• Stars
    star
    188
  • Rank 205,563 (Top 5 %)
  • Language
  • License
    Creative Commons ...
  • Created about 7 years ago
  • Updated about 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Data from a BRAWL Automated Adversary Emulation Exercise

BRAWL

One of the challenging problems for cyber security researchers developing detection and response capabilities is finding a realistic environment in which to test their hypothesis and capabilities.

The cheapest method is to test capabilities on a small lab network. But this environment is lacking the scale of real enterprise network and the noise of real environments that makes detection much harder. In many ways, the best environment would be testing on multiple enterprise scale networks with a controlled but realistic attacker and real noise from users, system administrators, and third party software/devices. The challenge with testing in this environment is that it is expensive and in some scenarios high risk.

BRAWL seeks to create a compromise by creating a system to automatically create an enterprise network inside a cloud environment. OpenStack is the only currently supported environment, but it is being designed in such a way as to easily support other cloud environments in the future. BRAWL also builds an analysis network containing a data ingest and processing pipeline using LogStash and Kafka. As part of the analysis network, it creates an event storage and search system using Elasticsearch and Kibana. BRAWL spins up a enterprise network "Game Board" with Windows images. These images have Microsoft Sysmon and other sensors already installed and configured to forward logs into the data ingest framework.

BRAWL also has a concept of bots, which can be either Red, Blue, or Gray. Red bots are offensive, Blue bots are defensive, and Gray bots emulate legitimate user behavior in order to provide noise to make detection more difficult. When a user wants to test research hypotheses, they implement a BRAWL bot. The BRAWL bot registers itself with the BRAWL Controller, which then orchestrates games between BRAWL bots on the Game Board.

Data Release

Note: Due to issues with file sizes and GitHub quotas, we are placing all the files into a zip file instead of leaving them as plain text in the git repo. All the data is in the file

This release consists of some data from a BRAWL prototype. We created a small enterprise network, described below. We then ran a single game using the MITRE CALDERA research project as a red bot.

CALDERA is a related MITRE research project that automates adversary emulation activity based on the information in Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) model. It implements a set of ATT&CK tactics and techniques and uses a planning system (https://dl.acm.org/citation.cfm?id=2991111) to automate the actuation of those techniques and generate post-compromise adversary behavior within an enterprise network.

This data is released under the Creative Commons BY License

Network & Sensor Description

Our small enterprise network is a flat network that consists of a Domain Controller (dc.brawlco.com) and 16 workstations. Each PC has the name of the primary user in the pc name (e.g. user beane typically logs into beane-pc). That user has Local Administrator privileges on the computer.

All the PCs are running Windows 8.1. The Domain controller is running Windows Server 2012 R2.

On the Windows 8 PCs, we made changes to enable WDigest to keep plaintext passwords in LSASS's memory using the following registry command: reg ADD HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest\ /v UseLogonCredential /t REG_DWORD /d 1 /F

Scenario Description

For this exercise, CALDERA was the only BRAWL bot participating. While conceptually BRAWL can be used to test a variety of attacker behaviors and detection, many of MITRE's research efforts follow an "assume breach" philosophy. Therefore we give CALDERA a starting point as a Local Administrator on a box on the network at the beginning of the exercise.

Also, without a Grey bot performing logon across different hosts, the BRAWL Game Board is sterile from the perspective of credentials that can be stolen and used by Red bots. To enable lateral movement, the BRAWL Controller uses psexec to create logon events on hosts with the credentials of other users from the network.

CALDERA Performed the following ATT&CK Techniques during the exercise:

Data

There are five types of data in this repository. Each is contained in its own file in the data/ folder.

Data Type Description
game_metadata Data describing the BRAWL scenario
sysmon Data gathered from Sysmon running on each of the workstations
win_event Windows Event Logs
computer_properties Data gathered from custom scripts that provides some information about the computers in the network
bsf Red bot actions in BRAWL Shared Format (BSF)

BRAWL Shared Format

Red bots and blue bots are encouraged to log information about their activities or detections in BRAWL Shared Format (BSF). The goal of this is to make it easier to compare blue bot detection/actions with red bot actions.

The format is currently in development and could change in future data sets.

The fields for BSF are described below in the Data Sources Detail section.

