Statements (49)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybersecurity framework
|
gptkbp:contains |
tactics
detection techniques mitigations sub-techniques |
gptkbp:containsCommunity |
gptkb:ATT&CK_Community
|
gptkbp:covers |
gptkb:Windows
gptkb:macOS gptkb:Linux cloud platforms SaaS environments |
gptkbp:describes |
adversary tactics
adversary techniques |
gptkbp:developedBy |
gptkb:MITRE_Corporation
|
gptkbp:documentation |
https://attack.mitre.org/resources/enterprise/
|
gptkbp:firstReleased |
2015
|
gptkbp:focusesOn |
enterprise environments
|
gptkbp:hasIDSystem |
Tactic and Technique IDs
|
gptkbp:hasVersion |
yes
|
https://www.w3.org/2000/01/rdf-schema#label |
Enterprise ATT&CK
|
gptkbp:license |
gptkb:Creative_Commons_Attribution_4.0
|
gptkbp:matrixRepresentation |
gptkb:Enterprise_ATT&CK_Matrix
|
gptkbp:openToPublic |
true
|
gptkbp:partOf |
gptkb:MITRE_ATT&CK
|
gptkbp:relatedTo |
gptkb:ATT&CK_for_ICS
gptkb:ATT&CK_for_Mobile |
gptkbp:supportedBy |
https://attack.mitre.org/resources/enterprise/#api
|
gptkbp:updated |
regularly
|
gptkbp:usedBy |
security professionals
penetration testers threat analysts defenders |
gptkbp:usedFor |
security operations
red teaming threat intelligence defensive gap assessment |
gptkbp:usedIn |
incident response
adversary emulation security product evaluation cyber threat emulation security control validation |
gptkbp:uses |
gptkb:security
threat hunting adversary simulation mapping detections |
gptkbp:website |
https://attack.mitre.org
|
gptkbp:bfsParent |
gptkb:MITRE_ATT&CK
|
gptkbp:bfsLayer |
6
|