FrameworkOfffensivePenetration Testing

MITRE ATT&CK® Released Updates in Apr 2022 With Additional Techniques and Structuring

The Techniques, Groups, and Software for Enterprise, Mobile, and ICS are updated in the April 2022 (v11) ATT&CK release. The most significant modifications are the reorganisation of Detections, which are now connected to Data Source and Data Component objects in Enterprise ATT&CK, the beta release of ATT&CK for Mobile using sub-techniques, and the addition of ATT&CK for ICS to attack.mitre.org. These adjustments as well as enhancements across ATT&CK’s various domains and platforms are detailed in an accompanying blog post.

A beta version of ATT&CK for Mobile is included in this release and is displayed using sub-techniques. You can still access the most recent stable version of ATT&CK for Mobile at https://attack.mitre.org/versions/v10/matrices/mobile/. An accompanying blog post provides instructions on how to upgrade to this new version of ATT&CK for Mobile. Our GitHub repository contains a rendering of this beta content done in STIX.

In order to better reflect adversary behaviour, we have changed the Enterprise Sub-Techniques Boot or Logon Autostart Execution: Plist Modification (T1547.011) and Scheduled Task/Job: At (Linux)(T1053.001) into Plist File Modification (T1647) and Scheduled Task/Job: At (T1053.002), respectively.

14 Tactics, 191 Techniques, 386 Sub-techniques, 134 Groups, and 680 Pieces of Software make up this version of ATT&CK for Enterprise.

Techniques

Enterprise

New Techniques

Technique changes

Minor Technique changes

Technique revocations

Technique deprecations

  • No changes

Mobile v11.0-beta

The below changes represent the Mobile v11.0-beta release. The current production release at https://attack.mitre.org/versions/v10/matrices/mobile/ remains unchanged.

New Techniques

Technique changes

Minor Technique changes

  • No changes

Technique revocations

Technique deprecations

Software

Enterprise

New Software

Software changes

Minor Software changes

Software revocations

  • No changes

Software deprecations

  • No changes

Mobile

New Software

  • No changes

Software changes

Minor Software changes

Software revocations

  • No changes

Software deprecations

  • No changes

Groups

Enterprise

New Groups

Group changes

Minor Group changes

Group revocations

Group deprecations

  • No changes

Mobile

New Groups

  • No changes

Group changes

Minor Group changes

  • No changes

Group revocations

  • No changes

Group deprecations

  • No changes

Mitigations

Enterprise

New Mitigations

  • No changes

Mitigation changes

Minor Mitigation changes

  • No changes

Mitigation revocations

  • No changes

Mitigation deprecations

  • No changes

Mobile

New Mitigations

  • No changes

Mitigation changes

  • No changes

Minor Mitigation changes

  • No changes

Mitigation revocations

  • No changes

Mitigation deprecations

Data Sources and/or Components

Enterprise

New Data Sources and/or Components

  • No changes

Data Source and/or Component changes:

  • No changes

Minor Data Source and/or Component changes

Data Source and/or Component revocations

  • No changes

Data Source and/or Component deprecations

  • No changes

Mobile

ATT&CK for Mobile does not support data sources

Contributors to this release

  • Abhijit Mohanta, @abhijit_mohanta, Uptycs
  • Akshat Pradhan, Qualys
  • Alex Hinchliffe, Palo Alto Networks
  • Alex Parsons, Crowdstrike
  • Alex Spivakovsky, Pentera
  • Andrew Northern, @ex_raritas
  • Antonio Piazza, @antman1p
  • Austin Clark, @c2defense
  • Bryan Campbell, @bry_campbell
  • Chris Romano, Crowdstrike
  • Clément Notin, Tenable
  • Cody Thomas, SpecterOps
  • Craig Smith, BT Security
  • Csaba Fitzl @theevilbit of Offensive Security
  • Daniel Acevedo, Blackbot
  • Daniel Feichter, @VirtualAllocEx, Infosec Tirol
  • Daniyal Naeem, BT Security
  • Darin Smith, Cisco
  • Dror Alon, Palo Alto Networks
  • Edward Millington
  • Elvis Veliz, Citi
  • Emily Ratliff, IBM
  • Eric Kaiser @ideologysec
  • ESET
  • Hannah Simes, BT Security
  • Harshal Tupsamudre, Qualys
  • Hiroki Nagahama, NEC Corporation
  • Isif Ibrahima, Mandiant
  • James_inthe_box, Me
  • Jan Petrov, Citi
  • Jannie Li, Microsoft Threat Intelligence Center (MSTIC)
  • Jen Burns, HubSpot
  • Jeremy Galloway
  • Joas Antonio dos Santos, @C0d3Cr4zy, Inmetrics
  • John Page (aka hyp3rlinx), ApparitionSec
  • Jon Sternstein, Stern Security
  • Kobi Haimovich, CardinalOps
  • Krishnan Subramanian, @krish203
  • Kyaw Pyiyt Htet, @KyawPyiytHtet
  • Leo Zhang, Trend Micro
  • Manikantan Srinivasan, NEC Corporation India
  • Massimiliano Romano, BT Security
  • Matthew Green
  • Mayan Arora aka Mayan Mohan
  • Mayuresh Dani, Qualys
  • Michael Raggi @aRtAGGI
  • Mohamed Kmal
  • NEC
  • NST Assure Research Team, NetSentries Technologies
  • Oleg Kolesnikov, Securonix
  • Or Kliger, Palo Alto Networks
  • Pawel Partyka, Microsoft 365 Defender
  • Phil Taylor, BT Security
  • Pià Consigny, Tenable
  • Pooja Natarajan, NEC Corporation India
  • Praetorian
  • Prasad Somasamudram, McAfee
  • Ram Pliskin, Microsoft Azure Security Center
  • Richard Julian, Citi
  • Runa Sandvik
  • Sekhar Sarukkai, McAfee
  • Selena Larson, @selenalarson
  • Shilpesh Trivedi, Uptycs
  • Sittikorn Sangrattanapitak
  • Steven Du, Trend Micro
  • Suzy Schapperle – Microsoft Azure Red Team
  • Syed Ummar Farooqh, McAfee
  • Taewoo Lee, KISA
  • The Wover, @TheRealWover
  • Tiago Faria, 3CORESec
  • Tony Lee
  • Travis Smith, Qualys
  • TruKno
  • Tsubasa Matsuda, NEC Corporation
  • Vinay Pidathala
  • Wes Hurd
  • Wietze Beukema, @wietze
  • Wojciech Lesicki
  • Zachary Abzug, @ZackDoesML
  • Zachary Stanford, @svch0st

Leave a Reply

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.