diff --git a/euci/machinetag.json b/euci/machinetag.json index 238f705..b83c003 100644 --- a/euci/machinetag.json +++ b/euci/machinetag.json @@ -23,5 +23,6 @@ "expanded": "RESTREINT UE/EU RESTRICTED", "description": "Information and material the unauthorised disclosure of which could be disadvantageous to the interests of the European Union or of one or more of the Member States." } - ] + ], + "values": null } diff --git a/kill-chain/machinetag.json b/kill-chain/machinetag.json index dd23fcd..c18ad3c 100644 --- a/kill-chain/machinetag.json +++ b/kill-chain/machinetag.json @@ -32,5 +32,6 @@ "value": "Actions on Objectives", "expanded": "Only now, after progressing through the first six phases, can intruders take actions to achieve their original objectives. Typically, this objective is data exfiltration which involves collecting, encrypting and extracting information from the victim environment; violations of data integrity or availability are potential objectives as well. Alternatively, the intruders may only desire access to the initial victim box for use as a hop point to compromise additional systems and move laterally inside the network." } - ] + ], + "values": null }