{"id":14522,"date":"2023-01-01T08:23:40","date_gmt":"2023-01-01T07:23:40","guid":{"rendered":"https:\/\/www.graviton.at\/letterswaplibrary\/request-mitre-attck-annotated-cyber-attack-trees\/"},"modified":"2023-01-01T08:23:40","modified_gmt":"2023-01-01T07:23:40","slug":"request-mitre-attck-annotated-cyber-attack-trees","status":"publish","type":"post","link":"https:\/\/www.graviton.at\/letterswaplibrary\/request-mitre-attck-annotated-cyber-attack-trees\/","title":{"rendered":"[REQUEST] MITRE ATT&amp;CK Annotated Cyber Attack Trees"},"content":{"rendered":"<p><!-- SC_OFF --><\/p>\n<div class=\"md\">\n<p>Interested in any Cyber Incident data that links MITRE ATT&amp;CK labels to the time of detection or attacker kill chain, such as annotated cyber incident timelines. Particularly interested in mapping progress through the killchain to draw out most common attack paths.<\/p>\n<p>I know much of this data will be commercially sensitive, or IP for incident response companies, any suggestions or direction would be greatly welcomed.<\/p>\n<\/div>\n<p><!-- SC_ON -->   submitted by   <a href=\"https:\/\/www.reddit.com\/user\/swivel_chair_jockey\"> \/u\/swivel_chair_jockey <\/a> <br \/> <span><a href=\"https:\/\/www.reddit.com\/r\/datasets\/comments\/11nvcw4\/request_mitre_attck_annotated_cyber_attack_trees\/\">[link]<\/a><\/span>   <span><a href=\"https:\/\/www.reddit.com\/r\/datasets\/comments\/11nvcw4\/request_mitre_attck_annotated_cyber_attack_trees\/\">[comments]<\/a><\/span><\/p><div class='watch-action'><div class='watch-position align-right'><div class='action-like'><a class='lbg-style1 like-14522 jlk' href='javascript:void(0)' data-task='like' data-post_id='14522' data-nonce='715e311f58' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.graviton.at\/letterswaplibrary\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='Like' \/><span class='lc-14522 lc'>0<\/span><\/a><\/div><\/div> <div class='status-14522 status align-right'><\/div><\/div><div class='wti-clear'><\/div>","protected":false},"excerpt":{"rendered":"<p>Interested in any Cyber Incident data that links MITRE ATT&amp;CK labels to the time of detection or&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-14522","post","type-post","status-publish","format-standard","hentry","category-othernonsense","wpcat-7-id"],"_links":{"self":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/14522","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/comments?post=14522"}],"version-history":[{"count":0,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/posts\/14522\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/media?parent=14522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/categories?post=14522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.graviton.at\/letterswaplibrary\/wp-json\/wp\/v2\/tags?post=14522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}