You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Dec 11, 2023. It is now read-only.
The scripts in this folder are used to generate the [sample layers in the ATT&CK Navigator repository](https://github.com/mitre-attack/attack-navigator/tree/master/layers/data/samples). Run the scripts with the -h flag for usage instructions.
4
+
5
+
| script | sample layers | description |
6
+
|:-------|:------------|:--------|
7
+
|[heatmap.py](heatmap.py)|[heatmap_layer.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/heatmap_layer.json)| Generates a layer wherein all techniques have randomized scores from 1-100. |
8
+
|[bear_APT.py](bear_APT.py)|[bear_APT.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/bear_APT.json)| Parses STIX data to create a layer showing all techniques used by an APT group with phrase 'bear' in the group aliases. |
9
+
|[apt3_apt29_software.py](apt3_apt29_software.py)|[APT3_+_APT29_with_software.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/APT3_+_APT29_with_software.json), [APT3_+_APT29_with_software_and_notional_no_detection.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/APT3_+_APT29_with_software_and_notional_no_detection.json)| Creates a layer file showing techniques used by APT3 and APT29 as well as software used by those groups, and a second layer showing the same but with the added concept of detectability by a notional organization. |
10
+
|[software_execution.py](software_execution.py)|[software_execution.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/software_execution.json), [software_malware_execution.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/software_malware_execution.json), [software_tool_execution.json](https://github.com/mitre-attack/attack-navigator/tree/develop/layers/data/samples/software_tool_execution.json)| Generates layers showing all techniques that can be executed by software. |
if ("x_mitre_deprecated"insoftware_target_objandsoftware_target_obj["x_mitre_deprecated"]) or ("revoked"insoftware_target_objandsoftware_target_obj["revoked"]): continue
# set up layer information according to show_nodetect
92
+
name="APT3 + APT29 with software"
93
+
description="This layer shows techniques (including techniques from software used by the groups) used by APT3 only in blue, APT29 only in yellow, and both APT3 and APT29 in green."
# additional formatting when displaying notional detectability
109
+
ifshow_nodetect:
110
+
name+=" and notional no detection"
111
+
description+=" The techniques in red denote techniques considered undetectable by a notional organization because they have no data-sources. Disclaimer: Data-sources in ATT&CK are sources of information that COULD be used to identify adversary actions, however the exactness of that evidence varies greatly. Therefore the presence of a data source for technique should only be considered a potential metric for detectability."
112
+
legend.append({
113
+
"label": "Used by either APT3 or APT29 but considered undetectable by a notional organization because it has no data-sources",
description="Creates a layer file showing techniques used by APT3 and APT29 as well as software used by those groups, and a second layer showing the same but with the added concept of detectability by a notional organization."
132
+
)
133
+
parser.add_argument("--output",
134
+
type=str,
135
+
default="APT3_+_APT29_with_software.json",
136
+
help="output filepath for layer showing APT3 and APT29"
0 commit comments