Research Article

An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix

Table 2

A mapping of ATT&CK concepts to STIX 2.0 objects.

ATT&CK conceptsSTIX objectCustom type?

Tacticx-mitre-tacticYes
Matrixx-mitre-matrixYes
MitigationsCourse-of-actionNo
GroupsIntrusion-setNo
MaliciousMalwareNo
SoftwareToolNo
TechniqueAttack-patternNo
SubtechniqueAttack-pattern where No
ProcedureRelationship where and target_ref is an attack-patternNo