Code Monkey home page Code Monkey logo

darkquasar / aimod2 Goto Github PK

View Code? Open in Web Editor NEW
84.0 84.0 11.0 10.8 MB

Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proactively identify, engage and prevent cyber threats denying or mitigating potential damage to the organization.

Home Page: https://aimod2.com

License: Other

HTML 100.00%
adversarial-cyber-framework cyber-disruption cyber-security cyber-security-operations discovery-and-disruption mission-oriented-cyber-ops threat-hunting threat-hunting-framework

aimod2's People

Contributors

darkquasar avatar wikijm avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

aimod2's Issues

Define Threat Intelligence Hunt Type

As part of AIMOD2 Framework, there are 8 different hunt mission types as described in DAIKI. So far only one mission type has been defined (External Attack Vector Discovery). We need to define the Threat Intelligence mission type as well.

To consider when describing this mission type:

  • What is the background for it
  • What are the objectives of this mission type
  • Any considerations for activities performed for this mission type, and where do they fit within CAPEO

Threat Intel Hunt Missions

  • They need to be based on tactical threat intelligence products
  • Threat Intel reports that contain enough elements to describe attacker TTP can be leveraged for these missions
  • A process for qualifying the suitability of intel to be consumed by this hunt type can also be developed

Define Data Baselining Hunt Type

As part of AIMOD2 Framework, there are 8 different hunt mission types as described in DAIKI. So far only one mission type has been defined (External Attack Vector Discovery). We need to define the Data Baselining mission type as well.

To consider when describing this mission type:

  • What is the background for it
  • What are the objectives of this mission type
  • Any considerations for activities performed for this mission type, and where do they fit within CAPEO

Define Hypothesis Driven Mission Type

As part of AIMOD2 Framework, there are 8 different hunt mission types as described in DAIKI. So far only one mission type has been defined (External Attack Vector Discovery). We need to define the Hypothesis Driven mission type as well.

To consider when describing this mission type:

  • What is the background for it
  • What are the objectives of this mission type
  • Any considerations for activities performed for this mission type, and where do they fit within CAPEO

Define ML Assisted Modelling Mission Type

As part of AIMOD2 Framework, there are 8 different hunt mission types as described in DAIKI. So far only one mission type has been defined (External Attack Vector Discovery). We need to define the ML Assisted Modelling mission type as well.

To consider when describing this mission type:

  • What is the background for it
  • What are the objectives of this mission type
  • Any considerations for activities performed for this mission type, and where do they fit within CAPEO

Define Deceptive Operations Mission Type

As part of AIMOD2 Framework, there are 8 different hunt mission types as described in DAIKI. So far only one mission type has been defined (External Attack Vector Discovery). We need to define the Deceptive Operations mission type as well.

To consider when describing this mission type:

  • What is the background for it
  • What are the objectives of this mission type
  • Any considerations for activities performed for this mission type, and where do they fit within CAPEO

[Request] SVG version of diagrams

Hi @darkquasar

Would it be possible to share SVG version of diagrams instead of PNG?
I'm asking regarding #2, also because I like to have "stretchable" images to integrate them no matter the document/device I'm using.

Thanks!

Define Attack Modelling Mission Type

As part of AIMOD2 Framework, there are 8 different hunt mission types as described in DAIKI. So far only one mission type has been defined (External Attack Vector Discovery). We need to define the Attack Modelling mission type as well.

To consider when describing this mission type:

  • What is the background for it
  • What are the objectives of this mission type
  • Any considerations for activities performed for this mission type, and where do they fit within CAPEO

Attack Modelling

  • The concept for this mission is heavily linked to MITRE Attack Flow
  • This mission consists basically of an effort to capture attack paths and attack narratives so that they can be leveraged for threat hunting and cyber deception purposes
  • Possible ways to go about this are: crafting attack paths based on current and past red-team engagements, known threat actor activities or pentests

Define Joint Red & Blue Mission Type

As part of AIMOD2 Framework, there are 8 different hunt mission types as described in DAIKI. So far only one mission type has been defined (External Attack Vector Discovery). We need to define the Joint Red & Blue mission type as well.

To consider when describing this mission type:

  • What is the background for it
  • What are the objectives of this mission type
  • Any considerations for activities performed for this mission type, and where do they fit within CAPEO

Joint Red-Blue Missions

  • These missions need to consider both aspects of the engagement, the adversarial emulation one, and the detective one
  • They should be based on descriptions of plausible or likely attack narratives
  • Each step of the attack narrative is a milestone that serves as a touchpoint for the team or teams involved to consider artifacts produced and achieved impact
  • The mission should have clear exit criteria
  • The mission should produce outcomes that can be consumed by other security teams, control owners and other hunt mission types (like deceptive ops)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.