You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Dec 11, 2023. It is now read-only.
Added scripts used to generate the [sample layers in the ATT&CK Navigator repository](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples). See issue [#21](https://github.com/mitre-attack/attack-scripts/issues/21) and [the sample layer README](scripts/layers/samples/README.md) for more details. The following scripts were added:
- Fixed a bug in diff_stix where sub-techniques had the wrong URL in hyperlinks.
10
+
11
+
# v1.4.1 - 18 May 2020
2
12
## New Scripts
3
13
- New script [technique_mappings_to_csv.py](technique_mappings_to_csv.py) added to support mapping Techniques with Mitigations, Groups or Software. The output is a CSV file. Added in PR [#23](https://github.com/mitre-attack/attack-scripts/pull/23)
4
14
## Improvements
5
15
- Updated [diff_stix.py](scripts/diff_stix.py) with sub-techniques support. See issue [#12](https://github.com/mitre-attack/attack-scripts/issues/12).
6
16
## Fixes
7
17
- Fixed bug in LayerOps causing issues with cross-tactic techniques, as well as a bug where a score lambda could affect the outcome of other lambdas.
8
18
9
-
# V1.4 - 5 May 2020
19
+
# v1.4 - 5 May 2020
10
20
## New Scripts
11
21
- Added Layers folder with utility scripts for working with [ATT&CK Navigator](https://github.com/mitre-attack/attack-navigator) Layers. See the Layers [README](layers/README.md) for more details. See issues [#2](https://github.com/mitre-attack/attack-scripts/issues/2) and [#3](https://github.com/mitre-attack/attack-scripts/issues/3).
12
22
13
-
# V1.3 - 8 January 2019
23
+
# v1.3 - 8 January 2019
14
24
## New Scripts
15
25
- Added [diff_stix.py](scripts/diff_stix.py).
16
26
17
-
# V1.2 - 24 October 2019
27
+
# v1.2 - 24 October 2019
18
28
- Added ATT&CKcon 2.0 Detection Training. See [the readme](/trainings/detection-training/README.md) for details.
The scripts in this folder are used to generate the [sample layers in the ATT&CK Navigator repository](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples). Run the scripts with the -h flag for usage instructions.
4
+
5
+
| script | sample layers | description |
6
+
|:-------|:------------|:--------|
7
+
|[heatmap.py](heatmap.py)|[heatmap_layer.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/heatmap_layer.json)| Generates a layer wherein all techniques have randomized scores from 1-100. |
8
+
|[bear_APT.py](bear_APT.py)|[Bear_APT.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/Bear_APT.json)| Parses STIX data to create a layer showing all techniques used by an APT group with phrase 'bear' in the group aliases. |
9
+
|[apt3_apt29_software.py](apt3_apt29_software.py)|[APT3_+_APT29_with_software.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/APT3_+_APT29_with_software.json), [APT3_+_APT29_with_software_and_notional_no_detection.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/APT3_+_APT29_with_software_and_notional_no_detection.json)| Creates a layer file showing techniques used by APT3 and APT29 as well as software used by those groups, and a second layer showing the same but with the added concept of detectability by a notional organization. |
10
+
|[software_execution.py](software_execution.py)|[software_execution.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/software_execution.json), [software_malware_execution.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/software_malware_execution.json), [software_tool_execution.json](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples/software_tool_execution.json)| Generates layers showing all techniques that can be executed by software. |
if ("x_mitre_deprecated"insoftware_target_objandsoftware_target_obj["x_mitre_deprecated"]) or ("revoked"insoftware_target_objandsoftware_target_obj["revoked"]): continue
# set up layer information according to show_nodetect
92
+
name="APT3 + APT29 with software"
93
+
description="This layer shows techniques (including techniques from software used by the groups) used by APT3 only in blue, APT29 only in yellow, and both APT3 and APT29 in green."
# additional formatting when displaying notional detectability
109
+
ifshow_nodetect:
110
+
name+=" and notional no detection"
111
+
description+=" The techniques in red denote techniques considered undetectable by a notional organization because they have no data-sources. Disclaimer: Data-sources in ATT&CK are sources of information that COULD be used to identify adversary actions, however the exactness of that evidence varies greatly. Therefore the presence of a data source for technique should only be considered a potential metric for detectability."
112
+
legend.append({
113
+
"label": "Used by either APT3 or APT29 but considered undetectable by a notional organization because it has no data-sources",
description="Creates a layer file showing techniques used by APT3 and APT29 as well as software used by those groups, and a second layer showing the same but with the added concept of detectability by a notional organization."
132
+
)
133
+
parser.add_argument("--output",
134
+
type=str,
135
+
default="APT3_+_APT29_with_software.json",
136
+
help="output filepath for layer showing APT3 and APT29"
0 commit comments