Mapping Methodology

The Vocabulary for Event Recording and Incident Sharing (VERIS) provides a common language for describing security incidents in a structured and repeatable manner. The overall goal is to lay a foundation from which cyber analysts can constructively and cooperatively learn to better measure and manage risk.

VERIS employs a threat model with four primary axes, the “A4” model, to describe incidents. The four axes are:

  • Actors: Whose actions affected the assets?

  • Actions: What actions affected the assets?

  • Assets: Which assets were affected?

  • Attributes: How were the assets affected?

Each axis has a categorized set of values, called an enumeration, associated with it. Incidents are classified with one or more of those enumeration values for each axis. Examples of incidents mapped to VERIS can be seen in the VERIS Community Database. One other axis outside the 4A model is the Value Chain, which represents pre-attack activities. These activities are essential to a successful campaign and are very closely associated with an entire category of behavior.

In this document, VERIS enumeration values follow the form [Axis].[Category].[Subcategory].[Value]; for example, Action.Malware.Variety.C2 corresponds to the C2 value in the Action axis, Malware category, Variety subcategory.

MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. ATT&CK focuses on how external adversaries compromise and operate within computer information networks. ATT&CK describes adversary behaviors using the following core components:

  • Tactics: “why” - the adversary’s objective or reason for performing an action

  • Techniques: “how” - the means by which adversaries achieve tactical goals

  • Sub-techniques: describing more specific means by which adversaries achieve tactical goals at a lower level than techniques

Adversary behaviors can be described by mapping them to the appropriate tactics, techniques, and sub-techniques in ATT&CK.

The 2021 mapping project took enumeration values in VERIS and mapped them to ATT&CK Enterprise Techniques. The resultant mappings could be used to either take a VERIS enumeration value and come up with a list of ATT&CK techniques and sub-techniques, or to take an ATT&CK technique or sub-technique and come up with a list of VERIS enumeration values.

The 2023 update to the mapping project continues the work of the original integration project by updating and expanding the mapping and translation layer between VERIS and ATT&CK to enhance the community’s ability to pivot from VERIS to ATT&CK Techniques related to a particular incident. In addition, the documentation has been updated and expanded to provide updated use cases and new scenario examples that further demonstrate how the mappings can support describing and communicating information about security incidents.

Scope

Axis Scope

Note that some VERIS axes and enumeration values cannot be mapped cleanly to ATT&CK; therefore this project maps onto a subset of the axes and enumerations as detailed here.

Axis

Description

In Scope

Comments

Actor

Whose actions affected the asset?

Yes

Aligns with ATT&CK groups of adversarial activity clusters tracked by common names in the security community.

Action

What actions affected the asset?

Yes

Describes adversary behaviors performed by hands-on-keyboard attackers or automated by software/malware.

Asset

Which assets were affected?

No

Does not describe adversary behavior.

Attributes

How was the asset affected?

Yes

Describes strategic and tactical impact.

Value Chain

Capabilities and investments an attacker must acquire prior to the actions on target.

Yes

Aligns with ATT&CK Tactic TA0042 Resource Development.

Action Axis Scope

Within each of the axes that describe adversary behaviors, the scope is further narrowed based on whether the adversary behaviors for a particular enumeration category align to ATT&CK. For example, ATT&CK does not cover unintentional errors or natural disasters and therefore the Error and Environmental enumeration categories in the Action axis are not mapped.

Category

Description

In Scope

Comments

Malware

Automated activity

Yes

Describes any malicious software, script, or code run on a device that alters state or function without informed consent.

Hacking

Hands-on-keyboard activity

Yes

Describes all attempts to intentionally access or harm information assets without (or exceeding) authorization.

Social

Exploitation of human element

Yes

Describes use of deception, manipulation, intimidation, etc., to exploit users of information assets.

Misuse

Unapproved use of access

Yes

Describes actor-focused categorizations, not behaviors.

Physical

Actions involving proximity

No

Describes physical attacks, which are out of scope for ATT&CK.

Error

Unintentional actions

No

Does not describe intentionally malicious behavior by an adversary, and therefore out of scope for ATT&CK.

Environmental

Natural disaster events

No

Describes physical accidents and not intentionally malicious actions.

Attribute Axis Scope

Category

Description

In Scope

Comments

Confidentiality/Possession

Data disclosure

Partial

Describes both tactical and strategic goals. Tactical goals are in-scope and mapped to ATT&CK.

Integrity/Authenticity

State of system changed

Partial

Describes both tactical and strategic goals. Tactical goals are in-scope and mapped to ATT&CK.

Availability/Utility

Availability of system(s) impacted

Partial

Describes both tactical and strategic goals. Tactical goals are in-scope and mapped to ATT&CK.

Value Chain Axis Scope

Category

Description

In Scope

Comments

Development

Software that must be developed to accomplish the actions on target

Yes

Describes activities establishing capabilities and infrastructure.

Distribution

Services used to distribute actor content

Yes

Describes activities for establishing delivery mechanisms.

Non- Distribution Services

Services other than those used for distribution of actor content

Yes

Describes staging activities for engagement.

Targeting

Things that identify exploitable opportunities

Yes

Aligns with ATT&CK Tactic TA0042 Resource Development.

Cash-Out

Methods for converting something into currency

No

Describes activities after involvement with victim.

Money Laundering

Methods for concealing the origins of illegally obtained money

No

Describes activities after involvement with victim.

Mapping Philosophy and Process

Based on those scoping decisions, the mappings were created by analyzing each in-scope ATT&CK technique/sub-technique and each in-scope VERIS enumeration value. VERIS and ATT&CK are at different levels of abstraction and cannot always perfectly describe the adversary behaviors that they are meant to represent. Some amount of analyst judgment is required, and whenever judgment is involved, there can be differences of opinion. These design decisions document our judgement and rationale.

Guiding Principles and Design Decisions

Mappings are many-to-many:
  • VERIS enumeration values may describe multiple adversary behaviors. Values are mapped to all relevant techniques and sub-techniques.

  • ATT&CK techniques and sub-techniques may describe a behavior that is also described by multiple VERIS enumeration values. Techniques are mapped to all relevant values.

VERIS enumeration values are mapped to the most specific ATT&CK entity that applies:
  • If the VERIS enumeration value describes a behavior that maps to a sub-technique, it is mapped to that sub-technique.

  • If the VERIS enumeration value describes a behavior that maps to a technique, it is mapped to that technique and all sub-techniques.

  • If the VERIS enumeration value describes a behavior that maps to a tactic, it is mapped to all techniques and sub-techniques in that tactic.

ATT&CK techniques are considered in the context of their descriptions and adversary goals:
  • In some cases, techniques that appear to describe the same technical behavior are not mapped because the adversary objective differs from that described by the VERIS enumeration value.

Many adversary behaviors are described by both Action.Hacking and Action.Malware:
  • Activities in the VERIS Action.Hacking category are those performed by hands-on-keyboard attackers.

  • Activities in the VERIS Action.Malware category are automated by software/malware.

  • ATT&CK techniques and sub-techniques will be mapped to one or both depending on if they describe behaviors that are always automated, always manual, or might be either.

Any remaining [sub-]techniques are mapped to one of these:
  • Action.Hacking.Variety.Other

  • Action.Hacking.Vector.Other

  • Action.Malware.Variety.Other

  • Action.Malware.Vector.Other

Any techniques that have unspecified components of adversary behavior are mapped to one of these:
  • Action.Hacking.Variety.Unknown

  • Action.Malware.Variety.Unknown