mirror of https://github.com/MISP/misp-rfc
chg: [threat-actor-naming] more guidelines (WiP)
parent
5133dbec55
commit
a40043c9cf
|
@ -49,6 +49,18 @@ and threat intelligence platforms such as MISP [@?MISP-P]].
|
||||||
|
|
||||||
# Introduction
|
# Introduction
|
||||||
|
|
||||||
|
In threat intelligence, a name can be assigned to a threat actor without specific guidelines. This leads to issues such
|
||||||
|
as a:
|
||||||
|
|
||||||
|
- A proliferation of threat actor names generating overlaps or different names for similar threat actors (e.g. some threat actors have more than 10 synonyms)
|
||||||
|
- Ambiguity in the words used to name the threat actor in different contexts (e.g. using common words)
|
||||||
|
- No clearly defined text format to describe the same threat actor (e.g. Is the threat actor name case sensitive? Is there a dash or a space between the two words?)
|
||||||
|
- Confusion between techniques/tools used by a threat actor versus its name (e.g. naming a threat actor after a specific malware used)
|
||||||
|
- Lack of source and list from vendors to describe their threat actor names and the reasoning behind the naming (e.g. did they name the threat actor after a specific set of campaigns? or specific set of targets?)
|
||||||
|
|
||||||
|
This document proposes a set of guidelines to name threat actors. The goal is to reduce the above mentioned issues.
|
||||||
|
|
||||||
|
|
||||||
## Conventions and Terminology
|
## Conventions and Terminology
|
||||||
|
|
||||||
The key words "**MUST**", "**MUST NOT**", "**REQUIRED**", "**SHALL**", "**SHALL NOT**",
|
The key words "**MUST**", "**MUST NOT**", "**REQUIRED**", "**SHALL**", "**SHALL NOT**",
|
||||||
|
@ -57,6 +69,8 @@ document are to be interpreted as described in RFC 2119 [@!RFC2119].
|
||||||
|
|
||||||
# Recommendations
|
# Recommendations
|
||||||
|
|
||||||
|
The recommendations listed below provide a minimal set of guidelines while assigning a new name to a threat actor.
|
||||||
|
|
||||||
## Reusing threat actor naming
|
## Reusing threat actor naming
|
||||||
|
|
||||||
Before creating a new threat actor name, you **MUST** consider a review of existing threat actor names from databases such as the threat actor
|
Before creating a new threat actor name, you **MUST** consider a review of existing threat actor names from databases such as the threat actor
|
||||||
|
@ -64,16 +78,29 @@ MISP galaxy [@!MISP-G]. Proliferation of threat actor names is a significant cha
|
||||||
reuse an existing threat actor name. If there is no specific threat actor name, you **SHALL** create a new threat actor following the best
|
reuse an existing threat actor name. If there is no specific threat actor name, you **SHALL** create a new threat actor following the best
|
||||||
practices defined in this document.
|
practices defined in this document.
|
||||||
|
|
||||||
## Don't confuse actor naming with malware naming
|
## Uniqueness
|
||||||
|
|
||||||
|
When choosing a threat actor name, uniqueness is a critical property. The threat actor name **MUST** be unique and not existing in different contexts.
|
||||||
|
|
||||||
## Format
|
## Format
|
||||||
|
|
||||||
## Encoding
|
## Encoding
|
||||||
|
|
||||||
|
The name of the threat actor **MUST** be expressed in ASCII 7-bit. Assigning a localized name to a threat actor **MAY** create a set of ambiguity about different localized version of the same threat actor.
|
||||||
|
|
||||||
|
## Don't confuse actor naming with malware naming
|
||||||
|
|
||||||
|
The name of the threat actor **MUST NOT** be assigned based on the tools or techniques used by the threat actor. A notorious example in the threat intelligence community is Turla which can name a threat actor but also a malware used by this group or other groups.
