#!/usr/bin/env python # -*- coding: utf-8 -*- import json import re import os ''' Create a couple galaxy/cluster with cti's malwares Must be in the mitre/cti/ATTACK/malware folder ''' values = [] for element in os.listdir('.'): if element.endswith('.json'): with open(element) as json_data: d = json.load(json_data) json_data.close() temp = d['objects'][0] value = {} value['description'] = temp['description'] value['uuid'] = re.search('--(.*)$', temp['id']).group(0)[2:] value['value'] = temp['name'] value['meta'] = {} value['meta']['refs'] = [] for reference in temp['external_references']: if 'url' in reference: value['meta']['refs'].append(reference['url']) if'x_mitre_aliases' in temp: value['meta']['synonyms'] = temp['x_mitre_aliases'] values.append(value) galaxy = {} galaxy['name'] = "Malware" galaxy['type'] = "malware" galaxy['description'] = "Name of ATT&CK software" galaxy['uuid' ] = "d752161c-78f6-11e7-a0ea-bfa79b407ce4" galaxy['version'] = "1" cluster = {} cluster['name'] = "Malware" cluster['type'] = "malware" cluster['description'] = "Name of ATT&CK software" cluster['version'] = "1" cluster['source'] = "https://github.com/mitre/cti" cluster['uuid' ] = "d752161c-78f6-11e7-a0ea-bfa79b407ce4" cluster['authors'] = ["MITRE"] cluster['values'] = values with open('generate/galaxies/mitre_malware.json', 'w') as galaxy_file: json.dump(galaxy, galaxy_file, indent=4) with open('generate/clusters/mitre_malware.json', 'w') as cluster_file: json.dump(cluster, cluster_file, indent=4)