Skip to main content

MITRE ATT&CK v2

Fetches indicators from MITRE ATT&CK.

Use the MITRE ATT&CK Feed pack to fetch indicators from MITRE ATT&CK. MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations of cyber security threats.

The newest MITRE Feed V2 Pack introduces the STIX format and ingests more Threat Intel than before. All the MITRE information now in your XSOAR Threat Intel Library.

  • Techniques and SubTechniques are now Attack Pattern
  • Group as Intrusion Set
  • Software as Tool or Malware
  • Mitigation as Course of Action
  • Note: Relationships is supported from version 6.2 and later.

PUBLISHER

Cortex XSOAR

INFO

CertificationRead more
Supported ByCortex XSOAR
CreatedMay 27, 2021
Last ReleaseSeptember 23, 2021
WORKS WITH THE FOLLOWING INTEGRATIONS:

DISCLAIMER
Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.