language:
- en
license: apache-2.0
size_categories:
- n<1K
task_categories:
- question-answering
- text-classification
tags:
- cybersecurity
- ayinedjimi-consultants
- en
- mitre-attack
- threat-intelligence
- attack-techniques
- adversary-emulation
- english
- security
- pentest
- red-team
- blue-team
- SOC
- CTI
- threat-hunting
- incident-response
- vulnerability-assessment
- devsecops
- offensive-security
- defensive-security
- security-training
- CTF
- OSCP
- CEH
pretty_name: MITRE ATT&CK Framework (English)
authors:
- name: Ayi NEDJIMI
url: https://ayinedjimi-consultants.fr/bio.html
configs:
- config_name: default
data_files:
- split: train
path: data/train-*
source_datasets:
- original
dataset_info:
dataset_size: null
download_size: null
MITRE ATT&CK Enterprise - Complete English Dataset
Comprehensive dataset of the MITRE ATT&CK Enterprise framework on Hugging Face. Data extracted automatically from official STIX 2.1 sources.
Description
This dataset covers the entire MITRE ATT&CK Enterprise framework:
- 14 tactics with full descriptions
- 691 techniques and sub-techniques (216 techniques + 475 sub-techniques)
- 44 mitigations with associated techniques
- 172 threat groups (APTs) with their known techniques
- 30 Q&A pairs covering ATT&CK concepts
Structure
1. tactics.json (14 entries)
id, name, description, shortname, url, techniques_count
2. techniques.json (691 entries)
id, name, description, tactic_ids, tactic_names, is_subtechnique, parent_id, platforms, detection, mitigation_ids, data_sources, url, created, modified
3. mitigations.json (44 entries)
id, name, description, technique_ids, url
4. groups.json (172 entries)
id, name, aliases, description, technique_ids, url
5. qa_dataset.json (30 entries)
id, question, answer, category, reference, difficulty, keywords
Usage
from datasets import load_dataset
ds = load_dataset("AYI-NEDJIMI/mitre-attack-en", data_files="data/techniques.json")
for tech in ds["train"]:
print(f"{tech['id']} - {tech['name']}")
Use Cases
- Threat Intelligence: Structured reference for threat analysis
- SOC Training: Educational material for security analysts
- Red Team: ATT&CK-based exercise planning
- Detection Engineering: Mapping detection rules to ATT&CK techniques
- RAG / Fine-tuning: Training specialized cybersecurity models
Other Datasets
| Dataset | Description | Link |
|---|---|---|
| OWASP Top 10 FR | OWASP Top 10 in French | owasp-top10-fr |
| OWASP Top 10 EN | OWASP Top 10 in English | owasp-top10-en |
| ISO 27001:2022 FR | ISO 27001 in French | iso27001 |
| ISO 27001:2022 EN | ISO 27001 in English | iso27001-en |
| MITRE ATT&CK FR | ATT&CK in French | mitre-attack-fr |
| AD Attacks FR | AD Attacks in French | ad-attacks-fr |
| AD Attacks EN | AD Attacks in English | ad-attacks-en |
Interactive Explorer
Explore this dataset interactively: MITRE ATT&CK Explorer
Full Collection
This dataset is part of the Cybersecurity Datasets & Tools collection on HuggingFace.
Source
- MITRE ATT&CK: Official STIX 2.1 data from attack-stix-data
- Extraction: Automated with
mitreattack-python
License
Apache 2.0 - MITRE ATT&CK data is under Apache 2.0.
Citation
@dataset{mitre_attack_en_2025,
title={MITRE ATT&CK Enterprise - Complete English Dataset},
author={AYI-NEDJIMI},
year={2025},
publisher={Hugging Face},
url={https://huggingface.co/datasets/AYI-NEDJIMI/mitre-attack-en}
}
Author & Resources
Ayi NEDJIMI - Senior Consultant in Offensive Cybersecurity & AI
Cybersecurity Articles
- Website - Cybersecurity & AI Articles
- OAuth 2.0 Security Guide
- NTLM Relay Attacks Guide
- Kubernetes Security Hardening
- Memory Forensics with Volatility
- Securing Microsoft 365 with Conditional Access
AI Articles
- RAG: Retrieval-Augmented Generation
- Optimizing Document Chunking
- Choosing a Vector Database
- Embedding Security & Privacy
Networks
Author
Ayi NEDJIMI - Cybersecurity Consultant & Trainer | AI Expert
Related Articles
- Top 10 Attaques Active Directory
- Top 10 Solutions EDR/XDR 2025
- Threat Hunting M365
- Kerberos Exploitation AD
- OAuth Security
- Attaques API GraphQL & REST
- Attaques CI/CD
- Evasion EDR/XDR
- Living Off The Land à Échelle
- NTLM Relay Moderne
- Supply Chain Applicative
Free Cybersecurity Resources
- Livre Blanc NIS 2
- Livre Blanc Sécurité Active Directory
- Livre Blanc Pentest Cloud AWS/Azure/GCP
- Livre Blanc Sécurité Kubernetes
- Livre Blanc IA Cyberdéfense
- Livre Blanc Anatomie Ransomware
- Guide Sécurisation AD 2025
- Guide Tiering Model AD
Part of the Collection
This dataset is part of the Cybersecurity Datasets & Tools Collection by AYI-NEDJIMI Consultants.