Skip to content

Conversation

@ellipse2v
Copy link
Owner

…ced directly from official MITRE data.

  • Automated Enrichment Pipeline: The framework follows a systematic, multi-step process to map threats:
    1. STRIDE to CAPEC: For a given threat, its STRIDE category (e.g., "Tampering") is used to look up a list of associated CAPEC patterns from the stride_to_capec.json data.
    2. CAPEC to ATT&CK: Each of a threat's associated CAPEC IDs is then used as a key in the capec_to_mitre_map (built from the CAPEC_VIEW_ATT&CK_Related_Patterns.csv file) to find a list of corresponding MITRE ATT&CK technique IDs.
    3. Description-Based Refinement (Secondary Mapping): In addition to the primary STRIDE-based mapping, the system also uses a set of regex patterns to find keywords directly within the threat's description (e.g., mapping the term "sql injection" directly to T1190). This acts as a secondary mechanism to catch highly specific threats or variations not covered by the broader STRIDE-to-CAPEC mapping.
    4. Aggregation and Uniqueness: The techniques identified from both the primary (STRIDE-based) and secondary (description-based) mappings are combined, and duplicates are removed to produce a final, unique list of enriched MITRE ATT&CK techniques for the threat.
    5. D3FEND Countermeasures: Finally, the identified ATT&CK techniques are cross-referenced with the D3FEND data to attach relevant countermeasures and mitigations.

…ced directly from official MITRE data.

-   **Automated Enrichment Pipeline**: The framework follows a systematic, multi-step process to map threats:
    1.  **STRIDE to CAPEC**: For a given threat, its STRIDE category (e.g., "Tampering") is used to look up a list of associated CAPEC patterns from the `stride_to_capec.json` data.
    2.  **CAPEC to ATT&CK**: Each of a threat's associated CAPEC IDs is then used as a key in the `capec_to_mitre_map` (built from the `CAPEC_VIEW_ATT&CK_Related_Patterns.csv` file) to find a list of corresponding MITRE ATT&CK technique IDs.
    3.  **Description-Based Refinement (Secondary Mapping)**: In addition to the primary STRIDE-based mapping, the system also uses a set of regex patterns to find keywords directly within the threat's description (e.g., mapping the term "sql injection" directly to T1190). This acts as a secondary mechanism to catch highly specific threats or variations not covered by the broader STRIDE-to-CAPEC mapping.
    4.  **Aggregation and Uniqueness**: The techniques identified from both the primary (STRIDE-based) and secondary (description-based) mappings are combined, and duplicates are removed to produce a final, unique list of enriched MITRE ATT&CK techniques for the threat.
    5.  **D3FEND Countermeasures**: Finally, the identified ATT&CK techniques are cross-referenced with the D3FEND data to attach relevant countermeasures and mitigations.
update failing test
@ellipse2v ellipse2v merged commit 981aea5 into main Sep 1, 2025
1 check passed
@ellipse2v ellipse2v deleted the mapping_capec_mitre branch September 1, 2025 19:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants