You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
From time to time we will need to update MITRE ATT&CK data locally and then update any potential name changes to techniques and subtechniques. When using pytests, these are checked with the updates data to confirm names match but we should be able to programmatically update the local ATT&CK data and current mappings with a single command.
This was found during efforts to update all mappings.
Mikaayenson
changed the title
[FR] Capability to Pull New ATT&CK Version and Update Existing
[FR] Capability to Pull New ATT&CK Version and Update Existing Threat Maps
Sep 15, 2022
Mikaayenson
changed the title
[FR] Capability to Pull New ATT&CK Version and Update Existing Threat Maps
[FR] Capability to Pull New ATT&CK Version and Update Existing Rule Threat Maps
Sep 15, 2022
During the study came across a file artifact that is already being generated named attack-crosswalk.json with all the mapping changes in a single consolidated mapping!
Description
From time to time we will need to update MITRE ATT&CK data locally and then update any potential name changes to techniques and subtechniques. When using pytests, these are checked with the updates data to confirm names match but we should be able to programmatically update the local ATT&CK data and current mappings with a single command.
This was found during efforts to update all mappings.
While the following code is not perfect, it does give a good starting point for being able to do this.
devtools.py
The text was updated successfully, but these errors were encountered: