pull/288/head
Christophe Vandeplas 2018-10-19 10:23:09 +02:00
parent 6a9a9b7e1b
commit 9dddc4427c
24 changed files with 24 additions and 24 deletions

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"Unknown" "Unknown"
], ],
"category": "tool",
"description": "Android malware galaxy based on multiple open sources.", "description": "Android malware galaxy based on multiple open sources.",
"name": "Android", "name": "Android",
"source": "Open Sources", "source": "Open Sources",
"type": "android", "type": "android",
"category": "tool",
"uuid": "84310ba3-fa6a-44aa-b378-b9e3271c58fa", "uuid": "84310ba3-fa6a-44aa-b378-b9e3271c58fa",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"raw-data" "raw-data"
], ],
"category": "tool",
"description": "A list of backdoor malware.", "description": "A list of backdoor malware.",
"name": "Backdoor", "name": "Backdoor",
"source": "Open Sources", "source": "Open Sources",
"type": "backdoor", "type": "backdoor",
"category": "tool",
"uuid": "75436e27-cb57-4f32-bf1d-9636dd78a2bf", "uuid": "75436e27-cb57-4f32-bf1d-9636dd78a2bf",
"values": [ "values": [
{ {

View File

@ -3,11 +3,11 @@
"Unknown", "Unknown",
"raw-data" "raw-data"
], ],
"category": "tool",
"description": "A list of banker malware.", "description": "A list of banker malware.",
"name": "Banker", "name": "Banker",
"source": "Open Sources", "source": "Open Sources",
"type": "banker", "type": "banker",
"category": "tool",
"uuid": "59f20cce-5420-4084-afd5-0884c0a83832", "uuid": "59f20cce-5420-4084-afd5-0884c0a83832",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"Various" "Various"
], ],
"category": "tool",
"description": "botnet galaxy", "description": "botnet galaxy",
"name": "Botnet", "name": "Botnet",
"source": "MISP Project", "source": "MISP Project",
"type": "botnet", "type": "botnet",
"category": "tool",
"uuid": "a91732f4-164a-11e8-924a-ffd4097eb03f", "uuid": "a91732f4-164a-11e8-924a-ffd4097eb03f",
"values": [ "values": [
{ {

View File

@ -4,11 +4,11 @@
"Will Metcalf", "Will Metcalf",
"KahuSecurity" "KahuSecurity"
], ],
"category": "tool",
"description": "Exploit-Kit is an enumeration of some exploitation kits used by adversaries. The list includes document, browser and router exploit kits.It's not meant to be totally exhaustive but aim at covering the most seen in the past 5 years", "description": "Exploit-Kit is an enumeration of some exploitation kits used by adversaries. The list includes document, browser and router exploit kits.It's not meant to be totally exhaustive but aim at covering the most seen in the past 5 years",
"name": "Exploit-Kit", "name": "Exploit-Kit",
"source": "MISP Project", "source": "MISP Project",
"type": "exploit-kit", "type": "exploit-kit",
"category": "tool",
"uuid": "454f4e78-bd7c-11e6-a4a6-cec0c932ce01", "uuid": "454f4e78-bd7c-11e6-a4a6-cec0c932ce01",
"values": [ "values": [
{ {

View File

@ -5,11 +5,11 @@
"Andrea Garavaglia", "Andrea Garavaglia",
"Davide Arcuri" "Davide Arcuri"
], ],
"category": "tool",
"description": "Malware galaxy cluster based on Malpedia.", "description": "Malware galaxy cluster based on Malpedia.",
"name": "Malpedia", "name": "Malpedia",
"source": "Malpedia", "source": "Malpedia",
"type": "malpedia", "type": "malpedia",
"category": "tool",
"uuid": "5fc98d08-90a4-498a-ad2e-0edf50ef374e", "uuid": "5fc98d08-90a4-498a-ad2e-0edf50ef374e",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"Various" "Various"
], ],
"category": "actor",
"description": "Activity groups as described by Microsoft", "description": "Activity groups as described by Microsoft",
"name": "Microsoft Activity Group actor", "name": "Microsoft Activity Group actor",
"source": "MISP Project", "source": "MISP Project",
"type": "microsoft-activity-group", "type": "microsoft-activity-group",
"category": "actor",
"uuid": "28b5e55d-acba-4748-a79d-0afa3512689a", "uuid": "28b5e55d-acba-4748-a79d-0afa3512689a",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"MITRE" "MITRE"
], ],
"category": "actor",
"description": "Name of ATT&CK Group", "description": "Name of ATT&CK Group",
"name": "Enterprise Attack -intrusion Set", "name": "Enterprise Attack -intrusion Set",
"source": "https://github.com/mitre/cti", "source": "https://github.com/mitre/cti",
"type": "mitre-enterprise-attack-intrusion-set", "type": "mitre-enterprise-attack-intrusion-set",
"category": "actor",
"uuid": "01f18402-1708-11e8-ac1c-1ffb3c4a7775", "uuid": "01f18402-1708-11e8-ac1c-1ffb3c4a7775",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"MITRE" "MITRE"
], ],
"category": "tool",
"description": "Name of ATT&CK software", "description": "Name of ATT&CK software",
"name": "Enterprise Attack - Malware", "name": "Enterprise Attack - Malware",
"source": "https://github.com/mitre/cti", "source": "https://github.com/mitre/cti",
"type": "mitre-enterprise-attack-malware", "type": "mitre-enterprise-attack-malware",
"category": "tool",
"uuid": "fbd79f02-1707-11e8-b1c7-87406102276a", "uuid": "fbd79f02-1707-11e8-b1c7-87406102276a",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"MITRE" "MITRE"
], ],
"category": "tool",
"description": "Name of ATT&CK software", "description": "Name of ATT&CK software",
"name": "Enterprise Attack - Tool", "name": "Enterprise Attack - Tool",
"source": "https://github.com/mitre/cti", "source": "https://github.com/mitre/cti",
"type": "mitre-enterprise-attack-tool", "type": "mitre-enterprise-attack-tool",
"category": "tool",
"uuid": "fc1ea6e0-1707-11e8-ac05-2b70d00c354e", "uuid": "fc1ea6e0-1707-11e8-ac05-2b70d00c354e",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"MITRE" "MITRE"
], ],
"category": "actor",
"description": "Name of ATT&CK Group", "description": "Name of ATT&CK Group",
"name": "intrusion Set", "name": "intrusion Set",
"source": "https://github.com/mitre/cti", "source": "https://github.com/mitre/cti",
"type": "mitre-intrusion-set", "type": "mitre-intrusion-set",
"category": "actor",
"uuid": "10df003c-7831-11e7-bdb9-971cdd1218df", "uuid": "10df003c-7831-11e7-bdb9-971cdd1218df",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"MITRE" "MITRE"
], ],
"category": "tool",
"description": "Name of ATT&CK software", "description": "Name of ATT&CK software",
"name": "Malware", "name": "Malware",
"source": "https://github.com/mitre/cti", "source": "https://github.com/mitre/cti",
"type": "mitre-malware", "type": "mitre-malware",
"category": "tool",
"uuid": "d752161c-78f6-11e7-a0ea-bfa79b407ce4", "uuid": "d752161c-78f6-11e7-a0ea-bfa79b407ce4",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"MITRE" "MITRE"
], ],
"category": "actor",
"description": "Name of ATT&CK Group", "description": "Name of ATT&CK Group",
"name": "Mobile Attack - intrusion Set", "name": "Mobile Attack - intrusion Set",
"source": "https://github.com/mitre/cti", "source": "https://github.com/mitre/cti",
"type": "mitre-mobile-attack-intrusion-set", "type": "mitre-mobile-attack-intrusion-set",
"category": "actor",
"uuid": "02ab4018-1708-11e8-8f9d-e735aabdfa53", "uuid": "02ab4018-1708-11e8-8f9d-e735aabdfa53",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"MITRE" "MITRE"
], ],
"category": "tool",
"description": "Name of ATT&CK software", "description": "Name of ATT&CK software",
"name": "Mobile Attack - Malware", "name": "Mobile Attack - Malware",
"source": "https://github.com/mitre/cti", "source": "https://github.com/mitre/cti",
"type": "mitre-mobile-attack-malware", "type": "mitre-mobile-attack-malware",
"category": "tool",
"uuid": "04a165aa-1708-11e8-b2da-c7d7625f4a4f", "uuid": "04a165aa-1708-11e8-b2da-c7d7625f4a4f",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"MITRE" "MITRE"
], ],
"category": "tool",
"description": "Name of ATT&CK software", "description": "Name of ATT&CK software",
"name": "Mobile Attack - Tool", "name": "Mobile Attack - Tool",
"source": "https://github.com/mitre/cti", "source": "https://github.com/mitre/cti",
"type": "mitre-mobile-attack-tool", "type": "mitre-mobile-attack-tool",
"category": "tool",
"uuid": "02cee87e-1708-11e8-8f15-8b33e4d6194b", "uuid": "02cee87e-1708-11e8-8f15-8b33e4d6194b",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"MITRE" "MITRE"
], ],
"category": "actor",
"description": "Name of ATT&CK Group", "description": "Name of ATT&CK Group",
"name": "Pre Attack - intrusion Set", "name": "Pre Attack - intrusion Set",
"source": "https://github.com/mitre/cti", "source": "https://github.com/mitre/cti",
"type": "mitre-pre-attack-intrusion-set", "type": "mitre-pre-attack-intrusion-set",
"category": "actor",
"uuid": "1fdc8fa2-1708-11e8-99a3-67b4efc13c4f", "uuid": "1fdc8fa2-1708-11e8-99a3-67b4efc13c4f",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"MITRE" "MITRE"
], ],
"category": "tool",
"description": "Name of ATT&CK software", "description": "Name of ATT&CK software",
"name": "Tool", "name": "Tool",
"source": "https://github.com/mitre/cti", "source": "https://github.com/mitre/cti",
"type": "mitre-tool", "type": "mitre-tool",
"category": "tool",
"uuid": "d700dc5c-78f6-11e7-a476-5f748c8e4fe0", "uuid": "d700dc5c-78f6-11e7-a476-5f748c8e4fe0",
"values": [ "values": [
{ {

View File

@ -3,11 +3,11 @@
"https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml", "https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml",
"http://pastebin.com/raw/GHgpWjar" "http://pastebin.com/raw/GHgpWjar"
], ],
"category": "tool",
"description": "Ransomware galaxy based on https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml and http://pastebin.com/raw/GHgpWjar", "description": "Ransomware galaxy based on https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml and http://pastebin.com/raw/GHgpWjar",
"name": "Ransomware", "name": "Ransomware",
"source": "Various", "source": "Various",
"type": "ransomware", "type": "ransomware",
"category": "tool",
"uuid": "10cf658b-5d32-4c4b-bb32-61760a640372", "uuid": "10cf658b-5d32-4c4b-bb32-61760a640372",
"values": [ "values": [
{ {

View File

@ -3,11 +3,11 @@
"Various", "Various",
"raw-data" "raw-data"
], ],
"category": "tool",
"description": "remote administration tool or remote access tool (RAT), also called sometimes remote access trojan, is a piece of software or programming that allows a remote \"operator\" to control a system as if they have physical access to that system.", "description": "remote administration tool or remote access tool (RAT), also called sometimes remote access trojan, is a piece of software or programming that allows a remote \"operator\" to control a system as if they have physical access to that system.",
"name": "RAT", "name": "RAT",
"source": "MISP Project", "source": "MISP Project",
"type": "rat", "type": "rat",
"category": "tool",
"uuid": "312f8714-45cb-11e7-b898-135207cdceb9", "uuid": "312f8714-45cb-11e7-b898-135207cdceb9",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"raw-data" "raw-data"
], ],
"category": "tool",
"description": "A list of malware stealer.", "description": "A list of malware stealer.",
"name": "Stealer", "name": "Stealer",
"source": "Open Sources", "source": "Open Sources",
"type": "stealer", "type": "stealer",
"category": "tool",
"uuid": "f2ef4033-9001-4427-a418-df8c48e6d054", "uuid": "f2ef4033-9001-4427-a418-df8c48e6d054",
"values": [ "values": [
{ {

View File

@ -2,11 +2,11 @@
"authors": [ "authors": [
"Kafeine" "Kafeine"
], ],
"category": "tool",
"description": "TDS is a list of Traffic Direction System used by adversaries", "description": "TDS is a list of Traffic Direction System used by adversaries",
"name": "TDS", "name": "TDS",
"source": "MISP Project", "source": "MISP Project",
"type": "tds", "type": "tds",
"category": "tool",
"uuid": "ab5fffaa-c5f6-11e6-9d9d-cec0c932ce01", "uuid": "ab5fffaa-c5f6-11e6-9d9d-cec0c932ce01",
"values": [ "values": [
{ {

View File

@ -6,11 +6,11 @@
"Timo Steffens", "Timo Steffens",
"Various" "Various"
], ],
"category": "actor",
"description": "Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign.", "description": "Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign.",
"name": "Threat actor", "name": "Threat actor",
"source": "MISP Project", "source": "MISP Project",
"type": "threat-actor", "type": "threat-actor",
"category": "actor",
"uuid": "7cdff317-a673-4474-84ec-4f1754947823", "uuid": "7cdff317-a673-4474-84ec-4f1754947823",
"values": [ "values": [
{ {

View File

@ -7,11 +7,11 @@
"Dennis Rand", "Dennis Rand",
"raw-data" "raw-data"
], ],
"category": "tool",
"description": "threat-actor-tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.", "description": "threat-actor-tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.",
"name": "Tool", "name": "Tool",
"source": "MISP Project", "source": "MISP Project",
"type": "tool", "type": "tool",
"category": "tool",
"uuid": "0d821b68-9d82-4c6d-86a6-1071a9e0f79f", "uuid": "0d821b68-9d82-4c6d-86a6-1071a9e0f79f",
"values": [ "values": [
{ {

View File

@ -25,7 +25,7 @@
}, },
"category": { "category": {
"type": "string" "type": "string"
}, },
"values": { "values": {
"type": "array", "type": "array",
"uniqueItems": true, "uniqueItems": true,