From 4b82598056e63a772b29ad76647ee99469d82d4d Mon Sep 17 00:00:00 2001 From: Freddy Dezeure Date: Sat, 30 Jan 2021 06:51:09 +0100 Subject: [PATCH 1/2] Update machinetag.json --- cycat/machinetag.json | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/cycat/machinetag.json b/cycat/machinetag.json index e8e8733..34624fc 100644 --- a/cycat/machinetag.json +++ b/cycat/machinetag.json @@ -26,9 +26,9 @@ "description": "Cybersecurity taxonomy is a set of labels used to classify (in both terms - arrange in classes or/and design to national classification) cybersecurity related information." }, { - "value": "ruleset", - "expanded": "Ruleset", - "description": "Set of detection rules used in the cybersecurity field. Rulesets can be in different formats for (N/L)IDS/SIEM (such as Snort, Suricata, Zeek, SIGMA or YARA) or any other tool capable of parsing them." + "value": "rule", + "expanded": "Rule", + "description": "Detection rule or set of detection rules used in the cybersecurity field. Rulesets can be in different formats for (N/L)IDS/SIEM (such as Snort, Suricata, Zeek, SIGMA or YARA) or any other tool capable of parsing them." }, { "value": "notebook", @@ -51,9 +51,9 @@ "description": "Code to uniquely identify specific cybersecurity-relevant patterns. Fingerprints can be expressed in different formats such as ja3, ja3s, hassh, jarm or favicon-mmh3." }, { - "value": "policy", - "expanded": "Policy", - "description": "Public or non-public policy used in organisation's risk management practices." + "value": "control", + "expanded": "Control", + "description": "Mitigating control used to prevent unwanted activity from happening, like specific a configuration of the operating system/tools or an implementation policy." } ] }, From fbac5325ca7f07767ee65f8007fb601fd6bb8e00 Mon Sep 17 00:00:00 2001 From: Freddy Dezeure Date: Sat, 30 Jan 2021 06:56:18 +0100 Subject: [PATCH 2/2] Update machinetag.json --- cycat/machinetag.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/cycat/machinetag.json b/cycat/machinetag.json index 34624fc..446ffdb 100644 --- a/cycat/machinetag.json +++ b/cycat/machinetag.json @@ -51,9 +51,9 @@ "description": "Code to uniquely identify specific cybersecurity-relevant patterns. Fingerprints can be expressed in different formats such as ja3, ja3s, hassh, jarm or favicon-mmh3." }, { - "value": "control", - "expanded": "Control", - "description": "Mitigating control used to prevent unwanted activity from happening, like specific a configuration of the operating system/tools or an implementation policy." + "value": "mitigation", + "expanded": "Mitigation", + "description": "Mitigating control to prevent unwanted activity from happening, like a specific configuration of the operating system/tools or an implementation policy." } ] },