gptkbp:instanceOf
|
cybersecurity framework
|
gptkbp:category
|
gptkb:security
cyber defense
cyber threat intelligence
|
gptkbp:citation
|
cybersecurity industry
|
gptkbp:developedBy
|
gptkb:MITRE_Corporation
|
gptkbp:documentation
|
adversary behavior
|
gptkbp:firstReleased
|
2013
|
gptkbp:focusesOn
|
cyber adversary tactics
cyber adversary techniques
|
gptkbp:hasComponent
|
gptkb:Enterprise_ATT&CK
gptkb:ICS_ATT&CK
gptkb:Mobile_ATT&CK
|
gptkbp:hasTacticCount
|
14 (Enterprise matrix)
|
gptkbp:hasTechniqueCount
|
over 200
|
https://www.w3.org/2000/01/rdf-schema#label
|
MITRE ATT&CK framework
|
gptkbp:language
|
English
|
gptkbp:license
|
gptkb:Creative_Commons_Attribution_4.0
|
gptkbp:openSource
|
true
|
gptkbp:openToPublic
|
true
|
gptkbp:provides
|
matrix of tactics and techniques
|
gptkbp:referencedIn
|
gptkb:NIST_publications
cybersecurity standards
|
gptkbp:supports
|
gptkb:security
incident response
adversary emulation
mapping of security controls
|
gptkbp:tactics
|
gptkb:Defense_Evasion
gptkb:Privilege_Escalation
gptkb:library
gptkb:Discovery
gptkb:Command_and_Control
Impact
Execution
Credential Access
Exfiltration
Initial Access
Lateral Movement
Persistence
|
gptkbp:updatedRegularly
|
true
|
gptkbp:usedBy
|
security analysts
penetration testers
cyber defenders
threat hunters
|
gptkbp:usedFor
|
security operations
red teaming
threat intelligence
defensive gap assessment
|
gptkbp:website
|
https://attack.mitre.org/
|
gptkbp:bfsParent
|
gptkb:Red_Team
gptkb:pass-the-ticket_attack
|
gptkbp:bfsLayer
|
6
|