misp-taxonomies/misp/machinetag.json

269 lines
6.4 KiB
JSON
Raw Normal View History

{
"values": [
{
"entry": [
{
"expanded": "tag to hide from the user-interface.",
"value": "hide"
}
],
"predicate": "ui"
},
{
"entry": [
{
"expanded": "tag to hide from the API.",
"value": "hide"
}
],
"predicate": "api"
2016-06-12 05:20:26 +02:00
},
2017-03-02 22:00:56 +01:00
{
"entry": [
2017-03-02 22:01:44 +01:00
{
2017-03-02 22:00:56 +01:00
"expanded": "block",
"value": "block"
2017-03-02 22:01:44 +01:00
}
2017-03-02 22:00:56 +01:00
],
"predicate": "expansion"
},
2016-06-12 05:20:26 +02:00
{
2017-02-13 12:02:51 +01:00
"predicate": "contributor",
"entry": [
2016-06-12 05:20:26 +02:00
{
"expanded": "OpenPGP Fingerprint",
"value": "pgpfingerprint"
}
2017-02-13 12:02:51 +01:00
]
},
{
2017-02-13 12:02:51 +01:00
"predicate": "confidence-level",
"entry": [
{
"expanded": "Completely confident",
"value": "completely-confident",
"numerical_value": 100
},
{
"expanded": "Usually confident",
"value": "usually-confident",
"numerical_value": 75
},
{
"expanded": "Fairly confident",
"value": "fairly-confident",
"numerical_value": 50
},
{
2016-09-12 10:57:12 +02:00
"expanded": "Rarely confident",
"value": "rarely-confident",
"numerical_value": 25
},
{
"expanded": "Unconfident",
"value": "unconfident",
"numerical_value": 0
},
{
"expanded": "Confidence cannot be evaluated",
"value": "confidence-cannot-be-evalued",
"numerical_value": 50
}
2017-02-13 12:02:51 +01:00
]
},
{
2017-02-13 12:02:51 +01:00
"predicate": "threat-level",
"entry": [
{
2017-02-13 12:02:51 +01:00
"expanded": "No risk",
"value": "no-risk",
"numerical_value": 0,
"description": "Harmless information. (CEUS threat level)"
},
2016-09-15 22:03:18 +02:00
{
2017-02-13 12:02:51 +01:00
"expanded": "Low risk",
"value": "low-risk",
"numerical_value": 25,
"description": "Low risk which can include mass-malware. (CEUS threat level)"
2016-09-15 22:03:18 +02:00
},
{
2017-02-13 12:02:51 +01:00
"expanded": "Medium risk",
"value": "medium-risk",
"numerical_value": 50,
"description": "Medium risk which can include targeted attacks (e.g. APT). (CEUS threat level)"
},
{
2017-02-13 12:02:51 +01:00
"expanded": "High risk",
"value": "high-risk",
"numerical_value": 100,
"description": "High risk which can include highly sophisticated attacks or 0-day attack. (CEUS threat level)"
}
2017-02-13 12:02:51 +01:00
]
},
2018-02-07 11:05:15 +01:00
{
"predicate": "automation-level",
"entry": [
{
"expanded": "Generated automatically without human verification",
"value": "unsupervised",
"numerical_value": 0
2018-02-07 11:05:15 +01:00
},
{
"expanded": "Generated automatically but verified by a human",
"value": "reviewed",
"numerical_value": 50
},
{
"expanded": "Output of human analysis",
"value": "manual",
"numerical_value": 100
2018-02-07 11:05:15 +01:00
}
]
},
{
"predicate": "tool",
"entry": [
{
"expanded": "misp2stix",
"value": "misp2stix"
},
{
"expanded": "misp2yara",
"value": "misp2yara"
}
]
},
{
"predicate": "misp2yara",
"entry": [
{
"expanded": "generated",
"value": "generated"
},
{
"expanded": "as-is",
"value": "as-is"
},
{
"expanded": "valid",
"value": "valid"
},
{
"expanded": "invalid",
"value": "invalid"
}
]
},
{
"predicate": "event-type",
"entry": [
{
"expanded": "observation",
"value": "observation"
},
{
"expanded": "incident",
"value": "incident"
},
{
"expanded": "report",
"value": "report"
},
{
"expanded": "collection",
"value": "collection"
},
{
"expanded": "analysis",
"value": "analysis"
},
{
"expanded": "automatic-analysis",
"value": "automatic-analysis"
}
]
},
{
"predicate": "ids",
"entry": [
{
"expanded": "force",
"value": "force",
"description": "Force the IDS flag to be the one from the tag."
},
{
"expanded": "true",
"value": "true",
"description": "Overwrite the current IDS flag of the information tag by IDS true."
},
{
"expanded": "false",
"value": "false",
"description": "Overwrite the current IDS flag of the information tag by IDS false."
}
]
}
],
"predicates": [
{
"expanded": "User-interface tag influencing the MISP behavior and visual interaction.",
"value": "ui"
},
{
"expanded": "API related tag influencing the MISP behavior of the API.",
"value": "api"
2016-06-12 05:20:26 +02:00
},
{
"description": "Expansion tag incluencing the MISP behavior using expansion modules",
"expanded": "Expansion",
"value": "expansion"
},
2016-06-12 05:20:26 +02:00
{
"expanded": "Information related to the contributor.",
"value": "contributor"
},
{
"expanded": "Confidence level",
"value": "confidence-level",
"exclusive": true
2016-09-15 22:05:43 +02:00
},
{
"expanded": "Cyberthreat Effect Universal Scale - MISP's internal threat level taxonomy",
"value": "threat-level",
"exclusive": true
},
{
"expanded": "Automation level",
"value": "automation-level",
"exclusive": true
},
{
"description": "Event with this tag should not be synced to other MISP instances",
"expanded": "Should not sync",
"value": "should-not-sync"
},
{
"description": "Tool associated with the information taggged",
"expanded": "Tool",
"value": "tool"
},
{
"expanded": "misp2yara export tool",
"value": "misp2yara",
"exclusive": true
},
{
"expanded": "IDS related tag unfluencing the MISP behavior of the IDS flag.",
"value": "ids"
},
{
"expanded": "Type of the event.",
"value": "event-type"
}
],
"version": 12,
"description": "MISP taxonomy to infer with MISP behavior or operation.",
"expanded": "MISP",
"namespace": "misp"
}