Dataset Viewer
Auto-converted to Parquet Duplicate
subject
stringlengths
5
9
predicate
stringclasses
20 values
object
stringlengths
2
4.68k
source
stringclasses
1 value
object_type
stringclasses
6 values
meta
stringlengths
0
10.2k
T1055.011
rdf:type
Technique
attack
enum
{"version":"1.1","external_references":[{"url":"https://msdn.microsoft.com/library/windows/desktop/ms633574.aspx","source_name":"Microsoft Window Classes","description":"Microsoft. (n.d.). About Window Classes. Retrieved December 16, 2017."},{"url":"https://msdn.microsoft.com/library/windows/desktop/ms633584.aspx","sou...
T1055.011
name
Extra Window Memory Injection
attack
string
T1055.011
created
2020-01-14 17:18:32.126000+00:00
attack
date
T1055.011
modified
2025-10-24 17:48:19.059000+00:00
attack
date
T1055.011
description
Adversaries may inject malicious code into process via Extra Window Memory (EWM) in order to evade process-based defenses as well as possibly elevate privileges. EWM injection is a method of executing arbitrary code in the address space of a separate live process. Before creating a window, graphical Windows-based pro...
attack
string
T1055.011
platform
Windows
attack
string
T1055.011
domain
enterprise-attack
attack
string
T1055.011
is-subtechnique
true
attack
boolean
T1055.011
url
https://attack.mitre.org/techniques/T1055/011
attack
url
T1055.011
belongs-to-tactic
TA0005
attack
id
T1055.011
belongs-to-tactic
TA0004
attack
id
T1053.005
rdf:type
Technique
attack
enum
{"version":"1.8","external_references":[{"url":"https://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain","source_name":"ProofPoint Serpent","description":"Campbell, B. et al. (2022, March 21). Serpent, No Swiping! New Backdoor Targets French Entities...
T1053.005
name
Scheduled Task
attack
string
T1053.005
created
2019-11-27 14:58:00.429000+00:00
attack
date
T1053.005
modified
2025-10-24 17:48:19.176000+00:00
attack
date
T1053.005
description
Adversaries may abuse the Windows Task Scheduler to perform task scheduling for initial or recurring execution of malicious code. There are multiple ways to access the Task Scheduler in Windows. The [schtasks](https://attack.mitre.org/software/S0111) utility can be run directly on the command line, or the Task Schedule...
attack
string
T1053.005
platform
Windows
attack
string
T1053.005
domain
enterprise-attack
attack
string
T1053.005
is-subtechnique
true
attack
boolean
T1053.005
url
https://attack.mitre.org/techniques/T1053/005
attack
url
T1053.005
belongs-to-tactic
TA0002
attack
id
T1053.005
belongs-to-tactic
TA0003
attack
id
T1053.005
belongs-to-tactic
TA0004
attack
id
T1205.002
rdf:type
Technique
attack
enum
{"version":"1.0","external_references":[{"url":"https://exatrack.com/public/Tricephalic_Hellkeeper.pdf","source_name":"exatrack bpf filters passive backdoors","description":"ExaTrack. (2022, May 11). Tricephalic Hellkeeper: a tale of a passive backdoor. Retrieved October 18, 2022."},{"url":"https://www.crowdstrike.com/...
T1205.002
name
Socket Filters
attack
string
T1205.002
created
2022-09-30 21:18:41.930000+00:00
attack
date
T1205.002
modified
2025-10-24 17:48:19.274000+00:00
attack
date
T1205.002
description
Adversaries may attach filters to a network socket to monitor then activate backdoors used for persistence or command and control. With elevated permissions, adversaries can use features such as the `libpcap` library to open sockets and install filters to allow or disallow certain types of data to come through the sock...
attack
string
T1205.002
platform
Linux
attack
string
T1205.002
platform
macOS
attack
string
T1205.002
platform
Windows
attack
string
T1205.002
domain
enterprise-attack
attack
string
T1205.002
is-subtechnique
true
attack
boolean
T1205.002
url
https://attack.mitre.org/techniques/T1205/002
attack
url
T1205.002
belongs-to-tactic
TA0005
attack
id
T1205.002
belongs-to-tactic
TA0003
attack
id
T1205.002
belongs-to-tactic
TA0011
attack
id
T1066
rdf:type
Technique
attack
enum
{"version":"1.1"}
T1066
name
Indicator Removal from Tools
attack
string
T1066
created
2017-05-31 21:30:54.176000+00:00
attack
date
T1066
modified
2025-10-24 17:48:19.377000+00:00
attack
date
T1066
description
If a malicious tool is detected and quarantined or otherwise curtailed, an adversary may be able to determine why the malicious tool was detected (the indicator), modify the tool by removing the indicator, and use the updated version that is no longer detected by the target's defensive systems or subsequent targets tha...
attack
string
T1066
platform
Linux
attack
string
T1066
platform
macOS
attack
string
T1066
platform
Windows
attack
string
T1066
domain
enterprise-attack
attack
string
T1066
is-subtechnique
false
attack
boolean
T1066
revoked
true
attack
boolean
T1066
url
https://attack.mitre.org/techniques/T1066
attack
url
T1066
belongs-to-tactic
TA0005
attack
id
T1560.001
rdf:type
Technique
attack
enum
{"version":"1.3","external_references":[{"url":"https://www.rarlab.com/","source_name":"WinRAR Homepage","description":"A. Roshal. (2020). RARLAB. Retrieved February 20, 2020."},{"url":"https://www.winzip.com/win/en/","source_name":"WinZip Homepage","description":"Corel Corporation. (2020). WinZip. Retrieved February 2...
T1560.001
name
Archive via Utility
attack
string
T1560.001
created
2020-02-20 21:01:25.428000+00:00
attack
date
T1560.001
modified
2025-10-24 17:48:19.477000+00:00
attack
date
T1560.001
description
Adversaries may use utilities to compress and/or encrypt collected data prior to exfiltration. Many utilities include functionalities to compress, encrypt, or otherwise package data into a format that is easier/more secure to transport. Adversaries may abuse various utilities to compress or encrypt data before exfiltr...
attack
string
T1560.001
platform
Linux
attack
string
T1560.001
platform
macOS
attack
string
T1560.001
platform
Windows
attack
string
T1560.001
domain
enterprise-attack
attack
string
T1560.001
is-subtechnique
true
attack
boolean
T1560.001
url
https://attack.mitre.org/techniques/T1560/001
attack
url
T1560.001
belongs-to-tactic
TA0009
attack
id
T1021.005
rdf:type
Technique
attack
enum
{"version":"1.2","external_references":[{"url":"https://pentestlab.blog/2012/10/30/attacking-vnc-servers/","source_name":"Attacking VNC Servers PentestLab","description":"Administrator, Penetration Testing Lab. (2012, October 30). Attacking VNC Servers. Retrieved October 6, 2021."},{"url":"https://support.apple.com/gui...
T1021.005
name
VNC
attack
string
T1021.005
created
2020-02-11 18:28:44.950000+00:00
attack
date
T1021.005
modified
2025-10-24 17:48:19.567000+00:00
attack
date
T1021.005
description
Adversaries may use [Valid Accounts](https://attack.mitre.org/techniques/T1078) to remotely control machines using Virtual Network Computing (VNC). VNC is a platform-independent desktop sharing system that uses the RFB (“remote framebuffer”) protocol to enable users to remotely control another computer’s display by re...
attack
string
T1021.005
platform
Linux
attack
string
T1021.005
platform
Windows
attack
string
T1021.005
platform
macOS
attack
string
T1021.005
domain
enterprise-attack
attack
string
T1021.005
is-subtechnique
true
attack
boolean
T1021.005
url
https://attack.mitre.org/techniques/T1021/005
attack
url
T1021.005
belongs-to-tactic
TA0008
attack
id
T1047
rdf:type
Technique
attack
enum
{"version":"1.6","external_references":[{"url":"https://www.fireeye.com/content/dam/fireeye-www/global/en/current-threats/pdfs/wp-windows-management-instrumentation.pdf","source_name":"FireEye WMI 2015","description":"Ballenthin, W., et al. (2015). Windows Management Instrumentation (WMI) Offense, Defense, and Forensic...
T1047
name
Windows Management Instrumentation
attack
string
T1047
created
2017-05-31 21:30:44.329000+00:00
attack
date
T1047
modified
2025-10-24 17:48:19.670000+00:00
attack
date
T1047
description
Adversaries may abuse Windows Management Instrumentation (WMI) to execute malicious commands and payloads. WMI is designed for programmers and is the infrastructure for management data and operations on Windows systems.(Citation: WMI 1-3) WMI is an administration feature that provides a uniform environment to access Wi...
attack
string
T1047
platform
Windows
attack
string
T1047
domain
enterprise-attack
attack
string
T1047
is-subtechnique
false
attack
boolean
T1047
url
https://attack.mitre.org/techniques/T1047
attack
url
T1047
belongs-to-tactic
TA0002
attack
id
T1156
rdf:type
Technique
attack
enum
{"version":"1.2","external_references":[{"url":"https://www.intezer.com/blog/research/kaiji-new-chinese-linux-malware-turning-to-golang/","source_name":"intezer-kaiji-malware","description":"Paul Litvak. (2020, May 4). Kaiji: New Chinese Linux malware turning to Golang. Retrieved December 17, 2020."}]}
T1156
name
Malicious Shell Modification
attack
string
T1156
created
2017-12-14 16:46:06.044000+00:00
attack
date
T1156
modified
2025-10-24 17:48:19.775000+00:00
attack
date
T1156
description
Adversaries may establish persistence through executing malicious commands triggered by a user’s shell. User shells execute several configuration scripts at different points throughout the session based on events. For example, when a user opens a command line interface or remotely logs in (such as SSH) a login shell is...
attack
string
T1156
platform
Linux
attack
string
T1156
platform
macOS
attack
string
T1156
domain
enterprise-attack
attack
string
T1156
is-subtechnique
false
attack
boolean
T1156
revoked
true
attack
boolean
T1156
url
https://attack.mitre.org/techniques/T1156
attack
url
T1156
belongs-to-tactic
TA0003
attack
id
T1113
rdf:type
Technique
attack
enum
{"version":"1.1","external_references":[{"url":"https://docs.microsoft.com/en-us/dotnet/api/system.drawing.graphics.copyfromscreen?view=netframework-4.8","source_name":"CopyFromScreen .NET","description":"Microsoft. (n.d.). Graphics.CopyFromScreen Method. Retrieved March 24, 2020."},{"url":"https://blog.malwarebytes.co...
T1113
name
Screen Capture
attack
string
T1113
created
2017-05-31 21:31:25.060000+00:00
attack
date
T1113
modified
2025-10-24 17:48:19.886000+00:00
attack
date
End of preview. Expand in Data Studio

Security Knowledge Graph Triples

Security data from 17 sources represented as Subject-Predicate-Object (SPO) triples in Parquet format, ready for knowledge-graph construction, graph-ML, RAG pipelines, and threat-intelligence analysis.

Sources: ATT&CK · CAPEC · CWE · CVE · CPE · D3FEND · ATLAS · CAR · ENGAGE · F3 · EPSS · KEV · Vulnrichment · GHSA · Sigma · ExploitDB · MISP Galaxies

Last updated: 2026-04-27T08:30:00Z

Quick Start

from datasets import load_dataset

ds = load_dataset("s0u9ata/security-kg", "enterprise")
print(ds["train"][0])
# {'subject': 'T1059.001', 'predicate': 'rdf:type', 'object': 'Technique', 'source': 'attack', 'object_type': 'enum', 'meta': ''}

Configurations

Config Description Est. Triples Status
enterprise (default) Enterprise ATT&CK 42,041 Current
mobile Mobile ATT&CK 5,307 Current
ics ICS ATT&CK 3,756 Current
attack-all ATT&CK combined (deduplicated) 49,622 Current
capec CAPEC attack patterns 8,114 Current
cwe CWE weaknesses 14,565 Current
cve CVE vulnerabilities 3,622,414 Current
cpe CPE platform enumeration 12,669,910 Current
d3fend D3FEND defensive techniques 8,154 Current
atlas ATLAS AI/ML techniques 1,420 Current
car CAR analytics 1,617 Current
engage ENGAGE adversary engagement 1,464 Current
f3 F3 fraud techniques & tactics 1,047 Current
epss EPSS exploit prediction scores 658,266 Current
kev KEV known exploited vulns 17,343 Current
vulnrichment CISA Vulnrichment (SSVC, CVSS, CWE enrichment) 670,832 Current
ghsa GitHub Security Advisories 338,240 Current
sigma Sigma detection rules 32,750 Current
exploitdb ExploitDB public exploits 346,471 Current
misp_galaxy MISP Galaxy threat intelligence clusters 196,489 Current
combined All sources merged (deduplicated) 18,638,718 Current

