Update README.md
Browse files
README.md
CHANGED
|
@@ -1,3 +1,39 @@
|
|
| 1 |
---
|
| 2 |
license: unlicense
|
|
|
|
|
|
|
| 3 |
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
---
|
| 2 |
license: unlicense
|
| 3 |
+
language:
|
| 4 |
+
- en
|
| 5 |
---
|
| 6 |
+
# Cloud Matrix Data
|
| 7 |
+
|
| 8 |
+
## Description
|
| 9 |
+
|
| 10 |
+
This dataset contains information related to cybersecurity techniques, as cataloged by the MITRE ATT&CK framework(v14).
|
| 11 |
+
The data includes details such as unique identifiers, names, descriptions, URLs to more information, associated tactics, detection methods, applicable platforms, and data sources for detection. It also specifies whether a technique is a sub-technique of another and lists defenses that the technique may bypass.
|
| 12 |
+
|
| 13 |
+
## Structure
|
| 14 |
+
|
| 15 |
+
- **Rows**: 130
|
| 16 |
+
- **Columns**: 11
|
| 17 |
+
|
| 18 |
+
The columns are as follows:
|
| 19 |
+
|
| 20 |
+
1. `ID`: Unique identifier for the technique (e.g., T1189, T1566.002)
|
| 21 |
+
2. `Name`: Name of the technique (e.g., Drive-by Compromise, Phishing: Spearphishing Link)
|
| 22 |
+
3. `Description`: Brief description of the technique
|
| 23 |
+
4. `URL`: Link to more information about the technique
|
| 24 |
+
5. `Tactics`: Category of tactics the technique falls under
|
| 25 |
+
6. `Detection`: How the technique might be detected
|
| 26 |
+
7. `Platforms`: Operating systems or platforms the technique applies to
|
| 27 |
+
8. `Data Sources`: Sources of data for detection
|
| 28 |
+
9. `Is Sub-Technique`: Whether the entry is a sub-technique (True/False)
|
| 29 |
+
10. `Sub-Technique Of`: If the entry is a sub-technique, the parent technique's ID
|
| 30 |
+
11. `Defenses Bypassed`: Defenses the technique is known to bypass
|
| 31 |
+
|
| 32 |
+
## Usage
|
| 33 |
+
|
| 34 |
+
This dataset can be used by cybersecurity professionals and researchers to analyze and categorize different types of cybersecurity threats and their characteristics. It can also assist in developing defensive strategies by providing detection methods and noting applicable platforms.
|
| 35 |
+
|
| 36 |
+
## Additional Information
|
| 37 |
+
|
| 38 |
+
- The dataset is likely derived from the MITRE ATT&CK framework, as indicated by the URL structure and content.
|
| 39 |
+
- The data may need to be updated periodically to reflect the latest information from the MITRE ATT&CK database.
|