update readme
parent
00fd09ac77
commit
a39e0375ef
|
@ -12,7 +12,7 @@ The following taxonomies can be used in MISP (as local or distributed tags) or i
|
||||||
|
|
||||||
The following taxonomies are described:
|
The following taxonomies are described:
|
||||||
|
|
||||||
- [Access-now](./accessnow)
|
- [access-method](./access-method)
|
||||||
- [action-taken](./action-taken)
|
- [action-taken](./action-taken)
|
||||||
- [Admiralty Scale](./admiralty-scale)
|
- [Admiralty Scale](./admiralty-scale)
|
||||||
- [adversary](./adversary) - description of an adversary infrastructure
|
- [adversary](./adversary) - description of an adversary infrastructure
|
||||||
|
@ -47,6 +47,7 @@ The following taxonomies are described:
|
||||||
- [NATO Classification Marking](./nato)
|
- [NATO Classification Marking](./nato)
|
||||||
- [Open Threat Taxonomy v1.1 (SANS)](./open_threat)
|
- [Open Threat Taxonomy v1.1 (SANS)](./open_threat)
|
||||||
- [OSINT Open Source Intelligence - Classification](./osint)
|
- [OSINT Open Source Intelligence - Classification](./osint)
|
||||||
|
- [Ransomware](./ransomware)
|
||||||
- [runtime-packer](./runtime-packer) - Runtime or software packer used to combine compressed data with the decompression code. The decompression code can add additional obfuscations mechanisms including polymorphic-packer or other o
|
- [runtime-packer](./runtime-packer) - Runtime or software packer used to combine compressed data with the decompression code. The decompression code can add additional obfuscations mechanisms including polymorphic-packer or other o
|
||||||
bfuscation techniques. This taxonomy lists all the known or official packer used for legitimate use or for packing malicious binaries.
|
bfuscation techniques. This taxonomy lists all the known or official packer used for legitimate use or for packing malicious binaries.
|
||||||
- [STIX-TTP](./stix-ttp) - Represents the behavior or modus operandi of cyber adversaries as normalized in STIX
|
- [STIX-TTP](./stix-ttp) - Represents the behavior or modus operandi of cyber adversaries as normalized in STIX
|
||||||
|
|
Loading…
Reference in New Issue