Example of galaxy including a cluster which is

default type where you can add as much element as you want.

The elements are the default values known by MISP but a local
instance can add more or overwrite some elements.
pull/1/head
Alexandre Dulaunoy 2016-02-27 21:07:09 +01:00
commit 6e62b0ab46
3 changed files with 116 additions and 0 deletions

View File

@ -0,0 +1,5 @@
{
"name" : "threat actor",
"description": "threat actor cluster",
"elementOneOf": ["apt-groups", "threat-actor-intended-effect-vocabulary"]
}

25
elements/apt-groups.json Normal file
View File

@ -0,0 +1,25 @@
{
"version" : 1,
"description": "Known or estimated adversary groups targeting organizations and employees",
"author": "Various",
"type": "APT Groups",
"groups" : ["Comment Crew","Sofacy"],
"details" : [
{
"group": "Comment Crew",
"description": "PLA Unit 61398 (Chinese: 61398部队, Pinyin: 61398 bùduì) is the Military Unit Cover Designator (MUCD)[1] of a People's Liberation Army advanced persistent threat unit that has been alleged to be a source of Chinese computer hacking attacks",
"refs": ["https://en.wikipedia.org/wiki/PLA_Unit_61398", "http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf"],
"country": "CN",
"synonyms": ["Comment Panda", "PLA Unit 61398", "APT 1", "Advanced Persistent Threat 1", "Byzantine Candor"]
},
{
"group": "Sofacy",
"description": "The Sofacy Group (also known as APT28, Pawn Storm, Fancy Bear and Sednit) is a cyber espionage group believed to have ties to the Russian government. Likely operating since 2007, the group is known to target government, military, and security organizations. It has been characterized as an advanced persistent threat.",
"refs": ["https://en.wikipedia.org/wiki/Sofacy_Group"],
"country": "RU",
"synonyms": ["APT 28", "APT28", "Pawn Storm", "Fancy Bear", "Sednit"]
}
]
}

View File

@ -0,0 +1,86 @@
{
"values": [
{
"value": "Advantage",
"description": "The intended effect of the incident was for the attacker to obtain some advantage over the target"
},
{
"value": "Advantage - Economic",
"description": "The intended effect of the incident was for the attacker to obtain some economic advantage over the target"
},
{
"value": "Advantage - Military",
"description": "The intended effect of the incident was for the attacker to obtain some military advantage over the target"
},
{
"value": "Advantage - Political",
"description": "The intended effect of the incident was for the attacker to obtain some political advantage over the target"
},
{
"value": "Theft",
"description": "The intended effect of the incident was to perpetrate a non-specific theft"
},
{
"value": "Theft - Intellectual Property",
"description": "The intended effect of the incident was to perpetrate a theft of intellectual property"
},
{
"value": "Theft - Credential Theft"
},
{
"value": "Theft - Identity Theft"
},
{
"value": "Theft - Theft of Proprietary Information"
},
{
"value": "Account Takeover"
},
{
"value": "Brand Damage"
},
{
"value": "Competitive Advantage"
},
{
"value": "Degradation of Service"
},
{
"value": "Denial and Deception"
},
{
"value": "Destruction"
},
{
"value": "Disruption"
},
{
"value": "Embarrassment"
},
{
"value": "Exposure"
},
{
"value": "Extortion"
},
{
"value": "Fraud"
},
{
"value": "Harassment"
},
{
"value": "ICS Control"
},
{
"value": "Traffic Diversion"
},
{
"value": "Unauthorized Access"
}
],
"version" : 1,
"description": "The IntendedEffectVocab is the default STIX vocabulary for expressing the intended effect of a threat actor",
"author": "STIX",
"type": "threat-actor-intended-effect-vocabulary"
}