15개의 변경된 파일과 1119개의 추가작업 그리고 1068개의 파일을 삭제
@ -1,64 +1,86 @@ |
|||
{ |
|||
"namespace": "dhs-ciip-sectors", |
|||
"description": "DHS critical sectors as in https://www.dhs.gov/critical-infrastructure-sectors", |
|||
"version": 2, |
|||
"predicates": [{ |
|||
"value": "DHS-critical-sectors", |
|||
"expanded": "DHS critical sectors" |
|||
}, { |
|||
"value": "sector", |
|||
"expanded": "Sector" |
|||
}], |
|||
"values": [{ |
|||
"predicate": "DHS-critical-sectors", |
|||
"entry": [{ |
|||
"value": "chemical", |
|||
"expanded": "Chemical" |
|||
}, { |
|||
"value": "commercial-facilities", |
|||
"expanded": "Commercial Facilities" |
|||
}, { |
|||
"value": "communications", |
|||
"expanded": "Communications" |
|||
}, { |
|||
"value": "critical-manufacturing", |
|||
"expanded": "Critical Manufacturing" |
|||
}, { |
|||
"value": "dams", |
|||
"expanded": "Dams" |
|||
}, { |
|||
"value": "dib", |
|||
"expanded": "Defense Industrial Base" |
|||
}, { |
|||
"value": "emergency-services", |
|||
"expanded": "Emergency services" |
|||
}, { |
|||
"value": "energy", |
|||
"expanded": "energy" |
|||
}, { |
|||
"value": "financial-services", |
|||
"expanded": "Financial Services" |
|||
}, { |
|||
"value": "food-agriculture", |
|||
"expanded": "Food and Agriculture" |
|||
}, { |
|||
"value": "government-facilities", |
|||
"expanded": "Government Facilities" |
|||
}, { |
|||
"value": "healthcare-public", |
|||
"expanded": "Healthcare and Public Health" |
|||
}, { |
|||
"value": "it", |
|||
"expanded": "Information Technology" |
|||
}, { |
|||
"value": "nuclear", |
|||
"expanded": "Nuclear" |
|||
}, { |
|||
"value": "transport", |
|||
"expanded": "Transportation Systems" |
|||
}, { |
|||
"value": "water", |
|||
"expanded": "Water and water systems" |
|||
}] |
|||
}] |
|||
"namespace": "dhs-ciip-sectors", |
|||
"description": "DHS critical sectors as in https://www.dhs.gov/critical-infrastructure-sectors", |
|||
"version": 2, |
|||
"predicates": [ |
|||
{ |
|||
"value": "DHS-critical-sectors", |
|||
"expanded": "DHS critical sectors" |
|||
}, |
|||
{ |
|||
"value": "sector", |
|||
"expanded": "Sector" |
|||
} |
|||
], |
|||
"values": [ |
|||
{ |
|||
"predicate": "DHS-critical-sectors", |
|||
"entry": [ |
|||
{ |
|||
"value": "chemical", |
|||
"expanded": "Chemical" |
|||
}, |
|||
{ |
|||
"value": "commercial-facilities", |
|||
"expanded": "Commercial Facilities" |
|||
}, |
|||
{ |
|||
"value": "communications", |
|||
"expanded": "Communications" |
|||
}, |
|||
{ |
|||
"value": "critical-manufacturing", |
|||
"expanded": "Critical Manufacturing" |
|||
}, |
|||
{ |
|||
"value": "dams", |
|||
"expanded": "Dams" |
|||
}, |
|||
{ |
|||
"value": "dib", |
|||
"expanded": "Defense Industrial Base" |
|||
}, |
|||
{ |
|||
"value": "emergency-services", |
|||
"expanded": "Emergency services" |
|||
}, |
|||
{ |
|||
"value": "energy", |
|||
"expanded": "energy" |
|||
}, |
|||
{ |
|||
"value": "financial-services", |
|||
"expanded": "Financial Services" |
|||
}, |
|||
{ |
|||
"value": "food-agriculture", |
|||
"expanded": "Food and Agriculture" |
|||
}, |
|||
{ |
|||
"value": "government-facilities", |
|||
"expanded": "Government Facilities" |
|||
}, |
|||
{ |
|||
"value": "healthcare-public", |
|||
"expanded": "Healthcare and Public Health" |
|||
}, |
|||
{ |
|||
"value": "it", |
|||
"expanded": "Information Technology" |
|||
}, |
|||
{ |
|||
"value": "nuclear", |
|||
"expanded": "Nuclear" |
|||
}, |
|||
{ |
|||
"value": "transport", |
|||
"expanded": "Transportation Systems" |
|||
}, |
|||
{ |
|||
"value": "water", |
|||
"expanded": "Water and water systems" |
|||
} |
|||
] |
|||
} |
|||
] |
|||
} |
|||
|
|||
파일 크기가 너무 크기때문에 변경 상태를 표시하지 않습니다.
