-
Notifications
You must be signed in to change notification settings - Fork 418
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
several Techniques in other matrices such as MOBILE are missing the 'x_mitre_is_subtechnique' key #131
Comments
Hi @Cyb3rWard0g, Mobile and ICS ATT&CK don't include sub-techniques at all, so the In the case of Data from Local System, the enterprise and mobile instances are actually different techniques. They share a name, but their STIX IDs and ATT&CK IDs, description, etc are different. They also follow the data model for Enterprise and Mobile respectively, e.g the mobile instance includes x_mitre_tactic_type (an mobile-only field) and the enterprise instance includes x_mitre_system_requirements (an enterprise-only field). For techniques, "cross-domain" objects like Data from Local System aren't truly cross domain. The instances are simply duplicated due to data model and scope differences. However, other types of objects such as groups don't have the same design, for instance Dark Caracal is the same object (same STIX ID and ATT&CK ID) for both domains [1, 2]. Another way to look at it is that there are two pages for Data from Local System on attack.mitre.org [1, 2], but only 1 for Dark Caracal [1]. All that is to say, since Mobile and ICS don't have sub-techniques, you shouldn't need to filter based on the presence of an |
Anyway, with regards to the mobile techniques which do have the |
Techniques with
|
name | created | modified | STIX ID |
---|---|---|---|
SMS Control | 2020-09-11 15:14:33.730000+00:00 | 2020-10-22 17:04:15.578000+00:00 | attack-pattern--b327a9c0-e709-495c-aa6e-00b042136e2b |
Geofencing | 2020-09-11 15:04:14.532000+00:00 | 2020-10-01 12:43:41.494000+00:00 | attack-pattern--8197f026-64da-4700-93b9-b55ba55f3b31 |
Keychain | 2020-06-24 17:33:49.778000+00:00 | 2020-06-24 19:02:46.237000+00:00 | attack-pattern--27f483c6-6666-44fa-8532-ffd5fc7dab38 |
Compromise Application Executable | 2020-05-07 15:24:49.068000+00:00 | 2020-05-27 13:23:34.159000+00:00 | attack-pattern--d3bc5020-f6a2-41c0-8ccb-5e563101b60c |
Uninstall Malicious Application | 2020-05-04 13:49:34.706000+00:00 | 2020-05-26 18:05:37.393000+00:00 | attack-pattern--8c7862ff-3449-4ac6-b0fd-ac1298a822a5 |
Native Code | 2020-04-28 14:35:37.309000+00:00 | 2020-04-28 18:34:15.373000+00:00 | attack-pattern--52eff1c7-dd30-4121-b762-24ae6fa61bbb |
Remote File Copy | 2020-01-21 15:27:30.182000+00:00 | 2020-01-21 15:27:30.182000+00:00 | attack-pattern--2bb20118-e6c0-41dc-a07c-283ea4dd0fb8 |
Foreground Persistence | 2019-11-19 17:32:20.373000+00:00 | 2019-12-26 16:14:33.302000+00:00 | attack-pattern--648f8051-1a35-46d3-b1d8-3a3f5cf2cc8e |
Code Injection | 2019-10-30 15:37:55.029000+00:00 | 2020-03-29 04:07:06.663000+00:00 | attack-pattern--039bc59c-ecc7-4997-b2b4-4ab728bd91aa |
Input Injection | 2019-09-15 15:26:22.356000+00:00 | 2020-06-24 15:02:13.323000+00:00 | attack-pattern--d1f1337e-aea7-454c-86bd-482a98ffaf62 |
Access Notifications | 2019-09-15 15:26:08.183000+00:00 | 2020-07-09 14:07:02.217000+00:00 | attack-pattern--39dd7871-f59b-495f-a9a5-3cb8cc50c9b2 |
Screen Capture | 2019-08-08 18:34:14.178000+00:00 | 2020-06-24 15:03:25.857000+00:00 | attack-pattern--73c26732-6422-4081-8b63-6d0ae93d449e |
Suppress Application Icon | 2019-07-11 18:09:42.039000+00:00 | 2019-11-14 18:03:26.460000+00:00 | attack-pattern--fd658820-cbba-4c95-8ac9-0fac6b1099e2 |
Supply Chain Compromise | 2018-10-17 00:14:20.652000+00:00 | 2020-10-19 18:06:09.010000+00:00 | attack-pattern--0d95940f-9583-4e0f-824c-a42c1be47fad |
Masquerade as Legitimate Application | 2017-10-25 14:48:35.247000+00:00 | 2020-04-08 15:19:56.147000+00:00 | attack-pattern--a93ccb8f-3996-42e2-b7c7-bb599d4e205f |
Input Prompt | 2017-10-25 14:48:34.407000+00:00 | 2020-06-24 15:04:20.321000+00:00 | attack-pattern--3dd58c80-4c2e-458c-9503-1b2cd273c4d2 |
System Network Configuration Discovery | 2017-10-25 14:48:32.740000+00:00 | 2020-06-02 14:35:01.479000+00:00 | attack-pattern--d4536441-1bcc-49fa-80ae-a596ed3f7ffd |
URI Hijacking | 2017-10-25 14:48:32.008000+00:00 | 2020-10-01 12:42:21.628000+00:00 | attack-pattern--77e30eee-fd48-40b4-99ec-73e97c158b58 |
Delete Device Data | 2017-10-25 14:48:31.694000+00:00 | 2020-10-01 12:52:58.150000+00:00 | attack-pattern--8e27551a-5080-4148-a584-c64348212e4f |
Broadcast Receivers | 2017-10-25 14:48:30.127000+00:00 | 2020-03-27 15:28:03.858000+00:00 | attack-pattern--bd4d32f5-eed4-4018-a649-40b229dd1d69 |
Input Capture | 2017-10-25 14:48:27.660000+00:00 | 2020-06-24 15:09:12.483000+00:00 | attack-pattern--a8c31121-852b-46bd-9ba4-674ae5afe7ad |
System Information Discovery | 2017-10-25 14:48:19.265000+00:00 | 2019-11-20 19:56:49.109000+00:00 | attack-pattern--e2ea7f6b-8d4f-49c3-819d-660530d12b77 |
Carrier Billing Fraud | 2017-10-25 14:48:09.082000+00:00 | 2020-05-04 15:40:20.943000+00:00 | attack-pattern--8f0e39c6-82c9-41ec-9f93-5696c0f2e274 |
Abuse Accessibility Features | 2017-10-25 14:48:08.613000+00:00 | 2020-03-30 14:03:43.761000+00:00 | attack-pattern--2204c371-6100-4ae0-82f3-25c07c29772a |
These techniques were likely all modified after we implemented the sub-techniques data model internally (I'd have to dig up the exact date for the deployment, but it looks about right).
Techniques without x_mitre_is_subtechnique
name | created | modified | STIX ID |
---|---|---|---|
Data from Local System | 2019-10-10 15:12:42.790000+00:00 | 2019-10-11 14:53:38.987000+00:00 | attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a |
Data Encrypted | 2019-10-10 15:00:44.181000+00:00 | 2019-10-10 15:00:44.181000+00:00 | attack-pattern--e3b936a4-6321-4172-9114-038a866362ec |
Evade Analysis Environment | 2019-10-02 14:46:43.632000+00:00 | 2019-10-11 14:48:50.525000+00:00 | attack-pattern--786f488c-cb1f-4602-89c5-86d982ee326b |
Standard Cryptographic Protocol | 2019-10-01 14:18:47.762000+00:00 | 2019-10-01 14:18:47.762000+00:00 | attack-pattern--ed2c05a1-4f81-4d97-9e1b-aff01c34ae84 |
Domain Generation Algorithms | 2019-09-23 13:11:43.694000+00:00 | 2019-09-23 14:53:42.654000+00:00 | attack-pattern--60623164-ccd8-4508-a141-b5a34820b3de |
Capture Camera | 2019-08-09 16:14:58.254000+00:00 | 2019-09-12 18:33:15.023000+00:00 | attack-pattern--d8940e76-f9c1-4912-bea6-e21c251370b6 |
Uncommonly Used Port | 2019-08-01 13:44:09.368000+00:00 | 2019-09-11 13:27:50.344000+00:00 | attack-pattern--948a447c-d783-4ba0-8516-a64140fcacd5 |
Clipboard Modification | 2019-07-26 14:15:31.451000+00:00 | 2019-10-28 18:36:26.261000+00:00 | attack-pattern--e399430e-30b7-48c5-b70a-f44dc8c175cb |
Network Information Discovery | 2019-07-10 15:18:16.753000+00:00 | 2019-07-10 15:18:16.753000+00:00 | attack-pattern--e4c347e9-fb91-4bc5-83b8-391e389131e2 |
Web Service | 2019-02-01 17:29:43.503000+00:00 | 2019-02-01 17:29:43.503000+00:00 | attack-pattern--c6a146ae-9c63-4606-97ff-e261e76e8380 |
Deliver Malicious App via Other Means | 2018-10-17 00:14:20.652000+00:00 | 2019-10-28 18:33:12.646000+00:00 | attack-pattern--53263a67-075e-48fa-974b-91c5b5445db7 |
Deliver Malicious App via Authorized App Store | 2018-10-17 00:14:20.652000+00:00 | 2019-10-14 17:42:49.817000+00:00 | attack-pattern--d9db3d46-66ca-44b4-9daa-1ef97cb7465a |
Exploit via Radio Interfaces | 2018-10-17 00:14:20.652000+00:00 | 2019-02-03 15:19:22.439000+00:00 | attack-pattern--2d646840-f6f5-4619-a5a8-29c8316bbac5 |
Install Insecure or Malicious Configuration | 2018-10-17 00:14:20.652000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--cde2cb84-455e-410c-8aa9-086f2788bcd2 |
Remotely Install Application | 2017-10-25 14:48:34.830000+00:00 | 2018-10-17 01:05:10.701000+00:00 | attack-pattern--831e3269-da49-48ac-94dc-948008e8fd16 |
Process Discovery | 2017-10-25 14:48:33.926000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--1b51f5bc-b97a-498a-8dbd-bc6b1901bf19 |
System Network Connections Discovery | 2017-10-25 14:48:33.574000+00:00 | 2019-02-01 19:34:17.460000+00:00 | attack-pattern--dd818ea5-adf5-41c7-93b5-f3b839a219fb |
Standard Application Layer Protocol | 2017-10-25 14:48:33.158000+00:00 | 2019-02-03 14:52:45.266000+00:00 | attack-pattern--6a3f6490-9c44-40de-b059-e5940f246673 |
Obfuscated Files or Information | 2017-10-25 14:48:32.328000+00:00 | 2019-09-23 13:26:01.263000+00:00 | attack-pattern--d13fa042-8f26-44e1-a2a8-af0bf8e2ac9a |
Modify OS Kernel or Boot Partition | 2017-10-25 14:48:31.294000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--46d818a5-67fa-4585-a7fc-ecf15376c8d5 |
Modify System Partition | 2017-10-25 14:48:30.890000+00:00 | 2019-09-04 13:35:57.549000+00:00 | attack-pattern--c5089859-b21f-40a3-8be4-63e381b8b1c0 |
Insecure Third-Party Libraries | 2017-10-25 14:48:30.462000+00:00 | 2018-10-17 01:05:10.699000+00:00 | attack-pattern--11bd699b-f2c2-4e48-bf46-fb3f8acd9799 |
Abuse Device Administrator Access to Prevent Removal | 2017-10-25 14:48:29.774000+00:00 | 2019-02-03 16:56:41.200000+00:00 | attack-pattern--82f04b1e-5371-4a6f-be06-411f0f43b483 |
Exploit OS Vulnerability | 2017-10-25 14:48:29.405000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--351c0927-2fc1-4a2c-ad84-cbbee7eb8172 |
Modify Cached Executable Code | 2017-10-25 14:48:29.092000+00:00 | 2019-10-09 19:39:32.872000+00:00 | attack-pattern--88932a8c-3a17-406f-9431-1da3ff19f6d6 |
Fake Developer Accounts | 2017-10-25 14:48:28.786000+00:00 | 2018-10-17 01:05:10.701000+00:00 | attack-pattern--e30cc912-7ea1-4683-9219-543b86cbdec9 |
Device Type Discovery | 2017-10-25 14:48:28.456000+00:00 | 2019-10-16 13:24:48.936000+00:00 | attack-pattern--89fcd02f-62dc-40b9-a54b-9ac4b1baef05 |
Application Discovery | 2017-10-25 14:48:28.067000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--198ce408-1470-45ee-b47f-7056050d4fc2 |
Alternate Network Mediums | 2017-10-25 14:48:27.307000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--b3c2e5de-0941-4b57-ba61-af029eb5517a |
Network Service Scanning | 2017-10-25 14:48:26.890000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--2de38279-043e-47e8-aaad-1b07af6d0790 |
Detect App Analysis Environment | 2017-10-25 14:48:26.473000+00:00 | 2018-10-17 01:05:10.700000+00:00 | attack-pattern--b765efd1-02e6-4e67-aebf-0fef5c37e54b |
Eavesdrop on Insecure Network Communication | 2017-10-25 14:48:26.104000+00:00 | 2019-02-03 14:54:29.631000+00:00 | attack-pattern--393e8c12-a416-4575-ba90-19cc85656796 |
Jamming or Denial of Service | 2017-10-25 14:48:25.740000+00:00 | 2019-02-03 14:15:21.946000+00:00 | attack-pattern--d2e112dc-f6d4-488d-b8df-ecbfb57a0a2d |
Manipulate Device Communication | 2017-10-25 14:48:25.322000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--d731c21e-f27d-4756-b418-0e2aaabd6d63 |
Malicious Software Development Tools | 2017-10-25 14:48:24.905000+00:00 | 2018-10-17 01:05:10.704000+00:00 | attack-pattern--b928b94a-4966-4e2a-9e61-36505b896ebc |
Lockscreen Bypass | 2017-10-25 14:48:24.488000+00:00 | 2019-02-03 17:08:07.111000+00:00 | attack-pattern--dfe29258-ce59-421c-9dee-e85cb9fa90cd |
Biometric Spoofing | 2017-10-25 14:48:24.069000+00:00 | 2018-10-17 01:05:10.703000+00:00 | attack-pattern--45dcbc83-4abc-4de1-b643-e528d1e9df09 |
Device Unlock Code Guessing or Brute Force | 2017-10-25 14:48:23.652000+00:00 | 2018-10-17 01:05:10.703000+00:00 | attack-pattern--f296fc9c-2ff5-43ee-941e-6b49c438270a |
Exploit via Charging Station or PC | 2017-10-25 14:48:23.233000+00:00 | 2019-02-03 15:10:41.460000+00:00 | attack-pattern--667e5707-3843-4da8-bd34-88b922526f0d |
Exploit TEE Vulnerability | 2017-10-25 14:48:22.716000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--ef771e03-e080-43b4-a619-ac6f84899884 |
Rogue Cellular Base Station | 2017-10-25 14:48:22.296000+00:00 | 2019-02-03 15:17:11.346000+00:00 | attack-pattern--a5de0540-73e7-4c67-96da-4143afedc7ed |
File and Directory Discovery | 2017-10-25 14:48:21.965000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--cf28ca46-1fd3-46b4-b1f6-ec0b72361848 |
Downgrade to Insecure Protocols | 2017-10-25 14:48:21.667000+00:00 | 2019-02-03 15:16:13.386000+00:00 | attack-pattern--f58cd69a-e548-478b-9248-8a9af881dc34 |
Rogue Wi-Fi Access Points | 2017-10-25 14:48:21.354000+00:00 | 2019-02-03 15:15:18.023000+00:00 | attack-pattern--633baf01-6de4-4963-bb54-ff6c6357bed3 |
Remotely Track Device Without Authorization | 2017-10-25 14:48:21.023000+00:00 | 2019-02-03 14:16:59.424000+00:00 | attack-pattern--6f86d346-f092-4abc-80df-8558a90c426a |
Access Calendar Entries | 2017-10-25 14:48:20.727000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--62adb627-f647-498e-b4cc-41499361bacb |
SIM Card Swap | 2017-10-25 14:48:20.329000+00:00 | 2019-02-03 14:13:24.168000+00:00 | attack-pattern--a64a820a-cb21-471f-920c-506a2ff04fa5 |
Capture Clipboard Data | 2017-10-25 14:48:19.996000+00:00 | 2019-09-13 20:46:26.223000+00:00 | attack-pattern--c4b96c0b-cb58-497a-a1c2-bb447d79d692 |
Malicious Media Content | 2017-10-25 14:48:19.682000+00:00 | 2018-10-17 01:05:10.703000+00:00 | attack-pattern--a9cab8f6-4c94-4c9b-9e7d-9d863ff53431 |
Generate Fraudulent Advertising Revenue | 2017-10-25 14:48:18.937000+00:00 | 2019-07-03 20:21:22.168000+00:00 | attack-pattern--f981d199-2720-467e-9dc9-eea04dbe05cf |
Modify Trusted Execution Environment | 2017-10-25 14:48:18.583000+00:00 | 2019-02-03 14:23:10.576000+00:00 | attack-pattern--f1c3d071-0c24-483d-aca0-e8b8496ce468 |
