Archived Projects

Attack Flow v2

Project Summary

Attack Flow is a data model with supporting tooling and examples for describing sequences of adversary behaviors. Attack flows help defenders understand, share, and make threat-informed decisions based on the sequence of actions in a cyber-attack. Flows can be analyzed to identify common patterns in adversary behavior, overlayed on ATT&CK Navigator layers to understand defensive coverage, and create a foundation for intel-driven adversary emulation plans.

This is an old version of the Attack Flow project. For the latest version, see: Attack Flow.

Problem

Defenders often track adversary behaviors atomically, focusing on one specific action at a time. This makes it harder to understand adversary attacks and to build effective defenses against those attacks.

Solution

Create a language, and associated tooling, to describe flows of ATT&CK techniques and combine those flows into patterns of behavior.

Impact

Help defenders and leaders understand how adversaries operate and compose atomic techniques into attacks to better understand defensive posture.


Funding Research Participants



Non-Profit Participants


Explore More of Our Work:

Threat-Informed Defense for Cloud Security

Use our latest mappings to replace assumption-driven cloud defense with evidence-based decisions to stop cloud adversaries in their tracks. With …

Continue reading

INFORM Your Defense

MITRE INFORM is a program-level assessment designed to show how threat-informed your organization is and where to improve next across cyber …

Continue reading

Attack Flow v3

With Attack Flow, you will capture the entire attack and communicate what matters!

Continue reading

Stay Informed

Sign up for our "Stay Informed" mailing list to receive announcements for project publications, upcoming events, and other news about the Center.