.. |
android.json
|
fix: UUID issues
|
2019-05-07 12:09:39 +02:00 |
attck4fraud.json
|
chg: [attck4fraud] jq all the things
|
2019-10-20 20:07:29 +02:00 |
backdoor.json
|
add BazarBackdoor
|
2020-12-09 16:42:32 +01:00 |
banker.json
|
chg: [jq] JSON fixed
|
2020-04-27 15:03:25 +02:00 |
bhadra-framework.json
|
fix: small fixes to the bhadra framework
|
2020-05-19 16:45:40 +02:00 |
botnet.json
|
Added a new cryptominer galaxy and additional missing recent families to various clusters
|
2020-10-29 14:40:22 -06:00 |
branded_vulnerability.json
|
chg: [branded_vulnerability] version updated
|
2019-05-25 08:41:33 +02:00 |
cert-eu-govsector.json
|
chg: [cert-eu-govsector] version fixed
|
2019-02-21 07:19:04 +01:00 |
china-defence-universities.json
|
chg: [dev] jq
|
2020-08-22 13:06:42 -04:00 |
country.json
|
chg: [country] jq all
|
2020-03-23 13:09:14 +01:00 |
cryptominers.json
|
fix: Cryptominers type
|
2021-03-27 22:07:33 +01:00 |
election-guidelines.json
|
fix: Wrong (duplicate) value.
|
2019-03-09 06:29:26 +01:00 |
exploit-kit.json
|
Added misp info
|
2020-04-27 15:16:33 +03:00 |
malpedia.json
|
chg: [malpedia] jq all the file and removed ref duplicates
|
2021-03-13 11:00:39 +01:00 |
microsoft-activity-group.json
|
chg: [microsoft activity group] HAFNIUM added
|
2021-03-04 10:49:58 +01:00 |
misinfosec-amitt-misinformation-pattern.json
|
fix: [misinfosec] fixes inconsistent filename
|
2019-10-20 18:53:02 +02:00 |
mitre-attack-pattern.json
|
chg: [att&ck] bump to latest ATT&CK version from MITRE
|
2021-04-29 18:12:36 +02:00 |
mitre-course-of-action.json
|
chg: [att&ck] bump to latest ATT&CK version from MITRE
|
2021-04-29 18:12:36 +02:00 |
mitre-enterprise-attack-attack-pattern.json
|
chg: further categorization of galaxies
|
2018-10-19 14:15:20 +02:00 |
mitre-enterprise-attack-course-of-action.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-enterprise-attack-intrusion-set.json
|
fix: Duplicate values, typos.
|
2019-05-06 17:17:16 +02:00 |
mitre-enterprise-attack-malware.json
|
jq
|
2018-10-19 10:23:09 +02:00 |
mitre-enterprise-attack-tool.json
|
Added misp info
|
2020-04-27 15:16:33 +03:00 |
mitre-ics-assets.json
|
fixes issues in attack-ics
|
2020-10-02 16:54:21 +02:00 |
mitre-ics-groups.json
|
MITRE ATT&CK for ICS fixes #586
|
2020-10-01 20:42:40 +02:00 |
mitre-ics-levels.json
|
MITRE ATT&CK for ICS fixes #586
|
2020-10-01 20:42:40 +02:00 |
mitre-ics-software.json
|
MITRE ATT&CK for ICS fixes #586
|
2020-10-01 20:42:40 +02:00 |
mitre-ics-tactics.json
|
Fix: rename "Innitial Access" to "Initial Access"
|
2021-02-19 12:01:47 +01:00 |
mitre-ics-techniques.json
|
fixes issues in attack-ics
|
2020-10-02 16:54:21 +02:00 |
mitre-intrusion-set.json
|
chg: [att&ck] bump to latest ATT&CK version from MITRE
|
2021-04-29 18:12:36 +02:00 |
mitre-malware.json
|
chg: [att&ck] bump to latest ATT&CK version from MITRE
|
2021-04-29 18:12:36 +02:00 |
mitre-mobile-attack-attack-pattern.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-mobile-attack-course-of-action.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-mobile-attack-intrusion-set.json
|
fix: Duplicate values, typos.
|
2019-05-06 17:17:16 +02:00 |
mitre-mobile-attack-malware.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-mobile-attack-tool.json
|
jq
|
2018-10-19 10:23:09 +02:00 |
mitre-pre-attack-attack-pattern.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-pre-attack-intrusion-set.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-tool.json
|
chg: [att&ck] bump to latest ATT&CK version from MITRE
|
2021-04-29 18:12:36 +02:00 |
o365-exchange-techniques.json
|
fix: o365-exchange-techniques (duplicate values, duplicate UUIDs)
|
2019-05-13 11:15:38 +02:00 |
preventive-measure.json
|
chg: [preventive-measure] packet filtering added
|
2020-05-27 10:02:16 +02:00 |
ransomware.json
|
chg: [ransomware] COLT (Compromise to Leak Time) added on Darkside and Pysa
|
2021-05-03 07:41:43 +02:00 |
rat.json
|
Update rat.json to include Iperius Remote
|
2020-11-09 23:45:16 -05:00 |
region.json
|
new galaxy - Region based on UN M49
|
2019-09-26 13:01:41 +02:00 |
rsit.json
|
Move cfr-type-of-incident to meta
|
2021-01-28 12:25:39 +01:00 |
sector.json
|
fix: UUID issues
|
2019-05-07 12:09:39 +02:00 |
social-dark-patterns.json
|
add: [dark-pattern] add a source
|
2019-12-03 17:09:57 +01:00 |
sod-matrix.json
|
fix: Name of SoD Matrix cluster to match galaxy.
|
2020-07-22 11:52:27 +02:00 |
stealer.json
|
chg: [clusters] fixing broken UUID fix #628
|
2021-03-11 09:54:50 +01:00 |
surveillance-vendor.json
|
add clusters to surveillance-vendor galaxy
|
2019-12-05 12:06:10 +01:00 |
target-information.json
|
add refs
|
2020-09-16 10:08:31 +02:00 |
tds.json
|
zTDS
|
2018-12-22 11:51:40 +01:00 |
tea-matrix.json
|
chg: [rename] tea matrix
|
2020-10-23 15:57:13 +02:00 |
threat-actor.json
|
Merged STALKER PANDA to Tick
|
2021-04-25 19:12:20 +05:30 |
tool.json
|
Merge branch 'main' of github.com:MISP/misp-galaxy into main
|
2021-02-26 08:30:58 +01:00 |