ATTCK2FHIR Implementation Guide
0.0.5 - ci-build
ATTCK2FHIR Implementation Guide - Local Development build (v0.0.5) built by the FHIR (HL7® FHIR® Standard) Build Tools. See the Directory of published versions
| Draft as of 2026-04-26 |
{
"resourceType" : "ValueSet",
"id" : "MITRE-ATTCK-Tactics",
"language" : "en",
"text" : {
"status" : "generated",
"div" : "<div xmlns=\"http://www.w3.org/1999/xhtml\"><p class=\"res-header-id\"><b>Generated Narrative: ValueSet MITRE-ATTCK-Tactics</b></p><a name=\"MITRE-ATTCK-Tactics\"> </a><a name=\"hcMITRE-ATTCK-Tactics\"> </a><ul><li>Include these codes as defined in <a href=\"CodeSystem-MITRE-ATTCK-Tactics.html\"><code>https://constir1.github.io/ATTCK2FHIR/CodeSystem/MITRE-ATTCK-Tactics</code></a><span title=\"Version is not explicitly stated, which means it is fixed to the version provided in this specification\"> version 📦0.0.5</span><table class=\"none\"><tr><td style=\"white-space:nowrap\"><b>Code</b></td><td><b>Display</b></td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0006\">TA0006</a></td><td>Credential Access</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0002\">TA0002</a></td><td>Execution</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0040\">TA0040</a></td><td>Impact</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0003\">TA0003</a></td><td>Persistence</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0004\">TA0004</a></td><td>Privilege Escalation</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0008\">TA0008</a></td><td>Lateral Movement</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0005\">TA0005</a></td><td>Defense Evasion</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0010\">TA0010</a></td><td>Exfiltration</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0007\">TA0007</a></td><td>Discovery</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0009\">TA0009</a></td><td>Collection</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0042\">TA0042</a></td><td>Resource Development</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0043\">TA0043</a></td><td>Reconnaissance</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0011\">TA0011</a></td><td>Command and Control</td></tr><tr><td><a href=\"CodeSystem-MITRE-ATTCK-Tactics.html#MITRE-ATTCK-Tactics-TA0001\">TA0001</a></td><td>Initial Access</td></tr></table></li></ul></div>"
},
"url" : "https://constir1.github.io/ATTCK2FHIR/ValueSet/MITRE-ATTCK-Tactics",
"version" : "0.0.5",
"title" : "VS MITRE ATT&CK Tactics",
"status" : "draft",
"experimental" : false,
"date" : "2026-04-26T20:36:59+00:00",
"publisher" : "ATTCK2FHIR IG",
"contact" : [
{
"name" : "ATTCK2FHIR IG",
"telecom" : [
{
"system" : "url",
"value" : "https://constir1.github.io/ATTCK2FHIR"
}
]
}
],
"description" : "All MITRE ATT&CK Enterprise Tactics",
"compose" : {
"include" : [
{
"system" : "https://constir1.github.io/ATTCK2FHIR/CodeSystem/MITRE-ATTCK-Tactics",
"concept" : [
{
"code" : "TA0006",
"display" : "Credential Access"
},
{
"code" : "TA0002",
"display" : "Execution"
},
{
"code" : "TA0040",
"display" : "Impact"
},
{
"code" : "TA0003",
"display" : "Persistence"
},
{
"code" : "TA0004",
"display" : "Privilege Escalation"
},
{
"code" : "TA0008",
"display" : "Lateral Movement"
},
{
"code" : "TA0005",
"display" : "Defense Evasion"
},
{
"code" : "TA0010",
"display" : "Exfiltration"
},
{
"code" : "TA0007",
"display" : "Discovery"
},
{
"code" : "TA0009",
"display" : "Collection"
},
{
"code" : "TA0042",
"display" : "Resource Development"
},
{
"code" : "TA0043",
"display" : "Reconnaissance"
},
{
"code" : "TA0011",
"display" : "Command and Control"
},
{
"code" : "TA0001",
"display" : "Initial Access"
}
]
}
]
}
}