export const mitreAttackDictionary = {
	C0001: { name: 'Frankenstein', id: 'C0001', url: 'https://attack.mitre.org/campaigns/C0001' },
	C0002: { name: 'Night Dragon', id: 'C0002', url: 'https://attack.mitre.org/campaigns/C0002' },
	C0004: { name: 'CostaRicto', id: 'C0004', url: 'https://attack.mitre.org/campaigns/C0004' },
	C0005: { name: 'Operation Spalax', id: 'C0005', url: 'https://attack.mitre.org/campaigns/C0005' },
	C0006: { name: 'Operation Honeybee', id: 'C0006', url: 'https://attack.mitre.org/campaigns/C0006' },
	C0007: { name: 'FunnyDream', id: 'C0007', url: 'https://attack.mitre.org/campaigns/C0007' },
	C0010: { name: 'C0010', id: 'C0010', url: 'https://attack.mitre.org/campaigns/C0010' },
	C0011: { name: 'C0011', id: 'C0011', url: 'https://attack.mitre.org/campaigns/C0011' },
	C0012: { name: 'Operation CuckooBees', id: 'C0012', url: 'https://attack.mitre.org/campaigns/C0012' },
	C0013: { name: 'Operation Sharpshooter', id: 'C0013', url: 'https://attack.mitre.org/campaigns/C0013' },
	C0014: { name: 'Operation Wocao', id: 'C0014', url: 'https://attack.mitre.org/campaigns/C0014' },
	C0015: { name: 'C0015', id: 'C0015', url: 'https://attack.mitre.org/campaigns/C0015' },
	C0016: { name: 'Operation Dust Storm', id: 'C0016', url: 'https://attack.mitre.org/campaigns/C0016' },
	DS0001: { name: 'Firmware', id: 'DS0001', url: 'https://attack.mitre.org/datasources/DS0001' },
	DS0002: { name: 'User Account', id: 'DS0002', url: 'https://attack.mitre.org/data-sources/DS0002' },
	DS0003: { name: 'Scheduled Job', id: 'DS0003', url: 'https://attack.mitre.org/datasources/DS0003' },
	DS0004: { name: 'Malware Repository', id: 'DS0004', url: 'https://attack.mitre.org/data-sources/DS0004' },
	DS0005: { name: 'WMI', id: 'DS0005', url: 'https://attack.mitre.org/datasources/DS0005' },
	DS0006: { name: 'Web Credential', id: 'DS0006', url: 'https://attack.mitre.org/datasources/DS0006' },
	DS0007: { name: 'Image', id: 'DS0007', url: 'https://attack.mitre.org/datasources/DS0007' },
	DS0008: { name: 'Kernel', id: 'DS0008', url: 'https://attack.mitre.org/datasources/DS0008' },
	DS0009: { name: 'Process', id: 'DS0009', url: 'https://attack.mitre.org/data-sources/DS0009' },
	DS0010: { name: 'Cloud Storage', id: 'DS0010', url: 'https://attack.mitre.org/datasources/DS0010' },
	DS0011: { name: 'Module', id: 'DS0011', url: 'https://attack.mitre.org/datasources/DS0011' },
	DS0012: { name: 'Script', id: 'DS0012', url: 'https://attack.mitre.org/data-sources/DS0012' },
	DS0013: { name: 'Sensor Health', id: 'DS0013', url: 'https://attack.mitre.org/data-sources/DS0013' },
	DS0014: { name: 'Pod', id: 'DS0014', url: 'https://attack.mitre.org/datasources/DS0014' },
	DS0015: { name: 'Application Log', id: 'DS0015', url: 'https://attack.mitre.org/datasources/DS0015' },
	DS0016: { name: 'Drive', id: 'DS0016', url: 'https://attack.mitre.org/datasources/DS0016' },
	DS0017: { name: 'Command', id: 'DS0017', url: 'https://attack.mitre.org/data-sources/DS0017' },
	DS0018: { name: 'Firewall', id: 'DS0018', url: 'https://attack.mitre.org/datasources/DS0018' },
	DS0019: { name: 'Service', id: 'DS0019', url: 'https://attack.mitre.org/datasources/DS0019' },
	DS0020: { name: 'Snapshot', id: 'DS0020', url: 'https://attack.mitre.org/datasources/DS0020' },
	DS0021: { name: 'Persona', id: 'DS0021', url: 'https://attack.mitre.org/datasources/DS0021' },
	DS0022: { name: 'File', id: 'DS0022', url: 'https://attack.mitre.org/data-sources/DS0022' },
	DS0023: { name: 'Named Pipe', id: 'DS0023', url: 'https://attack.mitre.org/datasources/DS0023' },
	DS0024: { name: 'Windows Registry', id: 'DS0024', url: 'https://attack.mitre.org/datasources/DS0024' },
	DS0025: { name: 'Cloud Service', id: 'DS0025', url: 'https://attack.mitre.org/datasources/DS0025' },
	DS0026: { name: 'Active Directory', id: 'DS0026', url: 'https://attack.mitre.org/datasources/DS0026' },
	DS0027: { name: 'Driver', id: 'DS0027', url: 'https://attack.mitre.org/datasources/DS0027' },
	DS0028: { name: 'Logon Session', id: 'DS0028', url: 'https://attack.mitre.org/data-sources/DS0028' },
	DS0029: { name: 'Network Traffic', id: 'DS0029', url: 'https://attack.mitre.org/data-sources/DS0029' },
	DS0030: { name: 'Instance', id: 'DS0030', url: 'https://attack.mitre.org/datasources/DS0030' },
	DS0031: { name: 'Cluster', id: 'DS0031', url: 'https://attack.mitre.org/data-sources/DS0031' },
	DS0032: { name: 'Container', id: 'DS0032', url: 'https://attack.mitre.org/datasources/DS0032' },
	DS0033: { name: 'Network Share', id: 'DS0033', url: 'https://attack.mitre.org/datasources/DS0033' },
	DS0034: { name: 'Volume', id: 'DS0034', url: 'https://attack.mitre.org/datasources/DS0034' },
	DS0035: { name: 'Internet Scan', id: 'DS0035', url: 'https://attack.mitre.org/datasources/DS0035' },
	DS0036: { name: 'Group', id: 'DS0036', url: 'https://attack.mitre.org/datasources/DS0036' },
	DS0037: { name: 'Certificate', id: 'DS0037', url: 'https://attack.mitre.org/datasources/DS0037' },
	DS0038: { name: 'Domain Name', id: 'DS0038', url: 'https://attack.mitre.org/datasources/DS0038' },
	G0001: { name: 'Axiom', id: 'G0001', url: 'https://attack.mitre.org/groups/G0001' },
	G0002: { name: 'Moafee', id: 'G0002', url: 'https://attack.mitre.org/groups/G0002' },
	G0003: { name: 'Cleaver', id: 'G0003', url: 'https://attack.mitre.org/groups/G0003' },
	G0004: { name: 'Ke3chang', id: 'G0004', url: 'https://attack.mitre.org/groups/G0004' },
	G0005: { name: 'APT12', id: 'G0005', url: 'https://attack.mitre.org/groups/G0005' },
	G0006: { name: 'APT1', id: 'G0006', url: 'https://attack.mitre.org/groups/G0006' },
	G0007: { name: 'APT28', id: 'G0007', url: 'https://attack.mitre.org/groups/G0007' },
	G0008: { name: 'Carbanak', id: 'G0008', url: 'https://attack.mitre.org/groups/G0008' },
	G0009: { name: 'Deep Panda', id: 'G0009', url: 'https://attack.mitre.org/groups/G0009' },
	G0010: { name: 'Turla', id: 'G0010', url: 'https://attack.mitre.org/groups/G0010' },
	G0011: { name: 'PittyTiger', id: 'G0011', url: 'https://attack.mitre.org/groups/G0011' },
	G0012: { name: 'Darkhotel', id: 'G0012', url: 'https://attack.mitre.org/groups/G0012' },
	G0013: { name: 'APT30', id: 'G0013', url: 'https://attack.mitre.org/groups/G0013' },
	G0014: { name: 'Night Dragon', id: 'G0014', url: 'https://attack.mitre.org/groups/G0014' },
	G0015: { name: 'Taidoor', id: 'G0015', url: 'https://attack.mitre.org/groups/G0015' },
	G0016: { name: 'APT29', id: 'G0016', url: 'https://attack.mitre.org/groups/G0016' },
	G0017: { name: 'DragonOK', id: 'G0017', url: 'https://attack.mitre.org/groups/G0017' },
	G0018: { name: 'admin@338', id: 'G0018', url: 'https://attack.mitre.org/groups/G0018' },
	G0019: { name: 'Naikon', id: 'G0019', url: 'https://attack.mitre.org/groups/G0019' },
	G0020: { name: 'Equation', id: 'G0020', url: 'https://attack.mitre.org/groups/G0020' },
	G0021: { name: 'Molerats', id: 'G0021', url: 'https://attack.mitre.org/groups/G0021' },
	G0022: { name: 'APT3', id: 'G0022', url: 'https://attack.mitre.org/groups/G0022' },
	G0023: { name: 'APT16', id: 'G0023', url: 'https://attack.mitre.org/groups/G0023' },
	G0024: { name: 'Putter Panda', id: 'G0024', url: 'https://attack.mitre.org/groups/G0024' },
	G0025: { name: 'APT17', id: 'G0025', url: 'https://attack.mitre.org/groups/G0025' },
	G0026: { name: 'APT18', id: 'G0026', url: 'https://attack.mitre.org/groups/G0026' },
	G0027: { name: 'Threat Group-3390', id: 'G0027', url: 'https://attack.mitre.org/groups/G0027' },
	G0028: { name: 'Threat Group-1314', id: 'G0028', url: 'https://attack.mitre.org/groups/G0028' },
	G0029: { name: 'Scarlet Mimic', id: 'G0029', url: 'https://attack.mitre.org/groups/G0029' },
	G0030: { name: 'Lotus Blossom', id: 'G0030', url: 'https://attack.mitre.org/groups/G0030' },
	G0031: { name: 'Dust Storm', id: 'G0031', url: 'https://attack.mitre.org/groups/G0031' },
	G0032: { name: 'Lazarus Group', id: 'G0032', url: 'https://attack.mitre.org/groups/G0032' },
	G0033: { name: 'Poseidon Group', id: 'G0033', url: 'https://attack.mitre.org/groups/G0033' },
	G0034: { name: 'Sandworm Team', id: 'G0034', url: 'https://attack.mitre.org/groups/G0034' },
	G0035: { name: 'Dragonfly', id: 'G0035', url: 'https://attack.mitre.org/groups/G0035' },
	G0036: { name: 'GCMAN', id: 'G0036', url: 'https://attack.mitre.org/groups/G0036' },
	G0037: { name: 'FIN6', id: 'G0037', url: 'https://attack.mitre.org/groups/G0037' },
	G0038: { name: 'Stealth Falcon', id: 'G0038', url: 'https://attack.mitre.org/groups/G0038' },
	G0039: { name: 'Suckfly', id: 'G0039', url: 'https://attack.mitre.org/groups/G0039' },
	G0040: { name: 'Patchwork', id: 'G0040', url: 'https://attack.mitre.org/groups/G0040' },
	G0041: { name: 'Strider', id: 'G0041', url: 'https://attack.mitre.org/groups/G0041' },
	G0042: { name: 'MONSOON', id: 'G0042', url: 'https://attack.mitre.org/groups/G0042' },
	G0043: { name: 'Group5', id: 'G0043', url: 'https://attack.mitre.org/groups/G0043' },
	G0044: { name: 'Winnti Group', id: 'G0044', url: 'https://attack.mitre.org/groups/G0044' },
	G0045: { name: 'menuPass', id: 'G0045', url: 'https://attack.mitre.org/groups/G0045' },
	G0046: { name: 'FIN7', id: 'G0046', url: 'https://attack.mitre.org/groups/G0046' },
	G0047: { name: 'Gamaredon Group', id: 'G0047', url: 'https://attack.mitre.org/groups/G0047' },
	G0048: { name: 'RTM', id: 'G0048', url: 'https://attack.mitre.org/groups/G0048' },
	G0049: { name: 'OilRig', id: 'G0049', url: 'https://attack.mitre.org/groups/G0049' },
	G0050: { name: 'APT32', id: 'G0050', url: 'https://attack.mitre.org/groups/G0050' },
	G0051: { name: 'FIN10', id: 'G0051', url: 'https://attack.mitre.org/groups/G0051' },
	G0052: { name: 'CopyKittens', id: 'G0052', url: 'https://attack.mitre.org/groups/G0052' },
	G0053: { name: 'FIN5', id: 'G0053', url: 'https://attack.mitre.org/groups/G0053' },
	G0054: { name: 'Sowbug', id: 'G0054', url: 'https://attack.mitre.org/groups/G0054' },
	G0055: { name: 'NEODYMIUM', id: 'G0055', url: 'https://attack.mitre.org/groups/G0055' },
	G0056: { name: 'PROMETHIUM', id: 'G0056', url: 'https://attack.mitre.org/groups/G0056' },
	G0057: { name: 'APT34', id: 'G0057', url: 'https://attack.mitre.org/groups/G0057' },
	G0059: { name: 'Magic Hound', id: 'G0059', url: 'https://attack.mitre.org/groups/G0059' },
	G0060: { name: 'BRONZE BUTLER', id: 'G0060', url: 'https://attack.mitre.org/groups/G0060' },
	G0061: { name: 'FIN8', id: 'G0061', url: 'https://attack.mitre.org/groups/G0061' },
	G0062: { name: 'TA459', id: 'G0062', url: 'https://attack.mitre.org/groups/G0062' },
	G0063: { name: 'BlackOasis', id: 'G0063', url: 'https://attack.mitre.org/groups/G0063' },
	G0064: { name: 'APT33', id: 'G0064', url: 'https://attack.mitre.org/groups/G0064' },
	G0065: { name: 'Leviathan', id: 'G0065', url: 'https://attack.mitre.org/groups/G0065' },
	G0066: { name: 'Elderwood', id: 'G0066', url: 'https://attack.mitre.org/groups/G0066' },
	G0067: { name: 'APT37', id: 'G0067', url: 'https://attack.mitre.org/groups/G0067' },
	G0068: { name: 'PLATINUM', id: 'G0068', url: 'https://attack.mitre.org/groups/G0068' },
	G0069: { name: 'MuddyWater', id: 'G0069', url: 'https://attack.mitre.org/groups/G0069' },
	G0070: { name: 'Dark Caracal', id: 'G0070', url: 'https://attack.mitre.org/groups/G0070' },
	G0071: { name: 'Orangeworm', id: 'G0071', url: 'https://attack.mitre.org/groups/G0071' },
	G0072: { name: 'Honeybee', id: 'G0072', url: 'https://attack.mitre.org/groups/G0072' },
	G0073: { name: 'APT19', id: 'G0073', url: 'https://attack.mitre.org/groups/G0073' },
	G0074: { name: 'Dragonfly 2.0', id: 'G0074', url: 'https://attack.mitre.org/groups/G0074' },
	G0075: { name: 'Rancor', id: 'G0075', url: 'https://attack.mitre.org/groups/G0075' },
	G0076: { name: 'Thrip', id: 'G0076', url: 'https://attack.mitre.org/groups/G0076' },
	G0077: { name: 'Leafminer', id: 'G0077', url: 'https://attack.mitre.org/groups/G0077' },
	G0078: { name: 'Gorgon Group', id: 'G0078', url: 'https://attack.mitre.org/groups/G0078' },
	G0079: { name: 'DarkHydrus', id: 'G0079', url: 'https://attack.mitre.org/groups/G0079' },
	G0080: { name: 'Cobalt Group', id: 'G0080', url: 'https://attack.mitre.org/groups/G0080' },
	G0081: { name: 'Tropic Trooper', id: 'G0081', url: 'https://attack.mitre.org/groups/G0081' },
	G0082: { name: 'APT38', id: 'G0082', url: 'https://attack.mitre.org/groups/G0082' },
	G0083: { name: 'SilverTerrier', id: 'G0083', url: 'https://attack.mitre.org/groups/G0083' },
	G0084: { name: 'Gallmaker', id: 'G0084', url: 'https://attack.mitre.org/groups/G0084' },
	G0085: { name: 'FIN4', id: 'G0085', url: 'https://attack.mitre.org/groups/G0085' },
	G0086: { name: 'Stolen Pencil', id: 'G0086', url: 'https://attack.mitre.org/groups/G0086' },
	G0087: { name: 'APT39', id: 'G0087', url: 'https://attack.mitre.org/groups/G0087' },
	G0088: { name: 'TEMP.Veles', id: 'G0088', url: 'https://attack.mitre.org/groups/G0088' },
	G0089: { name: 'The White Company', id: 'G0089', url: 'https://attack.mitre.org/groups/G0089' },
	G0090: { name: 'WIRTE', id: 'G0090', url: 'https://attack.mitre.org/groups/G0090' },
	G0091: { name: 'Silence', id: 'G0091', url: 'https://attack.mitre.org/groups/G0091' },
	G0092: { name: 'TA505', id: 'G0092', url: 'https://attack.mitre.org/groups/G0092' },
	G0093: { name: 'GALLIUM', id: 'G0093', url: 'https://attack.mitre.org/groups/G0093' },
	G0094: { name: 'Kimsuky', id: 'G0094', url: 'https://attack.mitre.org/groups/G0094' },
	G0095: { name: 'Machete', id: 'G0095', url: 'https://attack.mitre.org/groups/G0095' },
	G0096: { name: 'APT41', id: 'G0096', url: 'https://attack.mitre.org/groups/G0096' },
	G0098: { name: 'BlackTech', id: 'G0098', url: 'https://attack.mitre.org/groups/G0098' },
	G0099: { name: 'APT-C-36', id: 'G0099', url: 'https://attack.mitre.org/groups/G0099' },
	G0100: { name: 'Inception', id: 'G0100', url: 'https://attack.mitre.org/groups/G0100' },
	G0101: { name: 'Frankenstein', id: 'G0101', url: 'https://attack.mitre.org/groups/G0101' },
	G0102: { name: 'Wizard Spider', id: 'G0102', url: 'https://attack.mitre.org/groups/G0102' },
	G0103: { name: 'Mofang', id: 'G0103', url: 'https://attack.mitre.org/groups/G0103' },
	G0104: { name: 'Sharpshooter', id: 'G0104', url: 'https://attack.mitre.org/groups/G0104' },
	G0105: { name: 'DarkVishnya', id: 'G0105', url: 'https://attack.mitre.org/groups/G0105' },
	G0106: { name: 'Rocke', id: 'G0106', url: 'https://attack.mitre.org/groups/G0106' },
	G0107: { name: 'Whitefly', id: 'G0107', url: 'https://attack.mitre.org/groups/G0107' },
	G0108: { name: 'Blue Mockingbird', id: 'G0108', url: 'https://attack.mitre.org/groups/G0108' },
	G0112: { name: 'Windshift', id: 'G0112', url: 'https://attack.mitre.org/groups/G0112' },
	G0114: { name: 'Chimera', id: 'G0114', url: 'https://attack.mitre.org/groups/G0114' },
	G0115: { name: 'GOLD SOUTHFIELD', id: 'G0115', url: 'https://attack.mitre.org/groups/G0115' },
	G0116: { name: 'Operation Wocao', id: 'G0116', url: 'https://attack.mitre.org/groups/G0116' },
	G0117: { name: 'Fox Kitten', id: 'G0117', url: 'https://attack.mitre.org/groups/G0117' },
	G0118: { name: 'UNC2452', id: 'G0118', url: 'https://attack.mitre.org/groups/G0118' },
	G0119: { name: 'Indrik Spider', id: 'G0119', url: 'https://attack.mitre.org/groups/G0119' },
	G0120: { name: 'Evilnum', id: 'G0120', url: 'https://attack.mitre.org/groups/G0120' },
	G0121: { name: 'Sidewinder', id: 'G0121', url: 'https://attack.mitre.org/groups/G0121' },
	G0122: { name: 'Silent Librarian', id: 'G0122', url: 'https://attack.mitre.org/groups/G0122' },
	G0123: { name: 'Volatile Cedar', id: 'G0123', url: 'https://attack.mitre.org/groups/G0123' },
	G0124: { name: 'Windigo', id: 'G0124', url: 'https://attack.mitre.org/groups/G0124' },
	G0125: { name: 'HAFNIUM', id: 'G0125', url: 'https://attack.mitre.org/groups/G0125' },
	G0126: { name: 'Higaisa', id: 'G0126', url: 'https://attack.mitre.org/groups/G0126' },
	G0127: { name: 'TA551', id: 'G0127', url: 'https://attack.mitre.org/groups/G0127' },
	G0128: { name: 'ZIRCONIUM', id: 'G0128', url: 'https://attack.mitre.org/groups/G0128' },
	G0129: { name: 'Mustang Panda', id: 'G0129', url: 'https://attack.mitre.org/groups/G0129' },
	G0130: { name: 'Ajax Security Team', id: 'G0130', url: 'https://attack.mitre.org/groups/G0130' },
	G0131: { name: 'Tonto Team', id: 'G0131', url: 'https://attack.mitre.org/groups/G0131' },
	G0132: { name: 'CostaRicto', id: 'G0132', url: 'https://attack.mitre.org/groups/G0132' },
	G0133: { name: 'Nomadic Octopus', id: 'G0133', url: 'https://attack.mitre.org/groups/G0133' },
	G0134: { name: 'Transparent Tribe', id: 'G0134', url: 'https://attack.mitre.org/groups/G0134' },
	G0135: { name: 'BackdoorDiplomacy', id: 'G0135', url: 'https://attack.mitre.org/groups/G0135' },
	G0136: { name: 'IndigoZebra', id: 'G0136', url: 'https://attack.mitre.org/groups/G0136' },
	G0137: { name: 'Ferocious Kitten', id: 'G0137', url: 'https://attack.mitre.org/groups/G0137' },
	G0138: { name: 'Andariel', id: 'G0138', url: 'https://attack.mitre.org/groups/G0138' },
	G0139: { name: 'TeamTNT', id: 'G0139', url: 'https://attack.mitre.org/groups/G0139' },
	G0140: { name: 'LazyScripter', id: 'G0140', url: 'https://attack.mitre.org/groups/G0140' },
	G0141: { name: 'Gelsemium', id: 'G0141', url: 'https://attack.mitre.org/groups/G0141' },
	G0142: { name: 'Confucius', id: 'G0142', url: 'https://attack.mitre.org/groups/G0142' },
	G0143: { name: 'Aquatic Panda', id: 'G0143', url: 'https://attack.mitre.org/groups/G0143' },
	G1001: { name: 'HEXANE', id: 'G1001', url: 'https://attack.mitre.org/groups/G1001' },
	G1002: { name: 'BITTER', id: 'G1002', url: 'https://attack.mitre.org/groups/G1002' },
	G1003: { name: 'Ember Bear', id: 'G1003', url: 'https://attack.mitre.org/groups/G1003' },
	G1004: { name: 'LAPSUS$', id: 'G1004', url: 'https://attack.mitre.org/groups/G1004' },
	G1005: { name: 'POLONIUM', id: 'G1005', url: 'https://attack.mitre.org/groups/G1005' },
	G1006: { name: 'Earth Lusca', id: 'G1006', url: 'https://attack.mitre.org/groups/G1006' },
	G1007: { name: 'Aoqin Dragon', id: 'G1007', url: 'https://attack.mitre.org/groups/G1007' },
	G1008: { name: 'SideCopy', id: 'G1008', url: 'https://attack.mitre.org/groups/G1008' },
	G1009: { name: 'Moses Staff', id: 'G1009', url: 'https://attack.mitre.org/groups/G1009' },
	G1011: { name: 'EXOTIC LILY', id: 'G1011', url: 'https://attack.mitre.org/groups/G1011' },
	M1013: { name: 'Application Developer Guidance', id: 'M1013', url: 'https://attack.mitre.org/mitigations/M1013' },
	M1015: { name: 'Active Directory Configuration', id: 'M1015', url: 'https://attack.mitre.org/mitigations/M1015' },
	M1016: { name: 'Vulnerability Scanning', id: 'M1016', url: 'https://attack.mitre.org/mitigations/M1016' },
	M1017: { name: 'User Training', id: 'M1017', url: 'https://attack.mitre.org/mitigations/M1017' },
	M1018: { name: 'User Account Management', id: 'M1018', url: 'https://attack.mitre.org/mitigations/M1018' },
	M1019: { name: 'Threat Intelligence Program', id: 'M1019', url: 'https://attack.mitre.org/mitigations/M1019' },
	M1020: { name: 'SSL/TLS Inspection', id: 'M1020', url: 'https://attack.mitre.org/mitigations/M1020' },
	M1021: { name: 'Restrict Web-Based Content', id: 'M1021', url: 'https://attack.mitre.org/mitigations/M1021' },
	M1022: {
		name: 'Restrict File and Directory Permissions',
		id: 'M1022',
		url: 'https://attack.mitre.org/mitigations/M1022',
	},
	M1024: { name: 'Restrict Registry Permissions', id: 'M1024', url: 'https://attack.mitre.org/mitigations/M1024' },
	M1025: { name: 'Privileged Process Integrity', id: 'M1025', url: 'https://attack.mitre.org/mitigations/M1025' },
	M1026: { name: 'Privileged Account Management', id: 'M1026', url: 'https://attack.mitre.org/mitigations/M1026' },
	M1027: { name: 'Password Policies', id: 'M1027', url: 'https://attack.mitre.org/mitigations/M1027' },
	M1028: { name: 'Operating System Configuration', id: 'M1028', url: 'https://attack.mitre.org/mitigations/M1028' },
	M1029: { name: 'Remote Data Storage', id: 'M1029', url: 'https://attack.mitre.org/mitigations/M1029' },
	M1030: { name: 'Network Segmentation', id: 'M1030', url: 'https://attack.mitre.org/mitigations/M1030' },
	M1031: { name: 'Network Intrusion Prevention', id: 'M1031', url: 'https://attack.mitre.org/mitigations/M1031' },
	M1032: { name: 'Multi-factor Authentication', id: 'M1032', url: 'https://attack.mitre.org/mitigations/M1032' },
	M1033: { name: 'Limit Software Installation', id: 'M1033', url: 'https://attack.mitre.org/mitigations/M1033' },
	M1034: { name: 'Limit Hardware Installation', id: 'M1034', url: 'https://attack.mitre.org/mitigations/M1034' },
	M1035: {
		name: 'Limit Access to Resource Over Network',
		id: 'M1035',
		url: 'https://attack.mitre.org/mitigations/M1035',
	},
	M1036: { name: 'Account Use Policies', id: 'M1036', url: 'https://attack.mitre.org/mitigations/M1036' },
	M1037: { name: 'Filter Network Traffic', id: 'M1037', url: 'https://attack.mitre.org/mitigations/M1037' },
	M1038: { name: 'Execution Prevention', id: 'M1038', url: 'https://attack.mitre.org/mitigations/M1038' },
	M1039: { name: 'Environment Variable Permissions', id: 'M1039', url: 'https://attack.mitre.org/mitigations/M1039' },
	M1040: { name: 'Behavior Prevention on Endpoint', id: 'M1040', url: 'https://attack.mitre.org/mitigations/M1040' },
	M1041: { name: 'Encrypt Sensitive Information', id: 'M1041', url: 'https://attack.mitre.org/mitigations/M1041' },
	M1042: {
		name: 'Disable or Remove Feature or Program',
		id: 'M1042',
		url: 'https://attack.mitre.org/mitigations/M1042',
	},
	M1043: { name: 'Credential Access Protection', id: 'M1043', url: 'https://attack.mitre.org/mitigations/M1043' },
	M1044: { name: 'Restrict Library Loading', id: 'M1044', url: 'https://attack.mitre.org/mitigations/M1044' },
	M1045: { name: 'Code Signing', id: 'M1045', url: 'https://attack.mitre.org/mitigations/M1045' },
	M1046: { name: 'Boot Integrity', id: 'M1046', url: 'https://attack.mitre.org/mitigations/M1046' },
	M1047: { name: 'Audit', id: 'M1047', url: 'https://attack.mitre.org/mitigations/M1047' },
	M1048: {
		name: 'Application Isolation and Sandboxing',
		id: 'M1048',
		url: 'https://attack.mitre.org/mitigations/M1048',
	},
	M1049: { name: 'Antivirus/Antimalware', id: 'M1049', url: 'https://attack.mitre.org/mitigations/M1049' },
	M1050: { name: 'Exploit Protection', id: 'M1050', url: 'https://attack.mitre.org/mitigations/M1050' },
	M1051: { name: 'Update Software', id: 'M1051', url: 'https://attack.mitre.org/mitigations/M1051' },
	M1052: { name: 'User Account Control', id: 'M1052', url: 'https://attack.mitre.org/mitigations/M1052' },
	M1053: { name: 'Data Backup', id: 'M1053', url: 'https://attack.mitre.org/mitigations/M1053' },
	M1054: { name: 'Software Configuration', id: 'M1054', url: 'https://attack.mitre.org/mitigations/M1054' },
	M1055: { name: 'Do Not Mitigate', id: 'M1055', url: 'https://attack.mitre.org/mitigations/M1055' },
	M1056: { name: 'Pre-compromise', id: 'M1056', url: 'https://attack.mitre.org/mitigations/M1056' },
	M1057: { name: 'Data Loss Prevention', id: 'M1057', url: 'https://attack.mitre.org/mitigations/M1057' },
	S0001: { name: 'Trojan.Mebromi', id: 'S0001', url: 'https://attack.mitre.org/software/S0001' },
	S0002: { name: 'Mimikatz', id: 'S0002', url: 'https://attack.mitre.org/software/S0002' },
	S0003: { name: 'RIPTIDE', id: 'S0003', url: 'https://attack.mitre.org/software/S0003' },
	S0004: { name: 'TinyZBot', id: 'S0004', url: 'https://attack.mitre.org/software/S0004' },
	S0005: { name: 'Windows Credential Editor', id: 'S0005', url: 'https://attack.mitre.org/software/S0005' },
	S0006: { name: 'pwdump', id: 'S0006', url: 'https://attack.mitre.org/software/S0006' },
	S0007: { name: 'Skeleton Key', id: 'S0007', url: 'https://attack.mitre.org/software/S0007' },
	S0008: { name: 'gsecdump', id: 'S0008', url: 'https://attack.mitre.org/software/S0008' },
	S0009: { name: 'Hikit', id: 'S0009', url: 'https://attack.mitre.org/software/S0009' },
	S0010: { name: 'Lurid', id: 'S0010', url: 'https://attack.mitre.org/software/S0010' },
	S0011: { name: 'Taidoor', id: 'S0011', url: 'https://attack.mitre.org/software/S0011' },
	S0012: { name: 'PoisonIvy', id: 'S0012', url: 'https://attack.mitre.org/software/S0012' },
	S0013: { name: 'PlugX', id: 'S0013', url: 'https://attack.mitre.org/software/S0013' },
	S0014: { name: 'BS2005', id: 'S0014', url: 'https://attack.mitre.org/software/S0014' },
	S0015: { name: 'Ixeshe', id: 'S0015', url: 'https://attack.mitre.org/software/S0015' },
	S0016: { name: 'P2P ZeuS', id: 'S0016', url: 'https://attack.mitre.org/software/S0016' },
	S0017: { name: 'BISCUIT', id: 'S0017', url: 'https://attack.mitre.org/software/S0017' },
	S0018: { name: 'Sykipot', id: 'S0018', url: 'https://attack.mitre.org/software/S0018' },
	S0019: { name: 'Regin', id: 'S0019', url: 'https://attack.mitre.org/software/S0019' },
	S0020: { name: 'China Chopper', id: 'S0020', url: 'https://attack.mitre.org/software/S0020' },
	S0021: { name: 'Derusbi', id: 'S0021', url: 'https://attack.mitre.org/software/S0021' },
	S0022: { name: 'Uroburos', id: 'S0022', url: 'https://attack.mitre.org/software/S0022' },
	S0023: { name: 'CHOPSTICK', id: 'S0023', url: 'https://attack.mitre.org/software/S0023' },
	S0024: { name: 'Dyre', id: 'S0024', url: 'https://attack.mitre.org/software/S0024' },
	S0025: { name: 'CALENDAR', id: 'S0025', url: 'https://attack.mitre.org/software/S0025' },
	S0026: { name: 'GLOOXMAIL', id: 'S0026', url: 'https://attack.mitre.org/software/S0026' },
	S0027: { name: 'Zeroaccess', id: 'S0027', url: 'https://attack.mitre.org/software/S0027' },
	S0028: { name: 'SHIPSHAPE', id: 'S0028', url: 'https://attack.mitre.org/software/S0028' },
	S0029: { name: 'PsExec', id: 'S0029', url: 'https://attack.mitre.org/software/S0029' },
	S0030: { name: 'Carbanak', id: 'S0030', url: 'https://attack.mitre.org/software/S0030' },
	S0031: { name: 'BACKSPACE', id: 'S0031', url: 'https://attack.mitre.org/software/S0031' },
	S0032: { name: 'gh0st RAT', id: 'S0032', url: 'https://attack.mitre.org/software/S0032' },
	S0033: { name: 'NetTraveler', id: 'S0033', url: 'https://attack.mitre.org/software/S0033' },
	S0034: { name: 'NETEAGLE', id: 'S0034', url: 'https://attack.mitre.org/software/S0034' },
	S0035: { name: 'SPACESHIP', id: 'S0035', url: 'https://attack.mitre.org/software/S0035' },
	S0036: { name: 'FLASHFLOOD', id: 'S0036', url: 'https://attack.mitre.org/software/S0036' },
	S0037: { name: 'HAMMERTOSS', id: 'S0037', url: 'https://attack.mitre.org/software/S0037' },
	S0038: { name: 'Duqu', id: 'S0038', url: 'https://attack.mitre.org/software/S0038' },
	S0039: { name: 'Net', id: 'S0039', url: 'https://attack.mitre.org/software/S0039' },
	S0040: { name: 'HTRAN', id: 'S0040', url: 'https://attack.mitre.org/software/S0040' },
	S0041: { name: 'Wiper', id: 'S0041', url: 'https://attack.mitre.org/software/S0041' },
	S0042: { name: 'LOWBALL', id: 'S0042', url: 'https://attack.mitre.org/software/S0042' },
	S0043: { name: 'BUBBLEWRAP', id: 'S0043', url: 'https://attack.mitre.org/software/S0043' },
	S0044: { name: 'JHUHUGIT', id: 'S0044', url: 'https://attack.mitre.org/software/S0044' },
	S0045: { name: 'ADVSTORESHELL', id: 'S0045', url: 'https://attack.mitre.org/software/S0045' },
	S0046: { name: 'CozyCar', id: 'S0046', url: 'https://attack.mitre.org/software/S0046' },
	S0047: { name: 'Hacking Team UEFI Rootkit', id: 'S0047', url: 'https://attack.mitre.org/software/S0047' },
	S0048: { name: 'PinchDuke', id: 'S0048', url: 'https://attack.mitre.org/software/S0048' },
	S0049: { name: 'GeminiDuke', id: 'S0049', url: 'https://attack.mitre.org/software/S0049' },
	S0050: { name: 'CosmicDuke', id: 'S0050', url: 'https://attack.mitre.org/software/S0050' },
	S0051: { name: 'MiniDuke', id: 'S0051', url: 'https://attack.mitre.org/software/S0051' },
	S0052: { name: 'OnionDuke', id: 'S0052', url: 'https://attack.mitre.org/software/S0052' },
	S0053: { name: 'SeaDuke', id: 'S0053', url: 'https://attack.mitre.org/software/S0053' },
	S0054: { name: 'CloudDuke', id: 'S0054', url: 'https://attack.mitre.org/software/S0054' },
	S0055: { name: 'RARSTONE', id: 'S0055', url: 'https://attack.mitre.org/software/S0055' },
	S0056: { name: 'Net Crawler', id: 'S0056', url: 'https://attack.mitre.org/software/S0056' },
	S0057: { name: 'Tasklist', id: 'S0057', url: 'https://attack.mitre.org/software/S0057' },
	S0058: { name: 'SslMM', id: 'S0058', url: 'https://attack.mitre.org/software/S0058' },
	S0059: { name: 'WinMM', id: 'S0059', url: 'https://attack.mitre.org/software/S0059' },
	S0060: { name: 'Sys10', id: 'S0060', url: 'https://attack.mitre.org/software/S0060' },
	S0061: { name: 'HDoor', id: 'S0061', url: 'https://attack.mitre.org/software/S0061' },
	S0062: { name: 'DustySky', id: 'S0062', url: 'https://attack.mitre.org/software/S0062' },
	S0063: { name: 'SHOTPUT', id: 'S0063', url: 'https://attack.mitre.org/software/S0063' },
	S0064: { name: 'ELMER', id: 'S0064', url: 'https://attack.mitre.org/software/S0064' },
	S0065: { name: '4H RAT', id: 'S0065', url: 'https://attack.mitre.org/software/S0065' },
	S0066: { name: '3PARA RAT', id: 'S0066', url: 'https://attack.mitre.org/software/S0066' },
	S0067: { name: 'pngdowner', id: 'S0067', url: 'https://attack.mitre.org/software/S0067' },
	S0068: { name: 'httpclient', id: 'S0068', url: 'https://attack.mitre.org/software/S0068' },
	S0069: { name: 'BLACKCOFFEE', id: 'S0069', url: 'https://attack.mitre.org/software/S0069' },
	S0070: { name: 'HTTPBrowser', id: 'S0070', url: 'https://attack.mitre.org/software/S0070' },
	S0071: { name: 'hcdLoader', id: 'S0071', url: 'https://attack.mitre.org/software/S0071' },
	S0072: { name: 'OwaAuth', id: 'S0072', url: 'https://attack.mitre.org/software/S0072' },
	S0073: { name: 'ASPXSpy', id: 'S0073', url: 'https://attack.mitre.org/software/S0073' },
	S0074: { name: 'Sakula', id: 'S0074', url: 'https://attack.mitre.org/software/S0074' },
	S0075: { name: 'Reg', id: 'S0075', url: 'https://attack.mitre.org/software/S0075' },
	S0076: { name: 'FakeM', id: 'S0076', url: 'https://attack.mitre.org/software/S0076' },
	S0077: { name: 'CallMe', id: 'S0077', url: 'https://attack.mitre.org/software/S0077' },
	S0078: { name: 'Psylo', id: 'S0078', url: 'https://attack.mitre.org/software/S0078' },
	S0079: { name: 'MobileOrder', id: 'S0079', url: 'https://attack.mitre.org/software/S0079' },
	S0080: { name: 'Mivast', id: 'S0080', url: 'https://attack.mitre.org/software/S0080' },
	S0081: { name: 'Elise', id: 'S0081', url: 'https://attack.mitre.org/software/S0081' },
	S0082: { name: 'Emissary', id: 'S0082', url: 'https://attack.mitre.org/software/S0082' },
	S0083: { name: 'Misdat', id: 'S0083', url: 'https://attack.mitre.org/software/S0083' },
	S0084: { name: 'Mis-Type', id: 'S0084', url: 'https://attack.mitre.org/software/S0084' },
	S0085: { name: 'S-Type', id: 'S0085', url: 'https://attack.mitre.org/software/S0085' },
	S0086: { name: 'ZLib', id: 'S0086', url: 'https://attack.mitre.org/software/S0086' },
	S0087: { name: 'Hi-Zor', id: 'S0087', url: 'https://attack.mitre.org/software/S0087' },
	S0088: { name: 'Kasidet', id: 'S0088', url: 'https://attack.mitre.org/software/S0088' },
	S0089: { name: 'BlackEnergy', id: 'S0089', url: 'https://attack.mitre.org/software/S0089' },
	S0090: { name: 'Rover', id: 'S0090', url: 'https://attack.mitre.org/software/S0090' },
	S0091: { name: 'Epic', id: 'S0091', url: 'https://attack.mitre.org/software/S0091' },
	S0092: { name: 'Agent.btz', id: 'S0092', url: 'https://attack.mitre.org/software/S0092' },
	S0093: { name: 'Backdoor.Oldrea', id: 'S0093', url: 'https://attack.mitre.org/software/S0093' },
	S0094: { name: 'Trojan.Karagany', id: 'S0094', url: 'https://attack.mitre.org/software/S0094' },
	S0095: { name: 'ftp', id: 'S0095', url: 'https://attack.mitre.org/software/S0095' },
	S0096: { name: 'Systeminfo', id: 'S0096', url: 'https://attack.mitre.org/software/S0096' },
	S0097: { name: 'Ping', id: 'S0097', url: 'https://attack.mitre.org/software/S0097' },
	S0098: { name: 'T9000', id: 'S0098', url: 'https://attack.mitre.org/software/S0098' },
	S0099: { name: 'Arp', id: 'S0099', url: 'https://attack.mitre.org/software/S0099' },
	S0100: { name: 'ipconfig', id: 'S0100', url: 'https://attack.mitre.org/software/S0100' },
	S0101: { name: 'ifconfig', id: 'S0101', url: 'https://attack.mitre.org/software/S0101' },
	S0102: { name: 'nbtstat', id: 'S0102', url: 'https://attack.mitre.org/software/S0102' },
	S0103: { name: 'route', id: 'S0103', url: 'https://attack.mitre.org/software/S0103' },
	S0104: { name: 'netstat', id: 'S0104', url: 'https://attack.mitre.org/software/S0104' },
	S0105: { name: 'dsquery', id: 'S0105', url: 'https://attack.mitre.org/software/S0105' },
	S0106: { name: 'cmd', id: 'S0106', url: 'https://attack.mitre.org/software/S0106' },
	S0107: { name: 'Cherry Picker', id: 'S0107', url: 'https://attack.mitre.org/software/S0107' },
	S0108: { name: 'netsh', id: 'S0108', url: 'https://attack.mitre.org/software/S0108' },
	S0109: { name: 'WEBC2', id: 'S0109', url: 'https://attack.mitre.org/software/S0109' },
	S0110: { name: 'at', id: 'S0110', url: 'https://attack.mitre.org/software/S0110' },
	S0111: { name: 'schtasks', id: 'S0111', url: 'https://attack.mitre.org/software/S0111' },
	S0112: { name: 'ROCKBOOT', id: 'S0112', url: 'https://attack.mitre.org/software/S0112' },
	S0113: { name: 'Prikormka', id: 'S0113', url: 'https://attack.mitre.org/software/S0113' },
	S0114: { name: 'BOOTRASH', id: 'S0114', url: 'https://attack.mitre.org/software/S0114' },
	S0115: { name: 'Crimson', id: 'S0115', url: 'https://attack.mitre.org/software/S0115' },
	S0116: { name: 'UACMe', id: 'S0116', url: 'https://attack.mitre.org/software/S0116' },
	S0117: { name: 'XTunnel', id: 'S0117', url: 'https://attack.mitre.org/software/S0117' },
	S0118: { name: 'Nidiran', id: 'S0118', url: 'https://attack.mitre.org/software/S0118' },
	S0119: { name: 'Cachedump', id: 'S0119', url: 'https://attack.mitre.org/software/S0119' },
	S0120: { name: 'Fgdump', id: 'S0120', url: 'https://attack.mitre.org/software/S0120' },
	S0121: { name: 'Lslsass', id: 'S0121', url: 'https://attack.mitre.org/software/S0121' },
	S0122: { name: 'Pass-The-Hash Toolkit', id: 'S0122', url: 'https://attack.mitre.org/software/S0122' },
	S0123: { name: 'xCmd', id: 'S0123', url: 'https://attack.mitre.org/software/S0123' },
	S0124: { name: 'Pisloader', id: 'S0124', url: 'https://attack.mitre.org/software/S0124' },
	S0125: { name: 'Remsec', id: 'S0125', url: 'https://attack.mitre.org/software/S0125' },
	S0126: { name: 'ComRAT', id: 'S0126', url: 'https://attack.mitre.org/software/S0126' },
	S0127: { name: 'BBSRAT', id: 'S0127', url: 'https://attack.mitre.org/software/S0127' },
	S0128: { name: 'BADNEWS', id: 'S0128', url: 'https://attack.mitre.org/software/S0128' },
	S0129: { name: 'AutoIt backdoor', id: 'S0129', url: 'https://attack.mitre.org/software/S0129' },
	S0130: { name: 'Unknown Logger', id: 'S0130', url: 'https://attack.mitre.org/software/S0130' },
	S0131: { name: 'TINYTYPHON', id: 'S0131', url: 'https://attack.mitre.org/software/S0131' },
	S0132: { name: 'H1N1', id: 'S0132', url: 'https://attack.mitre.org/software/S0132' },
	S0133: { name: 'Miner-C', id: 'S0133', url: 'https://attack.mitre.org/software/S0133' },
	S0134: { name: 'Downdelph', id: 'S0134', url: 'https://attack.mitre.org/software/S0134' },
	S0135: { name: 'HIDEDRV', id: 'S0135', url: 'https://attack.mitre.org/software/S0135' },
	S0136: { name: 'USBStealer', id: 'S0136', url: 'https://attack.mitre.org/software/S0136' },
	S0137: { name: 'CORESHELL', id: 'S0137', url: 'https://attack.mitre.org/software/S0137' },
	S0138: { name: 'OLDBAIT', id: 'S0138', url: 'https://attack.mitre.org/software/S0138' },
	S0139: { name: 'PowerDuke', id: 'S0139', url: 'https://attack.mitre.org/software/S0139' },
	S0140: { name: 'Shamoon', id: 'S0140', url: 'https://attack.mitre.org/software/S0140' },
	S0141: { name: 'Winnti for Windows', id: 'S0141', url: 'https://attack.mitre.org/software/S0141' },
	S0142: { name: 'StreamEx', id: 'S0142', url: 'https://attack.mitre.org/software/S0142' },
	S0143: { name: 'Flame', id: 'S0143', url: 'https://attack.mitre.org/software/S0143' },
	S0144: { name: 'ChChes', id: 'S0144', url: 'https://attack.mitre.org/software/S0144' },
	S0145: { name: 'POWERSOURCE', id: 'S0145', url: 'https://attack.mitre.org/software/S0145' },
	S0146: { name: 'TEXTMATE', id: 'S0146', url: 'https://attack.mitre.org/software/S0146' },
	S0147: { name: 'Pteranodon', id: 'S0147', url: 'https://attack.mitre.org/software/S0147' },
	S0148: { name: 'RTM', id: 'S0148', url: 'https://attack.mitre.org/software/S0148' },
	S0149: { name: 'MoonWind', id: 'S0149', url: 'https://attack.mitre.org/software/S0149' },
	S0150: { name: 'POSHSPY', id: 'S0150', url: 'https://attack.mitre.org/software/S0150' },
	S0151: { name: 'HALFBAKED', id: 'S0151', url: 'https://attack.mitre.org/software/S0151' },
	S0152: { name: 'EvilGrab', id: 'S0152', url: 'https://attack.mitre.org/software/S0152' },
	S0153: { name: 'RedLeaves', id: 'S0153', url: 'https://attack.mitre.org/software/S0153' },
	S0154: { name: 'Cobalt Strike', id: 'S0154', url: 'https://attack.mitre.org/software/S0154' },
	S0155: { name: 'WINDSHIELD', id: 'S0155', url: 'https://attack.mitre.org/software/S0155' },
	S0156: { name: 'KOMPROGO', id: 'S0156', url: 'https://attack.mitre.org/software/S0156' },
	S0157: { name: 'SOUNDBITE', id: 'S0157', url: 'https://attack.mitre.org/software/S0157' },
	S0158: { name: 'PHOREAL', id: 'S0158', url: 'https://attack.mitre.org/software/S0158' },
	S0159: { name: 'SNUGRIDE', id: 'S0159', url: 'https://attack.mitre.org/software/S0159' },
	S0160: { name: 'certutil', id: 'S0160', url: 'https://attack.mitre.org/software/S0160' },
	S0161: { name: 'XAgentOSX', id: 'S0161', url: 'https://attack.mitre.org/software/S0161' },
	S0162: { name: 'Komplex', id: 'S0162', url: 'https://attack.mitre.org/software/S0162' },
	S0163: { name: 'Janicab', id: 'S0163', url: 'https://attack.mitre.org/software/S0163' },
	S0164: { name: 'TDTESS', id: 'S0164', url: 'https://attack.mitre.org/software/S0164' },
	S0165: { name: 'OSInfo', id: 'S0165', url: 'https://attack.mitre.org/software/S0165' },
	S0166: { name: 'RemoteCMD', id: 'S0166', url: 'https://attack.mitre.org/software/S0166' },
	S0167: { name: 'Matryoshka', id: 'S0167', url: 'https://attack.mitre.org/software/S0167' },
	S0168: { name: 'Gazer', id: 'S0168', url: 'https://attack.mitre.org/software/S0168' },
	S0169: { name: 'RawPOS', id: 'S0169', url: 'https://attack.mitre.org/software/S0169' },
	S0170: { name: 'Helminth', id: 'S0170', url: 'https://attack.mitre.org/software/S0170' },
	S0171: { name: 'Felismus', id: 'S0171', url: 'https://attack.mitre.org/software/S0171' },
	S0172: { name: 'Reaver', id: 'S0172', url: 'https://attack.mitre.org/software/S0172' },
	S0173: { name: 'FLIPSIDE', id: 'S0173', url: 'https://attack.mitre.org/software/S0173' },
	S0174: { name: 'Responder', id: 'S0174', url: 'https://attack.mitre.org/software/S0174' },
	S0175: { name: 'meek', id: 'S0175', url: 'https://attack.mitre.org/software/S0175' },
	S0176: { name: 'Wingbird', id: 'S0176', url: 'https://attack.mitre.org/software/S0176' },
	S0177: { name: 'Power Loader', id: 'S0177', url: 'https://attack.mitre.org/software/S0177' },
	S0178: { name: 'Truvasys', id: 'S0178', url: 'https://attack.mitre.org/software/S0178' },
	S0179: { name: 'MimiPenguin', id: 'S0179', url: 'https://attack.mitre.org/software/S0179' },
	S0180: { name: 'Volgmer', id: 'S0180', url: 'https://attack.mitre.org/software/S0180' },
	S0181: { name: 'FALLCHILL', id: 'S0181', url: 'https://attack.mitre.org/software/S0181' },
	S0182: { name: 'FinFisher', id: 'S0182', url: 'https://attack.mitre.org/software/S0182' },
	S0183: { name: 'Tor', id: 'S0183', url: 'https://attack.mitre.org/software/S0183' },
	S0184: { name: 'POWRUNER', id: 'S0184', url: 'https://attack.mitre.org/software/S0184' },
	S0185: { name: 'SEASHARPEE', id: 'S0185', url: 'https://attack.mitre.org/software/S0185' },
	S0186: { name: 'DownPaper', id: 'S0186', url: 'https://attack.mitre.org/software/S0186' },
	S0187: { name: 'Daserf', id: 'S0187', url: 'https://attack.mitre.org/software/S0187' },
	S0188: { name: 'Starloader', id: 'S0188', url: 'https://attack.mitre.org/software/S0188' },
	S0189: { name: 'ISMInjector', id: 'S0189', url: 'https://attack.mitre.org/software/S0189' },
	S0190: { name: 'BITSAdmin', id: 'S0190', url: 'https://attack.mitre.org/software/S0190' },
	S0191: { name: 'Winexe', id: 'S0191', url: 'https://attack.mitre.org/software/S0191' },
	S0192: { name: 'Pupy', id: 'S0192', url: 'https://attack.mitre.org/software/S0192' },
	S0193: { name: 'Forfiles', id: 'S0193', url: 'https://attack.mitre.org/software/S0193' },
	S0194: { name: 'PowerSploit', id: 'S0194', url: 'https://attack.mitre.org/software/S0194' },
	S0195: { name: 'SDelete', id: 'S0195', url: 'https://attack.mitre.org/software/S0195' },
	S0196: { name: 'PUNCHBUGGY', id: 'S0196', url: 'https://attack.mitre.org/software/S0196' },
	S0197: { name: 'PUNCHTRACK', id: 'S0197', url: 'https://attack.mitre.org/software/S0197' },
	S0198: { name: 'NETWIRE', id: 'S0198', url: 'https://attack.mitre.org/software/S0198' },
	S0199: { name: 'TURNEDUP', id: 'S0199', url: 'https://attack.mitre.org/software/S0199' },
	S0200: { name: 'Dipsind', id: 'S0200', url: 'https://attack.mitre.org/software/S0200' },
	S0201: { name: 'JPIN', id: 'S0201', url: 'https://attack.mitre.org/software/S0201' },
	S0202: { name: 'adbupd', id: 'S0202', url: 'https://attack.mitre.org/software/S0202' },
	S0203: { name: 'Hydraq', id: 'S0203', url: 'https://attack.mitre.org/software/S0203' },
	S0204: { name: 'Briba', id: 'S0204', url: 'https://attack.mitre.org/software/S0204' },
	S0205: { name: 'Naid', id: 'S0205', url: 'https://attack.mitre.org/software/S0205' },
	S0206: { name: 'Wiarp', id: 'S0206', url: 'https://attack.mitre.org/software/S0206' },
	S0207: { name: 'Vasport', id: 'S0207', url: 'https://attack.mitre.org/software/S0207' },
	S0208: { name: 'Pasam', id: 'S0208', url: 'https://attack.mitre.org/software/S0208' },
	S0209: { name: 'Darkmoon', id: 'S0209', url: 'https://attack.mitre.org/software/S0209' },
	S0210: { name: 'Nerex', id: 'S0210', url: 'https://attack.mitre.org/software/S0210' },
	S0211: { name: 'Linfo', id: 'S0211', url: 'https://attack.mitre.org/software/S0211' },
	S0212: { name: 'CORALDECK', id: 'S0212', url: 'https://attack.mitre.org/software/S0212' },
	S0213: { name: 'DOGCALL', id: 'S0213', url: 'https://attack.mitre.org/software/S0213' },
	S0214: { name: 'HAPPYWORK', id: 'S0214', url: 'https://attack.mitre.org/software/S0214' },
	S0215: { name: 'KARAE', id: 'S0215', url: 'https://attack.mitre.org/software/S0215' },
	S0216: { name: 'POORAIM', id: 'S0216', url: 'https://attack.mitre.org/software/S0216' },
	S0217: { name: 'SHUTTERSPEED', id: 'S0217', url: 'https://attack.mitre.org/software/S0217' },
	S0218: { name: 'SLOWDRIFT', id: 'S0218', url: 'https://attack.mitre.org/software/S0218' },
	S0219: { name: 'WINERACK', id: 'S0219', url: 'https://attack.mitre.org/software/S0219' },
	S0220: { name: 'Chaos', id: 'S0220', url: 'https://attack.mitre.org/software/S0220' },
	S0221: { name: 'Umbreon', id: 'S0221', url: 'https://attack.mitre.org/software/S0221' },
	S0222: { name: 'CCBkdr', id: 'S0222', url: 'https://attack.mitre.org/software/S0222' },
	S0223: { name: 'POWERSTATS', id: 'S0223', url: 'https://attack.mitre.org/software/S0223' },
	S0224: { name: 'Havij', id: 'S0224', url: 'https://attack.mitre.org/software/S0224' },
	S0225: { name: 'sqlmap', id: 'S0225', url: 'https://attack.mitre.org/software/S0225' },
	S0226: { name: 'Smoke Loader', id: 'S0226', url: 'https://attack.mitre.org/software/S0226' },
	S0227: { name: 'spwebmember', id: 'S0227', url: 'https://attack.mitre.org/software/S0227' },
	S0228: { name: 'NanHaiShu', id: 'S0228', url: 'https://attack.mitre.org/software/S0228' },
	S0229: { name: 'Orz', id: 'S0229', url: 'https://attack.mitre.org/software/S0229' },
	S0230: { name: 'ZeroT', id: 'S0230', url: 'https://attack.mitre.org/software/S0230' },
	S0231: { name: 'Invoke-PSImage', id: 'S0231', url: 'https://attack.mitre.org/software/S0231' },
	S0232: { name: 'HOMEFRY', id: 'S0232', url: 'https://attack.mitre.org/software/S0232' },
	S0233: { name: 'MURKYTOP', id: 'S0233', url: 'https://attack.mitre.org/software/S0233' },
	S0234: { name: 'Bandook', id: 'S0234', url: 'https://attack.mitre.org/software/S0234' },
	S0235: { name: 'CrossRAT', id: 'S0235', url: 'https://attack.mitre.org/software/S0235' },
	S0236: { name: 'Kwampirs', id: 'S0236', url: 'https://attack.mitre.org/software/S0236' },
	S0237: { name: 'GravityRAT', id: 'S0237', url: 'https://attack.mitre.org/software/S0237' },
	S0238: { name: 'Proxysvc', id: 'S0238', url: 'https://attack.mitre.org/software/S0238' },
	S0239: { name: 'Bankshot', id: 'S0239', url: 'https://attack.mitre.org/software/S0239' },
	S0240: { name: 'ROKRAT', id: 'S0240', url: 'https://attack.mitre.org/software/S0240' },
	S0241: { name: 'RATANKBA', id: 'S0241', url: 'https://attack.mitre.org/software/S0241' },
	S0242: { name: 'SynAck', id: 'S0242', url: 'https://attack.mitre.org/software/S0242' },
	S0243: { name: 'DealersChoice', id: 'S0243', url: 'https://attack.mitre.org/software/S0243' },
	S0244: { name: 'Comnie', id: 'S0244', url: 'https://attack.mitre.org/software/S0244' },
	S0245: { name: 'BADCALL', id: 'S0245', url: 'https://attack.mitre.org/software/S0245' },
	S0246: { name: 'HARDRAIN', id: 'S0246', url: 'https://attack.mitre.org/software/S0246' },
	S0247: { name: 'NavRAT', id: 'S0247', url: 'https://attack.mitre.org/software/S0247' },
	S0248: { name: 'yty', id: 'S0248', url: 'https://attack.mitre.org/software/S0248' },
	S0249: { name: 'Gold Dragon', id: 'S0249', url: 'https://attack.mitre.org/software/S0249' },
	S0250: { name: 'Koadic', id: 'S0250', url: 'https://attack.mitre.org/software/S0250' },
	S0251: { name: 'Zebrocy', id: 'S0251', url: 'https://attack.mitre.org/software/S0251' },
	S0252: { name: 'Brave Prince', id: 'S0252', url: 'https://attack.mitre.org/software/S0252' },
	S0253: { name: 'RunningRAT', id: 'S0253', url: 'https://attack.mitre.org/software/S0253' },
	S0254: { name: 'PLAINTEE', id: 'S0254', url: 'https://attack.mitre.org/software/S0254' },
