.. |
android.json
|
chg: jq all 2
|
2022-03-31 09:05:22 +02:00 |
attck4fraud.json
|
…
|
|
backdoor.json
|
Add NOBELIUM and related
|
2021-07-02 13:18:03 +02:00 |
banker.json
|
chg: [jq] JSON fixed
|
2020-04-27 15:03:25 +02:00 |
bhadra-framework.json
|
fix: small fixes to the bhadra framework
|
2020-05-19 16:45:40 +02:00 |
botnet.json
|
chg: [botnet] duplicate UUIDs replaced
|
2022-03-18 15:58:09 +01:00 |
branded_vulnerability.json
|
…
|
|
cancer.json
|
add galaxy and cluster cancer
|
2022-03-11 14:20:09 +01:00 |
cert-eu-govsector.json
|
…
|
|
china-defence-universities.json
|
chg: [dev] jq
|
2020-08-22 13:06:42 -04:00 |
cmtmf-attack-pattern.json
|
chg: [concordia] CMTMF killchain typo fixed
|
2021-12-20 10:41:00 +01:00 |
country.json
|
chg: [country] jq all
|
2020-03-23 13:09:14 +01:00 |
cryptominers.json
|
fix: Cryptominers type
|
2021-03-27 22:07:33 +01:00 |
election-guidelines.json
|
…
|
|
exploit-kit.json
|
Added misp info
|
2020-04-27 15:16:33 +03:00 |
handicap.json
|
chg: [handicap] fixed more fields
|
2022-04-04 11:09:30 +02:00 |
malpedia.json
|
add DDG botnet and more
|
2022-02-11 16:13:36 +01:00 |
microsoft-activity-group.json
|
Add NOBELIUM and related
|
2021-07-02 13:18:03 +02:00 |
misinfosec-amitt-misinformation-pattern.json
|
…
|
|
mitre-attack-pattern.json
|
chg: [att&ck] update to ATT&CK v10
|
2021-10-22 14:34:25 +02:00 |
mitre-course-of-action.json
|
chg: [att&ck] update to ATT&CK v10
|
2021-10-22 14:34:25 +02:00 |
mitre-enterprise-attack-attack-pattern.json
|
…
|
|
mitre-enterprise-attack-course-of-action.json
|
…
|
|
mitre-enterprise-attack-intrusion-set.json
|
…
|
|
mitre-enterprise-attack-malware.json
|
…
|
|
mitre-enterprise-attack-tool.json
|
Added misp info
|
2020-04-27 15:16:33 +03:00 |
mitre-ics-assets.json
|
fixes issues in attack-ics
|
2020-10-02 16:54:21 +02:00 |
mitre-ics-groups.json
|
MITRE ATT&CK for ICS fixes #586
|
2020-10-01 20:42:40 +02:00 |
mitre-ics-levels.json
|
MITRE ATT&CK for ICS fixes #586
|
2020-10-01 20:42:40 +02:00 |
mitre-ics-software.json
|
MITRE ATT&CK for ICS fixes #586
|
2020-10-01 20:42:40 +02:00 |
mitre-ics-tactics.json
|
Fix: rename "Innitial Access" to "Initial Access"
|
2021-02-19 12:01:47 +01:00 |
mitre-ics-techniques.json
|
fixes issues in attack-ics
|
2020-10-02 16:54:21 +02:00 |
mitre-intrusion-set.json
|
chg: [att&ck] update to ATT&CK v10
|
2021-10-22 14:34:25 +02:00 |
mitre-malware.json
|
chg: [att&ck] update to ATT&CK v10
|
2021-10-22 14:34:25 +02:00 |
mitre-mobile-attack-attack-pattern.json
|
…
|
|
mitre-mobile-attack-course-of-action.json
|
…
|
|
mitre-mobile-attack-intrusion-set.json
|
…
|
|
mitre-mobile-attack-malware.json
|
…
|
|
mitre-mobile-attack-tool.json
|
…
|
|
mitre-pre-attack-attack-pattern.json
|
…
|
|
mitre-pre-attack-intrusion-set.json
|
…
|
|
mitre-tool.json
|
chg: [att&ck] update to ATT&CK v10
|
2021-10-22 14:34:25 +02:00 |
o365-exchange-techniques.json
|
Added O365 techniques
|
2021-09-18 23:27:38 +02:00 |
preventive-measure.json
|
chg: [preventive-measure] packet filtering added
|
2020-05-27 10:02:16 +02:00 |
ransomware.json
|
Ammended Blackcat ransomware entry with ACSC 2022-004 advisory data
|
2022-04-17 18:05:24 +09:30 |
rat.json
|
merge
|
2022-01-14 16:08:14 +01:00 |
region.json
|
…
|
|
rsit.json
|
Move cfr-type-of-incident to meta
|
2021-01-28 12:25:39 +01:00 |
sector.json
|
…
|
|
social-dark-patterns.json
|
add: [dark-pattern] add a source
|
2019-12-03 17:09:57 +01:00 |
sod-matrix.json
|
fix: Name of SoD Matrix cluster to match galaxy.
|
2020-07-22 11:52:27 +02:00 |
stealer.json
|
[cluster][stealer] Adds HackBoss
|
2021-06-21 16:35:20 -05:00 |
surveillance-vendor.json
|
new: [surveillance] Cytrox added
|
2022-01-30 11:31:55 +01:00 |
target-information.json
|
add refs
|
2020-09-16 10:08:31 +02:00 |
tds.json
|
…
|
|
tea-matrix.json
|
chg: [rename] tea matrix
|
2020-10-23 15:57:13 +02:00 |
threat-actor.json
|
Added Copy-Paste Threat Actor from ACSC Advisory 2020-008
|
2022-04-17 19:37:26 +09:30 |
tool.json
|
Add tool 'BadPotato' to clusters/tool.json
|
2022-03-14 18:02:02 +01:00 |