This repository was archived by the owner on Dec 11, 2023. It is now read-only.
File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -8,7 +8,7 @@ def generate(show_nodetect=False):
88 generate and return a layer dict showing techniques used by APT3 and APT29 as well as software used by those groups
99 param show_nodetect, if true, causes techniques that have no data-sources to be highlighted as well
1010 """
11- stix = requests .get ("https://raw.githubusercontent.com/mitre/cti/subtechniques /enterprise-attack/enterprise-attack.json" , verify = False ).json ()
11+ stix = requests .get ("https://raw.githubusercontent.com/mitre/cti/master /enterprise-attack/enterprise-attack.json" ).json ()
1212 ms = stix2 .MemoryStore (stix_data = stix ["objects" ])
1313 apt3 = ms .get ("intrusion-set--0bbdf25b-30ff-4894-a1cd-49260d0dd2d9" )
1414 apt29 = ms .get ("intrusion-set--899ce53f-13a0-479b-a0e4-67d46e241542" )
Original file line number Diff line number Diff line change 77def generate ():
88 """parse the STIX on MITRE/CTI and return a layer dict showing all techniques used by an APT group with phrase 'bear' in the group aliases."""
99 # import the STIX data from MITRE/CTI
10- stix = requests .get ("https://raw.githubusercontent.com/mitre/cti/subtechniques /enterprise-attack/enterprise-attack.json" , verify = False ).json ()
10+ stix = requests .get ("https://raw.githubusercontent.com/mitre/cti/master /enterprise-attack/enterprise-attack.json" ).json ()
1111 ms = stix2 .MemoryStore (stix_data = stix ["objects" ])
1212
1313 groups = ms .query ([ stix2 .Filter ("type" , "=" , "intrusion-set" ) ])
Original file line number Diff line number Diff line change 77def generate ():
88 """parse the STIX on MITRE/CTI and return a layer dict with techniques with randomized scores"""
99 # import the STIX data from MITRE/CTI
10- stix = requests .get ("https://raw.githubusercontent.com/mitre/cti/subtechniques /enterprise-attack/enterprise-attack.json" , verify = False ).json ()
10+ stix = requests .get ("https://raw.githubusercontent.com/mitre/cti/master /enterprise-attack/enterprise-attack.json" ).json ()
1111 ms = stix2 .MemoryStore (stix_data = stix ["objects" ])
1212 # get all techniques in STIX
1313 techniques = ms .query ([
Original file line number Diff line number Diff line change @@ -9,7 +9,7 @@ def generate(softwaretype="software"):
99 If softwaretype is specified as "malware" or "tool", only shows software of that type. If softwaretype is specified as "software" output layer shows both malware and tools
1010 """
1111 # import the STIX data from MITRE/CTI
12- stix = requests .get ("https://raw.githubusercontent.com/mitre/cti/subtechniques /enterprise-attack/enterprise-attack.json" , verify = False ).json ()
12+ stix = requests .get ("https://raw.githubusercontent.com/mitre/cti/master /enterprise-attack/enterprise-attack.json" ).json ()
1313 ms = stix2 .MemoryStore (stix_data = stix ["objects" ])
1414 # software includes malware and tool types so perform two queries and merge the results
1515 software_filters = []
You can’t perform that action at this time.
0 commit comments