chg: [threat-actor-naming] more guidelines (WiP)

pull/36/head
Alexandre Dulaunoy 2020-06-12 07:44:14 +02:00
parent 5133dbec55
commit a40043c9cf
No known key found for this signature in database
GPG Key ID: 09E2CD4944E6CBCD
4 changed files with 188 additions and 47 deletions

View File

@ -49,6 +49,18 @@ and threat intelligence platforms such as MISP [@?MISP-P]].
# Introduction # Introduction
In threat intelligence, a name can be assigned to a threat actor without specific guidelines. This leads to issues such
as a:
- A proliferation of threat actor names generating overlaps or different names for similar threat actors (e.g. some threat actors have more than 10 synonyms)
- Ambiguity in the words used to name the threat actor in different contexts (e.g. using common words)
- No clearly defined text format to describe the same threat actor (e.g. Is the threat actor name case sensitive? Is there a dash or a space between the two words?)
- Confusion between techniques/tools used by a threat actor versus its name (e.g. naming a threat actor after a specific malware used)
- Lack of source and list from vendors to describe their threat actor names and the reasoning behind the naming (e.g. did they name the threat actor after a specific set of campaigns? or specific set of targets?)
This document proposes a set of guidelines to name threat actors. The goal is to reduce the above mentioned issues.
## Conventions and Terminology ## Conventions and Terminology
The key words "**MUST**", "**MUST NOT**", "**REQUIRED**", "**SHALL**", "**SHALL NOT**", The key words "**MUST**", "**MUST NOT**", "**REQUIRED**", "**SHALL**", "**SHALL NOT**",
@ -57,6 +69,8 @@ document are to be interpreted as described in RFC 2119 [@!RFC2119].
# Recommendations # Recommendations
The recommendations listed below provide a minimal set of guidelines while assigning a new name to a threat actor.
## Reusing threat actor naming ## Reusing threat actor naming
Before creating a new threat actor name, you **MUST** consider a review of existing threat actor names from databases such as the threat actor Before creating a new threat actor name, you **MUST** consider a review of existing threat actor names from databases such as the threat actor
@ -64,16 +78,29 @@ MISP galaxy [@!MISP-G]. Proliferation of threat actor names is a significant cha
reuse an existing threat actor name. If there is no specific threat actor name, you **SHALL** create a new threat actor following the best reuse an existing threat actor name. If there is no specific threat actor name, you **SHALL** create a new threat actor following the best
practices defined in this document. practices defined in this document.
## Don't confuse actor naming with malware naming ## Uniqueness
When choosing a threat actor name, uniqueness is a critical property. The threat actor name **MUST** be unique and not existing in different contexts.
## Format ## Format
## Encoding ## Encoding
The name of the threat actor **MUST** be expressed in ASCII 7-bit. Assigning a localized name to a threat actor **MAY** create a set of ambiguity about different localized version of the same threat actor.
## Don't confuse actor naming with malware naming
The name of the threat actor **MUST NOT** be assigned based on the tools or techniques used by the threat actor. A notorious example in the threat intelligence community is Turla which can name a threat actor but also a malware used by this group or other groups.
## Directory ## Directory
# Examples # Examples
Some known examples are included below and serve as reference for good practices in naming threat actors. The below threat actor names can be considered good example :
- APT-1
- TA-505
# Security Considerations # Security Considerations
Naming a threat actor could include specific sensitive reference to a case or an incident. Before releasing the naming, the creator Naming a threat actor could include specific sensitive reference to a case or an incident. Before releasing the naming, the creator

View File

@ -378,10 +378,11 @@
<link href="#rfc.section.1.1" rel="Chapter" title="1.1 Conventions and Terminology"> <link href="#rfc.section.1.1" rel="Chapter" title="1.1 Conventions and Terminology">
<link href="#rfc.section.2" rel="Chapter" title="2 Recommendations"> <link href="#rfc.section.2" rel="Chapter" title="2 Recommendations">
<link href="#rfc.section.2.1" rel="Chapter" title="2.1 Reusing threat actor naming"> <link href="#rfc.section.2.1" rel="Chapter" title="2.1 Reusing threat actor naming">
<link href="#rfc.section.2.2" rel="Chapter" title="2.2 Don't confuse actor naming with malware naming"> <link href="#rfc.section.2.2" rel="Chapter" title="2.2 Uniqueness">
<link href="#rfc.section.2.3" rel="Chapter" title="2.3 Format"> <link href="#rfc.section.2.3" rel="Chapter" title="2.3 Format">
<link href="#rfc.section.2.4" rel="Chapter" title="2.4 Encoding"> <link href="#rfc.section.2.4" rel="Chapter" title="2.4 Encoding">
<link href="#rfc.section.2.5" rel="Chapter" title="2.5 Directory"> <link href="#rfc.section.2.5" rel="Chapter" title="2.5 Don't confuse actor naming with malware naming">
<link href="#rfc.section.2.6" rel="Chapter" title="2.6 Directory">
<link href="#rfc.section.3" rel="Chapter" title="3 Examples"> <link href="#rfc.section.3" rel="Chapter" title="3 Examples">
<link href="#rfc.section.4" rel="Chapter" title="4 Security Considerations"> <link href="#rfc.section.4" rel="Chapter" title="4 Security Considerations">
<link href="#rfc.section.5" rel="Chapter" title="5 Acknowledgements"> <link href="#rfc.section.5" rel="Chapter" title="5 Acknowledgements">
@ -456,13 +457,15 @@
</li> </li>
<ul><li>2.1. <a href="#rfc.section.2.1">Reusing threat actor naming</a> <ul><li>2.1. <a href="#rfc.section.2.1">Reusing threat actor naming</a>
</li> </li>
<li>2.2. <a href="#rfc.section.2.2">Don't confuse actor naming with malware naming</a> <li>2.2. <a href="#rfc.section.2.2">Uniqueness</a>
</li> </li>
<li>2.3. <a href="#rfc.section.2.3">Format</a> <li>2.3. <a href="#rfc.section.2.3">Format</a>
</li> </li>
<li>2.4. <a href="#rfc.section.2.4">Encoding</a> <li>2.4. <a href="#rfc.section.2.4">Encoding</a>
</li> </li>
<li>2.5. <a href="#rfc.section.2.5">Directory</a> <li>2.5. <a href="#rfc.section.2.5">Don't confuse actor naming with malware naming</a>
</li>
<li>2.6. <a href="#rfc.section.2.6">Directory</a>
</li> </li>
</ul><li>3. <a href="#rfc.section.3">Examples</a> </ul><li>3. <a href="#rfc.section.3">Examples</a>
</li> </li>
@ -487,6 +490,19 @@
<h1 id="rfc.section.1"> <h1 id="rfc.section.1">
<a href="#rfc.section.1">1.</a> <a href="#introduction" id="introduction">Introduction</a> <a href="#rfc.section.1">1.</a> <a href="#introduction" id="introduction">Introduction</a>
</h1> </h1>
<p id="rfc.section.1.p.1">In threat intelligence, a name can be assigned to a threat actor without specific guidelines. This leads to issues such as a:</p>
<p></p>
<ul>
<li>A proliferation of threat actor names generating overlaps or different names for similar threat actors (e.g. some threat actors have more than 10 synonyms)</li>
<li>Ambiguity in the words used to name the threat actor in different contexts (e.g. using common words)</li>
<li>No clearly defined text format to describe the same threat actor (e.g. Is the threat actor name case sensitive? Is there a dash or a space between the two words?)</li>
<li>Confusion between techniques/tools used by a threat actor versus its name (e.g. naming a threat actor after a specific malware used)</li>
<li>Lack of source and list from vendors to describe their threat actor names and the reasoning behind the naming (e.g. did they name the threat actor after a specific set of campaigns? or specific set of targets?)</li>
</ul>
<p> </p>
<p id="rfc.section.1.p.3">This document proposes a set of guidelines to name threat actors. The goal is to reduce the above mentioned issues.</p>
<h1 id="rfc.section.1.1"> <h1 id="rfc.section.1.1">
<a href="#rfc.section.1.1">1.1.</a> <a href="#conventions-and-terminology" id="conventions-and-terminology">Conventions and Terminology</a> <a href="#rfc.section.1.1">1.1.</a> <a href="#conventions-and-terminology" id="conventions-and-terminology">Conventions and Terminology</a>
</h1> </h1>
@ -494,25 +510,41 @@
<h1 id="rfc.section.2"> <h1 id="rfc.section.2">
<a href="#rfc.section.2">2.</a> <a href="#recommendations" id="recommendations">Recommendations</a> <a href="#rfc.section.2">2.</a> <a href="#recommendations" id="recommendations">Recommendations</a>
</h1> </h1>
<p id="rfc.section.2.p.1">The recommendations listed below provide a minimal set of guidelines while assigning a new name to a threat actor.</p>
<h1 id="rfc.section.2.1"> <h1 id="rfc.section.2.1">
<a href="#rfc.section.2.1">2.1.</a> <a href="#reusing-threat-actor-naming" id="reusing-threat-actor-naming">Reusing threat actor naming</a> <a href="#rfc.section.2.1">2.1.</a> <a href="#reusing-threat-actor-naming" id="reusing-threat-actor-naming">Reusing threat actor naming</a>
</h1> </h1>
<p id="rfc.section.2.1.p.1">Before creating a new threat actor name, you MUST consider a review of existing threat actor names from databases such as the threat actor MISP galaxy <a href="#MISP-G" class="xref">[MISP-G]</a>. Proliferation of threat actor names is a significant challenge for the day-to-day analyst work. If your threat actor defined an existing threat actor, you MUST reuse an existing threat actor name. If there is no specific threat actor name, you SHALL create a new threat actor following the best practices defined in this document.</p> <p id="rfc.section.2.1.p.1">Before creating a new threat actor name, you MUST consider a review of existing threat actor names from databases such as the threat actor MISP galaxy <a href="#MISP-G" class="xref">[MISP-G]</a>. Proliferation of threat actor names is a significant challenge for the day-to-day analyst work. If your threat actor defined an existing threat actor, you MUST reuse an existing threat actor name. If there is no specific threat actor name, you SHALL create a new threat actor following the best practices defined in this document.</p>
<h1 id="rfc.section.2.2"> <h1 id="rfc.section.2.2">
<a href="#rfc.section.2.2">2.2.</a> <a href="#don-t-confuse-actor-naming-with-malware-naming" id="don-t-confuse-actor-naming-with-malware-naming">Don't confuse actor naming with malware naming</a> <a href="#rfc.section.2.2">2.2.</a> <a href="#uniqueness" id="uniqueness">Uniqueness</a>
</h1> </h1>
<p id="rfc.section.2.2.p.1">When choosing a threat actor name, uniqueness is a critical property. The threat actor name MUST be unique and not existing in different contexts.</p>
<h1 id="rfc.section.2.3"> <h1 id="rfc.section.2.3">
<a href="#rfc.section.2.3">2.3.</a> <a href="#format" id="format">Format</a> <a href="#rfc.section.2.3">2.3.</a> <a href="#format" id="format">Format</a>
</h1> </h1>
<h1 id="rfc.section.2.4"> <h1 id="rfc.section.2.4">
<a href="#rfc.section.2.4">2.4.</a> <a href="#encoding" id="encoding">Encoding</a> <a href="#rfc.section.2.4">2.4.</a> <a href="#encoding" id="encoding">Encoding</a>
</h1> </h1>
<p id="rfc.section.2.4.p.1">The name of the threat actor MUST be expressed in ASCII 7-bit. Assigning a localized name to a threat actor MAY create a set of ambiguity about different localized version of the same threat actor.</p>
<h1 id="rfc.section.2.5"> <h1 id="rfc.section.2.5">
<a href="#rfc.section.2.5">2.5.</a> <a href="#directory" id="directory">Directory</a> <a href="#rfc.section.2.5">2.5.</a> <a href="#don-t-confuse-actor-naming-with-malware-naming" id="don-t-confuse-actor-naming-with-malware-naming">Don't confuse actor naming with malware naming</a>
</h1>
<p id="rfc.section.2.5.p.1">The name of the threat actor MUST NOT be assigned based on the tools or techniques used by the threat actor. A notorious example in the threat intelligence community is Turla which can name a threat actor but also a malware used by this group or other groups.</p>
<h1 id="rfc.section.2.6">
<a href="#rfc.section.2.6">2.6.</a> <a href="#directory" id="directory">Directory</a>
</h1> </h1>
<h1 id="rfc.section.3"> <h1 id="rfc.section.3">
<a href="#rfc.section.3">3.</a> <a href="#examples" id="examples">Examples</a> <a href="#rfc.section.3">3.</a> <a href="#examples" id="examples">Examples</a>
</h1> </h1>
<p id="rfc.section.3.p.1">Some known examples are included below and serve as reference for good practices in naming threat actors. The below threat actor names can be considered good example :</p>
<p></p>
<ul>
<li>APT-1</li>
<li>TA-505</li>
</ul>
<p> </p>
<h1 id="rfc.section.4"> <h1 id="rfc.section.4">
<a href="#rfc.section.4">4.</a> <a href="#security-considerations" id="security-considerations">Security Considerations</a> <a href="#rfc.section.4">4.</a> <a href="#security-considerations" id="security-considerations">Security Considerations</a>
</h1> </h1>

View File

@ -61,24 +61,59 @@ Internet-Draft Recommendations on naming threat actors June 2020
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1. Conventions and Terminology . . . . . . . . . . . . . . . 2 1.1. Conventions and Terminology . . . . . . . . . . . . . . . 3
2. Recommendations . . . . . . . . . . . . . . . . . . . . . . . 2 2. Recommendations . . . . . . . . . . . . . . . . . . . . . . . 3
2.1. Reusing threat actor naming . . . . . . . . . . . . . . . 2 2.1. Reusing threat actor naming . . . . . . . . . . . . . . . 3
2.2. Don't confuse actor naming with malware naming . . . . . 2 2.2. Uniqueness . . . . . . . . . . . . . . . . . . . . . . . 3
2.3. Format . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.3. Format . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.4. Encoding . . . . . . . . . . . . . . . . . . . . . . . . 3 2.4. Encoding . . . . . . . . . . . . . . . . . . . . . . . . 3
2.5. Directory . . . . . . . . . . . . . . . . . . . . . . . . 3 2.5. Don't confuse actor naming with malware naming . . . . . 3
3. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.6. Directory . . . . . . . . . . . . . . . . . . . . . . . . 3
4. Security Considerations . . . . . . . . . . . . . . . . . . . 3 3. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 4
5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 3 4. Security Considerations . . . . . . . . . . . . . . . . . . . 4
6. References . . . . . . . . . . . . . . . . . . . . . . . . . 3 5. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 4
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 3 6. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
7.1. Normative References . . . . . . . . . . . . . . . . . . 3 7. References . . . . . . . . . . . . . . . . . . . . . . . . . 4
7.2. Informative References . . . . . . . . . . . . . . . . . 3 7.1. Normative References . . . . . . . . . . . . . . . . . . 4
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 3 7.2. Informative References . . . . . . . . . . . . . . . . . 4
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 4
1. Introduction 1. Introduction
In threat intelligence, a name can be assigned to a threat actor
without specific guidelines. This leads to issues such as a:
o A proliferation of threat actor names generating overlaps or
different names for similar threat actors (e.g. some threat actors
have more than 10 synonyms)
o Ambiguity in the words used to name the threat actor in different
contexts (e.g. using common words)
o No clearly defined text format to describe the same threat actor
(e.g. Is the threat actor name case sensitive? Is there a dash
or a space between the two words?)
o Confusion between techniques/tools used by a threat actor versus
its name (e.g. naming a threat actor after a specific malware
used)
o Lack of source and list from vendors to describe their threat
actor names and the reasoning behind the naming (e.g. did they
name the threat actor after a specific set of campaigns? or
specific set of targets?)
