cti icon indicating copy to clipboard operation
cti copied to clipboard

Cyber Threat Intelligence Repository expressed in STIX 2.0

Results 22 cti issues
Sort by recently updated
recently updated
newest added

I was trying to use the latest copy of https://github.com/vmapps/attack2neo project to load MITRE Enterprise ATT&CK into a Neo4j database, and received numerous errors. 1) There are embedded Unicode characters...

Is there any CTI for MITRE ATLAS? I want to contribute to it.

Feature request: Sub directories for each version of MITRE ATT&CK® released, to allow to pull older versions when specifying a version. I.E: * Instead of: https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/enterprise-attack.json * Becomes: https://raw.githubusercontent.com/mitre/cti/master/enterprise-attack/11.1/enterprise-attack.json So...

After seeing https://github.com/mitre/cti/issues/24 I would have a question. Is it possible, in the future, that a technique that revoked(replaced) another to also be "revoked-by" another technique ? Thank you

Hello, I noticed that some techniques and sub-techniques in the enterprise collection are missing the `x_mitre_is_subtechnique` key / flag. I've been using the TAXII server via this URL `https://cti-taxii.mitre.org/stix/collections/95ecc380-afe9-11e4-9b6c-751b66dd541e/` along...

There might be some typo errors in ATT&CK attack-pattern. First, in 'T1553.005' ('id': 'attack-pattern--7e7c2fba-7cca-486c-9582-4c1bb2851961'), during analysis of individual technique, in 'x_mitre_defense_bypassed', ``` 'x_mitre_defense_bypassed': ['Anti-virus, Application control'] ``` It has two...

hi, after parsed stix json, I found there are 2 cobalt strikes flagged as type "tool" and "malware".

Hello I have a question I am currently seeing that a couple of urls' are throwing a 404 end point denial of service https://cti-taxii.mitre.org/stix/collections/95ecc380-afe9-11e4-9b6c-751b66dd541e/objects/attack-pattern--01d5c7e7-1c74-4b20-9e43-548c5f4de113 Event Triggered Execution https://cti-taxii.mitre.org/stix/collections/95ecc380-afe9-11e4-9b6c-751b66dd541e/objects/attack-pattern--ccb9c607-8bfe-4141-8843-356453179da7 These were...

The microlibrary described in the USAGE.md document is slightly out of sync with the one defined in https://github.com/mitre-attack/attack-stix-data, especially since [this issue](https://github.com/mitre-attack/attack-stix-data/issues/12) pointed out a discrepancy in how the relationships...

documentation

`ServicesFile` should be updated to `Services File` in the following section of stix-capec.json: ```json { "source_name": "ATTACK", "description": "Hijack Execution Flow: ServicesFile Permissions Weakness", "url": "https://attack.mitre.org/wiki/Technique/T1574/010", "external_id": "T1574.010" } ```...

bug