misp-galaxy/clusters
Mathieu Beligon e61733591f [threat-actors] Remove SectorJ04 duplicate 2022-11-02 20:30:40 -07:00
..
360net.json fix: [360net] fixes null entries in lists 2022-09-13 22:12:51 +02:00
android.json chg: [android] Adds Vulture 2022-05-17 14:16:21 -05:00
atrm.json chg: [atrm] bump to latest ATRM version 2022-08-19 21:19:23 +02:00
attck4fraud.json
backdoor.json chg: [backdoors] Adds BPFDoor 2022-05-11 19:06:19 -05:00
banker.json
bhadra-framework.json fix: small fixes to the bhadra framework 2020-05-19 16:45:40 +02:00
botnet.json add Dark.IoT 2022-09-13 13:35:55 +02:00
branded_vulnerability.json
cancer.json add galaxy and cluster cancer 2022-03-11 14:20:09 +01:00
cert-eu-govsector.json
china-defence-universities.json chg: [dev] jq 2020-08-22 13:06:42 -04:00
cmtmf-attack-pattern.json chg: [concordia] CMTMF killchain typo fixed 2021-12-20 10:41:00 +01:00
country.json
cryptominers.json add hezb 2022-09-13 10:40:00 +02:00
election-guidelines.json
exploit-kit.json
handicap.json chg: [handicap] fixed more fields 2022-04-04 11:09:30 +02:00
malpedia.json new: [malpedia] remove duplicate UUIDs objects (coming from Malpedia API) 2022-09-26 10:58:09 +02:00
microsoft-activity-group.json remove APT36/ Transpert Tribe from microsoft-activity-group.json cause we don't know any MSTIC name yet. 2022-08-20 17:06:18 +00:00
misinfosec-amitt-misinformation-pattern.json
mitre-attack-pattern.json chg: [mitre-attack] updated to version 12.0 2022-11-01 22:39:33 +01:00
mitre-course-of-action.json chg: [mitre-attack] updated to version 12.0 2022-11-01 22:39:33 +01:00
mitre-enterprise-attack-attack-pattern.json
mitre-enterprise-attack-course-of-action.json
mitre-enterprise-attack-intrusion-set.json Merge APT30 and Naikon 2022-08-18 11:36:45 -07:00
mitre-enterprise-attack-malware.json
mitre-enterprise-attack-tool.json
mitre-ics-assets.json fixes issues in attack-ics 2020-10-02 16:54:21 +02:00
mitre-ics-groups.json MITRE ATT&CK for ICS fixes #586 2020-10-01 20:42:40 +02:00
mitre-ics-levels.json MITRE ATT&CK for ICS fixes #586 2020-10-01 20:42:40 +02:00
mitre-ics-software.json MITRE ATT&CK for ICS fixes #586 2020-10-01 20:42:40 +02:00
mitre-ics-tactics.json Fix: rename "Innitial Access" to "Initial Access" 2021-02-19 12:01:47 +01:00
mitre-ics-techniques.json fixes issues in attack-ics 2020-10-02 16:54:21 +02:00
mitre-intrusion-set.json chg: [mitre-attack] updated to version 12.0 2022-11-01 22:39:33 +01:00
mitre-malware.json chg: [mitre-attack] updated to version 12.0 2022-11-01 22:39:33 +01:00
mitre-mobile-attack-attack-pattern.json
mitre-mobile-attack-course-of-action.json
mitre-mobile-attack-intrusion-set.json
mitre-mobile-attack-malware.json
mitre-mobile-attack-tool.json
mitre-pre-attack-attack-pattern.json
mitre-pre-attack-intrusion-set.json
mitre-tool.json chg: [mitre-attack] updated to version 12.0 2022-11-01 22:39:33 +01:00
o365-exchange-techniques.json Added O365 techniques 2021-09-18 23:27:38 +02:00
preventive-measure.json chg: [preventive-measure] packet filtering added 2020-05-27 10:02:16 +02:00
ransomware.json add Lorenz ransomware 2022-09-15 10:29:46 +02:00
rat.json Add PlugX ref 2022-09-15 15:39:47 +02:00
region.json
rsit.json Move cfr-type-of-incident to meta 2021-01-28 12:25:39 +01:00
sector.json Add synonyms to sector.json 2022-08-21 11:09:50 +02:00
social-dark-patterns.json
sod-matrix.json fix: Name of SoD Matrix cluster to match galaxy. 2020-07-22 11:52:27 +02:00
stealer.json add Prynt Stealer & variants 2022-10-14 16:03:45 +02:00
surveillance-vendor.json Update surveillance-vendor.json 2022-06-22 13:30:55 +02:00
target-information.json add refs 2020-09-16 10:08:31 +02:00
tds.json
tea-matrix.json chg: [rename] tea matrix 2020-10-23 15:57:13 +02:00
threat-actor.json [threat-actors] Remove SectorJ04 duplicate 2022-11-02 20:30:40 -07:00
tool.json Add SharPyShell tool. 2022-10-02 22:00:54 +00:00