	S0255: { name: 'DDKONG', id: 'S0255', url: 'https://attack.mitre.org/software/S0255' },
	S0256: { name: 'Mosquito', id: 'S0256', url: 'https://attack.mitre.org/software/S0256' },
	S0257: { name: 'VERMIN', id: 'S0257', url: 'https://attack.mitre.org/software/S0257' },
	S0258: { name: 'RGDoor', id: 'S0258', url: 'https://attack.mitre.org/software/S0258' },
	S0259: { name: 'InnaputRAT', id: 'S0259', url: 'https://attack.mitre.org/software/S0259' },
	S0260: { name: 'InvisiMole', id: 'S0260', url: 'https://attack.mitre.org/software/S0260' },
	S0261: { name: 'Catchamas', id: 'S0261', url: 'https://attack.mitre.org/software/S0261' },
	S0262: { name: 'QuasarRAT', id: 'S0262', url: 'https://attack.mitre.org/software/S0262' },
	S0263: { name: 'TYPEFRAME', id: 'S0263', url: 'https://attack.mitre.org/software/S0263' },
	S0264: { name: 'OopsIE', id: 'S0264', url: 'https://attack.mitre.org/software/S0264' },
	S0265: { name: 'Kazuar', id: 'S0265', url: 'https://attack.mitre.org/software/S0265' },
	S0266: { name: 'TrickBot', id: 'S0266', url: 'https://attack.mitre.org/software/S0266' },
	S0267: { name: 'FELIXROOT', id: 'S0267', url: 'https://attack.mitre.org/software/S0267' },
	S0268: { name: 'Bisonal', id: 'S0268', url: 'https://attack.mitre.org/software/S0268' },
	S0269: { name: 'QUADAGENT', id: 'S0269', url: 'https://attack.mitre.org/software/S0269' },
	S0270: { name: 'RogueRobin', id: 'S0270', url: 'https://attack.mitre.org/software/S0270' },
	S0271: { name: 'KEYMARBLE', id: 'S0271', url: 'https://attack.mitre.org/software/S0271' },
	S0272: { name: 'NDiskMonitor', id: 'S0272', url: 'https://attack.mitre.org/software/S0272' },
	S0273: { name: 'Socksbot', id: 'S0273', url: 'https://attack.mitre.org/software/S0273' },
	S0274: { name: 'Calisto', id: 'S0274', url: 'https://attack.mitre.org/software/S0274' },
	S0275: { name: 'UPPERCUT', id: 'S0275', url: 'https://attack.mitre.org/software/S0275' },
	S0276: { name: 'Keydnap', id: 'S0276', url: 'https://attack.mitre.org/software/S0276' },
	S0277: { name: 'FruitFly', id: 'S0277', url: 'https://attack.mitre.org/software/S0277' },
	S0278: { name: 'iKitten', id: 'S0278', url: 'https://attack.mitre.org/software/S0278' },
	S0279: { name: 'Proton', id: 'S0279', url: 'https://attack.mitre.org/software/S0279' },
	S0280: { name: 'MirageFox', id: 'S0280', url: 'https://attack.mitre.org/software/S0280' },
	S0281: { name: 'Dok', id: 'S0281', url: 'https://attack.mitre.org/software/S0281' },
	S0282: { name: 'MacSpy', id: 'S0282', url: 'https://attack.mitre.org/software/S0282' },
	S0283: { name: 'jRAT', id: 'S0283', url: 'https://attack.mitre.org/software/S0283' },
	S0284: { name: 'More_eggs', id: 'S0284', url: 'https://attack.mitre.org/software/S0284' },
	S0330: { name: 'Zeus Panda', id: 'S0330', url: 'https://attack.mitre.org/software/S0330' },
	S0331: { name: 'Agent Tesla', id: 'S0331', url: 'https://attack.mitre.org/software/S0331' },
	S0332: { name: 'Remcos', id: 'S0332', url: 'https://attack.mitre.org/software/S0332' },
	S0333: { name: 'UBoatRAT', id: 'S0333', url: 'https://attack.mitre.org/software/S0333' },
	S0334: { name: 'DarkComet', id: 'S0334', url: 'https://attack.mitre.org/software/S0334' },
	S0335: { name: 'Carbon', id: 'S0335', url: 'https://attack.mitre.org/software/S0335' },
	S0336: { name: 'NanoCore', id: 'S0336', url: 'https://attack.mitre.org/software/S0336' },
	S0337: { name: 'BadPatch', id: 'S0337', url: 'https://attack.mitre.org/software/S0337' },
	S0338: { name: 'Cobian RAT', id: 'S0338', url: 'https://attack.mitre.org/software/S0338' },
	S0339: { name: 'Micropsia', id: 'S0339', url: 'https://attack.mitre.org/software/S0339' },
	S0340: { name: 'Octopus', id: 'S0340', url: 'https://attack.mitre.org/software/S0340' },
	S0341: { name: 'Xbash', id: 'S0341', url: 'https://attack.mitre.org/software/S0341' },
	S0342: { name: 'GreyEnergy', id: 'S0342', url: 'https://attack.mitre.org/software/S0342' },
	S0343: { name: 'Exaramel for Windows', id: 'S0343', url: 'https://attack.mitre.org/software/S0343' },
	S0344: { name: 'Azorult', id: 'S0344', url: 'https://attack.mitre.org/software/S0344' },
	S0345: { name: 'Seasalt', id: 'S0345', url: 'https://attack.mitre.org/software/S0345' },
	S0346: { name: 'OceanSalt', id: 'S0346', url: 'https://attack.mitre.org/software/S0346' },
	S0347: { name: 'AuditCred', id: 'S0347', url: 'https://attack.mitre.org/software/S0347' },
	S0348: { name: 'Cardinal RAT', id: 'S0348', url: 'https://attack.mitre.org/software/S0348' },
	S0349: { name: 'LaZagne', id: 'S0349', url: 'https://attack.mitre.org/software/S0349' },
	S0350: { name: 'zwShell', id: 'S0350', url: 'https://attack.mitre.org/software/S0350' },
	S0351: { name: 'Cannon', id: 'S0351', url: 'https://attack.mitre.org/software/S0351' },
	S0352: { name: 'OSX_OCEANLOTUS.D', id: 'S0352', url: 'https://attack.mitre.org/software/S0352' },
	S0353: { name: 'NOKKI', id: 'S0353', url: 'https://attack.mitre.org/software/S0353' },
	S0354: { name: 'Denis', id: 'S0354', url: 'https://attack.mitre.org/software/S0354' },
	S0355: { name: 'Final1stspy', id: 'S0355', url: 'https://attack.mitre.org/software/S0355' },
	S0356: { name: 'KONNI', id: 'S0356', url: 'https://attack.mitre.org/software/S0356' },
	S0357: { name: 'Impacket', id: 'S0357', url: 'https://attack.mitre.org/software/S0357' },
	S0358: { name: 'Ruler', id: 'S0358', url: 'https://attack.mitre.org/software/S0358' },
	S0359: { name: 'Nltest', id: 'S0359', url: 'https://attack.mitre.org/software/S0359' },
	S0360: { name: 'BONDUPDATER', id: 'S0360', url: 'https://attack.mitre.org/software/S0360' },
	S0361: { name: 'Expand', id: 'S0361', url: 'https://attack.mitre.org/software/S0361' },
	S0362: { name: 'Linux Rabbit', id: 'S0362', url: 'https://attack.mitre.org/software/S0362' },
	S0363: { name: 'Empire', id: 'S0363', url: 'https://attack.mitre.org/software/S0363' },
	S0364: { name: 'RawDisk', id: 'S0364', url: 'https://attack.mitre.org/software/S0364' },
	S0365: { name: 'Olympic Destroyer', id: 'S0365', url: 'https://attack.mitre.org/software/S0365' },
	S0366: { name: 'WannaCry', id: 'S0366', url: 'https://attack.mitre.org/software/S0366' },
	S0367: { name: 'Emotet', id: 'S0367', url: 'https://attack.mitre.org/software/S0367' },
	S0368: { name: 'NotPetya', id: 'S0368', url: 'https://attack.mitre.org/software/S0368' },
	S0369: { name: 'CoinTicker', id: 'S0369', url: 'https://attack.mitre.org/software/S0369' },
	S0370: { name: 'SamSam', id: 'S0370', url: 'https://attack.mitre.org/software/S0370' },
	S0371: { name: 'POWERTON', id: 'S0371', url: 'https://attack.mitre.org/software/S0371' },
	S0372: { name: 'LockerGoga', id: 'S0372', url: 'https://attack.mitre.org/software/S0372' },
	S0373: { name: 'Astaroth', id: 'S0373', url: 'https://attack.mitre.org/software/S0373' },
	S0374: { name: 'SpeakUp', id: 'S0374', url: 'https://attack.mitre.org/software/S0374' },
	S0375: { name: 'Remexi', id: 'S0375', url: 'https://attack.mitre.org/software/S0375' },
	S0376: { name: 'HOPLIGHT', id: 'S0376', url: 'https://attack.mitre.org/software/S0376' },
	S0377: { name: 'Ebury', id: 'S0377', url: 'https://attack.mitre.org/software/S0377' },
	S0378: { name: 'PoshC2', id: 'S0378', url: 'https://attack.mitre.org/software/S0378' },
	S0379: { name: 'Revenge RAT', id: 'S0379', url: 'https://attack.mitre.org/software/S0379' },
	S0380: { name: 'StoneDrill', id: 'S0380', url: 'https://attack.mitre.org/software/S0380' },
	S0381: { name: 'FlawedAmmyy', id: 'S0381', url: 'https://attack.mitre.org/software/S0381' },
	S0382: { name: 'ServHelper', id: 'S0382', url: 'https://attack.mitre.org/software/S0382' },
	S0383: { name: 'FlawedGrace', id: 'S0383', url: 'https://attack.mitre.org/software/S0383' },
	S0384: { name: 'Dridex', id: 'S0384', url: 'https://attack.mitre.org/software/S0384' },
	S0385: { name: 'njRAT', id: 'S0385', url: 'https://attack.mitre.org/software/S0385' },
	S0386: { name: 'Ursnif', id: 'S0386', url: 'https://attack.mitre.org/software/S0386' },
	S0387: { name: 'KeyBoy', id: 'S0387', url: 'https://attack.mitre.org/software/S0387' },
	S0388: { name: 'YAHOYAH', id: 'S0388', url: 'https://attack.mitre.org/software/S0388' },
	S0389: { name: 'JCry', id: 'S0389', url: 'https://attack.mitre.org/software/S0389' },
	S0390: { name: 'SQLRat', id: 'S0390', url: 'https://attack.mitre.org/software/S0390' },
	S0391: { name: 'HAWKBALL', id: 'S0391', url: 'https://attack.mitre.org/software/S0391' },
	S0393: { name: 'PowerStallion', id: 'S0393', url: 'https://attack.mitre.org/software/S0393' },
	S0394: { name: 'HiddenWasp', id: 'S0394', url: 'https://attack.mitre.org/software/S0394' },
	S0395: { name: 'LightNeuron', id: 'S0395', url: 'https://attack.mitre.org/software/S0395' },
	S0396: { name: 'EvilBunny', id: 'S0396', url: 'https://attack.mitre.org/software/S0396' },
	S0397: { name: 'LoJax', id: 'S0397', url: 'https://attack.mitre.org/software/S0397' },
	S0398: { name: 'HyperBro', id: 'S0398', url: 'https://attack.mitre.org/software/S0398' },
	S0400: { name: 'RobbinHood', id: 'S0400', url: 'https://attack.mitre.org/software/S0400' },
	S0401: { name: 'Exaramel for Linux', id: 'S0401', url: 'https://attack.mitre.org/software/S0401' },
	S0402: { name: 'OSX/Shlayer', id: 'S0402', url: 'https://attack.mitre.org/software/S0402' },
	S0404: { name: 'esentutl', id: 'S0404', url: 'https://attack.mitre.org/software/S0404' },
	S0409: { name: 'Machete', id: 'S0409', url: 'https://attack.mitre.org/software/S0409' },
	S0410: { name: 'Fysbis', id: 'S0410', url: 'https://attack.mitre.org/software/S0410' },
	S0412: { name: 'ZxShell', id: 'S0412', url: 'https://attack.mitre.org/software/S0412' },
	S0413: { name: 'MailSniper', id: 'S0413', url: 'https://attack.mitre.org/software/S0413' },
	S0414: { name: 'BabyShark', id: 'S0414', url: 'https://attack.mitre.org/software/S0414' },
	S0415: { name: 'BOOSTWRITE', id: 'S0415', url: 'https://attack.mitre.org/software/S0415' },
	S0416: { name: 'RDFSNIFFER', id: 'S0416', url: 'https://attack.mitre.org/software/S0416' },
	S0417: { name: 'GRIFFON', id: 'S0417', url: 'https://attack.mitre.org/software/S0417' },
	S0428: { name: 'PoetRAT', id: 'S0428', url: 'https://attack.mitre.org/software/S0428' },
	S0430: { name: 'Winnti for Linux', id: 'S0430', url: 'https://attack.mitre.org/software/S0430' },
	S0431: { name: 'HotCroissant', id: 'S0431', url: 'https://attack.mitre.org/software/S0431' },
	S0433: { name: 'Rifdoor', id: 'S0433', url: 'https://attack.mitre.org/software/S0433' },
	S0434: { name: 'Imminent Monitor', id: 'S0434', url: 'https://attack.mitre.org/software/S0434' },
	S0435: { name: 'PLEAD', id: 'S0435', url: 'https://attack.mitre.org/software/S0435' },
	S0436: { name: 'TSCookie', id: 'S0436', url: 'https://attack.mitre.org/software/S0436' },
	S0437: { name: 'Kivars', id: 'S0437', url: 'https://attack.mitre.org/software/S0437' },
	S0438: { name: 'Attor', id: 'S0438', url: 'https://attack.mitre.org/software/S0438' },
	S0439: { name: 'Okrum', id: 'S0439', url: 'https://attack.mitre.org/software/S0439' },
	S0441: { name: 'PowerShower', id: 'S0441', url: 'https://attack.mitre.org/software/S0441' },
	S0442: { name: 'VBShower', id: 'S0442', url: 'https://attack.mitre.org/software/S0442' },
	S0443: { name: 'MESSAGETAP', id: 'S0443', url: 'https://attack.mitre.org/software/S0443' },
	S0444: { name: 'ShimRat', id: 'S0444', url: 'https://attack.mitre.org/software/S0444' },
	S0445: { name: 'ShimRatReporter', id: 'S0445', url: 'https://attack.mitre.org/software/S0445' },
	S0446: { name: 'Ryuk', id: 'S0446', url: 'https://attack.mitre.org/software/S0446' },
	S0447: { name: 'Lokibot', id: 'S0447', url: 'https://attack.mitre.org/software/S0447' },
	S0448: { name: 'Rising Sun', id: 'S0448', url: 'https://attack.mitre.org/software/S0448' },
	S0449: { name: 'Maze', id: 'S0449', url: 'https://attack.mitre.org/software/S0449' },
	S0450: { name: 'SHARPSTATS', id: 'S0450', url: 'https://attack.mitre.org/software/S0450' },
	S0451: { name: 'LoudMiner', id: 'S0451', url: 'https://attack.mitre.org/software/S0451' },
	S0452: { name: 'USBferry', id: 'S0452', url: 'https://attack.mitre.org/software/S0452' },
	S0453: { name: 'Pony', id: 'S0453', url: 'https://attack.mitre.org/software/S0453' },
	S0454: { name: 'Cadelspy', id: 'S0454', url: 'https://attack.mitre.org/software/S0454' },
	S0455: { name: 'Metamorfo', id: 'S0455', url: 'https://attack.mitre.org/software/S0455' },
	S0456: { name: 'Aria-body', id: 'S0456', url: 'https://attack.mitre.org/software/S0456' },
	S0457: { name: 'Netwalker', id: 'S0457', url: 'https://attack.mitre.org/software/S0457' },
	S0458: { name: 'Ramsay', id: 'S0458', url: 'https://attack.mitre.org/software/S0458' },
	S0459: { name: 'MechaFlounder', id: 'S0459', url: 'https://attack.mitre.org/software/S0459' },
	S0460: { name: 'Get2', id: 'S0460', url: 'https://attack.mitre.org/software/S0460' },
	S0461: { name: 'SDBbot', id: 'S0461', url: 'https://attack.mitre.org/software/S0461' },
	S0462: { name: 'CARROTBAT', id: 'S0462', url: 'https://attack.mitre.org/software/S0462' },
	S0464: { name: 'SYSCON', id: 'S0464', url: 'https://attack.mitre.org/software/S0464' },
	S0465: { name: 'CARROTBALL', id: 'S0465', url: 'https://attack.mitre.org/software/S0465' },
	S0466: { name: 'WindTail', id: 'S0466', url: 'https://attack.mitre.org/software/S0466' },
	S0467: { name: 'TajMahal', id: 'S0467', url: 'https://attack.mitre.org/software/S0467' },
	S0468: { name: 'Skidmap', id: 'S0468', url: 'https://attack.mitre.org/software/S0468' },
	S0469: { name: 'ABK', id: 'S0469', url: 'https://attack.mitre.org/software/S0469' },
	S0470: { name: 'BBK', id: 'S0470', url: 'https://attack.mitre.org/software/S0470' },
	S0471: { name: 'build_downer', id: 'S0471', url: 'https://attack.mitre.org/software/S0471' },
	S0472: { name: 'down_new', id: 'S0472', url: 'https://attack.mitre.org/software/S0472' },
	S0473: { name: 'Avenger', id: 'S0473', url: 'https://attack.mitre.org/software/S0473' },
	S0475: { name: 'BackConfig', id: 'S0475', url: 'https://attack.mitre.org/software/S0475' },
	S0476: { name: 'Valak', id: 'S0476', url: 'https://attack.mitre.org/software/S0476' },
	S0477: { name: 'Goopy', id: 'S0477', url: 'https://attack.mitre.org/software/S0477' },
	S0481: { name: 'Ragnar Locker', id: 'S0481', url: 'https://attack.mitre.org/software/S0481' },
	S0482: { name: 'Bundlore', id: 'S0482', url: 'https://attack.mitre.org/software/S0482' },
	S0483: { name: 'IcedID', id: 'S0483', url: 'https://attack.mitre.org/software/S0483' },
	S0484: { name: 'Carberp', id: 'S0484', url: 'https://attack.mitre.org/software/S0484' },
	S0486: { name: 'Bonadan', id: 'S0486', url: 'https://attack.mitre.org/software/S0486' },
	S0487: { name: 'Kessel', id: 'S0487', url: 'https://attack.mitre.org/software/S0487' },
	S0488: { name: 'CrackMapExec', id: 'S0488', url: 'https://attack.mitre.org/software/S0488' },
	S0491: { name: 'StrongPity', id: 'S0491', url: 'https://attack.mitre.org/software/S0491' },
	S0492: { name: 'CookieMiner', id: 'S0492', url: 'https://attack.mitre.org/software/S0492' },
	S0493: { name: 'GoldenSpy', id: 'S0493', url: 'https://attack.mitre.org/software/S0493' },
	S0495: { name: 'RDAT', id: 'S0495', url: 'https://attack.mitre.org/software/S0495' },
	S0496: { name: 'REvil', id: 'S0496', url: 'https://attack.mitre.org/software/S0496' },
	S0497: { name: 'Dacls', id: 'S0497', url: 'https://attack.mitre.org/software/S0497' },
	S0498: { name: 'Cryptoistic', id: 'S0498', url: 'https://attack.mitre.org/software/S0498' },
	S0499: { name: 'Hancitor', id: 'S0499', url: 'https://attack.mitre.org/software/S0499' },
	S0500: { name: 'MCMD', id: 'S0500', url: 'https://attack.mitre.org/software/S0500' },
	S0501: { name: 'PipeMon', id: 'S0501', url: 'https://attack.mitre.org/software/S0501' },
	S0502: { name: 'Drovorub', id: 'S0502', url: 'https://attack.mitre.org/software/S0502' },
	S0503: { name: 'FrameworkPOS', id: 'S0503', url: 'https://attack.mitre.org/software/S0503' },
	S0504: { name: 'Anchor', id: 'S0504', url: 'https://attack.mitre.org/software/S0504' },
	S0508: { name: 'Ngrok', id: 'S0508', url: 'https://attack.mitre.org/software/S0508' },
	S0511: { name: 'RegDuke', id: 'S0511', url: 'https://attack.mitre.org/software/S0511' },
	S0512: { name: 'FatDuke', id: 'S0512', url: 'https://attack.mitre.org/software/S0512' },
	S0513: { name: 'LiteDuke', id: 'S0513', url: 'https://attack.mitre.org/software/S0513' },
	S0514: { name: 'WellMess', id: 'S0514', url: 'https://attack.mitre.org/software/S0514' },
	S0515: { name: 'WellMail', id: 'S0515', url: 'https://attack.mitre.org/software/S0515' },
	S0516: { name: 'SoreFang', id: 'S0516', url: 'https://attack.mitre.org/software/S0516' },
	S0517: { name: 'Pillowmint', id: 'S0517', url: 'https://attack.mitre.org/software/S0517' },
	S0518: { name: 'PolyglotDuke', id: 'S0518', url: 'https://attack.mitre.org/software/S0518' },
	S0519: { name: 'SYNful Knock', id: 'S0519', url: 'https://attack.mitre.org/software/S0519' },
	S0520: { name: 'BLINDINGCAN', id: 'S0520', url: 'https://attack.mitre.org/software/S0520' },
	S0521: { name: 'BloodHound', id: 'S0521', url: 'https://attack.mitre.org/software/S0521' },
	S0526: { name: 'KGH_SPY', id: 'S0526', url: 'https://attack.mitre.org/software/S0526' },
	S0527: { name: 'CSPY Downloader', id: 'S0527', url: 'https://attack.mitre.org/software/S0527' },
	S0528: { name: 'Javali', id: 'S0528', url: 'https://attack.mitre.org/software/S0528' },
	S0530: { name: 'Melcoz', id: 'S0530', url: 'https://attack.mitre.org/software/S0530' },
	S0531: { name: 'Grandoreiro', id: 'S0531', url: 'https://attack.mitre.org/software/S0531' },
	S0532: { name: 'Lucifer', id: 'S0532', url: 'https://attack.mitre.org/software/S0532' },
	S0533: { name: 'SLOTHFULMEDIA', id: 'S0533', url: 'https://attack.mitre.org/software/S0533' },
	S0534: { name: 'Bazar', id: 'S0534', url: 'https://attack.mitre.org/software/S0534' },
	S0537: { name: 'HyperStack', id: 'S0537', url: 'https://attack.mitre.org/software/S0537' },
	S0538: { name: 'Crutch', id: 'S0538', url: 'https://attack.mitre.org/software/S0538' },
	S0543: { name: 'Spark', id: 'S0543', url: 'https://attack.mitre.org/software/S0543' },
	S0546: { name: 'SharpStage', id: 'S0546', url: 'https://attack.mitre.org/software/S0546' },
	S0547: { name: 'DropBook', id: 'S0547', url: 'https://attack.mitre.org/software/S0547' },
	S0552: { name: 'AdFind', id: 'S0552', url: 'https://attack.mitre.org/software/S0552' },
	S0553: { name: 'MoleNet', id: 'S0553', url: 'https://attack.mitre.org/software/S0553' },
	S0554: { name: 'Egregor', id: 'S0554', url: 'https://attack.mitre.org/software/S0554' },
	S0556: { name: 'Pay2Key', id: 'S0556', url: 'https://attack.mitre.org/software/S0556' },
	S0559: { name: 'SUNBURST', id: 'S0559', url: 'https://attack.mitre.org/software/S0559' },
	S0560: { name: 'TEARDROP', id: 'S0560', url: 'https://attack.mitre.org/software/S0560' },
	S0561: { name: 'GuLoader', id: 'S0561', url: 'https://attack.mitre.org/software/S0561' },
	S0562: { name: 'SUNSPOT', id: 'S0562', url: 'https://attack.mitre.org/software/S0562' },
	S0564: { name: 'BlackMould', id: 'S0564', url: 'https://attack.mitre.org/software/S0564' },
	S0565: { name: 'Raindrop', id: 'S0565', url: 'https://attack.mitre.org/software/S0565' },
	S0567: { name: 'Dtrack', id: 'S0567', url: 'https://attack.mitre.org/software/S0567' },
	S0568: { name: 'EVILNUM', id: 'S0568', url: 'https://attack.mitre.org/software/S0568' },
	S0569: { name: 'Explosive', id: 'S0569', url: 'https://attack.mitre.org/software/S0569' },
	S0570: { name: 'BitPaymer', id: 'S0570', url: 'https://attack.mitre.org/software/S0570' },
	S0572: { name: 'Caterpillar WebShell', id: 'S0572', url: 'https://attack.mitre.org/software/S0572' },
	S0574: { name: 'BendyBear', id: 'S0574', url: 'https://attack.mitre.org/software/S0574' },
	S0575: { name: 'Conti', id: 'S0575', url: 'https://attack.mitre.org/software/S0575' },
	S0576: { name: 'MegaCortex', id: 'S0576', url: 'https://attack.mitre.org/software/S0576' },
	S0578: { name: 'SUPERNOVA', id: 'S0578', url: 'https://attack.mitre.org/software/S0578' },
	S0579: { name: 'Waterbear', id: 'S0579', url: 'https://attack.mitre.org/software/S0579' },
	S0581: { name: 'IronNetInjector', id: 'S0581', url: 'https://attack.mitre.org/software/S0581' },
	S0582: { name: 'LookBack', id: 'S0582', url: 'https://attack.mitre.org/software/S0582' },
	S0583: { name: 'Pysa', id: 'S0583', url: 'https://attack.mitre.org/software/S0583' },
	S0584: { name: 'AppleJeus', id: 'S0584', url: 'https://attack.mitre.org/software/S0584' },
	S0585: { name: 'Kerrdown', id: 'S0585', url: 'https://attack.mitre.org/software/S0585' },
	S0586: { name: 'TAINTEDSCRIBE', id: 'S0586', url: 'https://attack.mitre.org/software/S0586' },
	S0587: { name: 'Penquin', id: 'S0587', url: 'https://attack.mitre.org/software/S0587' },
	S0588: { name: 'GoldMax', id: 'S0588', url: 'https://attack.mitre.org/software/S0588' },
	S0589: { name: 'Sibot', id: 'S0589', url: 'https://attack.mitre.org/software/S0589' },
	S0590: { name: 'NBTscan', id: 'S0590', url: 'https://attack.mitre.org/software/S0590' },
	S0591: { name: 'ConnectWise', id: 'S0591', url: 'https://attack.mitre.org/software/S0591' },
	S0592: { name: 'RemoteUtilities', id: 'S0592', url: 'https://attack.mitre.org/software/S0592' },
	S0593: { name: 'ECCENTRICBANDWAGON', id: 'S0593', url: 'https://attack.mitre.org/software/S0593' },
	S0594: { name: 'Out1', id: 'S0594', url: 'https://attack.mitre.org/software/S0594' },
	S0595: { name: 'ThiefQuest', id: 'S0595', url: 'https://attack.mitre.org/software/S0595' },
	S0596: { name: 'ShadowPad', id: 'S0596', url: 'https://attack.mitre.org/software/S0596' },
	S0597: { name: 'GoldFinder', id: 'S0597', url: 'https://attack.mitre.org/software/S0597' },
	S0598: { name: 'P.A.S. Webshell', id: 'S0598', url: 'https://attack.mitre.org/software/S0598' },
	S0599: { name: 'Kinsing', id: 'S0599', url: 'https://attack.mitre.org/software/S0599' },
	S0600: { name: 'Doki', id: 'S0600', url: 'https://attack.mitre.org/software/S0600' },
	S0601: { name: 'Hildegard', id: 'S0601', url: 'https://attack.mitre.org/software/S0601' },
	S0603: { name: 'Stuxnet', id: 'S0603', url: 'https://attack.mitre.org/software/S0603' },
	S0604: { name: 'Industroyer', id: 'S0604', url: 'https://attack.mitre.org/software/S0604' },
	S0605: { name: 'EKANS', id: 'S0605', url: 'https://attack.mitre.org/software/S0605' },
	S0606: { name: 'Bad Rabbit', id: 'S0606', url: 'https://attack.mitre.org/software/S0606' },
	S0607: { name: 'KillDisk', id: 'S0607', url: 'https://attack.mitre.org/software/S0607' },
	S0608: { name: 'Conficker', id: 'S0608', url: 'https://attack.mitre.org/software/S0608' },
	S0609: { name: 'TRITON', id: 'S0609', url: 'https://attack.mitre.org/software/S0609' },
	S0610: { name: 'SideTwist', id: 'S0610', url: 'https://attack.mitre.org/software/S0610' },
	S0611: { name: 'Clop', id: 'S0611', url: 'https://attack.mitre.org/software/S0611' },
	S0612: { name: 'WastedLocker', id: 'S0612', url: 'https://attack.mitre.org/software/S0612' },
	S0613: { name: 'PS1', id: 'S0613', url: 'https://attack.mitre.org/software/S0613' },
