threat mitigation – Mitre ATT&CK for ICS: how to get the list of assets?

I’am using the Mitre ATT&CK CTI for ICS and I need to get all the assets
shown in this page

How can I get them through their TAXII server?
Here is a little snippet of code interacting with the CTI.

from taxii2client.v20 import Server, ApiRoot, Collection
from stix2 import TAXIICollectionSource, Filter
from stix2.v20 import AttackPattern, Malware, CourseOfAction, IntrusionSet, Tool

# Instantiate server and get API Root
server = Server("https://cti-taxii.mitre.org/taxii")
api_root: ApiRoot = server.api_roots(0)

# Isolate each collection
pre_attack: Collection = next(filter(lambda c: c.title == "PRE-ATT&CK", api_root.collections), None)
enterprise_attack: Collection = next(filter(lambda c: c.title == "Enterprise ATT&CK", api_root.collections), None)
mobile_attack: Collection = next(filter(lambda c: c.title == "Mobile ATT&CK", api_root.collections), None)
ics_attack: Collection = next(filter(lambda c: c.title == "ICS ATT&CK", api_root.collections), None)

# Navigate ICS Collection
ics_source: TAXIICollectionSource = TAXIICollectionSource(ics_attack)

print("All")
for value in ics_source.query():
    print(value)

threat mitigation – What is the difference between ATT&CK and CAPEC?

My question is on Cyber Threat Intelligence (CTI). I want to know the difference between Attack Patterns (as in MITRE CAPEC) and Tactics, Techniques and Procedures (as in MITRE ATT&CK). They both seem to describe the behaviour and modus operandi of the adversary, so what is the difference really?

What is the difference between Tactics, Techniques and Procedures in the first place? I have heard that techniques and tactics don’t belong to the same Threat Intelligence type. Technical CTI is at the same level as indicators of compromise (IoC) for example, whereas Tactical CTI refer to an higher analysis level, the “attack phase” (whatever it means). But then why do we only see “techniques” on MITRE ATT&CK webpage? Why is it called Tactics, Techniques and Procedures if there are only Techniques? And what are Procedures?

incident response – MITRE ATT&CK ICS Machine readable

Could you please help me in finding a repository for MITRE ATT&CK ICS? I was wondering if the matrix, along with labels, assets and tactics was available smewhere online, perhaps in a STIX format as they did for ATT&CK Mobile, Enterprise and pre-ATT&CK [1].

Thank!

[1] https://github.com/mitre/cti