Skip to content
This repository was archived by the owner on Dec 11, 2023. It is now read-only.

Commit 51219ed

Browse files
committed
revert layer scripts to use master branch of CTI
1 parent 31552f5 commit 51219ed

4 files changed

Lines changed: 4 additions & 4 deletions

File tree

scripts/layers/samples/apt3_apt29_software.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ def generate(show_nodetect=False):
88
generate and return a layer dict showing techniques used by APT3 and APT29 as well as software used by those groups
99
param show_nodetect, if true, causes techniques that have no data-sources to be highlighted as well
1010
"""
11-
stix = requests.get("https://raw.githubusercontent.com/mitre/cti/subtechniques/enterprise-attack/enterprise-attack.json", verify=False).json()
11+
stix = requests.get("https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json").json()
1212
ms = stix2.MemoryStore(stix_data=stix["objects"])
1313
apt3 = ms.get("intrusion-set--0bbdf25b-30ff-4894-a1cd-49260d0dd2d9")
1414
apt29 = ms.get("intrusion-set--899ce53f-13a0-479b-a0e4-67d46e241542")

scripts/layers/samples/bear_APT.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
def generate():
88
"""parse the STIX on MITRE/CTI and return a layer dict showing all techniques used by an APT group with phrase 'bear' in the group aliases."""
99
# import the STIX data from MITRE/CTI
10-
stix = requests.get("https://raw.githubusercontent.com/mitre/cti/subtechniques/enterprise-attack/enterprise-attack.json", verify=False).json()
10+
stix = requests.get("https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json").json()
1111
ms = stix2.MemoryStore(stix_data=stix["objects"])
1212

1313
groups = ms.query([ stix2.Filter("type", "=", "intrusion-set") ])

scripts/layers/samples/heatmap.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
def generate():
88
"""parse the STIX on MITRE/CTI and return a layer dict with techniques with randomized scores"""
99
# import the STIX data from MITRE/CTI
10-
stix = requests.get("https://raw.githubusercontent.com/mitre/cti/subtechniques/enterprise-attack/enterprise-attack.json", verify=False).json()
10+
stix = requests.get("https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json").json()
1111
ms = stix2.MemoryStore(stix_data=stix["objects"])
1212
# get all techniques in STIX
1313
techniques = ms.query([

scripts/layers/samples/software_execution.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ def generate(softwaretype="software"):
99
If softwaretype is specified as "malware" or "tool", only shows software of that type. If softwaretype is specified as "software" output layer shows both malware and tools
1010
"""
1111
# import the STIX data from MITRE/CTI
12-
stix = requests.get("https://raw.githubusercontent.com/mitre/cti/subtechniques/enterprise-attack/enterprise-attack.json", verify=False).json()
12+
stix = requests.get("https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json").json()
1313
ms = stix2.MemoryStore(stix_data=stix["objects"])
1414
# software includes malware and tool types so perform two queries and merge the results
1515
software_filters = []

0 commit comments

Comments
 (0)