|
gptkbp:instanceOf
|
gptkb:cybersecurity_framework
|
|
gptkbp:contains
|
tactics
detection
techniques
mitigations
sub-techniques
|
|
gptkbp:containsCommunity
|
gptkb:ATT&CK_Community
|
|
gptkbp:covers
|
gptkb:Windows
gptkb:macOS
gptkb:Linux
cloud platforms
SaaS environments
|
|
gptkbp:describes
|
adversary tactics
adversary techniques
|
|
gptkbp:developedBy
|
gptkb:MITRE_Corporation
|
|
gptkbp:documentation
|
https://attack.mitre.org/resources/enterprise/
|
|
gptkbp:firstReleased
|
2015
|
|
gptkbp:focusesOn
|
enterprise environments
|
|
gptkbp:hasIDSystem
|
Tactic and Technique IDs
|
|
gptkbp:hasVersion
|
yes
|
|
gptkbp:license
|
gptkb:Creative_Commons_Attribution_4.0
|
|
gptkbp:matrixRepresentation
|
gptkb:Enterprise_ATT&CK_Matrix
|
|
gptkbp:openToPublic
|
true
|
|
gptkbp:partOf
|
gptkb:MITRE_ATT&CK
|
|
gptkbp:relatedTo
|
gptkb:ATT&CK_for_ICS
gptkb:ATT&CK_for_Mobile
|
|
gptkbp:supportedBy
|
https://attack.mitre.org/resources/enterprise/#api
|
|
gptkbp:updated
|
regularly
|
|
gptkbp:usedBy
|
security professionals
penetration testers
threat analysts
defenders
|
|
gptkbp:usedFor
|
security operations
red teaming
threat intelligence
defensive gap assessment
|
|
gptkbp:usedIn
|
incident response
adversary emulation
security product evaluation
cyber threat emulation
security control validation
|
|
gptkbp:uses
|
gptkb:security
threat hunting
adversary simulation
mapping detections
|
|
gptkbp:website
|
https://attack.mitre.org
|
|
gptkbp:bfsParent
|
gptkb:MITRE_ATT&CK
|
|
gptkbp:bfsLayer
|
6
|
|
https://www.w3.org/2000/01/rdf-schema#label
|
Enterprise ATT&CK
|