MITRE ATT&CK®
The MITRE ATT&CK® object describes the tactic, technique & sub-technique associated to an attack as defined in ATT&CK® Matrix.
Attributes
Caption | Name | Type | Description |
---|---|---|---|
Raw Data | raw_data |
JSON | The event data as received from the event source. |
Record ID | record_id |
String | Unique identifier for the object |
Sub Technique | sub_technique |
MITRE ATT&CK® Sub Technique[] | The Sub Technique object describes the sub technique ID and/or name associated to an attack, as defined by ATT&CK® Matrix. |
Tactic | tactic |
MITRE ATT&CK® Tactic[] | The Tactic object describes the tactic ID and/or name that is associated to an attack, as defined by ATT&CK® Matrix. |
Tactics | tactics |
MITRE ATT&CK® Tactic[] |
The Tactic object describes the tactic ID and/or tactic name that are associated with the attack technique, as defined by ATT&CK® Matrix.
|
Technique | technique |
MITRE ATT&CK® Technique[] | The Technique object describes the technique ID and/or name associated to an attack, as defined by ATT&CK® Matrix. |
Unmapped Data | unmapped |
Unmapped[] | The attributes that are not mapped to the event schema. The names and values of those attributes are specific to the event source. |
Version | version |
String | The ATT&CK® Matrix version. |
Relationships
Inbound Relationships
These objects and events reference MITRE ATT&CK® in their attributes:
- Network Activity
- Network File Activity
- RDP Activity
- SMB Activity
- Module Activity
- File System Activity
- Web Resources Activity
- Security Finding
- OSINT
- Registry Key Activity
- Email Delivery Activity
- Related Event
- Email File Activity
- Finding Information
- HTTP Activity
- Registry Value Activity
- SSH Activity
- Process Activity
- Scheduled Job Activity
- System Activity
- Event Log Activity
- Datastore Activity
- Email Activity
- Incident Finding
- Tunnel Activity
- Memory Activity
- Data Security Finding
- Email URL Activity
- FTP Activity
- NTP Activity
- DHCP Activity
- DNS Activity
- Detection Finding
- Windows Resource Activity
- Network
- Kernel Activity
- Kernel Extension Activity
- Windows Service Activity
Outbound Relationships
MITRE ATT&CK® references the following objects and events in its attributes:
This page describes qdm-1.3.2+ocsf-1.3.0
Updated about 1 month ago