{"id":24091,"date":"2025-05-20T09:41:14","date_gmt":"2025-05-20T07:41:14","guid":{"rendered":"https:\/\/www.advens.test\/?p=24091"},"modified":"2025-05-20T09:48:41","modified_gmt":"2025-05-20T07:48:41","slug":"overview-framework-mitre-attck","status":"publish","type":"post","link":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/media\/security-operations\/overview-framework-mitre-attck\/","title":{"rendered":"Overview of the MITRE ATT&amp;CK framework"},"content":{"rendered":"\n<p>The MITRE ATT&amp;CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories. For good reason, the latter brings together more than 250 attack techniques and it is a whole community of experts who strive to regularly update this knowledge base.<\/p>\n\n\n\n<p>Through this post, we will present what the MITRE ATT&amp;CK framework is, in what context to use it and finally to what extent it can facilitate the work of BlueTeam teams.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Presentation of the MITRE ATT&amp;CK framework<\/h3>\n\n\n\n<p>MITRE is a non-profit organization, renowned in the field of cybersecurity and whose vocation is to \u201csolve problems to make the world safer\u201d.<\/p>\n\n\n\n<p>With the ATT&amp;CK framework, the MITRE organization provides the community with an important empirical knowledge base of the various known attack techniques. Unlike other projects in the field, the focus is not on tools or malware but on the actions taken by an attacker against any system.<\/p>\n\n\n\n<p>This knowledge base has many advantages, it is:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Freely accessible\u00a0<\/strong>on the Internet via the MITRE website<\/li>\n\n\n\n<li><strong>Focused on the actions\u00a0<\/strong>performed by an attacker on a system, not on exploit tools and malware<\/li>\n\n\n\n<li><strong>Relatively complete<\/strong>\u00a0with over 250 Listed Attack Techniques (TTP)<\/li>\n\n\n\n<li><strong>Representative of attacks observed\u00a0<\/strong>in the real world<\/li>\n\n\n\n<li><strong>Updated regularly\u00a0<\/strong>with several updates per year<\/li>\n<\/ul>\n\n\n\n<p>Another advantage and not the least, <strong>all techniques are fully documented.<\/strong><\/p>\n\n\n\n<p>For example, the screenshots below describe the Kerberoasting attack technique referenced in the MITRE ATT&amp;CK knowledge base.<\/p>\n\n\n\n<p>First of all, there is a simplified description of the attack technique with many links to additional resources to learn more about the technique in question:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"943\" height=\"314\" src=\"https:\/\/www.advens.fr\/wp-content\/uploads\/2022\/05\/screen-11.png\" alt=\"\" class=\"wp-image-1235\" srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-11.png 943w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-11-300x100.png 300w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-11-768x256.png 768w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-11-260x87.png 260w\" sizes=\"auto, (max-width: 943px) 100vw, 943px\" \/><\/figure><\/div>\n\n\n<p>Then we find some examples of offensive tools to perform this attack technique:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"531\" height=\"281\" src=\"https:\/\/www.advens.fr\/wp-content\/uploads\/2022\/05\/screen-12.png\" alt=\"\" class=\"wp-image-1237\" srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-12.png 531w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-12-300x159.png 300w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-12-260x138.png 260w\" sizes=\"auto, (max-width: 531px) 100vw, 531px\" \/><\/figure><\/div>\n\n\n<p>Finally, there are detection indices and remediation actions to prevent this type of technique:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"539\" height=\"350\" src=\"https:\/\/www.advens.fr\/wp-content\/uploads\/2022\/05\/screen-13.png\" alt=\"\" class=\"wp-image-1239\" srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-13.png 539w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-13-300x195.png 300w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-13-216x140.png 216w\" sizes=\"auto, (max-width: 539px) 100vw, 539px\" \/><\/figure><\/div>\n\n\n<p>All techniques are logically classified into several categories called <strong>tactical<\/strong>.<\/p>\n\n\n\n<p><strong>A tactic represents one of the main objectives targeted by an attacker <\/strong>during an action on an information system. Since the last update of April 2019, there are 12 where we find for example:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Discovery<\/strong>: The attacker seeks to collect information about the information system in order to prepare his attack.\u00a0<em>Examples of related techniques: host and port scanning, network share search, sniffing.<\/em><\/li>\n\n\n\n<li><strong>Execution<\/strong>: The attacker attempts to execute a program or other component that could be beneficial to him to carry out his attack.\u00a0<em>Examples of related techniques: Running a PowerShell script, scheduled tasks, loading DLLs.<\/em><\/li>\n\n\n\n<li><strong>Exfiltration<\/strong>: The attacker attempts to exfiltrate data to a destination under his control.