-
Notifications
You must be signed in to change notification settings - Fork 114
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tactic for T1506 is not present when calling get_enterprise(stix_format=False)
#17
Comments
Hey @d1vious ! Thank you for letting me know. I have been a little busy with a few projects but I can take a look at it and see whats going on. I do not see anything changing for that section: https://github.com/mitre/cti/blob/master/enterprise-attack/attack-pattern/attack-pattern--0042a9f5-f053-4769-b3ef-9ad018dfa298.json#L57-L65 but idk if you were aware but TAXII is not always aligned with mitre's cti repo lol so I will have to manually see what happened with the format coming from TAXII server |
Looks like MITRE framework (and maybe TAXII) is using a new technique number for this one T1550.004 https://attack.mitre.org/techniques/T1550/004/ and as you suggested CTI still using the old technique number: https://github.com/mitre/cti/search?q=T1506+path%3Aenterprise-attack%2Fattack-pattern%2F+filename%3A*.json&unscoped_q=T1506+path%3Aenterprise-attack%2Fattack-pattern%2F+filename%3A*.json |
ahhh https://attack.mitre.org/techniques/T1056/ thats a revoked one in CTI docs right? https://github.com/mitre/cti/blob/cba073ec9e4bee27821ff1f028eddc3d8221b5b9/enterprise-attack/attack-pattern/attack-pattern--c5e31fb5-fcbd-48a4-af8c-5a6ed5b932e5.json but it is Input Capture in the site? The library has a function to remove revoked ones. try to remove all the revoked ones and deprecated too just in case. Can you try this one before you run your additional functions? https://github.com/hunters-forge/ATTACK-Python-Client/blob/master/attackcti/attack_api.py#L239 . Just in case. Also, there is a new method that was added #15 That PR was to work with sub-techniques properly. The idea of ATTACKCTI library is to grab everything just in case if one wants to do additional analysis to something that was deprecated or revoked. That's by design. Then we use things like remove_revoked to start cleaning the output. I hope that helps. The latest PR applies to master but I have not updated the Python package in Pip. I was planning on doing that this weekend. Would you mind installing the library with the second option in the README ? https://github.com/hunters-forge/ATTACK-Python-Client#installation . That should install master. |
Thank you for your patience @d1vious 🙏 ! |
@Cyb3rWard0g thank you, let me try it out and get back to you with an update. |
Looks like removing revoked did the trick! Thank you @Cyb3rWard0g 😃. |
Awesome thank you for letting me know :) |
Currently using the latest version of the library, when iterating over the techniques returned by
get_enterprise
the tactic field does not appear present. Base on MITRE it should beget_enterprise
Current example implementation: https://github.com/splunk/security-content/blob/develop/bin/generate.py#L484
The is the print output:
Current version:
The text was updated successfully, but these errors were encountered: