voyagar commited on
Commit
1f31d0c
·
1 Parent(s): 28e044a

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +36 -0
README.md CHANGED
@@ -1,3 +1,39 @@
1
  ---
2
  license: unlicense
 
 
3
  ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
  ---
2
  license: unlicense
3
+ language:
4
+ - en
5
  ---
6
+ # Cloud Matrix Data
7
+
8
+ ## Description
9
+
10
+ This dataset contains information related to cybersecurity techniques, as cataloged by the MITRE ATT&CK framework(v14).
11
+ The data includes details such as unique identifiers, names, descriptions, URLs to more information, associated tactics, detection methods, applicable platforms, and data sources for detection. It also specifies whether a technique is a sub-technique of another and lists defenses that the technique may bypass.
12
+
13
+ ## Structure
14
+
15
+ - **Rows**: 130
16
+ - **Columns**: 11
17
+
18
+ The columns are as follows:
19
+
20
+ 1. `ID`: Unique identifier for the technique (e.g., T1189, T1566.002)
21
+ 2. `Name`: Name of the technique (e.g., Drive-by Compromise, Phishing: Spearphishing Link)
22
+ 3. `Description`: Brief description of the technique
23
+ 4. `URL`: Link to more information about the technique
24
+ 5. `Tactics`: Category of tactics the technique falls under
25
+ 6. `Detection`: How the technique might be detected
26
+ 7. `Platforms`: Operating systems or platforms the technique applies to
27
+ 8. `Data Sources`: Sources of data for detection
28
+ 9. `Is Sub-Technique`: Whether the entry is a sub-technique (True/False)
29
+ 10. `Sub-Technique Of`: If the entry is a sub-technique, the parent technique's ID
30
+ 11. `Defenses Bypassed`: Defenses the technique is known to bypass
31
+
32
+ ## Usage
33
+
34
+ This dataset can be used by cybersecurity professionals and researchers to analyze and categorize different types of cybersecurity threats and their characteristics. It can also assist in developing defensive strategies by providing detection methods and noting applicable platforms.
35
+
36
+ ## Additional Information
37
+
38
+ - The dataset is likely derived from the MITRE ATT&CK framework, as indicated by the URL structure and content.
39
+ - The data may need to be updated periodically to reflect the latest information from the MITRE ATT&CK database.