\u00a0Examples of related techniques: exfiltration through an alternative network protocol to a remote machine under its control, exfiltration from a physical device (USB key, smartphone, MP3 player, \u2026).<\/li>\n\n\n\n<li><strong>Etc<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p><strong>The MITRE ATT&amp;CK matrix,<\/strong> is therefore a representation that makes the correspondence between tactics (columns) and techniques:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"380\" src=\"https:\/\/www.advens.fr\/wp-content\/uploads\/2022\/05\/screen-14-1024x380.png\" alt=\"\" class=\"wp-image-1241\" srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-14-1024x380.png 1024w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-14-300x111.png 300w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-14-768x285.png 768w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-14-260x97.png 260w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-14.png 1047w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>The MITRE ATT&amp;CK matrix responds to a simple need to create an up-to-date baseline of attack techniques grouped by objective (tactics). With a more complete view of offensive techniques, BlueTeam teams can more effectively detect and qualify abnormal events.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">MITRE ATT&amp;CK: what are the uses for BlueTeam and security incident detection?<\/h3>\n\n\n\n<p>As a reminder, a Blue Team is defined as follows:<\/p>\n\n\n\n<p>A group that defends a company\u2019s information system when an offensive group (i.e., the Red Team) carries out an operational exercise based on rules established and supervised by a neutral group (i.e., the White Team).<\/p>\n\n\n\n<p>The MITRE ATT&amp;CK matrix can therefore help the Blue Team in 3 aspects:<\/p>\n\n\n\n<p><strong>The Threat Intelligence<\/strong>: ATT&amp;CK allows security analysts to standardize how they share knowledge about potential threats:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"316\" src=\"https:\/\/www.advens.fr\/wp-content\/uploads\/2022\/05\/screen-15.png\" alt=\"\" class=\"wp-image-1243\" srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-15.png 660w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-15-300x144.png 300w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-15-260x124.png 260w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/figure><\/div>\n\n\n<p><strong>The attack simulation<\/strong>: This greatly facilitates exchanges between the BlueTeam and RedTeam teams by defining a common structure during an attack simulation. Many tools are offered in the ATT&amp;CK framework to test different attack scenarios such as Python CALDERA scripts for example. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"812\" height=\"231\" src=\"https:\/\/www.advens.fr\/wp-content\/uploads\/2022\/05\/screen-16.png\" alt=\"\" class=\"wp-image-1245\" srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-16.png 812w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-16-300x85.png 300w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-16-768x218.png 768w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-16-260x74.png 260w\" sizes=\"auto, (max-width: 812px) 100vw, 812px\" \/><\/figure><\/div>\n\n\n<p><strong>An assessment of the level of defence<\/strong>: The matrix allows BlueTeam teams to have an accurate representation of the different attack techniques covered by security equipment.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"687\" height=\"406\" src=\"https:\/\/www.advens.fr\/wp-content\/uploads\/2022\/05\/screen-17.png\" alt=\"\" class=\"wp-image-1247\" srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-17.png 687w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-17-300x177.png 300w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-17-237x140.png 237w\" sizes=\"auto, (max-width: 687px) 100vw, 687px\" \/><\/figure><\/div>\n\n\n<p>This last use is particularly interesting to control the coverage rate of detection mechanisms. For example, it is utopian to hope to cover all attack techniques by relying exclusively on the events of a firewall or an Active Directory.<\/p>\n\n\n\n<p>It is therefore a \u201cscenario\u201d approach, as recommended by ANSSI in the EBIOS Risk Manager repository, which is preferred to take full advantage of this framework. (our detailed article on EBIOS Risk Manager).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"470\" height=\"387\" src=\"https:\/\/www.advens.fr\/wp-content\/uploads\/2022\/05\/screen-18.png\" alt=\"\" class=\"wp-image-1249\" srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-18.png 470w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-18-300x247.png 300w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-18-170x140.png 170w\" sizes=\"auto, (max-width: 470px) 100vw, 470px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">An example of using the MITRE ATT&amp;CK framework:<\/h3>\n\n\n\n<p>Let\u2019s take the simple example of an attempt to exfiltrate the client base of a web application.<\/p>\n\n\n\n<p>A possible attack scenario would be:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Attacker exploits an application vulnerability to upload a webshell (script that allows the web server to execute commands)<\/li>\n\n\n\n<li>The attacker downloads the local database configuration file containing the login\/password pair used by the web application to connect to the database<\/li>\n\n\n\n<li>The attacker reuses this account to connect to the database and then makes a copy of the user database in a text file<\/li>\n\n\n\n<li>The attacker exfiltrates the text file that he has previously encrypted to a remote server under his control<\/li>\n<\/ol>\n\n\n\n<p>This scenario is composed of several attack techniques referenced in the ATT&amp;CK matrix.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"570\" src=\"https:\/\/www.advens.fr\/wp-content\/uploads\/2022\/05\/screen-19-1024x570.png\" alt=\"\" class=\"wp-image-1251\" srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-19-1024x570.png 1024w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-19-300x167.png 300w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-19-768x427.png 768w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-19-252x140.png 252w, https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/screen-19.png 1089w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<h3 class=\"wp-block-heading\">Conclusion<\/h3>\n\n\n\n<p>The MITRE ATT&amp;CK framework is now an important ally for BlueTeam teams, providing them with a comprehensive and well-documented repository of attack techniques. Constantly evolving and supported by a growing community, it is gradually adopted and highlighted by security solution publishers as a guarantee of seriousness and quality in the field of cybersecurity. Finally, we can only encourage cybersecurity professionals to discover or even adopt this framework because it is by understanding offensive techniques that it becomes possible to defend themselves effectively.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The MITRE ATT&amp;CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories. For good reason, the latter brings together more than 250 attack techniques and it is a whole community of experts who strive to regularly update this knowledge base. Through this post, [&hellip;]<\/p>\n","protected":false},"author":41,"featured_media":24093,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[470],"tags":[],"custom_format":[],"class_list":["post-24091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-operations"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Overview of the MITRE ATT&amp;CK framework - Advens<\/title>\n<meta name=\"description\" content=\"The MITRE ATT&amp;CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories. For The MITRE ATT&amp;CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Overview of the MITRE ATT&amp;CK framework - Advens\" \/>\n<meta property=\"og:description\" content=\"The MITRE ATT&amp;CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories. For The MITRE ATT&amp;CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-20T07:41:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-20T07:48:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.test\/app\/uploads\/2025\/05\/advens-video-capture-ftm-18-620x620-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"620\" \/>\n\t<meta property=\"og:image:height\" content=\"620\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Sezen Dupont\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/\"},\"author\":{\"name\":\"Sezen Dupont\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/6e950db8d1a2749165ba4791fd11fa09\"},\"headline\":\"Overview of the MITRE ATT&amp;CK framework\",\"datePublished\":\"2025-05-20T07:41:14+00:00\",\"dateModified\":\"2025-05-20T07:48:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/\"},\"wordCount\":977,\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/advens-video-capture-ftm-18-620x620-1.webp\",\"articleSection\":[\"Security Operations\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/\",\"url\":\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/\",\"name\":\"Overview of the MITRE ATT&amp;CK framework - Advens\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/advens-video-capture-ftm-18-620x620-1.webp\",\"datePublished\":\"2025-05-20T07:41:14+00:00\",\"dateModified\":\"2025-05-20T07:48:41+00:00\",\"description\":\"The MITRE ATT&amp;CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories. For The MITRE ATT&CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#primaryimage\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/advens-video-capture-ftm-18-620x620-1.webp\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/advens-video-capture-ftm-18-620x620-1.webp\",\"width\":620,\"height\":620},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.test\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 op\u00e9rationnelle\",\"item\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/media\/securite-operationnelle\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Overview of the MITRE ATT&amp;CK framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.test\/#website\",\"url\":\"https:\/\/www.advens.test\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.test\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.test\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.test\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/6e950db8d1a2749165ba4791fd11fa09\",\"name\":\"Sezen Dupont\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ed27295fab4f3611b05e9eed73a271c7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ed27295fab4f3611b05e9eed73a271c7?s=96&d=mm&r=g\",\"caption\":\"Sezen Dupont\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Overview of the MITRE ATT&amp;CK framework - Advens","description":"The MITRE ATT&amp;CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories. For The MITRE ATT&CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/","og_locale":"en_US","og_type":"article","og_title":"Overview of the MITRE ATT&amp;CK framework - Advens","og_description":"The MITRE ATT&amp;CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories. For The MITRE ATT&CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories.","og_url":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/","og_site_name":"Advens","article_published_time":"2025-05-20T07:41:14+00:00","article_modified_time":"2025-05-20T07:48:41+00:00","og_image":[{"width":620,"height":620,"url":"https:\/\/www.advens.test\/app\/uploads\/2025\/05\/advens-video-capture-ftm-18-620x620-1.webp","type":"image\/webp"}],"author":"Sezen Dupont","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#article","isPartOf":{"@id":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/"},"author":{"name":"Sezen Dupont","@id":"https:\/\/www.advens.test\/#\/schema\/person\/6e950db8d1a2749165ba4791fd11fa09"},"headline":"Overview of the MITRE ATT&amp;CK framework","datePublished":"2025-05-20T07:41:14+00:00","dateModified":"2025-05-20T07:48:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/"},"wordCount":977,"publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"image":{"@id":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/advens-video-capture-ftm-18-620x620-1.webp","articleSection":["Security Operations"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/","url":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/","name":"Overview of the MITRE ATT&amp;CK framework - Advens","isPartOf":{"@id":"https:\/\/www.advens.test\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/advens-video-capture-ftm-18-620x620-1.webp","datePublished":"2025-05-20T07:41:14+00:00","dateModified":"2025-05-20T07:48:41+00:00","description":"The MITRE ATT&amp;CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories. For The MITRE ATT&CK framework is evolving and it is becoming common to observe that BlueTeam teams have made it one of their detection repositories.","breadcrumb":{"@id":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#primaryimage","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/advens-video-capture-ftm-18-620x620-1.webp","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/advens-video-capture-ftm-18-620x620-1.webp","width":620,"height":620},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.test\/en\/security-operations\/overview-framework-mitre-attck\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.test\/en\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 op\u00e9rationnelle","item":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/media\/securite-operationnelle\/"},{"@type":"ListItem","position":3,"name":"Overview of the MITRE ATT&amp;CK framework"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.test\/#website","url":"https:\/\/www.advens.test\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.advens.test\/#organization","name":"Advens","url":"https:\/\/www.advens.test\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]},{"@type":"Person","@id":"https:\/\/www.advens.test\/#\/schema\/person\/6e950db8d1a2749165ba4791fd11fa09","name":"Sezen Dupont","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ed27295fab4f3611b05e9eed73a271c7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ed27295fab4f3611b05e9eed73a271c7?s=96&d=mm&r=g","caption":"Sezen Dupont"}}]}},"featured_url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/advens-video-capture-ftm-18-620x620-1.webp","_links":{"self":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/24091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/comments?post=24091"}],"version-history":[{"count":2,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/24091\/revisions"}],"predecessor-version":[{"id":24103,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/24091\/revisions\/24103"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/media\/24093"}],"wp:attachment":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/media?parent=24091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/categories?post=24091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/tags?post=24091"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/custom_format?post=24091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}