Statements (54)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cybersecurity_framework
|
| gptkbp:contains |
gptkb:software
campaigns groups tactics detection data sources techniques mitigations sub-techniques |
| gptkbp:developedBy |
gptkb:MITRE_Corporation
|
| gptkbp:firstReleased |
2013
|
| gptkbp:focusesOn |
cyber adversary tactics
cyber adversary techniques |
| gptkbp:hasComponent |
gptkb:Enterprise_ATT&CK
gptkb:ICS_ATT&CK gptkb:Mobile_ATT&CK |
| gptkbp:isWidelyUsedBy |
gptkb:government
gptkb:government_agency cybersecurity professionals security vendors threat intelligence analysts |
| gptkbp:license |
Creative Commons Attribution 4.0 International Public License
|
| gptkbp:openSource |
true
|
| gptkbp:referencedIn |
gptkb:NIST
gptkb:CISA various security standards |
| gptkbp:supports |
gptkb:security
incident response adversary emulation threat hunting SOC maturity assessment purple teaming |
| gptkbp:tactics |
gptkb:Defense_Evasion
gptkb:Privilege_Escalation gptkb:library gptkb:Discovery gptkb:Command_and_Control Impact Execution Credential Access Exfiltration Initial Access Lateral Movement Persistence |
| gptkbp:updatedRegularly |
true
|
| gptkbp:usedFor |
security operations
red teaming threat intelligence defensive gap assessment |
| gptkbp:website |
https://attack.mitre.org/
|
| gptkbp:bfsParent |
gptkb:Privilege_Escalation
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
MITRE ATT&CK Framework
|