chg: [RFCs] a few more typo corrections

pull/51/head
William Robinet 2025-01-02 11:11:22 +01:00
parent 2f2788a140
commit a77f9a6b61
No known key found for this signature in database
GPG Key ID: 003FA3DF74C7A949
10 changed files with 12 additions and 12 deletions

View File

@ -442,7 +442,7 @@ data is represented by a JSON string in base64 encoding. data **MUST** be set fo
#### RelatedAttribute
RelatedAttribute is an array of attributes correlating with the current attribute. Each element in the array represents an JSON object which contains an Attribute dictionnary with the external attributes who correlate. Each Attribute **MUST** include the id, org_id, info and a value. Only the correlations found on the local instance are shown in RelatedAttribute.
RelatedAttribute is an array of attributes correlating with the current attribute. Each element in the array represents an JSON object which contains an Attribute dictionary with the external attributes who correlate. Each Attribute **MUST** include the id, org_id, info and a value. Only the correlations found on the local instance are shown in RelatedAttribute.
RelatedAttribute **MAY** be present.

View File

@ -2053,7 +2053,7 @@ the sample <span class="bcp14">MUST</span> be encrypted using a password protect
<h5 id="name-relatedattribute">
<a href="#section-2.3.2.13" class="section-number selfRef">2.3.2.13. </a><a href="#name-relatedattribute" class="section-name selfRef">RelatedAttribute</a>
</h5>
<p id="section-2.3.2.13-1">RelatedAttribute is an array of attributes correlating with the current attribute. Each element in the array represents an JSON object which contains an Attribute dictionnary with the external attributes who correlate. Each Attribute <span class="bcp14">MUST</span> include the id, org_id, info and a value. Only the correlations found on the local instance are shown in RelatedAttribute.<a href="#section-2.3.2.13-1" class="pilcrow"></a></p>
<p id="section-2.3.2.13-1">RelatedAttribute is an array of attributes correlating with the current attribute. Each element in the array represents an JSON object which contains an Attribute dictionary with the external attributes who correlate. Each Attribute <span class="bcp14">MUST</span> include the id, org_id, info and a value. Only the correlations found on the local instance are shown in RelatedAttribute.<a href="#section-2.3.2.13-1" class="pilcrow"></a></p>
<p id="section-2.3.2.13-2">RelatedAttribute <span class="bcp14">MAY</span> be present.<a href="#section-2.3.2.13-2" class="pilcrow"></a></p>
</section>
</div>

View File

@ -752,7 +752,7 @@ Internet-Draft MISP core format December 2024
RelatedAttribute is an array of attributes correlating with the
current attribute. Each element in the array represents an JSON
object which contains an Attribute dictionnary with the external
object which contains an Attribute dictionary with the external
attributes who correlate. Each Attribute MUST include the id,
org_id, info and a value. Only the correlations found on the local
instance are shown in RelatedAttribute.

View File

@ -363,7 +363,7 @@ the sample <bcp14>MUST</bcp14> be encrypted using a password protected zip archi
</section>
<section anchor="relatedattribute"><name>RelatedAttribute</name>
<t>RelatedAttribute is an array of attributes correlating with the current attribute. Each element in the array represents an JSON object which contains an Attribute dictionnary with the external attributes who correlate. Each Attribute <bcp14>MUST</bcp14> include the id, org_id, info and a value. Only the correlations found on the local instance are shown in RelatedAttribute.</t>
<t>RelatedAttribute is an array of attributes correlating with the current attribute. Each element in the array represents an JSON object which contains an Attribute dictionary with the external attributes who correlate. Each Attribute <bcp14>MUST</bcp14> include the id, org_id, info and a value. Only the correlations found on the local instance are shown in RelatedAttribute.</t>
<t>RelatedAttribute <bcp14>MAY</bcp14> be present.</t>
</section>

View File

@ -613,7 +613,7 @@ A relationships directory is also included, containing a definition.json file wh
- [objects/stock](https://github.com/MISP/misp-objects/blob/main/objects/stock/definition.json) - Object to describe stock market.
- [objects/submarine](https://github.com/MISP/misp-objects/blob/main/objects/submarine/definition.json) - Submarine description.
- [objects/suricata](https://github.com/MISP/misp-objects/blob/main/objects/suricata/definition.json) - An object describing one or more Suricata rule(s) along with version and contextual information.
- [objects/target-system](https://github.com/MISP/misp-objects/blob/main/objects/target-system/definition.json) - Description about an targeted system, this could potentially be a compromissed internal system.
- [objects/target-system](https://github.com/MISP/misp-objects/blob/main/objects/target-system/definition.json) - Description about an targeted system, this could potentially be a compromised internal system.
- [objects/task](https://github.com/MISP/misp-objects/blob/main/objects/task/definition.json) - Task object as described in STIX 2.1 Incident object extension.
- [objects/tattoo](https://github.com/MISP/misp-objects/blob/main/objects/tattoo/definition.json) - Describes tattoos on a natural person's body.
- [objects/telegram-account](https://github.com/MISP/misp-objects/blob/main/objects/telegram-account/definition.json) - Information related to a telegram account.

View File

@ -2571,7 +2571,7 @@ document are to be interpreted as described in RFC 2119 <span>[<a href="#RFC2119
<a href="https://github.com/MISP/misp-objects/blob/main/objects/suricata/definition.json">objects/suricata</a> - An object describing one or more Suricata rule(s) along with version and contextual information.<a href="#section-3.1-1.288" class="pilcrow"></a>
</li>
<li class="compact" id="section-3.1-1.289">
<a href="https://github.com/MISP/misp-objects/blob/main/objects/target-system/definition.json">objects/target-system</a> - Description about an targeted system, this could potentially be a compromissed internal system.<a href="#section-3.1-1.289" class="pilcrow"></a>
<a href="https://github.com/MISP/misp-objects/blob/main/objects/target-system/definition.json">objects/target-system</a> - Description about an targeted system, this could potentially be a compromised internal system.<a href="#section-3.1-1.289" class="pilcrow"></a>
</li>
<li class="compact" id="section-3.1-1.290">
<a href="https://github.com/MISP/misp-objects/blob/main/objects/task/definition.json">objects/task</a> - Task object as described in STIX 2.1 Incident object extension.<a href="#section-3.1-1.290" class="pilcrow"></a>

View File

@ -1819,7 +1819,7 @@ Internet-Draft MISP object template format December 2023
* objects/target-system (https://github.com/MISP/misp-
objects/blob/main/objects/target-system/definition.json) -
Description about an targeted system, this could potentially be a
compromissed internal system.
compromised internal system.
* objects/task (https://github.com/MISP/misp-
objects/blob/main/objects/task/definition.json) - Task object as
described in STIX 2.1 Incident object extension.

View File

@ -576,7 +576,7 @@ document are to be interpreted as described in RFC 2119 <xref target="RFC2119"><
<li><eref target="https://github.com/MISP/misp-objects/blob/main/objects/stock/definition.json">objects/stock</eref> - Object to describe stock market.</li>
<li><eref target="https://github.com/MISP/misp-objects/blob/main/objects/submarine/definition.json">objects/submarine</eref> - Submarine description.</li>
<li><eref target="https://github.com/MISP/misp-objects/blob/main/objects/suricata/definition.json">objects/suricata</eref> - An object describing one or more Suricata rule(s) along with version and contextual information.</li>
<li><eref target="https://github.com/MISP/misp-objects/blob/main/objects/target-system/definition.json">objects/target-system</eref> - Description about an targeted system, this could potentially be a compromissed internal system.</li>
<li><eref target="https://github.com/MISP/misp-objects/blob/main/objects/target-system/definition.json">objects/target-system</eref> - Description about an targeted system, this could potentially be a compromised internal system.</li>
<li><eref target="https://github.com/MISP/misp-objects/blob/main/objects/task/definition.json">objects/task</eref> - Task object as described in STIX 2.1 Incident object extension.</li>
<li><eref target="https://github.com/MISP/misp-objects/blob/main/objects/tattoo/definition.json">objects/tattoo</eref> - Describes tattoos on a natural person's body.</li>
<li><eref target="https://github.com/MISP/misp-objects/blob/main/objects/telegram-account/definition.json">objects/telegram-account</eref> - Information related to a telegram account.</li>

View File

@ -478,7 +478,7 @@ The public directory of MISP taxonomies [@?MISP-T] contains more than 150 taxono
**crowdsec** : Crowdsec IP address classifications and behaviors taxonomy.
**cryptocurrency-threat** : Threats targetting cryptocurrency, based on CipherTrace report.
**cryptocurrency-threat** : Threats targeting cryptocurrency, based on CipherTrace report.
**csirt-americas** : Taxonomía CSIRT Américas.
@ -678,7 +678,7 @@ The public directory of MISP taxonomies [@?MISP-T] contains more than 150 taxono
**ransomware-roles** : The seven roles seen in most ransomware incidents.
**retention** : Add a retenion time to events to automatically remove the IDS-flag on ip-dst or ip-src attributes. We calculate the time elapsed based on the date of the event. Supported time units are: d(ays), w(eeks), m(onths), y(ears). The numerical_value is just for sorting in the web-interface and is not used for calculations.
**retention** : Add a retention time to events to automatically remove the IDS-flag on ip-dst or ip-src attributes. We calculate the time elapsed based on the date of the event. Supported time units are: d(ays), w(eeks), m(onths), y(ears). The numerical_value is just for sorting in the web-interface and is not used for calculations.
**rsit** : Reference Security Incident Classification Taxonomy

View File

@ -715,7 +715,7 @@ Internet-Draft MISP taxonomy format December 2024
*crowdsec* : Crowdsec IP address classifications and behaviors
taxonomy.
*cryptocurrency-threat* : Threats targetting cryptocurrency, based on
*cryptocurrency-threat* : Threats targeting cryptocurrency, based on
CipherTrace report.
*csirt-americas* : Taxonomía CSIRT Américas.
@ -1251,7 +1251,7 @@ Internet-Draft MISP taxonomy format December 2024
*ransomware-roles* : The seven roles seen in most ransomware
incidents.
*retention* : Add a retenion time to events to automatically remove
*retention* : Add a retention time to events to automatically remove
the IDS-flag on ip-dst or ip-src attributes. We calculate the time
elapsed based on the date of the event. Supported time units are:
d(ays), w(eeks), m(onths), y(ears). The numerical_value is just for