Improve consistency when lising the predicates, remove duplicates
* SeekmoSearchAssistant was here twice in ms-caro-malware-full * Mult was here twice in ms-caro-malware-full * CouponRuc was here twice in ms-caro-malware-full * mobile-malware was here twice in enisa * spear-phishing-attacks was here twice in enisapull/73/head
parent
7df2111cbb
commit
c7525b0260
|
@ -8,16 +8,16 @@
|
||||||
"expanded": "Infrastructure Status"
|
"expanded": "Infrastructure Status"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "infrastructure-type",
|
"value": "infrastructure-action",
|
||||||
"expanded": "Infrastructure Type"
|
"expanded": "Infrastructure Action"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "infrastructure-state",
|
"value": "infrastructure-state",
|
||||||
"expanded": "Infrastructure State"
|
"expanded": "Infrastructure State"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "infrastructure-action",
|
"value": "infrastructure-type",
|
||||||
"expanded": "Infrastructure Action"
|
"expanded": "Infrastructure Type"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"values": [
|
"values": [
|
||||||
|
|
|
@ -11,13 +11,21 @@
|
||||||
"value": "classification:us",
|
"value": "classification:us",
|
||||||
"expanded": "ClassificationUS"
|
"expanded": "ClassificationUS"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"value": "scicontrols",
|
||||||
|
"expanded": "SCIControls"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"value": "complies:with",
|
"value": "complies:with",
|
||||||
"expanded": "CompliesWith"
|
"expanded": "CompliesWith"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "dissem",
|
"value": "atomicenergymarkings",
|
||||||
"expanded": "Dissem"
|
"expanded": "atomicEnergyMarkings"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "notice",
|
||||||
|
"expanded": "Notice"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "nonic",
|
"value": "nonic",
|
||||||
|
@ -28,16 +36,8 @@
|
||||||
"expanded": "NonUSControls"
|
"expanded": "NonUSControls"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "notice",
|
"value": "dissem",
|
||||||
"expanded": "Notice"
|
"expanded": "Dissem"
|
||||||
},
|
|
||||||
{
|
|
||||||
"value": "scicontrols",
|
|
||||||
"expanded": "SCIControls"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"value": "atomicenergymarkings",
|
|
||||||
"expanded": "atomicEnergyMarkings"
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"values": [
|
"values": [
|
||||||
|
@ -170,6 +170,7 @@
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"predicate": "atomicenergymarkings",
|
||||||
"entry": [
|
"entry": [
|
||||||
{
|
{
|
||||||
"expanded": "RESTRICTED DATA",
|
"expanded": "RESTRICTED DATA",
|
||||||
|
@ -195,10 +196,10 @@
|
||||||
"expanded": "TRANSCLASSIFIED FOREIGN NUCLEAR INFORMATION",
|
"expanded": "TRANSCLASSIFIED FOREIGN NUCLEAR INFORMATION",
|
||||||
"value": "TFNI"
|
"value": "TFNI"
|
||||||
}
|
}
|
||||||
],
|
]
|
||||||
"predicate": "atomicenergymarkings"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"predicate": "notice",
|
||||||
"entry": [
|
"entry": [
|
||||||
{
|
{
|
||||||
"expanded": "FISA Warning statement",
|
"expanded": "FISA Warning statement",
|
||||||
|
@ -280,10 +281,10 @@
|
||||||
"expanded": "COMSEC Notice",
|
"expanded": "COMSEC Notice",
|
||||||
"value": "COMSEC"
|
"value": "COMSEC"
|
||||||
}
|
}
|
||||||
],
|
]
|
||||||
"predicate": "notice"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
"predicate": "nonic",
|
||||||
"entry": [
|
"entry": [
|
||||||
{
|
{
|
||||||
"expanded": "NAVAL NUCLEAR PROPULSION INFORMATION",
|
"expanded": "NAVAL NUCLEAR PROPULSION INFORMATION",
|
||||||
|
@ -321,8 +322,7 @@
|
||||||
"expanded": "SENSITIVE SECURITY INFORMATION",
|
"expanded": "SENSITIVE SECURITY INFORMATION",
|
||||||
"value": "SSI"
|
"value": "SSI"
|
||||||
}
|
}
|
||||||
],
|
]
|
||||||
"predicate": "nonic"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"predicate": "nonuscontrols",
|
"predicate": "nonuscontrols",
|
||||||
|
|
|
@ -4,15 +4,15 @@
|
||||||
"description": "Domain Name Abuse - taxonomy to tag domain names used for cybercrime. Use europol-incident to tag abuse-activity",
|
"description": "Domain Name Abuse - taxonomy to tag domain names used for cybercrime. Use europol-incident to tag abuse-activity",
|
||||||
"version": 1,
|
"version": 1,
|
||||||
"predicates": [
|
"predicates": [
|
||||||
{
|
|
||||||
"value": "domain-access-method",
|
|
||||||
"description": "Domain Access - describes how the adversary has gained access to the domain name",
|
|
||||||
"expanded": "Domain access method"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"value": "domain-status",
|
"value": "domain-status",
|
||||||
"description": "Domain status - describes the registration status of the domain name",
|
"description": "Domain status - describes the registration status of the domain name",
|
||||||
"expanded": "Domain status"
|
"expanded": "Domain status"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "domain-access-method",
|
||||||
|
"description": "Domain Access - describes how the adversary has gained access to the domain name",
|
||||||
|
"expanded": "Domain access method"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"values": [
|
"values": [
|
||||||
|
|
|
@ -137,18 +137,30 @@
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"predicates": [
|
"predicates": [
|
||||||
|
{
|
||||||
|
"expanded": "Fraud",
|
||||||
|
"value": "fraud"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expanded": "Availability",
|
||||||
|
"value": "availability"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"expanded": "Abusive Content",
|
"expanded": "Abusive Content",
|
||||||
"value": "abusive-content"
|
"value": "abusive-content"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"expanded": "Malicious Code",
|
|
||||||
"value": "malicious-code"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"expanded": "Information Gathering",
|
"expanded": "Information Gathering",
|
||||||
"value": "information-gathering"
|
"value": "information-gathering"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"expanded": "Information Content Security",
|
||||||
|
"value": "information-content-security"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"expanded": "Malicious Code",
|
||||||
|
"value": "malicious-code"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"expanded": "Intrusion Attempts",
|
"expanded": "Intrusion Attempts",
|
||||||
"value": "intrusion-attempts"
|
"value": "intrusion-attempts"
|
||||||
|
@ -157,26 +169,14 @@
|
||||||
"expanded": "Intrusions",
|
"expanded": "Intrusions",
|
||||||
"value": "intrusions"
|
"value": "intrusions"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"expanded": "Availability",
|
|
||||||
"value": "availability"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"expanded": "Information Security",
|
"expanded": "Information Security",
|
||||||
"value": "information-security"
|
"value": "information-security"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"expanded": "Information Content Security",
|
|
||||||
"value": "information-content-security"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"expanded": "Vulnerable",
|
"expanded": "Vulnerable",
|
||||||
"value": "vulnerable"
|
"value": "vulnerable"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"expanded": "Fraud",
|
|
||||||
"value": "fraud"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"expanded": "Other",
|
"expanded": "Other",
|
||||||
"value": "other"
|
"value": "other"
|
||||||
|
|
|
@ -848,13 +848,13 @@
|
||||||
"description": "Threat of sophisticated, targeted attack which combine many attack techniques."
|
"description": "Threat of sophisticated, targeted attack which combine many attack techniques."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "mobile-malware",
|
"value": "mobile-malware-exfiltration",
|
||||||
"expanded": "Mobile malware",
|
"expanded": "Mobile malware (exfiltration)",
|
||||||
"description": "Threat of mobile software that aims to gather information about a person or organization without their knowledge."
|
"description": "Threat of mobile software that aims to gather information about a person or organization without their knowledge."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "spear-phishing-attacks",
|
"value": "spear-phishing-attacks-targeted",
|
||||||
"expanded": "Spear phishing attacks",
|
"expanded": "Spear phishing attacks (targeted)",
|
||||||
"description": "Threat of attack focused on a single user or department within an organization, coming from someone within the company in a position of trust and requesting information such as login, IDs and passwords."
|
"description": "Threat of attack focused on a single user or department within an organization, coming from someone within the company in a position of trust and requesting information such as login, IDs and passwords."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -916,18 +916,18 @@
|
||||||
"expanded": "Eavesdropping/ Interception/ Hijacking",
|
"expanded": "Eavesdropping/ Interception/ Hijacking",
|
||||||
"value": "eavesdropping-interception-hijacking"
|
"value": "eavesdropping-interception-hijacking"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"description": "Threats of nefarious activities that require use of tools by the attacker. These attacks require installation of additional tools/software or performing additional steps on the victim's IT infrastructure/software.",
|
|
||||||
"expanded": "Nefarious Activity/ Abuse",
|
|
||||||
"value": "nefarious-activity-abuse"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"description": "Threat of financial or legal penalty or loss of trust of customers and collaborators due to legislation.",
|
"description": "Threat of financial or legal penalty or loss of trust of customers and collaborators due to legislation.",
|
||||||
"expanded": "Legal",
|
"expanded": "Legal",
|
||||||
"value": "legal"
|
"value": "legal"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": "Threats of nefarious activities that require use of tools by the attacker. These attacks require installation of additional tools/software or performing additional steps on the victim's IT infrastructure/software.",
|
||||||
|
"expanded": "Nefarious Activity/ Abuse",
|
||||||
|
"value": "nefarious-activity-abuse"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 201601,
|
"version": 20170725,
|
||||||
"description": "The present threat taxonomy is an initial version that has been developed on the basis of available ENISA material. This material has been used as an ENISA-internal structuring aid for information collection and threat consolidation purposes. It emerged in the time period 2012-2015.",
|
"description": "The present threat taxonomy is an initial version that has been developed on the basis of available ENISA material. This material has been used as an ENISA-internal structuring aid for information collection and threat consolidation purposes. It emerged in the time period 2012-2015.",
|
||||||
"expanded": "ENISA Threat Taxonomy",
|
"expanded": "ENISA Threat Taxonomy",
|
||||||
"namespace": "enisa"
|
"namespace": "enisa"
|
||||||
|
|
|
@ -3,36 +3,6 @@
|
||||||
"description": "Forum of Incident Response and Security Teams (FIRST) Information Exchange Policy (IEP) framework",
|
"description": "Forum of Incident Response and Security Teams (FIRST) Information Exchange Policy (IEP) framework",
|
||||||
"version": 2,
|
"version": 2,
|
||||||
"predicates": [
|
"predicates": [
|
||||||
{
|
|
||||||
"value": "id",
|
|
||||||
"expanded": "POLICY ID",
|
|
||||||
"description": "Provides a unique ID to identify a specific IEP implementation."
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"value": "version",
|
|
||||||
"expanded": "POLICY VERSION",
|
|
||||||
"description": "States the version of the IEP framework that has been used."
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"value": "name",
|
|
||||||
"expanded": "POLICY NAME",
|
|
||||||
"description": "This statement can be used to provide a name for an IEP implementation."
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"value": "start-date",
|
|
||||||
"expanded": "POLICY START DATE",
|
|
||||||
"description": "States the UTC date that the IEP is effective from."
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"value": "end-date",
|
|
||||||
"expanded": "POLICY END DATE",
|
|
||||||
"description": "States the UTC date that the IEP is effective until."
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"value": "reference",
|
|
||||||
"expanded": "POLICY REFERENCE",
|
|
||||||
"description": "This statement can be used to provide a URL reference to the specific IEP implementation."
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"value": "commercial-use",
|
"value": "commercial-use",
|
||||||
"expanded": "COMMERCIAL USE",
|
"expanded": "COMMERCIAL USE",
|
||||||
|
@ -82,6 +52,36 @@
|
||||||
"value": "unmodified-resale",
|
"value": "unmodified-resale",
|
||||||
"expanded": "UNMODIFIED RESALE",
|
"expanded": "UNMODIFIED RESALE",
|
||||||
"description": "States whether the recipient MAY or MUST NOT resell the information received unmodified or in a semantically equivalent format."
|
"description": "States whether the recipient MAY or MUST NOT resell the information received unmodified or in a semantically equivalent format."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "start-date",
|
||||||
|
"expanded": "POLICY START DATE",
|
||||||
|
"description": "States the UTC date that the IEP is effective from."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "end-date",
|
||||||
|
"expanded": "POLICY END DATE",
|
||||||
|
"description": "States the UTC date that the IEP is effective until."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "reference",
|
||||||
|
"expanded": "POLICY REFERENCE",
|
||||||
|
"description": "This statement can be used to provide a URL reference to the specific IEP implementation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "name",
|
||||||
|
"expanded": "POLICY NAME",
|
||||||
|
"description": "This statement can be used to provide a name for an IEP implementation."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "version",
|
||||||
|
"expanded": "POLICY VERSION",
|
||||||
|
"description": "States the version of the IEP framework that has been used."
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "id",
|
||||||
|
"expanded": "POLICY ID",
|
||||||
|
"description": "Provides a unique ID to identify a specific IEP implementation."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"values": [
|
"values": [
|
||||||
|
|
|
@ -109,6 +109,11 @@
|
||||||
"expanded": "API related tag influencing the MISP behavior of the API.",
|
"expanded": "API related tag influencing the MISP behavior of the API.",
|
||||||
"value": "api"
|
"value": "api"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"description": "Expansion tag incluencing the MISP behavior using expansion modules",
|
||||||
|
"expanded": "Expansion",
|
||||||
|
"value": "expansion"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"expanded": "Information related to the contributor.",
|
"expanded": "Information related to the contributor.",
|
||||||
"value": "contributor"
|
"value": "contributor"
|
||||||
|
@ -125,11 +130,6 @@
|
||||||
"description": "Event with this tag should not be synced to other MISP instances",
|
"description": "Event with this tag should not be synced to other MISP instances",
|
||||||
"expanded": "Should not sync",
|
"expanded": "Should not sync",
|
||||||
"value": "should-not-sync"
|
"value": "should-not-sync"
|
||||||
},
|
|
||||||
{
|
|
||||||
"description": "Expansion tag incluencing the MISP behavior using expansion modules",
|
|
||||||
"expanded": "Expansion",
|
|
||||||
"value": "expansion"
|
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"version": 4,
|
"version": 4,
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
{
|
{
|
||||||
"namespace": "ms-caro-malware-full",
|
"namespace": "ms-caro-malware-full",
|
||||||
"description": "Malware Type and Platform classification based on Microsoft's implementation of the Computer Antivirus Research Organization (CARO) Naming Scheme and Malware Terminology. Based on https://www.microsoft.com/en-us/security/portal/mmpc/shared/malwarenaming.aspx, https://www.microsoft.com/security/portal/mmpc/shared/glossary.aspx, https://www.microsoft.com/security/portal/mmpc/shared/objectivecriteria.aspx, and http://www.caro.org/definitions/index.html. Malware families are extracted from Microsoft SIRs since 2008 based on https://www.microsoft.com/security/sir/archive/default.aspx and https://www.microsoft.com/en-us/security/portal/threat/threats.aspx. Note that SIRs do NOT include all Microsoft malware families.",
|
"description": "Malware Type and Platform classification based on Microsoft's implementation of the Computer Antivirus Research Organization (CARO) Naming Scheme and Malware Terminology. Based on https://www.microsoft.com/en-us/security/portal/mmpc/shared/malwarenaming.aspx, https://www.microsoft.com/security/portal/mmpc/shared/glossary.aspx, https://www.microsoft.com/security/portal/mmpc/shared/objectivecriteria.aspx, and http://www.caro.org/definitions/index.html. Malware families are extracted from Microsoft SIRs since 2008 based on https://www.microsoft.com/security/sir/archive/default.aspx and https://www.microsoft.com/en-us/security/portal/threat/threats.aspx. Note that SIRs do NOT include all Microsoft malware families.",
|
||||||
"version": 1,
|
"version": 2,
|
||||||
"predicates": [
|
"predicates": [
|
||||||
{
|
{
|
||||||
"value": "malware-type",
|
"value": "malware-type",
|
||||||
|
@ -687,7 +687,7 @@
|
||||||
"expanded": "2008 - A detection for the DameWare Mini Remote Control tools. This program was detected by definitions prior to 1.147.1889.0 as it violated the guidelines by which Microsoft identified unwanted software. Based on analysis using current guidelines, the program does not have unwanted behaviors. Microsoft has released definition 1.147.1889.0 which no longer detects this program."
