"description":"This taxonomy was designed to describe the type of events",
"version":1,
"predicates":[
{
"value":"infected-by-known-malware",
"expanded":"System(s) infected by known malware",
"description":"The presence of any of the types of malware was detected in a system."
},
{
"value":"dissemination-malware-email",
"expanded":"Dissemination of malware by email",
"description":"Malware attached to a message or email message containing link to malicious URL."
},
{
"value":"hosting-malware-webpage",
"expanded":"Hosting of malware on web page",
"description":" Web page disseminating one or various types of malware."
},
{
"value":"c&c-server-hosting",
"expanded":"Hosting of malware on web page",
"description":"Web page disseminating one or various types of malware."
},
{
"value":"worm-spreading",
"expanded":"Replication and spreading of a worm",
"description":"System infected by a worm trying to infect other systems."
},
{
"value":"connection-malware-port",
"expanded":"Connection to (a) suspicious port(s) linked to specific malware",
"description":"System attempting to gain access to a port normally linked to a specific type of malware."
},
{
"value":"connection-malware-system",
"expanded":"Connection to (a) suspicious system(s) linked to specific malware",
"description":"System attempting to gain access to an IP address or URL normally linked to a specific type of malware, e.g. C&C or a distribution page for components linked to a specific botnet."
},
{
"value":"flood",
"expanded":"Flood of requests",
"description":"Mass mailing of requests (network packets, emails, etc...) from one single source to a specific service, aimed at affecting its normal functioning."
},
{
"value":"exploit-tool-exhausting-resources",
"expanded":"Exploit or tool aimed at exhausting resources (network, processing capacity, sessions, etc...)",
"description":"One single source using specially designed software to affect the normal functioning of a specific service, by exploiting a vulnerability."
},
{
"value":"packet-flood",
"expanded":"Packet flooding",
"description":"Mass mailing of requests (network packets, emails, etc...) from various sources to a specific service, aimed at affecting its normal functioning."
},
{
"value":"exploit-framework-exhausting-resources",
"expanded":"Exploit or tool distribution aimed at exhausting resources",
"description":"Various sources using specially designed software to affect the normal functioning of a specific service, by exploiting a vulnerability."
},
{
"value":"vandalism",
"expanded":"Vandalism",
"description":"Logical and physical activities which – although they are not aimed at causing damage to information or at preventing its transmission among systems – have this effect."
},
{
"value":"disruption-data-transmission",
"expanded":"Intentional disruption of data transmission and processing mechanisms",
"description":"Logical and physical activities aimed at causing damage to information or at preventing its transmission among systems."
},
{
"value":"system-probe",
"expanded":"System probe",
"description":"Single system scan searching for open ports or services using these ports for responding."
},
{
"value":"network-scanning",
"expanded":"Network scanning",
"description":"Scanning a network aimed at identifying systems which are active in the same network."
},
{
"value":"dns-zone-transfer",
"expanded":"DNS zone transfer",
"description":"Transfer of a specific DNS zone."
},
{
"value":"wiretapping",
"expanded":"Wiretapping",
"description":"Logical or physical interception of communications."
},
{
"value":"dissemination-phishing-emails",
"expanded":"Dissemination of phishing emails",
"description":"Mass emailing aimed at collecting data for phishing purposes with regard to the victims."
},
{
"value":"hosting-phishing-sites",
"expanded":"Hosting phishing sites",
"description":"Hosting web sites for phishing purposes."