ATTCK2FHIR Implementation Guide
0.0.5 - ci-build
ATTCK2FHIR Implementation Guide - Local Development build (v0.0.5) built by the FHIR (HL7® FHIR® Standard) Build Tools. See the Directory of published versions
| Draft as of 2026-04-26 |
{
"resourceType" : "CodeSystem",
"id" : "MITRE-ATTCK-Tactics",
"language" : "en",
"text" : {
"status" : "generated",
"div" : "<div xmlns=\"http://www.w3.org/1999/xhtml\"><p class=\"res-header-id\"><b>Generated Narrative: CodeSystem MITRE-ATTCK-Tactics</b></p><a name=\"MITRE-ATTCK-Tactics\"> </a><a name=\"hcMITRE-ATTCK-Tactics\"> </a><p>This case-sensitive code system <code>https://constir1.github.io/ATTCK2FHIR/CodeSystem/MITRE-ATTCK-Tactics</code> defines the following codes:</p><table class=\"codes\"><tr><td style=\"white-space:nowrap\"><b>Code</b></td><td><b>Display</b></td></tr><tr><td style=\"white-space:nowrap\">TA0006<a name=\"MITRE-ATTCK-Tactics-TA0006\"> </a></td><td>Credential Access</td></tr><tr><td style=\"white-space:nowrap\">TA0002<a name=\"MITRE-ATTCK-Tactics-TA0002\"> </a></td><td>Execution</td></tr><tr><td style=\"white-space:nowrap\">TA0040<a name=\"MITRE-ATTCK-Tactics-TA0040\"> </a></td><td>Impact</td></tr><tr><td style=\"white-space:nowrap\">TA0003<a name=\"MITRE-ATTCK-Tactics-TA0003\"> </a></td><td>Persistence</td></tr><tr><td style=\"white-space:nowrap\">TA0004<a name=\"MITRE-ATTCK-Tactics-TA0004\"> </a></td><td>Privilege Escalation</td></tr><tr><td style=\"white-space:nowrap\">TA0008<a name=\"MITRE-ATTCK-Tactics-TA0008\"> </a></td><td>Lateral Movement</td></tr><tr><td style=\"white-space:nowrap\">TA0005<a name=\"MITRE-ATTCK-Tactics-TA0005\"> </a></td><td>Defense Evasion</td></tr><tr><td style=\"white-space:nowrap\">TA0010<a name=\"MITRE-ATTCK-Tactics-TA0010\"> </a></td><td>Exfiltration</td></tr><tr><td style=\"white-space:nowrap\">TA0007<a name=\"MITRE-ATTCK-Tactics-TA0007\"> </a></td><td>Discovery</td></tr><tr><td style=\"white-space:nowrap\">TA0009<a name=\"MITRE-ATTCK-Tactics-TA0009\"> </a></td><td>Collection</td></tr><tr><td style=\"white-space:nowrap\">TA0042<a name=\"MITRE-ATTCK-Tactics-TA0042\"> </a></td><td>Resource Development</td></tr><tr><td style=\"white-space:nowrap\">TA0043<a name=\"MITRE-ATTCK-Tactics-TA0043\"> </a></td><td>Reconnaissance</td></tr><tr><td style=\"white-space:nowrap\">TA0011<a name=\"MITRE-ATTCK-Tactics-TA0011\"> </a></td><td>Command and Control</td></tr><tr><td style=\"white-space:nowrap\">TA0001<a name=\"MITRE-ATTCK-Tactics-TA0001\"> </a></td><td>Initial Access</td></tr></table></div>"
},
"url" : "https://constir1.github.io/ATTCK2FHIR/CodeSystem/MITRE-ATTCK-Tactics",
"version" : "0.0.5",
"name" : "MITRE-ATTCK-Tactics",
"title" : "CS MITRE ATT&CK Tactics",
"status" : "draft",
"experimental" : false,
"date" : "2026-04-26T20:36:59+00:00",
"publisher" : "ATTCK2FHIR IG",
"contact" : [
{
"name" : "ATTCK2FHIR IG",
"telecom" : [
{
"system" : "url",
"value" : "https://constir1.github.io/ATTCK2FHIR"
}
]
}
],
"description" : "This Code System contains all MITRE ATT&CK Enterprise Tactics",
"caseSensitive" : true,
"content" : "complete",
"count" : 14,
"concept" : [
{
"code" : "TA0006",
"display" : "Credential Access"
},
{
"code" : "TA0002",
"display" : "Execution"
},
{
"code" : "TA0040",
"display" : "Impact"
},
{
"code" : "TA0003",
"display" : "Persistence"
},
{
"code" : "TA0004",
"display" : "Privilege Escalation"
},
{
"code" : "TA0008",
"display" : "Lateral Movement"
},
{
"code" : "TA0005",
"display" : "Defense Evasion"
},
{
"code" : "TA0010",
"display" : "Exfiltration"
},
{
"code" : "TA0007",
"display" : "Discovery"
},
{
"code" : "TA0009",
"display" : "Collection"
},
{
"code" : "TA0042",
"display" : "Resource Development"
},
{
"code" : "TA0043",
"display" : "Reconnaissance"
},
{
"code" : "TA0011",
"display" : "Command and Control"
},
{
"code" : "TA0001",
"display" : "Initial Access"
}
]
}