Knowledge Graph Structure

     Group  Campaign
        \      /
          uses
           |
           v
      TECHNIQUE -----> Tactic
        ^  ^  ^
        |  |  |
        |  |  +-- D3FEND (counters)
        |  |  +-- CAR (detects)
        |  |  +-- Sigma (detects)
        |  |  +-- ENGAGE (engages)
        |  |  +-- F3 (fraud techniques)
        |  |  +-- ATLAS (related)
        |  |  +-- MISP Galaxies (cross-refs)
        |  |
        |  +-- Mitigation (mitigates)
        |  +-- DataComponent (detects)
        |
        +-- maps-to -- CAPEC
                         |
                  related-weakness
                         |
                         v
                        CWE
                         ^
                         |
                  related-weakness
                         |
                        CVE ----> CPE
                         ^
                         |
                   EPSS (score)
                   KEV (exploited)
                   GHSA (advisory)
                   Vulnrichment (SSVC)
                   ExploitDB (exploit)

Schema

Each row is an enriched triple with six string columns:

Column Description Examples
subject Entity ID T1059.001, G0016, CAPEC-66, CWE-79, CVE-2024-1234, cpe:2.3:a:apache:httpd:*, D3-FE, AML.T0000, CAR-2024-01-001, EAC0001, GHSA-xxxx-yyyy-zzzz, EDB-16929
predicate Property name or relationship type rdf:type, name, uses, mitigates, epss-score, counters, ssvc-exploitation, exploits-cve, detects-technique
object Value or target entity ID Technique, PowerShell, T1059, CWE-89, 0.97500, SecurityAdvisory, SigmaRule, Exploit
source Originating dataset attack, cve, cwe, capec, epss, kev, ghsa, sigma, d3fend, atlas, car, engage, f3, cpe, vulnrichment, exploitdb, misp_galaxy
object_type Value type of the object string, id, enum, date, number, boolean, url
meta Supplemental JSON metadata (empty string if none) {"references":["https://..."],"credits":[...]}, {"cvss_vector":"...","cvss_version":"3.1"}

Predicate Reference

ATT&CK Entity Properties

Predicate Description Example object value
rdf:type Entity type Technique, Group, Malware, Tool, Tactic, Mitigation, Campaign, DataSource, DataComponent
name Display name PowerShell
description Full description text Adversaries may abuse PowerShell...
platform Applicable platform Windows, Linux, macOS
domain ATT&CK domain enterprise-attack
alias Alternative name Cozy Bear
is-subtechnique Whether entity is a sub-technique True, False
belongs-to-tactic Tactic ATT&CK ID TA0002
shortname Tactic shortname credential-access
url ATT&CK website URL https://attack.mitre.org/techniques/T1059/001
created / modified Timestamps 2020-01-14 17:18:32...

ATT&CK Relationship Predicates

Predicate Typical subject / object Example
uses Group/Campaign/Software / Technique G0016 / T1059.001
mitigates Mitigation / Technique M1049 / T1059.001
subtechnique-of Sub-technique / Parent technique T1059.001 / T1059
detects DataComponent / Technique DC0001 / T1059.001
attributed-to Campaign / Group C0018 / G0016

CAPEC Predicates

Predicate Description Example object value
rdf:type AttackPattern AttackPattern
name / description Display name / full text SQL Injection
abstraction / status Level / status Standard, Stable
likelihood / severity Attack likelihood / severity High
child-of Parent attack pattern CAPEC-248
related-weakness Related CWE CWE-89
maps-to-technique Mapped ATT&CK technique T1190.002