This document proposes a set of guidelines to name threat actors.
The goal is to reduce the above mentioned issues.
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 2]
Internet-Draft Recommendations on naming threat actors June 2020
1.1. Conventions and Terminology 1.1. Conventions and Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
@ -87,6 +122,9 @@ Table of Contents
2. Recommendations 2. Recommendations
The recommendations listed below provide a minimal set of guidelines
while assigning a new name to a threat actor.
2.1. Reusing threat actor naming 2.1. Reusing threat actor naming
Before creating a new threat actor name, you MUST consider a review Before creating a new threat actor name, you MUST consider a review
@ -98,10 +136,28 @@ Table of Contents
name, you SHALL create a new threat actor following the best name, you SHALL create a new threat actor following the best
practices defined in this document. practices defined in this document.
2.2. Don't confuse actor naming with malware naming 2.2. Uniqueness
When choosing a threat actor name, uniqueness is a critical property.
The threat actor name MUST be unique and not existing in different
contexts.
2.3. Format 2.3. Format
2.4. Encoding
The name of the threat actor MUST be expressed in ASCII 7-bit.
Assigning a localized name to a threat actor MAY create a set of
ambiguity about different localized version of the same threat actor.
2.5. Don't confuse actor naming with malware naming
The name of the threat actor MUST NOT be assigned based on the tools
or techniques used by the threat actor. A notorious example in the
threat intelligence community is Turla which can name a threat actor
but also a malware used by this group or other groups.
2.6. Directory
@ -109,17 +165,21 @@ Table of Contents
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 2] Dulaunoy & Bourmeau Expires December 11, 2020 [Page 3]
Internet-Draft Recommendations on naming threat actors June 2020 Internet-Draft Recommendations on naming threat actors June 2020
2.4. Encoding
2.5. Directory
3. Examples 3. Examples
Some known examples are included below and serve as reference for
good practices in naming threat actors. The below threat actor names
can be considered good example :
o APT-1
o TA-505
4. Security Considerations 4. Security Considerations
Naming a threat actor could include specific sensitive reference to a Naming a threat actor could include specific sensitive reference to a
@ -154,6 +214,18 @@ Internet-Draft Recommendations on naming threat actors June 2020
Authors' Addresses Authors' Addresses
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 4]
Internet-Draft Recommendations on naming threat actors June 2020
Alexandre Dulaunoy Alexandre Dulaunoy
Computer Incident Response Center Luxembourg Computer Incident Response Center Luxembourg
16, bd d'Avranches 16, bd d'Avranches
@ -164,12 +236,6 @@ Authors' Addresses
Email: alexandre.dulaunoy@circl.lu Email: alexandre.dulaunoy@circl.lu
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 3]
Internet-Draft Recommendations on naming threat actors June 2020
Pauline Bourmeau Pauline Bourmeau
Corexalys Corexalys
26 Rue de la Bienfaisance 26 Rue de la Bienfaisance
@ -211,14 +277,4 @@ Internet-Draft Recommendations on naming threat actors June 2020
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 5]
Dulaunoy & Bourmeau Expires December 11, 2020 [Page 4]

View File

@ -30,6 +30,18 @@ and threat intelligence platforms such as MISP <xref target="MISP-P"></xref>].</
<middle> <middle>
<section anchor="introduction" title="Introduction"> <section anchor="introduction" title="Introduction">
<t>In threat intelligence, a name can be assigned to a threat actor without specific guidelines. This leads to issues such
as a:</t>
<t>
<list style="symbols">
<t>A proliferation of threat actor names generating overlaps or different names for similar threat actors (e.g. some threat actors have more than 10 synonyms)</t>
<t>Ambiguity in the words used to name the threat actor in different contexts (e.g. using common words)</t>
<t>No clearly defined text format to describe the same threat actor (e.g. Is the threat actor name case sensitive? Is there a dash or a space between the two words?)</t>
<t>Confusion between techniques/tools used by a threat actor versus its name (e.g. naming a threat actor after a specific malware used)</t>
