Skip to main content

MITRE ATT&CK

Download With Dependencies

Fetches indicators from MITRE ATT&CK.

Use the MITRE ATT&CK Feed pack to fetch indicators from MITRE ATT&CK. MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations of cyber security threats.

The newest MITRE Feed V2 Pack introduces the STIX format and ingests more Threat Intel than before. All the MITRE information now in your XSOAR Threat Intel Library.

  • Techniques and SubTechniques are now Attack Pattern
  • Group as Intrusion Set
  • Software as Tool or Malware
  • Mitigation as Course of Action
  • Note: Relationships is supported from version 6.2 and later.

Note: When upgrading from v1 (MITRE IDs Feed) to v2 (MITRE ATT&CK) - disabling the MITRE IDs Feed indicator type, and instance are important for the smooth flow of the upgrade.

PUBLISHER

Cortex

PLATFORMS

Cortex XSOARCortex XSIAM

INFO

CertificationRead more
Supported ByCortex
CreatedMay 27, 2021
Last ReleaseNovember 8, 2022
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.