Data Downloads
Machine-readable governance artifacts for automated consumption. ATX-1 Threat Matrix v2.2 — 10 tactics, 58 techniques in STIX 2.1 and structured JSON.
STIX 2.1 Bundle
Complete taxonomy — tactics, techniques, mitigations, relationships
Technique Database
All 58 techniques with severity, case studies, OWASP mapping
Regulatory Cross-Reference
NIST AI RMF, EU AI Act, OWASP LLM Top 10 mapping
ATM-1 Mapping
Bidirectional mapping between ATX-1 techniques and MITRE ATT&CK
ACF-1 Counterfactual Bundle
What-if scenarios for technique interactions and governance outcomes
Validation — aegis-core
Validation test results against aegis-core runtime
Version Mapping
Version history and technique lifecycle tracking across releases
Technique JSON Schema
Validation schema for technique definitions
ATX-1 Index
Machine-readable index of all ATX-1 artifacts
ATT&CK Navigator Layer
Load in ATT&CK Navigator via Open Existing Layer → Upload from URL
Consume
Fetch the STIX bundle
curl https://aegis-governance.com/atx-1/stix-bundle.json | jq '.objects[] | select(.type == "attack-pattern") | .name' Python — load techniques
import json, urllib.request
url = "https://aegis-governance.com/atx-1/techniques.json"
techniques = json.loads(urllib.request.urlopen(url).read())
for t in techniques:
print(f"{t['id']}: {t['name']} ({t['severity']})") Validate against schema
npx ajv validate -s https://aegis-governance.com/schemas/atx-technique.schema.json -d techniques.json