MITRE ATT&CK

The MITRE Corporation

Application Filed: 2017-10-13
Trademark Application Details
Trademark Logo MITRE ATT&CK

Mark For: MITRE ATT&CK® trademark registration is intended to cover the categories of providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to describe the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation. [all]

Status

2022-07-06 UTC
LIVE REGISTRATION Issued and Active
The trademark application has been registered with the Office.


Research OneLook Acronym Finder
Serial Number87645105
Registration Number5938593
Mark Literal ElementsMITRE ATT&CK
Mark Drawing Type4 - STANDARD CHARACTER MARK
Mark TypeSERVICE MARK
RegisterPRINCIPAL
Current LocationPUBLICATION AND ISSUE SECTION 2019-11-12
Basis1(a)
Class StatusACTIVE
Primary US Classes
  • 100: Miscellaneous
  • 101: Advertising and Business
Primary International Class
  • 042 - Primary Class
  • (Computer, scientific & legal) Scientific and technological services and research and design relating thereto: industrial analysis and research services; design and development of computer hardware and software; legal services.
Filed UseNo
Current UseYes
Intent To UseNo
Filed ITUYes
44D FiledNo
44E CurrentNo
66A CurrentNo
Current BasisNo
No BasisNo
Attorney NameTracy-Gene G. Durkin
Attorney Docket Number2272.2280000
Law Office AssignedL10
Employee NameKEATING, MICHAEL P

Timeline

2015-05-00Date of First Use
2015-05-01Date of First Use
2015-05-01Date of Use In Commerce
2017-10-13Application Filed
2018-09-04Published
2018-09-04Published for Opposition
2019-11-12Location: PUBLICATION AND ISSUE SECTION
2019-12-17Status: Live/Registered
2019-12-17Status: Registered. The registration date is used to determine when post-registration maintenance documents are due.
2019-12-17Trademark Registered
2019-12-17Transaction Date
2024-12-17Maintenance Early File Date
2025-12-17Maintenance On Time Date
2026-06-17Maintenance Late Fee Date

Trademark Parties (Applicants & Owners)

Party: The MITRE Corporation
Address7515 Colshire Drive McLean, VIRGINIA UNITED STATES 221027508
Legal Entity TypeCorporation
Legal Entity StateDELAWARE

Attorney of Record

TRACY-GENE G. DURKIN
STERNE, KESSLER, GOLDSTEIN & FOX P.L.L.C
1100 NEW YORK AVENUE, NW
WASHINGTON, DC 20005

Good, Services, and Codes


IC 042. US 100 101. G & S: Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to describe the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation. FIRST USE: 20150500. FIRST USE IN COMMERCE: 20150500

International Codes:42
U.S. Codes:100,101
Type CodeType
GS0421Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to describe the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation
GS0421Providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise and preparing related reports and technical documentation; providing information on the tactics and techniques employed by adversaries to exploit or compromise, operate within, and cause impacts to computer networks across all industries; providing a website featuring technology that allows users to describe the actions an adversary might take while operating within an enterprise network for the purpose of characterizing and describing post-compromise adversary behavior; providing information and advice to assist in developing computer and network system detection defenses for compromise, pre-, and post-compromise; providing information and advice to assist in network defense and to assist in prioritizing computer network defense by detailing compromise, pre-, and post-compromise tactics, techniques, and procedures used by adversaries to execute their objectives; providing information and advice to assist in adversary emulation and red teaming to test and measure the effectiveness of computer network defenses; computer security consultation, namely, providing a collection of information on the tactics and techniques employed by cyber adversaries; computer security consultation, namely, providing a collection of information characterizing the post-compromise activities of cyber adversaries to describe what might occur during an intrusion after an adversary has acquired access to a computer network; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in technologies and applications including mobile devices, enterprise networks, medical devices, embedded devices, control systems, and the connections between these systems and preparing related reports and technical documentation; providing information on the topic of cyber intrusions, cyber adversaries, cyber threat intelligence, cyber security, system compromise, and network compromise for use in applications including mobile devices, enterprise networks, medical devices, embedded devices, network devices, cloud systems, control systems, and the connections between these systems and preparing related reports and technical documentation

Trademark Filing History

DescriptionDateProceeding Number
REGISTERED-PRINCIPAL REGISTER2019-12-17
NOTICE OF ACCEPTANCE OF STATEMENT OF USE E-MAILED2019-11-13
ALLOWED PRINCIPAL REGISTER - SOU ACCEPTED2019-11-12
STATEMENT OF USE PROCESSING COMPLETE2019-11-0876538
CASE ASSIGNED TO INTENT TO USE PARALEGAL2019-11-0876538
USE AMENDMENT FILED2019-10-2776538
TEAS STATEMENT OF USE RECEIVED2019-10-27
NOTICE OF APPROVAL OF EXTENSION REQUEST E-MAILED2019-05-02
TEAS EXTENSION RECEIVED2019-04-30
SOU EXTENSION 1 GRANTED2019-04-3098765
SOU EXTENSION 1 FILED2019-04-3098765
EXTENSION 1 GRANTED2019-04-3098765
EXTENSION 1 FILED2019-04-3098765
NOA E-MAILED - SOU REQUIRED FROM APPLICANT2018-10-30
PUBLISHED FOR OPPOSITION2018-09-04
OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED2018-09-04
NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED2018-08-15
NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED2018-07-256328
EXAMINERS AMENDMENT E-MAILED2018-07-256328
EXAMINERS AMENDMENT -WRITTEN2018-07-2576505
EXAMINER'S AMENDMENT ENTERED2018-07-2588888
APPROVED FOR PUB - PRINCIPAL REGISTER2018-07-25
TEAS/EMAIL CORRESPONDENCE ENTERED2018-07-2488889
TEAS RESPONSE TO OFFICE ACTION RECEIVED2018-07-24
TEAS CHANGE OF CORRESPONDENCE RECEIVED2018-07-24
CORRESPONDENCE RECEIVED IN LAW OFFICE2018-07-2488889
NOTIFICATION OF NON-FINAL ACTION E-MAILED2018-01-246325
NON-FINAL ACTION WRITTEN2018-01-2476505
NON-FINAL ACTION E-MAILED2018-01-246325
ASSIGNED TO EXAMINER2018-01-2376505
NEW APPLICATION OFFICE SUPPLIED DATA ENTERED IN TRAM2017-10-25

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed