Statements (54)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybersecurity framework
|
gptkbp:contains |
gptkb:software
campaigns groups tactics detection data sources techniques mitigations sub-techniques |
gptkbp:developedBy |
gptkb:MITRE_Corporation
|
gptkbp:firstReleased |
2013
|
gptkbp:focusesOn |
cyber adversary tactics
cyber adversary techniques |
gptkbp:hasComponent |
gptkb:Enterprise_ATT&CK
gptkb:ICS_ATT&CK gptkb:Mobile_ATT&CK |
https://www.w3.org/2000/01/rdf-schema#label |
MITRE ATT&CK Framework
|
gptkbp:isWidelyUsedBy |
gptkb:government
gptkb:government_agency cybersecurity professionals security vendors threat intelligence analysts |
gptkbp:license |
Creative Commons Attribution 4.0 International Public License
|
gptkbp:openSource |
true
|
gptkbp:referencedIn |
gptkb:NIST
gptkb:CISA various security standards |
gptkbp:supports |
gptkb:security
incident response adversary emulation threat hunting SOC maturity assessment purple teaming |
gptkbp:tactics |
gptkb:Defense_Evasion
gptkb:Privilege_Escalation gptkb:library gptkb:Discovery gptkb:Command_and_Control Impact Execution Credential Access Exfiltration Initial Access Lateral Movement Persistence |
gptkbp:updatedRegularly |
true
|
gptkbp:usedFor |
security operations
red teaming threat intelligence defensive gap assessment |
gptkbp:website |
https://attack.mitre.org/
|
gptkbp:bfsParent |
gptkb:Privilege_Escalation
|
gptkbp:bfsLayer |
6
|