MITRE ATT&CK® & ATLAS™
attack
The MITRE ATT&CK® & ATLAS™ object describes the tactic, technique, sub-technique & mitigation associated to an attack.
Attributes
| Caption | Name | Type | Description |
|---|---|---|---|
| MITRE Mitigation | mitigation | MITRE Mitigation[] | The Mitigation object describes the MITRE ATT&CK® or ATLAS™ Mitigation ID and/or name that is associated to an attack. |
| Raw Data | raw_data | JSON | Group: |
| Record ID | record_id | String | Group: |
| MITRE Sub-technique | sub_technique | MITRE Sub-technique[] | The Sub-technique object describes the MITRE ATT&CK® or ATLAS™ Sub-technique ID and/or name associated to an attack. |
| MITRE Tactic | tactic | MITRE Tactic[] | The Tactic object describes the MITRE ATT&CK® or ATLAS™ Tactic ID and/or name that is associated to an attack. |
| Tactics | tactics | MITRE Tactic[] | The Tactic object describes the tactic ID and/or tactic name that are associated with the attack technique, as defined by ATT&CK® Matrix.
|
| MITRE Technique | technique | MITRE Technique[] | The Technique object describes the MITRE ATT&CK® or ATLAS™ Technique ID and/or name associated to an attack. |
| Unmapped | unmapped | Unmapped[] | Data from the source that was not mapped into the schema. |
| Version | version | String | The ATT&CK® or ATLAS™ Matrix version. |
Relationships
Inbound Relationships
These objects and events reference MITRE ATT&CK® & ATLAS™ in their attributes:
- FTP Activity
- Web Resource Access Activity
- Scan Activity
- Email File Activity
- File System Activity
- Device Config State Change
- User Inventory Info
- Module Query
- Kernel Activity
- IAM Analysis Finding
- Base Event
- SSH Activity
- Group Management
- Registry Value Query
- Data Security Finding
- Email Activity
- File Remediation Activity
- Module Activity
- Windows Service Activity
- Device Inventory Info
- File Hosting Activity
- Related Event/Finding
- Authorize Session
- Registry Value Activity
- Application Lifecycle
- DNS Activity
- Account Change
- Airborne Broadcast Activity
- Operating System Patch State
- Incident Finding
- Drone Flights Activity
- DHCP Activity
- Remediation Activity
- Kernel Extension Activity
- User Session Query
- Cloud Resources Inventory Info
- Web Resources Activity
- Script Activity
- File Query
- Detection Finding
- Finding Information
- Process Query
- OSINT Inventory Info
- Compliance Finding
- Network Activity
- Entity Management
- Vulnerability Finding
- Admin Group Query
- RDP Activity
- Peripheral Device Query
- Network Connection Query
- Windows Resource Activity
- OSINT
- Application Security Posture Finding
- Live Evidence Info
- Registry Key Activity
- Authentication
- Application Error
- Folder Query
- Datastore Activity
- Tunnel Activity
- Process Remediation Activity
- NTP Activity
- Event Log Activity
- Scheduled Job Activity
- Prefetch Query
- Process Activity
- Memory Activity
- Startup Item Query
- Network File Activity
- Security Finding
- Registry Key Query
- Kernel Object Query
- User Access Management
- Service Query
- Job Query
- API Activity
- HTTP Activity
- Device Config State
- Email URL Activity
- Network Remediation Activity
- Networks Query
- Software Inventory Info
- User Query
- SMB Activity
Outbound Relationships
MITRE ATT&CK® & ATLAS™ references the following objects and events in its attributes:
This page describes qdm-1.5.1+ocsf-1.6.0
Updated 13 days ago