misp-galaxy/clusters
Daniel Plohmann 3094283252
adding Mandiant's FIN13.
2022-01-03 09:32:43 +01:00
..
android.json
attck4fraud.json
backdoor.json Add NOBELIUM and related 2021-07-02 13:18:03 +02:00
banker.json chg: [jq] JSON fixed 2020-04-27 15:03:25 +02:00
bhadra-framework.json fix: small fixes to the bhadra framework 2020-05-19 16:45:40 +02:00
botnet.json Added a new cryptominer galaxy and additional missing recent families to various clusters 2020-10-29 14:40:22 -06:00
branded_vulnerability.json
cert-eu-govsector.json
china-defence-universities.json chg: [dev] jq 2020-08-22 13:06:42 -04:00
cmtmf-attack-pattern.json chg: [concordia] CMTMF killchain typo fixed 2021-12-20 10:41:00 +01:00
country.json chg: [country] jq all 2020-03-23 13:09:14 +01:00
cryptominers.json fix: Cryptominers type 2021-03-27 22:07:33 +01:00
election-guidelines.json
exploit-kit.json Added misp info 2020-04-27 15:16:33 +03:00
malpedia.json chg: [malpedia] remove duplicate 2021-10-20 12:24:12 +02:00
microsoft-activity-group.json Add NOBELIUM and related 2021-07-02 13:18:03 +02:00
misinfosec-amitt-misinformation-pattern.json
mitre-attack-pattern.json chg: [att&ck] update to ATT&CK v10 2021-10-22 14:34:25 +02:00
mitre-course-of-action.json chg: [att&ck] update to ATT&CK v10 2021-10-22 14:34:25 +02:00
mitre-enterprise-attack-attack-pattern.json
mitre-enterprise-attack-course-of-action.json
mitre-enterprise-attack-intrusion-set.json
mitre-enterprise-attack-malware.json
mitre-enterprise-attack-tool.json Added misp info 2020-04-27 15:16:33 +03:00
mitre-ics-assets.json fixes issues in attack-ics 2020-10-02 16:54:21 +02:00
mitre-ics-groups.json MITRE ATT&CK for ICS fixes #586 2020-10-01 20:42:40 +02:00
mitre-ics-levels.json MITRE ATT&CK for ICS fixes #586 2020-10-01 20:42:40 +02:00
mitre-ics-software.json MITRE ATT&CK for ICS fixes #586 2020-10-01 20:42:40 +02:00
mitre-ics-tactics.json Fix: rename "Innitial Access" to "Initial Access" 2021-02-19 12:01:47 +01:00
mitre-ics-techniques.json fixes issues in attack-ics 2020-10-02 16:54:21 +02:00
mitre-intrusion-set.json chg: [att&ck] update to ATT&CK v10 2021-10-22 14:34:25 +02:00
mitre-malware.json chg: [att&ck] update to ATT&CK v10 2021-10-22 14:34:25 +02:00
mitre-mobile-attack-attack-pattern.json
mitre-mobile-attack-course-of-action.json
mitre-mobile-attack-intrusion-set.json
mitre-mobile-attack-malware.json
mitre-mobile-attack-tool.json
mitre-pre-attack-attack-pattern.json
mitre-pre-attack-intrusion-set.json
mitre-tool.json chg: [att&ck] update to ATT&CK v10 2021-10-22 14:34:25 +02:00
o365-exchange-techniques.json Added O365 techniques 2021-09-18 23:27:38 +02:00
preventive-measure.json chg: [preventive-measure] packet filtering added 2020-05-27 10:02:16 +02:00
ransomware.json chg: [ransomware] COLT (Compromise to Leak Time) added on Darkside and Pysa 2021-05-03 07:41:43 +02:00
rat.json Adds DarkWatchman RAT 2021-12-17 07:20:58 -06:00
region.json
rsit.json Move cfr-type-of-incident to meta 2021-01-28 12:25:39 +01:00
sector.json
social-dark-patterns.json
sod-matrix.json fix: Name of SoD Matrix cluster to match galaxy. 2020-07-22 11:52:27 +02:00
stealer.json [cluster][stealer] Adds HackBoss 2021-06-21 16:35:20 -05:00
surveillance-vendor.json
target-information.json add refs 2020-09-16 10:08:31 +02:00
tds.json
tea-matrix.json chg: [rename] tea matrix 2020-10-23 15:57:13 +02:00
threat-actor.json adding Mandiant's FIN13. 2022-01-03 09:32:43 +01:00
tool.json add ESPecter Bootkit 2021-11-19 16:30:57 +01:00