Merge branch 'ghost-main' into main
commit
dab9a034d6
|
@ -123,6 +123,11 @@
|
|||
"name": "cssa",
|
||||
"version": 8
|
||||
},
|
||||
{
|
||||
"description": "Cyber Threat Intelligence cycle to control workflow state of your process.",
|
||||
"name": "cti",
|
||||
"version": 1
|
||||
},
|
||||
{
|
||||
"description": "Current events - Schemes of Classification in Incident Response and Detection",
|
||||
"name": "current-event",
|
||||
|
@ -378,6 +383,11 @@
|
|||
"name": "interception-method",
|
||||
"version": 1
|
||||
},
|
||||
{
|
||||
"description": "An IOC classification to facilitate automation of malicious and non malicious artifacts",
|
||||
"name": "ioc",
|
||||
"version": 1
|
||||
},
|
||||
{
|
||||
"description": "Internet of Things taxonomy, based on IOT UK report https://iotuk.org.uk/wp-content/uploads/2017/01/IOT-Taxonomy-Report.pdf",
|
||||
"name": "iot",
|
||||
|
|
|
@ -0,0 +1,37 @@
|
|||
{
|
||||
"namespace": "cti",
|
||||
"description": "Cyber Threat Intelligence cycle to control workflow state of your process.",
|
||||
"version": 1,
|
||||
"predicates": [
|
||||
{
|
||||
"value": "planning",
|
||||
"description": "CTI requirementes being generated.",
|
||||
"expanded": "Phase"
|
||||
},
|
||||
{
|
||||
"value": "collection",
|
||||
"description": "Data collection initiated.",
|
||||
"expanded": "Phase"
|
||||
},
|
||||
{
|
||||
"value": "processing-and-analysis",
|
||||
"description": "Data is being processed and analyzed",
|
||||
"expanded": "Phase"
|
||||
},
|
||||
{
|
||||
"value": "dissemination-done",
|
||||
"description": "CTI product created and delivered to stakeholders.",
|
||||
"expanded": "Phase"
|
||||
},
|
||||
{
|
||||
"value": "feedback-received",
|
||||
"description": "Feedback received by stakeholders.",
|
||||
"expanded": "Phase"
|
||||
},
|
||||
{
|
||||
"value": "feedback-pending",
|
||||
"description": "Feedback pending by stakeholders.",
|
||||
"expanded": "Phase"
|
||||
}
|
||||
]
|
||||
}
|
|
@ -0,0 +1,26 @@
|
|||
{
|
||||
"namespace": "ioc",
|
||||
"description": "An IOC classification to facilitate automation of malicious and non malicious artifacts",
|
||||
"version": 1,
|
||||
"predicates": [
|
||||
{
|
||||
"value": "artifact-state",
|
||||
"expanded": "Artifact State"
|
||||
}
|
||||
],
|
||||
"values": [
|
||||
{
|
||||
"predicate": "artifact state",
|
||||
"entry": [
|
||||
{
|
||||
"value": "malicious",
|
||||
"expanded": "Malicious"
|
||||
},
|
||||
{
|
||||
"value": "not-malicious",
|
||||
"expanded": "Not Malicious"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
Loading…
Reference in New Issue