зеркало из
https://github.com/ceios/ceios.git
synced 2025-10-28 19:54:14 +02:00
Cyber-Influence-Operation-Analysis
Cyber-Influence Operation Analysis: Background, Documentation, and Modelling of Cyber and Disinformation Components.
Each documented cyber-influence operation has associated with it:
- A document which contains the following:
- A brief summary of the operation
- Resources for the information on the operation
- Necessary contextual information and timeline of the operation. This includes identifying where tactics, techniques, and procedures are used.
- The operation textually modelled using the MITRE ATT&CK Framework and DISARM Framework.
- An Attack Flow '.afb' file. Here the operation is modelled using the Attack Flow Builder
- The resources for the data, captured in the state found when resesarching the operation.
The strongest examples of our database are:
- APT 2017 French election campaign
- GRU 2016 US election campaign
- IRA 2016 FaceMusic Malware campaign
See Mitre's Original Attack Flow builder here: https://center-for-threat-informed-defense.github.io/attack-flow/ui/