зеркало из
https://github.com/ceios/ceios.git
synced 2025-10-29 12:06:04 +02:00
Cyber-Influence-Operation-Analysis
Cyber-Influence Operation Analysis: Background, Documentation, and Modelling of Cyber and Disinformation Components.
Each documented cyber-influence operation has associated with it:
- A document which contains the following:
- A brief summary of the operation
- Resources for the information on the operation
- Necessary contextual information and timeline of the operation. This includes identifying where tactics, techniques, and procedures are used.
- The operation textually modelled using the MITRE ATT&CK Framework and DISARM Framework.
- An Attack Flow '.afb' file. Here the operation is modelled using the Attack Flow Builder
- The resources for the data, captured in the state found when resesarching the operation.
See the modified Disarm-Attack Flow Builder here: https://github.com/Uni-JimMorris/disarm-attack-flow
See Mitre's Original Attack Flow builder here: https://center-for-threat-informed-defense.github.io/attack-flow/ui/