misp-objects/objects/trustar_report/definition.json

81 lines
3.4 KiB
JSON

{
"attributes": {
"BITCOIN_ADDRESS": {
"description": "A bitcoin address is an identifier of 26-35 alphanumeric characters, beginning with the number 1 or 3, that represents a possible destination for a bitcoin payment.",
"misp-attribute": "btc",
"multiple": true,
"ui-priority": 1
},
"CIDR_BLOCK": {
"description": "CIDR (Classless Inter-Domain Routing) identifies a range of IP addresses, and was introduced as a way to allow more flexible allocation of Internet Protocol (IP) addresses than was possible with the original system of IP address classes.",
"misp-attribute": "ip-src",
"multiple": true,
"ui-priority": 1
},
"CVE": {
"description": "The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures.",
"misp-attribute": "vulnerability",
"multiple": true,
"ui-priority": 1
},
"EMAIL_ADDRESS": {
"description": "An email address is a unique identifier for an email account.",
"misp-attribute": "email-src",
"multiple": true,
"ui-priority": 1
},
"IP": {
"description": "An Internet Protocol address (IP address) is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication.",
"misp-attribute": "ip-dst",
"multiple": true,
"ui-priority": 1
},
"MALWARE": {
"description": "Names of software that are intended to damage or disable computers and computer systems.",
"misp-attribute": "malware-type",
"multiple": true,
"ui-priority": 1
},
"MD5": {
"description": "The MD5 algorithm is a widely used hash function producing a 128-bit hash value.",
"misp-attribute": "md5",
"multiple": true,
"ui-priority": 1
},
"REGISTRY_KEY": {
"description": "The registry is a hierarchical database that contains data that is critical for the operation of Windows and the applications and services that run on Windows.",
"misp-attribute": "regkey",
"multiple": true,
"ui-priority": 1
},
"SHA1": {
"description": "SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long. SHA-1 is prone to length extension attacks.",
"misp-attribute": "sha1",
"multiple": true,
"ui-priority": 1
},
"SHA256": {
"description": "SHA-256 is a member of the SHA-2 cryptographic hash functions designed by the NSA, which are the successors to SHA-1. It is represented as a 64-character hexadecimal string.",
"misp-attribute": "sha256",
"multiple": true,
"ui-priority": 1
},
"SOFTWARE": {
"description": "The name of a file on a filesystem.",
"misp-attribute": "filename",
"multiple": true,
"ui-priority": 1
},
"URL": {
"description": "A Uniform Resource Locator (URL) is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.",
"misp-attribute": "url",
"multiple": true,
"ui-priority": 1
}
},
"description": "TruStar Report",
"meta-category": "network",
"name": "trustar_report",
"uuid": "8ff46cf1-db04-4453-ba46-d004e1ef6b7a",
"version": 1
}