Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stix Difficulties: Victim Targeting is embedded within a TTP #75

Open
terrymacdonald opened this issue Dec 2, 2015 · 0 comments
Open

Comments

@terrymacdonald
Copy link

PROBLEM

There are two types of information related to the Victim that are useful for defenders to have:

  • Specific information about a particular victim and what they lost (specific victim info)
  • General categorized information about what types of victim the attacker targets (general victim info)

Details about the Victim Organization are currently embedded within the TTP object.
http://stixproject.github.io/data-model/1.2/ttp/VictimTargetingType/

Having this Victim Targeting information embedded within the TTP object restricts users from being able to document the Victim Targeting independently of the TTP object. This means that information about a Victim being targeted cannot be shared unless a TTP object is generated. If the Victim doesn’t know any details about how they were hacked they would need to release a TTP empty except for their victim details.

The TTP appears to be focused on the general victim info.

POTENTIAL ANSWER

Specific Victim Info

By pulling out the Victim Targeting into its own object we enable the information about the Victim to be shared without knowledge of how they were hacked/affected. It means that someone can effectively notify they were targeted, and can then fill out and relate the TTP when they learn more. The producer can create a TTP later and relate them together when they learn how the attack took place.

APT Threat Actors often target Organizations based on the type of work they do, their position in the Defense Industrial base, Intellectual Property that they have, customers they may have, infrastructure they run or any other feature about them that is useful to the Threat Actor.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant