyield.com\/tech\/author\/jimmy\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/MITREAttack_Framework_V2.webp?fit=1600%2C900&ssl=1","jetpack_sharing_enabled":true,"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/users\/290"}],"replies":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/comments?post=14754"}],"version-history":[{"count":1,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14754\/revisions"}],"predecessor-version":[{"id":14760,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14754\/revisions\/14760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media\/14758"}],"wp:attachment":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media?parent=14754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/categories?post=14754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/tags?post=14754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}