<t>Lack of source and list from vendors to describe their threat actor names and the reasoning behind the naming (e.g. did they name the threat actor after a specific set of campaigns? or specific set of targets?)</t>
</list>
</t>
<t>This document proposes a set of guidelines to name threat actors. The goal is to reduce the above mentioned issues.</t>
<section anchor="conventions-and-terminology" title="Conventions and Terminology"> <section anchor="conventions-and-terminology" title="Conventions and Terminology">
<t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;, <t>The key words &quot;MUST&quot;, &quot;MUST NOT&quot;, &quot;REQUIRED&quot;, &quot;SHALL&quot;, &quot;SHALL NOT&quot;,
@ -39,6 +51,7 @@ document are to be interpreted as described in RFC 2119 <xref target="RFC2119"><
</section> </section>
<section anchor="recommendations" title="Recommendations"> <section anchor="recommendations" title="Recommendations">
<t>The recommendations listed below provide a minimal set of guidelines while assigning a new name to a threat actor.</t>
<section anchor="reusing-threat-actor-naming" title="Reusing threat actor naming"> <section anchor="reusing-threat-actor-naming" title="Reusing threat actor naming">
<t>Before creating a new threat actor name, you MUST consider a review of existing threat actor names from databases such as the threat actor <t>Before creating a new threat actor name, you MUST consider a review of existing threat actor names from databases such as the threat actor
@ -47,13 +60,19 @@ reuse an existing threat actor name. If there is no specific threat actor name,
practices defined in this document.</t> practices defined in this document.</t>
</section> </section>
<section anchor="don-t-confuse-actor-naming-with-malware-naming" title="Don't confuse actor naming with malware naming"> <section anchor="uniqueness" title="Uniqueness">
<t>When choosing a threat actor name, uniqueness is a critical property. The threat actor name MUST be unique and not existing in different contexts.</t>
</section> </section>
<section anchor="format" title="Format"> <section anchor="format" title="Format">
</section> </section>
<section anchor="encoding" title="Encoding"> <section anchor="encoding" title="Encoding">
<t>The name of the threat actor MUST be expressed in ASCII 7-bit. Assigning a localized name to a threat actor MAY create a set of ambiguity about different localized version of the same threat actor.</t>
</section>
<section anchor="don-t-confuse-actor-naming-with-malware-naming" title="Don't confuse actor naming with malware naming">
<t>The name of the threat actor MUST NOT be assigned based on the tools or techniques used by the threat actor. A notorious example in the threat intelligence community is Turla which can name a threat actor but also a malware used by this group or other groups.</t>
</section> </section>
<section anchor="directory" title="Directory"> <section anchor="directory" title="Directory">
@ -61,6 +80,13 @@ practices defined in this document.</t>
</section> </section>
<section anchor="examples" title="Examples"> <section anchor="examples" title="Examples">
<t>Some known examples are included below and serve as reference for good practices in naming threat actors. The below threat actor names can be considered good example :</t>
<t>
<list style="symbols">
<t>APT-1</t>
<t>TA-505</t>
</list>
</t>
</section> </section>
<section anchor="security-considerations" title="Security Considerations"> <section anchor="security-considerations" title="Security Considerations">
@ -79,7 +105,6 @@ MUST review the name to ensure no sensitive information is included in the threa
<back> <back>
<references title="Normative References"> <references title="Normative References">
<?rfc include="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"?>
<reference anchor="MISP-G" target="https://github.com/MISP/misp-galaxy"> <reference anchor="MISP-G" target="https://github.com/MISP/misp-galaxy">
<front> <front>
<title>MISP Galaxy - Public repository </title> <title>MISP Galaxy - Public repository </title>
@ -87,6 +112,7 @@ MUST review the name to ensure no sensitive information is included in the threa
<date></date> <date></date>
</front> </front>
</reference> </reference>
<?rfc include="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"?>
</references> </references>
<references title="Informative References"> <references title="Informative References">
<reference anchor="MISP-P" target="https://github.com/MISP"> <reference anchor="MISP-P" target="https://github.com/MISP">