-
Notifications
You must be signed in to change notification settings - Fork 259
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Solving the issue of threat actor, activity group, campaign and operation #469
Comments
While I think the operation/campaign distinction makes sense for APT actors, for cybercrime they are often used the other way around: I would read a "ransomware operation" as a longer term use of a ransomware family by a single actor, and a "ransomware campaign" as a short term action part of that operation (e.g. a spam run). |
Thanks for the feedback. Good point, it's indeed an issue. It's difficult to solve per se. We had a discussion at the office about prefixing cybercrime to campaign and operation |
…ign only. Based on #469 There is an old and persistence issue in attribution world and basically no-one really agrees on this. So we decided to start a specific metadata `threat-actor-classification` on the threat-actor to define the various types per cluster entry: - _operation_: - _A military operation is the coordinated military actions of a state, or a non-state actor, in response to a developing situation. These actions are designed as a military plan to resolve the situation in the state or actor's favor. Operations may be of a combat or non-combat nature and may be referred to by a code name for the purpose of national security. Military operations are often known for their more generally accepted common usage names than their actual operational objectives._ from Wikipedia - **In the context of MISP threat-actor name, it's a single specific operation.** - _campaign_: - _The term military campaign applies to large scale, long duration, significant military strategy plans incorporating a series of inter-related military operations or battles forming a distinct part of a larger conflict often called a war. The term derives from the plain of Campania, a place of annual wartime operations by the armies of the Roman Republic._ from Wikipedia - **In the context of MISP threat-actor-name, it's long-term activity which might be composed of one or more operations.** - threat-actor - **In the context of MISP threat-actor-name, it's an agreed name by a set of organisations.** - activity group - **In the context of MISP threat-actor-name, it's a group defined by its set of common techniques or activities.** - unknown - **In the context of MISP threat-actor-name, it's still not clear if it's an operation, campaign, threat-actor or activity group** The meta field is an array to allow specific cluster of threat-actor to show the current disagreement between different organisations about the type (threat actor, activity group, campaign and operation).
threat-actor-classification meta field
There is an old and persistence issue in attribution world and basically no-one really agrees on this. So we decided to start a specific metadata
threat-actor-classification
on the threat-actor to define the various types per cluster entry:The meta field is an array to allow specific cluster of threat-actor to show the current disagreement between different organisations about the type (threat actor, activity group, campaign and operation).
It's a work in progress and subject to change.
Example
Alternative type per vendor
Following input from various people, we will extend the meta field with the ability to scope it per vendor in addition to the default
threat-actor-classification
.The model is the following, a
alt-
prefix is used to mention alternative description of the same field. So if Kaspersky has a different view of the threat-actor-type, this can be expressed in the following way.alt-threat-actor-classification-kaspersky
alt-<fieldname of the meta-<vendornameinoneword>
A list of known vendors, should be available to avoid ambiguity.
The text was updated successfully, but these errors were encountered: