From 622cbc0ba746c583698ca04b44bfe4353cb1c7cd Mon Sep 17 00:00:00 2001
From: Alexandre Dulaunoy
Date: Wed, 11 Apr 2018 17:16:50 +0200
Subject: [PATCH] objects updated
---
objects.html | 5892 +-
objects.pdf | 198943 ++++++++++++++++++++++++------------------------
2 files changed, 104068 insertions(+), 100767 deletions(-)
diff --git a/objects.html b/objects.html
index 92e1085..190b0d9 100755
--- a/objects.html
+++ b/objects.html
@@ -450,6 +450,7 @@ body.book #toc,body.book #preamble,body.book h1.sect0,body.book .sect1>h2{page-b
origin
type
text
The link where the leak is (or was) accessible at first-seen.
+Type of information leak as discovered and classified by an AIL module. ['Credential', 'CreditCards', 'Mail', 'Onion', 'Phone', 'Keys']
@@ -597,6 +599,26 @@ ail-leak is a MISP object available in JSON format at
duplicate_number
counter
Number of known duplicates.
++
origin
text
The link where the leak is (or was) accessible at first-seen.
++
first-seen
datetime
type
text
text
Type of information leak as discovered and classified by an AIL module. ['Credential', 'CreditCards', 'Mail', 'Onion', 'Phone', 'Keys']
--
original-date
datetime
When the information available in the leak was created. It’s usually before the first-seen.
+A description of the leak which could include the potential victim(s) or description of the leak.
@@ -647,13 +659,13 @@ ail-leak is a MISP object available in JSON format at
duplicate_number
counter
original-date
datetime
Number of known duplicates.
+When the information available in the leak was created. It’s usually before the first-seen.
+
text
text
A description of the leak which could include the potential victim(s) or description of the leak.
--
type
+text
Type of the annotation ['Annotation', 'Executive Summary', 'Introduction', 'Conclusion', 'Disclaimer', 'Keywords', 'Acknowledgement', 'Other', 'Copyright', 'Authors', 'Logo']
++
format
text
text
text
Raw text of the annotation
++
creation-date
datetime
type
text
Type of the annotation ['Annotation', 'Executive Summary', 'Introduction', 'Conclusion', 'Disclaimer', 'Keywords', 'Acknowledgement', 'Other', 'Copyright', 'Authors', 'Logo']
--
ref
link
text
text
Raw text of the annotation
--
first-seen
-datetime
First time the ASN was seen
--
last-seen
datetime
subnet-announced
ip-src
Subnet announced
--
mp-import
text
The inbound IPv4 or IPv6 routing policy of the AS in RFC 4012 – Routing Policy Specification Language next generation (RPSLng), section 4.5. format
--
import
text
asn
AS
mp-import
text
Autonomous System Number
+The inbound IPv4 or IPv6 routing policy of the AS in RFC 4012 – Routing Policy Specification Language next generation (RPSLng), section 4.5. format
@@ -961,6 +933,26 @@ asn is a MISP object available in JSON format at
asn
AS
Autonomous System Number
++
subnet-announced
ip-src
Subnet announced
++
export
text
first-seen
datetime
First time the ASN was seen
++
text
+text
Free text value to attach to the file
++
software
text
text
text
Free text value to attach to the file
--
signature
text
institution-code
text
Institution code of the bank.
--
balance
text
The balance of the account after the suspicious transaction was processed.
--
branch
text
Branch code or name
--
account
bank-account-nr
Account number
--
comments
text
Comments about the bank account.
--
opened
datetime
When the account was opened.
--
personal-account-type
text
Account type. ['A - Business', 'B - Personal Current', 'C - Savings', 'D - Trust Account', 'E - Trading Account', 'O - Other']
--
account-name
text
A field to freely describe the bank account details.
--
beneficiary-comment
text
Comment about the final beneficiary.
--
date-balance
datetime
When the balance was reported.
--
status-code
text
institution-name
text
Name of the bank or financial organisation.
++
swift
bic
aba-rtn
aba-rtn
beneficiary
text
ABA routing transit number
+Final beneficiary of the bank account.
++
account
bank-account-nr
Account number
institution-name
text
text
Name of the bank or financial organisation.
+A description of the bank account.
++
report-code
text
Report code of the bank account. ['CTR Cash Transaction Report', 'STR Suspicious Transaction Report', 'EFT Electronic Funds Transfer', 'IFT International Funds Transfer', 'TFR Terror Financing Report', 'BCR Border Cash Report', 'UTR Unusual Transaction Report', 'AIF Additional Information File – Can be used for example to get full disclosure of transactions of an account for a period of time without reporting it as a CTR.', 'IRI Incoming Request for Information – International', 'ORI Outgoing Request for Information – International', 'IRD Incoming Request for Information – Domestic', 'ORD Outgoing Request for Information – Domestic']
@@ -1237,10 +1169,30 @@ bank-account is a MISP object available in JSON format at
report-code
branch
text
Report code of the bank account. ['CTR Cash Transaction Report', 'STR Suspicious Transaction Report', 'EFT Electronic Funds Transfer', 'IFT International Funds Transfer', 'TFR Terror Financing Report', 'BCR Border Cash Report', 'UTR Unusual Transaction Report', 'AIF Additional Information File – Can be used for example to get full disclosure of transactions of an account for a period of time without reporting it as a CTR.', 'IRI Incoming Request for Information – International', 'ORI Outgoing Request for Information – International', 'IRD Incoming Request for Information – Domestic', 'ORD Outgoing Request for Information – Domestic']
+Branch code or name
++
non-banking-institution
boolean
A flag to define if this account belong to a non-banking organisation. If set to true, it’s a non-banking organisation.
++
comments
text
Comments about the bank account.
@@ -1257,10 +1209,70 @@ bank-account is a MISP object available in JSON format at
beneficiary
balance
text
Final beneficiary of the bank account.
+The balance of the account after the suspicious transaction was processed.
++
date-balance
datetime
When the balance was reported.
++
beneficiary-comment
text
Comment about the final beneficiary.
++
account-name
text
A field to freely describe the bank account details.
++
opened
datetime
When the account was opened.
++
institution-code
text
Institution code of the bank.
++
personal-account-type
text
Account type. ['A - Business', 'B - Personal Current', 'C - Savings', 'D - Trust Account', 'E - Trading Account', 'O - Other']
@@ -1287,23 +1299,13 @@ bank-account is a MISP object available in JSON format at
non-banking-institution
boolean
aba-rtn
aba-rtn
A flag to define if this account belong to a non-banking organisation. If set to true, it’s a non-banking organisation.
+ABA routing transit number
-
text
text
A description of the bank account.
-+
scope
+code
text
The code denoting the intended distribution of the alert message. ['Public', 'Restricted', 'Private']
--
source
text
The text identifying the source of the alert message. The particular source of this alert; e.g., an operator or a specific device.
--
identifier
text
The identifier of the alert message in a number or string uniquely identifying this message, assigned by the sender.
+The code denoting the special handling of the alert message.
@@ -1385,30 +1367,30 @@ cap-alert is a MISP object available in JSON format at
addresses
text
sent
datetime
The group listing of intended recipients of the alert message. (1) Required when <scope> is “Private”, optional when <scope> is “Public” or “Restricted”. (2) Each recipient SHALL be identified by an identifier or an address. (3) Multiple space-delimited addresses MAY be included. Addresses including whitespace MUST be enclosed in double-quotes.
+The time and date of the origination of the alert message.
code
identifier
text
The code denoting the special handling of the alert message.
+The identifier of the alert message in a number or string uniquely identifying this message, assigned by the sender.
note
sender
text
The text describing the purpose or significance of the alert message.
+The identifier of the sender of the alert message which identifies the originator of this alert. Guaranteed by assigner to be unique globally; e.g., may be based on an Internet domain name.
@@ -1425,10 +1407,10 @@ cap-alert is a MISP object available in JSON format at
references
scope
text
The group listing identifying earlier message(s) referenced by the alert message. (1) The extended message identifier(s) (in the form sender,identifier,sent) of an earlier CAP message or messages referenced by this one. (2) If multiple messages are referenced, they SHALL be separated by whitespace.
+The code denoting the intended distribution of the alert message. ['Public', 'Restricted', 'Private']
@@ -1445,6 +1427,36 @@ cap-alert is a MISP object available in JSON format at
source
text
The text identifying the source of the alert message. The particular source of this alert; e.g., an operator or a specific device.
++
references
text
The group listing identifying earlier message(s) referenced by the alert message. (1) The extended message identifier(s) (in the form sender,identifier,sent) of an earlier CAP message or messages referenced by this one. (2) If multiple messages are referenced, they SHALL be separated by whitespace.
++
addresses
text
The group listing of intended recipients of the alert message. (1) Required when <scope> is “Private”, optional when <scope> is “Public” or “Restricted”. (2) Each recipient SHALL be identified by an identifier or an address. (3) Multiple space-delimited addresses MAY be included. Addresses including whitespace MUST be enclosed in double-quotes.
++
status
text
sender
note
text
The identifier of the sender of the alert message which identifies the originator of this alert. Guaranteed by assigner to be unique globally; e.g., may be based on an Internet domain name.
--
sent
datetime
The time and date of the origination of the alert message.
+The text describing the purpose or significance of the alert message.