CWE Predicates

Predicate Description Example object value
rdf:type Weakness Weakness
name / description Display name / full text Cross-site Scripting (XSS)
abstraction / status Level / status Base, Stable
likelihood-of-exploit Exploitation likelihood High
child-of Parent weakness CWE-74
related-attack-pattern Related CAPEC CAPEC-86
platform Applicable platform JavaScript
consequence-scope / consequence-impact Impact Confidentiality, Read Data
introduction-phase Introduction phase Implementation

CVE Predicates

Predicate Description Example object value
rdf:type Vulnerability Vulnerability
state CVE state PUBLISHED
description English description A remote code execution...
date-published / date-updated Timestamps 2024-01-15T00:00:00.000Z
assigner Assigning organization microsoft
vendor / product Affected vendor/product Microsoft, Windows
affects-cpe Affected CPE string cpe:2.3:o:microsoft:windows_10:*
platform Affected platform x64
related-weakness Related CWE CWE-79
cvss-base-score / cvss-severity CVSS metrics 9.8, CRITICAL

CPE Predicates

Predicate Description Example object value
rdf:type Platform Platform
part CPE part type application, operating_system, hardware
vendor / product / version Components apache, httpd, 2.4.51
title English display name Apache HTTP Server 2.4.51
created / modified Timestamps 2021-10-07

D3FEND Predicates

Predicate Description Example object value
rdf:type DefensiveTechnique or OffensiveTechnique DefensiveTechnique
name / definition Display name / definition File Encryption
synonym Alternative name Disk Encryption
child-of Parent technique PlatformHardening
counters Countered offensive technique T1059

ATLAS Predicates

Predicate Description Example object value
rdf:type Tactic, Technique, CaseStudy, Mitigation Technique
name / description Display name / full text ML Supply Chain Compromise
maturity Technique maturity Reviewed
belongs-to-tactic Parent tactic AML.TA0001
subtechnique-of Parent technique AML.T0000
related-attack-technique Linked ATT&CK technique T1195
related-attack-tactic Linked ATT&CK tactic TA0001
uses-technique Case study technique AML.T0000
mitigates Mitigated technique AML.T0000

CAR Predicates

Predicate Description Example object value
rdf:type Analytic Analytic
title / description Analytic name / full text Suspicious PowerShell Commands
platform Applicable platform Windows
information-domain Information domain Host
analytic-type Type of analytic Situational Awareness
detects-technique Detected ATT&CK technique T1059
detects-subtechnique Detected subtechnique T1059.001
covers-tactic Covered ATT&CK tactic Execution
maps-to-d3fend Linked D3FEND technique D3-PSA

ENGAGE Predicates

Predicate Description Example object value
rdf:type EngagementActivity or AdversaryVulnerability EngagementActivity
name / description Display name / full text Software Manipulation
engages-technique Engaged ATT&CK technique T1001
vulnerability-of ATT&CK technique this adversary vulnerability applies to T1001
addresses-vulnerability Addressed adversary vulnerability EAV0001

F3 Predicates

Predicate Description Example object value
rdf:type Tactic or Technique Technique
name / description Display name / full text Account Takeover
shortname Tactic shortname positioning, monetization
is-subtechnique Whether entity is a sub-technique true
belongs-to-tactic Parent tactic FA0001
subtechnique-of Parent technique F1001
url F3 website URL https://ctid.mitre.org/fraud/techniques/F1001
created / modified Timestamps 2026-04-02T19:15:57.686Z

EPSS Predicates

Predicate Description Example object value
epss-score Exploit probability (0-1) 0.97500
epss-percentile Score percentile (0-1) 0.99900

KEV Predicates

Predicate Description Example object value
rdf:type KnownExploitedVulnerability KnownExploitedVulnerability
kev-vendor / kev-product Affected vendor/product Microsoft, Windows
kev-name / kev-description Vulnerability name/description Windows Privilege Escalation
kev-date-added / kev-due-date Dates 2024-01-15
kev-required-action Required remediation action Apply updates per vendor instructions.
kev-ransomware-use Ransomware campaign use Known, Unknown
related-weakness Related CWE CWE-269

Vulnrichment Predicates

Predicate Description Example object value
ssvc-exploitation SSVC exploitation status active, poc, none
ssvc-automatable Whether exploitation is automatable yes, no
ssvc-technical-impact Technical impact level total, partial
adp-cvss-base-score CISA-analyzed CVSS base score 9.8
adp-cvss-severity CISA-analyzed CVSS severity CRITICAL
adp-related-weakness CISA-assigned CWE CWE-79
adp-affects-cpe CISA-assigned CPE cpe:2.3:o:microsoft:windows_10:*

GHSA Predicates

Predicate Description Example object value
rdf:type SecurityAdvisory SecurityAdvisory
summary Advisory summary XSS vulnerability in example-package
date-published / date-modified Timestamps 2024-01-15T00:00:00Z
severity Severity level HIGH, MODERATE, LOW, CRITICAL
related-cve Associated CVE CVE-2024-1234
related-weakness Associated CWE CWE-79
cvss-vector CVSS v3 vector string CVSS:3.1/AV:N/AC:L/...
affects-package Affected package (ecosystem/name) npm/example-package
fixed-in Fixed version for package (ecosystem/name@version) npm/example-package@2.0.1

Sigma Predicates

Predicate Description Example object value
rdf:type SigmaRule SigmaRule
title / description Rule name / full text Suspicious PowerShell Download
status Rule maturity stable, test, experimental
level Detection severity critical, high, medium, low, informational
author / date Rule author / creation date Security Researcher, 2024-01-15
logsource-category Log source category process_creation, network_connection
logsource-product Log source product windows, linux
logsource-service Log source service sshd, sysmon
detects-technique Detected ATT&CK technique T1059.001
related-cve Related CVE CVE-2024-1234

ExploitDB Predicates

Predicate Description Example object value
rdf:type Exploit Exploit
description Exploit description Apache HTTP Server RCE
date-published Publication date 2024-01-15
author Exploit author Metasploit
exploit-type Exploit category remote, local, dos, webapps
platform Target platform linux, windows, aix
verified Verified by OffSec True
exploits-cve Exploited CVE CVE-2024-1234

MISP Galaxy Predicates

Predicate Description Example object value
rdf:type Galaxy entity type ThreatActor, Ransomware, Botnet, RAT
name Display name APT1
description Full description (text)
galaxy Galaxy cluster type threat-actor, ransomware
synonym Alternative name Comment Crew
country Country code (ISO 3166-1) CN
cfr-suspected-state-sponsor Suspected state sponsor China
targets-country Targeted country United States
targets-sector Targeted sector Government
attribution-confidence Confidence level 50
similar-to Similar/duplicate entity misp:<uuid>
uses Uses technique/tool misp:<uuid>
used-by Used by actor misp:<uuid>
variant-of Variant relationship misp:<uuid>
targets Targets entity misp:<uuid>
attributed-to Attributed to entity misp:<uuid>
misp-related Generic relationship misp:<uuid>
related-attack-id Cross-link to ATT&CK T1059.001, G0006

Dataset Creation

Source Data

Source Feed Format
ATT&CK mitre-attack/attack-stix-data STIX 2.0 JSON
CAPEC capec_latest.xml XML
CWE cwec_latest.xml.zip XML (ZIP)
CVE CVEProject/cvelistV5 JSON 5.x (ZIP)
CPE nvdcpe-2.0.tar.gz JSON (tar.gz)
D3FEND d3fend.json JSON-LD
ATLAS ATLAS.yaml YAML
CAR mitre-attack/car YAML (ZIP)
ENGAGE attack_mapping.json JSON
F3 fight-fraud-framework STIX 2.1 JSON
EPSS epss_scores-current.csv.gz CSV (gzip)
KEV known_exploited_vulnerabilities.json JSON
Vulnrichment cisagov/vulnrichment JSON 5.x (ZIP)
GHSA github/advisory-database OSV JSON (ZIP)
Sigma SigmaHQ/sigma YAML (ZIP)
ExploitDB files_exploits.csv CSV
MISP Galaxies MISP/misp-galaxy JSON (ZIP)

Conversion Pipeline

The converter downloads source data, extracts entity property triples and relationship triples, and writes them as Parquet files. The source code and full documentation are at:

github.com/S0UGATA/security-kg

To regenerate or update this dataset:

git clone https://github.com/S0UGATA/security-kg.git
cd security-kg
pip install -r requirements.txt
python src/convert.py

This produces fresh Parquet files in output/ from the latest data across all 17 sources.