	S0614: { name: 'CostaBricks', id: 'S0614', url: 'https://attack.mitre.org/software/S0614' },
	S0615: { name: 'SombRAT', id: 'S0615', url: 'https://attack.mitre.org/software/S0615' },
	S0616: { name: 'DEATHRANSOM', id: 'S0616', url: 'https://attack.mitre.org/software/S0616' },
	S0617: { name: 'HELLOKITTY', id: 'S0617', url: 'https://attack.mitre.org/software/S0617' },
	S0618: { name: 'FIVEHANDS', id: 'S0618', url: 'https://attack.mitre.org/software/S0618' },
	S0622: { name: 'AppleSeed', id: 'S0622', url: 'https://attack.mitre.org/software/S0622' },
	S0623: { name: 'Siloscape', id: 'S0623', url: 'https://attack.mitre.org/software/S0623' },
	S0624: { name: 'Ecipekac', id: 'S0624', url: 'https://attack.mitre.org/software/S0624' },
	S0625: { name: 'Cuba', id: 'S0625', url: 'https://attack.mitre.org/software/S0625' },
	S0626: { name: 'P8RAT', id: 'S0626', url: 'https://attack.mitre.org/software/S0626' },
	S0627: { name: 'SodaMaster', id: 'S0627', url: 'https://attack.mitre.org/software/S0627' },
	S0628: { name: 'FYAnti', id: 'S0628', url: 'https://attack.mitre.org/software/S0628' },
	S0629: { name: 'RainyDay', id: 'S0629', url: 'https://attack.mitre.org/software/S0629' },
	S0630: { name: 'Nebulae', id: 'S0630', url: 'https://attack.mitre.org/software/S0630' },
	S0631: { name: 'Chaes', id: 'S0631', url: 'https://attack.mitre.org/software/S0631' },
	S0632: { name: 'GrimAgent', id: 'S0632', url: 'https://attack.mitre.org/software/S0632' },
	S0633: { name: 'Sliver', id: 'S0633', url: 'https://attack.mitre.org/software/S0633' },
	S0634: { name: 'EnvyScout', id: 'S0634', url: 'https://attack.mitre.org/software/S0634' },
	S0635: { name: 'BoomBox', id: 'S0635', url: 'https://attack.mitre.org/software/S0635' },
	S0636: { name: 'VaporRage', id: 'S0636', url: 'https://attack.mitre.org/software/S0636' },
	S0637: { name: 'NativeZone', id: 'S0637', url: 'https://attack.mitre.org/software/S0637' },
	S0638: { name: 'Babuk', id: 'S0638', url: 'https://attack.mitre.org/software/S0638' },
	S0639: { name: 'Seth-Locker', id: 'S0639', url: 'https://attack.mitre.org/software/S0639' },
	S0640: { name: 'Avaddon', id: 'S0640', url: 'https://attack.mitre.org/software/S0640' },
	S0641: { name: 'Kobalos', id: 'S0641', url: 'https://attack.mitre.org/software/S0641' },
	S0642: { name: 'BADFLICK', id: 'S0642', url: 'https://attack.mitre.org/software/S0642' },
	S0643: { name: 'Peppy', id: 'S0643', url: 'https://attack.mitre.org/software/S0643' },
	S0644: { name: 'ObliqueRAT', id: 'S0644', url: 'https://attack.mitre.org/software/S0644' },
	S0645: { name: 'Wevtutil', id: 'S0645', url: 'https://attack.mitre.org/software/S0645' },
	S0646: { name: 'SpicyOmelette', id: 'S0646', url: 'https://attack.mitre.org/software/S0646' },
	S0647: { name: 'Turian', id: 'S0647', url: 'https://attack.mitre.org/software/S0647' },
	S0648: { name: 'JSS Loader', id: 'S0648', url: 'https://attack.mitre.org/software/S0648' },
	S0649: { name: 'SMOKEDHAM', id: 'S0649', url: 'https://attack.mitre.org/software/S0649' },
	S0650: { name: 'QakBot', id: 'S0650', url: 'https://attack.mitre.org/software/S0650' },
	S0651: { name: 'BoxCaon', id: 'S0651', url: 'https://attack.mitre.org/software/S0651' },
	S0652: { name: 'MarkiRAT', id: 'S0652', url: 'https://attack.mitre.org/software/S0652' },
	S0653: { name: 'xCaon', id: 'S0653', url: 'https://attack.mitre.org/software/S0653' },
	S0654: { name: 'ProLock', id: 'S0654', url: 'https://attack.mitre.org/software/S0654' },
	S0657: { name: 'BLUELIGHT', id: 'S0657', url: 'https://attack.mitre.org/software/S0657' },
	S0658: { name: 'XCSSET', id: 'S0658', url: 'https://attack.mitre.org/software/S0658' },
	S0659: { name: 'Diavol', id: 'S0659', url: 'https://attack.mitre.org/software/S0659' },
	S0660: { name: 'Clambling', id: 'S0660', url: 'https://attack.mitre.org/software/S0660' },
	S0661: { name: 'FoggyWeb', id: 'S0661', url: 'https://attack.mitre.org/software/S0661' },
	S0662: { name: 'RCSession', id: 'S0662', url: 'https://attack.mitre.org/software/S0662' },
	S0663: { name: 'SysUpdate', id: 'S0663', url: 'https://attack.mitre.org/software/S0663' },
	S0664: { name: 'Pandora', id: 'S0664', url: 'https://attack.mitre.org/software/S0664' },
	S0665: { name: 'ThreatNeedle', id: 'S0665', url: 'https://attack.mitre.org/software/S0665' },
	S0666: { name: 'Gelsemium', id: 'S0666', url: 'https://attack.mitre.org/software/S0666' },
	S0667: { name: 'Chrommme', id: 'S0667', url: 'https://attack.mitre.org/software/S0667' },
	S0668: { name: 'TinyTurla', id: 'S0668', url: 'https://attack.mitre.org/software/S0668' },
	S0669: { name: 'KOCTOPUS', id: 'S0669', url: 'https://attack.mitre.org/software/S0669' },
	S0670: { name: 'WarzoneRAT', id: 'S0670', url: 'https://attack.mitre.org/software/S0670' },
	S0671: { name: 'Tomiris', id: 'S0671', url: 'https://attack.mitre.org/software/S0671' },
	S0672: { name: 'Zox', id: 'S0672', url: 'https://attack.mitre.org/software/S0672' },
	S0673: { name: 'DarkWatchman', id: 'S0673', url: 'https://attack.mitre.org/software/S0673' },
	S0674: { name: 'CharmPower', id: 'S0674', url: 'https://attack.mitre.org/software/S0674' },
	S0677: { name: 'AADInternals', id: 'S0677', url: 'https://attack.mitre.org/software/S0677' },
	S0678: { name: 'Torisma', id: 'S0678', url: 'https://attack.mitre.org/software/S0678' },
	S0679: { name: 'Ferocious', id: 'S0679', url: 'https://attack.mitre.org/software/S0679' },
	S0680: { name: 'LitePower', id: 'S0680', url: 'https://attack.mitre.org/software/S0680' },
	S0681: { name: 'Lizar', id: 'S0681', url: 'https://attack.mitre.org/software/S0681' },
	S0682: { name: 'TrailBlazer', id: 'S0682', url: 'https://attack.mitre.org/software/S0682' },
	S0683: { name: 'Peirates', id: 'S0683', url: 'https://attack.mitre.org/software/S0683' },
	S0684: { name: 'ROADTools', id: 'S0684', url: 'https://attack.mitre.org/software/S0684' },
	S0685: { name: 'PowerPunch', id: 'S0685', url: 'https://attack.mitre.org/software/S0685' },
	S0686: { name: 'QuietSieve', id: 'S0686', url: 'https://attack.mitre.org/software/S0686' },
	S0687: { name: 'Cyclops Blink', id: 'S0687', url: 'https://attack.mitre.org/software/S0687' },
	S0688: { name: 'Meteor', id: 'S0688', url: 'https://attack.mitre.org/software/S0688' },
	S0689: { name: 'WhisperGate', id: 'S0689', url: 'https://attack.mitre.org/software/S0689' },
	S0690: { name: 'Green Lambert', id: 'S0690', url: 'https://attack.mitre.org/software/S0690' },
	S0691: { name: 'Neoichor', id: 'S0691', url: 'https://attack.mitre.org/software/S0691' },
	S0692: { name: 'SILENTTRINITY', id: 'S0692', url: 'https://attack.mitre.org/software/S0692' },
	S0693: { name: 'CaddyWiper', id: 'S0693', url: 'https://attack.mitre.org/software/S0693' },
	S0694: { name: 'DRATzarus', id: 'S0694', url: 'https://attack.mitre.org/software/S0694' },
	S0695: { name: 'Donut', id: 'S0695', url: 'https://attack.mitre.org/software/S0695' },
	S0696: { name: 'Flagpro', id: 'S0696', url: 'https://attack.mitre.org/software/S0696' },
	S0697: { name: 'HermeticWiper', id: 'S0697', url: 'https://attack.mitre.org/software/S0697' },
	S0698: { name: 'HermeticWizard', id: 'S0698', url: 'https://attack.mitre.org/software/S0698' },
	S0699: { name: 'Mythic', id: 'S0699', url: 'https://attack.mitre.org/software/S0699' },
	S1011: { name: 'Tarrask', id: 'S1011', url: 'https://attack.mitre.org/software/S1011' },
	S1012: { name: 'PowerLess', id: 'S1012', url: 'https://attack.mitre.org/software/S1012' },
	S1013: { name: 'ZxxZ', id: 'S1013', url: 'https://attack.mitre.org/software/S1013' },
	S1014: { name: 'DanBot', id: 'S1014', url: 'https://attack.mitre.org/software/S1014' },
	S1015: { name: 'Milan', id: 'S1015', url: 'https://attack.mitre.org/software/S1015' },
	S1016: { name: 'MacMa', id: 'S1016', url: 'https://attack.mitre.org/software/S1016' },
	S1017: { name: 'OutSteel', id: 'S1017', url: 'https://attack.mitre.org/software/S1017' },
	S1018: { name: 'Saint Bot', id: 'S1018', url: 'https://attack.mitre.org/software/S1018' },
	S1019: { name: 'Shark', id: 'S1019', url: 'https://attack.mitre.org/software/S1019' },
	S1020: { name: 'Kevin', id: 'S1020', url: 'https://attack.mitre.org/software/S1020' },
	S1021: { name: 'DnsSystem', id: 'S1021', url: 'https://attack.mitre.org/software/S1021' },
	S1022: { name: 'IceApple', id: 'S1022', url: 'https://attack.mitre.org/software/S1022' },
	S1023: { name: 'CreepyDrive', id: 'S1023', url: 'https://attack.mitre.org/software/S1023' },
	S1024: { name: 'CreepySnail', id: 'S1024', url: 'https://attack.mitre.org/software/S1024' },
	S1025: { name: 'Amadey', id: 'S1025', url: 'https://attack.mitre.org/software/S1025' },
	S1026: { name: 'Mongall', id: 'S1026', url: 'https://attack.mitre.org/software/S1026' },
	S1027: { name: 'Heyoka Backdoor', id: 'S1027', url: 'https://attack.mitre.org/software/S1027' },
	S1028: { name: 'Action RAT', id: 'S1028', url: 'https://attack.mitre.org/software/S1028' },
	S1029: { name: 'AuTo Stealer', id: 'S1029', url: 'https://attack.mitre.org/software/S1029' },
	S1030: { name: 'Squirrelwaffle', id: 'S1030', url: 'https://attack.mitre.org/software/S1030' },
	S1031: { name: 'PingPull', id: 'S1031', url: 'https://attack.mitre.org/software/S1031' },
	S1032: { name: 'PyDCrypt', id: 'S1032', url: 'https://attack.mitre.org/software/S1032' },
	S1033: { name: 'DCSrv', id: 'S1033', url: 'https://attack.mitre.org/software/S1033' },
	S1034: { name: 'StrifeWater', id: 'S1034', url: 'https://attack.mitre.org/software/S1034' },
	S1035: { name: 'Small Sieve', id: 'S1035', url: 'https://attack.mitre.org/software/S1035' },
	S1037: { name: 'STARWHALE', id: 'S1037', url: 'https://attack.mitre.org/software/S1037' },
	S1039: { name: 'Bumblebee', id: 'S1039', url: 'https://attack.mitre.org/software/S1039' },
	S1040: { name: 'Rclone', id: 'S1040', url: 'https://attack.mitre.org/software/S1040' },
	S1041: { name: 'Chinoxy', id: 'S1041', url: 'https://attack.mitre.org/software/S1041' },
	S1042: { name: 'SUGARDUMP', id: 'S1042', url: 'https://attack.mitre.org/software/S1042' },
	S1043: { name: 'ccf32', id: 'S1043', url: 'https://attack.mitre.org/software/S1043' },
	S1044: { name: 'FunnyDream', id: 'S1044', url: 'https://attack.mitre.org/software/S1044' },
	S1046: { name: 'PowGoop', id: 'S1046', url: 'https://attack.mitre.org/software/S1046' },
	S1047: { name: 'Mori', id: 'S1047', url: 'https://attack.mitre.org/software/S1047' },
	S1048: { name: 'macOS.OSAMiner', id: 'S1048', url: 'https://attack.mitre.org/software/S1048' },
	S1049: { name: 'SUGARUSH', id: 'S1049', url: 'https://attack.mitre.org/software/S1049' },
	S1050: { name: 'PcShare', id: 'S1050', url: 'https://attack.mitre.org/software/S1050' },
	T1001: {
		name: 'Data Obfuscation',
		id: 'T1001',
		url: 'https://attack.mitre.org/techniques/T1001',
		subTechniques: ['001', '002', '003'],
	},
	'T1001.001': {
		name: 'Junk Data',
		id: 'T1001.001',
		url: 'https://attack.mitre.org/techniques/T1001/001',
		parentTechnique: 'T1001',
	},
	'T1001.002': {
		name: 'Steganography',
		id: 'T1001.002',
		url: 'https://attack.mitre.org/techniques/T1001/002',
		parentTechnique: 'T1001',
	},
	'T1001.003': {
		name: 'Protocol Impersonation',
		id: 'T1001.003',
		url: 'https://attack.mitre.org/techniques/T1001/003',
		parentTechnique: 'T1001',
	},
	T1002: { name: 'Data Compressed', id: 'T1002', url: 'https://attack.mitre.org/techniques/T1002' },
	T1003: {
		name: 'OS Credential Dumping',
		id: 'T1003',
		url: 'https://attack.mitre.org/techniques/T1003',
		subTechniques: ['001', '002', '003', '004', '005', '006', '007', '008'],
	},
	'T1003.001': {
		name: 'LSASS Memory',
		id: 'T1003.001',
		url: 'https://attack.mitre.org/techniques/T1003/001',
		parentTechnique: 'T1003',
	},
	'T1003.002': {
		name: 'Security Account Manager',
		id: 'T1003.002',
		url: 'https://attack.mitre.org/techniques/T1003/002',
		parentTechnique: 'T1003',
	},
	'T1003.003': {
		name: 'NTDS',
		id: 'T1003.003',
		url: 'https://attack.mitre.org/techniques/T1003/003',
		parentTechnique: 'T1003',
	},
	'T1003.004': {
		name: 'LSA Secrets',
		id: 'T1003.004',
		url: 'https://attack.mitre.org/techniques/T1003/004',
		parentTechnique: 'T1003',
	},
	'T1003.005': {
		name: 'Cached Domain Credentials',
		id: 'T1003.005',
		url: 'https://attack.mitre.org/techniques/T1003/005',
		parentTechnique: 'T1003',
	},
	'T1003.006': {
		name: 'DCSync',
		id: 'T1003.006',
		url: 'https://attack.mitre.org/techniques/T1003/006',
		parentTechnique: 'T1003',
	},
	'T1003.007': {
		name: 'Proc Filesystem',
		id: 'T1003.007',
		url: 'https://attack.mitre.org/techniques/T1003/007',
		parentTechnique: 'T1003',
	},
	'T1003.008': {
		name: '/etc/passwd and /etc/shadow',
		id: 'T1003.008',
		url: 'https://attack.mitre.org/techniques/T1003/008',
		parentTechnique: 'T1003',
	},
	T1004: { name: 'Winlogon Helper DLL', id: 'T1004', url: 'https://attack.mitre.org/techniques/T1004' },
	T1005: { name: 'Data from Local System', id: 'T1005', url: 'https://attack.mitre.org/techniques/T1005' },
	T1006: { name: 'Direct Volume Access', id: 'T1006', url: 'https://attack.mitre.org/techniques/T1006' },
	T1007: { name: 'System Service Discovery', id: 'T1007', url: 'https://attack.mitre.org/techniques/T1007' },
	T1008: { name: 'Fallback Channels', id: 'T1008', url: 'https://attack.mitre.org/techniques/T1008' },
	T1009: { name: 'Binary Padding', id: 'T1009', url: 'https://attack.mitre.org/techniques/T1009' },
	T1010: { name: 'Application Window Discovery', id: 'T1010', url: 'https://attack.mitre.org/techniques/T1010' },
	T1011: {
		name: 'Exfiltration Over Other Network Medium',
		id: 'T1011',
		url: 'https://attack.mitre.org/techniques/T1011',
		subTechniques: ['001'],
	},
	'T1011.001': {
		name: 'Exfiltration Over Bluetooth',
		id: 'T1011.001',
		url: 'https://attack.mitre.org/techniques/T1011/001',
		parentTechnique: 'T1011',
	},
	T1012: { name: 'Query Registry', id: 'T1012', url: 'https://attack.mitre.org/techniques/T1012' },
	T1013: { name: 'Port Monitors', id: 'T1013', url: 'https://attack.mitre.org/techniques/T1013' },
	T1014: { name: 'Rootkit', id: 'T1014', url: 'https://attack.mitre.org/techniques/T1014' },
	T1015: { name: 'Accessibility Features', id: 'T1015', url: 'https://attack.mitre.org/techniques/T1015' },
	T1016: {
		name: 'System Network Configuration Discovery',
		id: 'T1016',
		url: 'https://attack.mitre.org/techniques/T1016',
		subTechniques: ['001'],
	},
	'T1016.001': {
		name: 'Internet Connection Discovery',
		id: 'T1016.001',
		url: 'https://attack.mitre.org/techniques/T1016/001',
		parentTechnique: 'T1016',
	},
	T1017: { name: 'Application Deployment Software', id: 'T1017', url: 'https://attack.mitre.org/techniques/T1017' },
	T1018: { name: 'Remote System Discovery', id: 'T1018', url: 'https://attack.mitre.org/techniques/T1018' },
	T1019: { name: 'System Firmware', id: 'T1019', url: 'https://attack.mitre.org/techniques/T1019' },
	T1020: {
		name: 'Automated Exfiltration',
		id: 'T1020',
		url: 'https://attack.mitre.org/techniques/T1020',
		subTechniques: ['001'],
	},
	'T1020.001': {
		name: 'Traffic Duplication',
		id: 'T1020.001',
		url: 'https://attack.mitre.org/techniques/T1020/001',
		parentTechnique: 'T1020',
	},
	T1021: {
		subTechniques: ['001', '002', '003', '004', '005', '006'],
		name: 'Remote Services',
		id: 'T1021',
		url: 'https://attack.mitre.org/techniques/T1021',
	},
	'T1021.001': {
		name: 'Remote Desktop Protocol',
		id: 'T1021.001',
		url: 'https://attack.mitre.org/techniques/T1021/001',
		parentTechnique: 'T1021',
	},
	'T1021.002': {
		name: 'SMB/Windows Admin Shares',
		id: 'T1021.002',
		url: 'https://attack.mitre.org/techniques/T1021/002',
		parentTechnique: 'T1021',
	},
	'T1021.003': {
		name: 'Distributed Component Object Model',
		id: 'T1021.003',
		url: 'https://attack.mitre.org/techniques/T1021/003',
		parentTechnique: 'T1021',
	},
	'T1021.004': {
		name: 'SSH',
		id: 'T1021.004',
		url: 'https://attack.mitre.org/techniques/T1021/004',
		parentTechnique: 'T1021',
	},
	'T1021.005': {
		name: 'VNC',
		id: 'T1021.005',
		url: 'https://attack.mitre.org/techniques/T1021/005',
		parentTechnique: 'T1021',
	},
	'T1021.006': {
		name: 'Windows Remote Management',
		id: 'T1021.006',
		url: 'https://attack.mitre.org/techniques/T1021/006',
		parentTechnique: 'T1021',
	},
	T1022: { name: 'Data Encrypted', id: 'T1022', url: 'https://attack.mitre.org/techniques/T1022' },
	T1023: { name: 'Shortcut Modification', id: 'T1023', url: 'https://attack.mitre.org/techniques/T1023' },
	T1024: { name: 'Custom Cryptographic Protocol', id: 'T1024', url: 'https://attack.mitre.org/techniques/T1024' },
	T1025: { name: 'Data from Removable Media', id: 'T1025', url: 'https://attack.mitre.org/techniques/T1025' },
	T1026: { name: 'Multiband Communication', id: 'T1026', url: 'https://attack.mitre.org/techniques/T1026' },
	T1027: {
		subTechniques: ['001', '002', '003', '004', '005', '006', '007', '008', '009'],
		name: 'Obfuscated Files or Information',
		id: 'T1027',
		url: 'https://attack.mitre.org/techniques/T1027',
	},
	'T1027.001': {
		name: 'Binary Padding',
		id: 'T1027.001',
		url: 'https://attack.mitre.org/techniques/T1027/001',
		parentTechnique: 'T1027',
	},
	'T1027.002': {
		name: 'Software Packing',
		id: 'T1027.002',
		url: 'https://attack.mitre.org/techniques/T1027/002',
		parentTechnique: 'T1027',
	},
	'T1027.003': {
		name: 'Steganography',
		id: 'T1027.003',
		url: 'https://attack.mitre.org/techniques/T1027/003',
		parentTechnique: 'T1027',
	},
	'T1027.004': {
		name: 'Compile After Delivery',
		id: 'T1027.004',
		url: 'https://attack.mitre.org/techniques/T1027/004',
		parentTechnique: 'T1027',
	},
	'T1027.005': {
		name: 'Indicator Removal from Tools',
		id: 'T1027.005',
		url: 'https://attack.mitre.org/techniques/T1027/005',
		parentTechnique: 'T1027',
	},
	'T1027.006': {
		name: 'HTML Smuggling',
		id: 'T1027.006',
		url: 'https://attack.mitre.org/techniques/T1027/006',
		parentTechnique: 'T1027',
	},
	'T1027.007': {
		name: 'Dynamic API Resolution',
		id: 'T1027.007',
		url: 'https://attack.mitre.org/techniques/T1027/007',
		parentTechnique: 'T1027',
	},
	'T1027.008': {
		name: 'Stripped Payloads',
		id: 'T1027.008',
		url: 'https://attack.mitre.org/techniques/T1027/008',
		parentTechnique: 'T1027',
	},
	'T1027.009': {
		name: 'Embedded Payloads',
		id: 'T1027.009',
		url: 'https://attack.mitre.org/techniques/T1027/009',
		parentTechnique: 'T1027',
	},
	T1028: { name: 'Windows Remote Management', id: 'T1028', url: 'https://attack.mitre.org/techniques/T1028' },
	T1029: { name: 'Scheduled Transfer', id: 'T1029', url: 'https://attack.mitre.org/techniques/T1029' },
	T1030: { name: 'Data Transfer Size Limits', id: 'T1030', url: 'https://attack.mitre.org/techniques/T1030' },
	T1031: { name: 'Modify Existing Service', id: 'T1031', url: 'https://attack.mitre.org/techniques/T1031' },
	T1032: { name: 'Standard Cryptographic Protocol', id: 'T1032', url: 'https://attack.mitre.org/techniques/T1032' },
	T1033: { name: 'System Owner/User Discovery', id: 'T1033', url: 'https://attack.mitre.org/techniques/T1033' },
	T1034: { name: 'Path Interception', id: 'T1034', url: 'https://attack.mitre.org/techniques/T1034' },
	T1035: { name: 'Service Execution', id: 'T1035', url: 'https://attack.mitre.org/techniques/T1035' },
	T1036: {
		name: 'Masquerading',
		id: 'T1036',
		url: 'https://attack.mitre.org/techniques/T1036',
		subTechniques: ['001', '002', '003', '004', '005', '006', '007'],
	},
	'T1036.001': {
		name: 'Invalid Code Signature',
		id: 'T1036.001',
		url: 'https://attack.mitre.org/techniques/T1036/001',
		parentTechnique: 'T1036',
	},
	'T1036.002': {
		name: 'Right-to-Left Override',
		id: 'T1036.002',
		url: 'https://attack.mitre.org/techniques/T1036/002',
		parentTechnique: 'T1036',
	},
	'T1036.003': {
		name: 'Rename System Utilities',
		id: 'T1036.003',
		url: 'https://attack.mitre.org/techniques/T1036/003',
		parentTechnique: 'T1036',
	},
	'T1036.004': {
		name: 'Masquerade Task or Service',
		id: 'T1036.004',
		url: 'https://attack.mitre.org/techniques/T1036/004',
		parentTechnique: 'T1036',
	},
	'T1036.005': {
		name: 'Match Legitimate Name or Location',
		id: 'T1036.005',
		url: 'https://attack.mitre.org/techniques/T1036/005',
		parentTechnique: 'T1036',
	},
	'T1036.006': {
		name: 'Space after Filename',
		id: 'T1036.006',
		url: 'https://attack.mitre.org/techniques/T1036/006',
		parentTechnique: 'T1036',
	},
	'T1036.007': {
		name: 'Double File Extension',
		id: 'T1036.007',
		url: 'https://attack.mitre.org/techniques/T1036/007',
		parentTechnique: 'T1036',
	},
	T1037: {
		name: 'Boot or Logon Initialization Scripts',
		id: 'T1037',
		url: 'https://attack.mitre.org/techniques/T1037',
		subTechniques: ['001', '002', '003', '004', '005'],
	},
	'T1037.001': {
		name: 'Logon Script (Windows)',
		id: 'T1037.001',
		url: 'https://attack.mitre.org/techniques/T1037/001',
		parentTechnique: 'T1037',
	},
	'T1037.002': {
		name: 'Login Hook',
		id: 'T1037.002',
		url: 'https://attack.mitre.org/techniques/T1037/002',
		parentTechnique: 'T1037',
	},
	'T1037.003': {
		name: 'Network Logon Script',
		id: 'T1037.003',
		url: 'https://attack.mitre.org/techniques/T1037/003',
		parentTechnique: 'T1037',
	},
	'T1037.004': {
		name: 'RC Scripts',
		id: 'T1037.004',
		url: 'https://attack.mitre.org/techniques/T1037/004',
		parentTechnique: 'T1037',
	},
	'T1037.005': {
		name: 'Startup Items',
		id: 'T1037.005',
		url: 'https://attack.mitre.org/techniques/T1037/005',
		parentTechnique: 'T1037',
	},
	T1038: { name: 'DLL Search Order Hijacking', id: 'T1038', url: 'https://attack.mitre.org/techniques/T1038' },
	T1039: { name: 'Data from Network Shared Drive', id: 'T1039', url: 'https://attack.mitre.org/techniques/T1039' },
	T1040: { name: 'Network Sniffing', id: 'T1040', url: 'https://attack.mitre.org/techniques/T1040' },
	T1041: { name: 'Exfiltration Over C2 Channel', id: 'T1041', url: 'https://attack.mitre.org/techniques/T1041' },
	T1042: { name: 'Change Default File Association', id: 'T1042', url: 'https://attack.mitre.org/techniques/T1042' },
	T1043: { name: 'Commonly Used Port', id: 'T1043', url: 'https://attack.mitre.org/techniques/T1043' },
	T1044: { name: 'File System Permissions Weakness', id: 'T1044', url: 'https://attack.mitre.org/techniques/T1044' },
	T1045: { name: 'Software Packing', id: 'T1045', url: 'https://attack.mitre.org/techniques/T1045' },
	T1046: { name: 'Network Service Discovery', id: 'T1046', url: 'https://attack.mitre.org/techniques/T1046' },
	T1047: { name: 'Windows Management Instrumentation', id: 'T1047', url: 'https://attack.mitre.org/techniques/T1047' },
	T1048: {
		subTechniques: ['001', '002', '003'],
		name: 'Exfiltration Over Alternative Protocol',
		id: 'T1048',
		url: 'https://attack.mitre.org/techniques/T1048',
	},
	'T1048.001': {
		name: 'Exfiltration Over Symmetric Encrypted Non-C2 Protocol',
		id: 'T1048.001',
		url: 'https://attack.mitre.org/techniques/T1048/001',
		parentTechnique: 'T1048',
	},
	'T1048.002': {
		name: 'Exfiltration Over Asymmetric Encrypted Non-C2 Protocol',
		id: 'T1048.002',
		url: 'https://attack.mitre.org/techniques/T1048/002',
		parentTechnique: 'T1048',
	},
	'T1048.003': {
		name: 'Exfiltration Over Unencrypted Non-C2 Protocol',
