Closed infosec-alchemist closed 5 years ago
Saw your presentation at ATTACKCon, nice job.
I was hoping to leverage your data along with the MITRE ATTACK Data (https://github.com/mitre/cti), however, the attack pattern ID's do not match, and so we would have duplicates.
Any thought of leveraging MITRE's STIX objects?
Thanks
The MITRE techniques in the Playbooks have been updated and now use MITRE's UUIDs.
Please see Deprecated Techniques for another related issue.
Saw your presentation at ATTACKCon, nice job.
I was hoping to leverage your data along with the MITRE ATTACK Data (https://github.com/mitre/cti), however, the attack pattern ID's do not match, and so we would have duplicates.
Any thought of leveraging MITRE's STIX objects?
Thanks