[ransomwarelive] feat(connector): enrich groups with aliases, leak si…#6300
Open
Lyra-Fox wants to merge 3 commits intoOpenCTI-Platform:masterfrom
Open
[ransomwarelive] feat(connector): enrich groups with aliases, leak si…#6300Lyra-Fox wants to merge 3 commits intoOpenCTI-Platform:masterfrom
Lyra-Fox wants to merge 3 commits intoOpenCTI-Platform:masterfrom
Conversation
…tes, external refs, and TTPs
Contributor License Agreement✅ CLA signed 💚 Thank you @Lyra-Fox for signing the Contributor License Agreement! Your pull request can now be reviewed and merged. We appreciate your contribution to Filigran's open source projects! ❤️ This is an automated message from the Filigran CLA Bot. |
…OMAINS and CONNECTOR_CREATE_LEAK_POST_REFS to false
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Proposed changes
altnameasaliaseson IntrusionSet and ThreatActorDomainNameobservables linked to the IntrusionSet viarelated-tousesrelationships from IntrusionSet to ATT&CKAttackPatternobjects for each group TTPCONNECTOR_CREATE_LEAK_SITE_DOMAINSto toggle ingestion of leak site domains and related URLs from group location entries in the ransomware.live profileCONNECTOR_CREATE_LEAK_POST_REFSto toggle inclusion of the direct link to the leak post on victim ReportsRelated issues
Closes: #6299
Checklist
Further comments
The two new toggles (
CONNECTOR_CREATE_LEAK_SITE_DOMAINS, andCONNECTOR_CREATE_LEAK_POST_REFS)both default totrue. however these toggles where included since ingesting this directly might be undesirable in some environments/locales.On reconsideration I have flipped the default for the new toggles to
falsein order to preserve backwards compatibility and to make it easier to comply with differing local regulations around handling links to leaked data.TTP correlation resolves against
AttackPatternobjects already present in OpenCTI (e.g. via the MITRE connector) and silently skips any TTP that has no match.The bulk of added lines ~620 are due to unit tests, which where previously missing from this connector but mandated by the contributing guidelines.