|
||||||
|
|
||||||
## Directory
|
## Directory
|
||||||
|
|
||||||
# Examples
|
# Examples
|
||||||
|
|
||||||
|
Some known examples are included below and serve as reference for good practices in naming threat actors. The below threat actor names can be considered good example :
|
||||||
|
|
||||||
|
- APT-1
|
||||||
|
- TA-505
|
||||||
|
|
||||||
# Security Considerations
|
# Security Considerations
|
||||||
|
|
||||||
Naming a threat actor could include specific sensitive reference to a case or an incident. Before releasing the naming, the creator
|
Naming a threat actor could include specific sensitive reference to a case or an incident. Before releasing the naming, the creator
|
||||||
|
|
|
@ -378,10 +378,11 @@
|
||||||
<link href="#rfc.section.1.1" rel="Chapter" title="1.1 Conventions and Terminology">
|
<link href="#rfc.section.1.1" rel="Chapter" title="1.1 Conventions and Terminology">
|
||||||
<link href="#rfc.section.2" rel="Chapter" title="2 Recommendations">
|
<link href="#rfc.section.2" rel="Chapter" title="2 Recommendations">
|
||||||
<link href="#rfc.section.2.1" rel="Chapter" title="2.1 Reusing threat actor naming">
|
<link href="#rfc.section.2.1" rel="Chapter" title="2.1 Reusing threat actor naming">
|
||||||
<link href="#rfc.section.2.2" rel="Chapter" title="2.2 Don't confuse actor naming with malware naming">
|
<link href="#rfc.section.2.2" rel="Chapter" title="2.2 Uniqueness">
|
||||||
<link href="#rfc.section.2.3" rel="Chapter" title="2.3 Format">
|
<link href="#rfc.section.2.3" rel="Chapter" title="2.3 Format">
|
||||||
<link href="#rfc.section.2.4" rel="Chapter" title="2.4 Encoding">
|
<link href="#rfc.section.2.4" rel="Chapter" title="2.4 Encoding">
|
||||||
<link href="#rfc.section.2.5" rel="Chapter" title="2.5 Directory">
|
<link href="#rfc.section.2.5" rel="Chapter" title="2.5 Don't confuse actor naming with malware naming">
|
||||||
|
<link href="#rfc.section.2.6" rel="Chapter" title="2.6 Directory">
|
||||||
<link href="#rfc.section.3" rel="Chapter" title="3 Examples">
|
<link href="#rfc.section.3" rel="Chapter" title="3 Examples">
|
||||||
<link href="#rfc.section.4" rel="Chapter" title="4 Security Considerations">
|
<link href="#rfc.section.4" rel="Chapter" title="4 Security Considerations">
|
||||||
<link href="#rfc.section.5" rel="Chapter" title="5 Acknowledgements">
|
<link href="#rfc.section.5" rel="Chapter" title="5 Acknowledgements">
|
||||||
|
@ -456,13 +457,15 @@
|
||||||
</li>
|
</li>
|
||||||
<ul><li>2.1. <a href="#rfc.section.2.1">Reusing threat actor naming</a>
|
<ul><li>2.1. <a href="#rfc.section.2.1">Reusing threat actor naming</a>
|
||||||
</li>
|
</li>
|
||||||
<li>2.2. <a href="#rfc.section.2.2">Don't confuse actor naming with malware naming</a>
|
<li>2.2. <a href="#rfc.section.2.2">Uniqueness</a>
|
||||||
</li>
|
</li>
|
||||||
<li>2.3. <a href="#rfc.section.2.3">Format</a>
|
<li>2.3. <a href="#rfc.section.2.3">Format</a>
|
||||||
</li>
|
</li>
|
||||||
<li>2.4. <a href="#rfc.section.2.4">Encoding</a>
|
<li>2.4. <a href="#rfc.section.2.4">Encoding</a>
|
||||||
</li>
|
</li>
|
||||||
<li>2.5. <a href="#rfc.section.2.5">Directory</a>
|
<li>2.5. <a href="#rfc.section.2.5">Don't confuse actor naming with malware naming</a>
|
||||||
|
</li>
|
||||||
|
<li>2.6. <a href="#rfc.section.2.6">Directory</a>
|
||||||
</li>
|
</li>
|
||||||
</ul><li>3. <a href="#rfc.section.3">Examples</a>
|
</ul><li>3. <a href="#rfc.section.3">Examples</a>
|
||||||
</li>
|
</li>
|
||||||
|
@ -487,6 +490,19 @@
|
||||||
<h1 id="rfc.section.1">
|
<h1 id="rfc.section.1">
|
||||||
<a href="#rfc.section.1">1.</a> <a href="#introduction" id="introduction">Introduction</a>
|
<a href="#rfc.section.1">1.</a> <a href="#introduction" id="introduction">Introduction</a>
|
||||||
</h1>
|
</h1>
|
||||||
|
<p id="rfc.section.1.p.1">In threat intelligence, a name can be assigned to a threat actor without specific guidelines. This leads to issues such as a:</p>
|
||||||
|
<p></p>
|
||||||
|
|
