Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/center-for-threat-informed-defense/attack-flow
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
https://github.com/center-for-threat-informed-defense/attack-flow
ctid cyber-threat-intelligence cybersecurity mitre-attack threat-informed-defense
Last synced: 4 days ago
JSON representation
Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
- Host: GitHub
- URL: https://github.com/center-for-threat-informed-defense/attack-flow
- Owner: center-for-threat-informed-defense
- License: apache-2.0
- Created: 2021-06-01T14:59:47.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2025-01-08T15:32:44.000Z (14 days ago)
- Last Synced: 2025-01-10T20:04:54.056Z (11 days ago)
- Topics: ctid, cyber-threat-intelligence, cybersecurity, mitre-attack, threat-informed-defense
- Language: TypeScript
- Homepage: https://ctid.io/attack-flow
- Size: 43.6 MB
- Stars: 567
- Watchers: 97
- Forks: 88
- Open Issues: 17
-
Metadata Files:
- Readme: README.md
- Contributing: CONTRIBUTING.md
- License: LICENSE
Awesome Lists containing this project
README
[![MITRE ATT&CK® v16](https://img.shields.io/badge/MITRE%20ATT%26CK®-v16-red)](https://attack.mitre.org/versions/v16/)
[![test](https://github.com/center-for-threat-informed-defense/attack-flow/actions/workflows/test.yml/badge.svg)](https://github.com/center-for-threat-informed-defense/attack-flow/actions/workflows/test.yml)
[![build](https://github.com/center-for-threat-informed-defense/attack-flow/actions/workflows/build.yml/badge.svg)](https://github.com/center-for-threat-informed-defense/attack-flow/actions/workflows/build.yml)
[![codecov](https://codecov.io/gh/center-for-threat-informed-defense/attack-flow/branch/main/graph/badge.svg?token=MSGpc9mM6U)](https://codecov.io/gh/center-for-threat-informed-defense/attack-flow)# Attack Flow
Attack Flow is a language for describing how cyber adversaries combine and sequence various offensive
techniques to achieve their goals. The project helps defenders and leaders understand how adversaries operate
and improve their own defensive posture. This project is created and maintained by the [MITRE Engenuity Center
for Threat-Informed Defense](https://ctid.mitre-engenuity.org/) in futherance of our mission to advance the
start of the art and and the state of the practice in threat-informed defense globally. The project is funded
by our [research participants](https://ctid.mitre-engenuity.org/our-work/attack-flow/#RESEARCH-PARTICIPANTS).**Table Of Contents:**
- [Getting Started](#getting-started)
- [Getting Involved](#getting-involved)
- [Questions and Feedback](#questions-and-feedback)
- [How Do I Contribute?](#how-do-i-contribute)
- [Notice](#notice)## Getting Started
To get started, we suggest skimming the documentation to get familiar with the project. Next, you may want to try creating
your own attack flows using the Attack Flow Builder, which is an easy-to-use GUI tool. When you are ready to dive deep,
review the Example Flows and JSON Schema for the language.| Resource | Description |
| ------------------------------------------------------------------------------------------- | ------------------------------------------------------ |
| [Documentation](https://center-for-threat-informed-defense.github.io/attack-flow/) | Complete documentation for the Attack Flow project. |
| [Attack Flow Builder](https://center-for-threat-informed-defense.github.io/attack-flow/ui/) | An online GUI tool for building Attack Flows. |
| [JSON Schema](/stix/attack-flow-schema-2.0.0.json) | The language specification expressed as a JSON Schema. |
| [Example Flows](/corpus/) | A corpus of example Attack Flows. |## Getting Involved
There are several ways that you can get involved with this project and help
advance threat-informed defense:- **Review the language specification, use the builder to create some flows, and tell us what you think.** We
welcome your review and feedback on the data model and our methodology.
- **Help us prioritize additional example flows to create.** Let us know what examples you would like to
turned into an Attack Flow. Your input will help us prioritize how we expand our corpus.
- **Share your use cases.** We are interested in developing additional tools and resources to help the
community understand and make threat-informed decisions in their risk management programs. If you have ideas
or suggestions, we consider them as we explore additional research projects.## Questions and Feedback
Please submit issues for any technical questions/concerns or contact [email protected] directly for
more general inquiries.Also see the guidance for contributors if are you interested in contributing or simply reporting issues.
## How Do I Contribute?
We welcome your feedback and contributions to help advance Attack Flow. Please see the guidance for
contributors if are you interested in [contributing or simply reporting issues.](/CONTRIBUTING.md)Please submit [issues](https://github.com/center-for-threat-informed-defense/attack-flow/issues) for any
technical questions/concerns or contact [email protected] directly for more general inquiries.## Notice
Copyright 2021 MITRE Engenuity. Approved for public release. Document number CT0040
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance
with the License. You may obtain a copy of the License athttp://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software distributed under the License is
distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See
the License for the specific language governing permissions and limitations under the License.This project makes use of MITRE ATT&CK®
[ATT&CK Terms of Use](https://attack.mitre.org/resources/terms-of-use/)