Notes About Time

Different event sources in BRAWL handle time differently. The time is either the time that an event hit our logging ingest framework, the time the event was generated on the host/endpoint, or the time recorded by a bot on the network. In general those times should be within a few milliseconds of each other. When possible the logging ingest framework uses the event time stored in the event instead of the time of the event hitting the ingest nodes. The table below details the method used for each data type.

Data Source Time Notes
computer_properties from the time field
game_metadata time it hits the ingest framework
sysmon from the utc_time field
win_event pulled from the windows event time
bsf The @timestamp field is time it hits the ingest framework. However the time related BSF fields (e.g. happened_after,happened_before, etc) are the times the events started or ended based on the time on CALDERA's command and control server.

Data Sources Detail

game_metadata

Field Name Description
@timestamp Time related to the event. See note about time above.
@uuid Unique Event ID
game_id The unique game_id for this exercise.
type Event Type. Always game_metadata for these records
hosts A list of hosts that were a part of the exercise and "in bounds" for the red bot
randomization_seed A seed that can be used by BRAWL Bot Participants to implement "random" behavior that is that same across executions of BRAWL
starting_host host that the red bot starts on.

sysmon

Field Name Description
@timestamp Time related to the event. See note about time above.
@uuid Unique Event ID
type Event Type. Always sysmon for these records
game_id The unique game_id for this exercise.
data_model.object The CAR object being acted on.
data_model.action The CAR action being performed on the object. This field is an array because some events can correspond to more than one action in the CAR data model. An example of this is remote thread creation events.
data_model.fields.* The fields relevant for the given object/action pair.
game_id The unique game_id for this exercise.
host Hostname that the event was logged from.

We are using Sysmon v3.11. sysmon_config.txt contains the output of the sysmon -c command detailing our configuration.

Sysmon generates many different kinds of events, that map to different CAR object/action pairs. The fields for each type are explained in more detail on the CAR website: https://car.mitre.org/wiki/Data_Model

The object/action pairs that are generated by Sysmon in our configuration are:

  • driver/load
  • file/attr_modify
  • flow/start
  • module/load
  • process/create
  • process/terminate
  • thread/create
  • threat/remote_create

Use the CAR data model to determine the field names and semantics for fields contained in data_model.fields.* for each object/action pair above.

win_event

Field Name Description
@timestamp Time related to the event. See each event below for details on how this is calculated
@uuid Unique Event ID
type Event Type. Always win_event for these records
game_id The unique game_id for this exercise.
host Host that logged the event
raw The windows event log entry in it's raw XML format
data_model.fields.log_name Windows Log name (Application, System, or Security)
data_model.fields.log_type The log type for a given log_name

computer_properties

Field Name Description
@timestamp Time related to the event. See note about time above.
@uuid Unique Event ID
type Event Type. Always computer_properties for these records
game_id The unique game_id for this exercise.
host Name of computer that the script ran on
netinfo Collection of netinfo objects
netinfo.DNSServers collection of DNS resolvers configured for this host
netinfo.Gateway Gateway for this interface
netinfo.IPAddress IPAddresses for this interface
netinfo.IsDHCPEnabled Is DHCP Enabled?
netinfo.MACAddress MAC Address for this interface
netinfo.SubnetMask Subnet Mask for respective IP addresses
pcinfo Object describing information about the PC
pcinfo.AssetTag AssetTag if accessible
pcinfo.CPU Information about CPU(s)
pcinfo.ChassisType Not used in BRAWL. "Unknown"
pcinfo.Disks Information about attached disk(s)
pcinfo.DomainName domain system is a part of
pcinfo.LastBootUpTime Time system booted
pcinfo.Memory Information about memory on the systems
pcinfo.OS Information about the running OS
pcinfo.SerialNumber HW Serial Number
time Time that the script ran
userinfo Array containing userinfo objects describing users who have logged onto the system since last boot
userinfo.AuthenticationPackage Authentication Package used for authentication
userinfo.Domain Domain (or local pc) account belongs to
userinfo.LogonId LogonId
userinfo.LogonTime Time of logon
userinfo.LogonType Windows Logon Type Constants
userinfo.LogonTypeName Description of LogonType
userinfo.UserName UserName of principal logging on

This data was collected periodically using the unified_json.ps1 module from MITRE's PowerShell Utilities for Security Situational Awareness. The userinfo field can be useful in determining which credentials may have been compromised if a credential dumper such as Mimikatz was run on the system.

bsf

Field Name Description
@timestamp Time related to the event. See note about time above.
@uuid Unique Event ID
type Event Type. Always bsf_events for these records
game_id The unique game_id for this exercise.
bsf Array of BSF events describing bot activity. Fields for this array are described in more detail below.
bsf_version Version of the BSF schema used for bsf array of events
producer_id Bot that produced this BSF data.

The objects inside of the bsf array field are of type operation, step, or event. All objects have a nodetype field that can be used to determine the object type

event BSF Object

Field Description
id A unique identifier for each event.
nodetype This node's type. One of: {"operation", "step", "event"}.
host Hostname or IP at which this event was enacted / detected.
time Note: At least one of the following three time fields (i.e., "time", "happened_after", or "happened_before") must be reported. "time" is especially desired; all three are encouraged. Please see note 1 in General Notes below.

Note on time format: All time information must be in ISO 8601 format. More specifically as: 'yyyy-mm-ddThh:nn:ss.llll00'. Where y is year, m is month, d is day, h is hour, n is minute, s is second, l is millisecond (and there are two trailing zeros). For example: 2017-02-22T18:38:14.060000

Optional: Estimate of the time this event occurred.
happened_after Optional: An early bound ("temporal left bracket") on uncertainty in "time".
happened_before Optional: A late bound ("temporal right bracket") on uncertainty in "time".
confidence Optional: Enables blue bots to communicate confidence (a real number between 0.0 and 1.0) in this event's association with an attack.
object Object acted upon; see table below for permissible values. Loosely based on the CAR Data Model
action Actions for a given object. Loosely based on the CAR Data Model
specific_field_1 .. N 1-N descriptive attributes (see below). Loosely based on the CAR Data Model

Object/Action/Fields Information for Event Objects

Object Action Required Field(s) Optional Fields(s)
process create
terminate
scanned
At least one of:
Β Β Β Β  {pid, command_line, exe, image_path}
fqdn
hostname
md5_hash
parent_exe
parent_image_path
ppid
sha1_hash
sha256_hash
sid
signer
user
flow start
end
message
At least one of:
Β Β Β Β {src_hostname,src_ip}
At least one of:
Β Β Β Β {dest_hostname, dest_ip}
At least one of:
Β Β Β Β  {src_port, dest_port, protocol}
content
dest_fqdn
exe
flags
fqdn
hostname
image_path
packet_count
pid
ppid
proto_info
src_fqdn
user
file create
delete
modify
read
timestomp
write
file_path company
file_name
fqdn
hostname
image_path
md5_hash
pid
ppid
sha1_hash
sha256_hash
signer
user

You can read more about the semantics of the Required and Optional Fields by finding the associated object in the CAR Data Model

step BSF Object

Step objects connect one or more events together into a higher level grouping of activity. Step objects also present a place for BSF emitters to label activity with ATT&CK labels.

Field name Description
id A unique identifier for operation steps.
nodetype This node's type. One of: {"operation", "step", "event"}.
attack_info An array of technique objects (defined in the table directly below), describing how this step relates to the ATT&CK taxonomy. Why an array? Although a single technique often describes a step and all its events, in some cases, multiple techniques can be implemented.
attack_info.technique_id An ATT&CK technique ID (e.g., "T1059") describing the attack mechanism red employed in this step and its referenced events.
attack_info.technique_name A human readable string describing this technique (e.g., "Command-Line Interface").
attack_info.tactic An array of one or more ATT&CK tactic labels describing the intent/strategy of this technique. (Note that a single technique can exercise multiple tactics.) For example: ["Lateral Movement", "Execution"]
description Optional: Notes or annotations for this step go here.
events An array of ids of the event objects comprising this step.

operation BSF Object

Operation objects connect multiple step objects together. However there are no Operation objects present in this data set.

General BSF Notes

Descriptions and Notes for Event Fields (especially "At least one of"s):

  1. Time fields.
  2. Punctiliar Time. Activities such as a file deletion are essentially punctiliar, having a single time of occurrence which can be provided via the time field. However, it is possible that neither red nor blue will know this exact timestamp. For example, red bots may spawn a process to accomplish some action within a time window, but the exact time the action occurs is unknown. Blue bots can use sensors which may involve detection delays. Thus, BSF also provides two time fields happened_after and happened_before as temporal left and right brackets respectively, defining bounds on an uncertainty interval for the actual event. At least one of these three fields (i.e., time, happened_after, happened_before) must be reported with each event object. The other fields are optional, but should be reported as they are known. In particular, bots are encouraged to report a value for "time" which is their best guess, even if they do not have an exact time.
  3. Durative Time. Activities such as a flow are durative in nature, spanning a time period. BSF generally addresses durative activities by recording the end points of their interval as punctiliar times. Thus a flow start event requires one of {time, happened_after, happened_before}, as does the flow end event. However, some blue sensors may detect a durative activity in mid-course (e.g., a scanner which periodically scans the state of all processes, and determines one has become malicious). For flows, mid-course flow detections can be reported as "flow, message, time, ... (other fields)". For processes, mid-course flow detections can be reported as "process, scanned, time, ... (other fields)".
  4. Process identification. Ideally, a pid is used to identify a process, however the pid is not always known, especially by the red bot. Alternatively, the command_line spawning the process, or the exe / image_path which was executed can be provided.
  5. Flow ports. The source and destination ports in flows can be described by either a hostname or an IP address.
  6. In this data set, the only bot participating is CALDERA, therefore the only BSF records present are from CALDERA.

Appendix

Hosts on our BRAWL network for this game:

  • beane-pc.brawlco.com
  • colgan-pc.brawlco.com
  • dc.brawlco.com
  • escue-pc.brawlco.com
  • fulco-pc.brawlco.com
  • harley-pc.brawlco.com
  • kressierer-pc.brawlco.com
  • mims-pc.brawlco.com
  • minahan-pc.brawlco.com
  • ostermeyer-pc.brawlco.com
  • peele-pc.brawlco.com
  • platten-pc.brawlco.com
  • santilli-pc.brawlco.com
  • sespinosa-pc.brawlco.com
  • sounder-pc.brawlco.com
  • teston-pc.brawlco.com
  • zissler-pc.brawlco.com

More Repositories

1

caldera

Automated Adversary Emulation Platform
Python
4,455
star
2

cti

Cyber Threat Intelligence Repository expressed in STIX 2.0
1,716
star
3

HTTP-Proxy-Servlet

Smiley's HTTP Proxy implemented as a Java servlet
Java
1,456
star
4

advmlthreatmatrix

Adversarial Threat Landscape for AI Systems
1,038
star
5

multiscanner

Modular file scanning/analysis framework
Python
598
star
6

cascade-server

CASCADE Server
Python
238
star
7

heimdall2

Heimdall Enterprise Server 2 lets you view, store, and compare automated security control scan results.
TypeScript
201
star
8

caldera-ot

MITRE Calderaβ„’ for OT Plugins & Capabilities
185
star
9

saf

The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools developed by MITRE and the security community to streamline security automation for systems and DevOps pipelines
TypeScript
118
star
10

inspec_tools

A command-line and ruby API of utilities, converters and tools for creating, converting and processing security baseline formats, results and data
Ruby
91
star
11

quaerite

Search relevance evaluation toolkit
Java
73
star
12

aws-foundations-cis-baseline

InSpec profile to validate your VPC to the standards of the CIS Amazon Web Services Foundations Benchmark v1.1.0
Ruby
72
star
13

menelaus

Online and batch-based concept and data drift detection algorithms to monitor and maintain ML performance.
Python
64
star
14

stockpile

A CALDERA plugin
PowerShell
63
star
15

hipcheck

Automatically assess and score software repositories for supply chain risk.
Rust
62
star
16

engage

MITRE Engageβ„’ is a framework for conducting Denial, Deception, and Adversary Engagements.
59
star
17

vulcan

A web application to streamline the development of STIGs from SRGs
Ruby
54
star
18

sandcat

A CALDERA plugin
Go
53
star
19

caret

CARET - A tool for viewing cyber analytic relationships
JavaScript
52
star
20

pydecipher

pydecipher: unfreeze and deobfuscate your frozen python code
Python
46
star
21

device-admin-sample

Java
44
star
22

heimdall-legacy

A Security Results Viewer for the web with storage, teams and history
Ruby
35
star
23