||||||
|
<ul>
|
||||||
|
<li>A proliferation of threat actor names generating overlaps or different names for similar threat actors (e.g. some threat actors have more than 10 synonyms)</li>
|
||||||
|
<li>Ambiguity in the words used to name the threat actor in different contexts (e.g. using common words)</li>
|
||||||
|
<li>No clearly defined text format to describe the same threat actor (e.g. Is the threat actor name case sensitive? Is there a dash or a space between the two words?)</li>
|
||||||
|
<li>Confusion between techniques/tools used by a threat actor versus its name (e.g. naming a threat actor after a specific malware used)</li>
|
||||||
|
<li>Lack of source and list from vendors to describe their threat actor names and the reasoning behind the naming (e.g. did they name the threat actor after a specific set of campaigns? or specific set of targets?)</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<p> </p>
|
||||||
|
<p id="rfc.section.1.p.3">This document proposes a set of guidelines to name threat actors. The goal is to reduce the above mentioned issues.</p>
|
||||||
<h1 id="rfc.section.1.1">
|
<h1 id="rfc.section.1.1">
|
||||||
<a href="#rfc.section.1.1">1.1.</a> <a href="#conventions-and-terminology" id="conventions-and-terminology">Conventions and Terminology</a>
|
<a href="#rfc.section.1.1">1.1.</a> <a href="#conventions-and-terminology" id="conventions-and-terminology">Conventions and Terminology</a>
|
||||||
</h1>
|
</h1>
|
||||||
|
@ -494,25 +510,41 @@
|
||||||
<h1 id="rfc.section.2">
|
<h1 id="rfc.section.2">
|
||||||
<a href="#rfc.section.2">2.</a> <a href="#recommendations" id="recommendations">Recommendations</a>
|
<a href="#rfc.section.2">2.</a> <a href="#recommendations" id="recommendations">Recommendations</a>
|
||||||
</h1>
|
</h1>
|
||||||
|
<p id="rfc.section.2.p.1">The recommendations listed below provide a minimal set of guidelines while assigning a new name to a threat actor.</p>
|
||||||
<h1 id="rfc.section.2.1">
|
<h1 id="rfc.section.2.1">
|
||||||
<a href="#rfc.section.2.1">2.1.</a> <a href="#reusing-threat-actor-naming" id="reusing-threat-actor-naming">Reusing threat actor naming</a>
|
<a href="#rfc.section.2.1">2.1.</a> <a href="#reusing-threat-actor-naming" id="reusing-threat-actor-naming">Reusing threat actor naming</a>
|
||||||
</h1>
|
</h1>
|
||||||
<p id="rfc.section.2.1.p.1">Before creating a new threat actor name, you MUST consider a review of existing threat actor names from databases such as the threat actor MISP galaxy <a href="#MISP-G" class="xref">[MISP-G]</a>. Proliferation of threat actor names is a significant challenge for the day-to-day analyst work. If your threat actor defined an existing threat actor, you MUST reuse an existing threat actor name. If there is no specific threat actor name, you SHALL create a new threat actor following the best practices defined in this document.</p>
|
<p id="rfc.section.2.1.p.1">Before creating a new threat actor name, you MUST consider a review of existing threat actor names from databases such as the threat actor MISP galaxy <a href="#MISP-G" class="xref">[MISP-G]</a>. Proliferation of threat actor names is a significant challenge for the day-to-day analyst work. If your threat actor defined an existing threat actor, you MUST reuse an existing threat actor name. If there is no specific threat actor name, you SHALL create a new threat actor following the best practices defined in this document.</p>
|
||||||
<h1 id="rfc.section.2.2">
|
<h1 id="rfc.section.2.2">
|
||||||
<a href="#rfc.section.2.2">2.2.</a> <a href="#don-t-confuse-actor-naming-with-malware-naming" id="don-t-confuse-actor-naming-with-malware-naming">Don't confuse actor naming with malware naming</a>
|
<a href="#rfc.section.2.2">2.2.</a> <a href="#uniqueness" id="uniqueness">Uniqueness</a>
|
||||||
</h1>
|
</h1>
|
||||||
|
<p id="rfc.section.2.2.p.1">When choosing a threat actor name, uniqueness is a critical property. The threat actor name MUST be unique and not existing in different contexts.</p>
|
||||||
<h1 id="rfc.section.2.3">
|
<h1 id="rfc.section.2.3">
|
||||||
<a href="#rfc.section.2.3">2.3.</a> <a href="#format" id="format">Format</a>
|
<a href="#rfc.section.2.3">2.3.</a> <a href="#format" id="format">Format</a>
|
||||||
</h1>
|
</h1>
|
||||||
<h1 id="rfc.section.2.4">
|
<h1 id="rfc.section.2.4">
|
||||||
<a href="#rfc.section.2.4">2.4.</a> <a href="#encoding" id="encoding">Encoding</a>
|
<a href="#rfc.section.2.4">2.4.</a> <a href="#encoding" id="encoding">Encoding</a>
|
||||||
</h1>
|
</h1>
|
||||||
|
<p id="rfc.section.2.4.p.1">The name of the threat actor MUST be expressed in ASCII 7-bit. Assigning a localized name to a threat actor MAY create a set of ambiguity about different localized version of the same threat actor.</p>
|
||||||
<h1 id="rfc.section.2.5">
|
<h1 id="rfc.section.2.5">
|
||||||
<a href="#rfc.section.2.5">2.5.</a> <a href="#directory" id="directory">Directory</a>
|
<a href="#rfc.section.2.5">2.5.</a> <a href="#don-t-confuse-actor-naming-with-malware-naming" id="don-t-confuse-actor-naming-with-malware-naming">Don't confuse actor naming with malware naming</a>
|
||||||
|
</h1>
|
||||||
|
<p id="rfc.section.2.5.p.1">The name of the threat actor MUST NOT be assigned based on the tools or techniques used by the threat actor. A notorious example in the threat intelligence community is Turla which can name a threat actor but also a malware used by this group or other groups.</p>
|
||||||
|
<h1 id="rfc.section.2.6">
|
||||||
|
<a href="#rfc.section.2.6">2.6.</a> <a href="#directory" id="directory">Directory</a>
|
||||||
</h1>
|
</h1>
|
||||||
<h1 id="rfc.section.3">
|
<h1 id="rfc.section.3">
|
||||||
<a href="#rfc.section.3">3.</a> <a href="#examples" id="examples">Examples</a>
|
<a href="#rfc.section.3">3.</a> <a href="#examples" id="examples">Examples</a>
|
||||||
</h1>
|
</h1>
|
||||||
|
<p id="rfc.section.3.p.1">Some known examples are included below and serve as reference for good practices in naming threat actors. The below threat actor names can be considered good example :</p>
|
||||||
|
<p></p>
|
||||||
|
|
||||||
|
<ul>
|
||||||
|
<li>APT-1</li>
|
||||||
|
<li>TA-505</li>
|
||||||
|
</ul>
|
||||||
|
|
||||||
|
<p> </p>
|
||||||
<h1 id="rfc.section.4">
|
<h1 id="rfc.section.4">
|
||||||
<a href="#rfc.section.4">4.</a> <a href="#security-considerations" id="security-considerations">Security Considerations</a>
|
<a href="#rfc.section.4">4.</a> <a href="#security-considerations" id="security-considerations">Security Considerations</a>
|
||||||
</h1>
|
</h1>
|
||||||
|
|
|
@ -61,24 +61,59 @@ Internet-Draft Recommendations on naming threat actors June 2020
|
||||||
Table of Contents
|
Table of Contents
|
||||||
|
|
||||||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
|
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
|
||||||
1.1. Conventions and Terminology . . . . . . . . . . . . . . . 2
|
1.1. Conventions and Terminology . . . . . . . . . . . . . . . 3
|
||||||
2. Recommendations . . . . . . . . . . . . . . . . . . . . . . . 2
|
2. Recommendations . . . . . . . . . . . . . . . . . . . . . . . 3
|
||||||
2.1. Reusing threat actor naming . . . . . . . . . . . . . . . 2
|
2.1. Reusing threat actor naming . . . . . . . . . . . . . . . 3
|
||||||
2.2. Don't confuse actor naming with malware naming . . . . . 2
|
2.2. Uniqueness . . . . . . . . . . . . . . . . . . . . . . . 3
|
||||||
2.3. Format . . . . . . . . . . . . . . . . . . . . . . . . . 2
|
2.3. Format . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
||||||
2.4. Encoding . . . . . . . . . . . . . . . . . . . . . . . . 3
|
2.4. Encoding . . . . . . . . . . . . . . . . . . . . . . . . 3
|
||||||
2.5. Directory . . . . . . . . . . . . . . . . . . . . . . . . 3
|
2.5. Don't confuse actor naming with malware naming . . . . . 3
|
||||||
3. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
2.6. Directory . . . . . . . . . . . . . . . . . . . . . . . . 3
