icons for the grand Master who is redesigning the overall graphical view

pull/91/head
Alexandre Dulaunoy 2017-09-28 11:29:01 +02:00
parent ecf91a5daa
commit 446bda1b09
No known key found for this signature in database
GPG Key ID: 09E2CD4944E6CBCD
13 changed files with 26 additions and 13 deletions

View File

@ -2,6 +2,7 @@
"type": "exploit-kit",
"name": "Exploit-Kit",
"description": "Exploit-Kit is an enumeration of some exploitation kits used by adversaries. The list includes document, browser and router exploit kits.It's not meant to be totally exhaustive but aim at covering the most seen in the past 5 years",
"version": 2,
"version": 3,
"icon": "internet-explorer",
"uuid": "6ab240ec-bd79-11e6-a4a6-cec0c932ce01"
}

View File

@ -2,6 +2,7 @@
"name": "Microsoft Activity Group actor",
"type": "microsoft-activity-group",
"description": "Activity groups as described by Microsoft",
"version": 1,
"version": 2,
"icon": "user-secret",
"uuid": "74c869e8-0b8e-4e5f-96e6-cd992e07a505"
}

View File

@ -1,7 +1,8 @@
{
"version": 2,
"version": 3,
"uuid": "c4e851fa-775f-11e7-8163-b774922098cd",
"type": "mitre-attack-pattern",
"name": "Attack Pattern",
"icon": "map",
"description": "ATT&CK Tactic"
}

View File

@ -3,5 +3,6 @@
"name": "Course of Action",
"description": "ATT&CK Mitigation",
"type": "mitre-course-of-action",
"version": 3
"icon": "chain",
"version": 4
}

View File

@ -2,6 +2,7 @@
"type": "mitre-intrusion-set",
"uuid": "1023f364-7831-11e7-8318-43b5531983ab",
"description": "Name of ATT&CK Group",
"version": 3,
"version": 5,
"icon": "user-secret",
"name": "Intrusion Set"
}

View File

@ -1,7 +1,8 @@
{
"version": 2,
"version": 3,
"uuid": "d752161c-78f6-11e7-a0ea-bfa79b407ce4",
"description": "Name of ATT&CK software",
"name": "Malware",
"icon": "optin-monster",
"type": "mitre-malware"
}

View File

@ -3,5 +3,6 @@
"type": "mitre-tool",
"description": "Name of ATT&CK software",
"uuid": "d5cbd1a2-78f6-11e7-a833-7b9bccca9649",
"version": 2
"icon": "gavel",
"version": 3
}

View File

@ -2,6 +2,7 @@
"name": "Preventive Measure",
"type": "preventive-measure",
"description": "Preventive measures based on the ransomware document overview as published in https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml# . The preventive measures are quite generic and can fit any standard Windows infrastructure and their security measures.",
"version": 1,
"version": 2,
"icon": "shield",
"uuid": "8168995b-adcd-4684-9e37-206c5771505a"
}

View File

@ -1,7 +1,8 @@
{
"description": "Ransomware galaxy based on https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml",
"type": "ransomware",
"version": 1,
"version": 2,
"name": "Ransomware",
"icon": "usd",
"uuid": "3f44af2e-1480-4b6b-9aa8-f9bb21341078"
}

View File

@ -2,6 +2,7 @@
"type": "rat",
"name": "RAT",
"description": "remote administration tool or remote access tool (RAT), also called sometimes remote access trojan, is a piece of software or programming that allows a remote \"operator\" to control a system as if they have physical access to that system.",
"version": 1,
"version": 2,
"icon": "eye",
"uuid": "06825db6-4797-11e7-ac4d-af25fdcdd299"
}

View File

@ -2,6 +2,7 @@
"type": "tds",
"name": "TDS",
"description": "TDS is a list of Traffic Direction System used by adversaries",
"version": 2,
"version": 3,
"icon": "cart-arrow-down",
"uuid": "1b9a7d8e-bd7a-11e6-a4a6-cec0c932ce01"
}

View File

@ -2,6 +2,7 @@
"name": "Threat Actor",
"type": "threat-actor",
"description": "Threat actors are characteristics of malicious actors (or adversaries) representing a cyber attack threat including presumed intent and historically observed behaviour.",
"version": 1,
"version": 2,
"icon": "user-secret",
"uuid": "698774c7-8022-42c4-917f-8d6e4f06ada3"
}

View File

@ -2,6 +2,7 @@
"type": "tool",
"name": "Tool",
"description": "Threat actors tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.",
"version": 1,
"version": 2,
"icon": "optin-monster",
"uuid": "9b8037f7-bc8f-4de1-a797-37266619bc0b"
}