From f58591fdf7c723227dbba1fb9a4b9570ef7b8f2a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Rapha=C3=ABl=20Vinot?= Date: Fri, 3 Jun 2016 15:33:56 +0200 Subject: [PATCH] Add Europol types of events taxonomy --- README.md | 3 +- europol-events/machinetag.json | 239 +++++++++++++++++++++++++++++++ europol-incident/machinetag.json | 2 +- tools/machinetag.py | 2 +- 4 files changed, 243 insertions(+), 3 deletions(-) create mode 100644 europol-events/machinetag.json diff --git a/README.md b/README.md index 618642e..31d51e7 100644 --- a/README.md +++ b/README.md @@ -18,7 +18,8 @@ The following taxonomies are described: - [eCSIRT](./ecsirt) and IntelMQ incident classification - [EU critical sectors](./eu-critical-sectors) - EU critical sectors - [EUCI](./euci) - EU classified information marking -- [Europol Incidents](./europol-incident) - Europol class of incidents taxonomy +- [Europol Incident](./europol-incident) - Europol class of incident taxonomy +- [Europol Events](./europol-events) - Europol type of events taxonomy - [FIRST CSIRT Case](./first_csirt_case_classification) classification - [Information Security Marking Metadata](./dni-ism) from DNI (Director of National Intelligence - US) - [Malware](./malware) classification based on a SANS document diff --git a/europol-events/machinetag.json b/europol-events/machinetag.json new file mode 100644 index 0000000..fb285a1 --- /dev/null +++ b/europol-events/machinetag.json @@ -0,0 +1,239 @@ +{ + "namespace": "europol-event", + "expanded": "Europol type of events taxonomy", + "description": "This taxonomy was designed to describe the type of events", + "version": 1, + "predicates": [ + { + "value": "infected-by-known-malware", + "expanded": "System(s) infected by known malware", + "description": "The presence of any of the types of malware was detected in a system." + }, + { + "value": "dissemination-malware-email", + "expanded": "Dissemination of malware by email", + "description": "Malware attached to a message or email message containing link to malicious URL." + }, + { + "value": "hosting-malware-webpage", + "expanded": "Hosting of malware on web page", + "description": " Web page disseminating one or various types of malware." + }, + { + "value": "c&c-server-hosting", + "expanded": "Hosting of malware on web page", + "description": "Web page disseminating one or various types of malware." + }, + { + "value": "worm-spreading", + "expanded": "Replication and spreading of a worm", + "description": "System infected by a worm trying to infect other systems." + }, + { + "value": "connection-malware-port", + "expanded": "Connection to (a) suspicious port(s) linked to specific malware", + "description": "System attempting to gain access to a port normally linked to a specific type of malware." + }, + { + "value": "connection-malware-system", + "expanded": "Connection to (a) suspicious system(s) linked to specific malware", + "description": "System attempting to gain access to an IP address or URL normally linked to a specific type of malware, e.g. C&C or a distribution page for components linked to a specific botnet." + }, + { + "value": "flood", + "expanded": "Flood of requests", + "description": "Mass mailing of requests (network packets, emails, etc...) from one single source to a specific service, aimed at affecting its normal functioning." + }, + { + "value": "exploit-tool-exhausting-resources", + "expanded": "Exploit or tool aimed at exhausting resources (network, processing capacity, sessions, etc...)", + "description": "One single source using specially designed software to affect the normal functioning of a specific service, by exploiting a vulnerability." + }, + { + "value": "packet-flood", + "expanded": "Packet flooding", + "description": "Mass mailing of requests (network packets, emails, etc...) from various sources to a specific service, aimed at affecting its normal functioning." + }, + { + "value": "exploit-framework-exhausting-resources", + "expanded": "Exploit or tool distribution aimed at exhausting resources", + "description": "Various sources using specially designed software to affect the normal functioning of a specific service, by exploiting a vulnerability." + }, + { + "value": "vandalism", + "expanded": "Vandalism", + "description": "Logical and physical activities which – although they are not aimed at causing damage to information or at preventing its transmission among systems – have this effect." + }, + { + "value": "disruption-data-transmission", + "expanded": "Intentional disruption of data transmission and processing mechanisms", + "description": "Logical and physical activities aimed at causing damage to information or at preventing its transmission among systems." + }, + { + "value": "system-probe", + "expanded": "System probe", + "description": "Single system scan searching for open ports or services using these ports for responding." + }, + { + "value": "network-scanning", + "expanded": "Network scanning", + "description": "Scanning a network aimed at identifying systems which are active in the same network." + }, + { + "value": "dns-zone-transfer", + "expanded": "DNS zone transfer", + "description": "Transfer of a specific DNS zone." + }, + { + "value": "wiretapping", + "expanded": "Wiretapping", + "description": "Logical or physical interception of communications." + }, + { + "value": "dissemination-phishing-emails", + "expanded": "Dissemination of phishing emails", + "description": "Mass emailing aimed at collecting data for phishing purposes with regard to the victims." + }, + { + "value": "hosting-phishing-sites", + "expanded": "Hosting phishing sites", + "description": "Hosting web sites for phishing purposes." + }, + { + "value": "aggregation-information-phishing-schemes", + "expanded": "Aggregation of information gathered through phishing schemes", + "description": "Collecting data obtained through phishing attacks on web pages, email accounts, etc..." + }, + { + "value": "exploit-attempt", + "expanded": "Exploit attempt", + "description": "Unsuccessful use of a tool exploiting a specific vulnerability of the system." + }, + { + "value": "sql-injection-attempt", + "expanded": "SQL injection attempt", + "description": "Unsuccessful attempt to manipulate or read the information of a database by using the SQL injection technique." + }, + { + "value": "xss-attempt", + "expanded": "XSS attempt", + "description": "Unsuccessful attempts to perform attacks by using cross-site scripting techniques." + }, + { + "value": "file-inclusion-attempt", + "expanded": "File inclusion attempt", + "description": "Unsuccessful attempt to include files in the system under attack by using file inclusion techniques." + }, + { + "value": "brute-force-attempt", + "expanded": "Brute force attempt", + "description": "Unsuccessful login attempt by using sequential credentials for gaining access to the system." + }, + { + "value": "password-cracking-attempt", + "expanded": "Password cracking attempt", + "description": "Attempt to acquire access credentials by breaking the protective cryptographic keys." + }, + { + "value": "dictionary-attack-attempt", + "expanded": "Dictionary attack attempt", + "description": "Unsuccessful login attempt by using system access credentials previously loaded into a dictionary." + }, + { + "value": "exploit", + "expanded": "Use of a local or remote exploit", + "description": "Successful use of a tool exploiting a specific vulnerability of the system." + }, + { + "value": "sql-injection", + "expanded": "SQL injection", + "description": "Manipulation or reading of information contained in a database by using the SQL injection technique." + }, + { + "value": "xss", + "expanded": "XSS", + "description": "Attacks performed with the use of cross-site scripting techniques." + }, + { + "value": "file-inclusion", + "expanded": "File inclusion", + "description": "Inclusion of files into a system under attack with the use of file inclusion techniques." + }, + { + "value": "control-system-bypass", + "expanded": "Control system bypass", + "description": "Unauthorised access to a system or component by bypassing an access control system in place." + }, + { + "value": "theft-access-credentials", + "expanded": "Theft of access credentials", + "description": "Unauthorised access to a system or component by using stolen access credentials." + }, + { + "value": "unauthorized-access-system", + "expanded": "Unauthorised access to a system", + "description": "Unauthorised access to a system or component." + }, + { + "value": "unauthorized-access-information", + "expanded": "Unauthorised access to information", + "description": "Unauthorised access to a set of information." + }, + { + "value": "data-exfiltration", + "expanded": "Data exfiltration", + "description": "Unauthorised access to and sharing of a specific set of information." + }, + { + "value": "modification-information", + "expanded": "Modification of information", + "description": "Unauthorised changes to a specific set of information." + }, + { + "value": "deletion-information", + "expanded": "Deletion of information", + "description": "Unauthorised deleting of a specific set of information." + }, + { + "value": "illegitimate-use-resources", + "expanded": "Misuse or unauthorised use of resources", + "description": "Use of institutional resources for purposes other than those intended." + }, + { + "value": "illegitimate-use-name", + "expanded": "Illegitimate use of the name of an institution or third party", + "description": "Using the name of an institution without permission to do so." + }, + { + "value": "email-flooding", + "expanded": "Email flooding", + "description": "Sending an unusually large quantity of email messages." + }, + { + "value": "spam", + "expanded": "Sending an unsolicited message", + "description": "Sending an email message that was unsolicited or unwanted by the recipient." + }, + { + "value": "copyrighted-content", + "expanded": "Distribution or sharing of copyright protected content", + "description": "Distribution or sharing of content protected by copyright and related rights." + }, + { + "value": "content-forbidden-by-law", + "expanded": "Dissemination of content forbidden by law (publicly prosecuted offences)", + "description": "Distribution or sharing of illegal content such as child pornography, racism, xenophobia, etc..." + }, + { + "value": "unspecified", + "expanded": "Other unspecified event", + "description": "Other unlisted events." + }, + { + "value": "undetermined", + "expanded": "Undetermined", + "description": "Field aimed at the classification of unprocessed events, which have remained undetermined from the beginning." + } + ], + "values": null +} diff --git a/europol-incident/machinetag.json b/europol-incident/machinetag.json index 2c33255..12101f1 100644 --- a/europol-incident/machinetag.json +++ b/europol-incident/machinetag.json @@ -1,6 +1,6 @@ { "version": 1, - "description": "This taxonomy was design to describe the type of incidents bu class.", + "description": "This taxonomy was designed to describe the type of incidents by class.", "expanded": "Europol class of incidents taxonomy", "namespace": "europol-incident", "predicates": [ diff --git a/tools/machinetag.py b/tools/machinetag.py index 6be81ae..d4ad7b4 100755 --- a/tools/machinetag.py +++ b/tools/machinetag.py @@ -30,7 +30,7 @@ import json import os.path import argparse -taxonomies = ['europol-incident', 'admiralty-scale', 'adversary', 'tlp', 'circl', 'veris', 'ecsirt', 'dni-ism', 'nato', 'euci', 'osint', 'first_csirt_case_classification', 'malware', 'de-vs', 'fr-classification','eu-critical-sectors','dhs-ciip-sectors'] +taxonomies = ['europol-events', 'europol-incident', 'admiralty-scale', 'adversary', 'tlp', 'circl', 'veris', 'ecsirt', 'dni-ism', 'nato', 'euci', 'osint', 'first_csirt_case_classification', 'malware', 'de-vs', 'fr-classification','eu-critical-sectors','dhs-ciip-sectors'] argParser = argparse.ArgumentParser(description='Dump Machine Tags (Triple Tags) from MISP taxonomies', epilog='Available taxonomies are {0}'.format(taxonomies)) argParser.add_argument('-e', action='store_true', help='Include expanded tags') argParser.add_argument('-a', action='store_true', help='Generate asciidoctor document from MISP taxonomies')