Skip to main content

MITRE ATT&CK python library

Project description

mitreattack-python

This repository contains a library of Python tools and utilities for working with ATT&CK data. For more information, see the full documentation on ReadTheDocs.

Install

To use this package, install the mitreattack-python library with pip:

pip install mitreattack-python

MitreAttackData Library

The MitreAttackData library is used to read in and work with MITRE ATT&CK STIX 2.0 content. This library provides the ability to query the dataset for objects and their related objects. This is the main content of mitreattack-python; you can read more about other modules in this library under "Additional Modules".

Related MITRE Work

CTI

Cyber Threat Intelligence repository of the ATT&CK catalog expressed in STIX 2.0 JSON. This repository also contains our USAGE document which includes additional examples of accessing and parsing our dataset in Python.

ATT&CK

ATT&CK® is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s lifecycle, and the platforms they are known to target. ATT&CK is useful for understanding security risk against known adversary behavior, for planning security improvements, and verifying defenses work as expected.

https://attack.mitre.org

STIX

Structured Threat Information Expression (STIX) is a language and serialization format used to exchange cyber threat intelligence (CTI).

STIX enables organizations to share CTI with one another in a consistent and machine-readable manner, allowing security communities to better understand what computer-based attacks they are most likely to see and to anticipate and/or respond to those attacks faster and more effectively.

STIX is designed to improve many capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more.

https://oasis-open.github.io/cti-documentation/

Contributing

To contribute to this project, either through a bug report, feature request, or merge request, please see the Contributors Guide.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mitreattack_python-5.4.5.tar.gz (545.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mitreattack_python-5.4.5-py3-none-any.whl (565.2 kB view details)

Uploaded Python 3

File details

Details for the file mitreattack_python-5.4.5.tar.gz.

File metadata

  • Download URL: mitreattack_python-5.4.5.tar.gz
  • Upload date:
  • Size: 545.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for mitreattack_python-5.4.5.tar.gz
Algorithm Hash digest
SHA256 598d44e8796458f4a6fe5191e4c178d6648b43fd3a48bc9ede16df62c0326c6f
MD5 a957e5d2fdb2e60cca81d77ccc747bc4
BLAKE2b-256 de853c54b96aac0bc6a2ba43e50e2be8a3308314336c89602fabc1f4362ba355

See more details on using hashes here.

Provenance

The following attestation bundles were made for mitreattack_python-5.4.5.tar.gz:

Publisher: release-and-publish.yml on mitre-attack/mitreattack-python

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file mitreattack_python-5.4.5-py3-none-any.whl.

File metadata

File hashes

Hashes for mitreattack_python-5.4.5-py3-none-any.whl
Algorithm Hash digest
SHA256 2eb6f3434cea3e16bb3ce1541f030390e9782611e3abd925c6f5b54f1653ce38
MD5 4738508257095d98c2794086f0a1b612
BLAKE2b-256 5f54b4d2d7d382341fdb5e9eef8d486276f0060ce7361ced271cb5447c718613

See more details on using hashes here.

Provenance

The following attestation bundles were made for mitreattack_python-5.4.5-py3-none-any.whl:

Publisher: release-and-publish.yml on mitre-attack/mitreattack-python

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page