Skip to main content

MITRE ATT&CK

Fetches indicators from MITRE ATT&CK.

We recommend using the MITRE v2 Feed instead. The MITRE v2 Feed is more aligned with the STIX format, and includes more objects, such as Malware, Intrusion Set and Relationships.

Use the MITRE ATT&CK Feed pack to fetch indicators from MITRE ATT&CK. MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations of cyber security threats.

You can

  • Retrieve indicators from MITRE ATT&CK.
  • Look up the reputation of the indicators.
  • Perform a generic search across the MITRE ATT&CK indicators.
  • Display the feed names and IDs from TAXII.

Note: When you fetch indicators from MITRE ATT&CK, indicators are not created within Cortex XSOAR.

PUBLISHER

Cortex XSOAR

INFO

CertificationRead more
Supported ByCortex XSOAR
CreatedJuly 18, 2020
Last ReleaseSeptember 23, 2021
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.