Merge branch 'main' of github.com:MISP/misp-objects

pull/425/head
Christian Studer 2024-04-02 21:18:22 +02:00
commit 1118a0492b
No known key found for this signature in database
GPG Key ID: 6BBED1B63A6D639F
11 changed files with 152 additions and 14 deletions

View File

@ -1,20 +1,35 @@
{ {
"attributes": { "attributes": {
"command_line": {
"description": "command code line",
"misp-attribute": "text",
"multiple": true,
"ui-priority": 1
},
"description": { "description": {
"description": "description of the command", "description": "description of the command",
"misp-attribute": "text", "misp-attribute": "text",
"ui-priority": 1 "ui-priority": 1
}, },
"value": { "software": {
"description": "command code", "description": "type of shell (bash/sh,powershell,cmd.exe)",
"misp-attribute": "text", "misp-attribute": "text",
"multiple": true, "sane_default": [
"Shell",
"Bash",
"zsh",
"Powershell",
"cmd.exe"
],
"ui-priority": 1 "ui-priority": 1
} }
}, },
"description": "Command line and options related to a specific command executed by a program, whether it is malicious or not.", "description": "Command line and options related to a specific command executed by a program, whether it is malicious or not.",
"meta-category": "misc", "meta-category": "misc",
"name": "command-line", "name": "command-line",
"required": [
"command_line"
],
"uuid": "88ebe222-d3cc-11e9-875d-7f13f460adaf", "uuid": "88ebe222-d3cc-11e9-875d-7f13f460adaf",
"version": 1 "version": 2
} }

View File

@ -7,7 +7,7 @@
], ],
"description": "Autonomous system name", "description": "Autonomous system name",
"disable_correlation": true, "disable_correlation": true,
"misp-attribute": "AS", "misp-attribute": "text",
"multiple": true, "multiple": true,
"ui-priority": 0 "ui-priority": 0
}, },

View File

@ -104,7 +104,7 @@
"description": "Cobalt Strike Beacon Config", "description": "Cobalt Strike Beacon Config",
"meta-category": "file", "meta-category": "file",
"name": "cs-beacon-config", "name": "cs-beacon-config",
"required": [ "requiredOneOf": [
"jar-md5", "jar-md5",
"md5", "md5",
"sha1", "sha1",
@ -112,5 +112,5 @@
"watermark" "watermark"
], ],
"uuid": "d17355ef-ca1f-4b5a-86cd-65d877991f54", "uuid": "d17355ef-ca1f-4b5a-86cd-65d877991f54",
"version": 3 "version": 4
} }

View File

@ -156,8 +156,9 @@
"requiredOneOf": [ "requiredOneOf": [
"ip-dst", "ip-dst",
"ip-src", "ip-src",
"domain-dst" "domain-dst",
"type"
], ],
"uuid": "e2f124d6-f57c-4f93-99e6-8450545fa05d", "uuid": "e2f124d6-f57c-4f93-99e6-8450545fa05d",
"version": 9 "version": 10
} }

View File

@ -82,6 +82,11 @@
"multiple": true, "multiple": true,
"ui-priority": 0 "ui-priority": 0
}, },
"software": {
"description": "Software impacted",
"misp-attribute": "text",
"ui-priority": 10
},
"title": { "title": {
"description": "Title of the exploit.", "description": "Title of the exploit.",
"misp-attribute": "text", "misp-attribute": "text",

View File

@ -405,11 +405,13 @@
}, },
"time.observation": { "time.observation": {
"description": "The time the collector of the local instance processed (observed) the event.", "description": "The time the collector of the local instance processed (observed) the event.",
"disable_correlation": true,
"misp-attribute": "datetime", "misp-attribute": "datetime",
"ui-priority": 1 "ui-priority": 1
}, },
"time.source": { "time.source": {
"description": "The time of occurence of the event as reported the feed (source).", "description": "The time of occurence of the event as reported the feed (source).",
"disable_correlation": true,
"misp-attribute": "datetime", "misp-attribute": "datetime",
"ui-priority": 1 "ui-priority": 1
}, },

View File

@ -47,6 +47,7 @@
}, },
"time.observation": { "time.observation": {
"description": "The time the collector of the local instance processed (observed) the event.", "description": "The time the collector of the local instance processed (observed) the event.",
"disable_correlation": true,
"misp-attribute": "datetime", "misp-attribute": "datetime",
"ui-priority": 1 "ui-priority": 1
} }

View File

@ -79,7 +79,8 @@
"Source", "Source",
"Originator", "Originator",
"Informant", "Informant",
"Emitter" "Emitter",
"Impersonated"
] ]
}, },
"sector": { "sector": {
@ -138,5 +139,5 @@
"alias" "alias"
], ],
"uuid": "f750e12b-127a-432c-b022-b3f9153c4e2a", "uuid": "f750e12b-127a-432c-b022-b3f9153c4e2a",
"version": 6 "version": 7
} }

View File

@ -223,7 +223,8 @@
"Source", "Source",
"Originator", "Originator",
"Informant", "Informant",
"Emitter" "Emitter",
"Impersonated"
] ]
}, },
"social-security-number": { "social-security-number": {
@ -255,5 +256,5 @@
"handle" "handle"
], ],
"uuid": "a15b0477-e9d1-4b9c-9546-abe78a4f4248", "uuid": "a15b0477-e9d1-4b9c-9546-abe78a4f4248",
"version": 19 "version": 20
} }

View File

@ -0,0 +1,89 @@
{
"attributes": {
"entropy": {
"description": "Measure of the information contained in a object as opposed to the portion of the object that is determined (or predictable)",
"disable_correlation": true,
"misp-attribute": "float",
"ui-priority": 1
},
"environment": {
"description": "Stairwell environments that this object has been seen within",
"misp-attribute": "comment",
"multiple": true,
"ui-priority": 0
},
"imphash": {
"description": "The Mandiant import hash (imphash) of the object",
"misp-attribute": "imphash",
"ui-priority": 0
},
"magic": {
"description": "Magic number as determined by yara rule based identification",
"misp-attribute": "comment",
"ui-priority": 0
},
"malEval-probability": {
"description": "Confidence that the label applies on the object",
"misp-attribute": "comment",
"ui-priority": 0
},
"malEval-severity": {
"description": "Severity of malware detected",
"misp-attribute": "comment",
"ui-priority": 0
},
"md5": {
"description": "The md5 hash signature of an object",
"misp-attribute": "md5",
"ui-priority": 1
},
"mime-type": {
"description": "MIME type as determined by yara rule based identification",
"disable_correlation": true,
"misp-attribute": "mime-type",
"ui-priority": 0
},
"sha1": {
"description": "The sha1 hash signature of an object",
"misp-attribute": "sha1",
"ui-priority": 1
},
"sha256": {
"description": "The sha256 hash signature of an object",
"misp-attribute": "sha256",
"ui-priority": 1
},
"size-in-bytes": {
"description": "The size of the file in bytes",
"disable_correlation": true,
"misp-attribute": "size-in-bytes",
"ui-priority": 0
},
"stairwell-first-seen": {
"description": "The timestamp at which an object was first observed by Stairwell",
"misp-attribute": "datetime",
"ui-priority": 0
},
"tlsh": {
"description": "The TLSH of the object",
"misp-attribute": "tlsh",
"ui-priority": 0
},
"yara-rule-match": {
"description": "Stairwell yara rule resource names which have matched on this object",
"misp-attribute": "comment",
"multiple": true,
"ui-priority": 0
}
},
"description": "Stairwell leverages automated analysis, YARA rule libraries, shared malware feeds, privately run AV verdicts, static & dynamic analysis, malware unpacking, and variant discovery.",
"meta-category": "file",
"name": "stairwell",
"requiredOneOf": [
"md5",
"sha1",
"sha256"
],
"uuid": "113d31ab-6eea-46df-976c-e955c369acd2",
"version": 1
}

View File

@ -1725,7 +1725,30 @@
"stix-2.1" "stix-2.1"
], ],
"name": "sample-of" "name": "sample-of"
},
{
"description": "This relationship describes an object which is allied with another object.",
"format": [
"misp"
],
"name": "is-allied-with "
},
{
"description": "The source object acquires the target object.",
"format": [
"misp"
],
"name": "acquires",
"opposite": "is-acquired-by"
},
{
"description": "The source object is acquired by the target object.",
"format": [
"misp"
],
"name": "is-acquired-by",
"opposite": "acquires"
} }
], ],
"version": 40 "version": 41
} }