misp-galaxy/clusters
Daniel Plohmann dc059d1f4d
Accenture calls APT32 - "POND LOACH"
2020-03-03 19:40:50 +01:00
..
android.json
attck4fraud.json
backdoor.json add tools used by TA505 + others 2020-02-12 15:39:16 +01:00
banker.json
botnet.json
branded_vulnerability.json
cert-eu-govsector.json
election-guidelines.json
exploit-kit.json
malpedia.json add MedusaLocker ransomware 2020-02-23 16:01:45 +01:00
microsoft-activity-group.json add GALLIUM as microsoft activities group and similar to Operation Soft Cell 2019-12-13 11:47:31 +01:00
misinfosec-amitt-misinformation-pattern.json
mitre-attack-pattern.json
mitre-course-of-action.json
mitre-enterprise-attack-attack-pattern.json
mitre-enterprise-attack-course-of-action.json
mitre-enterprise-attack-intrusion-set.json
mitre-enterprise-attack-malware.json
mitre-enterprise-attack-tool.json
mitre-intrusion-set.json
mitre-malware.json
mitre-mobile-attack-attack-pattern.json
mitre-mobile-attack-course-of-action.json
mitre-mobile-attack-intrusion-set.json
mitre-mobile-attack-malware.json
mitre-mobile-attack-tool.json
mitre-pre-attack-attack-pattern.json
mitre-pre-attack-intrusion-set.json
mitre-tool.json
o365-exchange-techniques.json
preventive-measure.json
ransomware.json add extension to clop ransomware 2020-02-28 11:37:54 +01:00
rat.json add warzone RAT 2020-02-06 13:39:58 +01:00
region.json
sector.json
social-dark-patterns.json add: [dark-pattern] add a source 2019-12-03 17:09:57 +01:00
stealer.json
surveillance-vendor.json add clusters to surveillance-vendor galaxy 2019-12-05 12:06:10 +01:00
target-information.json complete Zimbabwe cluster 2020-01-21 10:51:07 +01:00
tds.json
threat-actor.json Accenture calls APT32 - "POND LOACH" 2020-03-03 19:40:50 +01:00
tool.json add tools used by TA505 + others 2020-02-12 15:39:16 +01:00