Skip to content

Commit

Permalink
fix for new platforms
Browse files Browse the repository at this point in the history
  • Loading branch information
adpare committed Oct 22, 2024
1 parent f1ed64b commit 50e3201
Show file tree
Hide file tree
Showing 3 changed files with 16 additions and 17 deletions.
2 changes: 1 addition & 1 deletion data/faq.json
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@
},
{
"question": "What technologies does ATT&CK apply to?",
"answer": "Enterprise IT systems covering Windows, macOS, Linux, Network infrastructure devices (Network), and Container technologies (Containers); cloud systems covering Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS), Office 365, Azure Active Directory (Azure AD), and Google Workspace; mobile devices covering Android and iOS."
"answer": "Enterprise IT systems covering Windows, macOS, Linux, Network infrastructure devices (Network), and Container technologies (Containers); cloud systems covering Infrastructure-as-a-Service (IaaS), Software-as-a-Service (SaaS), Office Suite, and Identity Provider; mobile devices covering Android and iOS."
},
{
"question": "How can I use ATT&CK?",
Expand Down
24 changes: 12 additions & 12 deletions modules/matrices/matrices_config.py
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@
"type": "local",
"matrix": "enterprise-attack",
"path": "enterprise/pre",
"platforms": [],
"platforms": ["PRE"],
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> PRE platform. The techniques below take place outside of the victim environment, often as a preparatory measure to support targeting.",
"subtypes": [],
},
Expand All @@ -72,7 +72,7 @@
"type": "local",
"matrix": "enterprise-attack",
"path": "enterprise/windows",
"platforms": [],
"platforms": ["Windows"],
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> Windows platform. The techniques below are known to target hosts running Microsoft Windows operating systems.",
"subtypes": [],
},
Expand All @@ -81,15 +81,15 @@
"type": "local",
"matrix": "enterprise-attack",
"path": "enterprise/macos",
"platforms": [],
"platforms": ["macOS"],
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> macOS platform. The techniques below are known to target hosts running macOS operating systems.",
"subtypes": [],
},
{
"name": "Linux",
"type": "local",
"matrix": "enterprise-attack",
"platforms": [],
"platforms": ["Linux"],
"path": "enterprise/linux",
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> Linux platform. The techniques below are known to target hosts running Linux operating systems.",
"subtypes": [],
Expand All @@ -107,7 +107,7 @@
"type": "local",
"matrix": "enterprise-attack",
"path": "enterprise/cloud/officesuite",
"platforms": [],
"platforms": ["Office Suite"],
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> Office Suite platform. The techniques below are known to target cloud-based office application suites such as Microsoft 365 and Google Workspace. Office application suites are SaaS platforms that typically combine email, chat, document management, and automation functionality for use in a collaborative environment.",
"subtypes": [],
},
Expand All @@ -116,7 +116,7 @@
"type": "local",
"matrix": "enterprise-attack",
"path": "enterprise/cloud/identityprovider",
"platforms": [],
"platforms": ["Identity Provider"],
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> Identity Provider platform. The techniques below are known to target cloud-based identity-as-a-service (IDaaS) platforms such as Microsoft Entra ID and Okta. Identity providers are SaaS platforms that support identity management and single sign-on across multiple applications.",
"subtypes": [],
},
Expand All @@ -125,7 +125,7 @@
"type": "local",
"matrix": "enterprise-attack",
"path": "enterprise/cloud/saas",
"platforms": [],
"platforms": ["SaaS"],
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> SaaS platform. The techniques below are known to target cloud-based software-as-a-service (SaaS) platforms. SaaS encompasses cloud-hosted applications with a variety of functionality.",
"subtypes": [],
},
Expand All @@ -134,7 +134,7 @@
"type": "local",
"matrix": "enterprise-attack",
"path": "enterprise/cloud/iaas",
"platforms": [],
"platforms": ["IaaS"],
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> IaaS platform. The techniques below are known to target cloud-based infrastructure-as-a-service (IaaS) platforms. IaaS encompasses cloud-hosted infrastructure, such as virtual machines, object storage, databases, and serverless functionality.",
"subtypes": [],
},
Expand All @@ -145,7 +145,7 @@
"type": "local",
"matrix": "enterprise-attack",
"path": "enterprise/network",
"platforms": [],
"platforms": ["Network"],
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> Network platform. The techniques below are known to target network devices such as routers, switches, and load balancers.",
"subtypes": [],
},
Expand All @@ -154,7 +154,7 @@
"type": "local",
"matrix": "enterprise-attack",
"path": "enterprise/containers",
"platforms": [],
"platforms": ["Containers"],
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> Containers platform. The techniques below are known to target containers and container orchestration systems such as Kubernetes.",
"subtypes": [],
},
Expand All @@ -173,7 +173,7 @@
"type": "local",
"matrix": "mobile-attack",
"path": "mobile/android",
"platforms": [],
"platforms": ["Android"],
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> Android platform. The techniques below are known to target mobile devices running Android operating systems.",
"subtypes": [],
},
Expand All @@ -182,7 +182,7 @@
"type": "local",
"matrix": "mobile-attack",
"path": "mobile/ios",
"platforms": [],
"platforms": ["iOS"],
"descr": "Below are the tactics and techniques representing the MITRE ATT&CK<sup>&reg;</sup> iOS platform. The techniques below are known to target mobile devices running iOS operating systems.",
"subtypes": [],
},
Expand Down
7 changes: 3 additions & 4 deletions modules/website_build/website_build_config.py
Original file line number Diff line number Diff line change
Expand Up @@ -42,13 +42,12 @@
"descr": "", # if specified, adds a subtitle to the index page matrix
"matrix": "enterprise-attack",
"platforms": [
"PRE",
"Windows",
"macOS",
"Linux",
"Azure AD",
"Office 365",
"Google Workspace",
"PRE",
"Office Suite",
"Identity Providers",
"SaaS",
"IaaS",
"Network",
Expand Down

0 comments on commit 50e3201

Please sign in to comment.