Add Europol types of events taxonomy

pull/23/head
Raphaël Vinot 2016-06-03 15:33:56 +02:00
parent c48fcc5991
commit f58591fdf7
4 changed files with 243 additions and 3 deletions

View File

@ -18,7 +18,8 @@ The following taxonomies are described:
- [eCSIRT](./ecsirt) and IntelMQ incident classification
- [EU critical sectors](./eu-critical-sectors) - EU critical sectors
- [EUCI](./euci) - EU classified information marking
- [Europol Incidents](./europol-incident) - Europol class of incidents taxonomy
- [Europol Incident](./europol-incident) - Europol class of incident taxonomy
- [Europol Events](./europol-events) - Europol type of events taxonomy
- [FIRST CSIRT Case](./first_csirt_case_classification) classification
- [Information Security Marking Metadata](./dni-ism) from DNI (Director of National Intelligence - US)
- [Malware](./malware) classification based on a SANS document

View File

@ -0,0 +1,239 @@
{
"namespace": "europol-event",
"expanded": "Europol type of events taxonomy",
"description": "This taxonomy was designed to describe the type of events",
"version": 1,
"predicates": [
{
"value": "infected-by-known-malware",
"expanded": "System(s) infected by known malware",
"description": "The presence of any of the types of malware was detected in a system."
},
{
"value": "dissemination-malware-email",
"expanded": "Dissemination of malware by email",
"description": "Malware attached to a message or email message containing link to malicious URL."
},
{
"value": "hosting-malware-webpage",
"expanded": "Hosting of malware on web page",
"description": " Web page disseminating one or various types of malware."
},
{
"value": "c&c-server-hosting",
"expanded": "Hosting of malware on web page",
"description": "Web page disseminating one or various types of malware."
},
{
"value": "worm-spreading",
"expanded": "Replication and spreading of a worm",
"description": "System infected by a worm trying to infect other systems."
},
{
"value": "connection-malware-port",
"expanded": "Connection to (a) suspicious port(s) linked to specific malware",
"description": "System attempting to gain access to a port normally linked to a specific type of malware."
},
{
"value": "connection-malware-system",
"expanded": "Connection to (a) suspicious system(s) linked to specific malware",
"description": "System attempting to gain access to an IP address or URL normally linked to a specific type of malware, e.g. C&C or a distribution page for components linked to a specific botnet."
},
{
"value": "flood",
"expanded": "Flood of requests",
"description": "Mass mailing of requests (network packets, emails, etc...) from one single source to a specific service, aimed at affecting its normal functioning."
},
{
"value": "exploit-tool-exhausting-resources",
"expanded": "Exploit or tool aimed at exhausting resources (network, processing capacity, sessions, etc...)",
"description": "One single source using specially designed software to affect the normal functioning of a specific service, by exploiting a vulnerability."
},
{
"value": "packet-flood",
"expanded": "Packet flooding",
"description": "Mass mailing of requests (network packets, emails, etc...) from various sources to a specific service, aimed at affecting its normal functioning."
},
{
"value": "exploit-framework-exhausting-resources",
"expanded": "Exploit or tool distribution aimed at exhausting resources",
"description": "Various sources using specially designed software to affect the normal functioning of a specific service, by exploiting a vulnerability."
},
{
"value": "vandalism",
"expanded": "Vandalism",
"description": "Logical and physical activities which although they are not aimed at causing damage to information or at preventing its transmission among systems have this effect."
},
{
"value": "disruption-data-transmission",
"expanded": "Intentional disruption of data transmission and processing mechanisms",
"description": "Logical and physical activities aimed at causing damage to information or at preventing its transmission among systems."
},
{
"value": "system-probe",
"expanded": "System probe",
"description": "Single system scan searching for open ports or services using these ports for responding."
},
{
"value": "network-scanning",
"expanded": "Network scanning",
"description": "Scanning a network aimed at identifying systems which are active in the same network."
},
{
"value": "dns-zone-transfer",
"expanded": "DNS zone transfer",
"description": "Transfer of a specific DNS zone."
},
{
"value": "wiretapping",
"expanded": "Wiretapping",
"description": "Logical or physical interception of communications."
},
{
"value": "dissemination-phishing-emails",
"expanded": "Dissemination of phishing emails",
"description": "Mass emailing aimed at collecting data for phishing purposes with regard to the victims."
},
{
"value": "hosting-phishing-sites",
"expanded": "Hosting phishing sites",
"description": "Hosting web sites for phishing purposes."
},
{
"value": "aggregation-information-phishing-schemes",
"expanded": "Aggregation of information gathered through phishing schemes",
"description": "Collecting data obtained through phishing attacks on web pages, email accounts, etc..."
},
{
"value": "exploit-attempt",
"expanded": "Exploit attempt",
"description": "Unsuccessful use of a tool exploiting a specific vulnerability of the system."
},
{
"value": "sql-injection-attempt",
"expanded": "SQL injection attempt",
"description": "Unsuccessful attempt to manipulate or read the information of a database by using the SQL injection technique."
},
{
"value": "xss-attempt",
"expanded": "XSS attempt",
"description": "Unsuccessful attempts to perform attacks by using cross-site scripting techniques."
},
{
"value": "file-inclusion-attempt",
"expanded": "File inclusion attempt",
"description": "Unsuccessful attempt to include files in the system under attack by using file inclusion techniques."
},
{
"value": "brute-force-attempt",
"expanded": "Brute force attempt",
"description": "Unsuccessful login attempt by using sequential credentials for gaining access to the system."
},
{
"value": "password-cracking-attempt",
"expanded": "Password cracking attempt",
"description": "Attempt to acquire access credentials by breaking the protective cryptographic keys."
},
{
"value": "dictionary-attack-attempt",
"expanded": "Dictionary attack attempt",
"description": "Unsuccessful login attempt by using system access credentials previously loaded into a dictionary."
},
{
"value": "exploit",
"expanded": "Use of a local or remote exploit",
"description": "Successful use of a tool exploiting a specific vulnerability of the system."
},
{
"value": "sql-injection",
"expanded": "SQL injection",
"description": "Manipulation or reading of information contained in a database by using the SQL injection technique."
},
{
"value": "xss",
"expanded": "XSS",
"description": "Attacks performed with the use of cross-site scripting techniques."
},
{
"value": "file-inclusion",
"expanded": "File inclusion",
"description": "Inclusion of files into a system under attack with the use of file inclusion techniques."
},
{
"value": "control-system-bypass",
"expanded": "Control system bypass",
"description": "Unauthorised access to a system or component by bypassing an access control system in place."
},
{
"value": "theft-access-credentials",
"expanded": "Theft of access credentials",
"description": "Unauthorised access to a system or component by using stolen access credentials."
},
{
"value": "unauthorized-access-system",
"expanded": "Unauthorised access to a system",
"description": "Unauthorised access to a system or component."
},
{
"value": "unauthorized-access-information",
"expanded": "Unauthorised access to information",
"description": "Unauthorised access to a set of information."
},
{
"value": "data-exfiltration",
"expanded": "Data exfiltration",
"description": "Unauthorised access to and sharing of a specific set of information."
},
{
"value": "modification-information",
"expanded": "Modification of information",
"description": "Unauthorised changes to a specific set of information."
},
{
"value": "deletion-information",
"expanded": "Deletion of information",
"description": "Unauthorised deleting of a specific set of information."
},
{
"value": "illegitimate-use-resources",
"expanded": "Misuse or unauthorised use of resources",
"description": "Use of institutional resources for purposes other than those intended."
},
{
"value": "illegitimate-use-name",
"expanded": "Illegitimate use of the name of an institution or third party",
"description": "Using the name of an institution without permission to do so."
},
{
"value": "email-flooding",
"expanded": "Email flooding",
"description": "Sending an unusually large quantity of email messages."
},
{
"value": "spam",
"expanded": "Sending an unsolicited message",
"description": "Sending an email message that was unsolicited or unwanted by the recipient."
},
{
"value": "copyrighted-content",
"expanded": "Distribution or sharing of copyright protected content",
"description": "Distribution or sharing of content protected by copyright and related rights."
},
{
"value": "content-forbidden-by-law",
"expanded": "Dissemination of content forbidden by law (publicly prosecuted offences)",
"description": "Distribution or sharing of illegal content such as child pornography, racism, xenophobia, etc..."
},
{
"value": "unspecified",
"expanded": "Other unspecified event",
"description": "Other unlisted events."
},
{
"value": "undetermined",
"expanded": "Undetermined",
"description": "Field aimed at the classification of unprocessed events, which have remained undetermined from the beginning."
}
],
"values": null
}

View File

@ -1,6 +1,6 @@
{
"version": 1,
"description": "This taxonomy was design to describe the type of incidents bu class.",
"description": "This taxonomy was designed to describe the type of incidents by class.",
"expanded": "Europol class of incidents taxonomy",
"namespace": "europol-incident",
"predicates": [

View File

@ -30,7 +30,7 @@ import json
import os.path
import argparse
taxonomies = ['europol-incident', 'admiralty-scale', 'adversary', 'tlp', 'circl', 'veris', 'ecsirt', 'dni-ism', 'nato', 'euci', 'osint', 'first_csirt_case_classification', 'malware', 'de-vs', 'fr-classification','eu-critical-sectors','dhs-ciip-sectors']
taxonomies = ['europol-events', 'europol-incident', 'admiralty-scale', 'adversary', 'tlp', 'circl', 'veris', 'ecsirt', 'dni-ism', 'nato', 'euci', 'osint', 'first_csirt_case_classification', 'malware', 'de-vs', 'fr-classification','eu-critical-sectors','dhs-ciip-sectors']
argParser = argparse.ArgumentParser(description='Dump Machine Tags (Triple Tags) from MISP taxonomies', epilog='Available taxonomies are {0}'.format(taxonomies))
argParser.add_argument('-e', action='store_true', help='Include expanded tags')
argParser.add_argument('-a', action='store_true', help='Generate asciidoctor document from MISP taxonomies')