Files
cti/CHANGELOG.md
T

3.0 KiB

Changes to STIX for October 2020 ATT&CK Content Release (ATT&CK-v8.0)

  1. Added new platforms under the enterprise domain: Network and PRE.
  2. Deprecated the pre-ATT&CK domain. Pre-ATT&CK has been migrated to two new tactics in the Enterprise domain tagged with the PRE platform. Please see the new PRE matrix for the replacing Enterprise tactics and techniques. All objects within the pre-ATT&CK domain have been marked as deprecated, along with a new description pointing to their new home in Enterprise.
  3. Added the ATT&CK for ICS domain.

Changes to STIX for July 2020 ATT&CK Content Release (ATT&CK-v7.0)

  1. Added sub-techniques:

    • A sub-technique is an attack-pattern where x_mitre_is_subtechnique is true.
    • Relationships of type subtechnique-of between sub-techniques and techniques convey their hierarchy.

    For more information about the representation of sub-techniques in STIX, please see the sub-techniques section of the USAGE document.

  2. Revised the representation of deprecated objects. The first paragraph of deprecated objects' descriptions should in most cases convey the reason the object was deprecated.

We've also rewritten the USAGE document with additional information about the ATT&CK data model and more examples of how to access and use ATT&CK in Python.

Changes to STIX for October 2019 ATT&CK Content Release (ATT&CK-v6.0)

  1. Added cloud platforms under the enterprise domain: AWS, GCP, Azure, Office 365, Azure AD, and SaaS.

Changes to STIX for July 2019 ATT&CK Content Release (ATT&CK-v5.0)

  1. Descriptions added to relationships of type mitigates under the enterprise domain

Changes to STIX for April 2019 ATT&CK Content Release (ATT&CK-v4.0)

  1. x_mitre_impact_type added for enterprise techniques within the Impact tactic
  2. Descriptions added to relationships between software/groups

Changes to STIX for October 2018 ATT&CK Content Release (ATT&CK-v3.0)

  1. x_mitre_platforms added for enterprise malware/tools
  2. x_mitre_detection added to attack-patterns
  3. Custom MITRE attributes removed from descriptions in attack-patterns
  4. Alias descriptions added for malware/tools/intrusion-sets as external references
  5. Descriptions added to relationships between groups/attack-patterns in PRE-ATT&CK
  6. Names of ATT&CK objects replaced in descriptions and x_mitre_detection fields with markdown links
  7. CAPEC ids added to external references for attack-patterns
  8. Citations in alias descriptions added as external references in the object containing the alias description
  9. Added x-mitre-tactic and x-mitre-matrix objects
  10. Changed ===Windows=== subheadings to ### Windows subheadings (Windows is just one example)
  11. Added space between asterisks (ex. *Content to * Content) to populate markdown correctly
  12. Changed "true" to True in x_mitre_deprecated
  13. Added old ATT&CK IDs to Mobile/PRE-ATT&CK objects whose IDs have changed as x-mitre-old-attack-id