misp-galaxy/clusters
Alexandre Dulaunoy 187701bacb
chg: [sigma] regenerated from the test script (also updated the script
to ensure UUID consistency for the galaxy)
2023-01-06 15:36:33 +01:00
..
360net.json fix: [360net] fixes null entries in lists 2022-09-13 22:12:51 +02:00
android.json chg: [android] Adds Vulture 2022-05-17 14:16:21 -05:00
atrm.json chg: [atrm] bump to latest ATRM version 2022-08-19 21:19:23 +02:00
attck4fraud.json
backdoor.json add Bazarbackdoor Synonyms 2022-11-22 09:00:04 +01:00
banker.json add Malteiro 2022-12-16 16:43:50 +01:00
bhadra-framework.json
botnet.json fix versions 2022-11-22 12:45:15 +01:00
branded_vulnerability.json
cancer.json add galaxy and cluster cancer 2022-03-11 14:20:09 +01:00
cert-eu-govsector.json
china-defence-universities.json
cmtmf-attack-pattern.json chg: [concordia] CMTMF killchain typo fixed 2021-12-20 10:41:00 +01:00
country.json
cryptominers.json add hezb 2022-09-13 10:40:00 +02:00
election-guidelines.json
exploit-kit.json
handicap.json fix: [handicap] fix galaxy icon + name + type 2022-11-17 15:16:05 +01:00
malpedia.json version fix 2022-11-15 13:36:49 +01:00
microsoft-activity-group.json remove APT36/ Transpert Tribe from microsoft-activity-group.json cause we don't know any MSTIC name yet. 2022-08-20 17:06:18 +00:00
misinfosec-amitt-misinformation-pattern.json
mitre-attack-pattern.json chg: [mitre] updated 2022-11-28 12:48:29 +01:00
mitre-course-of-action.json chg: [mitre] updated 2022-11-28 12:48:29 +01:00
mitre-enterprise-attack-attack-pattern.json
mitre-enterprise-attack-course-of-action.json
mitre-enterprise-attack-intrusion-set.json Merge APT30 and Naikon 2022-08-18 11:36:45 -07:00
mitre-enterprise-attack-malware.json
mitre-enterprise-attack-tool.json
mitre-ics-assets.json fix; [mitre-ics-assets] Fixed some `refs` meta field names 2022-11-23 20:44:46 +01:00
mitre-ics-groups.json MITRE ATT&CK for ICS fixes #586 2020-10-01 20:42:40 +02:00
mitre-ics-levels.json MITRE ATT&CK for ICS fixes #586 2020-10-01 20:42:40 +02:00
mitre-ics-software.json MITRE ATT&CK for ICS fixes #586 2020-10-01 20:42:40 +02:00
mitre-ics-tactics.json Fix: rename "Innitial Access" to "Initial Access" 2021-02-19 12:01:47 +01:00
mitre-ics-techniques.json fix: [clusters] Fixed some other few `meta` field names 2022-11-24 09:17:28 +01:00
mitre-intrusion-set.json chg: [mitre] updated 2022-11-28 12:48:29 +01:00
mitre-malware.json chg: [mitre] updated 2022-11-28 12:48:29 +01:00
mitre-mobile-attack-attack-pattern.json
mitre-mobile-attack-course-of-action.json
mitre-mobile-attack-intrusion-set.json
mitre-mobile-attack-malware.json
mitre-mobile-attack-tool.json
mitre-pre-attack-attack-pattern.json
mitre-pre-attack-intrusion-set.json
mitre-tool.json chg: [mitre] updated 2022-11-28 12:48:29 +01:00
o365-exchange-techniques.json Added O365 techniques 2021-09-18 23:27:38 +02:00
preventive-measure.json
ransomware.json chg: [ransomware] Extends the entry for JCrypt 2022-12-23 01:44:20 -06:00
rat.json Version Update 2022-11-28 16:27:54 +01:00
region.json
rsit.json Move cfr-type-of-incident to meta 2021-01-28 12:25:39 +01:00
sector.json Add synonyms to sector.json 2022-08-21 11:09:50 +02:00
sigma-rules.json chg: [sigma] regenerated from the test script (also updated the script 2023-01-06 15:36:33 +01:00
social-dark-patterns.json
sod-matrix.json
stealer.json add Prynt Stealer & variants 2022-10-14 16:03:45 +02:00
surveillance-vendor.json Update surveillance-vendor.json 2022-06-22 13:30:55 +02:00
target-information.json chg: [target-information] fix the duplicate 2022-11-24 15:08:16 +01:00
tds.json
tea-matrix.json chg: [rename] tea matrix 2020-10-23 15:57:13 +02:00
threat-actor.json add Malteiro 2022-12-16 16:43:50 +01:00
tool.json Version Update 2022-11-28 16:27:54 +01:00