Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Reshape actor configs to be modelled after the MITRE ATT&CK framework #123

Open
kkneomis opened this issue May 20, 2023 · 0 comments
Open

Comments

@kkneomis
Copy link
Collaborator

Rather than being an arbitrary hodgepodge of key values pairs, the actor configs should be modeled after the Mitre Att&ck framework.
Primarily, the outer keys should correspond to the categories in MitreAttack
See: https://attack.mitre.org/matrices/enterprise/

Proposed example actor config

metadata:
  name: arsenalpt
  effectiveness: 70
  count_init_passive_dns: 4
  max_wave_size: 3
  activity_start_date: "2023-06-01"
  activity_end_date: "2023-07-13"
  activity_start_hour: 14
  workday_length_hours: 10
  working_days:
    - Monday
    - Tuesday
    - Wednesday
    - Thursday
    - Friday
reconnaissance:
  recon_search_terms:
    - "research facility"
    - "researchers"
    - "research managers"
    - "radstone research"
    - "government"
    - "projects"
resource_development:
  domain_themes:
    - research
    - management
    - equipment
    - government
    - funding
  tlds:
    - com
  malware:
    - aptrad
initial_access:
  attacks:
    - recon:browsing
    - identity:password_spray
    - watering_hole:phishing
    - watering_hole:malware_delivery
  watering_hole_target_roles:
    - Director of Research
    - Research Scientist
    - Research Assistant
    - Research Coordinator
    - Biostatistician
    - Clinical Research Coordinator
    - Data Manager
    - Lab Technician
    - Research Administrator
    - Postdoctoral Fellow
    - Grant Writer
  watering_hole_domains:
    - lifecarepharmaco.com
  spoofs_email: True
discovery:
  commands:
    - name: cmd.exe
      process: net share
    - name: cmd.exe
      process: cmd.exe /C net group "Domain Admins" /domain
    - name: netstat.exe
      process: netstat -aon
    - name: cmd.exe
      process: cmd.exe /c ping %userdomain%
lateral_movement:
  actions:
    - internal_spearphishing
    - pass_the_hash
    - lateral_tool_transfer
exfiltration:
  commands:
    - name: cmd.exe
      process: net share
    - name: cmd.exe
      process: cmd.exe /C net group "Domain Admins" /domain
  actions:
    - encrypt_file
    - drop_ransom_note
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant