--- language: - en license: apache-2.0 size_categories: - n<1K task_categories: - question-answering - text-classification tags: - cybersecurity - ayinedjimi-consultants - en - mitre-attack - threat-intelligence - attack-techniques - adversary-emulation - english - security - pentest - red-team - blue-team - SOC - CTI - threat-hunting - incident-response - vulnerability-assessment - devsecops - offensive-security - defensive-security - security-training - CTF - OSCP - CEH pretty_name: MITRE ATT&CK Framework (English) authors: - name: Ayi NEDJIMI url: https://ayinedjimi-consultants.fr/bio.html configs: - config_name: default data_files: - split: train path: data/train-* source_datasets: - original dataset_info: dataset_size: null download_size: null --- # MITRE ATT&CK Enterprise - Complete English Dataset Comprehensive dataset of the **MITRE ATT&CK Enterprise** framework on Hugging Face. Data extracted automatically from official STIX 2.1 sources. ## Description This dataset covers the entire **MITRE ATT&CK Enterprise** framework: - **14 tactics** with full descriptions - **691 techniques and sub-techniques** (216 techniques + 475 sub-techniques) - **44 mitigations** with associated techniques - **172 threat groups** (APTs) with their known techniques - **30 Q&A pairs** covering ATT&CK concepts ## Structure ### 1. `tactics.json` (14 entries) `id`, `name`, `description`, `shortname`, `url`, `techniques_count` ### 2. `techniques.json` (691 entries) `id`, `name`, `description`, `tactic_ids`, `tactic_names`, `is_subtechnique`, `parent_id`, `platforms`, `detection`, `mitigation_ids`, `data_sources`, `url`, `created`, `modified` ### 3. `mitigations.json` (44 entries) `id`, `name`, `description`, `technique_ids`, `url` ### 4. `groups.json` (172 entries) `id`, `name`, `aliases`, `description`, `technique_ids`, `url` ### 5. `qa_dataset.json` (30 entries) `id`, `question`, `answer`, `category`, `reference`, `difficulty`, `keywords` ## Usage ```python from datasets import load_dataset ds = load_dataset("AYI-NEDJIMI/mitre-attack-en", data_files="data/techniques.json") for tech in ds["train"]: print(f"{tech['id']} - {tech['name']}") ``` ## Use Cases - **Threat Intelligence**: Structured reference for threat analysis - **SOC Training**: Educational material for security analysts - **Red Team**: ATT&CK-based exercise planning - **Detection Engineering**: Mapping detection rules to ATT&CK techniques - **RAG / Fine-tuning**: Training specialized cybersecurity models ## Other Datasets | Dataset | Description | Link | |---------|-------------|------| | **OWASP Top 10 FR** | OWASP Top 10 in French | [owasp-top10-fr](https://huggingface.co/datasets/AYI-NEDJIMI/owasp-top10-fr) | | **OWASP Top 10 EN** | OWASP Top 10 in English | [owasp-top10-en](https://huggingface.co/datasets/AYI-NEDJIMI/owasp-top10-en) | | **ISO 27001:2022 FR** | ISO 27001 in French | [iso27001](https://huggingface.co/datasets/AYI-NEDJIMI/iso27001) | | **ISO 27001:2022 EN** | ISO 27001 in English | [iso27001-en](https://huggingface.co/datasets/AYI-NEDJIMI/iso27001-en) | | **MITRE ATT&CK FR** | ATT&CK in French | [mitre-attack-fr](https://huggingface.co/datasets/AYI-NEDJIMI/mitre-attack-fr) | | **AD Attacks FR** | AD Attacks in French | [ad-attacks-fr](https://huggingface.co/datasets/AYI-NEDJIMI/ad-attacks-fr) | | **AD Attacks EN** | AD Attacks in English | [ad-attacks-en](https://huggingface.co/datasets/AYI-NEDJIMI/ad-attacks-en) | ## Interactive Explorer Explore this dataset interactively: [MITRE ATT&CK Explorer](https://huggingface.co/spaces/AYI-NEDJIMI/mitre-attack-explorer) ## Full Collection This dataset is part of the [Cybersecurity Datasets & Tools](https://huggingface.co/collections/AYI-NEDJIMI/cybersecurity-datasets-and-tools-by-ayi-nedjimi-698e4b5777848dba76c8b169) collection on HuggingFace. ## Source - **MITRE ATT&CK**: Official STIX 2.1 data from [attack-stix-data](https://github.com/mitre-attack/attack-stix-data) - **Extraction**: Automated with `mitreattack-python` ## License [Apache 2.0](https://www.apache.org/licenses/LICENSE-2.0) - MITRE ATT&CK data is under [Apache 2.0](https://github.com/mitre/cti/blob/master/LICENSE). ## Citation ```bibtex @dataset{mitre_attack_en_2025, title={MITRE ATT&CK Enterprise - Complete English Dataset}, author={AYI-NEDJIMI}, year={2025}, publisher={Hugging