Esa, a security analyst, was tasked with developing a threat model for a private company. For this purpose, Esa implemented a popular global knowledge base that comprises adversary tactics and techniques based on real-world observations, which can help the company identify threats in advance. Identify the framework implemented by Esa in the above scenario.