heimdall_tools

DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications
Ruby
33
star
24

fhir-server

A fast, open source, HL7 FHIR server
Go
33
star
25

cpsa

Cryptographic Protocol Shapes Analyzer
Scilab
33
star
26

tmnt

Algorithms for training state-of-the-art neural topic models
Python
31
star
27

stix2patterns_translator

Translate STIX 2 Patterning Queries
Python
30
star
28

vulnerable-mobile-apps

30
star
29

fusera

A FUSE interface to the NCBI Sequence Read Archive (SRA)
Go
29
star
30

sparklyr.nested

A sparklyr extension for nested data
R
29
star
31

d3fend

Public static website for the D3FEND project. For the D3FEND ontology repo see: https://github.com/d3fend/d3fend-ontology
HTML
27
star
32

atomic

A CALDERA plugin
Python
25
star
33

mitre.github.io

Open Source software from The MITRE Corporation
CSS
25
star
34

emasser

emasser is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise Mission Assurance Support Service (eMASS) by leveraging its representational state transfer (REST) application programming interface (API).
Ruby
24
star
35

cis-aws-foundations-hardening

(WIP) A terraform / kitchen-terraform hardening baseline for the cis-aws-foundations-baseline
HCL
24
star
36

response

A CALDERA plugin for autonomous incident response
Python
23
star
37

ansible-cis-docker-ce-hardening

(WIP) An ansible playbook to harden a docker host to the CIS CE Benchmark requirements
Python
23
star
38

heimdall-lite

Heimdall Lite 2.0 is a JavaScript based security results viewer and review tool supporting multiple security results formats, such as: InSpec, SonarQube, OWASP-Zap and Fortify which you can load locally, from S3 and other data sources.
TypeScript
21
star
39

rhapsode

Advanced desktop search/corpus exploration prototype
Java
21
star
40

nginx-stigready-baseline

STIG Ready Content: InSpec Profile for NGINX Open Source based off the Web SRG V2R3
Ruby
21
star
41

human

Caldera plugin to deploy "humans" to emulate user behavior on systems
Python
20
star
42

emb3d

HTML
20
star
43

caldera-agent

Python
19
star
44

OpenHealthDashboard

A dashboard framework for visualizing complex data sets on T1V multi-panel displays
JavaScript
19
star
45

biqt-face

A face quality plugin for the BIQT framework.
C++
19
star
46

training

A CALDERA plugin
Python
18
star
47

emu

This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense
Python
18
star
48

thumbtack

A web front-end providing a REST-ful API to mount and unmount forensic disk images
Python
18
star
49

CICAT

Python
17
star
50

SystemInspector

SystemInspector is a script to pull a majority of the security-relevant files and settings from a system.
Shell
17
star
51

adversary

A CALDERA plugin
Python
17
star
52

inspec_training_courses

(WIP) A set of training material and guides for using inspec
Ruby
16
star
53

Fast-RRT-Star

ROS Global Path Planner Plugin based on the F-RRT* algorithm from this paper: https://doi.org/10.1016/j.eswa.2021.115457
C++
16
star
54

ilpyt

ilpyt: imitation learning library with modular, baseline implementations in Pytorch
Python
15
star
55

callisto

Java
15
star
56

microsoft-azure-cis-foundations-baseline

(WIP) CIS Microsoft Azure Foundations Benchmark
Ruby
15
star
57

ptmatch

A patient matching test harness to support PCOR
JavaScript
15
star
58

access

A CALDERA plugin
HTML
15
star
59

microsoft-windows-server-2019-stig-baseline

Microsoft Windows Server 2019 STIG InSpec Profile
Ruby
14
star
60

microsoft-windows-10-stig-baseline

InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Release 19
Ruby
14
star
61

multiscanner-ansible

Ansible configurations for distributed MultiScanner installations
Shell
13
star
62

policynet

Exploration of the U.S. rulesets as a network
Python
13
star
63

aws-rds-infrastructure-cis-baseline

InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier Web Architecture Benchmark V1.0.0
Ruby
13
star
64

aws-s3-baseline

A micro InSpec baseline to check for insecure or public s3 buckets in your VPC
Ruby
13
star
65

biqt-iris

An iris quality plugin for the BIQT framework.
C++
13
star
66

FiGHT

Publicly accessible version of the FiGHT website.
HTML
12
star
67

yararules-python

Easily scan with multiple yara rules from different sources.
Python
12
star
68

keyterms

KeyTerms centralized terminology management tool
JavaScript
12
star
69

pickled-canary

Assembly-based binary pattern search!
Rust
12
star
70

ps_pc_props

PowerShell Utilities for Security Situational Awareness
PowerShell
12
star
71

microsoft-windows-server-2016-stig-baseline

An InSpec Profile for evaluating a Windows 2016 server to the DISA STIGs
Ruby
12
star
72

canonical-ubuntu-16.04-lts-stig-baseline

InSpec profile to validate the secure configuration of Canonical Ubuntu 16.04 LTS against DISA's Canonical Ubuntu 16.04 LTS Security Technical Implementation Guide (STIG) Version 1 Release 1.
Ruby
12
star
73

emass_client

The eMASS client repository maintains the Enterprise Mission Assurance Support Service (eMASS) Representational State Transfer (REST) Application Programming Interface (API) specification and executables.
Ruby
12
star
74

heimdall-mongo

A Mongo-based version of Heimdall (Deprecated)
Ruby
11
star
75

skeleton

A CALDERA Plugin Template
Python
11
star
76

fhir-exercises

HTML
11
star
77

hse-mwi

The Mental Wellness Index is a framework and dashboard tool that provides a picture of community-level mental wellness for each zip code in the nation
HTML
11
star
78

ckl2POAM

Standalone tool for converting DISA Checklists to eMASS POA&M Excel spreadsheets.
TypeScript
11
star
79

ecqm

Server side components to support electronic clinical quality measure calculation
Go
11
star
80

demodocus

Project dedicated to extending the capabilities of automated accessibility testing tools to include testing interactive web content.
Python
10
star
81

ecqm-frontend

Web application to provide an interface for clinical quality measure calculation
JavaScript
10
star
82

mock

A CALDERA plugin
Python
10
star
83

compass

HTML
10
star
84

saf-training-lab-environment

The SAF Training Lab is a GitHub Codespaces environment that makes it quick and easy for you to use, learn and participate in the MITRE Security Automation Framework Training Classes.
Shell
10
star
85

icap

Internet Content Adaptation Protocol (ICAP) Analyzer for Bro and Zeek.
JavaScript
10
star
86

FMACM

An aircraft and control model for Flight Deck Interval Management MOPS testing by RTCA SC-186 members.
C++
10
star
87

canonical-ubuntu-18.04-lts-stig-baseline

(WIP) canonical-ubuntu-18.04-lts-stig-baseline
Ruby
9
star
88

cpsaexp

Experimental CPSA -- the Cryptographic Protocol Shapes Analyzer experimental version
Scilab
9
star
89

gocat

Simplified go-cat agent for caldera
Go
9
star
90

caltack

Plugin that serves the ATT&CK website alongside CALDERA.
Python
9
star
91

arlin

ARLIN is a research library written in Python that provides explainability outputs and vulnerability detection for DRL models, specifically designed to increase model assurance and identify vulnerabilities and potential points of failure within a trained model. https://mitre.github.io/arlin/
Python
9
star
92

mitre_fast_layered_map

A high-speed lidar based mapping package for use with large scale robotics such as autonomous vehicles.
C++
9
star
93

caldera-crater

C#
9
star
94

credentials

Insulates package authors from worrying about how to collect user credentials
R
9
star
95

biqt

The core engine of the BIQT framework.
C
8
star
96

stixmarx

Data Markings API for STIX 1.x
Python
8
star
97

cql-translation-service

CQL to ELM translator packaged as a microservice.
Java
8
star
98

serverless-inspec-deprecated

(wip) InSpec run from serverless environments (lambda)
HCL
8
star
99

scorecard_app

Scorecard for a FHIR Patient Record -- SMART on FHIR App
HTML
8
star
100

heimdall-vue

(deprecated) A refactor of the heimdall-lite project using vue, see:
Vue
8
star