Skip to main content


Fetches indicators from MITRE ATT&CK.

Use the MITRE ATT&CK Feed pack to fetch indicators from MITRE ATT&CK. MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations of cyber security threats.

The newest MITRE Feed V2 Pack introduces the STIX format and ingests more Threat Intel than before. All the MITRE information now in your XSOAR Threat Intel Library.

  • Techniques and SubTechniques are now Attack Pattern
  • Group as Intrusion Set
  • Software as Tool or Malware
  • Mitigation as Course of Action
  • Note: Relationships is supported from version 6.2 and later.

Note: When upgrading from v1 (MITRE IDs Feed) to v2 (MITRE ATT&CK) - disabling the MITRE IDs Feed indicator type, and instance are important for the smooth flow of the upgrade.


Cortex XSOAR


CertificationRead more
Supported ByCortex XSOAR
CreatedMay 27, 2021
Last ReleaseJuly 11, 2022

Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.