I just published the source code for my very naive implementation for generating a node network based on MITRE Intrusion Sets and Techniques. It will output linked files linking intrusion sets to their used techniques.

Perhaps someone finds it useful or interesting to experiment with.

Source code: github.com/cstromblad/markdown

I hinted at this in a thread started by @Viss where he asked for input on a few very likely malicious domains. Me @Viss @cR0wcR0w :cascadia: @neurovagrantIan Campbell and others did some OSINT fun work with a couple of the original domains.

It was this thread: mastodon.social/@Viss/11414512

Now I posted a picture of a node network rendered in Obsidian and I hinted that perhaps Obsidian could be used as a poor mans version of performing threat intelligence work.

Node network from Obsidian showing a network of MITRE Intrusion Sets and Techniques from MITRE ATT&CK.
0
0
0

If you have a fediverse account, you can quote this note from your own instance. Search https://swecyb.com/users/nopatience/statuses/114171578638413663 on your instance and quote it. (Note that quoting is not supported in Mastodon.)