Skip to main content

MITRE ATT&CK python library

Project description

mitreattack-python

This repository contains a library of Python tools and utilities for working with ATT&CK data. For more information, see the full documentation on ReadTheDocs.

Install

To use this package, install the mitreattack-python library with pip:

pip install mitreattack-python

MitreAttackData Library

The MitreAttackData library is used to read in and work with MITRE ATT&CK STIX 2.0 content. This library provides the ability to query the dataset for objects and their related objects. This is the main content of mitreattack-python; you can read more about other modules in this library under "Additional Modules".

Related MITRE Work

CTI

Cyber Threat Intelligence repository of the ATT&CK catalog expressed in STIX 2.0 JSON. This repository also contains our USAGE document which includes additional examples of accessing and parsing our dataset in Python.

ATT&CK

ATT&CK® is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s lifecycle, and the platforms they are known to target. ATT&CK is useful for understanding security risk against known adversary behavior, for planning security improvements, and verifying defenses work as expected.

https://attack.mitre.org

STIX

Structured Threat Information Expression (STIX) is a language and serialization format used to exchange cyber threat intelligence (CTI).

STIX enables organizations to share CTI with one another in a consistent and machine-readable manner, allowing security communities to better understand what computer-based attacks they are most likely to see and to anticipate and/or respond to those attacks faster and more effectively.

STIX is designed to improve many capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more.

https://oasis-open.github.io/cti-documentation/

Contributing

To contribute to this project, either through a bug report, feature request, or merge request, please see the Contributors Guide.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

mitreattack_python-5.4.6.tar.gz (546.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

mitreattack_python-5.4.6-py3-none-any.whl (565.7 kB view details)

Uploaded Python 3

File details

Details for the file mitreattack_python-5.4.6.tar.gz.

File metadata

  • Download URL: mitreattack_python-5.4.6.tar.gz
  • Upload date:
  • Size: 546.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for mitreattack_python-5.4.6.tar.gz
Algorithm Hash digest
SHA256 aac5aa0bae67ae8d4f6342dbf92d3791a5b5ce00021e72a9450b24e31aef7199
MD5 bae430c46911f1b296c6314bb052fada
BLAKE2b-256 a869d01b83c5aa6891d416a5ebb33b33aa4d1eb4645b1eed845833d22fc62eba

See more details on using hashes here.

Provenance

The following attestation bundles were made for mitreattack_python-5.4.6.tar.gz:

Publisher: release-and-publish.yml on mitre-attack/mitreattack-python

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file mitreattack_python-5.4.6-py3-none-any.whl.

File metadata

File hashes

Hashes for mitreattack_python-5.4.6-py3-none-any.whl
Algorithm Hash digest
SHA256 4e262fa16b3daab8d045584c7484e1809ed2756be7b218743c62b1f3a51449f7
MD5 1191f64d9ee9c64d18170493377e6a1f
BLAKE2b-256 1a80a5caa657b43308df1e358f82ac705a83c80d7f4f0760371690364c5b0339

See more details on using hashes here.

Provenance

The following attestation bundles were made for mitreattack_python-5.4.6-py3-none-any.whl:

Publisher: release-and-publish.yml on mitre-attack/mitreattack-python

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page