Face}, url={https://huggingface.co/datasets/AYI-NEDJIMI/mitre-attack-en} } ``` ## Author & Resources **Ayi NEDJIMI** - Senior Consultant in Offensive Cybersecurity & AI ### Cybersecurity Articles - [Website - Cybersecurity & AI Articles](https://www.ayinedjimi-consultants.fr) - [OAuth 2.0 Security Guide](https://www.ayinedjimi-consultants.fr/articles/techniques-hacking/oauth-security.html) - [NTLM Relay Attacks Guide](https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/ntlm-relay-attacks-guide.html) - [Kubernetes Security Hardening](https://www.ayinedjimi-consultants.fr/articles/attaques-active-directory/kubernetes-security-hardening-guide.html) - [Memory Forensics with Volatility](https://www.ayinedjimi-consultants.fr/articles/forensics/memory-forensics-volatility-guide.html) - [Securing Microsoft 365 with Conditional Access](https://www.ayinedjimi-consultants.fr/securiser-acces-microsoft-365-conditional-access-mfa.html) ### AI Articles - [RAG: Retrieval-Augmented Generation](https://www.ayinedjimi-consultants.fr/ia-rag-retrieval-augmented-generation.html) - [Optimizing Document Chunking](https://www.ayinedjimi-consultants.fr/ia-optimiser-chunking-documents.html) - [Choosing a Vector Database](https://www.ayinedjimi-consultants.fr/ia-choisir-base-vectorielle.html) - [Embedding Security & Privacy](https://www.ayinedjimi-consultants.fr/ia-securite-confidentialite-embeddings.html) ### Networks - [LinkedIn](https://www.linkedin.com/in/ayi-nedjimi) - [GitHub](https://github.com/ayinedjimi) - [Twitter/X](https://x.com/AyiNEDJIMI) ## Author **Ayi NEDJIMI** - Cybersecurity Consultant & Trainer | AI Expert - [Professional Bio](https://ayinedjimi-consultants.fr/bio.html) - [All Articles](https://ayinedjimi-consultants.fr/articles.html) - [Free Guides & Whitepapers](https://ayinedjimi-consultants.fr/guides-gratuits.html) - [Training Programs](https://ayinedjimi-consultants.fr/formations.html) ## Related Articles - [Top 10 Attaques Active Directory](https://ayinedjimi-consultants.fr/top-10-attaques-active-directory.html) - [Top 10 Solutions EDR/XDR 2025](https://ayinedjimi-consultants.fr/top-10-solutions-edr-xdr-2025.html) - [Threat Hunting M365](https://ayinedjimi-consultants.fr/threat-hunting-microsoft-365-defender-sentinel.html) - [Kerberos Exploitation AD](https://ayinedjimi-consultants.fr/articles/techniques-hacking/kerberos-exploitation-ad.html) - [OAuth Security](https://ayinedjimi-consultants.fr/articles/techniques-hacking/oauth-security.html) - [Attaques API GraphQL & REST](https://ayinedjimi-consultants.fr/articles/techniques-hacking/attaques-api-graphql-rest.html) - [Attaques CI/CD](https://ayinedjimi-consultants.fr/articles/techniques-hacking/attaques-cicd.html) - [Evasion EDR/XDR](https://ayinedjimi-consultants.fr/articles/techniques-hacking/evasion-edr-xdr.html) - [Living Off The Land à Échelle](https://ayinedjimi-consultants.fr/articles/techniques-hacking/living-off-the-land-echelle.html) - [NTLM Relay Moderne](https://ayinedjimi-consultants.fr/articles/techniques-hacking/ntlm-relay-moderne.html) - [Supply Chain Applicative](https://ayinedjimi-consultants.fr/articles/techniques-hacking/supply-chain-applicative.html) ## Free Cybersecurity Resources - [Livre Blanc NIS 2](https://ayinedjimi-consultants.fr/livre-blanc-nis2.html) - [Livre Blanc Sécurité Active Directory](https://ayinedjimi-consultants.fr/livre-blanc-securite-active-directory.html) - [Livre Blanc Pentest Cloud AWS/Azure/GCP](https://ayinedjimi-consultants.fr/livre-blanc-pentest-cloud-aws-azure-gcp.html) - [Livre Blanc Sécurité Kubernetes](https://ayinedjimi-consultants.fr/livre-blanc-securite-kubernetes.html) - [Livre Blanc IA Cyberdéfense](https://ayinedjimi-consultants.fr/livre-blanc-ia-cyberdefense.html) - [Livre Blanc Anatomie Ransomware](https://ayinedjimi-consultants.fr/livre-blanc-anatomie-attaque-ransomware.html) - [Guide Sécurisation AD 2025](https://ayinedjimi-consultants.fr/guide-securisation-active-directory-2025.html) - [Guide Tiering Model AD](https://ayinedjimi-consultants.fr/livres-blancs/tiering-model/) ## Part of the Collection This dataset is part of the [Cybersecurity Datasets & Tools Collection](https://huggingface.co/collections/AYI-NEDJIMI/cybersecurity-datasets-and-tools-by-ayi-nedjimi-698e4b5777848dba76c8b169) by AYI-NEDJIMI Consultants.