Skip to content
This repository was archived by the owner on Dec 11, 2023. It is now read-only.

Commit 0224e42

Browse files
committed
patch links in layer samples README to use master instead of develop
1 parent 8ab72e2 commit 0224e42

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

scripts/layers/samples/README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
# Sample Scripts
22

3-
The scripts in this folder are used to generate the [sample layers in the ATT&CK Navigator repository](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples). Run the scripts with the -h flag for usage instructions.
3+
The scripts in this folder are used to generate the [sample layers in the ATT&CK Navigator repository](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples). Run the scripts with the -h flag for usage instructions.
44

55
| script | sample layers | description |
66
|:-------|:------------|:--------|
7-
| [heatmap.py](heatmap.py) | [heatmap_layer.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/heatmap_layer.json) | Generates a layer wherein all techniques have randomized scores from 1-100. |
8-
| [bear_APT.py](bear_APT.py) | [Bear_APT.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/Bear_APT.json) | Parses STIX data to create a layer showing all techniques used by an APT group with phrase 'bear' in the group aliases. |
9-
| [apt3_apt29_software.py](apt3_apt29_software.py) | [APT3_+_APT29_with_software.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/APT3_+_APT29_with_software.json), [APT3_+_APT29_with_software_and_notional_no_detection.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/APT3_+_APT29_with_software_and_notional_no_detection.json) | Creates a layer file showing techniques used by APT3 and APT29 as well as software used by those groups, and a second layer showing the same but with the added concept of detectability by a notional organization. |
10-
| [software_execution.py](software_execution.py) | [software_execution.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/software_execution.json), [software_malware_execution.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/software_malware_execution.json), [software_tool_execution.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/software_tool_execution.json) | Generates layers showing all techniques that can be executed by software. |
7+
| [heatmap.py](heatmap.py) | [heatmap_layer.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/heatmap_layer.json) | Generates a layer wherein all techniques have randomized scores from 1-100. |
8+
| [bear_APT.py](bear_APT.py) | [Bear_APT.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/Bear_APT.json) | Parses STIX data to create a layer showing all techniques used by an APT group with phrase 'bear' in the group aliases. |
9+
| [apt3_apt29_software.py](apt3_apt29_software.py) | [APT3_+_APT29_with_software.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/APT3_+_APT29_with_software.json), [APT3_+_APT29_with_software_and_notional_no_detection.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/APT3_+_APT29_with_software_and_notional_no_detection.json) | Creates a layer file showing techniques used by APT3 and APT29 as well as software used by those groups, and a second layer showing the same but with the added concept of detectability by a notional organization. |
10+
| [software_execution.py](software_execution.py) | [software_execution.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/software_execution.json), [software_malware_execution.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/software_malware_execution.json), [software_tool_execution.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/software_tool_execution.json) | Generates layers showing all techniques that can be executed by software. |

0 commit comments

Comments
 (0)