forked from p15670423/monkey
island: Use MONKEY_ISLAND_ABS_PATH to locate STIX attack data
This commit is contained in:
parent
a8570987a6
commit
28a34a4ec9
|
@ -1,10 +1,15 @@
|
||||||
|
import os
|
||||||
from typing import Dict, List
|
from typing import Dict, List
|
||||||
|
|
||||||
from stix2 import AttackPattern, CourseOfAction, FileSystemSource, Filter
|
from stix2 import AttackPattern, CourseOfAction, FileSystemSource, Filter
|
||||||
|
|
||||||
|
from monkey_island.cc.server_utils.consts import MONKEY_ISLAND_ABS_PATH
|
||||||
|
|
||||||
|
|
||||||
class MitreApiInterface:
|
class MitreApiInterface:
|
||||||
ATTACK_DATA_PATH = "monkey_island/cc/services/attack/attack_data/enterprise-attack"
|
ATTACK_DATA_PATH = os.path.join(
|
||||||
|
MONKEY_ISLAND_ABS_PATH, "cc", "services", "attack", "attack_data", "enterprise-attack"
|
||||||
|
)
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def get_all_mitigations() -> Dict[str, CourseOfAction]:
|
def get_all_mitigations() -> Dict[str, CourseOfAction]:
|
||||||
|
|
Loading…
Reference in New Issue