|
"expanded": "2008 - A detection for the DameWare Mini Remote Control tools. This program was detected by definitions prior to 1.147.1889.0 as it violated the guidelines by which Microsoft identified unwanted software. Based on analysis using current guidelines, the program does not have unwanted behaviors. Microsoft has released definition 1.147.1889.0 which no longer detects this program."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "SeekmoSearchAssistant",
|
"value": "SeekmoSearchAssistant_Repack",
|
||||||
"expanded": "2008 - A detection that is triggered by modified (that is, edited and re-packed) remote control programs based on DameWare Mini Remote Control, a commercial software product"
|
"expanded": "2008 - A detection that is triggered by modified (that is, edited and re-packed) remote control programs based on DameWare Mini Remote Control, a commercial software product"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -1611,7 +1611,7 @@
|
||||||
"expanded": "2012 VOL13 - A malicious program that affects mobile devices running the Android operating system. It may be bundled with clean applications, and is capable of allowing a remote attacker to gain access to the mobile device."
|
"expanded": "2012 VOL13 - A malicious program that affects mobile devices running the Android operating system. It may be bundled with clean applications, and is capable of allowing a remote attacker to gain access to the mobile device."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "Mult",
|
"value": "Mult_JS",
|
||||||
"expanded": "2012 VOL13 - A generic detection for various exploits written in the JavaScript language."
|
"expanded": "2012 VOL13 - A generic detection for various exploits written in the JavaScript language."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
@ -2107,7 +2107,7 @@
|
||||||
"expanded": "2015 VOL19 - A detection for the Superfish VisualDiscovery advertising program that was preinstalled on some Lenovo laptops sold in 2014 and 2015. It installs a compromised trusted root certificate on the computer, which can be used to conduct man-in-the-middle attacks on the computer."
|
"expanded": "2015 VOL19 - A detection for the Superfish VisualDiscovery advertising program that was preinstalled on some Lenovo laptops sold in 2014 and 2015. It installs a compromised trusted root certificate on the computer, which can be used to conduct man-in-the-middle attacks on the computer."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"value": "CouponRuc",
|
"value": "CouponRuc_new",
|
||||||
"expanded": "2015 VOL19 - A browser modifier that changes browser settings and may also modify some computer and Internet settings."
|
"expanded": "2015 VOL19 - A browser modifier that changes browser settings and may also modify some computer and Internet settings."
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -12,13 +12,13 @@
|
||||||
"value": "ever-comprimised",
|
"value": "ever-comprimised",
|
||||||
"expanded": "Ever Comprimised?"
|
"expanded": "Ever Comprimised?"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"value": "class",
|
|
||||||
"expanded": "Classification"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"value": "dynamic-dns",
|
"value": "dynamic-dns",
|
||||||
"expanded": "Dynamic DNS"
|
"expanded": "Dynamic DNS"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "class",
|
||||||
|
"expanded": "Classification"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"values": [
|
"values": [
|
||||||
|
|
Loading…
Reference in New Issue