idaholab / cape2stix

This software allows for the conversion, extraction, and transformation of malware behavior data from "Malware Configuration And Payload Extraction" (CAPEv2) sandbox reports, to Structured Threat Information eXpression (STIX). This allows for further analysis to be performed, sharing of threat data, and transit to a graph database.
BSD 3-Clause "New" or "Revised" License
6 stars 2 forks source link

MITRE deprecated some Techniques #3

Open Fhree99 opened 1 year ago

Fhree99 commented 1 year ago

MITRE deprecated some Techniques, so they no longer exist in the STIX we're pulling from, however CAPEv2 still recongnizes them, we may need to auto-adjust those T####'s to a valid replacement.

See https://attack.mitre.org/techniques/T1320/