Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Created Engage - Updated GrayZone #284

Open
wants to merge 7 commits into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
72 changes: 39 additions & 33 deletions GrayZone/machinetag.json
Original file line number Diff line number Diff line change
Expand Up @@ -24,12 +24,8 @@
"expanded": "Tarpits, Sandboxes and Honeypots"
},
{
"value": "Threat Intelligence",
"expanded": "Threat Intelligence"
},
{
"value": "Threat Hunting",
"expanded": "Threat Hunting"
"value": "Intelligence and Counterintelligence",
"expanded": "Intelligence and Counterintelligence"
},
{
"value": "Adversary Takedowns",
Expand Down Expand Up @@ -126,11 +122,6 @@
"value": "CounterDeception",
"expanded": "Answer to deception",
"description": "Answer to deception from adversary is counter-deception, for example: answer to phish with shadow user account to uncover next adversary actions"
},
{
"value": "Counter-Deception",
"expanded": "Active counterdeception",
"description": "Answer to adversary deception and his tactical goals, example: if You know the adversary goal(extraction) You can plant documents with fake content to enable damage on adversary sources (fake blueprints of engine, which explode on purpose)"
}
]
},
Expand All @@ -155,37 +146,52 @@
]
},
{
"predicate": "Threat Intelligence",
"predicate": "Intelligence and Counterintelligence",
"entry": [
{
"value": "Passive - OSINT",
"expanded": "OpenSourceINTelligence",
"description": "Use of OSINT for creating of Threat Intelligence"
"value": "Intel Passive",
"expanded": "Passive gathering, managing etc. of threat intelligence. Ie. getting data from public, available resources",
"description": "Getting threat intel from open and publicly available resources"
},
{
"value": "Passive - platforms",
"expanded": "Platforms for TI",
"description": "Save, share and collaborate on threat intelligence platforms"
"value": "Intel Active",
"expanded": "Active or proactive intel gathering, collecting etc. Ie. closed resources as private forums, gossip ...",
"description": "Getting threat intel from closed resources or trusted parties as private chats or exploitation of groups etc."
},
{
"value": "Counter-Intelligence public",
"expanded": "Counter Intelligence",
"description": "Active retrieval of Threat Intelligence for purpose of defense collected with available public resources - example: active monitoring of web services to uncover action before happen (forum hacktivist group)"
"value": "Counterintel Defensive",
"expanded": "Includes subcategories as Deterrence and Detection ",
"description": "Focuses on detecting and neutralizing adversary efforts to compromise or exploit digital systems."
},
{
"value": "Counter-Intelligence government",
"expanded": "Counter Intelligence",
"description": "Active retrieval of Threat Intelligence for purpose of defense collected with non-public resources - example: cooperation between secret services in EU"
}
]
},
{
"predicate": "Threat Hunting",
"entry": [
"value": "Counterintel Defensive - Deterrence",
"expanded": "Deterrende in cyber space as part of strategy",
"description": "Aims to discourage adversary actions by demonstrating strong protective measures and potential consequences."
},
{
"value": "Counterintel Defensive - Detection",
"expanded": "Detection Engineering",
"description": "Ideally focuses on identifying and exposing adversary activities before they can cause harm."
},
{
"value": "Counterintel Offensive",
"expanded": "Includes subcategories as Detection, Deception and Neutralization",
"description": "Involves actively disrupting or deceiving adversary intelligence operations to gain strategic advantage"
},
{
"value": "Counterintel Offensive - Detection",
"expanded": "Detect operations of adversary before they reach friendly environment",
"description": "Detection involves actively identifying and exposing adversary cyber operations to disrupt their efforts."
},
{
"value": "Counterintel Offensive - Deception",
"expanded": "Creating deception campaigns, fake accounts, penetrating adversary communication with use of deception...",
"description": "Uses false information and tactics to mislead and confuse adversaries in their cyber operations."
},
{
"value": "Threat Hunting",
"expanded": "Threat Hunting",
"description": "Threat Hunting is the activity of active search for possible signs of adversary in environment"
"value": "Counterintel Offensive - Neutralization",
"expanded": "Adversary disruption as influence operation, environment disturbance to prevent adversary operations...",
"description": "Neutralization aims to disrupt and eliminate adversary cyber threats before they can inflict damage."
}
]
},
Expand Down
Loading