misp-taxonomies/adversary/machinetag.json

60 lines
1.6 KiB
JSON
Raw Normal View History

{
"namespace": "adversary",
"description": "An overview and description of the adversary infrastructure",
"version": 1,
"predicates": [
{
"value": "infrastructure-status",
"expanded": "Infrastructure Status"
},
{
"value": "infrastructure-type",
"expanded": "Infrastructure Type"
}
],
"values": [
{
"predicate": "infrastructure-status",
"entry": [
{
"value": "unknown",
"expanded": "Infrastructure ownership and status is unknown"
},
{
"value": "compromised",
"expanded": "Infrastructure compromised by or in the benefit of the adversary"
},
{
"value": "own-and-operated",
"expanded": "Infrastructure own and operated by the adversary"
}
]
},
{
"predicate": "infrastructure-type",
"entry": [
{
"value": "unknown",
"expanded": "Infrastructure usage by the adversary is unknown"
},
{
"value": "proxy",
"expanded": "Infrastructure used as proxy between the target and the adversary"
},
{
"value": "drop-zone",
"expanded": "Infrastructure used by the adversary to store information related to its campaigns"
},
{
"value": "exploit-distribution-point",
"expanded": "Infrastructure used to distribute exploit towards target(s)"
},
{
"value": "vpn",
"expanded": "Infrastructure used by an adversary as Virtual Private Network to hide activities and reduce the traffic analysis surface"
}
]
}
]
}