Visualizer

Explore the Parquet files interactively at security-kg-viz.

Use Cases

  • Knowledge Graph Construction: Load triples into Neo4j, RDFLib, or NetworkX for graph queries
  • Graph ML: Train graph neural networks (GNNs) on security data structure for link prediction
  • RAG / LLM Grounding: Use triples as structured context for retrieval-augmented generation
  • Threat Intelligence: Query relationships between groups, techniques, vulnerabilities, and mitigations
  • Vulnerability Prioritization: Combine SSVC, EPSS, KEV, and ExploitDB data for risk-based triage
  • Defensive Gap Analysis: Find heavily-used ATT&CK techniques with insufficient detection coverage
  • Supply Chain Risk: Score open-source packages by linking GHSA advisories to CVE/EPSS/KEV enrichment
  • Security Automation: Programmatically map detections to techniques to tactics

Cross-Source Analysis Notebook

The repository includes a Jupyter notebook with 16 cross-source analyses and visualizations built on combined.parquet — covering SSVC patch prioritization, defensive gap analysis, kill chain tactic coverage, exploit weaponization timelines, ransomware CWE pipelines, supply chain package risk, and more.

Example Queries

SSVC Patch Prioritization (Vulnrichment + EPSS + KEV)

import pandas as pd
from datasets import load_dataset

# Load combined graph for cross-source queries
ds = load_dataset("s0u9ata/security-kg", "combined")
df = ds["train"].to_pandas()

# Build SSVC triage matrix: exploitation status × automatable × EPSS score
ssvc = df[df.predicate == "ssvc-exploitation"][["subject", "object"]].rename(columns={"object": "exploitation"})
auto = df[df.predicate == "ssvc-automatable"][["subject", "object"]].rename(columns={"object": "automatable"})
epss = df[df.predicate == "epss-score"][["subject", "object"]].copy()
epss["epss"] = epss.object.astype(float)

triage = ssvc.merge(auto, on="subject").merge(epss[["subject", "epss"]], on="subject")

# Highest priority: actively exploited + automatable + high EPSS
critical = triage[(triage.exploitation == "active") & (triage.automatable == "yes") & (triage.epss > 0.9)]
print(f"Immediate action: {len(critical)} CVEs")

Defensive Gap Analysis (ATT&CK + Sigma + D3FEND + CAR)

# Find ATT&CK techniques heavily used by APT groups but poorly covered by detections
uses = df[(df.predicate == "uses") & df.subject.str.startswith("G")]
group_usage = uses.groupby("object").subject.nunique().rename("groups_using")

# Count detection sources per technique (Sigma + CAR + D3FEND + ENGAGE)
sigma = df[df.predicate == "detects-technique"].groupby("object").subject.nunique().rename("detections")
d3fend = df[df.predicate == "restricts"].groupby("object").subject.nunique().rename("defenses")

coverage = pd.DataFrame(group_usage).join(sigma).join(d3fend).fillna(0)
gaps = coverage[(coverage.groups_using > 10) & (coverage.detections < 5)]
print(f"High-usage, low-detection techniques: {len(gaps)}")

Supply Chain Risk (GHSA + CVE + EPSS + KEV + ExploitDB)

# Score open-source packages by aggregating risk from linked CVEs
ghsa_cve = df[df.predicate == "related-cve"][["subject", "object"]].rename(columns={"subject": "ghsa", "object": "cve"})
packages = df[df.predicate == "affects-package"][["subject", "object"]].rename(columns={"subject": "ghsa", "object": "pkg"})

epss_scores = df[df.predicate == "epss-score"][["subject", "object"]].copy()
epss_scores["epss"] = epss_scores.object.astype(float)

kev_cves = set(df[(df.predicate == "rdf:type") & (df.object == "KnownExploitedVulnerability")].subject)
exploit_cves = set(df[df.predicate == "exploits-cve"].object)

# Join package → GHSA → CVE → enrichment
risk = packages.merge(ghsa_cve, on="ghsa").merge(epss_scores[["subject", "epss"]], left_on="cve", right_on="subject")
risk["in_kev"] = risk.cve.isin(kev_cves)
risk["has_exploit"] = risk.cve.isin(exploit_cves)
risk["ecosystem"] = risk.pkg.str.split("/").str[0]