|
||||||
4. Security Considerations . . . . . . . . . . . . . . . . . . . 3
|
3. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 4
|
||||||
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 3
|
4. Security Considerations . . . . . . . . . . . . . . . . . . . 4
|
||||||
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 4
|
||||||
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 3
|
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
|
||||||
7.1. Normative References . . . . . . . . . . . . . . . . . . 3
|
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
|
||||||
7.2. Informative References . . . . . . . . . . . . . . . . . 3
|
7.1. Normative References . . . . . . . . . . . . . . . . . . 4
|
||||||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 3
|
7.2. Informative References . . . . . . . . . . . . . . . . . 4
|
||||||
|
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 4
|
||||||
|
|
||||||
1. Introduction
|
1. Introduction
|
||||||
|
|
||||||
|
In threat intelligence, a name can be assigned to a threat actor
|
||||||
|
without specific guidelines. This leads to issues such as a:
|
||||||
|
|
||||||
|
o A proliferation of threat actor names generating overlaps or
|
||||||
|
different names for similar threat actors (e.g. some threat actors
|
||||||
|
have more than 10 synonyms)
|
||||||
|
|
||||||
|
o Ambiguity in the words used to name the threat actor in different
|
||||||
|
contexts (e.g. using common words)
|
||||||
|
|
||||||
|
o No clearly defined text format to describe the same threat actor
|
||||||
|
(e.g. Is the threat actor name case sensitive? Is there a dash
|
||||||
|
or a space between the two words?)
|
||||||
|
|
||||||
|
o Confusion between techniques/tools used by a threat actor versus
|
||||||
|
its name (e.g. naming a threat actor after a specific malware
|
||||||
|
used)
|
||||||
|
|
||||||
|
o Lack of source and list from vendors to describe their threat
|
||||||
|
actor names and the reasoning behind the naming (e.g. did they
|
||||||
|
name the threat actor after a specific set of campaigns? or
|
||||||
|
specific set of targets?)
|
||||||
|
|
||||||
|
This document proposes a set of guidelines to name threat actors.
|
||||||
|
The goal is to reduce the above mentioned issues.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 2]
|
||||||
|
|
||||||
|
Internet-Draft Recommendations on naming threat actors June 2020
|
||||||
|
|
||||||
|
|
||||||
1.1. Conventions and Terminology
|
1.1. Conventions and Terminology
|
||||||
|
|
||||||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||||
|
@ -87,6 +122,9 @@ Table of Contents
|
||||||
|
|
||||||
2. Recommendations
|
2. Recommendations
|
||||||
|
|
||||||
|
The recommendations listed below provide a minimal set of guidelines
|
||||||
|
while assigning a new name to a threat actor.
|
||||||
|
|
||||||
2.1. Reusing threat actor naming
|
2.1. Reusing threat actor naming
|
||||||
|
|
||||||
Before creating a new threat actor name, you MUST consider a review
|
Before creating a new threat actor name, you MUST consider a review
|
||||||
|
@ -98,10 +136,28 @@ Table of Contents
|
||||||
name, you SHALL create a new threat actor following the best
|
name, you SHALL create a new threat actor following the best
|
||||||
practices defined in this document.
|
practices defined in this document.
|
||||||
|
|
||||||
2.2. Don't confuse actor naming with malware naming
|
2.2. Uniqueness
|
||||||
|
|
||||||
|
When choosing a threat actor name, uniqueness is a critical property.
|
||||||
|
The threat actor name MUST be unique and not existing in different
|
||||||
|
contexts.
|
||||||
|
|
||||||
2.3. Format
|
2.3. Format
|
||||||
|
|
||||||
|
2.4. Encoding
|
||||||
|
|
||||||
|
The name of the threat actor MUST be expressed in ASCII 7-bit.
|
||||||
|
Assigning a localized name to a threat actor MAY create a set of
|
||||||
|
ambiguity about different localized version of the same threat actor.
