mitre-attack-en / README.md
AYI-NEDJIMI's picture
Add schema.org SEO metadata to Dataset Card
b648a4b verified
metadata
language:
  - en
license: apache-2.0
size_categories:
  - n<1K
task_categories:
  - question-answering
  - text-classification
tags:
  - cybersecurity
  - ayinedjimi-consultants
  - en
  - mitre-attack
  - threat-intelligence
  - attack-techniques
  - adversary-emulation
  - english
  - security
  - pentest
  - red-team
  - blue-team
  - SOC
  - CTI
  - threat-hunting
  - incident-response
  - vulnerability-assessment
  - devsecops
  - offensive-security
  - defensive-security
  - security-training
  - CTF
  - OSCP
  - CEH
pretty_name: MITRE ATT&CK Framework (English)
authors:
  - name: Ayi NEDJIMI
    url: https://ayinedjimi-consultants.fr/bio.html
configs:
  - config_name: default
    data_files:
      - split: train
        path: data/train-*
source_datasets:
  - original
dataset_info:
  dataset_size: null
  download_size: null

MITRE ATT&CK Enterprise - Complete English Dataset

Comprehensive dataset of the MITRE ATT&CK Enterprise framework on Hugging Face. Data extracted automatically from official STIX 2.1 sources.

Description

This dataset covers the entire MITRE ATT&CK Enterprise framework:

  • 14 tactics with full descriptions
  • 691 techniques and sub-techniques (216 techniques + 475 sub-techniques)
  • 44 mitigations with associated techniques
  • 172 threat groups (APTs) with their known techniques
  • 30 Q&A pairs covering ATT&CK concepts

Structure

1. tactics.json (14 entries)

id, name, description, shortname, url, techniques_count

2. techniques.json (691 entries)

id, name, description, tactic_ids, tactic_names, is_subtechnique, parent_id, platforms, detection, mitigation_ids, data_sources, url, created, modified

3. mitigations.json (44 entries)

id, name, description, technique_ids, url

4. groups.json (172 entries)

id, name, aliases, description, technique_ids, url

5. qa_dataset.json (30 entries)

id, question, answer, category, reference, difficulty, keywords

Usage

from datasets import load_dataset

ds = load_dataset("AYI-NEDJIMI/mitre-attack-en", data_files="data/techniques.json")
for tech in ds["train"]:
    print(f"{tech['id']} - {tech['name']}")

Use Cases

  • Threat Intelligence: Structured reference for threat analysis
  • SOC Training: Educational material for security analysts
  • Red Team: ATT&CK-based exercise planning
  • Detection Engineering: Mapping detection rules to ATT&CK techniques
  • RAG / Fine-tuning: Training specialized cybersecurity models

Other Datasets

Dataset Description Link
OWASP Top 10 FR OWASP Top 10 in French owasp-top10-fr
OWASP Top 10 EN OWASP Top 10 in English owasp-top10-en
ISO 27001:2022 FR ISO 27001 in French iso27001
ISO 27001:2022 EN ISO 27001 in English iso27001-en
MITRE ATT&CK FR ATT&CK in French mitre-attack-fr
AD Attacks FR AD Attacks in French ad-attacks-fr
AD Attacks EN AD Attacks in English ad-attacks-en

Interactive Explorer

Explore this dataset interactively: MITRE ATT&CK Explorer

Full Collection

This dataset is part of the Cybersecurity Datasets & Tools collection on HuggingFace.

Source

  • MITRE ATT&CK: Official STIX 2.1 data from attack-stix-data
  • Extraction: Automated with mitreattack-python

License

Apache 2.0 - MITRE ATT&CK data is under Apache 2.0.

Citation

@dataset{mitre_attack_en_2025,
  title={MITRE ATT&CK Enterprise - Complete English Dataset},
  author={AYI-NEDJIMI},
  year={2025},
  publisher={Hugging Face},
  url={https://huggingface.co/datasets/AYI-NEDJIMI/mitre-attack-en}
}

Author & Resources

Ayi NEDJIMI - Senior Consultant in Offensive Cybersecurity & AI

Cybersecurity Articles

AI Articles

Networks

Author

Ayi NEDJIMI - Cybersecurity Consultant & Trainer | AI Expert

Related Articles

Free Cybersecurity Resources

Part of the Collection

This dataset is part of the Cybersecurity Datasets & Tools Collection by AYI-NEDJIMI Consultants.