# Top ecosystems by high-risk CVE count
high_risk = risk[(risk.epss > 0.5) | risk.in_kev | risk.has_exploit]
print(high_risk.groupby("ecosystem").cve.nunique().sort_values(ascending=False).head(10))

CAPEC → CWE → CVE (Attack Pattern Chain)

capec = load_dataset("s0u9ata/security-kg", "capec")["train"].to_pandas()
cve = load_dataset("s0u9ata/security-kg", "cve")["train"].to_pandas()

# Find CWEs related to SQL Injection (CAPEC-66)
cwe_ids = capec[(capec.subject == "CAPEC-66") & (capec.predicate == "related-weakness")].object.tolist()

# Find CVEs with those CWEs
for cwe_id in cwe_ids:
    related_cves = cve[(cve.predicate == "related-weakness") & (cve.object == cwe_id)].subject.unique()
    print(f"{cwe_id}: {len(related_cves)} CVEs")

D3FEND (Defensive Taxonomy)

ds = load_dataset("s0u9ata/security-kg", "d3fend")
df = ds["train"].to_pandas()

# All 497 defensive techniques in the D3FEND taxonomy
defenses = df[(df.predicate == "rdf:type") & (df.object == "DefensiveTechnique")]
print(f"Defensive techniques: {len(defenses)}")

# Find children of a category (e.g., all techniques under Network Traffic Analysis)
children = df[(df.predicate == "child-of") & (df.object == "NetworkTrafficAnalysis")].subject.tolist()

# Get their names
names = df[df.predicate == "name"][["subject", "object"]]
print(names[names.subject.isin(children)].to_string(index=False))

Source Licensing & Attribution

This dataset is published under the Apache 2.0 license. The underlying source data is provided under various licenses as detailed below. By using this dataset, you agree to comply with each source's respective terms.

Source License Attribution
ATT&CK Custom royalty-free (MITRE) © The MITRE Corporation. Reproduced and distributed with the permission of The MITRE Corporation.
CAPEC Custom royalty-free (MITRE) © The MITRE Corporation. Reproduced and distributed with the permission of The MITRE Corporation.
CWE Custom royalty-free (MITRE) © The MITRE Corporation. Reproduced and distributed with the permission of The MITRE Corporation.
CVE Custom permissive (MITRE) © The MITRE Corporation. CVE® is a registered trademark of The MITRE Corporation.
CPE / NVD Public domain (NIST) This product uses data from the NVD API but is not endorsed or certified by the NVD.
D3FEND MIT License © The MITRE Corporation. MITRE D3FEND™ is a trademark of The MITRE Corporation.
ATLAS Apache 2.0 © MITRE.
CAR Apache 2.0 © The MITRE Corporation.
ENGAGE Apache 2.0 (GitHub repo) / Custom restrictive (website ToU) © The MITRE Corporation. Reproduced and distributed with the permission of The MITRE Corporation. Note: the GitHub repo is licensed Apache 2.0, but the website terms restrict use to internal/non-commercial purposes. Clarification pending with MITRE.
F3 Apache 2.0 © MITRE Engenuity, Center for Threat-Informed Defense.
EPSS Custom permissive (FIRST) Jacobs, Romanosky, Edwards, Roytman, Adjerid (2021), Exploit Prediction Scoring System, Digital Threats Research and Practice, 2(3). See first.org/epss.
KEV Public domain (U.S. Gov) Source: CISA Known Exploited Vulnerabilities Catalog.
Vulnrichment CC0 1.0 Universal Source: CISA Vulnrichment.
GHSA CC BY 4.0 Source: GitHub Advisory Database. Licensed under CC BY 4.0.
Sigma Detection Rule License 1.1 Source: SigmaHQ. Licensed under DRL 1.1. Rule author attribution is preserved in triples.
ExploitDB GPLv2+ Source: OffSec ExploitDB. Derived factual metadata (IDs, CVE mappings, dates) extracted under GPLv2+.
MISP Galaxies CC0 1.0 / BSD 2-Clause Source: MISP Project. Dual-licensed under CC0 1.0 and BSD 2-Clause.

License

Apache 2.0 — see Source Licensing & Attribution for individual source terms.

Downloads last month
337