		id: 'T1048.003',
		url: 'https://attack.mitre.org/techniques/T1048/003',
		parentTechnique: 'T1048',
	},
	T1049: {
		name: 'System Network Connections Discovery',
		id: 'T1049',
		url: 'https://attack.mitre.org/techniques/T1049',
	},
	T1050: { name: 'New Service', id: 'T1050', url: 'https://attack.mitre.org/techniques/T1050' },
	T1051: { name: 'Shared Webroot', id: 'T1051', url: 'https://attack.mitre.org/techniques/T1051' },
	T1052: {
		name: 'Exfiltration Over Physical Medium',
		id: 'T1052',
		url: 'https://attack.mitre.org/techniques/T1052',
		subTechniques: ['001'],
	},
	'T1052.001': {
		name: 'Exfiltration over USB',
		id: 'T1052.001',
		url: 'https://attack.mitre.org/techniques/T1052/001',
		parentTechnique: 'T1052',
	},
	T1053: {
		name: 'Scheduled Task/Job',
		id: 'T1053',
		url: 'https://attack.mitre.org/techniques/T1053',
		subTechniques: ['001', '002', '003', '004', '005', '006', '007'],
	},
	'T1053.001': {
		name: 'At (Linux)',
		id: 'T1053.001',
		url: 'https://attack.mitre.org/techniques/T1053/001',
		parentTechnique: 'T1053',
	},
	'T1053.002': {
		name: 'At',
		id: 'T1053.002',
		url: 'https://attack.mitre.org/techniques/T1053/002',
		parentTechnique: 'T1053',
	},
	'T1053.003': {
		name: 'Cron',
		id: 'T1053.003',
		url: 'https://attack.mitre.org/techniques/T1053/003',
		parentTechnique: 'T1053',
	},
	'T1053.004': {
		name: 'Launchd',
		id: 'T1053.004',
		url: 'https://attack.mitre.org/techniques/T1053/004',
		parentTechnique: 'T1053',
	},
	'T1053.005': {
		name: 'Scheduled Task',
		id: 'T1053.005',
		url: 'https://attack.mitre.org/techniques/T1053/005',
		parentTechnique: 'T1053',
	},
	'T1053.006': {
		name: 'Systemd Timers',
		id: 'T1053.006',
		url: 'https://attack.mitre.org/techniques/T1053/006',
		parentTechnique: 'T1053',
	},
	'T1053.007': {
		name: 'Container Orchestration Job',
		id: 'T1053.007',
		url: 'https://attack.mitre.org/techniques/T1053/007',
		parentTechnique: 'T1053',
	},
	T1054: { name: 'Indicator Blocking', id: 'T1054', url: 'https://attack.mitre.org/techniques/T1054' },
	T1055: {
		subTechniques: ['001', '002', '003', '004', '005', '008', '009', '011', '012', '013', '014', '015'],
		name: 'Process Injection',
		id: 'T1055',
		url: 'https://attack.mitre.org/techniques/T1055',
	},
	'T1055.001': {
		name: 'Dynamic-link Library Injection',
		id: 'T1055.001',
		url: 'https://attack.mitre.org/techniques/T1055/001',
		parentTechnique: 'T1055',
	},
	'T1055.002': {
		name: 'Portable Executable Injection',
		id: 'T1055.002',
		url: 'https://attack.mitre.org/techniques/T1055/002',
		parentTechnique: 'T1055',
	},
	'T1055.003': {
		name: 'Thread Execution Hijacking',
		id: 'T1055.003',
		url: 'https://attack.mitre.org/techniques/T1055/003',
		parentTechnique: 'T1055',
	},
	'T1055.004': {
		name: 'Asynchronous Procedure Call',
		id: 'T1055.004',
		url: 'https://attack.mitre.org/techniques/T1055/004',
		parentTechnique: 'T1055',
	},
	'T1055.005': {
		name: 'Thread Local Storage',
		id: 'T1055.005',
		url: 'https://attack.mitre.org/techniques/T1055/005',
		parentTechnique: 'T1055',
	},
	'T1055.008': {
		name: 'Ptrace System Calls',
		id: 'T1055.008',
		url: 'https://attack.mitre.org/techniques/T1055/008',
		parentTechnique: 'T1055',
	},
	'T1055.009': {
		name: 'Proc Memory',
		id: 'T1055.009',
		url: 'https://attack.mitre.org/techniques/T1055/009',
		parentTechnique: 'T1055',
	},
	'T1055.011': {
		name: 'Extra Window Memory Injection',
		id: 'T1055.011',
		url: 'https://attack.mitre.org/techniques/T1055/011',
		parentTechnique: 'T1055',
	},
	'T1055.012': {
		name: 'Process Hollowing',
		id: 'T1055.012',
		url: 'https://attack.mitre.org/techniques/T1055/012',
		parentTechnique: 'T1055',
	},
	'T1055.013': {
		name: 'Process Doppelgänging',
		id: 'T1055.013',
		url: 'https://attack.mitre.org/techniques/T1055/013',
		parentTechnique: 'T1055',
	},
	'T1055.014': {
		name: 'VDSO Hijacking',
		id: 'T1055.014',
		url: 'https://attack.mitre.org/techniques/T1055/014',
		parentTechnique: 'T1055',
	},
	'T1055.015': {
		name: 'ListPlanting',
		id: 'T1055.015',
		url: 'https://attack.mitre.org/techniques/T1055/015',
		parentTechnique: 'T1055',
	},
	T1056: {
		subTechniques: ['001', '002', '003', '004'],
		name: 'Input Capture',
		id: 'T1056',
		url: 'https://attack.mitre.org/techniques/T1056',
	},
	'T1056.001': {
		name: 'Keylogging',
		id: 'T1056.001',
		url: 'https://attack.mitre.org/techniques/T1056/001',
		parentTechnique: 'T1056',
	},
	'T1056.002': {
		name: 'GUI Input Capture',
		id: 'T1056.002',
		url: 'https://attack.mitre.org/techniques/T1056/002',
		parentTechnique: 'T1056',
	},
	'T1056.003': {
		name: 'Web Portal Capture',
		id: 'T1056.003',
		url: 'https://attack.mitre.org/techniques/T1056/003',
		parentTechnique: 'T1056',
	},
	'T1056.004': {
		name: 'Credential API Hooking',
		id: 'T1056.004',
		url: 'https://attack.mitre.org/techniques/T1056/004',
		parentTechnique: 'T1056',
	},
	T1057: { name: 'Process Discovery', id: 'T1057', url: 'https://attack.mitre.org/techniques/T1057' },
	T1058: {
		name: 'Service Registry Permissions Weakness',
		id: 'T1058',
		url: 'https://attack.mitre.org/techniques/T1058',
	},
	T1059: {
		subTechniques: ['001', '002', '003', '004', '005', '006', '007', '008'],
		name: 'Command and Scripting Interpreter',
		id: 'T1059',
		url: 'https://attack.mitre.org/techniques/T1059',
	},
	'T1059.001': {
		name: 'PowerShell',
		id: 'T1059.001',
		url: 'https://attack.mitre.org/techniques/T1059/001',
		parentTechnique: 'T1059',
	},
	'T1059.002': {
		name: 'AppleScript',
		id: 'T1059.002',
		url: 'https://attack.mitre.org/techniques/T1059/002',
		parentTechnique: 'T1059',
	},
	'T1059.003': {
		name: 'Windows Command Shell',
		id: 'T1059.003',
		url: 'https://attack.mitre.org/techniques/T1059/003',
		parentTechnique: 'T1059',
	},
	'T1059.004': {
		name: 'Unix Shell',
		id: 'T1059.004',
		url: 'https://attack.mitre.org/techniques/T1059/004',
		parentTechnique: 'T1059',
	},
	'T1059.005': {
		name: 'Visual Basic',
		id: 'T1059.005',
		url: 'https://attack.mitre.org/techniques/T1059/005',
		parentTechnique: 'T1059',
	},
	'T1059.006': {
		name: 'Python',
		id: 'T1059.006',
		url: 'https://attack.mitre.org/techniques/T1059/006',
		parentTechnique: 'T1059',
	},
	'T1059.007': {
		name: 'JavaScript',
		id: 'T1059.007',
		url: 'https://attack.mitre.org/techniques/T1059/007',
		parentTechnique: 'T1059',
	},
	'T1059.008': {
		name: 'Network Device CLI',
		id: 'T1059.008',
		url: 'https://attack.mitre.org/techniques/T1059/008',
		parentTechnique: 'T1059',
	},
	T1060: { name: 'Registry Run Keys / Startup Folder', id: 'T1060', url: 'https://attack.mitre.org/techniques/T1060' },
	T1061: { name: 'Graphical User Interface', id: 'T1061', url: 'https://attack.mitre.org/techniques/T1061' },
	T1062: { name: 'Hypervisor', id: 'T1062', url: 'https://attack.mitre.org/techniques/T1062' },
	T1063: { name: 'Security Software Discovery', id: 'T1063', url: 'https://attack.mitre.org/techniques/T1063' },
	T1064: { name: 'Scripting', id: 'T1064', url: 'https://attack.mitre.org/techniques/T1064' },
	T1065: { name: 'Uncommonly Used Port', id: 'T1065', url: 'https://attack.mitre.org/techniques/T1065' },
	T1066: { name: 'Indicator Removal from Tools', id: 'T1066', url: 'https://attack.mitre.org/techniques/T1066' },
	T1067: { name: 'Bootkit', id: 'T1067', url: 'https://attack.mitre.org/techniques/T1067' },
	T1068: {
		name: 'Exploitation for Privilege Escalation',
		id: 'T1068',
		url: 'https://attack.mitre.org/techniques/T1068',
	},
	T1069: {
		name: 'Permission Groups Discovery',
		id: 'T1069',
		url: 'https://attack.mitre.org/techniques/T1069',
		subTechniques: ['001', '002', '003'],
	},
	'T1069.001': {
		name: 'Local Groups',
		id: 'T1069.001',
		url: 'https://attack.mitre.org/techniques/T1069/001',
		parentTechnique: 'T1069',
	},
	'T1069.002': {
		name: 'Domain Groups',
		id: 'T1069.002',
		url: 'https://attack.mitre.org/techniques/T1069/002',
		parentTechnique: 'T1069',
	},
	'T1069.003': {
		name: 'Cloud Groups',
		id: 'T1069.003',
		url: 'https://attack.mitre.org/techniques/T1069/003',
		parentTechnique: 'T1069',
	},
	T1070: {
		name: 'Indicator Removal',
		id: 'T1070',
		url: 'https://attack.mitre.org/techniques/T1070',
		subTechniques: ['001', '002', '003', '004', '005', '006', '007', '008', '009'],
	},
	'T1070.001': {
		name: 'Clear Windows Event Logs',
		id: 'T1070.001',
		url: 'https://attack.mitre.org/techniques/T1070/001',
		parentTechnique: 'T1070',
	},
	'T1070.002': {
		name: 'Clear Linux or Mac System Logs',
		id: 'T1070.002',
		url: 'https://attack.mitre.org/techniques/T1070/002',
		parentTechnique: 'T1070',
	},
	'T1070.003': {
		name: 'Clear Command History',
		id: 'T1070.003',
		url: 'https://attack.mitre.org/techniques/T1070/003',
		parentTechnique: 'T1070',
	},
	'T1070.004': {
		name: 'File Deletion',
		id: 'T1070.004',
		url: 'https://attack.mitre.org/techniques/T1070/004',
		parentTechnique: 'T1070',
	},
	'T1070.005': {
		name: 'Network Share Connection Removal',
		id: 'T1070.005',
		url: 'https://attack.mitre.org/techniques/T1070/005',
		parentTechnique: 'T1070',
	},
	'T1070.006': {
		name: 'Timestomp',
		id: 'T1070.006',
		url: 'https://attack.mitre.org/techniques/T1070/006',
		parentTechnique: 'T1070',
	},
	'T1070.007': {
		name: 'Clear Network Connection History and Configurations',
		id: 'T1070.007',
		url: 'https://attack.mitre.org/techniques/T1070/007',
		parentTechnique: 'T1070',
	},
	'T1070.008': {
		name: 'Clear Mailbox Data',
		id: 'T1070.008',
		url: 'https://attack.mitre.org/techniques/T1070/008',
		parentTechnique: 'T1070',
	},
	'T1070.009': {
		name: 'Clear Persistence',
		id: 'T1070.009',
		url: 'https://attack.mitre.org/techniques/T1070/009',
		parentTechnique: 'T1070',
	},
	T1071: {
		subTechniques: ['001', '002', '003', '004'],
		name: 'Application Layer Protocol',
		id: 'T1071',
		url: 'https://attack.mitre.org/techniques/T1071',
	},
	'T1071.001': {
		name: 'Web Protocols',
		id: 'T1071.001',
		url: 'https://attack.mitre.org/techniques/T1071/001',
		parentTechnique: 'T1071',
	},
	'T1071.002': {
		name: 'File Transfer Protocols',
		id: 'T1071.002',
		url: 'https://attack.mitre.org/techniques/T1071/002',
		parentTechnique: 'T1071',
	},
	'T1071.003': {
		name: 'Mail Protocols',
		id: 'T1071.003',
		url: 'https://attack.mitre.org/techniques/T1071/003',
		parentTechnique: 'T1071',
	},
	'T1071.004': {
		name: 'DNS',
		id: 'T1071.004',
		url: 'https://attack.mitre.org/techniques/T1071/004',
		parentTechnique: 'T1071',
	},
	T1072: { name: 'Software Deployment Tools', id: 'T1072', url: 'https://attack.mitre.org/techniques/T1072' },
	T1073: { name: 'DLL Side-Loading', id: 'T1073', url: 'https://attack.mitre.org/techniques/T1073' },
	T1074: {
		name: 'Data Staged',
		id: 'T1074',
		url: 'https://attack.mitre.org/techniques/T1074',
		subTechniques: ['001', '002'],
	},
	'T1074.001': {
		name: 'Local Data Staging',
		id: 'T1074.001',
		url: 'https://attack.mitre.org/techniques/T1074/001',
		parentTechnique: 'T1074',
	},
	'T1074.002': {
		name: 'Remote Data Staging',
		id: 'T1074.002',
		url: 'https://attack.mitre.org/techniques/T1074/002',
		parentTechnique: 'T1074',
	},
	T1075: { name: 'Pass the Hash', id: 'T1075', url: 'https://attack.mitre.org/techniques/T1075' },
	T1076: { name: 'Remote Desktop Protocol', id: 'T1076', url: 'https://attack.mitre.org/techniques/T1076' },
	T1077: { name: 'Windows Admin Shares', id: 'T1077', url: 'https://attack.mitre.org/techniques/T1077' },
	T1078: {
		name: 'Valid Accounts',
		id: 'T1078',
		url: 'https://attack.mitre.org/techniques/T1078',
		subTechniques: ['001', '002', '003', '004'],
	},
	'T1078.001': {
		name: 'Default Accounts',
		id: 'T1078.001',
		url: 'https://attack.mitre.org/techniques/T1078/001',
		parentTechnique: 'T1078',
	},
	'T1078.002': {
		name: 'Domain Accounts',
		id: 'T1078.002',
		url: 'https://attack.mitre.org/techniques/T1078/002',
		parentTechnique: 'T1078',
	},
	'T1078.003': {
		name: 'Local Accounts',
		id: 'T1078.003',
		url: 'https://attack.mitre.org/techniques/T1078/003',
		parentTechnique: 'T1078',
	},
	'T1078.004': {
		name: 'Cloud Accounts',
		id: 'T1078.004',
		url: 'https://attack.mitre.org/techniques/T1078/004',
		parentTechnique: 'T1078',
	},
	T1079: { name: 'Multilayer Encryption', id: 'T1079', url: 'https://attack.mitre.org/techniques/T1079' },
	T1080: { name: 'Taint Shared Content', id: 'T1080', url: 'https://attack.mitre.org/techniques/T1080' },
	T1081: { name: 'Credentials in Files', id: 'T1081', url: 'https://attack.mitre.org/techniques/T1081' },
	T1082: { name: 'System Information Discovery', id: 'T1082', url: 'https://attack.mitre.org/techniques/T1082' },
	T1083: { name: 'File and Directory Discovery', id: 'T1083', url: 'https://attack.mitre.org/techniques/T1083' },
	T1084: {
		name: 'Windows Management Instrumentation Event Subscription',
		id: 'T1084',
		url: 'https://attack.mitre.org/techniques/T1084',
	},
	T1085: { name: 'Rundll32', id: 'T1085', url: 'https://attack.mitre.org/techniques/T1085' },
	T1086: { name: 'PowerShell', id: 'T1086', url: 'https://attack.mitre.org/techniques/T1086' },
	T1087: {
		name: 'Account Discovery',
		id: 'T1087',
		url: 'https://attack.mitre.org/techniques/T1087',
		subTechniques: ['001', '002', '003', '004'],
	},
	'T1087.001': {
		name: 'Local Account',
		id: 'T1087.001',
		url: 'https://attack.mitre.org/techniques/T1087/001',
		parentTechnique: 'T1087',
	},
	'T1087.002': {
		name: 'Domain Account',
		id: 'T1087.002',
		url: 'https://attack.mitre.org/techniques/T1087/002',
		parentTechnique: 'T1087',
	},
	'T1087.003': {
		name: 'Email Account',
		id: 'T1087.003',
		url: 'https://attack.mitre.org/techniques/T1087/003',
		parentTechnique: 'T1087',
	},
	'T1087.004': {
		name: 'Cloud Account',
		id: 'T1087.004',
		url: 'https://attack.mitre.org/techniques/T1087/004',
		parentTechnique: 'T1087',
	},
	T1088: { name: 'Bypass User Account Control', id: 'T1088', url: 'https://attack.mitre.org/techniques/T1088' },
	T1089: { name: 'Disabling Security Tools', id: 'T1089', url: 'https://attack.mitre.org/techniques/T1089' },
	T1090: {
		subTechniques: ['001', '002', '003', '004'],
		name: 'Proxy',
		id: 'T1090',
		url: 'https://attack.mitre.org/techniques/T1090',
	},
	'T1090.001': {
		name: 'Internal Proxy',
		id: 'T1090.001',
		url: 'https://attack.mitre.org/techniques/T1090/001',
		parentTechnique: 'T1090',
	},
	'T1090.002': {
		name: 'External Proxy',
		id: 'T1090.002',
		url: 'https://attack.mitre.org/techniques/T1090/002',
		parentTechnique: 'T1090',
	},
	'T1090.003': {
		name: 'Multi-hop Proxy',
		id: 'T1090.003',
		url: 'https://attack.mitre.org/techniques/T1090/003',
		parentTechnique: 'T1090',
	},
	'T1090.004': {
		name: 'Domain Fronting',
		id: 'T1090.004',
		url: 'https://attack.mitre.org/techniques/T1090/004',
		parentTechnique: 'T1090',
	},
	T1091: { name: 'Replication Through Removable Media', id: 'T1091', url: 'https://attack.mitre.org/techniques/T1091' },
	T1092: {
		name: 'Communication Through Removable Media',
		id: 'T1092',
		url: 'https://attack.mitre.org/techniques/T1092',
	},
	T1093: { name: 'Process Hollowing', id: 'T1093', url: 'https://attack.mitre.org/techniques/T1093' },
	T1094: { name: 'Custom Command and Control Protocol', id: 'T1094', url: 'https://attack.mitre.org/techniques/T1094' },
	T1095: { name: 'Non-Application Layer Protocol', id: 'T1095', url: 'https://attack.mitre.org/techniques/T1095' },
	T1096: { name: 'NTFS File Attributes', id: 'T1096', url: 'https://attack.mitre.org/techniques/T1096' },
	T1097: { name: 'Pass the Ticket', id: 'T1097', url: 'https://attack.mitre.org/techniques/T1097' },
	T1098: {
		subTechniques: ['001', '002', '003', '004', '005'],
		name: 'Account Manipulation',
		id: 'T1098',
		url: 'https://attack.mitre.org/techniques/T1098',
	},
	'T1098.001': {
		name: 'Additional Cloud Credentials',
		id: 'T1098.001',
		url: 'https://attack.mitre.org/techniques/T1098/001',
		parentTechnique: 'T1098',
	},
	'T1098.002': {
		name: 'Additional Email Delegate Permissions',
		id: 'T1098.002',
		url: 'https://attack.mitre.org/techniques/T1098/002',
		parentTechnique: 'T1098',
	},
	'T1098.003': {
		name: 'Additional Cloud Roles',
		id: 'T1098.003',
		url: 'https://attack.mitre.org/techniques/T1098/003',
		parentTechnique: 'T1098',
	},
	'T1098.004': {
		name: 'SSH Authorized Keys',
		id: 'T1098.004',
		url: 'https://attack.mitre.org/techniques/T1098/004',
		parentTechnique: 'T1098',
	},
	'T1098.005': {
		name: 'Device Registration',
		id: 'T1098.005',
		url: 'https://attack.mitre.org/techniques/T1098/005',
		parentTechnique: 'T1098',
	},
	T1099: { name: 'Timestomp', id: 'T1099', url: 'https://attack.mitre.org/techniques/T1099' },
	T1100: { name: 'Web Shell', id: 'T1100', url: 'https://attack.mitre.org/techniques/T1100' },
	T1101: { name: 'Security Support Provider', id: 'T1101', url: 'https://attack.mitre.org/techniques/T1101' },
	T1102: {
		name: 'Web Service',
		id: 'T1102',
		url: 'https://attack.mitre.org/techniques/T1102',
		subTechniques: ['001', '002', '003'],
	},
	'T1102.001': {
		name: 'Dead Drop Resolver',
		id: 'T1102.001',
		url: 'https://attack.mitre.org/techniques/T1102/001',
		parentTechnique: 'T1102',
	},
	'T1102.002': {
		name: 'Bidirectional Communication',
		id: 'T1102.002',
		url: 'https://attack.mitre.org/techniques/T1102/002',
		parentTechnique: 'T1102',
	},
	'T1102.003': {
		name: 'One-Way Communication',
		id: 'T1102.003',
		url: 'https://attack.mitre.org/techniques/T1102/003',
		parentTechnique: 'T1102',
	},
	T1103: { name: 'AppInit DLLs', id: 'T1103', url: 'https://attack.mitre.org/techniques/T1103' },
	T1104: { name: 'Multi-Stage Channels', id: 'T1104', url: 'https://attack.mitre.org/techniques/T1104' },
	T1105: { name: 'Ingress Tool Transfer', id: 'T1105', url: 'https://attack.mitre.org/techniques/T1105' },
	T1106: { name: 'Native API', id: 'T1106', url: 'https://attack.mitre.org/techniques/T1106' },
	T1107: { name: 'File Deletion', id: 'T1107', url: 'https://attack.mitre.org/techniques/T1107' },
	T1108: { name: 'Redundant Access', id: 'T1108', url: 'https://attack.mitre.org/techniques/T1108' },
	T1109: { name: 'Component Firmware', id: 'T1109', url: 'https://attack.mitre.org/techniques/T1109' },
	T1110: {
		name: 'Brute Force',
		id: 'T1110',
		url: 'https://attack.mitre.org/techniques/T1110',
		subTechniques: ['001', '002', '003', '004'],
	},
	'T1110.001': {
		name: 'Password Guessing',
		id: 'T1110.001',
		url: 'https://attack.mitre.org/techniques/T1110/001',
		parentTechnique: 'T1110',
	},
	'T1110.002': {
		name: 'Password Cracking',
		id: 'T1110.002',
		url: 'https://attack.mitre.org/techniques/T1110/002',
		parentTechnique: 'T1110',
	},
	'T1110.003': {
		name: 'Password Spraying',
		id: 'T1110.003',
		url: 'https://attack.mitre.org/techniques/T1110/003',
		parentTechnique: 'T1110',
	},
	'T1110.004': {
		name: 'Credential Stuffing',
		id: 'T1110.004',
		url: 'https://attack.mitre.org/techniques/T1110/004',
		parentTechnique: 'T1110',
	},
	T1111: {
		name: 'Multi-Factor Authentication Interception',
		id: 'T1111',
		url: 'https://attack.mitre.org/techniques/T1111',
	},
	T1112: { name: 'Modify Registry', id: 'T1112', url: 'https://attack.mitre.org/techniques/T1112' },
	T1113: { name: 'Screen Capture', id: 'T1113', url: 'https://attack.mitre.org/techniques/T1113' },
	T1114: {
		name: 'Email Collection',
		id: 'T1114',
		url: 'https://attack.mitre.org/techniques/T1114',
		subTechniques: ['001', '002', '003'],
	},
	'T1114.001': {
		name: 'Local Email Collection',
		id: 'T1114.001',
		url: 'https://attack.mitre.org/techniques/T1114/001',
		parentTechnique: 'T1114',
	},
	'T1114.002': {
		name: 'Remote Email Collection',
		id: 'T1114.002',
		url: 'https://attack.mitre.org/techniques/T1114/002',
		parentTechnique: 'T1114',
	},
	'T1114.003': {
		name: 'Email Forwarding Rule',
		id: 'T1114.003',
		url: 'https://attack.mitre.org/techniques/T1114/003',
		parentTechnique: 'T1114',
	},
	T1115: { name: 'Clipboard Data', id: 'T1115', url: 'https://attack.mitre.org/techniques/T1115' },
	T1116: { name: 'Code Signing', id: 'T1116', url: 'https://attack.mitre.org/techniques/T1116' },
	T1117: { name: 'Regsvr32', id: 'T1117', url: 'https://attack.mitre.org/techniques/T1117' },
	T1118: { name: 'InstallUtil', id: 'T1118', url: 'https://attack.mitre.org/techniques/T1118' },
	T1119: { name: 'Automated Collection', id: 'T1119', url: 'https://attack.mitre.org/techniques/T1119' },
	T1120: { name: 'Peripheral Device Discovery', id: 'T1120', url: 'https://attack.mitre.org/techniques/T1120' },
	T1121: { name: 'Regsvcs/Regasm', id: 'T1121', url: 'https://attack.mitre.org/techniques/T1121' },
	T1122: { name: 'Component Object Model Hijacking', id: 'T1122', url: 'https://attack.mitre.org/techniques/T1122' },
	T1123: { name: 'Audio Capture', id: 'T1123', url: 'https://attack.mitre.org/techniques/T1123' },
	T1124: { name: 'System Time Discovery', id: 'T1124', url: 'https://attack.mitre.org/techniques/T1124' },
	T1125: { name: 'Video Capture', id: 'T1125', url: 'https://attack.mitre.org/techniques/T1125' },
	T1126: { name: 'Network Share Connection Removal', id: 'T1126', url: 'https://attack.mitre.org/techniques/T1126' },
	T1127: {
		subTechniques: ['001'],
		name: 'Trusted Developer Utilities Proxy Execution',
		id: 'T1127',
		url: 'https://attack.mitre.org/techniques/T1127',
	},
	'T1127.001': {
		name: 'MSBuild',
		id: 'T1127.001',
		url: 'https://attack.mitre.org/techniques/T1127/001',
		parentTechnique: 'T1127',
	},
	T1128: { name: 'Netsh Helper DLL', id: 'T1128', url: 'https://attack.mitre.org/techniques/T1128' },
	T1129: { name: 'Shared Modules', id: 'T1129', url: 'https://attack.mitre.org/techniques/T1129' },
	T1130: { name: 'Install Root Certificate', id: 'T1130', url: 'https://attack.mitre.org/techniques/T1130' },
	T1131: { name: 'Authentication Package', id: 'T1131', url: 'https://attack.mitre.org/techniques/T1131' },
	T1132: {
		name: 'Data Encoding',
		id: 'T1132',
		url: 'https://attack.mitre.org/techniques/T1132',
		subTechniques: ['001', '002'],
	},
	'T1132.001': {
		name: 'Standard Encoding',
		id: 'T1132.001',
		url: 'https://attack.mitre.org/techniques/T1132/001',
		parentTechnique: 'T1132',
	},
	'T1132.002': {
		name: 'Non-Standard Encoding',
		id: 'T1132.002',
		url: 'https://attack.mitre.org/techniques/T1132/002',
		parentTechnique: 'T1132',
	},
	T1133: { name: 'External Remote Services', id: 'T1133', url: 'https://attack.mitre.org/techniques/T1133' },
	T1134: {
		name: 'Access Token Manipulation',
		id: 'T1134',
		url: 'https://attack.mitre.org/techniques/T1134',
		subTechniques: ['001', '002', '003', '004', '005'],
	},
	'T1134.001': {
		name: 'Token Impersonation/Theft',
		id: 'T1134.001',
		url: 'https://attack.mitre.org/techniques/T1134/001',
		parentTechnique: 'T1134',
	},
	'T1134.002': {
		name: 'Create Process with Token',
		id: 'T1134.002',
		url: 'https://attack.mitre.org/techniques/T1134/002',
		parentTechnique: 'T1134',
	},
	'T1134.003': {
		name: 'Make and Impersonate Token',
		id: 'T1134.003',
		url: 'https://attack.mitre.org/techniques/T1134/003',
		parentTechnique: 'T1134',
	},
