This script is designed to analyze the MITRE ATT&CK enterprise techniques and provide a top list based on their occurrences across various threat groups and malware. Logic behind the script:
- Fetching Data: The script starts by making a request to the MITRE ATT&CK groups and software URL.
- Downloading Techniques: For each threat group & malware, the script identifies and downloads the associated JSON files which contain the techniques ID.
- Analyzing Techniques: The script parses each file to count the occurrences of each technique across all the downloaded pages and sorts them. Output example: