SlideShare a Scribd company logo
Using AMITT and ATT&CK Frameworks
SJ Terp, CogSecCollab, 2020
1
THREE LAYERS OF SECURITY
PHYSICAL
SECURITY
CYBER
SECURITY
COGNITIVE
SECURITY
ACTORS
Persistent
Manipulators
Advanced teams
β€’ Internet Research Agency
β€’ China, Iran teams etc
For-profit website networks
β€’ Antivax websites
β€’ pink slime sites
Nationstate media
β€’ Sputnik, etc
Service
Providers
Disinformation as a Service
β€’ Factories
β€’ Ex marketing, spam etc
Ad-Hoc paid teams
β€’ EBLA Ghana
β€’ PeaceData USA
Opportunists
Wares Sellers
β€’ Clicks
β€’ T-shirts
β€’ Books etc.
Groups
β€’ Conspiracy groups
β€’ Extremists
Individuals
β€’ Attention-seekers
β€’ Jokers etc
ACTORS
Disinformation SOCs
Large actors
* ISAOs
* Platforms
* Other large actors
Event-specific
* β€œWar rooms”
Disinformation Teams
Disinformation β€œdesk"
* in existing SOC
* Standalone unit
Investigators
* Journalists
* Academics
* Independent researchers
Other Responders
Policymakers
Law enforcement
Corporations
Influencers
Nonprofits
Educators
Individual researchers
Concerned citizens
CONNECT THESE EFFORTS
Hundreds of groups, large
and small, working on
different pieces /
approaches
Help them identify and
connect with one another
Facilitate collaboration and
communication
DISINFORMATION SECURITY OPERATIONS CENTERS
Risk Mitigation
Secure system
* Simulations
* Red teaming
* Penetration testing
* Team exercises
Check compliance
* compliance analysis
Enablement
Foundation work
* Data engineering
* Information frameworks
* Training
Operations
Incident response
* Discover
* Investigate
* Respond to threats
Research
* Threat intelligence
* Deeper investigations
COGSEC SOC GOALS
β€’ Inform: Summarise and share information about ongoing incidents
β€’ Neutralise: Disinformation incident response: triage, takedown, escalation.
β€’ Prevent: Collate disinformation indicators of compromise (IoCs) and vulnerabilities; supply to
organisations.
β€’ Support: Assess the possibility of direct attack, and ways to be ready for that.
β€’ Clearinghouse: Collate and share incident data, including with organizations focusing on
response and countercampaigns.
7
FRAMEWORKS AND STANDARDS
8
Campaigns
Incidents
Narratives
Artifacts
INCIDENT DOCUMENTATION
9
https://github.com/cogsec-collaborative/amitt_cti
AMITT KILL CHAIN MODELS
AMITT INTERDICTION MODELS
TOOL ADAPTATION: MISP
β€’ Threat sharing standard with large community
β€’ EU funded (ENISA, CIRCL)
β€’ ISAC, ISAO, CERTs, CSIRTs
β€’ NATO, Military, Intelligence
β€’ Fortune 500’s
β€’ Open data standards: MISP Core, STIX
β€’ Connections: API push/pull, Email, Anomali
ThreatStream, ThreatConnect,
OSQuery
β€’ New taxonomies
● DFRLab Dichotomies of Disinformation
● NATO Disinformation Taxonomy (WIP)
12
HITL AND AUTOMATION
Planning Preparation Execution Evaluation
https://cogsec-collab.org/
Planning Preparation Execution Evaluation
Attack
Defense

More Related Content

PPTX
Sj terp emerging tech radar
PDF
CSW2022_02_info_response_environments.pptx.pdf
PDF
CSW2022_09_riskassessment.pptx.pdf
PPTX
disinformation risk management: leveraging cyber security best practices to s...
PDF
CSW2022_06_influence.pptx.pdf
PDF
CSW2022_07_narratives.pptx.pdf
PPTX
Disarm vanguards 2022-02-25 (3)
PDF
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
Sj terp emerging tech radar
CSW2022_02_info_response_environments.pptx.pdf
CSW2022_09_riskassessment.pptx.pdf
disinformation risk management: leveraging cyber security best practices to s...
CSW2022_06_influence.pptx.pdf
CSW2022_07_narratives.pptx.pdf
Disarm vanguards 2022-02-25 (3)
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...

What's hot (20)

PPTX
Cyber threat intelligence: maturity and metrics
PDF
AI and Cybersecurity - Food for Thought
PDF
CSW2022_08_behaviours.pptx.pdf
PDF
CSW2022_05_data collection.pptx.pdf
PDF
CSW2022_01_introduction.pptx.pdf
PDF
WG-misinfosec report out to CredCo.pdf
PPTX
MISP EcoSystem - Threat Intelligence, VMRay, MISP
PPTX
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
PPTX
OpenSourceIntelligence-OSINT.pptx
PDF
Cybersecurity concepts & Defense best practises
PDF
How To Present Cyber Security To Senior Management Complete Deck
PPTX
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
PPTX
Iso27001 Risk Assessment Approach
PDF
Enterprise Cybersecurity: From Strategy to Operating Model
PDF
Incident Response
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PDF
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
PPTX
Threat modelling with_sample_application
PDF
Cyber threat intelligence ppt
PDF
CanSecWest_cogsec_course_01_introduction.pdf
Cyber threat intelligence: maturity and metrics
AI and Cybersecurity - Food for Thought
CSW2022_08_behaviours.pptx.pdf
CSW2022_05_data collection.pptx.pdf
CSW2022_01_introduction.pptx.pdf
WG-misinfosec report out to CredCo.pdf
MISP EcoSystem - Threat Intelligence, VMRay, MISP
Machine Learning & Cyber Security: Detecting Malicious URLs in the Haystack
OpenSourceIntelligence-OSINT.pptx
Cybersecurity concepts & Defense best practises
How To Present Cyber Security To Senior Management Complete Deck
AI Cybersecurity: Pros & Cons. AI is reshaping cybersecurity
Iso27001 Risk Assessment Approach
Enterprise Cybersecurity: From Strategy to Operating Model
Incident Response
INCIDENT RESPONSE NIST IMPLEMENTATION
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Threat modelling with_sample_application
Cyber threat intelligence ppt
CanSecWest_cogsec_course_01_introduction.pdf
Ad

Similar to Using AMITT and ATT&CK frameworks (20)

PPTX
The Business(es) of Disinformation
PDF
Threat Sharing for Human Rights
PPTX
2021-02-10_CogSecCollab_UBerkeley
PPTX
Distributed defense against disinformation: disinformation risk management an...
PPTX
2021 12 nyu-the_business_of_disinformation
PPSX
The Role of Social Media in Da'awah
PDF
FOSS and activism
PPTX
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
PDF
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
PPT
1482734.ppt
PPTX
The art and science of data-driven journalism
PDF
Iftf state sponsored_trolling_report
PPTX
Amcham Hcr Ctee 5 11 10
PPTX
SANSFIRE - Elections, Deceptions and Political Breaches
PPTX
IT Quiz MES
PPTX
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
PPTX
Risk, SOCs, and mitigations: cognitive security is coming of age
PPTX
Big data and development
DOCX
Galliotti Policy Reccomendation ISIS and social media
PPT
Internet Freedom and its Discontents
Β 
The Business(es) of Disinformation
Threat Sharing for Human Rights
2021-02-10_CogSecCollab_UBerkeley
Distributed defense against disinformation: disinformation risk management an...
2021 12 nyu-the_business_of_disinformation
The Role of Social Media in Da'awah
FOSS and activism
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
1482734.ppt
The art and science of data-driven journalism
Iftf state sponsored_trolling_report
Amcham Hcr Ctee 5 11 10
SANSFIRE - Elections, Deceptions and Political Breaches
IT Quiz MES
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
Risk, SOCs, and mitigations: cognitive security is coming of age
Big data and development
Galliotti Policy Reccomendation ISIS and social media
Internet Freedom and its Discontents
Β 
Ad

More from Sara-Jayne Terp (20)

PPTX
Cognitive security: all the other things
PPTX
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
PPTX
2020 12 nyu-workshop_cog_sec
PPTX
2020 09-01 disclosure
PDF
2019 11 terp_mansonbulletproof_master copy
PPTX
BSidesLV 2018 talk: social engineering at scale, a community guide
PPTX
Social engineering at scale
PPTX
engineering misinformation
PPTX
Online misinformation: they're coming for our brainz now
PPTX
Sj terp ciwg_nyc2017_credibility_belief
PPT
Belief: learning about new problems from old things
PPT
risks and mitigations of releasing data
PPTX
Session 10 handling bigger data
PPTX
Session 09 learning relationships.pptx
PPTX
Session 08 geospatial data
PPTX
Session 07 text data.pptx
PPTX
Session 07 text data.pptx
PPTX
Session 06 machine learning.pptx
PPTX
Session 05 cleaning and exploring
PPTX
Session 04 communicating results
Cognitive security: all the other things
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2020 12 nyu-workshop_cog_sec
2020 09-01 disclosure
2019 11 terp_mansonbulletproof_master copy
BSidesLV 2018 talk: social engineering at scale, a community guide
Social engineering at scale
engineering misinformation
Online misinformation: they're coming for our brainz now
Sj terp ciwg_nyc2017_credibility_belief
Belief: learning about new problems from old things
risks and mitigations of releasing data
Session 10 handling bigger data
Session 09 learning relationships.pptx
Session 08 geospatial data
Session 07 text data.pptx
Session 07 text data.pptx
Session 06 machine learning.pptx
Session 05 cleaning and exploring
Session 04 communicating results

Recently uploaded (20)

PDF
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
artificial intelligence overview of it and more
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
Introduction to the IoT system, how the IoT system works
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
The Internet -By the Numbers, Sri Lanka Edition
Β 
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Testing WebRTC applications at scale.pdf
PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
Introduction to Information and Communication Technology
πŸ’° π”πŠπ“πˆ πŠπ„πŒπ„ππ€ππ†π€π πŠπˆππ„π‘πŸ’πƒ π‡π€π‘πˆ 𝐈𝐍𝐈 πŸπŸŽπŸπŸ“ πŸ’°
Β 
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
artificial intelligence overview of it and more
Module 1 - Cyber Law and Ethics 101.pptx
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Introduction to the IoT system, how the IoT system works
An introduction to the IFRS (ISSB) Stndards.pdf
Introuction about WHO-FIC in ICD-10.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Β 
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
The Internet -By the Numbers, Sri Lanka Edition
Β 
Job_Card_System_Styled_lorem_ipsum_.pptx
Cloud-Scale Log Monitoring _ Datadog.pdf
Testing WebRTC applications at scale.pdf
international classification of diseases ICD-10 review PPT.pptx
Introduction to Information and Communication Technology

Using AMITT and ATT&CK frameworks

  • 1. Using AMITT and ATT&CK Frameworks SJ Terp, CogSecCollab, 2020 1
  • 2. THREE LAYERS OF SECURITY PHYSICAL SECURITY CYBER SECURITY COGNITIVE SECURITY
  • 3. ACTORS Persistent Manipulators Advanced teams β€’ Internet Research Agency β€’ China, Iran teams etc For-profit website networks β€’ Antivax websites β€’ pink slime sites Nationstate media β€’ Sputnik, etc Service Providers Disinformation as a Service β€’ Factories β€’ Ex marketing, spam etc Ad-Hoc paid teams β€’ EBLA Ghana β€’ PeaceData USA Opportunists Wares Sellers β€’ Clicks β€’ T-shirts β€’ Books etc. Groups β€’ Conspiracy groups β€’ Extremists Individuals β€’ Attention-seekers β€’ Jokers etc
  • 4. ACTORS Disinformation SOCs Large actors * ISAOs * Platforms * Other large actors Event-specific * β€œWar rooms” Disinformation Teams Disinformation β€œdesk" * in existing SOC * Standalone unit Investigators * Journalists * Academics * Independent researchers Other Responders Policymakers Law enforcement Corporations Influencers Nonprofits Educators Individual researchers Concerned citizens
  • 5. CONNECT THESE EFFORTS Hundreds of groups, large and small, working on different pieces / approaches Help them identify and connect with one another Facilitate collaboration and communication
  • 6. DISINFORMATION SECURITY OPERATIONS CENTERS Risk Mitigation Secure system * Simulations * Red teaming * Penetration testing * Team exercises Check compliance * compliance analysis Enablement Foundation work * Data engineering * Information frameworks * Training Operations Incident response * Discover * Investigate * Respond to threats Research * Threat intelligence * Deeper investigations
  • 7. COGSEC SOC GOALS β€’ Inform: Summarise and share information about ongoing incidents β€’ Neutralise: Disinformation incident response: triage, takedown, escalation. β€’ Prevent: Collate disinformation indicators of compromise (IoCs) and vulnerabilities; supply to organisations. β€’ Support: Assess the possibility of direct attack, and ways to be ready for that. β€’ Clearinghouse: Collate and share incident data, including with organizations focusing on response and countercampaigns. 7
  • 12. TOOL ADAPTATION: MISP β€’ Threat sharing standard with large community β€’ EU funded (ENISA, CIRCL) β€’ ISAC, ISAO, CERTs, CSIRTs β€’ NATO, Military, Intelligence β€’ Fortune 500’s β€’ Open data standards: MISP Core, STIX β€’ Connections: API push/pull, Email, Anomali ThreatStream, ThreatConnect, OSQuery β€’ New taxonomies ● DFRLab Dichotomies of Disinformation ● NATO Disinformation Taxonomy (WIP) 12
  • 13. HITL AND AUTOMATION Planning Preparation Execution Evaluation https://cogsec-collab.org/ Planning Preparation Execution Evaluation Attack Defense

Editor's Notes

  • #2: I’m SJ Terp - I lead CogSecCollab, a global volunteer organization dedicated to disinformation response. We build disinformation response tooling and processes, do framework and counter disinformation trainings, and help set up disinformation response groups. One of the things we do is adapt risk management and infosec processes and tools to counter disinformation and other digital harms. Today I’m talking about the AMITT ATT&CK-based frameworks.
  • #3: We started by socializing the idea of there being three layers of security: physical - e.g. access to the building; cyber - e.g. computers and computer networks, and cognitive - brains and human networks, e.g. communities and countries.
  • #4: There are many actors in this space. We hear a lot about threat actors - these are at different scales, with different capabilities and motivations. They’re learning from each other, and they often interact - for instance, we see t-shirt sellers picking up geopolitical narratives.
  • #5: But there are also response actors in this space. These are also at different scales, with different motivations, capabilities, and connections. Our work is on how best to join these together into a coordinated rapid response. And to do this, we’re borrowing the idea of a Security Operations Center or SOC - a coordinating unit, focussed on cognitive security, connected to other disinformation SOCs. These organizations are starting to exist. This won’t be the same for everyone, so we’re designing operations for different sizes of organization, from ISAO sized down to small teams embedded in an information security unit, to independent teams, with connections to a response network, maybe as information providers or responders.
  • #6: We’re mapping hundreds of teams around the world, looking for response capabilities and gaps. We’re a volunteer group, so CogSecCollab is specifically interested in other volunteer teams, but we know we’re part of a larger ecosystem, and part of my current consultancy work is helping UNDP set up disinformation response across different types of group in its pilot country. We need to remember respect. The way we connect people needs to respect the groups, the subjects of disinformation, and the accounts and groups being investigated. Disinformation is a joined-up problem, and we’re not going to counter it effectively without a joined-up response.
  • #7: Stealing from SOCs again, these SOCs do three basic things. Risk mitigation: SOCs work ahead of time to reduce the risk of disinformation. CogSecCollab has trialled a lot of this, for example doing risk assessments and running disinformation Red Team exercises all last year. Operations: SOCs work in real time to counter ongoing operations. This is tactical work, that we’re starting to see more teams doing. Enablement: And they do the infrastructure work that helps them do the other two tasks. Teams like GEC do this too.
  • #8: Here are some Disinformation SOC high-level activities. This is what we used in the CTI League disinformation team. Inform and Neutralise are operational response activities: communicating and countering with the techniques and connections available. The CTI League disinformation team did this for Covid19 disinformation across countries last year, and CogSecCollab ran teams during and after the 2020 US elections. Prevent and Support are risk reduction. FiveBy are releasing a report I wrote with them on pivoting their existing tech risk reduction work and narrative management capabilities to disinformation use. CSC does this too. Clearinghouse is Enablement. Β CogSecCollab added disinformation data to the CTI League’s infosec clearing houses last year.
  • #9: Almost every team benefits from data engineering, but another part of enablement is having a common lexicon, and models to rapidly share alerts with.Β  Here are the high-level entities that we model - - Disinformation creators have longer-term campaigns (e.g. destabilise French politics).Β  - They create incidents (e.g. a short burst of messages around a specific topic or event), based on narratives, which are the stories that we tell ourselves about who we are, who we belong to, who we don’t belong to and what is happening in the world around us.Β  - Narratives are the level that most disinformation works at.Β  - But as responders, what we generally see are the artefacts: the messages, the images, the accounts, the relationships and groups.
  • #10: And this is the first infosec technology CogSecCollab has adapted: the STIX standards for information sharing, used by ISACs to share alert data.Β  At the campaign level, we have threat actors and campaigns.Β  At the incident level, we have incidents, and the techniques used by all actors - both threat actors (the blue boxes), and response actors (the green boxes) in this diagram. We have narratives - these might be part of multiple incidents and campaigns.Β  And we have the artifacts connected to incidents and campaigns.Β  STIX has other objects, including indicators and vulnerabilities, that we're also adapting for disinformation alongside other groups.
  • #11: This is the AMITT Red framework: the disinformation version of MITRE ATT&CK that we built to model the stages and techniques in disinformation creation.Β  Looking at this from the top to the bottom, the first line is operational phases, then the blue boxes are β€œtactic stages”, links in the disinformation kill chain. The kill chain is different: we tried to fit it to the existing one, but it didn’t cover every part of disinformation. The grey boxes are the TTPs (tactic, technique, or procedure) that allow you to complete each stage. TTPs are behaviors that we can view examples and counters for, and the Cognitive Security Intelligence Centre is adding indicators to this. AMITT Red is deliberately similar to the ATT&CK TTP framework, so you can use all ATT&CK-compatible tools with it.
  • #12: This is the AMITT Blue framework:Β it contains 160 countermoves to the campaign and incident techniques that we analysed with AMITT Red.Β  We used information operations frameworks to create this, specifically the classifications Deny, Disrupt:, Degrade, Deceive:, Destroy, and Deter - for each tactic stage and Red technique. We’ve partnered with counter-disinformation groups like RealityTeam.org who use targeted counter messaging and metrics to push away disinformation narratives. And we’re currently cleaning this matrix up.
  • #13: This is one of the tools we've adapted: MISP is open-source and commonly used for infosec information sharing.Β  It’s used by CERTs and intelligence agencies, and integrates with most CTI platforms. AMITT models now ship with every MISP open-source system.
  • #14: AMITT red and blue are also being used by the European Union for describing disinformation,Β  by the creators of the BadNewsGame and Harmony Square for gaming out disinformation responses, by other teams around the world, and we've tried them with NATO, several countries, and are talking with MITRE. And here is one of the other things we do: analysing which parts of disinformation response we can automate, using AMITT as a guide.Β