	'T1134.004': {
		name: 'Parent PID Spoofing',
		id: 'T1134.004',
		url: 'https://attack.mitre.org/techniques/T1134/004',
		parentTechnique: 'T1134',
	},
	'T1134.005': {
		name: 'SID-History Injection',
		id: 'T1134.005',
		url: 'https://attack.mitre.org/techniques/T1134/005',
		parentTechnique: 'T1134',
	},
	T1135: { name: 'Network Share Discovery', id: 'T1135', url: 'https://attack.mitre.org/techniques/T1135' },
	T1136: {
		name: 'Create Account',
		id: 'T1136',
		url: 'https://attack.mitre.org/techniques/T1136',
		subTechniques: ['001', '002', '003'],
	},
	'T1136.001': {
		name: 'Local Account',
		id: 'T1136.001',
		url: 'https://attack.mitre.org/techniques/T1136/001',
		parentTechnique: 'T1136',
	},
	'T1136.002': {
		name: 'Domain Account',
		id: 'T1136.002',
		url: 'https://attack.mitre.org/techniques/T1136/002',
		parentTechnique: 'T1136',
	},
	'T1136.003': {
		name: 'Cloud Account',
		id: 'T1136.003',
		url: 'https://attack.mitre.org/techniques/T1136/003',
		parentTechnique: 'T1136',
	},
	T1137: {
		name: 'Office Application Startup',
		id: 'T1137',
		url: 'https://attack.mitre.org/techniques/T1137',
		subTechniques: ['001', '002', '003', '004', '005', '006'],
	},
	'T1137.001': {
		name: 'Office Template Macros',
		id: 'T1137.001',
		url: 'https://attack.mitre.org/techniques/T1137/001',
		parentTechnique: 'T1137',
	},
	'T1137.002': {
		name: 'Office Test',
		id: 'T1137.002',
		url: 'https://attack.mitre.org/techniques/T1137/002',
		parentTechnique: 'T1137',
	},
	'T1137.003': {
		name: 'Outlook Forms',
		id: 'T1137.003',
		url: 'https://attack.mitre.org/techniques/T1137/003',
		parentTechnique: 'T1137',
	},
	'T1137.004': {
		name: 'Outlook Home Page',
		id: 'T1137.004',
		url: 'https://attack.mitre.org/techniques/T1137/004',
		parentTechnique: 'T1137',
	},
	'T1137.005': {
		name: 'Outlook Rules',
		id: 'T1137.005',
		url: 'https://attack.mitre.org/techniques/T1137/005',
		parentTechnique: 'T1137',
	},
	'T1137.006': {
		name: 'Add-ins',
		id: 'T1137.006',
		url: 'https://attack.mitre.org/techniques/T1137/006',
		parentTechnique: 'T1137',
	},
	T1138: { name: 'Application Shimming', id: 'T1138', url: 'https://attack.mitre.org/techniques/T1138' },
	T1139: { name: 'Bash History', id: 'T1139', url: 'https://attack.mitre.org/techniques/T1139' },
	T1140: {
		name: 'Deobfuscate/Decode Files or Information',
		id: 'T1140',
		url: 'https://attack.mitre.org/techniques/T1140',
	},
	T1141: { name: 'Input Prompt', id: 'T1141', url: 'https://attack.mitre.org/techniques/T1141' },
	T1142: { name: 'Keychain', id: 'T1142', url: 'https://attack.mitre.org/techniques/T1142' },
	T1143: { name: 'Hidden Window', id: 'T1143', url: 'https://attack.mitre.org/techniques/T1143' },
	T1144: { name: 'Gatekeeper Bypass', id: 'T1144', url: 'https://attack.mitre.org/techniques/T1144' },
	T1145: { name: 'Private Keys', id: 'T1145', url: 'https://attack.mitre.org/techniques/T1145' },
	T1146: { name: 'Clear Command History', id: 'T1146', url: 'https://attack.mitre.org/techniques/T1146' },
	T1147: { name: 'Hidden Users', id: 'T1147', url: 'https://attack.mitre.org/techniques/T1147' },
	T1148: { name: 'HISTCONTROL', id: 'T1148', url: 'https://attack.mitre.org/techniques/T1148' },
	T1149: { name: 'LC_MAIN Hijacking', id: 'T1149', url: 'https://attack.mitre.org/techniques/T1149' },
	T1150: { name: 'Plist Modification', id: 'T1150', url: 'https://attack.mitre.org/techniques/T1150' },
	T1151: { name: 'Space after Filename', id: 'T1151', url: 'https://attack.mitre.org/techniques/T1151' },
	T1152: { name: 'Launchctl', id: 'T1152', url: 'https://attack.mitre.org/techniques/T1152' },
	T1153: { name: 'Source', id: 'T1153', url: 'https://attack.mitre.org/techniques/T1153' },
	T1154: { name: 'Trap', id: 'T1154', url: 'https://attack.mitre.org/techniques/T1154' },
	T1155: { name: 'AppleScript', id: 'T1155', url: 'https://attack.mitre.org/techniques/T1155' },
	T1156: { name: 'Malicious Shell Modification', id: 'T1156', url: 'https://attack.mitre.org/techniques/T1156' },
	T1157: { name: 'Dylib Hijacking', id: 'T1157', url: 'https://attack.mitre.org/techniques/T1157' },
	T1158: { name: 'Hidden Files and Directories', id: 'T1158', url: 'https://attack.mitre.org/techniques/T1158' },
	T1159: { name: 'Launch Agent', id: 'T1159', url: 'https://attack.mitre.org/techniques/T1159' },
	T1160: { name: 'Launch Daemon', id: 'T1160', url: 'https://attack.mitre.org/techniques/T1160' },
	T1161: { name: 'LC_LOAD_DYLIB Addition', id: 'T1161', url: 'https://attack.mitre.org/techniques/T1161' },
	T1162: { name: 'Login Item', id: 'T1162', url: 'https://attack.mitre.org/techniques/T1162' },
	T1163: { name: 'Rc.common', id: 'T1163', url: 'https://attack.mitre.org/techniques/T1163' },
	T1164: { name: 'Re-opened Applications', id: 'T1164', url: 'https://attack.mitre.org/techniques/T1164' },
	T1165: { name: 'Startup Items', id: 'T1165', url: 'https://attack.mitre.org/techniques/T1165' },
	T1166: { name: 'Setuid and Setgid', id: 'T1166', url: 'https://attack.mitre.org/techniques/T1166' },
	T1167: { name: 'Securityd Memory', id: 'T1167', url: 'https://attack.mitre.org/techniques/T1167' },
	T1168: { name: 'Local Job Scheduling', id: 'T1168', url: 'https://attack.mitre.org/techniques/T1168' },
	T1169: { name: 'Sudo', id: 'T1169', url: 'https://attack.mitre.org/techniques/T1169' },
	T1170: { name: 'Mshta', id: 'T1170', url: 'https://attack.mitre.org/techniques/T1170' },
	T1171: { name: 'LLMNR/NBT-NS Poisoning and Relay', id: 'T1171', url: 'https://attack.mitre.org/techniques/T1171' },
	T1172: { name: 'Domain Fronting', id: 'T1172', url: 'https://attack.mitre.org/techniques/T1172' },
	T1173: { name: 'Dynamic Data Exchange', id: 'T1173', url: 'https://attack.mitre.org/techniques/T1173' },
	T1174: { name: 'Password Filter DLL', id: 'T1174', url: 'https://attack.mitre.org/techniques/T1174' },
	T1175: {
		name: 'Component Object Model and Distributed COM',
		id: 'T1175',
		url: 'https://attack.mitre.org/techniques/T1175',
	},
	T1176: { name: 'Browser Extensions', id: 'T1176', url: 'https://attack.mitre.org/techniques/T1176' },
	T1177: { name: 'LSASS Driver', id: 'T1177', url: 'https://attack.mitre.org/techniques/T1177' },
	T1178: { name: 'SID-History Injection', id: 'T1178', url: 'https://attack.mitre.org/techniques/T1178' },
	T1179: { name: 'Hooking', id: 'T1179', url: 'https://attack.mitre.org/techniques/T1179' },
	T1180: { name: 'Screensaver', id: 'T1180', url: 'https://attack.mitre.org/techniques/T1180' },
	T1181: { name: 'Extra Window Memory Injection', id: 'T1181', url: 'https://attack.mitre.org/techniques/T1181' },
	T1182: { name: 'AppCert DLLs', id: 'T1182', url: 'https://attack.mitre.org/techniques/T1182' },
	T1183: {
		name: 'Image File Execution Options Injection',
		id: 'T1183',
		url: 'https://attack.mitre.org/techniques/T1183',
	},
	T1184: { name: 'SSH Hijacking', id: 'T1184', url: 'https://attack.mitre.org/techniques/T1184' },
	T1185: { name: 'Browser Session Hijacking', id: 'T1185', url: 'https://attack.mitre.org/techniques/T1185' },
	T1186: { name: 'Process Doppelgänging', id: 'T1186', url: 'https://attack.mitre.org/techniques/T1186' },
	T1187: { name: 'Forced Authentication', id: 'T1187', url: 'https://attack.mitre.org/techniques/T1187' },
	T1188: { name: 'Multi-hop Proxy', id: 'T1188', url: 'https://attack.mitre.org/techniques/T1188' },
	T1189: { name: 'Drive-by Compromise', id: 'T1189', url: 'https://attack.mitre.org/techniques/T1189' },
	T1190: { name: 'Exploit Public-Facing Application', id: 'T1190', url: 'https://attack.mitre.org/techniques/T1190' },
	T1191: { name: 'CMSTP', id: 'T1191', url: 'https://attack.mitre.org/techniques/T1191' },
	T1192: { name: 'Spearphishing Link', id: 'T1192', url: 'https://attack.mitre.org/techniques/T1192' },
	T1193: { name: 'Spearphishing Attachment', id: 'T1193', url: 'https://attack.mitre.org/techniques/T1193' },
	T1194: { name: 'Spearphishing via Service', id: 'T1194', url: 'https://attack.mitre.org/techniques/T1194' },
	T1195: {
		name: 'Supply Chain Compromise',
		id: 'T1195',
		url: 'https://attack.mitre.org/techniques/T1195',
		subTechniques: ['001', '002', '003'],
	},
	'T1195.001': {
		name: 'Compromise Software Dependencies and Development Tools',
		id: 'T1195.001',
		url: 'https://attack.mitre.org/techniques/T1195/001',
		parentTechnique: 'T1195',
	},
	'T1195.002': {
		name: 'Compromise Software Supply Chain',
		id: 'T1195.002',
		url: 'https://attack.mitre.org/techniques/T1195/002',
		parentTechnique: 'T1195',
	},
	'T1195.003': {
		name: 'Compromise Hardware Supply Chain',
		id: 'T1195.003',
		url: 'https://attack.mitre.org/techniques/T1195/003',
		parentTechnique: 'T1195',
	},
	T1196: { name: 'Control Panel Items', id: 'T1196', url: 'https://attack.mitre.org/techniques/T1196' },
	T1197: { name: 'BITS Jobs', id: 'T1197', url: 'https://attack.mitre.org/techniques/T1197' },
	T1198: { name: 'SIP and Trust Provider Hijacking', id: 'T1198', url: 'https://attack.mitre.org/techniques/T1198' },
	T1199: { name: 'Trusted Relationship', id: 'T1199', url: 'https://attack.mitre.org/techniques/T1199' },
	T1200: { name: 'Hardware Additions', id: 'T1200', url: 'https://attack.mitre.org/techniques/T1200' },
	T1201: { name: 'Password Policy Discovery', id: 'T1201', url: 'https://attack.mitre.org/techniques/T1201' },
	T1202: { name: 'Indirect Command Execution', id: 'T1202', url: 'https://attack.mitre.org/techniques/T1202' },
	T1203: { name: 'Exploitation for Client Execution', id: 'T1203', url: 'https://attack.mitre.org/techniques/T1203' },
	T1204: {
		name: 'User Execution',
		id: 'T1204',
		url: 'https://attack.mitre.org/techniques/T1204',
		subTechniques: ['001', '002', '003'],
	},
	'T1204.001': {
		name: 'Malicious Link',
		id: 'T1204.001',
		url: 'https://attack.mitre.org/techniques/T1204/001',
		parentTechnique: 'T1204',
	},
	'T1204.002': {
		name: 'Malicious File',
		id: 'T1204.002',
		url: 'https://attack.mitre.org/techniques/T1204/002',
		parentTechnique: 'T1204',
	},
	'T1204.003': {
		name: 'Malicious Image',
		id: 'T1204.003',
		url: 'https://attack.mitre.org/techniques/T1204/003',
		parentTechnique: 'T1204',
	},
	T1205: {
		name: 'Traffic Signaling',
		id: 'T1205',
		url: 'https://attack.mitre.org/techniques/T1205',
		subTechniques: ['001', '002'],
	},
	'T1205.001': {
		name: 'Port Knocking',
		id: 'T1205.001',
		url: 'https://attack.mitre.org/techniques/T1205/001',
		parentTechnique: 'T1205',
	},
	'T1205.002': {
		name: 'Socket Filters',
		id: 'T1205.002',
		url: 'https://attack.mitre.org/techniques/T1205/002',
		parentTechnique: 'T1205',
	},
	T1206: { name: 'Sudo Caching', id: 'T1206', url: 'https://attack.mitre.org/techniques/T1206' },
	T1207: { name: 'Rogue Domain Controller', id: 'T1207', url: 'https://attack.mitre.org/techniques/T1207' },
	T1208: { name: 'Kerberoasting', id: 'T1208', url: 'https://attack.mitre.org/techniques/T1208' },
	T1209: { name: 'Time Providers', id: 'T1209', url: 'https://attack.mitre.org/techniques/T1209' },
	T1210: { name: 'Exploitation of Remote Services', id: 'T1210', url: 'https://attack.mitre.org/techniques/T1210' },
	T1211: { name: 'Exploitation for Defense Evasion', id: 'T1211', url: 'https://attack.mitre.org/techniques/T1211' },
	T1212: { name: 'Exploitation for Credential Access', id: 'T1212', url: 'https://attack.mitre.org/techniques/T1212' },
	T1213: {
		name: 'Data from Information Repositories',
		id: 'T1213',
		url: 'https://attack.mitre.org/techniques/T1213',
		subTechniques: ['001', '002', '003'],
	},
	'T1213.001': {
		name: 'Confluence',
		id: 'T1213.001',
		url: 'https://attack.mitre.org/techniques/T1213/001',
		parentTechnique: 'T1213',
	},
	'T1213.002': {
		name: 'Sharepoint',
		id: 'T1213.002',
		url: 'https://attack.mitre.org/techniques/T1213/002',
		parentTechnique: 'T1213',
	},
	'T1213.003': {
		name: 'Code Repositories',
		id: 'T1213.003',
		url: 'https://attack.mitre.org/techniques/T1213/003',
		parentTechnique: 'T1213',
	},
	T1214: { name: 'Credentials in Registry', id: 'T1214', url: 'https://attack.mitre.org/techniques/T1214' },
	T1215: { name: 'Kernel Modules and Extensions', id: 'T1215', url: 'https://attack.mitre.org/techniques/T1215' },
	T1216: {
		name: 'System Script Proxy Execution',
		id: 'T1216',
		url: 'https://attack.mitre.org/techniques/T1216',
		subTechniques: ['001'],
	},
	'T1216.001': {
		name: 'PubPrn',
		id: 'T1216.001',
		url: 'https://attack.mitre.org/techniques/T1216/001',
		parentTechnique: 'T1216',
	},
	T1217: { name: 'Browser Bookmark Discovery', id: 'T1217', url: 'https://attack.mitre.org/techniques/T1217' },
	T1218: {
		subTechniques: ['001', '002', '003', '004', '005', '007', '008', '009', '010', '011', '012', '013', '014'],
		name: 'System Binary Proxy Execution',
		id: 'T1218',
		url: 'https://attack.mitre.org/techniques/T1218',
	},
	'T1218.001': {
		name: 'Compiled HTML File',
		id: 'T1218.001',
		url: 'https://attack.mitre.org/techniques/T1218/001',
		parentTechnique: 'T1218',
	},
	'T1218.002': {
		name: 'Control Panel',
		id: 'T1218.002',
		url: 'https://attack.mitre.org/techniques/T1218/002',
		parentTechnique: 'T1218',
	},
	'T1218.003': {
		name: 'CMSTP',
		id: 'T1218.003',
		url: 'https://attack.mitre.org/techniques/T1218/003',
		parentTechnique: 'T1218',
	},
	'T1218.004': {
		name: 'InstallUtil',
		id: 'T1218.004',
		url: 'https://attack.mitre.org/techniques/T1218/004',
		parentTechnique: 'T1218',
	},
	'T1218.005': {
		name: 'Mshta',
		id: 'T1218.005',
		url: 'https://attack.mitre.org/techniques/T1218/005',
		parentTechnique: 'T1218',
	},
	'T1218.007': {
		name: 'Msiexec',
		id: 'T1218.007',
		url: 'https://attack.mitre.org/techniques/T1218/007',
		parentTechnique: 'T1218',
	},
	'T1218.008': {
		name: 'Odbcconf',
		id: 'T1218.008',
		url: 'https://attack.mitre.org/techniques/T1218/008',
		parentTechnique: 'T1218',
	},
	'T1218.009': {
		name: 'Regsvcs/Regasm',
		id: 'T1218.009',
		url: 'https://attack.mitre.org/techniques/T1218/009',
		parentTechnique: 'T1218',
	},
	'T1218.010': {
		name: 'Regsvr32',
		id: 'T1218.010',
		url: 'https://attack.mitre.org/techniques/T1218/010',
		parentTechnique: 'T1218',
	},
	'T1218.011': {
		name: 'Rundll32',
		id: 'T1218.011',
		url: 'https://attack.mitre.org/techniques/T1218/011',
		parentTechnique: 'T1218',
	},
	'T1218.012': {
		name: 'Verclsid',
		id: 'T1218.012',
		url: 'https://attack.mitre.org/techniques/T1218/012',
		parentTechnique: 'T1218',
	},
	'T1218.013': {
		name: 'Mavinject',
		id: 'T1218.013',
		url: 'https://attack.mitre.org/techniques/T1218/013',
		parentTechnique: 'T1218',
	},
	'T1218.014': {
		name: 'MMC',
		id: 'T1218.014',
		url: 'https://attack.mitre.org/techniques/T1218/014',
		parentTechnique: 'T1218',
	},
	T1219: { name: 'Remote Access Software', id: 'T1219', url: 'https://attack.mitre.org/techniques/T1219' },
	T1220: { name: 'XSL Script Processing', id: 'T1220', url: 'https://attack.mitre.org/techniques/T1220' },
	T1221: { name: 'Template Injection', id: 'T1221', url: 'https://attack.mitre.org/techniques/T1221' },
	T1222: {
		subTechniques: ['001', '002'],
		name: 'File and Directory Permissions Modification',
		id: 'T1222',
		url: 'https://attack.mitre.org/techniques/T1222',
	},
	'T1222.001': {
		name: 'Windows File and Directory Permissions Modification',
		id: 'T1222.001',
		url: 'https://attack.mitre.org/techniques/T1222/001',
		parentTechnique: 'T1222',
	},
	'T1222.002': {
		name: 'Linux and Mac File and Directory Permissions Modification',
		id: 'T1222.002',
		url: 'https://attack.mitre.org/techniques/T1222/002',
		parentTechnique: 'T1222',
	},
	T1223: { name: 'Compiled HTML File', id: 'T1223', url: 'https://attack.mitre.org/techniques/T1223' },
	T1480: {
		name: 'Execution Guardrails',
		id: 'T1480',
		url: 'https://attack.mitre.org/techniques/T1480',
		subTechniques: ['001'],
	},
	'T1480.001': {
		name: 'Environmental Keying',
		id: 'T1480.001',
		url: 'https://attack.mitre.org/techniques/T1480/001',
		parentTechnique: 'T1480',
	},
	T1482: { name: 'Domain Trust Discovery', id: 'T1482', url: 'https://attack.mitre.org/techniques/T1482' },
	T1483: { name: 'Domain Generation Algorithms', id: 'T1483', url: 'https://attack.mitre.org/techniques/T1483' },
	T1484: {
		subTechniques: ['001', '002'],
		name: 'Domain Policy Modification',
		id: 'T1484',
		url: 'https://attack.mitre.org/techniques/T1484',
	},
	'T1484.001': {
		name: 'Group Policy Modification',
		id: 'T1484.001',
		url: 'https://attack.mitre.org/techniques/T1484/001',
		parentTechnique: 'T1484',
	},
	'T1484.002': {
		name: 'Domain Trust Modification',
		id: 'T1484.002',
		url: 'https://attack.mitre.org/techniques/T1484/002',
		parentTechnique: 'T1484',
	},
	T1485: { name: 'Data Destruction', id: 'T1485', url: 'https://attack.mitre.org/techniques/T1485' },
	T1486: { name: 'Data Encrypted for Impact', id: 'T1486', url: 'https://attack.mitre.org/techniques/T1486' },
	T1487: { name: 'Disk Structure Wipe', id: 'T1487', url: 'https://attack.mitre.org/techniques/T1487' },
	T1488: { name: 'Disk Content Wipe', id: 'T1488', url: 'https://attack.mitre.org/techniques/T1488' },
	T1489: { name: 'Service Stop', id: 'T1489', url: 'https://attack.mitre.org/techniques/T1489' },
	T1490: { name: 'Inhibit System Recovery', id: 'T1490', url: 'https://attack.mitre.org/techniques/T1490' },
	T1491: {
		name: 'Defacement',
		id: 'T1491',
		url: 'https://attack.mitre.org/techniques/T1491',
		subTechniques: ['001', '002'],
	},
	'T1491.001': {
		name: 'Internal Defacement',
		id: 'T1491.001',
		url: 'https://attack.mitre.org/techniques/T1491/001',
		parentTechnique: 'T1491',
	},
	'T1491.002': {
		name: 'External Defacement',
		id: 'T1491.002',
		url: 'https://attack.mitre.org/techniques/T1491/002',
		parentTechnique: 'T1491',
	},
	T1492: { name: 'Stored Data Manipulation', id: 'T1492', url: 'https://attack.mitre.org/techniques/T1492' },
	T1493: { name: 'Transmitted Data Manipulation', id: 'T1493', url: 'https://attack.mitre.org/techniques/T1493' },
	T1494: { name: 'Runtime Data Manipulation', id: 'T1494', url: 'https://attack.mitre.org/techniques/T1494' },
	T1495: { name: 'Firmware Corruption', id: 'T1495', url: 'https://attack.mitre.org/techniques/T1495' },
	T1496: { name: 'Resource Hijacking', id: 'T1496', url: 'https://attack.mitre.org/techniques/T1496' },
	T1497: {
		subTechniques: ['001', '002', '003'],
		name: 'Virtualization/Sandbox Evasion',
		id: 'T1497',
		url: 'https://attack.mitre.org/techniques/T1497',
	},
	'T1497.001': {
		name: 'System Checks',
		id: 'T1497.001',
		url: 'https://attack.mitre.org/techniques/T1497/001',
		parentTechnique: 'T1497',
	},
	'T1497.002': {
		name: 'User Activity Based Checks',
		id: 'T1497.002',
		url: 'https://attack.mitre.org/techniques/T1497/002',
		parentTechnique: 'T1497',
	},
	'T1497.003': {
		name: 'Time Based Evasion',
		id: 'T1497.003',
		url: 'https://attack.mitre.org/techniques/T1497/003',
		parentTechnique: 'T1497',
	},
	T1498: {
		name: 'Network Denial of Service',
		id: 'T1498',
		url: 'https://attack.mitre.org/techniques/T1498',
		subTechniques: ['001', '002'],
	},
	'T1498.001': {
		name: 'Direct Network Flood',
		id: 'T1498.001',
		url: 'https://attack.mitre.org/techniques/T1498/001',
		parentTechnique: 'T1498',
	},
	'T1498.002': {
		name: 'Reflection Amplification',
		id: 'T1498.002',
		url: 'https://attack.mitre.org/techniques/T1498/002',
		parentTechnique: 'T1498',
	},
	T1499: {
		name: 'Endpoint Denial of Service',
		id: 'T1499',
		url: 'https://attack.mitre.org/techniques/T1499',
		subTechniques: ['001', '002', '003', '004'],
	},
	'T1499.001': {
		name: 'OS Exhaustion Flood',
		id: 'T1499.001',
		url: 'https://attack.mitre.org/techniques/T1499/001',
		parentTechnique: 'T1499',
	},
	'T1499.002': {
		name: 'Service Exhaustion Flood',
		id: 'T1499.002',
		url: 'https://attack.mitre.org/techniques/T1499/002',
		parentTechnique: 'T1499',
	},
	'T1499.003': {
		name: 'Application Exhaustion Flood',
		id: 'T1499.003',
		url: 'https://attack.mitre.org/techniques/T1499/003',
		parentTechnique: 'T1499',
	},
	'T1499.004': {
		name: 'Application or System Exploitation',
		id: 'T1499.004',
		url: 'https://attack.mitre.org/techniques/T1499/004',
		parentTechnique: 'T1499',
	},
	T1500: { name: 'Compile After Delivery', id: 'T1500', url: 'https://attack.mitre.org/techniques/T1500' },
	T1501: { name: 'Systemd Service', id: 'T1501', url: 'https://attack.mitre.org/techniques/T1501' },
	T1502: { name: 'Parent PID Spoofing', id: 'T1502', url: 'https://attack.mitre.org/techniques/T1502' },
	T1503: { name: 'Credentials from Web Browsers', id: 'T1503', url: 'https://attack.mitre.org/techniques/T1503' },
	T1504: { name: 'PowerShell Profile', id: 'T1504', url: 'https://attack.mitre.org/techniques/T1504' },
	T1505: {
		subTechniques: ['001', '002', '003', '004', '005'],
		name: 'Server Software Component',
		id: 'T1505',
		url: 'https://attack.mitre.org/techniques/T1505',
	},
	'T1505.001': {
		name: 'SQL Stored Procedures',
		id: 'T1505.001',
		url: 'https://attack.mitre.org/techniques/T1505/001',
		parentTechnique: 'T1505',
	},
	'T1505.002': {
		name: 'Transport Agent',
		id: 'T1505.002',
		url: 'https://attack.mitre.org/techniques/T1505/002',
		parentTechnique: 'T1505',
	},
	'T1505.003': {
		name: 'Web Shell',
		id: 'T1505.003',
		url: 'https://attack.mitre.org/techniques/T1505/003',
		parentTechnique: 'T1505',
	},
	'T1505.004': {
		name: 'IIS Components',
		id: 'T1505.004',
		url: 'https://attack.mitre.org/techniques/T1505/004',
		parentTechnique: 'T1505',
	},
	'T1505.005': {
		name: 'Terminal Services DLL',
		id: 'T1505.005',
		url: 'https://attack.mitre.org/techniques/T1505/005',
		parentTechnique: 'T1505',
	},
	T1506: { name: 'Web Session Cookie', id: 'T1506', url: 'https://attack.mitre.org/techniques/T1506' },
	T1514: { name: 'Elevated Execution with Prompt', id: 'T1514', url: 'https://attack.mitre.org/techniques/T1514' },
	T1518: {
		subTechniques: ['001'],
		name: 'Software Discovery',
		id: 'T1518',
		url: 'https://attack.mitre.org/techniques/T1518',
	},
	'T1518.001': {
		name: 'Security Software Discovery',
		id: 'T1518.001',
		url: 'https://attack.mitre.org/techniques/T1518/001',
		parentTechnique: 'T1518',
	},
	T1519: { name: 'Emond', id: 'T1519', url: 'https://attack.mitre.org/techniques/T1519' },
	T1522: { name: 'Cloud Instance Metadata API', id: 'T1522', url: 'https://attack.mitre.org/techniques/T1522' },
	T1525: { name: 'Implant Internal Image', id: 'T1525', url: 'https://attack.mitre.org/techniques/T1525' },
	T1526: { name: 'Cloud Service Discovery', id: 'T1526', url: 'https://attack.mitre.org/techniques/T1526' },
	T1527: { name: 'Application Access Token', id: 'T1527', url: 'https://attack.mitre.org/techniques/T1527' },
	T1528: { name: 'Steal Application Access Token', id: 'T1528', url: 'https://attack.mitre.org/techniques/T1528' },
	T1529: { name: 'System Shutdown/Reboot', id: 'T1529', url: 'https://attack.mitre.org/techniques/T1529' },
	T1530: { name: 'Data from Cloud Storage', id: 'T1530', url: 'https://attack.mitre.org/techniques/T1530' },
	T1531: { name: 'Account Access Removal', id: 'T1531', url: 'https://attack.mitre.org/techniques/T1531' },
	T1534: { name: 'Internal Spearphishing', id: 'T1534', url: 'https://attack.mitre.org/techniques/T1534' },
	T1535: { name: 'Unused/Unsupported Cloud Regions', id: 'T1535', url: 'https://attack.mitre.org/techniques/T1535' },
	T1536: { name: 'Revert Cloud Instance', id: 'T1536', url: 'https://attack.mitre.org/techniques/T1536' },
	T1537: { name: 'Transfer Data to Cloud Account', id: 'T1537', url: 'https://attack.mitre.org/techniques/T1537' },
	T1538: { name: 'Cloud Service Dashboard', id: 'T1538', url: 'https://attack.mitre.org/techniques/T1538' },
	T1539: { name: 'Steal Web Session Cookie', id: 'T1539', url: 'https://attack.mitre.org/techniques/T1539' },
	T1542: {
		subTechniques: ['001', '002', '003', '004', '005'],
		name: 'Pre-OS Boot',
		id: 'T1542',
		url: 'https://attack.mitre.org/techniques/T1542',
	},
	'T1542.001': {
		name: 'System Firmware',
		id: 'T1542.001',
		url: 'https://attack.mitre.org/techniques/T1542/001',
		parentTechnique: 'T1542',
	},
	'T1542.002': {
		name: 'Component Firmware',
		id: 'T1542.002',
		url: 'https://attack.mitre.org/techniques/T1542/002',
		parentTechnique: 'T1542',
	},
	'T1542.003': {
		name: 'Bootkit',
		id: 'T1542.003',
		url: 'https://attack.mitre.org/techniques/T1542/003',
		parentTechnique: 'T1542',
	},
	'T1542.004': {
		name: 'ROMMONkit',
		id: 'T1542.004',
		url: 'https://attack.mitre.org/techniques/T1542/004',
		parentTechnique: 'T1542',
	},
	'T1542.005': {
		name: 'TFTP Boot',
		id: 'T1542.005',
		url: 'https://attack.mitre.org/techniques/T1542/005',
		parentTechnique: 'T1542',
	},
	T1543: {
		name: 'Create or Modify System Process',
		id: 'T1543',
		url: 'https://attack.mitre.org/techniques/T1543',
		subTechniques: ['001', '002', '003', '004'],
	},
	'T1543.001': {
		name: 'Launch Agent',
		id: 'T1543.001',
		url: 'https://attack.mitre.org/techniques/T1543/001',
		parentTechnique: 'T1543',
	},
	'T1543.002': {
		name: 'Systemd Service',
		id: 'T1543.002',
		url: 'https://attack.mitre.org/techniques/T1543/002',
		parentTechnique: 'T1543',
	},
	'T1543.003': {
		name: 'Windows Service',
		id: 'T1543.003',
		url: 'https://attack.mitre.org/techniques/T1543/003',
		parentTechnique: 'T1543',
	},
	'T1543.004': {
		name: 'Launch Daemon',
		id: 'T1543.004',
		url: 'https://attack.mitre.org/techniques/T1543/004',
		parentTechnique: 'T1543',
	},
	T1546: {
		subTechniques: [
			'001',
			'002',
			'003',
			'004',
			'005',
			'006',
			'007',
			'008',
			'009',
			'010',
			'011',
			'012',
			'013',
			'014',
			'015',
			'016',
		],
		name: 'Event Triggered Execution',
		id: 'T1546',
		url: 'https://attack.mitre.org/techniques/T1546',
	},
	'T1546.001': {
		name: 'Change Default File Association',
		id: 'T1546.001',
		url: 'https://attack.mitre.org/techniques/T1546/001',
		parentTechnique: 'T1546',
	},
	'T1546.002': {
		name: 'Screensaver',
		id: 'T1546.002',
		url: 'https://attack.mitre.org/techniques/T1546/002',
		parentTechnique: 'T1546',
	},
	'T1546.003': {
		name: 'Windows Management Instrumentation Event Subscription',
		id: 'T1546.003',
		url: 'https://attack.mitre.org/techniques/T1546/003',
		parentTechnique: 'T1546',
	},
	'T1546.004': {
		name: 'Unix Shell Configuration Modification',
		id: 'T1546.004',
		url: 'https://attack.mitre.org/techniques/T1546/004',
		parentTechnique: 'T1546',
	},
	'T1546.005': {
		name: 'Trap',
		id: 'T1546.005',
		url: 'https://attack.mitre.org/techniques/T1546/005',
		parentTechnique: 'T1546',
	},
	'T1546.006': {
		name: 'LC_LOAD_DYLIB Addition',
		id: 'T1546.006',
		url: 'https://attack.mitre.org/techniques/T1546/006',
		parentTechnique: 'T1546',
	},
	'T1546.007': {
		name: 'Netsh Helper DLL',
		id: 'T1546.007',
		url: 'https://attack.mitre.org/techniques/T1546/007',
		parentTechnique: 'T1546',
	},
	'T1546.008': {
		name: 'Accessibility Features',
		id: 'T1546.008',
		url: 'https://attack.mitre.org/techniques/T1546/008',
		parentTechnique: 'T1546',
	},
	'T1546.009': {
		name: 'AppCert DLLs',
		id: 'T1546.009',
		url: 'https://attack.mitre.org/techniques/T1546/009',
		parentTechnique: 'T1546',
	},
	'T1546.010': {
		name: 'AppInit DLLs',
		id: 'T1546.010',
		url: 'https://attack.mitre.org/techniques/T1546/010',
		parentTechnique: 'T1546',
	},
	'T1546.011': {
		name: 'Application Shimming',
		id: 'T1546.011',
		url: 'https://attack.mitre.org/techniques/T1546/011',
		parentTechnique: 'T1546',
	},
	'T1546.012': {
		name: 'Image File Execution Options Injection',
		id: 'T1546.012',
		url: 'https://attack.mitre.org/techniques/T1546/012',
		parentTechnique: 'T1546',
	},
	'T1546.013': {
		name: 'PowerShell Profile',
		id: 'T1546.013',
		url: 'https://attack.mitre.org/techniques/T1546/013',
		parentTechnique: 'T1546',
	},
	'T1546.014': {
		name: 'Emond',
		id: 'T1546.014',
		url: 'https://attack.mitre.org/techniques/T1546/014',
		parentTechnique: 'T1546',
	},
	'T1546.015': {
		name: 'Component Object Model Hijacking',
		id: 'T1546.015',
		url: 'https://attack.mitre.org/techniques/T1546/015',
		parentTechnique: 'T1546',
	},
	'T1546.016': {
		name: 'Installer Packages',
		id: 'T1546.016',
		url: 'https://attack.mitre.org/techniques/T1546/016',
		parentTechnique: 'T1546',
	},
	T1547: {
		name: 'Boot or Logon Autostart Execution',
		id: 'T1547',
		url: 'https://attack.mitre.org/techniques/T1547',
		subTechniques: [
			'001',
			'002',
			'003',
			'004',
			'005',
			'006',
			'007',
			'008',
			'009',
			'010',
			'011',
			'012',
			'013',
			'014',
			'015',
		],
	},
	'T1547.001': {
		name: 'Registry Run Keys / Startup Folder',
		id: 'T1547.001',
		url: 'https://attack.mitre.org/techniques/T1547/001',
		parentTechnique: 'T1547',
	},
	'T1547.002': {
		name: 'Authentication Package',
		id: 'T1547.002',
		url: 'https://attack.mitre.org/techniques/T1547/002',
		parentTechnique: 'T1547',
	},
	'T1547.003': {
		name: 'Time Providers',
		id: 'T1547.003',
		url: 'https://attack.mitre.org/techniques/T1547/003',
		parentTechnique: 'T1547',
	},
	'T1547.004': {
		name: 'Winlogon Helper DLL',
		id: 'T1547.004',
		url: 'https://attack.mitre.org/techniques/T1547/004',
		parentTechnique: 'T1547',
	},
	'T1547.005': {
		name: 'Security Support Provider',
		id: 'T1547.005',
		url: 'https://attack.mitre.org/techniques/T1547/005',
		parentTechnique: 'T1547',
	},
	'T1547.006': {
		name: 'Kernel Modules and Extensions',
		id: 'T1547.006',
		url: 'https://attack.mitre.org/techniques/T1547/006',
		parentTechnique: 'T1547',
	},
	'T1547.007': {
		name: 'Re-opened Applications',
		id: 'T1547.007',
		url: 'https://attack.mitre.org/techniques/T1547/007',
		parentTechnique: 'T1547',
	},
	'T1547.008': {
		name: 'LSASS Driver',
		id: 'T1547.008',
		url: 'https://attack.mitre.org/techniques/T1547/008',
		parentTechnique: 'T1547',
	},
	'T1547.009': {
		name: 'Shortcut Modification',
		id: 'T1547.009',
		url: 'https://attack.mitre.org/techniques/T1547/009',
		parentTechnique: 'T1547',
	},
	'T1547.010': {
		name: 'Port Monitors',
		id: 'T1547.010',
		url: 'https://attack.mitre.org/techniques/T1547/010',
		parentTechnique: 'T1547',
	},
	'T1547.011': {
		name: 'Plist Modification',
		id: 'T1547.011',
		url: 'https://attack.mitre.org/techniques/T1547/011',
		parentTechnique: 'T1547',
	},
	'T1547.012': {
		name: 'Print Processors',
		id: 'T1547.012',
		url: 'https://attack.mitre.org/techniques/T1547/012',
		parentTechnique: 'T1547',
	},
	'T1547.013': {
		name: 'XDG Autostart Entries',
		id: 'T1547.013',
		url: 'https://attack.mitre.org/techniques/T1547/013',
		parentTechnique: 'T1547',
	},
	'T1547.014': {
		name: 'Active Setup',
		id: 'T1547.014',
		url: 'https://attack.mitre.org/techniques/T1547/014',
		parentTechnique: 'T1547',
	},
	'T1547.015': {
		name: 'Login Items',
		id: 'T1547.015',
		url: 'https://attack.mitre.org/techniques/T1547/015',
		parentTechnique: 'T1547',
	},
	T1548: {
		subTechniques: ['001', '002', '003', '004'],
		name: 'Abuse Elevation Control Mechanism',
		id: 'T1548',
		url: 'https://attack.mitre.org/techniques/T1548',
	},
	'T1548.001': {
		name: 'Setuid and Setgid',
		id: 'T1548.001',
		url: 'https://attack.mitre.org/techniques/T1548/001',
		parentTechnique: 'T1548',
	},
	'T1548.002': {
		name: 'Bypass User Account Control',
		id: 'T1548.002',
		url: 'https://attack.mitre.org/techniques/T1548/002',
		parentTechnique: 'T1548',
	},
	'T1548.003': {
		name: 'Sudo and Sudo Caching',
		id: 'T1548.003',
		url: 'https://attack.mitre.org/techniques/T1548/003',
		parentTechnique: 'T1548',
	},
	'T1548.004': {
		name: 'Elevated Execution with Prompt',
		id: 'T1548.004',
		url: 'https://attack.mitre.org/techniques/T1548/004',
		parentTechnique: 'T1548',
	},
	T1550: {
		name: 'Use Alternate Authentication Material',
		id: 'T1550',
		url: 'https://attack.mitre.org/techniques/T1550',
		subTechniques: ['001', '002', '003', '004'],
	},
	'T1550.001': {
		name: 'Application Access Token',
		id: 'T1550.001',
		url: 'https://attack.mitre.org/techniques/T1550/001',
		parentTechnique: 'T1550',
	},
	'T1550.002': {
		name: 'Pass the Hash',
		id: 'T1550.002',
		url: 'https://attack.mitre.org/techniques/T1550/002',
		parentTechnique: 'T1550',
	},
	'T1550.003': {
		name: 'Pass the Ticket',
		id: 'T1550.003',
		url: 'https://attack.mitre.org/techniques/T1550/003',
		parentTechnique: 'T1550',
	},
	'T1550.004': {
		name: 'Web Session Cookie',
		id: 'T1550.004',
		url: 'https://attack.mitre.org/techniques/T1550/004',
		parentTechnique: 'T1550',
	},
	T1552: {
		subTechniques: ['001', '002', '003', '004', '005', '006', '007'],
		name: 'Unsecured Credentials',
		id: 'T1552',
		url: 'https://attack.mitre.org/techniques/T1552',
	},
	'T1552.001': {
		name: 'Credentials In Files',
		id: 'T1552.001',
		url: 'https://attack.mitre.org/techniques/T1552/001',
		parentTechnique: 'T1552',
	},
	'T1552.002': {
		name: 'Credentials in Registry',
		id: 'T1552.002',
		url: 'https://attack.mitre.org/techniques/T1552/002',
		parentTechnique: 'T1552',
	},
	'T1552.003': {
		name: 'Bash History',
		id: 'T1552.003',
		url: 'https://attack.mitre.org/techniques/T1552/003',
		parentTechnique: 'T1552',
	},
	'T1552.004': {
		name: 'Private Keys',
		id: 'T1552.004',
		url: 'https://attack.mitre.org/techniques/T1552/004',
		parentTechnique: 'T1552',
	},
	'T1552.005': {
		name: 'Cloud Instance Metadata API',
		id: 'T1552.005',
		url: 'https://attack.mitre.org/techniques/T1552/005',
		parentTechnique: 'T1552',
	},
	'T1552.006': {
		name: 'Group Policy Preferences',
		id: 'T1552.006',
		url: 'https://attack.mitre.org/techniques/T1552/006',
		parentTechnique: 'T1552',
	},
	'T1552.007': {
		name: 'Container API',
		id: 'T1552.007',
		url: 'https://attack.mitre.org/techniques/T1552/007',
		parentTechnique: 'T1552',
	},
	T1553: {
		subTechniques: ['001', '002', '003', '004', '005', '006'],
		name: 'Subvert Trust Controls',
		id: 'T1553',
		url: 'https://attack.mitre.org/techniques/T1553',
	},
	'T1553.001': {
		name: 'Gatekeeper Bypass',
		id: 'T1553.001',
		url: 'https://attack.mitre.org/techniques/T1553/001',
		parentTechnique: 'T1553',
	},
	'T1553.002': {
		name: 'Code Signing',
		id: 'T1553.002',
		url: 'https://attack.mitre.org/techniques/T1553/002',
		parentTechnique: 'T1553',
	},
	'T1553.003': {
		name: 'SIP and Trust Provider Hijacking',
		id: 'T1553.003',
		url: 'https://attack.mitre.org/techniques/T1553/003',
		parentTechnique: 'T1553',
	},
	'T1553.004': {
		name: 'Install Root Certificate',
		id: 'T1553.004',
		url: 'https://attack.mitre.org/techniques/T1553/004',
		parentTechnique: 'T1553',
	},
	'T1553.005': {
		name: 'Mark-of-the-Web Bypass',
		id: 'T1553.005',
		url: 'https://attack.mitre.org/techniques/T1553/005',
		parentTechnique: 'T1553',
	},
	'T1553.006': {
		name: 'Code Signing Policy Modification',
		id: 'T1553.006',
		url: 'https://attack.mitre.org/techniques/T1553/006',
		parentTechnique: 'T1553',
	},
	T1554: { name: 'Compromise Client Software Binary', id: 'T1554', url: 'https://attack.mitre.org/techniques/T1554' },
	T1555: {
		subTechniques: ['001', '002', '003', '004', '005'],
		name: 'Credentials from Password Stores',
		id: 'T1555',
		url: 'https://attack.mitre.org/techniques/T1555',
	},
	'T1555.001': {
		name: 'Keychain',
		id: 'T1555.001',
		url: 'https://attack.mitre.org/techniques/T1555/001',
		parentTechnique: 'T1555',
	},
	'T1555.002': {
		name: 'Securityd Memory',
		id: 'T1555.002',
		url: 'https://attack.mitre.org/techniques/T1555/002',
		parentTechnique: 'T1555',
	},
	'T1555.003': {
		name: 'Credentials from Web Browsers',
		id: 'T1555.003',
		url: 'https://attack.mitre.org/techniques/T1555/003',
		parentTechnique: 'T1555',
	},
	'T1555.004': {
		name: 'Windows Credential Manager',
		id: 'T1555.004',
		url: 'https://attack.mitre.org/techniques/T1555/004',
		parentTechnique: 'T1555',
	},
	'T1555.005': {
		name: 'Password Managers',
		id: 'T1555.005',
		url: 'https://attack.mitre.org/techniques/T1555/005',
		parentTechnique: 'T1555',
	},
	T1556: {
		subTechniques: ['001', '002', '003', '004', '005', '006', '007'],
		name: 'Modify Authentication Process',
		id: 'T1556',
		url: 'https://attack.mitre.org/techniques/T1556',
	},
	'T1556.001': {
		name: 'Domain Controller Authentication',
		id: 'T1556.001',
		url: 'https://attack.mitre.org/techniques/T1556/001',
		parentTechnique: 'T1556',
	},
	'T1556.002': {
		name: 'Password Filter DLL',
		id: 'T1556.002',
		url: 'https://attack.mitre.org/techniques/T1556/002',
		parentTechnique: 'T1556',
	},
	'T1556.003': {
		name: 'Pluggable Authentication Modules',
		id: 'T1556.003',
		url: 'https://attack.mitre.org/techniques/T1556/003',
		parentTechnique: 'T1556',
	},
	'T1556.004': {
		name: 'Network Device Authentication',
		id: 'T1556.004',
		url: 'https://attack.mitre.org/techniques/T1556/004',
		parentTechnique: 'T1556',
	},
	'T1556.005': {
		name: 'Reversible Encryption',
		id: 'T1556.005',
		url: 'https://attack.mitre.org/techniques/T1556/005',
		parentTechnique: 'T1556',
	},
	'T1556.006': {
		name: 'Multi-Factor Authentication',
		id: 'T1556.006',
		url: 'https://attack.mitre.org/techniques/T1556/006',
		parentTechnique: 'T1556',
	},
	'T1556.007': {
		name: 'Hybrid Identity',
		id: 'T1556.007',
		url: 'https://attack.mitre.org/techniques/T1556/007',
		parentTechnique: 'T1556',
	},
	T1557: {
		name: 'Adversary-in-the-Middle',
		id: 'T1557',
		url: 'https://attack.mitre.org/techniques/T1557',
		subTechniques: ['001', '002', '003'],
	},
	'T1557.001': {
		name: 'LLMNR/NBT-NS Poisoning and SMB Relay',
		id: 'T1557.001',
		url: 'https://attack.mitre.org/techniques/T1557/001',
		parentTechnique: 'T1557',
	},
	'T1557.002': {
		name: 'ARP Cache Poisoning',
		id: 'T1557.002',
		url: 'https://attack.mitre.org/techniques/T1557/002',
		parentTechnique: 'T1557',
	},
	'T1557.003': {
		name: 'DHCP Spoofing',
		id: 'T1557.003',
		url: 'https://attack.mitre.org/techniques/T1557/003',
		parentTechnique: 'T1557',
	},
	T1558: {
		subTechniques: ['001', '002', '003', '004'],
		name: 'Steal or Forge Kerberos Tickets',
		id: 'T1558',
		url: 'https://attack.mitre.org/techniques/T1558',
	},
	'T1558.001': {
		name: 'Golden Ticket',
		id: 'T1558.001',
		url: 'https://attack.mitre.org/techniques/T1558/001',
		parentTechnique: 'T1558',
	},
	'T1558.002': {
		name: 'Silver Ticket',
		id: 'T1558.002',
		url: 'https://attack.mitre.org/techniques/T1558/002',
		parentTechnique: 'T1558',
	},
	'T1558.003': {
		name: 'Kerberoasting',
		id: 'T1558.003',
		url: 'https://attack.mitre.org/techniques/T1558/003',
		parentTechnique: 'T1558',
	},
	'T1558.004': {
		name: 'AS-REP Roasting',
		id: 'T1558.004',
		url: 'https://attack.mitre.org/techniques/T1558/004',
		parentTechnique: 'T1558',
	},
	T1559: {
		subTechniques: ['001', '002', '003'],
		name: 'Inter-Process Communication',
		id: 'T1559',
		url: 'https://attack.mitre.org/techniques/T1559',
	},
	'T1559.001': {
		name: 'Component Object Model',
		id: 'T1559.001',
		url: 'https://attack.mitre.org/techniques/T1559/001',
		parentTechnique: 'T1559',
	},
	'T1559.002': {
		name: 'Dynamic Data Exchange',
		id: 'T1559.002',
		url: 'https://attack.mitre.org/techniques/T1559/002',
		parentTechnique: 'T1559',
	},
	'T1559.003': {
		name: 'XPC Services',
		id: 'T1559.003',
		url: 'https://attack.mitre.org/techniques/T1559/003',
		parentTechnique: 'T1559',
	},
	T1560: {
		subTechniques: ['001', '002', '003'],
		name: 'Archive Collected Data',
		id: 'T1560',
		url: 'https://attack.mitre.org/techniques/T1560',
	},
	'T1560.001': {
		name: 'Archive via Utility',
		id: 'T1560.001',
		url: 'https://attack.mitre.org/techniques/T1560/001',
		parentTechnique: 'T1560',
	},
	'T1560.002': {
		name: 'Archive via Library',
		id: 'T1560.002',
		url: 'https://attack.mitre.org/techniques/T1560/002',
		parentTechnique: 'T1560',
	},
	'T1560.003': {
		name: 'Archive via Custom Method',
		id: 'T1560.003',
		url: 'https://attack.mitre.org/techniques/T1560/003',
		parentTechnique: 'T1560',
	},
	T1561: {
		subTechniques: ['001', '002'],
		name: 'Disk Wipe',
		id: 'T1561',
		url: 'https://attack.mitre.org/techniques/T1561',
	},
	'T1561.001': {
		name: 'Disk Content Wipe',
		id: 'T1561.001',
		url: 'https://attack.mitre.org/techniques/T1561/001',
		parentTechnique: 'T1561',
	},
	'T1561.002': {
		name: 'Disk Structure Wipe',
		id: 'T1561.002',
		url: 'https://attack.mitre.org/techniques/T1561/002',
		parentTechnique: 'T1561',
	},
	T1562: {
		subTechniques: ['001', '002', '003', '004', '006', '007', '008', '009', '010'],
		name: 'Impair Defenses',
		id: 'T1562',
		url: 'https://attack.mitre.org/techniques/T1562',
	},
	'T1562.001': {
		name: 'Disable or Modify Tools',
		id: 'T1562.001',
		url: 'https://attack.mitre.org/techniques/T1562/001',
		parentTechnique: 'T1562',
	},
	'T1562.002': {
		name: 'Disable Windows Event Logging',
		id: 'T1562.002',
		url: 'https://attack.mitre.org/techniques/T1562/002',
		parentTechnique: 'T1562',
	},
	'T1562.003': {
		name: 'Impair Command History Logging',
		id: 'T1562.003',
		url: 'https://attack.mitre.org/techniques/T1562/003',
		parentTechnique: 'T1562',
	},
	'T1562.004': {
		name: 'Disable or Modify System Firewall',
		id: 'T1562.004',
		url: 'https://attack.mitre.org/techniques/T1562/004',
		parentTechnique: 'T1562',
	},
	'T1562.006': {
		name: 'Indicator Blocking',
		id: 'T1562.006',
		url: 'https://attack.mitre.org/techniques/T1562/006',
		parentTechnique: 'T1562',
	},
	'T1562.007': {
		name: 'Disable or Modify Cloud Firewall',
		id: 'T1562.007',
		url: 'https://attack.mitre.org/techniques/T1562/007',
		parentTechnique: 'T1562',
	},
	'T1562.008': {
		name: 'Disable Cloud Logs',
		id: 'T1562.008',
		url: 'https://attack.mitre.org/techniques/T1562/008',
		parentTechnique: 'T1562',
	},
	'T1562.009': {
		name: 'Safe Mode Boot',
		id: 'T1562.009',
		url: 'https://attack.mitre.org/techniques/T1562/009',
		parentTechnique: 'T1562',
	},
	'T1562.010': {
		name: 'Downgrade Attack',
		id: 'T1562.010',
		url: 'https://attack.mitre.org/techniques/T1562/010',
		parentTechnique: 'T1562',
	},
	T1563: {
		subTechniques: ['001', '002'],
		name: 'Remote Service Session Hijacking',
		id: 'T1563',
		url: 'https://attack.mitre.org/techniques/T1563',
	},
	'T1563.001': {
		name: 'SSH Hijacking',
		id: 'T1563.001',
		url: 'https://attack.mitre.org/techniques/T1563/001',
		parentTechnique: 'T1563',
	},
	'T1563.002': {
		name: 'RDP Hijacking',
		id: 'T1563.002',
		url: 'https://attack.mitre.org/techniques/T1563/002',
		parentTechnique: 'T1563',
	},
	T1564: {
		subTechniques: ['001', '002', '003', '004', '005', '006', '007', '008', '009', '010'],
		name: 'Hide Artifacts',
		id: 'T1564',
		url: 'https://attack.mitre.org/techniques/T1564',
	},
	'T1564.001': {
		name: 'Hidden Files and Directories',
		id: 'T1564.001',
		url: 'https://attack.mitre.org/techniques/T1564/001',
		parentTechnique: 'T1564',
	},
	'T1564.002': {
		name: 'Hidden Users',
		id: 'T1564.002',
		url: 'https://attack.mitre.org/techniques/T1564/002',
		parentTechnique: 'T1564',
	},
	'T1564.003': {
		name: 'Hidden Window',
		id: 'T1564.003',
		url: 'https://attack.mitre.org/techniques/T1564/003',
		parentTechnique: 'T1564',
	},
	'T1564.004': {
		name: 'NTFS File Attributes',
		id: 'T1564.004',
		url: 'https://attack.mitre.org/techniques/T1564/004',
		parentTechnique: 'T1564',
	},
	'T1564.005': {
		name: 'Hidden File System',
		id: 'T1564.005',
		url: 'https://attack.mitre.org/techniques/T1564/005',
		parentTechnique: 'T1564',
	},
	'T1564.006': {
		name: 'Run Virtual Instance',
		id: 'T1564.006',
		url: 'https://attack.mitre.org/techniques/T1564/006',
		parentTechnique: 'T1564',
	},
	'T1564.007': {
		name: 'VBA Stomping',
		id: 'T1564.007',
		url: 'https://attack.mitre.org/techniques/T1564/007',
		parentTechnique: 'T1564',
	},
	'T1564.008': {
		name: 'Email Hiding Rules',
		id: 'T1564.008',
		url: 'https://attack.mitre.org/techniques/T1564/008',
		parentTechnique: 'T1564',
	},
	'T1564.009': {
		name: 'Resource Forking',
		id: 'T1564.009',
		url: 'https://attack.mitre.org/techniques/T1564/009',
		parentTechnique: 'T1564',
	},
	'T1564.010': {
		name: 'Process Argument Spoofing',
		id: 'T1564.010',
		url: 'https://attack.mitre.org/techniques/T1564/010',
		parentTechnique: 'T1564',
	},
	T1565: {
		subTechniques: ['001', '002', '003'],
		name: 'Data Manipulation',
		id: 'T1565',
		url: 'https://attack.mitre.org/techniques/T1565',
	},
	'T1565.001': {
		name: 'Stored Data Manipulation',
		id: 'T1565.001',
		url: 'https://attack.mitre.org/techniques/T1565/001',
		parentTechnique: 'T1565',
	},
	'T1565.002': {
		name: 'Transmitted Data Manipulation',
		id: 'T1565.002',
		url: 'https://attack.mitre.org/techniques/T1565/002',
		parentTechnique: 'T1565',
	},
	'T1565.003': {
		name: 'Runtime Data Manipulation',
		id: 'T1565.003',
		url: 'https://attack.mitre.org/techniques/T1565/003',
		parentTechnique: 'T1565',
	},
	T1566: {
		subTechniques: ['001', '002', '003'],
		name: 'Phishing',
		id: 'T1566',
		url: 'https://attack.mitre.org/techniques/T1566',
	},
	'T1566.001': {
		name: 'Spearphishing Attachment',
		id: 'T1566.001',
		url: 'https://attack.mitre.org/techniques/T1566/001',
		parentTechnique: 'T1566',
	},
	'T1566.002': {
		name: 'Spearphishing Link',
		id: 'T1566.002',
		url: 'https://attack.mitre.org/techniques/T1566/002',
		parentTechnique: 'T1566',
	},
	'T1566.003': {
		name: 'Spearphishing via Service',
		id: 'T1566.003',
		url: 'https://attack.mitre.org/techniques/T1566/003',
		parentTechnique: 'T1566',
	},
	T1567: {
		name: 'Exfiltration Over Web Service',
		id: 'T1567',
		url: 'https://attack.mitre.org/techniques/T1567',
		subTechniques: ['001', '002'],
	},
	'T1567.001': {
		name: 'Exfiltration to Code Repository',
		id: 'T1567.001',
		url: 'https://attack.mitre.org/techniques/T1567/001',
		parentTechnique: 'T1567',
	},
	'T1567.002': {
		name: 'Exfiltration to Cloud Storage',
		id: 'T1567.002',
		url: 'https://attack.mitre.org/techniques/T1567/002',
		parentTechnique: 'T1567',
	},
	T1568: {
		subTechniques: ['001', '002', '003'],
		name: 'Dynamic Resolution',
		id: 'T1568',
		url: 'https://attack.mitre.org/techniques/T1568',
	},
	'T1568.001': {
		name: 'Fast Flux DNS',
		id: 'T1568.001',
		url: 'https://attack.mitre.org/techniques/T1568/001',
		parentTechnique: 'T1568',
	},
	'T1568.002': {
		name: 'Domain Generation Algorithms',
		id: 'T1568.002',