@ -1,195 +1,195 @@ |
|||
{ |
|||
"version": 1, |
|||
"description": "This taxonomy was designed to describe the type of incidents by class.", |
|||
"expanded": "Europol class of incidents taxonomy", |
|||
"namespace": "europol-incident", |
|||
"predicates": [ |
|||
{ |
|||
"value": "malware", |
|||
"expanded": "Malware" |
|||
}, |
|||
{ |
|||
"value": "availability", |
|||
"expanded": "Availability" |
|||
}, |
|||
"version": 1, |
|||
"description": "This taxonomy was designed to describe the type of incidents by class.", |
|||
"expanded": "Europol class of incidents taxonomy", |
|||
"namespace": "europol-incident", |
|||
"predicates": [ |
|||
{ |
|||
"value": "malware", |
|||
"expanded": "Malware" |
|||
}, |
|||
{ |
|||
"value": "availability", |
|||
"expanded": "Availability" |
|||
}, |
|||
{ |
|||
"value": "information-gathering", |
|||
"expanded": "Gathering of information" |
|||
}, |
|||
{ |
|||
"value": "intrusion-attempt", |
|||
"expanded": "Intrusion attempt" |
|||
}, |
|||
{ |
|||
"value": "intrusion", |
|||
"expanded": "Intrusion" |
|||
}, |
|||
{ |
|||
"value": "information-security", |
|||
"expanded": "Information security" |
|||
}, |
|||
{ |
|||
"value": "fraud", |
|||
"expanded": "Fraud" |
|||
}, |
|||
{ |
|||
"value": "abusive-content", |
|||
"expanded": "Abusive content" |
|||
}, |
|||
{ |
|||
"value": "other", |
|||
"expanded": "Other" |
|||
} |
|||
], |
|||
"values": [ |
|||
{ |
|||
"predicate": "malware", |
|||
"entry": [ |
|||
{ |
|||
"value": "infection", |
|||
"expanded": "Infection", |
|||
"description": "Infecting one or various systems with a specific type of malware." |
|||
}, |
|||
{ |
|||
"value": "distribution", |
|||
"expanded": "Distribution", |
|||
"description": "Infecting one or various systems with a specific type of malware." |
|||
}, |
|||
{ |
|||
"value": "c&c", |
|||
"expanded": "C&C", |
|||
"description": "Infecting one or various systems with a specific type of malware." |
|||
}, |
|||
{ |
|||
"value": "undetermined", |
|||
"expanded": "Undetermined" |
|||
} |
|||
] |
|||
}, |
|||
{ |
|||
"predicate": "availability", |
|||
"entry": [ |
|||
{ |
|||
"value": "information-gathering", |
|||
"expanded": "Gathering of information" |
|||
"value": "dos-ddos", |
|||
"expanded": "DoS/DDoS", |
|||
"description": "Disruption of the processing and response capacity of systems and networks in order to render them inoperative." |
|||
}, |
|||
{ |
|||
"value": "intrusion-attempt", |
|||
"expanded": "Intrusion attempt" |
|||
}, |
|||
"value": "sabotage", |
|||
"expanded": "Sabotage", |
|||
"description": "Premeditated action to damage a system, interrupt a process, change or delete information, etc." |
|||
} |
|||
] |
|||
}, |
|||
{ |
|||
"predicate": "information-gathering", |
|||
"entry": [ |
|||
{ |
|||
"value": "intrusion", |
|||
"expanded": "Intrusion" |
|||
"value": "scanning", |
|||
"expanded": "Scanning", |
|||
"description": "Active and passive gathering of information on systems or networks." |
|||
}, |
|||
{ |
|||
"value": "information-security", |
|||
"expanded": "Information security" |
|||
"value": "sniffing", |
|||
"expanded": "Sniffing", |
|||
"description": "Unauthorised monitoring and reading of network traffic." |
|||
}, |
|||
{ |
|||
"value": "fraud", |
|||
"expanded": "Fraud" |
|||
}, |
|||
"value": "phishing", |
|||
"expanded": "Phishing", |
|||
"description": "Attempt to gather information on a user or a system through phishing methods." |
|||
} |
|||
] |
|||
}, |
|||
{ |
|||
"predicate": "intrusion-attempt", |
|||
"entry": [ |
|||
{ |
|||
"value": "abusive-content", |
|||
"expanded": "Abusive content" |
|||
"value": "exploitation-vulnerability", |
|||
"expanded": "Exploitation of vulnerability", |
|||
"description": "Attempt to intrude by exploiting a vulnerability in a system, component or network." |
|||
}, |
|||
{ |
|||
"value": "other", |
|||
"expanded": "Other" |
|||
"value": "login-attempt", |
|||
"expanded": "Login attempt", |
|||
"description": "Attempt to log in to services or authentication / access control mechanisms." |
|||
} |
|||
], |
|||
"values": [ |
|||
{ |
|||
"predicate": "malware", |
|||
"entry": [ |
|||
{ |
|||
"value": "infection", |
|||
"expanded": "Infection", |
|||
"description": "Infecting one or various systems with a specific type of malware." |
|||
}, |
|||
{ |
|||
"value": "distribution", |
|||
"expanded": "Distribution", |
|||
"description": "Infecting one or various systems with a specific type of malware." |
|||
}, |
|||
{ |
|||
"value": "c&c", |
|||
"expanded": "C&C", |
|||
"description": "Infecting one or various systems with a specific type of malware." |
|||
}, |
|||
{ |
|||
"value": "undetermined", |
|||
"expanded": "Undetermined" |
|||
} |
|||
] |
|||
}, |
|||
] |
|||
}, |
|||
{ |
|||
"predicate": "intrusion", |
|||
"entry": [ |
|||
{ |
|||
"predicate": "availability", |
|||
"entry": [ |
|||
{ |
|||
"value": "dos-ddos", |
|||
"expanded": "DoS/DDoS", |
|||
"description": "Disruption of the processing and response capacity of systems and networks in order to render them inoperative." |
|||
}, |
|||
{ |
|||
"value": "sabotage", |
|||
"expanded": "Sabotage", |
|||
"description": "Premeditated action to damage a system, interrupt a process, change or delete information, etc." |
|||
} |
|||
] |
|||
"value": "exploitation-vulnerability", |
|||
"expanded": "Exploitation of vulnerability", |
|||
"description": "Actual intrusion by exploiting a vulnerability in the system, component or network." |
|||
}, |
|||
{ |
|||
"predicate": "information-gathering", |
|||
"entry": [ |
|||
{ |
|||
"value": "scanning", |
|||
"expanded": "Scanning", |
|||
"description": "Active and passive gathering of information on systems or networks." |
|||
}, |
|||
{ |
|||
"value": "sniffing", |
|||
"expanded": "Sniffing", |
|||
"description": "Unauthorised monitoring and reading of network traffic." |
|||
}, |
|||
{ |
|||
"value": "phishing", |
|||
"expanded": "Phishing", |
|||
"description": "Attempt to gather information on a user or a system through phishing methods." |
|||
} |
|||
] |
|||
}, |
|||
"value": "compromising-account", |
|||
"expanded": "Compromising an account", |
|||
"description": "Actual intrusion in a system, component or network by compromising a user or administrator account." |
|||
} |
|||
] |
|||
}, |
|||
{ |
|||
"predicate": "information-security", |
|||
"entry": [ |
|||
{ |
|||
"predicate": "intrusion-attempt", |
|||
"entry": [ |
