diff --git a/threat-actor-naming/raw.md b/threat-actor-naming/raw.md index 34d3699..e9a0903 100755 --- a/threat-actor-naming/raw.md +++ b/threat-actor-naming/raw.md @@ -55,17 +55,23 @@ The key words "**MUST**", "**MUST NOT**", "**REQUIRED**", "**SHALL**", "**SHALL "**SHOULD**", "**SHOULD NOT**", "**RECOMMENDED**", "**MAY**", and "**OPTIONAL**" in this document are to be interpreted as described in RFC 2119 [@!RFC2119]. -# Reusing threat actor naming +# Recommendations + +## Reusing threat actor naming Before creating a new threat actor name, you **MUST** consider a review of existing threat actor names from databases such as the threat actor MISP galaxy [@!MISP-G]. Proliferation of threat actor names is a significant challenge for the day-to-day analyst work. If your threat actor defined an existing threat actor, you **MUST** reuse an existing threat actor name. If there is no specific threat actor name, you **SHALL** create a new threat actor following the best practices defined in this document. -# Format +## Don't confuse actor naming with malware naming -# Encoding +## Format +## Encoding + +## Directory + # Examples # Security Considerations diff --git a/threat-actor-naming/threat-actor-naming.html b/threat-actor-naming/threat-actor-naming.html index 51e749c..ca26c13 100644 --- a/threat-actor-naming/threat-actor-naming.html +++ b/threat-actor-naming/threat-actor-naming.html @@ -376,16 +376,19 @@ - - - - - - - - - - + + + + + + + + + + + + + @@ -449,25 +452,31 @@
  • 2. Reusing threat actor naming +
  • 2. Recommendations
  • -
  • 3. Format +
  • 3. Examples
  • -
  • 9. References +
  • 4. Security Considerations
  • -