		url: 'https://attack.mitre.org/techniques/T1568/002',
		parentTechnique: 'T1568',
	},
	'T1568.003': {
		name: 'DNS Calculation',
		id: 'T1568.003',
		url: 'https://attack.mitre.org/techniques/T1568/003',
		parentTechnique: 'T1568',
	},
	T1569: {
		subTechniques: ['001', '002'],
		name: 'System Services',
		id: 'T1569',
		url: 'https://attack.mitre.org/techniques/T1569',
	},
	'T1569.001': {
		name: 'Launchctl',
		id: 'T1569.001',
		url: 'https://attack.mitre.org/techniques/T1569/001',
		parentTechnique: 'T1569',
	},
	'T1569.002': {
		name: 'Service Execution',
		id: 'T1569.002',
		url: 'https://attack.mitre.org/techniques/T1569/002',
		parentTechnique: 'T1569',
	},
	T1570: { name: 'Lateral Tool Transfer', id: 'T1570', url: 'https://attack.mitre.org/techniques/T1570' },
	T1571: { name: 'Non-Standard Port', id: 'T1571', url: 'https://attack.mitre.org/techniques/T1571' },
	T1572: { name: 'Protocol Tunneling', id: 'T1572', url: 'https://attack.mitre.org/techniques/T1572' },
	T1573: {
		subTechniques: ['001', '002'],
		name: 'Encrypted Channel',
		id: 'T1573',
		url: 'https://attack.mitre.org/techniques/T1573',
	},
	'T1573.001': {
		name: 'Symmetric Cryptography',
		id: 'T1573.001',
		url: 'https://attack.mitre.org/techniques/T1573/001',
		parentTechnique: 'T1573',
	},
	'T1573.002': {
		name: 'Asymmetric Cryptography',
		id: 'T1573.002',
		url: 'https://attack.mitre.org/techniques/T1573/002',
		parentTechnique: 'T1573',
	},
	T1574: {
		subTechniques: ['001', '002', '004', '005', '006', '007', '008', '009', '010', '011', '012', '013'],
		name: 'Hijack Execution Flow',
		id: 'T1574',
		url: 'https://attack.mitre.org/techniques/T1574',
	},
	'T1574.001': {
		name: 'DLL Search Order Hijacking',
		id: 'T1574.001',
		url: 'https://attack.mitre.org/techniques/T1574/001',
		parentTechnique: 'T1574',
	},
	'T1574.002': {
		name: 'DLL Side-Loading',
		id: 'T1574.002',
		url: 'https://attack.mitre.org/techniques/T1574/002',
		parentTechnique: 'T1574',
	},
	'T1574.004': {
		name: 'Dylib Hijacking',
		id: 'T1574.004',
		url: 'https://attack.mitre.org/techniques/T1574/004',
		parentTechnique: 'T1574',
	},
	'T1574.005': {
		name: 'Executable Installer File Permissions Weakness',
		id: 'T1574.005',
		url: 'https://attack.mitre.org/techniques/T1574/005',
		parentTechnique: 'T1574',
	},
	'T1574.006': {
		name: 'Dynamic Linker Hijacking',
		id: 'T1574.006',
		url: 'https://attack.mitre.org/techniques/T1574/006',
		parentTechnique: 'T1574',
	},
	'T1574.007': {
		name: 'Path Interception by PATH Environment Variable',
		id: 'T1574.007',
		url: 'https://attack.mitre.org/techniques/T1574/007',
		parentTechnique: 'T1574',
	},
	'T1574.008': {
		name: 'Path Interception by Search Order Hijacking',
		id: 'T1574.008',
		url: 'https://attack.mitre.org/techniques/T1574/008',
		parentTechnique: 'T1574',
	},
	'T1574.009': {
		name: 'Path Interception by Unquoted Path',
		id: 'T1574.009',
		url: 'https://attack.mitre.org/techniques/T1574/009',
		parentTechnique: 'T1574',
	},
	'T1574.010': {
		name: 'Services File Permissions Weakness',
		id: 'T1574.010',
		url: 'https://attack.mitre.org/techniques/T1574/010',
		parentTechnique: 'T1574',
	},
	'T1574.011': {
		name: 'Services Registry Permissions Weakness',
		id: 'T1574.011',
		url: 'https://attack.mitre.org/techniques/T1574/011',
		parentTechnique: 'T1574',
	},
	'T1574.012': {
		name: 'COR_PROFILER',
		id: 'T1574.012',
		url: 'https://attack.mitre.org/techniques/T1574/012',
		parentTechnique: 'T1574',
	},
	'T1574.013': {
		name: 'KernelCallbackTable',
		id: 'T1574.013',
		url: 'https://attack.mitre.org/techniques/T1574/013',
		parentTechnique: 'T1574',
	},
	T1578: {
		subTechniques: ['001', '002', '003', '004'],
		name: 'Modify Cloud Compute Infrastructure',
		id: 'T1578',
		url: 'https://attack.mitre.org/techniques/T1578',
	},
	'T1578.001': {
		name: 'Create Snapshot',
		id: 'T1578.001',
		url: 'https://attack.mitre.org/techniques/T1578/001',
		parentTechnique: 'T1578',
	},
	'T1578.002': {
		name: 'Create Cloud Instance',
		id: 'T1578.002',
		url: 'https://attack.mitre.org/techniques/T1578/002',
		parentTechnique: 'T1578',
	},
	'T1578.003': {
		name: 'Delete Cloud Instance',
		id: 'T1578.003',
		url: 'https://attack.mitre.org/techniques/T1578/003',
		parentTechnique: 'T1578',
	},
	'T1578.004': {
		name: 'Revert Cloud Instance',
		id: 'T1578.004',
		url: 'https://attack.mitre.org/techniques/T1578/004',
		parentTechnique: 'T1578',
	},
	T1580: { name: 'Cloud Infrastructure Discovery', id: 'T1580', url: 'https://attack.mitre.org/techniques/T1580' },
	T1583: {
		name: 'Acquire Infrastructure',
		id: 'T1583',
		url: 'https://attack.mitre.org/techniques/T1583',
		subTechniques: ['001', '002', '003', '004', '005', '006', '007'],
	},
	'T1583.001': {
		name: 'Domains',
		id: 'T1583.001',
		url: 'https://attack.mitre.org/techniques/T1583/001',
		parentTechnique: 'T1583',
	},
	'T1583.002': {
		name: 'DNS Server',
		id: 'T1583.002',
		url: 'https://attack.mitre.org/techniques/T1583/002',
		parentTechnique: 'T1583',
	},
	'T1583.003': {
		name: 'Virtual Private Server',
		id: 'T1583.003',
		url: 'https://attack.mitre.org/techniques/T1583/003',
		parentTechnique: 'T1583',
	},
	'T1583.004': {
		name: 'Server',
		id: 'T1583.004',
		url: 'https://attack.mitre.org/techniques/T1583/004',
		parentTechnique: 'T1583',
	},
	'T1583.005': {
		name: 'Botnet',
		id: 'T1583.005',
		url: 'https://attack.mitre.org/techniques/T1583/005',
		parentTechnique: 'T1583',
	},
	'T1583.006': {
		name: 'Web Services',
		id: 'T1583.006',
		url: 'https://attack.mitre.org/techniques/T1583/006',
		parentTechnique: 'T1583',
	},
	'T1583.007': {
		name: 'Serverless',
		id: 'T1583.007',
		url: 'https://attack.mitre.org/techniques/T1583/007',
		parentTechnique: 'T1583',
	},
	T1584: {
		subTechniques: ['001', '002', '003', '004', '005', '006', '007'],
		name: 'Compromise Infrastructure',
		id: 'T1584',
		url: 'https://attack.mitre.org/techniques/T1584',
	},
	'T1584.001': {
		name: 'Domains',
		id: 'T1584.001',
		url: 'https://attack.mitre.org/techniques/T1584/001',
		parentTechnique: 'T1584',
	},
	'T1584.002': {
		name: 'DNS Server',
		id: 'T1584.002',
		url: 'https://attack.mitre.org/techniques/T1584/002',
		parentTechnique: 'T1584',
	},
	'T1584.003': {
		name: 'Virtual Private Server',
		id: 'T1584.003',
		url: 'https://attack.mitre.org/techniques/T1584/003',
		parentTechnique: 'T1584',
	},
	'T1584.004': {
		name: 'Server',
		id: 'T1584.004',
		url: 'https://attack.mitre.org/techniques/T1584/004',
		parentTechnique: 'T1584',
	},
	'T1584.005': {
		name: 'Botnet',
		id: 'T1584.005',
		url: 'https://attack.mitre.org/techniques/T1584/005',
		parentTechnique: 'T1584',
	},
	'T1584.006': {
		name: 'Web Services',
		id: 'T1584.006',
		url: 'https://attack.mitre.org/techniques/T1584/006',
		parentTechnique: 'T1584',
	},
	'T1584.007': {
		name: 'Serverless',
		id: 'T1584.007',
		url: 'https://attack.mitre.org/techniques/T1584/007',
		parentTechnique: 'T1584',
	},
	T1585: {
		subTechniques: ['001', '002', '003'],
		name: 'Establish Accounts',
		id: 'T1585',
		url: 'https://attack.mitre.org/techniques/T1585',
	},
	'T1585.001': {
		name: 'Social Media Accounts',
		id: 'T1585.001',
		url: 'https://attack.mitre.org/techniques/T1585/001',
		parentTechnique: 'T1585',
	},
	'T1585.002': {
		name: 'Email Accounts',
		id: 'T1585.002',
		url: 'https://attack.mitre.org/techniques/T1585/002',
		parentTechnique: 'T1585',
	},
	'T1585.003': {
		name: 'Cloud Accounts',
		id: 'T1585.003',
		url: 'https://attack.mitre.org/techniques/T1585/003',
		parentTechnique: 'T1585',
	},
	T1586: {
		subTechniques: ['001', '002', '003'],
		name: 'Compromise Accounts',
		id: 'T1586',
		url: 'https://attack.mitre.org/techniques/T1586',
	},
	'T1586.001': {
		name: 'Social Media Accounts',
		id: 'T1586.001',
		url: 'https://attack.mitre.org/techniques/T1586/001',
		parentTechnique: 'T1586',
	},
	'T1586.002': {
		name: 'Email Accounts',
		id: 'T1586.002',
		url: 'https://attack.mitre.org/techniques/T1586/002',
		parentTechnique: 'T1586',
	},
	'T1586.003': {
		name: 'Cloud Accounts',
		id: 'T1586.003',
		url: 'https://attack.mitre.org/techniques/T1586/003',
		parentTechnique: 'T1586',
	},
	T1587: {
		subTechniques: ['001', '002', '003', '004'],
		name: 'Develop Capabilities',
		id: 'T1587',
		url: 'https://attack.mitre.org/techniques/T1587',
	},
	'T1587.001': {
		name: 'Malware',
		id: 'T1587.001',
		url: 'https://attack.mitre.org/techniques/T1587/001',
		parentTechnique: 'T1587',
	},
	'T1587.002': {
		name: 'Code Signing Certificates',
		id: 'T1587.002',
		url: 'https://attack.mitre.org/techniques/T1587/002',
		parentTechnique: 'T1587',
	},
	'T1587.003': {
		name: 'Digital Certificates',
		id: 'T1587.003',
		url: 'https://attack.mitre.org/techniques/T1587/003',
		parentTechnique: 'T1587',
	},
	'T1587.004': {
		name: 'Exploits',
		id: 'T1587.004',
		url: 'https://attack.mitre.org/techniques/T1587/004',
		parentTechnique: 'T1587',
	},
	T1588: {
		subTechniques: ['001', '002', '003', '004', '005', '006'],
		name: 'Obtain Capabilities',
		id: 'T1588',
		url: 'https://attack.mitre.org/techniques/T1588',
	},
	'T1588.001': {
		name: 'Malware',
		id: 'T1588.001',
		url: 'https://attack.mitre.org/techniques/T1588/001',
		parentTechnique: 'T1588',
	},
	'T1588.002': {
		name: 'Tool',
		id: 'T1588.002',
		url: 'https://attack.mitre.org/techniques/T1588/002',
		parentTechnique: 'T1588',
	},
	'T1588.003': {
		name: 'Code Signing Certificates',
		id: 'T1588.003',
		url: 'https://attack.mitre.org/techniques/T1588/003',
		parentTechnique: 'T1588',
	},
	'T1588.004': {
		name: 'Digital Certificates',
		id: 'T1588.004',
		url: 'https://attack.mitre.org/techniques/T1588/004',
		parentTechnique: 'T1588',
	},
	'T1588.005': {
		name: 'Exploits',
		id: 'T1588.005',
		url: 'https://attack.mitre.org/techniques/T1588/005',
		parentTechnique: 'T1588',
	},
	'T1588.006': {
		name: 'Vulnerabilities',
		id: 'T1588.006',
		url: 'https://attack.mitre.org/techniques/T1588/006',
		parentTechnique: 'T1588',
	},
	T1589: {
		name: 'Gather Victim Identity Information',
		id: 'T1589',
		url: 'https://attack.mitre.org/techniques/T1589',
		subTechniques: ['001', '002', '003'],
	},
	'T1589.001': {
		name: 'Credentials',
		id: 'T1589.001',
		url: 'https://attack.mitre.org/techniques/T1589/001',
		parentTechnique: 'T1589',
	},
	'T1589.002': {
		name: 'Email Addresses',
		id: 'T1589.002',
		url: 'https://attack.mitre.org/techniques/T1589/002',
		parentTechnique: 'T1589',
	},
	'T1589.003': {
		name: 'Employee Names',
		id: 'T1589.003',
		url: 'https://attack.mitre.org/techniques/T1589/003',
		parentTechnique: 'T1589',
	},
	T1590: {
		subTechniques: ['001', '002', '003', '004', '005', '006'],
		name: 'Gather Victim Network Information',
		id: 'T1590',
		url: 'https://attack.mitre.org/techniques/T1590',
	},
	'T1590.001': {
		name: 'Domain Properties',
		id: 'T1590.001',
		url: 'https://attack.mitre.org/techniques/T1590/001',
		parentTechnique: 'T1590',
	},
	'T1590.002': {
		name: 'DNS',
		id: 'T1590.002',
		url: 'https://attack.mitre.org/techniques/T1590/002',
		parentTechnique: 'T1590',
	},
	'T1590.003': {
		name: 'Network Trust Dependencies',
		id: 'T1590.003',
		url: 'https://attack.mitre.org/techniques/T1590/003',
		parentTechnique: 'T1590',
	},
	'T1590.004': {
		name: 'Network Topology',
		id: 'T1590.004',
		url: 'https://attack.mitre.org/techniques/T1590/004',
		parentTechnique: 'T1590',
	},
	'T1590.005': {
		name: 'IP Addresses',
		id: 'T1590.005',
		url: 'https://attack.mitre.org/techniques/T1590/005',
		parentTechnique: 'T1590',
	},
	'T1590.006': {
		name: 'Network Security Appliances',
		id: 'T1590.006',
		url: 'https://attack.mitre.org/techniques/T1590/006',
		parentTechnique: 'T1590',
	},
	T1591: {
		subTechniques: ['001', '002', '003', '004'],
		name: 'Gather Victim Org Information',
		id: 'T1591',
		url: 'https://attack.mitre.org/techniques/T1591',
	},
	'T1591.001': {
		name: 'Determine Physical Locations',
		id: 'T1591.001',
		url: 'https://attack.mitre.org/techniques/T1591/001',
		parentTechnique: 'T1591',
	},
	'T1591.002': {
		name: 'Business Relationships',
		id: 'T1591.002',
		url: 'https://attack.mitre.org/techniques/T1591/002',
		parentTechnique: 'T1591',
	},
	'T1591.003': {
		name: 'Identify Business Tempo',
		id: 'T1591.003',
		url: 'https://attack.mitre.org/techniques/T1591/003',
		parentTechnique: 'T1591',
	},
	'T1591.004': {
		name: 'Identify Roles',
		id: 'T1591.004',
		url: 'https://attack.mitre.org/techniques/T1591/004',
		parentTechnique: 'T1591',
	},
	T1592: {
		name: 'Gather Victim Host Information',
		id: 'T1592',
		url: 'https://attack.mitre.org/techniques/T1592',
		subTechniques: ['001', '002', '003', '004'],
	},
	'T1592.001': {
		name: 'Hardware',
		id: 'T1592.001',
		url: 'https://attack.mitre.org/techniques/T1592/001',
		parentTechnique: 'T1592',
	},
	'T1592.002': {
		name: 'Software',
		id: 'T1592.002',
		url: 'https://attack.mitre.org/techniques/T1592/002',
		parentTechnique: 'T1592',
	},
	'T1592.003': {
		name: 'Firmware',
		id: 'T1592.003',
		url: 'https://attack.mitre.org/techniques/T1592/003',
		parentTechnique: 'T1592',
	},
	'T1592.004': {
		name: 'Client Configurations',
		id: 'T1592.004',
		url: 'https://attack.mitre.org/techniques/T1592/004',
		parentTechnique: 'T1592',
	},
	T1593: {
		subTechniques: ['001', '002', '003'],
		name: 'Search Open Websites/Domains',
		id: 'T1593',
		url: 'https://attack.mitre.org/techniques/T1593',
	},
	'T1593.001': {
		name: 'Social Media',
		id: 'T1593.001',
		url: 'https://attack.mitre.org/techniques/T1593/001',
		parentTechnique: 'T1593',
	},
	'T1593.002': {
		name: 'Search Engines',
		id: 'T1593.002',
		url: 'https://attack.mitre.org/techniques/T1593/002',
		parentTechnique: 'T1593',
	},
	'T1593.003': {
		name: 'Code Repositories',
		id: 'T1593.003',
		url: 'https://attack.mitre.org/techniques/T1593/003',
		parentTechnique: 'T1593',
	},
	T1594: { name: 'Search Victim-Owned Websites', id: 'T1594', url: 'https://attack.mitre.org/techniques/T1594' },
	T1595: {
		subTechniques: ['001', '002', '003'],
		name: 'Active Scanning',
		id: 'T1595',
		url: 'https://attack.mitre.org/techniques/T1595',
	},
	'T1595.001': {
		name: 'Scanning IP Blocks',
		id: 'T1595.001',
		url: 'https://attack.mitre.org/techniques/T1595/001',
		parentTechnique: 'T1595',
	},
	'T1595.002': {
		name: 'Vulnerability Scanning',
		id: 'T1595.002',
		url: 'https://attack.mitre.org/techniques/T1595/002',
		parentTechnique: 'T1595',
	},
	'T1595.003': {
		name: 'Wordlist Scanning',
		id: 'T1595.003',
		url: 'https://attack.mitre.org/techniques/T1595/003',
		parentTechnique: 'T1595',
	},
	T1596: {
		subTechniques: ['001', '002', '003', '004', '005'],
		name: 'Search Open Technical Databases',
		id: 'T1596',
		url: 'https://attack.mitre.org/techniques/T1596',
	},
	'T1596.001': {
		name: 'DNS/Passive DNS',
		id: 'T1596.001',
		url: 'https://attack.mitre.org/techniques/T1596/001',
		parentTechnique: 'T1596',
	},
	'T1596.002': {
		name: 'WHOIS',
		id: 'T1596.002',
		url: 'https://attack.mitre.org/techniques/T1596/002',
		parentTechnique: 'T1596',
	},
	'T1596.003': {
		name: 'Digital Certificates',
		id: 'T1596.003',
		url: 'https://attack.mitre.org/techniques/T1596/003',
		parentTechnique: 'T1596',
	},
	'T1596.004': {
		name: 'CDNs',
		id: 'T1596.004',
		url: 'https://attack.mitre.org/techniques/T1596/004',
		parentTechnique: 'T1596',
	},
	'T1596.005': {
		name: 'Scan Databases',
		id: 'T1596.005',
		url: 'https://attack.mitre.org/techniques/T1596/005',
		parentTechnique: 'T1596',
	},
	T1597: {
		subTechniques: ['001', '002'],
		name: 'Search Closed Sources',
		id: 'T1597',
		url: 'https://attack.mitre.org/techniques/T1597',
	},
	'T1597.001': {
		name: 'Threat Intel Vendors',
		id: 'T1597.001',
		url: 'https://attack.mitre.org/techniques/T1597/001',
		parentTechnique: 'T1597',
	},
	'T1597.002': {
		name: 'Purchase Technical Data',
		id: 'T1597.002',
		url: 'https://attack.mitre.org/techniques/T1597/002',
		parentTechnique: 'T1597',
	},
	T1598: {
		subTechniques: ['001', '002', '003'],
		name: 'Phishing for Information',
		id: 'T1598',
		url: 'https://attack.mitre.org/techniques/T1598',
	},
	'T1598.001': {
		name: 'Spearphishing Service',
		id: 'T1598.001',
		url: 'https://attack.mitre.org/techniques/T1598/001',
		parentTechnique: 'T1598',
	},
	'T1598.002': {
		name: 'Spearphishing Attachment',
		id: 'T1598.002',
		url: 'https://attack.mitre.org/techniques/T1598/002',
		parentTechnique: 'T1598',
	},
	'T1598.003': {
		name: 'Spearphishing Link',
		id: 'T1598.003',
		url: 'https://attack.mitre.org/techniques/T1598/003',
		parentTechnique: 'T1598',
	},
	T1599: {
		subTechniques: ['001'],
		name: 'Network Boundary Bridging',
		id: 'T1599',
		url: 'https://attack.mitre.org/techniques/T1599',
	},
	'T1599.001': {
		name: 'Network Address Translation Traversal',
		id: 'T1599.001',
		url: 'https://attack.mitre.org/techniques/T1599/001',
		parentTechnique: 'T1599',
	},
	T1600: {
		name: 'Weaken Encryption',
		id: 'T1600',
		url: 'https://attack.mitre.org/techniques/T1600',
		subTechniques: ['001', '002'],
	},
	'T1600.001': {
		name: 'Reduce Key Space',
		id: 'T1600.001',
		url: 'https://attack.mitre.org/techniques/T1600/001',
		parentTechnique: 'T1600',
	},
	'T1600.002': {
		name: 'Disable Crypto Hardware',
		id: 'T1600.002',
		url: 'https://attack.mitre.org/techniques/T1600/002',
		parentTechnique: 'T1600',
	},
	T1601: {
		name: 'Modify System Image',
		id: 'T1601',
		url: 'https://attack.mitre.org/techniques/T1601',
		subTechniques: ['001', '002'],
	},
	'T1601.001': {
		name: 'Patch System Image',
		id: 'T1601.001',
		url: 'https://attack.mitre.org/techniques/T1601/001',
		parentTechnique: 'T1601',
	},
	'T1601.002': {
		name: 'Downgrade System Image',
		id: 'T1601.002',
		url: 'https://attack.mitre.org/techniques/T1601/002',
		parentTechnique: 'T1601',
	},
	T1602: {
		name: 'Data from Configuration Repository',
		id: 'T1602',
		url: 'https://attack.mitre.org/techniques/T1602',
		subTechniques: ['001', '002'],
	},
	'T1602.001': {
		name: 'SNMP (MIB Dump)',
		id: 'T1602.001',
		url: 'https://attack.mitre.org/techniques/T1602/001',
		parentTechnique: 'T1602',
	},
	'T1602.002': {
		name: 'Network Device Configuration Dump',
		id: 'T1602.002',
		url: 'https://attack.mitre.org/techniques/T1602/002',
		parentTechnique: 'T1602',
	},
	T1606: {
		subTechniques: ['001', '002'],
		name: 'Forge Web Credentials',
		id: 'T1606',
		url: 'https://attack.mitre.org/techniques/T1606',
	},
	'T1606.001': {
		name: 'Web Cookies',
		id: 'T1606.001',
		url: 'https://attack.mitre.org/techniques/T1606/001',
		parentTechnique: 'T1606',
	},
	'T1606.002': {
		name: 'SAML Tokens',
		id: 'T1606.002',
		url: 'https://attack.mitre.org/techniques/T1606/002',
		parentTechnique: 'T1606',
	},
	T1608: {
		subTechniques: ['001', '002', '003', '004', '005', '006'],
		name: 'Stage Capabilities',
		id: 'T1608',
		url: 'https://attack.mitre.org/techniques/T1608',
	},
	'T1608.001': {
		name: 'Upload Malware',
		id: 'T1608.001',
		url: 'https://attack.mitre.org/techniques/T1608/001',
		parentTechnique: 'T1608',
	},
	'T1608.002': {
		name: 'Upload Tool',
		id: 'T1608.002',
		url: 'https://attack.mitre.org/techniques/T1608/002',
		parentTechnique: 'T1608',
	},
	'T1608.003': {
		name: 'Install Digital Certificate',
		id: 'T1608.003',
		url: 'https://attack.mitre.org/techniques/T1608/003',
		parentTechnique: 'T1608',
	},
	'T1608.004': {
		name: 'Drive-by Target',
		id: 'T1608.004',
		url: 'https://attack.mitre.org/techniques/T1608/004',
		parentTechnique: 'T1608',
	},
	'T1608.005': {
		name: 'Link Target',
		id: 'T1608.005',
		url: 'https://attack.mitre.org/techniques/T1608/005',
		parentTechnique: 'T1608',
	},
	'T1608.006': {
		name: 'SEO Poisoning',
		id: 'T1608.006',
		url: 'https://attack.mitre.org/techniques/T1608/006',
		parentTechnique: 'T1608',
	},
	T1609: { name: 'Container Administration Command', id: 'T1609', url: 'https://attack.mitre.org/techniques/T1609' },
	T1610: { name: 'Deploy Container', id: 'T1610', url: 'https://attack.mitre.org/techniques/T1610' },
	T1611: { name: 'Escape to Host', id: 'T1611', url: 'https://attack.mitre.org/techniques/T1611' },
	T1612: { name: 'Build Image on Host', id: 'T1612', url: 'https://attack.mitre.org/techniques/T1612' },
	T1613: { name: 'Container and Resource Discovery', id: 'T1613', url: 'https://attack.mitre.org/techniques/T1613' },
	T1614: {
		subTechniques: ['001'],
		name: 'System Location Discovery',
		id: 'T1614',
		url: 'https://attack.mitre.org/techniques/T1614',
	},
	'T1614.001': {
		name: 'System Language Discovery',
		id: 'T1614.001',
		url: 'https://attack.mitre.org/techniques/T1614/001',
		parentTechnique: 'T1614',
	},
	T1615: { name: 'Group Policy Discovery', id: 'T1615', url: 'https://attack.mitre.org/techniques/T1615' },
	T1619: { name: 'Cloud Storage Object Discovery', id: 'T1619', url: 'https://attack.mitre.org/techniques/T1619' },
	T1620: { name: 'Reflective Code Loading', id: 'T1620', url: 'https://attack.mitre.org/techniques/T1620' },
	T1621: {
		name: 'Multi-Factor Authentication Request Generation',
		id: 'T1621',
		url: 'https://attack.mitre.org/techniques/T1621',
	},
	T1622: { name: 'Debugger Evasion', id: 'T1622', url: 'https://attack.mitre.org/techniques/T1622' },
	T1647: { name: 'Plist File Modification', id: 'T1647', url: 'https://attack.mitre.org/techniques/T1647' },
	T1648: { name: 'Serverless Execution', id: 'T1648', url: 'https://attack.mitre.org/techniques/T1648' },
	T1649: {
		name: 'Steal or Forge Authentication Certificates',
		id: 'T1649',
		url: 'https://attack.mitre.org/techniques/T1649',
	},
	TA0001: { name: 'Initial Access', id: 'TA0001', url: 'https://attack.mitre.org/tactics/TA0001' },
	TA0002: { name: 'Execution', id: 'TA0002', url: 'https://attack.mitre.org/tactics/TA0002' },
	TA0003: { name: 'Persistence', id: 'TA0003', url: 'https://attack.mitre.org/tactics/TA0003' },
	TA0004: { name: 'Privilege Escalation', id: 'TA0004', url: 'https://attack.mitre.org/tactics/TA0004' },
	TA0005: { name: 'Defense Evasion', id: 'TA0005', url: 'https://attack.mitre.org/tactics/TA0005' },
	TA0006: { name: 'Credential Access', id: 'TA0006', url: 'https://attack.mitre.org/tactics/TA0006' },
	TA0007: { name: 'Discovery', id: 'TA0007', url: 'https://attack.mitre.org/tactics/TA0007' },
	TA0008: { name: 'Lateral Movement', id: 'TA0008', url: 'https://attack.mitre.org/tactics/TA0008' },
	TA0009: { name: 'Collection', id: 'TA0009', url: 'https://attack.mitre.org/tactics/TA0009' },
	TA0010: { name: 'Exfiltration', id: 'TA0010', url: 'https://attack.mitre.org/tactics/TA0010' },
	TA0011: { name: 'Command and Control', id: 'TA0011', url: 'https://attack.mitre.org/tactics/TA0011' },
	TA0040: { name: 'Impact', id: 'TA0040', url: 'https://attack.mitre.org/tactics/TA0040' },
	TA0042: { name: 'Resource Development', id: 'TA0042', url: 'https://attack.mitre.org/tactics/TA0042' },
	TA0043: { name: 'Reconnaissance', id: 'TA0043', url: 'https://attack.mitre.org/tactics/TA0043' },
	'enterprise-attack': {
		name: 'Enterprise ATT&CK',
		id: 'enterprise-attack',
		url: 'https://attack.mitre.org/matrices/enterprise',
	},
};