Obtain Device Cloud Backups | 2017-10-25 14:48:18.237000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--0c71033e-401e-4b97-9309-7a7c95e43a5d |
Device Lockout | 2017-10-25 14:48:17.886000+00:00 | 2019-10-09 14:39:38.930000+00:00 | attack-pattern--9d7c32f4-ab39-49dc-8055-8106bc2294a1 |
URL Scheme Hijacking | 2017-10-25 14:48:17.533000+00:00 | 2020-10-23 15:05:40.674000+00:00 | attack-pattern--8f142a25-f6c3-4520-bd50-2ae3ab50ed3e |
Access Sensitive Data in Device Logs | 2017-10-25 14:48:17.176000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--29e07491-8947-43a3-8d4e-9a787c45f3d3 |
Commonly Used Port | 2017-10-25 14:48:16.650000+00:00 | 2019-06-19 19:25:33.180000+00:00 | attack-pattern--3911658a-6506-4deb-9ab4-595a51ae71ad |
Abuse of iOS Enterprise App Signing Key | 2017-10-25 14:48:16.288000+00:00 | 2018-10-17 01:05:10.701000+00:00 | attack-pattern--51aedbd6-2837-4d15-aeb0-cb09f2bf22ac |
Capture SMS Messages | 2017-10-25 14:48:15.920000+00:00 | 2019-09-18 18:28:50.898000+00:00 | attack-pattern--e8b4e1ec-8e3b-484c-9038-4459b1ed8060 |
Access Stored Application Data | 2017-10-25 14:48:15.402000+00:00 | 2019-10-10 14:17:48.920000+00:00 | attack-pattern--702055ac-4e54-4ae9-9527-e23a38e0b160 |
Network Traffic Capture or Redirection | 2017-10-25 14:48:14.982000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--3b0b604f-10db-41a0-b54c-493124d455b9 |
Download New Code at Runtime | 2017-10-25 14:48:14.460000+00:00 | 2019-10-09 19:40:52.090000+00:00 | attack-pattern--6c49d50f-494d-4150-b774-a655022d20a6 |
Disguise Root/Jailbreak Indicators | 2017-10-25 14:48:14.003000+00:00 | 2019-02-03 14:34:59.071000+00:00 | attack-pattern--b332a960-3c04-495a-827f-f17a5daed3a6 |
Attack PC via USB Connection | 2017-10-25 14:48:13.625000+00:00 | 2019-02-03 14:51:19.932000+00:00 | attack-pattern--a0464539-e1b7-4455-a355-12495987c300 |
Exploit Enterprise Resources | 2017-10-25 14:48:13.259000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--22379609-a99f-4a01-bd7e-70f3e105859d |
Capture Audio | 2017-10-25 14:48:12.913000+00:00 | 2019-09-20 17:59:11.041000+00:00 | attack-pattern--6683aa0c-d98a-4f5b-ac57-ca7e9934a760 |
Location Tracking | 2017-10-25 14:48:12.267000+00:00 | 2019-10-15 20:01:06.186000+00:00 | attack-pattern--99e6295e-741b-4857-b6e5-64989eb039b4 |
App Delivered via Web Download | 2017-10-25 14:48:11.861000+00:00 | 2018-10-17 01:05:10.699000+00:00 | attack-pattern--6b846ad0-cc20-4db6-aa34-91561397c5e2 |
Access Contact List | 2017-10-25 14:48:11.535000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--4e6620ac-c30c-4f6d-918e-fa20cae7c1ce |
Access Call Log | 2017-10-25 14:48:11.116000+00:00 | 2019-09-18 18:17:43.466000+00:00 | attack-pattern--79eec66a-9bd0-4a3f-ac82-19159e94bd44 |
App Delivered via Email Attachment | 2017-10-25 14:48:10.699000+00:00 | 2018-10-17 01:05:10.699000+00:00 | attack-pattern--1f96d624-8409-4472-ad8a-30618ee6b2e2 |
Data Encrypted for Impact | 2017-10-25 14:48:10.285000+00:00 | 2019-10-01 13:51:22.001000+00:00 | attack-pattern--d9e88203-2b5d-405f-a406-2933b1e3d7e4 |
Exploit SS7 to Track Device Location | 2017-10-25 14:48:09.864000+00:00 | 2019-02-03 15:06:10.014000+00:00 | attack-pattern--52651225-0b3a-482d-aa7e-10618fd063b5 |
Malicious or Vulnerable Built-in Device Functionality | 2017-10-25 14:48:09.446000+00:00 | 2018-10-17 01:05:10.704000+00:00 | attack-pattern--f9e4f526-ac9d-4df5-8949-833a82a1d2df |
