mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-26 16:57:18 +00:00
Update create_mitre-enterprise-attack-malware_galaxy.py
This commit is contained in:
parent
00257d04fa
commit
24c4ecf87c
1 changed files with 7 additions and 7 deletions
|
@ -6,7 +6,7 @@ import re
|
||||||
import os
|
import os
|
||||||
import argparse
|
import argparse
|
||||||
|
|
||||||
parser = argparse.ArgumentParser(description='Create a couple galaxy/cluster with cti\'s malwares\nMust be in the mitre/cti/entreprise-attack/malware folder')
|
parser = argparse.ArgumentParser(description='Create a couple galaxy/cluster with cti\'s malwares\nMust be in the mitre/cti/enterprise-attack/malware folder')
|
||||||
parser.add_argument("-v", "--version", type=int, required=True, help="Version of the galaxy. Please increment the previous one")
|
parser.add_argument("-v", "--version", type=int, required=True, help="Version of the galaxy. Please increment the previous one")
|
||||||
args = parser.parse_args()
|
args = parser.parse_args()
|
||||||
|
|
||||||
|
@ -34,16 +34,16 @@ for element in os.listdir('.'):
|
||||||
values.append(value)
|
values.append(value)
|
||||||
|
|
||||||
galaxy = {}
|
galaxy = {}
|
||||||
galaxy['name'] = "Entreprise Attack - Malware"
|
galaxy['name'] = "Enterprise Attack - Malware"
|
||||||
galaxy['type'] = "mitre-entreprise-attack-malware"
|
galaxy['type'] = "mitre-enterprise-attack-malware"
|
||||||
galaxy['description'] = "Name of ATT&CK software"
|
galaxy['description'] = "Name of ATT&CK software"
|
||||||
galaxy['uuid' ] = "fbb19af0-1707-11e8-9fd6-dbd88a04d33a"
|
galaxy['uuid' ] = "fbb19af0-1707-11e8-9fd6-dbd88a04d33a"
|
||||||
galaxy['version'] = args.version
|
galaxy['version'] = args.version
|
||||||
galaxy['icon'] = "optin-monster"
|
galaxy['icon'] = "optin-monster"
|
||||||
|
|
||||||
cluster = {}
|
cluster = {}
|
||||||
cluster['name'] = "Entreprise Attack - Malware"
|
cluster['name'] = "Enterprise Attack - Malware"
|
||||||
cluster['type'] = "mitre-entreprise-attack-malware"
|
cluster['type'] = "mitre-enterprise-attack-malware"
|
||||||
cluster['description'] = "Name of ATT&CK software"
|
cluster['description'] = "Name of ATT&CK software"
|
||||||
cluster['version'] = args.version
|
cluster['version'] = args.version
|
||||||
cluster['source'] = "https://github.com/mitre/cti"
|
cluster['source'] = "https://github.com/mitre/cti"
|
||||||
|
@ -51,8 +51,8 @@ cluster['uuid' ] = "fbd79f02-1707-11e8-b1c7-87406102276a"
|
||||||
cluster['authors'] = ["MITRE"]
|
cluster['authors'] = ["MITRE"]
|
||||||
cluster['values'] = values
|
cluster['values'] = values
|
||||||
|
|
||||||
with open('generate/galaxies/mitre-entreprise-attack-malware.json', 'w') as galaxy_file:
|
with open('generate/galaxies/mitre-enterprise-attack-malware.json', 'w') as galaxy_file:
|
||||||
json.dump(galaxy, galaxy_file, indent=4)
|
json.dump(galaxy, galaxy_file, indent=4)
|
||||||
|
|
||||||
with open('generate/clusters/mitre-entreprise-attack-malware.json', 'w') as cluster_file:
|
with open('generate/clusters/mitre-enterprise-attack-malware.json', 'w') as cluster_file:
|
||||||
json.dump(cluster, cluster_file, indent=4)
|
json.dump(cluster, cluster_file, indent=4)
|
||||||
|
|
Loading…
Reference in a new issue