@@ -1513,20 +1515,10 @@ cap-info is a MISP object available in JSON format at
urgency
responseType
text
The code denoting the urgency of the subject event of the alert message. ['Immediate', 'Expected', 'Future', 'Past', 'Unknown']
--
severity
text
The code denoting the severity of the subject event of the alert message. ['Extreme', 'Severe', 'Moderate', 'Minor', 'Unknown']
+The code denoting the type of action recommended for the target audience. ['Shelter', 'Evacuate', 'Prepare', 'Execute', 'Avoid', 'Monitor', 'Assess', 'AllClear', 'None']
@@ -1543,16 +1535,6 @@ cap-info is a MISP object available in JSON format at
onset
datetime
The expected time of the beginning of the subject event of the alert message.
--
description
text
certainty
text
The code denoting the certainty of the subject event of the alert message. For backward compatibility with CAP 1.0, the deprecated value of “Very Likely” SHOULD be treated as equivalent to “Likely”. ['Likely', 'Possible', 'Unlikely', 'Unknown']
--
language
text
headline
contact
text
The text headline of the alert message.
--
event
text
The text denoting the type of the subject event of the alert message.
--
category
text
The code denoting the category of the subject event of the alert message. ['Geo', 'Met', 'Safety', 'Security', 'Rescue', 'Fire', 'Health', 'Env', 'Transport', 'Infra', 'CBRNE', 'Other']
--
audience
text
The text describing the intended audience of the alert message.
+The text describing the contact for follow-up and confirmation of the alert message.
@@ -1633,50 +1575,30 @@ cap-info is a MISP object available in JSON format at
senderName
text
The text naming the originator of the alert message.
--
instruction
text
The text describing the recommended action to be taken by recipients of the alert message.
--
web
link
The identifier of the hyperlink associating additional information with the alert message.
--
effective
onset
datetime
The effective time of the information of the alert message.
+The expected time of the beginning of the subject event of the alert message.
contact
severity
text
The text describing the contact for follow-up and confirmation of the alert message.
+The code denoting the severity of the subject event of the alert message. ['Extreme', 'Severe', 'Moderate', 'Minor', 'Unknown']
++
headline
text
The text headline of the alert message.
@@ -1693,10 +1615,90 @@ cap-info is a MISP object available in JSON format at
responseType
category
text
The code denoting the type of action recommended for the target audience. ['Shelter', 'Evacuate', 'Prepare', 'Execute', 'Avoid', 'Monitor', 'Assess', 'AllClear', 'None']
+The code denoting the category of the subject event of the alert message. ['Geo', 'Met', 'Safety', 'Security', 'Rescue', 'Fire', 'Health', 'Env', 'Transport', 'Infra', 'CBRNE', 'Other']
++
web
link
The identifier of the hyperlink associating additional information with the alert message.
++
instruction
text
The text describing the recommended action to be taken by recipients of the alert message.
++
event
text
The text denoting the type of the subject event of the alert message.
++
effective
datetime
The effective time of the information of the alert message.
++
certainty
text
The code denoting the certainty of the subject event of the alert message. For backward compatibility with CAP 1.0, the deprecated value of “Very Likely” SHOULD be treated as equivalent to “Likely”. ['Likely', 'Possible', 'Unlikely', 'Unknown']
++
senderName
text
The text naming the originator of the alert message.
++
urgency
text
The code denoting the urgency of the subject event of the alert message. ['Immediate', 'Expected', 'Future', 'Past', 'Unknown']
++
audience
text
The text describing the intended audience of the alert message.
@@ -1741,6 +1743,16 @@ cap-resource is a MISP object available in JSON format at
digest
sha1
The code representing the digital digest (“hash”) computed from the resource file (OPTIONAL).
++
size
text
resourceDesc
text
The text describing the type and content of the resource file.
++
mimeType
mime-type
uri
link
The identifier of the hyperlink for the resource file.
--
derefUri
attachment
digest
sha1
uri
link
The code representing the digital digest (“hash”) computed from the resource file (OPTIONAL).
+The identifier of the hyperlink for the resource file.
resourceDesc
text
The text describing the type and content of the resource file.
--
first-seen
-datetime
First time this payment destination address has been seen
--
last-seen
datetime
address
btc
Address used as a payment destination in a cryptocurrency
--
text
text
address
btc
Address used as a payment destination in a cryptocurrency
++
first-seen
datetime
First time this payment destination address has been seen
++
text
+text
A description of the cookie.
++
cookie
cookie
cookie-name
text
Name of the cookie (if splitted)
--
cookie-value
text
text
cookie-name
text
A description of the cookie.
+Name of the cookie (if splitted)
++
An object describing a specific measure taken to prevent or respond to an attack..
++ + | ++course-of-action is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP. + | +
Object attribute | +MISP attribute type | +Description | +Disable correlation | +|||||
---|---|---|---|---|---|---|---|---|
type |
+text |
+
+ The type of the course of action. ['Perimeter Blocking', 'Internal Blocking', 'Redirection', 'Redirection (Honey Pot)', 'Hardening', 'Patching', 'Eradication', 'Rebuilding', 'Training', 'Monitoring', 'Physical Access Restrictions', 'Logical Access Restrictions', 'Public Disclosure', 'Diplomatic Actions', 'Policy Actions', 'Other'] + |
+
+ + |
+|||||
stage |
+text |
+
+ The stage of the threat management lifecycle that the course of action is applicable to. ['Remedy', 'Response'] + |
+
+ + |
+|||||
description |
+text |
+
+ A description of the course of action. + |
+
+ + |
+|||||
cost |
+text |
+
+ The estimated cost of applying the course of action. ['High', 'Medium', 'Low', 'None', 'Unknown'] + |
+
+ + |
+|||||
name |
+text |
+
+ The name used to identify the course of action. + |
+
+ + |
+|||||
impact |
+text |
+
+ The estimated impact of applying the course of action. ['High', 'Medium', 'Low', 'None', 'Unknown'] + |
+
+ + |
+|||||
efficacy |
+text |
+
+ The estimated efficacy of applying the course of action. ['High', 'Medium', 'Low', 'None', 'Unknown'] + |
+
+ + |
+|||||
objective |
+text |
+
+ The objective of the course of action. |
@@ -2015,20 +2135,10 @@ cowrie is a MISP object available in JSON format at timestamp |
-datetime |
+isError |
+text |
- When the event happened - |
-
- - |
-
src_port |
-port |
-
- Source port of the session +isError |
@@ -2045,26 +2155,6 @@ cowrie is a MISP object available in JSON format at isError |
-text |
-
- isError - |
-
- - |
-||
eventid |
-text |
-
- Eventid of the session in the cowrie honeypot - |
-
- - |
-|||||
system |
text |
@@ -2075,96 +2165,6 @@ cowrie is a MISP object available in JSON format at message |
-text |
-
- Message of the cowrie honeypot - |
-
- - |
-|||
input |
-text |
-
- Input of the session - |
-
- - |
-|||||
dst_ip |
-ip-dst |
-
- Destination IP address of the session - |
-
- - |
-|||||
compCS |
-text |
-
- SSH compression algorithm supported in the session - |
-
- - |
-|||||
dst_port |
-port |
-
- Destination port of the session - |
-
- - |
-|||||
protocol |
-text |
-
- Protocol used in the cowrie honeypot - |
-
- - |
-|||||
session |
-text |
-
- Session id - |
-
- - |
-|||||
macCS |
-text |
-
- SSH MAC supported in the sesssion - |
-
- - |
-|||||
password |
-text |
-
- Password - |
-
- - |
-|||||
src_ip |
ip-src |
@@ -2185,10 +2185,20 @@ cowrie is a MISP object available in JSON format at sensor |
+input |
text |
- Cowrie sensor name +Input of the session + |
+
+ + |
+||
message |
+text |
+
+ Message of the cowrie honeypot |
||||||
macCS |
+text |
+
+ SSH MAC supported in the sesssion + |
+
+ + |
+|||||
dst_port |
+port |
+
+ Destination port of the session + |
+
+ + |
+|||||
src_port |
+port |
+
+ Source port of the session + |
+
+ + |
+|||||
eventid |
+text |
+
+ Eventid of the session in the cowrie honeypot + |
+
+ + |
+|||||
timestamp |
+datetime |
+
+ When the event happened + |
+
+ + |
+|||||
password |
+text |
+
+ Password + |
+
+ + |
+|||||
compCS |
+text |
+
+ SSH compression algorithm supported in the session + |
+
+ + |
+|||||
dst_ip |
+ip-dst |
+
+ Destination IP address of the session + |
+
+ + |
+|||||
session |
+text |
+
+ Session id + |
+
+ + |
+|||||
sensor |
+text |
+
+ Cowrie sensor name + |
+
+ + |
+|||||
protocol |
+text |
+
+ Protocol used in the cowrie honeypot + |
+
+ + |
+
origin
+type
text
Origin of the credential(s) ['bruteforce-scanning', 'malware-analysis', 'memory-analysis', 'network-analysis', 'leak', 'unknown']
+Type of password(s) ['password', 'api-key', 'encryption-key', 'unknown']
@@ -2263,16 +2383,26 @@ credential is a MISP object available in JSON format at
type
origin
text
Type of password(s) ['password', 'api-key', 'encryption-key', 'unknown']
+Origin of the credential(s) ['bruteforce-scanning', 'malware-analysis', 'memory-analysis', 'network-analysis', 'leak', 'unknown']
text
text
A description of the credential(s)
++
password
text
text
text
A description of the credential(s)
--
name
-text
comment
comment
Name of the card owner.
+A description of the card.
++
issued
datetime
Initial date of validity or issued date.
@@ -2381,16 +2511,6 @@ credit-card is a MISP object available in JSON format at
issued
datetime
Initial date of validity or issued date.
--
cc-number
cc-number
comment
comment
expiration
datetime
A description of the card.