|
||||||
|
|
||||||
|
2.5. Don't confuse actor naming with malware naming
|
||||||
|
|
||||||
|
The name of the threat actor MUST NOT be assigned based on the tools
|
||||||
|
or techniques used by the threat actor. A notorious example in the
|
||||||
|
threat intelligence community is Turla which can name a threat actor
|
||||||
|
but also a malware used by this group or other groups.
|
||||||
|
|
||||||
|
2.6. Directory
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -109,17 +165,21 @@ Table of Contents
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 2]
|
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 3]
|
||||||
|
|
||||||
Internet-Draft Recommendations on naming threat actors June 2020
|
Internet-Draft Recommendations on naming threat actors June 2020
|
||||||
|
|
||||||
|
|
||||||
2.4. Encoding
|
|
||||||
|
|
||||||
2.5. Directory
|
|
||||||
|
|
||||||
3. Examples
|
3. Examples
|
||||||
|
|
||||||
|
Some known examples are included below and serve as reference for
|
||||||
|
good practices in naming threat actors. The below threat actor names
|
||||||
|
can be considered good example :
|
||||||
|
|
||||||
|
o APT-1
|
||||||
|
|
||||||
|
o TA-505
|
||||||
|
|
||||||
4. Security Considerations
|
4. Security Considerations
|
||||||
|
|
||||||
Naming a threat actor could include specific sensitive reference to a
|
Naming a threat actor could include specific sensitive reference to a
|
||||||
|
@ -154,6 +214,18 @@ Internet-Draft Recommendations on naming threat actors June 2020
|
||||||
|
|
||||||
Authors' Addresses
|
Authors' Addresses
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 4]
|
||||||
|
|
||||||
|
Internet-Draft Recommendations on naming threat actors June 2020
|
||||||
|
|
||||||
|
|
||||||
Alexandre Dulaunoy
|
Alexandre Dulaunoy
|
||||||
Computer Incident Response Center Luxembourg
|
Computer Incident Response Center Luxembourg
|
||||||
16, bd d'Avranches
|
16, bd d'Avranches
|
||||||
|
@ -164,12 +236,6 @@ Authors' Addresses
|
||||||
Email: alexandre.dulaunoy@circl.lu
|
Email: alexandre.dulaunoy@circl.lu
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 3]
|
|
||||||
|
|
||||||
Internet-Draft Recommendations on naming threat actors June 2020
|
|
||||||
|
|
||||||
|
|
||||||
Pauline Bourmeau
|
Pauline Bourmeau
|
||||||
Corexalys
|
Corexalys
|
||||||
26 Rue de la Bienfaisance
|
26 Rue de la Bienfaisance
|
||||||
|
@ -211,14 +277,4 @@ Internet-Draft Recommendations on naming threat actors June 2020
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 5]
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 4]
|
|
||||||
|
|
|
@ -30,6 +30,18 @@ and threat intelligence platforms such as MISP <xref target="MISP-P"></xref>].</
|
||||||
<middle>
|
<middle>
|
||||||
|
|
||||||
<section anchor="introduction" title="Introduction">
|
<section anchor="introduction" title="Introduction">
|
||||||
|
<t>In threat intelligence, a name can be assigned to a threat actor without specific guidelines. This leads to issues such
|
||||||
|
as a:</t>
|
||||||
|
<t>
|
||||||
|
<list style="symbols">
|
||||||
|
<t>A proliferation of threat actor names generating overlaps or different names for similar threat actors (e.g. some threat actors have more than 10 synonyms)</t>
|
||||||
|
<t>Ambiguity in the words used to name the threat actor in different contexts (e.g. using common words)</t>
|
||||||
|
<t>No clearly defined text format to describe the same threat actor (e.g. Is the threat actor name case sensitive? Is there a dash or a space between the two words?)</t>
|
||||||
|
<t>Confusion between techniques/tools used by a threat actor versus its name (e.g. naming a threat actor after a specific malware used)</t>
|
||||||
|
<t>Lack of source and list from vendors to describe their threat actor names and the reasoning behind the naming (e.g. did they name the threat actor after a specific set of campaigns? or specific set of targets?)</t>
|
||||||
|
</list>
|
||||||
|
</t>
|
||||||
|
<t>This document proposes a set of guidelines to name threat actors. The goal is to reduce the above mentioned issues.</t>
|
||||||
|
|
||||||
<section anchor="conventions-and-terminology" title="Conventions and Terminology">
|
<section anchor="conventions-and-terminology" title="Conventions and Terminology">
|
||||||
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
|
||||||
|
@ -39,6 +51,7 @@ document are to be interpreted as described in RFC 2119 <xref target="RFC2119"><
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section anchor="recommendations" title="Recommendations">
|
<section anchor="recommendations" title="Recommendations">
|
||||||
|
<t>The recommendations listed below provide a minimal set of guidelines while assigning a new name to a threat actor.</t>
|
||||||
|
|
||||||
<section anchor="reusing-threat-actor-naming" title="Reusing threat actor naming">
|
<section anchor="reusing-threat-actor-naming" title="Reusing threat actor naming">
|
||||||
<t>Before creating a new threat actor name, you MUST consider a review of existing threat actor names from databases such as the threat actor
|
<t>Before creating a new threat actor name, you MUST consider a review of existing threat actor names from databases such as the threat actor
|
||||||
|
@ -47,13 +60,19 @@ reuse an existing threat actor name. If there is no specific threat actor name,
|
||||||
practices defined in this document.</t>
|
practices defined in this document.</t>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section anchor="don-t-confuse-actor-naming-with-malware-naming" title="Don't confuse actor naming with malware naming">
|
<section anchor="uniqueness" title="Uniqueness">
|
||||||
|
<t>When choosing a threat actor name, uniqueness is a critical property. The threat actor name MUST be unique and not existing in different contexts.</t>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section anchor="format" title="Format">
|
<section anchor="format" title="Format">
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section anchor="encoding" title="Encoding">
|
<section anchor="encoding" title="Encoding">
|
||||||
|
<t>The name of the threat actor MUST be expressed in ASCII 7-bit. Assigning a localized name to a threat actor MAY create a set of ambiguity about different localized version of the same threat actor.</t>
|
||||||
|
</section>
|
||||||
|
|
||||||
|
<section anchor="don-t-confuse-actor-naming-with-malware-naming" title="Don't confuse actor naming with malware naming">
|
||||||
|
<t>The name of the threat actor MUST NOT be assigned based on the tools or techniques used by the threat actor. A notorious example in the threat intelligence community is Turla which can name a threat actor but also a malware used by this group or other groups.</t>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section anchor="directory" title="Directory">
|
<section anchor="directory" title="Directory">
|
||||||
|
@ -61,6 +80,13 @@ practices defined in this document.</t>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section anchor="examples" title="Examples">
|
<section anchor="examples" title="Examples">
|
||||||
|
<t>Some known examples are included below and serve as reference for good practices in naming threat actors. The below threat actor names can be considered good example :</t>
|
||||||
|
<t>
|
||||||
|
<list style="symbols">
|
||||||
|
<t>APT-1</t>
|
||||||
|
<t>TA-505</t>
|
||||||
|
</list>
|
||||||
|
</t>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
<section anchor="security-considerations" title="Security Considerations">
|
<section anchor="security-considerations" title="Security Considerations">
|
||||||
|
@ -79,7 +105,6 @@ MUST review the name to ensure no sensitive information is included in the threa
|
||||||
|
|
||||||
<back>
|
<back>
|
||||||
<references title="Normative References">
|
<references title="Normative References">
|
||||||
<?rfc include="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"?>
|
|
||||||
<reference anchor="MISP-G" target="https://github.com/MISP/misp-galaxy">
|
<reference anchor="MISP-G" target="https://github.com/MISP/misp-galaxy">
|
||||||
<front>
|
<front>
|
||||||
<title>MISP Galaxy - Public repository </title>
|
<title>MISP Galaxy - Public repository </title>
|
||||||
|
@ -87,6 +112,7 @@ MUST review the name to ensure no sensitive information is included in the threa
|
||||||
<date></date>
|
<date></date>
|
||||||
</front>
|
</front>
|
||||||
</reference>
|
</reference>
|
||||||
|
<?rfc include="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"?>
|
||||||
</references>
|
</references>
|
||||||
<references title="Informative References">
|
<references title="Informative References">
|
||||||
<reference anchor="MISP-P" target="https://github.com/MISP">
|
<reference anchor="MISP-P" target="https://github.com/MISP">
|
||||||
|
|
Loading…
Reference in New Issue