update readme

pull/141/head
Deborah Servili 2019-04-05 11:12:43 +02:00
parent 00fd09ac77
commit a39e0375ef
No known key found for this signature in database
GPG Key ID: 7E3A832850D4D7D1
1 changed files with 2 additions and 1 deletions

View File

@ -12,7 +12,7 @@ The following taxonomies can be used in MISP (as local or distributed tags) or i
The following taxonomies are described: The following taxonomies are described:
- [Access-now](./accessnow) - [access-method](./access-method)
- [action-taken](./action-taken) - [action-taken](./action-taken)
- [Admiralty Scale](./admiralty-scale) - [Admiralty Scale](./admiralty-scale)
- [adversary](./adversary) - description of an adversary infrastructure - [adversary](./adversary) - description of an adversary infrastructure
@ -47,6 +47,7 @@ The following taxonomies are described:
- [NATO Classification Marking](./nato) - [NATO Classification Marking](./nato)
- [Open Threat Taxonomy v1.1 (SANS)](./open_threat) - [Open Threat Taxonomy v1.1 (SANS)](./open_threat)
- [OSINT Open Source Intelligence - Classification](./osint) - [OSINT Open Source Intelligence - Classification](./osint)
- [Ransomware](./ransomware)
- [runtime-packer](./runtime-packer) - Runtime or software packer used to combine compressed data with the decompression code. The decompression code can add additional obfuscations mechanisms including polymorphic-packer or other o - [runtime-packer](./runtime-packer) - Runtime or software packer used to combine compressed data with the decompression code. The decompression code can add additional obfuscations mechanisms including polymorphic-packer or other o
bfuscation techniques. This taxonomy lists all the known or official packer used for legitimate use or for packing malicious binaries. bfuscation techniques. This taxonomy lists all the known or official packer used for legitimate use or for packing malicious binaries.
- [STIX-TTP](./stix-ttp) - Represents the behavior or modus operandi of cyber adversaries as normalized in STIX - [STIX-TTP](./stix-ttp) - Represents the behavior or modus operandi of cyber adversaries as normalized in STIX