+Maximum date of validity
expiration
datetime
name
text
Maximum date of validity
+Name of the card owner.
@@ -2459,20 +2579,10 @@ ddos is a MISP object available in JSON format at
first-seen
datetime
domain-dst
domain
Beginning of the attack
--
total-bps
counter
Bits per second
+Destination domain (victim)
@@ -2489,10 +2599,40 @@ ddos is a MISP object available in JSON format at
domain-dst
domain
first-seen
datetime
Destination domain (victim)
+Beginning of the attack
++
ip-dst
ip-dst
Destination IP (victim)
++
text
text
Description of the DDoS
++
total-bps
counter
Bits per second
@@ -2519,36 +2659,6 @@ ddos is a MISP object available in JSON format at
src-port
port
Port originating the attack
--
ip-dst
ip-dst
Destination IP (victim)
--
text
text
Description of the DDoS
--
total-pps
counter
src-port
port
Port originating the attack
++
IdrFlags
+text
IDR-Flags.
++
first-seen
datetime
Destination-Host
text
Destination-Host.
--
Username
text
Destination-Realm
Destination-Host
text
Destination-Realm.
+Destination-Host.
@@ -2657,40 +2777,20 @@ diameter-attack is a MISP object available in JSON format at
SessionId
Destination-Realm
text
Session-ID.
+Destination-Realm.
IdrFlags
SessionId
text
IDR-Flags.
--
CmdCode
text
A decimal representation of the diameter Command Code.
--
Origin-Realm
text
Origin-Realm.
+Session-ID.
@@ -2707,10 +2807,10 @@ diameter-attack is a MISP object available in JSON format at
Origin-Host
Origin-Realm
text
Origin-Host.
+Origin-Realm.
Origin-Host
text
Origin-Host.
++
CmdCode
text
A decimal representation of the diameter Command Code.
++
first-seen
-datetime
text
text
First time the tuple has been seen
+A description of the tuple
@@ -2785,13 +2905,13 @@ domain-ip is a MISP object available in JSON format at
domain
domain
first-seen
datetime
Domain name
+First time the tuple has been seen
+
text
-text
domain
domain
A description of the tuple
+Domain name
+
type
+text
Type of ELF ['CORE', 'DYNAMIC', 'EXECUTABLE', 'HIPROC', 'LOPROC', 'NONE', 'RELOCATABLE']
++
os_abi
text
arch
text
Architecture of the ELF file ['None', 'M32', 'SPARC', 'i386', 'ARCH_68K', 'ARCH_88K', 'IAMCU', 'ARCH_860', 'MIPS', 'S370', 'MIPS_RS3_LE', 'PARISC', 'VPP500', 'SPARC32PLUS', 'ARCH_960', 'PPC', 'PPC64', 'S390', 'SPU', 'V800', 'FR20', 'RH32', 'RCE', 'ARM', 'ALPHA', 'SH', 'SPARCV9', 'TRICORE', 'ARC', 'H8_300', 'H8_300H', 'H8S', 'H8_500', 'IA_64', 'MIPS_X', 'COLDFIRE', 'ARCH_68HC12', 'MMA', 'PCP', 'NCPU', 'NDR1', 'STARCORE', 'ME16', 'ST100', 'TINYJ', 'x86_64', 'PDSP', 'PDP10', 'PDP11', 'FX66', 'ST9PLUS', 'ST7', 'ARCH_68HC16', 'ARCH_68HC11', 'ARCH_68HC08', 'ARCH_68HC05', 'SVX', 'ST19', 'VAX', 'CRIS', 'JAVELIN', 'FIREPATH', 'ZSP', 'MMIX', 'HUANY', 'PRISM', 'AVR', 'FR30', 'D10V', 'D30V', 'V850', 'M32R', 'MN10300', 'MN10200', 'PJ', 'OPENRISC', 'ARC_COMPACT', 'XTENSA', 'VIDEOCORE', 'TMM_GPP', 'NS32K', 'TPC', 'SNP1K', 'ST200', 'IP2K', 'MAX', 'CR', 'F2MC16', 'MSP430', 'BLACKFIN', 'SE_C33', 'SEP', 'ARCA', 'UNICORE', 'EXCESS', 'DXP', 'ALTERA_NIOS2', 'CRX', 'XGATE', 'C166', 'M16C', 'DSPIC30F', 'CE', 'M32C', 'TSK3000', 'RS08', 'SHARC', 'ECOG2', 'SCORE7', 'DSP24', 'VIDEOCORE3', 'LATTICEMICO32', 'SE_C17', 'TI_C6000', 'TI_C2000', 'TI_C5500', 'MMDSP_PLUS', 'CYPRESS_M8C', 'R32C', 'TRIMEDIA', 'HEXAGON', 'ARCH_8051', 'STXP7X', 'NDS32', 'ECOG1', 'ECOG1X', 'MAXQ30', 'XIMO16', 'MANIK', 'CRAYNV2', 'RX', 'METAG', 'MCST_ELBRUS', 'ECOG16', 'CR16', 'ETPU', 'SLE9X', 'L10M', 'K10M', 'AARCH64', 'AVR32', 'STM8', 'TILE64', 'TILEPRO', 'CUDA', 'TILEGX', 'CLOUDSHIELD', 'COREA_1ST', 'COREA_2ND', 'ARC_COMPACT2', 'OPEN8', 'RL78', 'VIDEOCORE5', 'ARCH_78KOR', 'ARCH_56800EX', 'BA1', 'BA2', 'XCORE', 'MCHP_PIC', 'INTEL205', 'INTEL206', 'INTEL207', 'INTEL208', 'INTEL209', 'KM32', 'KMX32', 'KMX16', 'KMX8', 'KVARC', 'CDP', 'COGE', 'COOL', 'NORC', 'CSR_KALIMBA', 'AMDGPU']
--
entrypoint-address
text
Address of the entry point
--
text
text
Free text value to attach to the ELF
--
number-sections
counter
type
arch
text
Type of ELF ['CORE', 'DYNAMIC', 'EXECUTABLE', 'HIPROC', 'LOPROC', 'NONE', 'RELOCATABLE']
+Architecture of the ELF file ['None', 'M32', 'SPARC', 'i386', 'ARCH_68K', 'ARCH_88K', 'IAMCU', 'ARCH_860', 'MIPS', 'S370', 'MIPS_RS3_LE', 'PARISC', 'VPP500', 'SPARC32PLUS', 'ARCH_960', 'PPC', 'PPC64', 'S390', 'SPU', 'V800', 'FR20', 'RH32', 'RCE', 'ARM', 'ALPHA', 'SH', 'SPARCV9', 'TRICORE', 'ARC', 'H8_300', 'H8_300H', 'H8S', 'H8_500', 'IA_64', 'MIPS_X', 'COLDFIRE', 'ARCH_68HC12', 'MMA', 'PCP', 'NCPU', 'NDR1', 'STARCORE', 'ME16', 'ST100', 'TINYJ', 'x86_64', 'PDSP', 'PDP10', 'PDP11', 'FX66', 'ST9PLUS', 'ST7', 'ARCH_68HC16', 'ARCH_68HC11', 'ARCH_68HC08', 'ARCH_68HC05', 'SVX', 'ST19', 'VAX', 'CRIS', 'JAVELIN', 'FIREPATH', 'ZSP', 'MMIX', 'HUANY', 'PRISM', 'AVR', 'FR30', 'D10V', 'D30V', 'V850', 'M32R', 'MN10300', 'MN10200', 'PJ', 'OPENRISC', 'ARC_COMPACT', 'XTENSA', 'VIDEOCORE', 'TMM_GPP', 'NS32K', 'TPC', 'SNP1K', 'ST200', 'IP2K', 'MAX', 'CR', 'F2MC16', 'MSP430', 'BLACKFIN', 'SE_C33', 'SEP', 'ARCA', 'UNICORE', 'EXCESS', 'DXP', 'ALTERA_NIOS2', 'CRX', 'XGATE', 'C166', 'M16C', 'DSPIC30F', 'CE', 'M32C', 'TSK3000', 'RS08', 'SHARC', 'ECOG2', 'SCORE7', 'DSP24', 'VIDEOCORE3', 'LATTICEMICO32', 'SE_C17', 'TI_C6000', 'TI_C2000', 'TI_C5500', 'MMDSP_PLUS', 'CYPRESS_M8C', 'R32C', 'TRIMEDIA', 'HEXAGON', 'ARCH_8051', 'STXP7X', 'NDS32', 'ECOG1', 'ECOG1X', 'MAXQ30', 'XIMO16', 'MANIK', 'CRAYNV2', 'RX', 'METAG', 'MCST_ELBRUS', 'ECOG16', 'CR16', 'ETPU', 'SLE9X', 'L10M', 'K10M', 'AARCH64', 'AVR32', 'STM8', 'TILE64', 'TILEPRO', 'CUDA', 'TILEGX', 'CLOUDSHIELD', 'COREA_1ST', 'COREA_2ND', 'ARC_COMPACT2', 'OPEN8', 'RL78', 'VIDEOCORE5', 'ARCH_78KOR', 'ARCH_56800EX', 'BA1', 'BA2', 'XCORE', 'MCHP_PIC', 'INTEL205', 'INTEL206', 'INTEL207', 'INTEL208', 'INTEL209', 'KM32', 'KMX32', 'KMX16', 'KMX8', 'KVARC', 'CDP', 'COGE', 'COOL', 'NORC', 'CSR_KALIMBA', 'AMDGPU']
+
+
text
text
Free text value to attach to the ELF
++
entrypoint-address
text
Address of the entry point
+
sha224
-sha224
Secure Hash Algorithm 2 (224 bits)
--
ssdeep
ssdeep
Fuzzy hash using context triggered piecewise hashes (CTPH)
--
sha512
sha512
sha384
sha384
Secure Hash Algorithm 2 (384 bits)
--
text
text
Free text value to attach to the section
--
type
text
Type of the section ['NULL', 'PROGBITS', 'SYMTAB', 'STRTAB', 'RELA', 'HASH', 'DYNAMIC', 'NOTE', 'NOBITS', 'REL', 'SHLIB', 'DYNSYM', 'INIT_ARRAY', 'FINI_ARRAY', 'PREINIT_ARRAY', 'GROUP', 'SYMTAB_SHNDX', 'LOOS', 'GNU_ATTRIBUTES', 'GNU_HASH', 'GNU_VERDEF', 'GNU_VERNEED', 'GNU_VERSYM', 'HIOS', 'LOPROC', 'ARM_EXIDX', 'ARM_PREEMPTMAP', 'HEX_ORDERED', 'X86_64_UNWIND', 'MIPS_REGINFO', 'MIPS_OPTIONS', 'MIPS_ABIFLAGS', 'HIPROC', 'LOUSER', 'HIUSER']
--
sha256
sha256
Secure Hash Algorithm 2 (256 bits)
--
name
text
Name of the section
--
sha512/224
sha512/224
size-in-bytes
size-in-bytes
Size of the section, in bytes
--
entropy
float
Entropy of the whole section
--
sha1
sha1
[Insecure] Secure Hash Algorithm 1 (160 bits)
--
md5
md5
[Insecure] MD5 hash (128 bits)
--
flag
text
size-in-bytes
size-in-bytes
Size of the section, in bytes
++
sha384
sha384
Secure Hash Algorithm 2 (384 bits)
++
sha512/256
sha512/256
type
text
Type of the section ['NULL', 'PROGBITS', 'SYMTAB', 'STRTAB', 'RELA', 'HASH', 'DYNAMIC', 'NOTE', 'NOBITS', 'REL', 'SHLIB', 'DYNSYM', 'INIT_ARRAY', 'FINI_ARRAY', 'PREINIT_ARRAY', 'GROUP', 'SYMTAB_SHNDX', 'LOOS', 'GNU_ATTRIBUTES', 'GNU_HASH', 'GNU_VERDEF', 'GNU_VERNEED', 'GNU_VERSYM', 'HIOS', 'LOPROC', 'ARM_EXIDX', 'ARM_PREEMPTMAP', 'HEX_ORDERED', 'X86_64_UNWIND', 'MIPS_REGINFO', 'MIPS_OPTIONS', 'MIPS_ABIFLAGS', 'HIPROC', 'LOUSER', 'HIUSER']
++
sha1
sha1
[Insecure] Secure Hash Algorithm 1 (160 bits)
++
entropy
float
Entropy of the whole section
++
sha256
sha256
Secure Hash Algorithm 2 (256 bits)
++
sha224
sha224
Secure Hash Algorithm 2 (224 bits)
++
text
text
Free text value to attach to the section
++
md5
md5
[Insecure] MD5 hash (128 bits)
++
ssdeep
ssdeep
Fuzzy hash using context triggered piecewise hashes (CTPH)
++
name
text
Name of the section
++
mime-boundary
-email-mime-boundary
reply-to
email-reply-to
MIME Boundary
+Email address the reply will be sent to
++
subject
email-subject
Subject
@@ -3159,10 +3289,30 @@ email is a MISP object available in JSON format at
return-path
text
email-body
email-body
Message return path
+Body of the email
++
to
email-dst
Destination email address
++
thread-index
email-thread-index
Identifies a particular conversation thread
@@ -3179,10 +3329,70 @@ email is a MISP object available in JSON format at
email-body
email-body
cc
email-dst
Body of the email
+Carbon copy
++
to-display-name
email-dst-display-name
Display name of the receiver
++
mime-boundary
email-mime-boundary
MIME Boundary
++
send-date
datetime
Date the email has been sent
++
from
email-src
Sender email address
++
message-id
email-message-id
Message ID
++
return-path
text
Message return path
@@ -3209,56 +3419,6 @@ email is a MISP object available in JSON format at
from
email-src
Sender email address
--
to-display-name
email-dst-display-name
Display name of the receiver
--
cc
email-dst
Carbon copy
--
subject
email-subject
Subject
--
to
email-dst
Destination email address
--
from-display-name
email-src-display-name
send-date
datetime
Date the email has been sent
--
reply-to
email-reply-to
Email address the reply will be sent to
--
message-id
email-message-id
Message ID
--
thread-index
email-thread-index
Identifies a particular conversation thread
--
attack-type
-text
processing-timestamp
datetime
Type of the attack
+Timestamp of the report
@@ -3377,20 +3497,20 @@ fail2ban is a MISP object available in JSON format at
banned-ip
ip-src
victim
text
IP Address banned by fail2ban
+Identifier of the victim
+
sensor
attack-type
text
Identifier of the sensor
+Type of the attack
@@ -3407,23 +3527,23 @@ fail2ban is a MISP object available in JSON format at
processing-timestamp
datetime
sensor
text
Timestamp of the report
+Identifier of the sensor
victim
text
banned-ip
ip-src
Identifier of the victim
+IP Address banned by fail2ban
+
sha224
-sha224
Secure Hash Algorithm 2 (224 bits)
--
path
text
Path of the filename complete or partial
--
filename
filename
Filename on disk
--
state
text
State of the file ['Malicious', 'Harmless', 'Signed', 'Revoked', 'Expired', 'Trusted']
--
ssdeep
ssdeep
Fuzzy hash using context triggered piecewise hashes (CTPH)
--
sha512
sha512
sha384
sha384
Secure Hash Algorithm 2 (384 bits)
--
pattern-in-file
pattern-in-file
Pattern that can be found in the file
--
size-in-bytes
size-in-bytes
Size of the file, in bytes
--
text
text
Free text value to attach to the file
--
malware-sample
malware-sample
The file itself (binary)
--
sha512/224
sha512/224
sha256
sha256
size-in-bytes
size-in-bytes
Size of the file, in bytes
++
sha384
sha384
Secure Hash Algorithm 2 (384 bits)
++
sha512/256
sha512/256
Secure Hash Algorithm 2 (256 bits)
pattern-in-file
+pattern-in-file
Pattern that can be found in the file
++
state
text
State of the file ['Malicious', 'Harmless', 'Signed', 'Revoked', 'Expired', 'Trusted']
++
sha1
sha1
[Insecure] Secure Hash Algorithm 1 (160 bits)
++
certificate
x509-fingerprint-sha1
Certificate value if the binary is signed with another authentication scheme than authenticode
++
malware-sample
malware-sample
The file itself (binary)
++
entropy
float
certificate
x509-fingerprint-sha1
sha256
sha256
Certificate value if the binary is signed with another authentication scheme than authenticode
+Secure Hash Algorithm 2 (256 bits)
path
text
Path of the filename complete or partial
++
sha224
sha224
Secure Hash Algorithm 2 (224 bits)
++
text
text
Free text value to attach to the file
++
filename
filename
Filename on disk
++
tlsh
tlsh
sha1
sha1
[Insecure] Secure Hash Algorithm 1 (160 bits)
--
md5
md5
ssdeep
ssdeep
Fuzzy hash using context triggered piecewise hashes (CTPH)
++
mimetype
mime-type
sha512/256
sha512/256
Secure Hash Algorithm 2 (256 bits)
--
zipcode
+text
Zip Code.
++
text
text
A generic description of the location.
++
latitude
float
The latitude is the decimal value of the latitude in the World Geodetic System 84 (WGS84) reference.
++
first-seen
datetime
region
city
text
Region.
+City.
longitude
altitude
float
The longitude is the decimal value of the longitude in the World Geodetic System 84 (WGS84) reference
+The altitude is the decimal value of the altitude in the World Geodetic System 84 (WGS84) reference.
+
latitude
+region
text
Region.
++
longitude
float
The latitude is the decimal value of the latitude in the World Geodetic System 84 (WGS84) reference.
--
city
text
City.
--
zipcode
text
Zip Code.
--
altitude
float
The altitude is the decimal value of the altitude in the World Geodetic System 84 (WGS84) reference.
--
text
text
A generic description of the location.
+The longitude is the decimal value of the longitude in the World Geodetic System 84 (WGS84) reference
@@ -3861,56 +3981,16 @@ gtp-attack is a MISP object available in JSON format at
first-seen
datetime
When the attack has been seen for the first time.
--
GtpInterface
GtpImei
text
GTP interface. ['S5', 'S11', 'S10', 'S8', 'Gn', 'Gp']
--
GtpVersion
text
GTP version ['0', '1', '2']
--
GtpImsi
text
GTP IMSI (International mobile subscriber identity).
+GTP IMEI (International Mobile Equipment Identity).
PortSrc
port
Source port.
--
ipDest
ip-dst
text
text
A description of the GTP attack.
--
ipSrc
ip-src
IP source address.
--
GtpImei
text
GTP IMEI (International Mobile Equipment Identity).
--
GtpMessageType
text
text
text
A description of the GTP attack.
++
PortDest
text
GtpInterface
text
GTP interface. ['S5', 'S11', 'S10', 'S8', 'Gn', 'Gp']
++
GtpServingNetwork
text
PortSrc
port
Source port.
++
GtpImsi
text
GTP IMSI (International mobile subscriber identity).
++
GtpMsisdn
text
GtpVersion
text
GTP version ['0', '1', '2']
++
ipSrc
ip-src
IP source address.
++
first-seen
datetime
When the attack has been seen for the first time.
++
content-type
-other
proxy-user
text
The MIME type of the body of the request
+HTTP Proxy Username
@@ -4049,6 +4169,86 @@ http-request is a MISP object available in JSON format at
content-type
other
The MIME type of the body of the request
++
proxy-password
text
HTTP Proxy Password
++
cookie
text
An HTTP cookie previously sent by the server with Set-Cookie
++
referer
other
This is the address of the previous web page from which a link to the currently requested page was followed
++
uri
uri
Request URI
++
user-agent
user-agent
The user agent string of the user agent
++
method
http-method
HTTP Method invoked (one of GET, POST, PUT, HEAD, DELETE, OPTIONS, CONNECT)
++
text
text
HTTP Request comment
++
host
hostname
method
http-method
HTTP Method invoked (one of GET, POST, PUT, HEAD, DELETE, OPTIONS, CONNECT)
--
user-agent
user-agent
The user agent string of the user agent
--
basicauth-user
text
uri
uri
Request URI
--
cookie
text
An HTTP cookie previously sent by the server with Set-Cookie
--
proxy-user
text
HTTP Proxy Username
--
text
text
HTTP Request comment
--
proxy-password
text
HTTP Proxy Password
--
referer
other
This is the address of the previous web page from which a link to the currently requested page was followed
--
first-seen
-datetime
First time the tuple has been seen
--
last-seen
datetime
src-port
dst-port
port
Source port
+Destination port
+
ip
ip-dst
first-seen
datetime
IP Address
+First time the tuple has been seen
+
+
text
text
Description of the tuple
+
dst-port
-port
ip
ip-dst
Destination port
+IP Address
+
text
text
src-port
port
Description of the tuple
+Source port
+
ip-dst
+ip-dst
Destination IP address
++
last-seen
datetime
description
text
Type of detected software ie software, malware
--
ja3-fingerprint-md5
md5
ip-dst
ip-dst
ip-src
ip-src
Destination IP address
+Source IP Address
ip-src
ip-src
description
text
Source IP Address
+Type of detected software ie software, malware
@@ -4413,40 +4533,10 @@ legal-entity is a MISP object available in JSON format at
name
registration-number
text
Name of an entity.
--
business
text
Business area of an entity.
--
legal-form
text
Legal form of an entity.
--
phone-number
phone-number
Phone number of an entity.
+Registration number of an entity in the relevant authority.
@@ -4463,6 +4553,26 @@ legal-entity is a MISP object available in JSON format at
legal-form
text
Legal form of an entity.
++
name
text
Name of an entity.
++
text
text
registration-number
business
text
Registration number of an entity in the relevant authority.
+Business area of an entity.
++
phone-number
phone-number
Phone number of an entity.
@@ -4521,10 +4641,10 @@ macho is a MISP object available in JSON format at
name
type
text
Binary’s name
+Type of Mach-O ['BUNDLE', 'CORE', 'DSYM', 'DYLIB', 'DYLIB_STUB', 'DYLINKER', 'EXECUTE', 'FVMLIB', 'KEXT_BUNDLE', 'OBJECT', 'PRELOAD']
@@ -4541,16 +4661,6 @@ macho is a MISP object available in JSON format at
entrypoint-address
text
Address of the entry point
--
number-sections
counter
type
entrypoint-address
text
Type of Mach-O ['BUNDLE', 'CORE', 'DSYM', 'DYLIB', 'DYLIB_STUB', 'DYLINKER', 'EXECUTE', 'FVMLIB', 'KEXT_BUNDLE', 'OBJECT', 'PRELOAD']
+Address of the entry point
++
name
text
Binary’s name
@@ -4609,26 +4729,6 @@ macho-section is a MISP object available in JSON format at
sha224
sha224
Secure Hash Algorithm 2 (224 bits)
--
ssdeep
ssdeep
Fuzzy hash using context triggered piecewise hashes (CTPH)
--
sha512
sha512
sha384
sha384
Secure Hash Algorithm 2 (384 bits)
--
text
text
Free text value to attach to the section
--
sha256
sha256
Secure Hash Algorithm 2 (256 bits)
--
name
text
Name of the section
--
sha512/224
sha512/224
entropy
float
sha384
sha384
Entropy of the whole section
--
sha1
sha1
[Insecure] Secure Hash Algorithm 1 (160 bits)
--
md5
md5
[Insecure] MD5 hash (128 bits)
+Secure Hash Algorithm 2 (384 bits)
sha1
sha1
[Insecure] Secure Hash Algorithm 1 (160 bits)
++
entropy
float
Entropy of the whole section
++
sha256
sha256
Secure Hash Algorithm 2 (256 bits)
++
sha224
sha224
Secure Hash Algorithm 2 (224 bits)
++
text
text
Free text value to attach to the section
++
md5
md5
[Insecure] MD5 hash (128 bits)
++
ssdeep
ssdeep
Fuzzy hash using context triggered piecewise hashes (CTPH)
++
name
text
Name of the section
++
creation-date
-datetime
Initial creation of the microblog post
--
username-quoted
post
text
Username who are quoted into the microblog post
+Raw post
@@ -4807,20 +4917,10 @@ microblog is a MISP object available in JSON format at
post
text
url
url
Raw post
--
username
text
Username who posted the microblog post
+Original URL location of the microblog post
@@ -4847,6 +4947,26 @@ microblog is a MISP object available in JSON format at
creation-date
datetime
Initial creation of the microblog post
++
username-quoted
text
Username who are quoted into the microblog post
++
link
url
url
url
username
text
Original URL location of the microblog post
+Username who posted the microblog post
@@ -4915,20 +5035,20 @@ mutex is a MISP object available in JSON format at
operating-system
description
text
Operating system where the mutex has been seen ['Windows', 'Unix']
+Description
description
operating-system
text
Description
+Operating system where the mutex has been seen ['Windows', 'Unix']
@@ -4993,96 +5113,6 @@ netflow is a MISP object available in JSON format at
src-port
port
Source port of the netflow
--
first-packet-seen
datetime
First packet seen in this flow
--
last-packet-seen
datetime
Last packet seen in this flow
--
packet-count
counter
Packets counted in this flow
--
tcp-flags
text
TCP flags of the flow
--
src-as
AS
Source AS number for this flow
--
flow-count
counter
Flows counted in this flow
--
ip_version
counter
IP version of this flow
--
protocol
text
Protocol used for this flow ['TCP', 'UDP', 'ICMP', 'IP']
--
direction
text
byte-count
counter
first-packet-seen
datetime
Bytes counted in this flow
--
ip-dst
ip-dst
IP address destination of the netflow
--
dst-port
port
Destination port of the netflow
+First packet seen in this flow
@@ -5133,6 +5143,106 @@ netflow is a MISP object available in JSON format at
flow-count
counter
Flows counted in this flow
++
packet-count
counter
Packets counted in this flow
++
byte-count
counter
Bytes counted in this flow
++
src-port
port
Source port of the netflow
++
ip_version
counter
IP version of this flow
++
ip-dst
ip-dst
IP address destination of the netflow
++
last-packet-seen
datetime
Last packet seen in this flow
++
dst-port
port
Destination port of the netflow
++
protocol
text
Protocol used for this flow ['TCP', 'UDP', 'ICMP', 'IP']
++
src-as
AS
Source AS number for this flow
++
ip-src
ip-src
tcp-flags
text
TCP flags of the flow
++
origin
-text
Origin of the Passive DNS response
--
count
counter
How many authoritative DNS answers were received at the Passive DNS Server’s collectors with exactly the given set of values as answers.
--
rdata
text
Resource records of the queried resource
--
bailiwick
text
rrname
text
Resource Record name of the queried resource.
--
zone_time_first
datetime
zone_time_last
datetime
Last time that the unique tuple (rrname, rrtype, rdata) record has been seen via master file import.
--
rrtype
origin
text
Resource Record type as seen by the passive DNS. ['A', 'AAAA', 'CNAME', 'PTR', 'SOA', 'TXT', 'DNAME', 'NS', 'SRV', 'RP', 'NAPTR', 'HINFO', 'A6']
+Origin of the Passive DNS response
@@ -5291,6 +5361,16 @@ passive-dns is a MISP object available in JSON format at
rdata
text
Resource records of the queried resource
++
text
text
rrname
text
Resource Record name of the queried resource.
++
count
counter
How many authoritative DNS answers were received at the Passive DNS Server’s collectors with exactly the given set of values as answers.
++
zone_time_last
datetime
Last time that the unique tuple (rrname, rrtype, rdata) record has been seen via master file import.
++
rrtype
text
Resource Record type as seen by the passive DNS. ['A', 'AAAA', 'CNAME', 'PTR', 'SOA', 'TXT', 'DNAME', 'NS', 'SRV', 'RP', 'NAPTR', 'HINFO', 'A6']
++
paste
-text
url
url
Raw text of the paste or post
+Link to the original source of the paste or post.
first-seen
datetime
When the paste has been accessible or seen for the first time.
--
last-seen
datetime
url
url
paste
text
Link to the original source of the paste or post.
+Raw text of the paste or post
first-seen
datetime
When the paste has been accessible or seen for the first time.
