chg: [circl] updated the original proposal + ransomware added +

classification proposal removed (should be in a different taxonomy)
pull/207/head
Alexandre Dulaunoy 2021-03-25 12:10:09 +01:00
parent 284270b10e
commit 55f0747fa3
No known key found for this signature in database
GPG Key ID: 09E2CD4944E6CBCD
2 changed files with 29 additions and 46 deletions

View File

@ -76,7 +76,7 @@
{ {
"description": "CIRCL Taxonomy - Schemes of Classification in Incident Response and Detection", "description": "CIRCL Taxonomy - Schemes of Classification in Incident Response and Detection",
"name": "circl", "name": "circl",
"version": 4 "version": 5
}, },
{ {
"description": "Course of action taken within organization to discover, detect, deny, disrupt, degrade, deceive and/or destroy an attack.", "description": "Course of action taken within organization to discover, detect, deny, disrupt, degrade, deceive and/or destroy an attack.",
@ -409,9 +409,9 @@
"version": 2 "version": 2
}, },
{ {
"description": "classification for the identification of type of misinformation among websites. Source:False, Misleading, Clickbait-y, and/or Satirical 'News' Sources by Melissa Zimdars 2019", "description": "classification for the identification of type of misinformation among websites. Source:False, Misleading, Clickbait-y, and/or Satirical News Sources by Melissa Zimdars 2019",
"name": "misinformation-website-label", "name": "misinformation-website-label",
"version": "1" "version": 1
}, },
{ {
"description": "MISP taxonomy to infer with MISP behavior or operation.", "description": "MISP taxonomy to infer with MISP behavior or operation.",
@ -590,5 +590,5 @@
} }
], ],
"url": "https://raw.githubusercontent.com/MISP/misp-taxonomies/master/", "url": "https://raw.githubusercontent.com/MISP/misp-taxonomies/master/",
"version": "20200612" "version": "20210325"
} }

View File

@ -1,7 +1,7 @@
{ {
"namespace": "circl", "namespace": "circl",
"description": "CIRCL Taxonomy - Schemes of Classification in Incident Response and Detection", "description": "CIRCL Taxonomy - Schemes of Classification in Incident Response and Detection",
"version": 4, "version": 5,
"predicates": [ "predicates": [
{ {
"value": "incident-classification", "value": "incident-classification",
@ -29,8 +29,8 @@
"expanded": "Sabotage" "expanded": "Sabotage"
}, },
{ {
"value": "gdpr-violation", "value": "privacy-violation",
"expanded": "GDPR Violation" "expanded": "Privacy violation"
}, },
{ {
"value": "scan", "value": "scan",
@ -54,7 +54,7 @@
}, },
{ {
"value": "smishing", "value": "smishing",
"expanded": "Sms Phishing" "expanded": "SMS Phishing"
}, },
{ {
"value": "malware", "value": "malware",
@ -104,6 +104,10 @@
"value": "wiper", "value": "wiper",
"expanded": "Wiper" "expanded": "Wiper"
}, },
{
"value": "ransomware",
"expanded": "ransomware"
},
{ {
"value": "sextortion", "value": "sextortion",
"expanded": "sextortion" "expanded": "sextortion"
@ -122,27 +126,6 @@
} }
] ]
}, },
{
"predicate": "information-classfication",
"entry": [
{
"value": "confidential",
"expanded": "Confidential Information (top confidentiality level)"
},
{
"value": "restricted",
"expanded": "Restricted Information (medium confidentiality level)"
},
{
"value": "internal-use",
"expanded": "Internal Use Information (lowest level of confidentiality)"
},
{
"value": "public",
"expanded": "Public Information (everyone can see the information)"
}
]
},
{ {
"predicate": "topic", "predicate": "topic",
"entry": [ "entry": [