|||
{ |
|||
"value": "exploitation-vulnerability", |
|||
"expanded": "Exploitation of vulnerability", |
|||
"description": "Attempt to intrude by exploiting a vulnerability in a system, component or network." |
|||
}, |
|||
{ |
|||
"value": "login-attempt", |
|||
"expanded": "Login attempt", |
|||
"description": "Attempt to log in to services or authentication / access control mechanisms." |
|||
} |
|||
] |
|||
"value": "unauthorized-access", |
|||
"expanded": "Unauthorised access", |
|||
"description": "Unauthorised access to a particular set of information" |
|||
}, |
|||
{ |
|||
"predicate": "intrusion", |
|||
"entry": [ |
|||
{ |
|||
"value": "exploitation-vulnerability", |
|||
"expanded": "Exploitation of vulnerability", |
|||
"description": "Actual intrusion by exploiting a vulnerability in the system, component or network." |
|||
}, |
|||
{ |
|||
"value": "compromising-account", |
|||
"expanded": "Compromising an account", |
|||
"description": "Actual intrusion in a system, component or network by compromising a user or administrator account." |
|||
} |
|||
] |
|||
}, |
|||
"value": "unauthorized-modification", |
|||
"expanded": "Unauthorised modification/deletion", |
|||
"description": "Unauthorised change or elimination of a particular set of information" |
|||
} |
|||
] |
|||
}, |
|||
{ |
|||
"predicate": "fraud", |
|||
"entry": [ |
|||
{ |
|||
"predicate": "information-security", |
|||
"entry": [ |
|||
{ |
|||
"value": "unauthorized-access", |
|||
"expanded": "Unauthorised access", |
|||
"description": "Unauthorised access to a particular set of information" |
|||
}, |
|||
{ |
|||
"value": "unauthorized-modification", |
|||
"expanded": "Unauthorised modification/deletion", |
|||
"description": "Unauthorised change or elimination of a particular set of information" |
|||
} |
|||
] |
|||
"value": "illegitimate-use-resources", |
|||
"expanded": "Misuse or unauthorised use of resources", |
|||
"description": "Use of institutional resources for purposes other than those intended." |
|||
}, |
|||
{ |
|||
"predicate": "fraud", |
|||
"entry": [ |
|||
{ |
|||
"value": "illegitimate-use-resources", |
|||
"expanded": "Misuse or unauthorised use of resources", |
|||
"description": "Use of institutional resources for purposes other than those intended." |
|||
}, |
|||
{ |
|||
"value": "illegitimate-use-name", |
|||
"expanded": "Illegitimate use of the name of a third party", |
|||
"description": "Use of the name of an institution without permission to do so." |
|||
} |
|||
] |
|||
"value": "illegitimate-use-name", |
|||
"expanded": "Illegitimate use of the name of a third party", |
|||
"description": "Use of the name of an institution without permission to do so." |
|||
} |
|||
] |
|||
}, |
|||
{ |
|||
"predicate": "abusive-content", |
|||
"entry": [ |
|||
{ |
|||
"value": "spam", |
|||
"expanded": "SPAM", |
|||
"description": " Sending SPAM messages." |
|||
}, |
|||
{ |
|||
"predicate": "abusive-content", |
|||
"entry": [ |
|||
{ |
|||
"value": "spam", |
|||
"expanded": "SPAM", |
|||
"description": " Sending SPAM messages." |
|||
}, |
|||
{ |
|||
"value": "copyright", |
|||
"expanded": "Copyright", |
|||
"description": "Distribution and sharing of copyright protected content." |
|||
}, |
|||
{ |
|||
"value": "content-forbidden-by-law", |
|||
"expanded": "Dissemination of content forbidden by law.", |
|||
"description": "Child pornography, racism and apology of violence." |
|||
} |
|||
] |
|||
"value": "copyright", |
|||
"expanded": "Copyright", |
|||
"description": "Distribution and sharing of copyright protected content." |
|||
}, |
|||
{ |
|||
"predicate": "other", |
|||
"entry": [ |
|||
{ |
|||
"value": "other", |
|||
"expanded": "Other", |
|||
"description": " Other type of unspecified incident" |
|||
} |
|||
] |
|||
"value": "content-forbidden-by-law", |
|||
"expanded": "Dissemination of content forbidden by law.", |
|||
"description": "Child pornography, racism and apology of violence." |
|||
} |
|||
] |
|||
}, |
|||
{ |
|||
"predicate": "other", |
|||
"entry": [ |
|||
{ |
|||
"value": "other", |
|||
"expanded": "Other", |
|||
"description": " Other type of unspecified incident" |
|||
} |
|||
] |
|||
] |
|||
} |
|||
] |
|||
} |
|||
|
|||
@ -1,86 +1,86 @@ |
|||
{ |
|||
"namespace" : "passivetotal", |
|||
"expanded" : "PassiveTotal", |
|||
"description": "Tags from RiskIQ's PassiveTotal service", |
|||
"version" : 1, |
|||
"predicates": [ |
|||
"namespace": "passivetotal", |
|||
"expanded": "PassiveTotal", |
|||
"description": "Tags from RiskIQ's PassiveTotal service", |
|||
"version": 1, |
|||
"predicates": [ |
|||
{ |
|||
"value": "sinkholed", |
|||
"expanded": "Sinkhole Status" |
|||
}, |
|||
{ |
|||
"value": "ever-comprimised", |
|||
"expanded": "Ever Comprimised?" |
|||
}, |
|||
{ |
|||
"value": "class", |
|||
"expanded": "Classification" |
|||
}, |
|||
{ |
|||
"value": "dynamic-dns", |
|||
"expanded": "Dynamic DNS" |
|||
} |
|||
], |
|||
"values": [ |
|||
{ |
|||
"predicate": "sinkholed", |
|||
"entry": [ |
|||
{ |
|||
"value" : "sinkholed", |
|||
"expanded": "Sinkhole Status" |
|||
"value": "yes", |
|||
"expanded": "Yes" |
|||
}, |
|||
{ |
|||
"value" : "ever-comprimised", |
|||
"expanded" : "Ever Comprimised?" |
|||
"value": "no", |
|||
"expanded": "No" |
|||
} |
|||
] |
|||
}, |
|||
{ |
|||
"predicate": "ever-comprimised", |
|||
"entry": [ |
|||
{ |
|||
"value": "yes", |
|||
"expanded": "Yes" |
|||
}, |
|||
{ |
|||
"value" : "class", |
|||
"expanded" : "Classification" |
|||
"value": "no", |
|||
"expanded": "No" |
|||
} |
|||
] |
|||
}, |
|||
{ |
|||
"predicate": "dynamic-dns", |
|||
"entry": [ |
|||
{ |
|||
"value": "yes", |
|||
"expanded": "Yes" |
|||
}, |
|||
{ |
|||
"value" : "dynamic-dns", |
|||
"expanded": "Dynamic DNS" |
|||
"value": "no", |
|||
"expanded": "No" |
|||
} |
|||
], |
|||
"values" : [ |
|||
{ |
|||
"predicate" : "sinkholed", |
|||
"entry" : [ |
|||
{ |
|||
"value" : "yes", |
|||
"expanded": "Yes" |
|||
}, |
|||
{ |
|||
"value" : "no", |
|||
"expanded" : "No" |
|||
} |
|||
] |
|||
] |
|||
}, |
|||
{ |
|||
"predicate": "class", |
|||
"entry": [ |
|||
{ |
|||
"value": "malicious", |
|||
"expanded": "Malicious" |
|||
}, |
|||
{ |
|||
"predicate" : "ever-comprimised", |
|||
"entry" : [ |
|||
{ |
|||
"value" : "yes", |
|||
"expanded": "Yes" |
|||
}, |
|||
{ |
|||
"value" : "no", |
|||
"expanded" : "No" |
|||
} |
|||
] |
|||
"value": "suspicious", |
|||
"expanded": "Malicious" |
|||
}, |
|||
{ |
|||
"predicate" : "dynamic-dns", |
|||
"entry" : [ |
|||
{ |
|||
"value" : "yes", |
|||
"expanded": "Yes" |
|||
}, |
|||
{ |
|||
"value" : "no", |
|||
"expanded" : "No" |
|||
} |
|||
] |
|||
"value": "non-malicious", |
|||
"expanded": "Non Malicious" |
|||
}, |
|||
{ |
|||
"predicate" : "class", |
|||
"entry" : [ |
|||
{ |
|||
"value" : "malicious", |
|||
"expanded" : "Malicious" |
|||
}, |
|||
{ |
|||
"value" : "suspicious", |
|||
"expanded": "Malicious" |
|||
}, |
|||
{ |
|||
"value": "non-malicious", |
|||
"expanded": "Non Malicious" |
|||
}, |
|||
{ |
|||
"value" : "unknown", |
|||
"expanded" : "Unknown" |
|||
} |
|||
] |
|||
"value": "unknown", |
|||
"expanded": "Unknown" |
|||
} |
|||
] |
|||
] |
|||
} |
|||
] |
|||
} |
|||
|
|||
@ -1,115 +1,114 @@ |
|||
{ |
|||
"namespace": "stix-ttp", |
|||
"expanded": "STIX TTP", |
|||
"version": 1, |
|||
"description": "TTPs are representations of the behavior or modus operandi of cyber adversaries.", |
|||
"refs": [ |
|||
"http://stixproject.github.io/documentation/idioms/industry-sector/" |
|||
], |
|||
"predicates": [ |
|||
{ |
|||
"value": "victim-targeting", |
|||
"expanded": "Victim Targeting" |
|||
} |
|||
], |
|||
"values": [ |
|||
{ |
|||
"predicate": "victim-targeting", |
|||
"entry": [ |
|||
{ |
|||
"value": "business-professional-sector", |
|||
"expanded": "Business & Professional Services Sector" |
|||
}, |
|||
{ |
|||
"value": "retail-sector", |
|||
"expanded": "Retail Sector" |
|||
}, |
|||
{ |
|||
"value": "financial-sector", |
|||
"expanded": "Financial Services Sector" |
|||
}, |
|||
{ |
|||
"value": "media-entertainment-sector", |
|||
"expanded": "Media & Entertainment Sector" |
|||
}, |
|||
{ |
|||
"value": "construction-engineering-sector", |
|||
"expanded": "Construction & Engineering Sector" |
|||
}, |
|||
{ |
|||
"value": "government-international-organizations-sector", |
|||
"expanded": "Goverment & International Organizations" |
|||
}, |
|||
{ |
|||
"value": "legal-sector", |
|||
"expanded": "Legal Services" |
|||
}, |
|||
{ |
|||
"value": "hightech-it-sector", |
|||
"expanded": "High-Tech & IT Sector" |
|||
}, |
|||
{ |
|||
"value": "healthcare-sector", |
|||
"expanded": "Healthcare Sector" |
|||
}, |
|||
{ |
|||
"value": "transportation-sector", |
|||
"expanded": "Transportation Sector" |
|||
}, |
|||
{ |
|||
"value": "aerospace-defence-sector", |
|||
"expanded": "Aerospace & Defense Sector" |
|||
}, |
|||
{ |
|||
"value": "energy-sector", |
|||
"expanded": "Energy Sector" |
|||
}, |
|||
{ |
|||
"value": "food-sector", |
|||
"expanded": "Food Sector" |
|||
}, |
|||
{ |
|||
"value": "natural-resources-sector", |
|||
"expanded": "Natural Resources Sector" |
|||
}, |
|||
{ |
|||
"value": "other-sector", |
|||
"expanded": "Other Sector" |
|||
}, |
|||
|
|||
{ |
|||
"value": "corporate-employee-information", |
|||
"expanded": "Corporate Employee Information" |
|||
}, |
|||
{ |
|||
"value": "customer-pii", |
|||
"expanded": "Customer PII" |
|||
}, |
|||
{ |
|||
"value": "email-lists-archives", |
|||
"expanded": "Email Lists/Archives" |
|||
}, |
|||
{ |
|||
"value": "financial-data", |
|||
"expanded": "Financial Data" |
|||
}, |
|||
{ |
|||
"value": "intellectual-property", |
|||
"expanded": "Intellectual Property" |
|||
}, |
|||
{ |
|||
"value": "mobile-phone-contacts", |
|||
"expanded": "Mobile Phone Contacts" |
|||
}, |
|||
{ |
|||
"value": "user-credentials", |
|||
"expanded": "User Credentials" |
|||
}, |
|||
{ |
|||
"value": "authentification-cookies", |
|||
"expanded": "Authentication Cookies" |
|||
} |
|||
] |
|||
} |
|||
] |
|||
"namespace": "stix-ttp", |
|||
"expanded": "STIX TTP", |
|||
"version": 1, |
|||
"description": "TTPs are representations of the behavior or modus operandi of cyber adversaries.", |
|||
"refs": [ |
|||
"http://stixproject.github.io/documentation/idioms/industry-sector/" |
|||
], |
|||
"predicates": [ |
|||
{ |
|||
"value": "victim-targeting", |
|||
"expanded": "Victim Targeting" |
|||
} |
|||
], |
|||
"values": [ |
|||
{ |
|||
"predicate": "victim-targeting", |
|||
"entry": [ |
|||
{ |
|||
"value": "business-professional-sector", |
|||
"expanded": "Business & Professional Services Sector" |
|||
}, |
|||
{ |
|||
"value": "retail-sector", |
|||
"expanded": "Retail Sector" |
|||
}, |
|||
{ |
|||
"value": "financial-sector", |
|||
"expanded": "Financial Services Sector" |
|||
}, |
|||
{ |
|||
"value": "media-entertainment-sector", |
|||
"expanded": "Media & Entertainment Sector" |
|||
}, |
|||
{ |
|||
"value": "construction-engineering-sector", |
|||
"expanded": "Construction & Engineering Sector" |
|||
}, |
|||
{ |
|||
"value": "government-international-organizations-sector", |
|||
"expanded": "Goverment & International Organizations" |
|||
}, |
|||
{ |
|||
"value": "legal-sector", |
|||
"expanded": "Legal Services" |
|||
}, |
|||
{ |
|||
"value": "hightech-it-sector", |
|||
"expanded": "High-Tech & IT Sector" |
|||
}, |
|||
{ |
|||
"value": "healthcare-sector", |
|||
"expanded": "Healthcare Sector" |
|||
}, |
|||
{ |
|||
"value": "transportation-sector", |
|||
"expanded": "Transportation Sector" |
|||
}, |
|||
{ |
|||
"value": "aerospace-defence-sector", |
|||
"expanded": "Aerospace & Defense Sector" |
|||
}, |
|||
{ |
|||
"value": "energy-sector", |
|||
"expanded": "Energy Sector" |
|||
}, |
|||
{ |
|||
"value": "food-sector", |
|||
"expanded": "Food Sector" |
|||
}, |
|||
{ |
|||
"value": "natural-resources-sector", |
|||
"expanded": "Natural Resources Sector" |
|||
}, |
|||
{ |
|||
"value": "other-sector", |
|||
"expanded": "Other Sector" |
|||
}, |
|||
{ |
|||
"value": "corporate-employee-information", |
|||
"expanded": "Corporate Employee Information" |
|||
}, |
|||
{ |
|||
"value": "customer-pii", |
|||
"expanded": "Customer PII" |
|||
}, |
|||
{ |
|||
"value": "email-lists-archives", |
|||
"expanded": "Email Lists/Archives" |
|||
}, |
|||
{ |
|||
"value": "financial-data", |
|||
"expanded": "Financial Data" |
|||
}, |
|||
{ |
|||
"value": "intellectual-property", |
|||
"expanded": "Intellectual Property" |
|||
}, |
|||
{ |
|||
"value": "mobile-phone-contacts", |
|||
"expanded": "Mobile Phone Contacts" |
|||
}, |
|||
{ |
|||
"value": "user-credentials", |
|||
"expanded": "User Credentials" |
|||
}, |
|||
{ |
|||
"value": "authentification-cookies", |
|||
"expanded": "Authentication Cookies" |
|||
} |
|||
] |
|||
} |
|||
] |
|||
} |
|||
|
|||
불러오는 중...
Reference in new issue