++
file-description
+type
text
FileDescription in the resources
+Type of PE ['exe', 'dll', 'driver', 'unknown']
number-sections
counter
Number of sections
++
lang-id
text
Lang ID in the resources
++
product-version
text
ProductVersion in the resources
++
original-filename
filename
OriginalFilename in the resources
++
compilation-timestamp
datetime
Compilation timestamp defined in the PE header
++
product-name
text
ProductName in the resources
++
entrypoint-address
text
Address of the entry point
++
impfuzzy
impfuzzy
Fuzzy Hash (ssdeep) calculated from the import table
++
internal-filename
filename
InternalFilename in the resources
++
legal-copyright
text
LegalCopyright in the resources
++
file-version
text
FileVersion in the resources
++
imphash
imphash
Hash (md5) calculated from the import table
++
text
text
Free text value to attach to the PE
++
pehash
pehash
Hash of the structural information about a sample. See https://www.usenix.org/legacy/event/leet09/tech/full_papers/wicherski/wicherski_html/
++
entrypoint-section-at-position
text
original-filename
filename
OriginalFilename in the resources
--
file-version
file-description
text
FileVersion in the resources
--
internal-filename
filename
InternalFilename in the resources
--
imphash
imphash
Hash (md5) calculated from the import table
--
product-version
text
ProductVersion in the resources
--
compilation-timestamp
datetime
Compilation timestamp defined in the PE header
--
impfuzzy
impfuzzy
Fuzzy Hash (ssdeep) calculated from the import table
--
type
text
Type of PE ['exe', 'dll', 'driver', 'unknown']
--
lang-id
text
Lang ID in the resources
--
pehash
pehash
Hash of the structural information about a sample. See https://www.usenix.org/legacy/event/leet09/tech/full_papers/wicherski/wicherski_html/
--
text
text
Free text value to attach to the PE
--
product-name
text
ProductName in the resources
--
legal-copyright
text
LegalCopyright in the resources
--
number-sections
counter
Number of sections
--
entrypoint-address
text
Address of the entry point
+FileDescription in the resources
@@ -5655,36 +5775,6 @@ pe-section is a MISP object available in JSON format at
sha224
sha224
Secure Hash Algorithm 2 (224 bits)
--
characteristic
text
Characteristic of the section ['read', 'write', 'executable']
--
ssdeep
ssdeep
Fuzzy hash using context triggered piecewise hashes (CTPH)
--
sha512
sha512
sha384
sha384
Secure Hash Algorithm 2 (384 bits)
--
text
text
Free text value to attach to the section
--
sha256
sha256
Secure Hash Algorithm 2 (256 bits)
--
name
text
Name of the section ['.rsrc', '.reloc', '.rdata', '.data', '.text']
--
sha512/224
sha512/224
entropy
float
sha384
sha384
Entropy of the whole section
--
sha1
sha1
[Insecure] Secure Hash Algorithm 1 (160 bits)
--
md5
md5
[Insecure] MD5 hash (128 bits)
+Secure Hash Algorithm 2 (384 bits)
characteristic
text
Characteristic of the section ['read', 'write', 'executable']
++
sha1
sha1
[Insecure] Secure Hash Algorithm 1 (160 bits)
++
entropy
float
Entropy of the whole section
++
sha256
sha256
Secure Hash Algorithm 2 (256 bits)
++
sha224
sha224
Secure Hash Algorithm 2 (224 bits)
++
text
text
Free text value to attach to the section
++
md5
md5
[Insecure] MD5 hash (128 bits)
++
ssdeep
ssdeep
Fuzzy hash using context triggered piecewise hashes (CTPH)
++
name
text
Name of the section ['.rsrc', '.reloc', '.rdata', '.data', '.text']
++
passport-country
-passport-country
passport-expiration
passport-expiration
The country in which the passport was issued.
+The expiration date of a passport.
nationality
nationality
The nationality of a natural person.
--
date-of-birth
date-of-birth
Date of birth of a natural person (in YYYY-MM-DD format).
--
mothers-name
text
Mother name, father, second name or other names following country’s regulation.
--
alias
text
passport-number
passport-number
The passport number of a natural person.
--
place-of-birth
place-of-birth
title
text
Title of the natural person such as Dr. or equivalent.
--
redress-number
redress-number
The Redress Control Number is the record identifier for people who apply for redress through the DHS Travel Redress Inquiry Program (DHS TRIP). DHS TRIP is for travelers who have been repeatedly identified for additional screening and who want to file an inquiry to have erroneous information corrected in DHS systems.
--
passport-expiration
passport-expiration
The expiration date of a passport.
--
gender
gender
The gender of a natural person. ['Male', 'Female', 'Other', 'Prefer not to say']
--
identity-card-number
identity-card-number
social-security-number
text
Social security number
--
middle-name
middle-name
Middle name of a natural person.
--
last-name
last-name
Last name of a natural person.
--
first-name
first-name
nationality
nationality
The nationality of a natural person.
++
title
text
Title of the natural person such as Dr. or equivalent.
++
passport-number
passport-number
The passport number of a natural person.
++
redress-number
redress-number
The Redress Control Number is the record identifier for people who apply for redress through the DHS Travel Redress Inquiry Program (DHS TRIP). DHS TRIP is for travelers who have been repeatedly identified for additional screening and who want to file an inquiry to have erroneous information corrected in DHS systems.
++
gender
gender
The gender of a natural person. ['Male', 'Female', 'Other', 'Prefer not to say']
++
mothers-name
text
Mother name, father, second name or other names following country’s regulation.
++
middle-name
middle-name
Middle name of a natural person.
++
text
text
social-security-number
text
Social security number
++
date-of-birth
date-of-birth
Date of birth of a natural person (in YYYY-MM-DD format).
++
last-name
last-name
Last name of a natural person.
++
passport-country
passport-country
The country in which the passport was issued.
++
text
+text
A description of the phone.
++
imei
text
International Mobile Equipment Identity (IMEI) is a number, usually unique, to identify 3GPP and iDEN mobile phones, as well as some satellite phones.
++
first-seen
datetime
imsi
text
A usually unique International Mobile Subscriber Identity (IMSI) is allocated to each mobile subscriber in the GSM/UMTS/EPS system. IMSI can also refer to International Mobile Station Identity in the ITU nomenclature.
++
gummei
text
Globally Unique MME Identifier (GUMMEI) is composed from MCC, MNC and MME Identifier (MMEI).
++
last-seen
datetime
gummei
msisdn
text
Globally Unique MME Identifier (GUMMEI) is composed from MCC, MNC and MME Identifier (MMEI).
+MSISDN (pronounced as /'em es ai es di en/ or misden) is a number uniquely identifying a subscription in a GSM or a UMTS mobile network. Simply put, it is the mapping of the telephone number to the SIM card in a mobile/cellular phone. This abbreviation has a several interpretations, the most common one being Mobile Station International Subscriber Directory Number.
@@ -6081,36 +6241,6 @@ phone is a MISP object available in JSON format at
guti
text
Globally Unique Temporary UE Identity (GUTI) is a temporary identification to not reveal the phone (user equipment in 3GPP jargon) composed of GUMMEI and the M-TMSI.
--
imsi
text
A usually unique International Mobile Subscriber Identity (IMSI) is allocated to each mobile subscriber in the GSM/UMTS/EPS system. IMSI can also refer to International Mobile Station Identity in the ITU nomenclature.
--
msisdn
text
MSISDN (pronounced as /'em es ai es di en/ or misden) is a number uniquely identifying a subscription in a GSM or a UMTS mobile network. Simply put, it is the mapping of the telephone number to the SIM card in a mobile/cellular phone. This abbreviation has a several interpretations, the most common one being Mobile Station International Subscriber Directory Number.
--
serial-number
text
imei
guti
text
International Mobile Equipment Identity (IMEI) is a number, usually unique, to identify 3GPP and iDEN mobile phones, as well as some satellite phones.
+Globally Unique Temporary UE Identity (GUTI) is a temporary identification to not reveal the phone (user equipment in 3GPP jargon) composed of GUMMEI and the M-TMSI.
text
text
A description of the phone.
--
get-proc-address
+local-references
counter
Amount of calls to GetProcAddress
--
r2-commit-version
text
Radare2 commit ID used to generate this object
+Amount of API calls inside a code section
@@ -6209,16 +6319,6 @@ r2graphity is a MISP object available in JSON format at
not-referenced-strings
counter
Amount of not referenced strings
--
shortest-path-to-create-thread
counter
create-thread
counter
Amount of calls to CreateThread
--
callbacks
counter
local-references
not-referenced-strings
counter
Amount of API calls inside a code section
--
refsglobalvar
counter
Amount of API calls outside of code section (glob var, dynamic API)
--
text
text
Description of the r2graphity object
--
gml
attachment
Graph export in G>raph Modelling Language format
+Amount of not referenced strings
@@ -6299,30 +6359,20 @@ r2graphity is a MISP object available in JSON format at
memory-allocations
counter
text
text
Amount of memory allocations
+Description of the r2graphity object
referenced-strings
counter
Amount of referenced strings
--
ratio-api
ratio-functions
float
Ratio: amount of API calls per kilobyte of code section
+Ratio: amount of functions per kilobyte of code section
@@ -6339,6 +6389,66 @@ r2graphity is a MISP object available in JSON format at
get-proc-address
counter
Amount of calls to GetProcAddress
++
gml
attachment
Graph export in G>raph Modelling Language format
++
total-api
counter
Total amount of API calls
++
r2-commit-version
text
Radare2 commit ID used to generate this object
++
create-thread
counter
Amount of calls to CreateThread
++
ratio-api
float
Ratio: amount of API calls per kilobyte of code section
++
callback-average
counter
callback-largest
memory-allocations
counter
Largest callback
--
ratio-functions
float
Ratio: amount of functions per kilobyte of code section
+Amount of memory allocations
@@ -6389,10 +6489,30 @@ r2graphity is a MISP object available in JSON format at
total-api
refsglobalvar
counter
Total amount of API calls
+Amount of API calls outside of code section (glob var, dynamic API)
++
callback-largest
counter
Largest callback
++
referenced-strings
counter
Amount of referenced strings
@@ -6437,10 +6557,10 @@ regexp is a MISP object available in JSON format at
regexp
type
text
regexp
+Specify which type corresponds to this regex. ['hostname', 'domain', 'email-src', 'email-dst', 'email-subject', 'url', 'user-agent', 'regkey', 'cookie', 'uri', 'filename', 'windows-service-name', 'windows-scheduled-task']
@@ -6457,6 +6577,16 @@ regexp is a MISP object available in JSON format at
regexp
text
regexp
++
regexp-type
text
type
text
Specify which type corresponds to this regex. ['hostname', 'domain', 'email-src', 'email-dst', 'email-subject', 'url', 'user-agent', 'regkey', 'cookie', 'uri', 'filename', 'windows-service-name', 'windows-scheduled-task']
--
name
-text
Name of the registry key
--
last-modified
datetime
key
regkey
Full key path
--
data
text
Data stored in the registry key
--
root-keys
text
data-type
name
text
Registry value type ['REG_NONE', 'REG_SZ', 'REG_EXPAND_SZ', 'REG_BINARY', 'REG_DWORD', 'REG_DWORD_LITTLE_ENDIAN', 'REG_DWORD_BIG_ENDIAN', 'REG_LINK', 'REG_MULTI_SZ', 'REG_RESOURCE_LIST', 'REG_FULL_RESOURCE_DESCRIPTOR', 'REG_RESOURCE_REQUIREMENTS_LIST', 'REG_QWORD', 'REG_QWORD_LITTLE_ENDIAN']
+Name of the registry key
+
+
key
regkey
Full key path
+
data
text
Data stored in the registry key
++
data-type
text
Registry value type ['REG_NONE', 'REG_SZ', 'REG_EXPAND_SZ', 'REG_BINARY', 'REG_DWORD', 'REG_DWORD_LITTLE_ENDIAN', 'REG_DWORD_BIG_ENDIAN', 'REG_LINK', 'REG_MULTI_SZ', 'REG_RESOURCE_LIST', 'REG_FULL_RESOURCE_DESCRIPTOR', 'REG_RESOURCE_REQUIREMENTS_LIST', 'REG_QWORD', 'REG_QWORD_LITTLE_ENDIAN']
++
classification
+constituency
text
Classification of the RTIR ticket
+Constituency of the RTIR ticket
@@ -6701,10 +6821,20 @@ rtir is a MISP object available in JSON format at
ip
ip-dst
ticket-number
text
IPs automatically extracted from the RTIR ticket
+ticket-number of the RTIR ticket
++
classification
text
Classification of the RTIR ticket
@@ -6721,20 +6851,10 @@ rtir is a MISP object available in JSON format at
ticket-number
text
ip
ip-dst
ticket-number of the RTIR ticket
--
constituency
text
Constituency of the RTIR ticket
+IPs automatically extracted from the RTIR ticket
@@ -6789,10 +6909,20 @@ sandbox-report is a MISP object available in JSON format at
saas-sandbox
results
text
A non-on-premise sandbox, also results are not publicly available ['forticloud-sandbox', 'joe-sandbox-cloud', 'symantec-cas-cloud']
+Freetext result values
++
web-sandbox
text
A web sandbox where results are publicly available via an URL ['malwr', 'hybrid-analysis']
@@ -6809,10 +6939,10 @@ sandbox-report is a MISP object available in JSON format at
sandbox-type
raw-report
text
The type of sandbox used ['on-premise', 'web', 'saas']
+Raw report from sandbox
@@ -6839,30 +6969,20 @@ sandbox-report is a MISP object available in JSON format at
raw-report
saas-sandbox
text
Raw report from sandbox
+A non-on-premise sandbox, also results are not publicly available ['forticloud-sandbox', 'joe-sandbox-cloud', 'symantec-cas-cloud']
results
sandbox-type
text
Freetext result values
--
web-sandbox
text
A web sandbox where results are publicly available via an URL ['malwr', 'hybrid-analysis']
+The type of sandbox used ['on-premise', 'web', 'saas']
@@ -6907,6 +7027,16 @@ sb-signature is a MISP object available in JSON format at
text
text
Additional signature description
++
software
text
text
text
Additional signature description
--
signature
text
MapApplicationContext
text
MAP application context in OID format.
--
MapSmsTP-PID
text
MAP SMS TP-PID.
--
MapMscGT
text
MAP MSC GT. Phone number.
--
MapSmsText
text
MapOpCode
text
MAP operation codes - Decimal value between 0-99.
--
MapVlrGT
text
MAP VLR GT. Phone number.
--
MapSmscGT
text
MAP SMSC. Phone number.
--
SccpCgSSN
text
Signaling Connection Control Part (SCCP) - Decimal value between 0-255.
--
MapSmsTP-OA
text
MAP SMS TP-OA. Phone number.
--
MapUssdContent
text
MAP USSD Content.
--
SccpCdPC
text
SccpCgPC
text
Signaling Connection Control Part (SCCP) CgPC - Phone number.
--
MapSmsTP-DCS
text
MAP SMS TP-DCS.
--
SccpCdGT
text
Signaling Connection Control Part (SCCP) CdGT - Phone number.
--
text
text
first-seen
datetime
MapOpCode
text
When the attack has been seen for the first time.
+MAP operation codes - Decimal value between 0-99.
Category
text
Category ['Cat0', 'Cat1', 'Cat2.1', 'Cat2.2', 'Cat3.1', 'Cat3.2', 'Cat3.3', 'CatSMS', 'CatSpoofing']
--
MapMsisdn
text
MAP MSISDN. Phone number.
--
MapVersion
text
Map version. ['1', '2', '3']
--
MapGmlc
text
MAP GMLC. Phone number.
--
MapImsi
text
MAP IMSI. Phone number starting with MCC/MNC.
--
MapUssdCoding
text
MapSmsTypeNumber
text
MAP SMS TypeNumber.
--
MapGsmscfGT
text
SccpCdGT
text
Signaling Connection Control Part (SCCP) CdGT - Phone number.
++
MapVlrGT
text
MAP VLR GT. Phone number.
++
SccpCgPC
text
Signaling Connection Control Part (SCCP) CgPC - Phone number.
++
SccpCdSSN
text
Signaling Connection Control Part (SCCP) - Decimal value between 0-255.
++
MapApplicationContext
text
MAP application context in OID format.
++
MapImsi
text
MAP IMSI. Phone number starting with MCC/MNC.
++
MapSmsTP-DCS
text
MAP SMS TP-DCS.
++
MapGmlc
text
MAP GMLC. Phone number.
++
SccpCgGT
text
SccpCdSSN
MapVersion
text
Map version. ['1', '2', '3']
++
first-seen
datetime
When the attack has been seen for the first time.
++
MapMscGT
text
MAP MSC GT. Phone number.
++
MapSmscGT
text
MAP SMSC. Phone number.
++
MapUssdContent
text
MAP USSD Content.
++
MapSmsTP-PID
text
MAP SMS TP-PID.
++
MapMsisdn
text
MAP MSISDN. Phone number.
++
Category
text
Category ['Cat0', 'Cat1', 'Cat2.1', 'Cat2.2', 'Cat3.1', 'Cat3.2', 'Cat3.3', 'CatSMS', 'CatSpoofing']
++
MapSmsTypeNumber
text
MAP SMS TypeNumber.
++
MapSmsTP-OA
text
MAP SMS TP-OA. Phone number.
++
SccpCgSSN
text
Signaling Connection Control Part (SCCP) - Decimal value between 0-255.
@@ -7283,10 +7403,10 @@ stix2-pattern is a MISP object available in JSON format atversion
text
stix2-pattern
stix2-pattern
Version of STIX 2 pattern. ['stix 2.0']
+STIX 2 pattern
@@ -7303,10 +7423,10 @@ stix2-pattern is a MISP object available in JSON format at
stix2-pattern
stix2-pattern
version
text
STIX 2 pattern
+Version of STIX 2 pattern. ['stix 2.0']
@@ -7351,16 +7471,6 @@ suricata is a MISP object available in JSON format at
suricata
suricata
Suricata rule.
--
comment
comment
suricata
suricata
Suricata rule.
++
Description about an targeted system, this could potentially be a compromissed internal system.
++ + | ++target-system is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP. + | +
Object attribute | +MISP attribute type | +Description | +Disable correlation | +
---|---|---|---|
targeted_machine |
+target-machine |
+
+ Targeted system + |
+
+ + |
+
timestamp_seen |
+datetime |
+
+ Registered date and time + |
+
+ + |
+
targeted_ip_of_system |
+ip-src |
+
+ Targeted system IP address + |
+
+ + |
+
datetime
-datetime
When the log entry was seen
--
timestamp_desc
text
datetime
datetime
When the log entry was seen
++
first-seen
-datetime
version
text
When the Tor node designed by the IP address has been seen for the first time.
+parsed version of tor, this is None if the relay’s using a new versioning scheme.
-
last-seen
datetime
When the Tor node designed by the IP address has been seen for the last time.
-+
version
+description
text
parsed version of tor, this is None if the relay’s using a new versioning scheme.
+Tor node description.
++
fingerprint
text
router’s fingerprint.
version_line
nickname
text
versioning information reported by the node.
--
address
ip-src
IP address of the Tor node seen.
+router’s nickname.
@@ -7577,10 +7755,20 @@ tor-node is a MISP object available in JSON format at
description
last-seen
datetime
When the Tor node designed by the IP address has been seen for the last time.
++
text
text
Tor node description.
+Tor node comment.
@@ -7597,30 +7785,30 @@ tor-node is a MISP object available in JSON format at
nickname
text
address
ip-src
router’s nickname.
+IP address of the Tor node seen.
fingerprint
version_line
text
router’s fingerprint.
+versioning information reported by the node.
text
text
first-seen
datetime
Tor node comment.
+When the Tor node designed by the IP address has been seen for the first time.
@@ -7665,16 +7853,6 @@ transaction is a MISP object available in JSON format at
authorized
text
Person who autorized the transaction.
--
from-country
text
date-posting
datetime
to-funds-code
text
Date of posting, if different from date of transaction.
+Type of funds used to finalize a transaction. ['A Deposit', 'C Currency exchange', 'D Casino chips', 'E Bank draft', 'F Money order', 'G Traveler’s cheques', 'H Life insurance policy', 'I Real estate', 'J Securities', 'K Cash', 'O Other', 'P Cheque']
++
transmode-comment
text
Comment describing transmode-code, if needed.
++
transmode-code
text
How the transaction was conducted.
@@ -7715,50 +7913,10 @@ transaction is a MISP object available in JSON format at
to-funds-code
authorized
text
Type of funds used to finalize a transaction. ['A Deposit', 'C Currency exchange', 'D Casino chips', 'E Bank draft', 'F Money order', 'G Traveler’s cheques', 'H Life insurance policy', 'I Real estate', 'J Securities', 'K Cash', 'O Other', 'P Cheque']
--
transmode-comment
text
Comment describing transmode-code, if needed.
--
location
text
Location where the transaction took place.
--
transaction-number
text
A unique number identifying a transaction.
--
transmode-code
text
How the transaction was conducted.
+Person who autorized the transaction.
@@ -7775,13 +7933,13 @@ transaction is a MISP object available in JSON format at
text
location
text
A description of the transaction.
+Location where the transaction took place.
+
transaction-number
+text
A unique number identifying a transaction.
++
text
text
A description of the transaction.
++
teller
text
date-posting
datetime
Date of posting, if different from date of transaction.
++
first-seen
-datetime
First time this URL has been seen
--
last-seen
datetime
Last time this URL has been seen
--
domain_without_tld
subdomain
text
Domain without Top-Level Domain
--
tld
text
Top-Level Domain
--
url
url
Full URL
--
text
text
Description of the URL
--
port
port
Port number
+Subdomain
@@ -7923,16 +8051,6 @@ url is a MISP object available in JSON format at
domain
domain
Full domain
--
fragment
text
first-seen
datetime
First time this URL has been seen
++
resource_path
text
host
hostname
domain
domain
Full hostname
+Full domain
subdomain
tld
text
Subdomain
+Top-Level Domain
last-seen
datetime
Last time this URL has been seen
++
credential
text
Credential (username, password)
++
text
text
Description of the URL
++
scheme
text
credential
port
port
Port number
++
host
hostname
Full hostname
++
url
url
Full URL
++
domain_without_tld
text
Credential (username, password)
+Domain without Top-Level Domain
@@ -8031,26 +8219,6 @@ victim is a MISP object available in JSON format at
name
target-org
The name of the department(s) or organisation(s) targeted.
--
classification
text
The type of entity being targeted. ['individual', 'group', 'organization', 'class', 'unknown']
--
external
target-external
regions
target-location
The list of regions or locations from the victim targeted. ISO 3166 should be used.
--
node
target-machine
Name(s) of node that was targeted.
--
user
target-user
The username(s) of the user targeted.
--
roles
text
ip-address
ip-dst
sectors
text
IP address(es) of the node targeted.
+The list of sectors that the victim belong to ['agriculture', 'aerospace', 'automotive', 'communications', 'construction', 'defence', 'education', 'energy', 'engineering', 'entertainment', 'financial services', 'government national', 'government regional', 'government local', 'government public services', 'healthcare', 'hospitality leisure', 'infrastructure', 'insurance', 'manufacturing', 'mining', 'non profit', 'pharmaceuticals', 'retail', 'technology', 'telecommunications', 'transportation', 'utilities']
@@ -8121,6 +8259,36 @@ victim is a MISP object available in JSON format at
classification
text
The type of entity being targeted. ['individual', 'group', 'organization', 'class', 'unknown']
++
node
target-machine
Name(s) of node that was targeted.
++
ip-address
ip-dst
IP address(es) of the node targeted.
++
target-email
sectors
text
regions
target-location
The list of sectors that the victim belong to ['agriculture', 'aerospace', 'automotive', 'communications', 'construction', 'defence', 'education', 'energy', 'engineering', 'entertainment', 'financial services', 'government national', 'government regional', 'government local', 'government public services', 'healthcare', 'hospitality leisure', 'infrastructure', 'insurance', 'manufacturing', 'mining', 'non profit', 'pharmaceuticals', 'retail', 'technology', 'telecommunications', 'transportation', 'utilities']
+The list of regions or locations from the victim targeted. ISO 3166 should be used.
++
user
target-user
The username(s) of the user targeted.
++
name
target-org
The name of the department(s) or organisation(s) targeted.
@@ -8179,6 +8367,26 @@ virustotal-report is a MISP object available in JSON format at
first-submission
datetime
First Submission
++
permalink
link
Permalink Reference
++
community-score
text
first-submission
datetime
First Submission
--
last-submission
datetime
permalink
link
Permalink Reference
--
modified
-datetime
Last modification date
--
references
link
vulnerable_configuration
text
The vulnerable configuration is described in CPE format
--
state
text
published
text
text
Description of the vulnerability
++
modified
datetime
Initial publication date
+Last modification date
@@ -8347,10 +8525,20 @@ vulnerability is a MISP object available in JSON format at
text
published
datetime
Initial publication date
++
vulnerable_configuration
text
Description of the vulnerability
+The vulnerable configuration is described in CPE format
@@ -8395,46 +8583,26 @@ whois is a MISP object available in JSON format at
registrar
whois-registrar
registrant-org
whois-registrant-org
Registrar of the whois entry
+Registrant organisation
ip-address
ip-src
registrant-email
whois-registrant-email
IP address of the whois entry
+Registrant email address
creation-date
datetime
Initial creation of the whois entry
--
expiration-date
datetime
Expiration of the whois entry
--
comment
text
modification-date
datetime
registrar
whois-registrar
Last update of the whois entry
--
registrant-email
whois-registrant-email
Registrant email address
+Registrar of the whois entry
@@ -8475,16 +8633,6 @@ whois is a MISP object available in JSON format at
registrant-name
whois-registrant-name
Registrant name
--
domain
domain
creation-date
datetime
Initial creation of the whois entry
++
ip-address
ip-src
IP address of the whois entry
++
expiration-date
datetime
Expiration of the whois entry
++
text
text
registrant-org
whois-registrant-org
modification-date
datetime
Registrant organisation
+Last update of the whois entry
+
registrant-name
whois-registrant-name
Registrant name
++
validity-not-before
-datetime
subject
text
Certificate invalid before that date
+Subject of the certificate
++
self_signed
boolean
Self-signed certificate
@@ -8593,6 +8791,26 @@ x509 is a MISP object available in JSON format at
x509-fingerprint-md5
x509-fingerprint-md5
[Insecure] MD5 hash (128 bits)
++
raw-base64
text
Raw certificate base64 encoded (DER format)
++
version
text
x509-fingerprint-md5
x509-fingerprint-md5
pubkey-info-algorithm
text
[Insecure] MD5 hash (128 bits)
+Algorithm of the public key
++
validity-not-before
datetime
Certificate invalid before that date
++
pem
text
Raw certificate in PEM formati (Unix-like newlines)
++
x509-fingerprint-sha1
x509-fingerprint-sha1
[Insecure] Secure Hash Algorithm 1 (160 bits)
@@ -8633,36 +8881,6 @@ x509 is a MISP object available in JSON format at
raw-base64
text
Raw certificate base64 encoded (DER format)
--
x509-fingerprint-sha1
x509-fingerprint-sha1
[Insecure] Secure Hash Algorithm 1 (160 bits)
--
self_signed
boolean
Self-signed certificate
--
is_ca
boolean
pem
text
Raw certificate in PEM formati (Unix-like newlines)
--
subject
text
Subject of the certificate
--
pubkey-info-algorithm
text
Algorithm of the public key
--
pubkey-info-exponent
text
Exponent of the public key
--
validity-not-after
datetime
issuer
text
text
Issuer of the certificate
+Free text description of hte certificate
@@ -8743,10 +8921,20 @@ x509 is a MISP object available in JSON format at
text
issuer
text
Free text description of hte certificate
+Issuer of the certificate
++
pubkey-info-exponent
text
Exponent of the public key
@@ -8791,13 +8979,13 @@ yabin is a MISP object available in JSON format at
version
comment
yara
yara
yabin.py and regex.txt version used for the generation of the yara rules.
+Yara rule generated from -y.
+
yara
-yara
Yara rule generated from -y.
--
whitelist
comment
version
comment
yabin.py and regex.txt version used for the generation of the yara rules.
++
yara-hunt
yara
version
text
yara
yara
Version of the YARA rule depending where the yara rule is known to work as expected. ['3.7.1']
+YARA rule.
@@ -8899,10 +9087,10 @@ yara is a MISP object available in JSON format at
yara
yara
version
text
YARA rule.
+Version of the YARA rule depending where the yara rule is known to work as expected. ['3.7.1']