Malicious SMS Message | 2017-10-25 14:48:08.155000+00:00 | 2019-04-29 19:35:30.985000+00:00 | attack-pattern--0bcc4ec1-a897-49a9-a9ff-c00df1d1209d |
Remotely Wipe Data Without Authorization | 2017-10-25 14:48:07.827000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--537ea573-8a1c-468c-956b-d16d2ed9d067 |
Manipulate App Store Rankings or Ratings | 2017-10-25 14:48:07.460000+00:00 | 2019-07-03 20:25:59.845000+00:00 | attack-pattern--76c12fc8-a4eb-45d6-a3b7-e371a7248f69 |
Exploit Baseband Vulnerability | 2017-10-25 14:48:07.149000+00:00 | 2018-10-17 01:05:10.702000+00:00 | attack-pattern--c91c304a-975d-4501-9789-0db1c57afd3f |
Drive-by Compromise | 2017-10-25 14:48:06.822000+00:00 | 2018-10-17 00:14:20.652000+00:00 | attack-pattern--fd339382-bfec-4bf0-8d47-1caedc9e7e57 |
Exploit SS7 to Redirect Phone Calls/SMS | 2017-10-25 14:48:06.524000+00:00 | 2019-02-03 16:28:52.821000+00:00 | attack-pattern--fb3fa94a-3aee-4ab0-b7e7-abdf0a51286d |
Stolen Developer Credentials or Signing Keys | 2017-10-25 14:48:05.928000+00:00 | 2018-10-17 01:05:10.700000+00:00 | attack-pattern--a21a6a79-f9a1-4c87-aed9-ba2d79536881 |
These were all modified most recently in 2019, likely before we implemented the data model change. So my suspicion is that saving a technique in our internal editor will cause mobile techniques to gain the x_mitre_is_subtechnique field even though it isn't technically part of their data model. ICS doesn't use the same editing application so it isn't vulnerable to the same bug.
Thank you so much for all the details! It also helps me to improve my troubleshooting skills 😉 |
Hello CTI team,
I was looking at enhancing a few functions in a library I created named attackcti. I wanted to enable a new parameter/argument that would allow me to retrieve attack-pattern objects and filter them at query time (STIX Filter) with the filter
Filter('x_mitre_is_subtechnique', '=', False)
orFilter('x_mitre_is_subtechnique', '=', True)
.I noticed this piece of code in your USAGE docs: https://github.com/mitre/cti/blob/master/USAGE.md#getting-techniques-or-sub-techniques
I tested it with other matrices besides ENTERPRISE, and it seems that some techniques are missing the
x_mitre_is_subtechnique
. This is of course not helping the stix filters I showed above. For example, I have a basic function that retrieves all techniques fromMOBILE
. If I check the keys of each stix object, I can see that several of them do not have it as shown before:This affects when I try to do something similar to what was done here: https://github.com/mitre/cti/blob/master/USAGE.md#getting-techniques-or-sub-techniques
This is what it looks like:
That means that 24 out of the 87 technique objects have the
x_mitre_is_subtechnique
property/key. The others do not. I do not know if it is supposed to be like that by design. For example, we have one technique in ENTERPRISE and MOBILE but only one has thex_mitre_is_subtechnique
keyENTERPRISE: https://github.com/mitre/cti/blob/master/enterprise-attack/attack-pattern/attack-pattern--3c4a2599-71ee-4405-ba1e-0e28414b4bc5.json
MOBILE: https://github.com/mitre/cti/blob/253622f36393e4aa012725f0ce428dcd275f5d20/mobile-attack/attack-pattern/attack-pattern--e1c912a9-e305-434b-9172-8a6ce3ec9c4a.json
Thank you in advance!
Roberto Rodriguez
The text was updated successfully, but these errors were encountered: