misp-taxonomies/adversary/machinetag.json

68 lines
1.9 KiB
JSON

{
"namespace": "adversary",
"description": "An overview and description of the adversary infrastructure",
"version": 2,
"predicates": [
{
"value": "infrastructure-status",
"expanded": "Infrastructure Status"
},
{
"value": "infrastructure-type",
"expanded": "Infrastructure Type"
}
],
"values": [
{
"predicate": "infrastructure-status",
"entry": [
{
"value": "unknown",
"expanded": "Infrastructure ownership and status is unknown"
},
{
"value": "compromised",
"expanded": "Infrastructure compromised by or in the benefit of the adversary"
},
{
"value": "own-and-operated",
"expanded": "Infrastructure own and operated by the adversary"
}
]
},
{
"predicate": "infrastructure-type",
"entry": [
{
"value": "unknown",
"expanded": "Infrastructure usage by the adversary is unknown"
},
{
"value": "proxy",
"expanded": "Infrastructure used as proxy between the target and the adversary"
},
{
"value": "drop-zone",
"expanded": "Infrastructure used by the adversary to store information related to his campaigns"
},
{
"value": "exploit-distribution-point",
"expanded": "Infrastructure used to distribute exploit towards target(s)"
},
{
"value": "vpn",
"expanded": "Infrastructure used by the adversary as Virtual Private Network to hide activities and reduce the traffic analysis surface"
},
{
"value": "panel",
"expanded": "Panel used by the adversary to control or maintain his infrastructure"
},
{
"value": "tds",
"expanded": "Traffic Distribution Systems including exploit delivery or/and web monetization channels"
}
]
}
]
}