Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Mitre vs Thales RosettaStone #720

Merged
merged 4 commits into from
Jun 11, 2022
Merged

Add Mitre vs Thales RosettaStone #720

merged 4 commits into from
Jun 11, 2022

Conversation

Th4nat0s
Copy link
Contributor

Hi,

Since the release of https://cyberthreat.thalesgroup.com/sites/default/files/2022-05/THALES%20THREAT%20HANDBOOK%202022%20Light%20Version_1.pdf and the ATK nomenclature...

I definitively need a new rosetta stone !...

I am personally convinced that ATT&CK Group IDs should be the pivot :)

@adulau
Copy link
Member

adulau commented Jun 11, 2022

Thanks a lot for the work! Do you think Thales will maintain it or will provide a machine parseable document in the future?

I tend to agree with you for the pivot but the main issues are the following:

  • Many threat actor names start with a vendor deciding for the name;
  • ATT&CK Group IDs are set late and often some skipped because not having some relevance for MITRE;

Maybe something we could do for the future is to create a unique meta for each threat-actor name with the ATT&CK Group IDs. This would allow us to keep the flexibility and even allows other users of the galaxy to decide from which point to pivot from. I think we could do it automatically if Group ID exists and update the JSON accordingly.

@adulau
Copy link
Member

adulau commented Jun 11, 2022

I was reading the PDF and I found there are a lot of potential relationships to add.

@Th4nat0s
Copy link
Contributor Author

Hi @adulau

I dunno if Thales give it in a parsable way.. Maybe the futur could tell us :)
I still have 12 groups in the rapport not present in ATT&CK ( event old one like animal farm (ATK8)).

Anyway
I do agree main name should stay the discoverer one. some are nice :)

I agree also that Mitre is a bit late always, but in another hand very complete, and more or less a new "standard" to me.
For librairians and firm that do not feed by themselves the threat intel group zoo, it is the best source to use .
I just don't know how to contribute efficiently to them.

The Real problem for me is the split or merge...
For example in threat actor i see a of fusion APT38 and Corellite ( G0032& G0082).
I never see their "work" so , I'am not qualified to say that it is the same or a different group.
And it could happen.

To conclude.. It's a Mess, and we rely on it :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants