Provides a mapping of the ADS to the relevant entry in the Att&CK if 'categorization is not sufficient'.
+From c67efa972c596c975c061a3c9a17ea18d6a4a480 Mon Sep 17 00:00:00 2001
From: Alexandre Dulaunoy
Date: Wed, 13 Nov 2024 10:49:49 +0100
Subject: [PATCH] chg: [objects] updated
---
static/objects.html | 1448 +-
static/objects.pdf | 230253 +++++++++++++++++++++++------------------
2 files changed, 129943 insertions(+), 101758 deletions(-)
diff --git a/static/objects.html b/static/objects.html
index 6cec632..5f89349 100755
--- a/static/objects.html
+++ b/static/objects.html
@@ -463,6 +463,7 @@ body.book #toc,body.book #preamble,body.book h1.sect0,body.book .sect1>h2{page-b
categorization_others
text
Provides a mapping of the ADS to the relevant entry in the Att&CK if 'categorization is not sufficient'.
++
+
date
datetime
Attacker Infrastructure.
++ + | ++attacker-infra is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP. + | +
Object attribute | +MISP attribute type | +Description | +Disable correlation | +Multiple | +
---|---|---|---|---|
architecture |
+text |
+
+ The CPU architecture of the beacon. Either x86 or x64 + |
+
+ + |
+
+ + |
+
asn |
+AS |
+
+ ASN where the IP resides + |
+
+ + |
+
+ + |
+
beacon_host |
+text |
+
+ C2 of the beacon IP/hostname. (often matches the host that was scanned) + |
+
+ + |
+
+ + |
+
beacon_http_get |
+text |
+
+ Path that the beacon uses for the GET method + |
+
+ + |
+
+ + |
+
beacon_http_post |
+text |
+
+ Path that the beacon uses for the POST method + |
+
+ + |
+
+ + |
+
beacon_type |
+text |
+
+ Protocol that the beacon speaks. Usually HTTP + |
+
+ + |
+
+ + |
+
binary_md5 |
+md5 |
+
+ MD5 of the PE binary + |
+
+ + |
+
+ + |
+
binary_sha1 |
+sha1 |
+
+ SHA1 of the PE binary + |
+
+ + |
+
+ + |
+
binary_sha256 |
+sha256 |
+
+ SHA256 of the PE binary + |
+
+ + |
+
+ + |
+
city |
+text |
+
+ City location of the IP in question + |
+
+ + |
+
+ + |
+
config_md5 |
+md5 |
+
+ MD5 of the config file + |
+
+ + |
+
+ + |
+
config_sha1 |
+sha1 |
+
+ SHA1 of the config file + |
+
+ + |
+
+ + |
+
config_sha256 |
+sha256 |
+
+ SHA256 of the config file + |
+
+ + |
+
+ + |
+
content_length |
+text |
+
+ The length of the response body in octets + |
+
+ + |
+
+ + |
+
content_type |
+text |
+
+ The MIME type of the body of the request + |
+
+ + |
+
+ + |
+
encoded_data |
+text |
+
+ Base64 encoded config file + |
+
+ + |
+
+ + |
+
encoded_length |
+text |
+
+ Length of the base64 decoded raw config + |
+
+ + |
+
+ + |
+
geo |
+text |
+
+ Country location of the IP + |
+
+ + |
+
+ + |
+
hostname |
+text |
+
+ Reverse DNS name of the device in question + |
+
+ + |
+
+ + |
+
hostname_source |
+text |
+
+ Source of the hostname field contents + |
+
+ + |
+
+ + |
+
http |
+text |
+
+ HTTP version in used in response, e.g HTTP/1.1 + |
+
+ + |
+
+ + |
+
http_code |
+text |
+
+ HTTP Response code: e.g., 200, 401, 404 + |
+
+ + |
+
+ + |
+
http_url |
+text |
+
+ URL used to illicit the server response + |
+
+ + |
+
+ + |
+
ip |
+ip-src |
+
+ IP of the of the URL + |
+
+ + |
+
+ + |
+
license_id |
+text |
+
+ The license number + |
+
+ + |
+
+ + |
+
naics |
+text |
+
+ North American Industry Classification System Code + |
+
+ + |
+
+ + |
+
port |
+text |
+
+ Port that the response came from + |
+
+ + |
+
+ + |
+
protocol |
+text |
+
+ Protocol the response came in on + |
+
+ + |
+
+ + |
+
region |
+text |
+
+ State / Province / Administrative region where the device in question resides + |
+
+ + |
+
+ + |
+
sector |
+text |
+
+ Sector of the device in question + |
+
+ + |
+
+ + |
+
severity |
+text |
+
+ Severity of the event + |
+
+ + |
+
+ + |
+
tag |
+text |
+
+ Attribute tags + |
+
+ + |
+
+ + |
+
timestamp |
+datetime |
+
+ Time that the IP was probed in UTC+0 + |
+
+ + |
+
+ + |
+
background-noise
float
Background noise
+High background noise scores highlight untargeted, mild threat mass-attacks
@@ -8610,6 +9098,19 @@ crowdsec-ip-context is a MISP object available in JSON format at
cves
text
CVEs exploited by the observed IP
++
+
dst-port
port
mitre-techniques
text
MITRE ATT&CK techniques used by the observed IP
++
+
reputation
text
Real-time, actionable IP reputation score derived from trusted reports and consensus-validated data in CrowdSec CTI
++
+
reverse-dns
hostname
Capture-the-flag challenge object as defined by Rectifyq.
++ + | ++ctf-challenge is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP. + | +
Object attribute | +MISP attribute type | +Description | +Disable correlation | +Multiple | +
---|---|---|---|---|
attachment |
+attachment |
+
+ Any relevant supporting files or resources that are attached to the challenge + |
+
+ + |
+
+ + |
+
category |
+text |
+
+ The type of challenge (e.g., web, binary, forensics) ['Web', 'Reverse Engineering', 'Binary Exploitation', 'Forensics', 'Networking', 'Cryptography', 'OSINT', 'Misc'] + |
+
+ + |
+
+ + |
+
description |
+text |
+
+ A brief explanation of the challenge + |
+
+ + |
+
+ + |
+
flag |
+text |
+
+ Submitted and accepted CTF Challenge’s flag + |
+
+ + |
+
+ + |
+
hints |
+text |
+
+ Clues to help solve the challenge + |
+
+ + |
+
+ + |
+
max_attempts |
+counter |
+
+ Maximum tries allowed + |
+
+ + |
+
+ + |
+
points |
+float |
+
+ The rewarded points for completing the challenge + |
+
+ + |
+
+ + |
+
solves |
+counter |
+
+ Number of people who solved the challenge + |
+
+ + |
+
+ + |
+
title |
+text |
+
+ The name of the challenge + |
+
+ + |
+
+ + |
+
Origin-Host-CountryISO2
text
Origin-Host Country ISO2
++
+
Origin-Host-OperatorName
text
Origin-Host Operator Name
++
+
Origin-Host-TADIG
text
Origin-Host Operator TADIG
++
+
Origin-Realm
text
Origin-Realm-CountryISO2
text
Origin-Realm Country ISO2
++
+
Origin-Realm-OperatorName
text
Origin-Realm Operator Name
++
+
Origin-Realm-TADIG
text
Origin-Realm Operator TADIG
++
+
SessionId
text
dom-hash object to describe similar structure of HTML pages.
++ + | ++url is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP. + | +
Object attribute | +MISP attribute type | +Description | +Disable correlation | +Multiple | +
---|---|---|---|---|
dom-hash |
+dom-hash |
+
+ dom-hash value of the url(s) + |
+
+ + |
+
+ + |
+
ref |
+link |
+
+ Reference link for the complete analysis of this dom-hash + |
+
+ + |
+
+ + |
+
url |
+url |
+
+ Full URL of the dom-hashed HTML structure + |
+
+ + |
+
+ + |
+
dom-hash
dom-hash
Dom-hash of the file
++
+
entropy
float
Object that is a container for threat or detection data, in accordance with the OpenTIDE Framework (https://code.europa.eu/ec-digit-s2/opentide).
++ + | ++opentide is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP. + | +
Object attribute | +MISP attribute type | +Description | +Disable correlation | +Multiple | +
---|---|---|---|---|
name |
+text |
+
+ Name of the OpenTIDE Object + |
+
+ + |
+
+ + |
+
opentide-object |
+text |
+
+ YAML Content of the Opentide Object + |
+
+ + |
+
+ + |
+
opentide-type |
+text |
+
+ Type of the OpenTIDE Object ['tvm', 'cdm', 'mdr'] + |
+
+ + |
+
+ + |
+
uuid |
+text |
+
+ UUID of the OpenTIDE Object + |
+
+ + |
+
+ + |
+
ip-src
ip-src
Source IP address used by this person.
++
+
last-name
last-name
This report identifies open HTTP proxy servers on multiple ports. While HTTP proxies have legitimate uses, they are also used for attacks or other forms of abuse. https://www.shadowserver.org/what-we-do/network-reporting/open-http-proxy-report/.
++ + | ++shadowserver-scan-http-proxy is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP. + | +
Object attribute | +MISP attribute type | +Description | +Disable correlation | +Multiple | +
---|---|---|---|---|
asn |
+AS |
+
+ ASN where the IP resides + |
+
+ + |
+
+ + |
+
city |
+text |
+
+ City location of the IP in question + |
+
+ + |
+
+ + |
+
connection |
+text |
+
+ Control options for the current connection and list of hop-by-hop request fields + |
+
+ + |
+
+ + |
+
content_length |
+text |
+
+ The length of the response body in octets + |
+
+ + |
+
+ + |
+
content_type |
+text |
+
+ The MIME type of the body of the request + |
+
+ + |
+
+ + |
+
geo |
+text |
+
+ Country location of the IP + |
+
+ + |
+
+ + |
+
hostname |
+hostname |
+
+ Any of the capabilities identified for the malware instance or family. + |
+
+ + |
+
+ + |
+
hostname_source |
+text |
+
+ Hostname source + |
+
+ + |
+
+ + |
+
http |
+text |
+
+ Hypertext Transfer Protocol Version + |
+
+ + |
+
+ + |
+
http_code |
+text |
+
+ HTTP Response code: e.g., 200, 401, 404 + |
+
+ + |
+
+ + |
+
http_date |
+text |
+
+ The date and time that the message was sent + |
+
+ + |
+
+ + |
+
http_reason |
+text |
+
+ The text reason to go with the HTTP Code + |
+
+ + |
+
+ + |
+
ip |
+ip-src |
+
+ The IP address of the device in question + |
+
+ + |
+
+ + |
+
naics |
+text |
+
+ North American Industry Classification System Code + |
+
+ + |
+
+ + |
+
port |
+port |
+
+ Port the response came from + |
+
+ + |
+
+ + |
+
protocol |
+text |
+
+ Protocol observed in the network traffic + |
+
+ + |
+
+ + |
+
proxy_authenticate |
+text |
+
+ The authentication method that should be used to gain access to a resource behind a proxy server + |
+
+ + |
+
+ + |
+
region |
+text |
+
+ Regional location of the IP in question + |
+
+ + |
+
+ + |
+
sector |
+text |
+
+ Sector of the IP in question + |
+
+ + |
+
+ + |
+
server |
+text |
+
+ HTTP Server type + |
+
+ + |
+
+ + |
+
severity |
+text |
+
+ Severity leve ['critical', 'high', 'medium', 'low', 'info'] + |
+
+ + |
+
+ + |
+
tag |
+text |
+
+ Array of tags associated with the URL if any. In this report typically it will be a CVE entry, for example CVE-2021-44228. This allows for better understanding of the URL context observed (ie. usage associated with a particular CVE). + |
+
+ + |
+
+ + |
+
timestamp |
+datetime |
+
+ Time that the IP was probed in UTC+0 + |
+
+ + |
+
+ + |
+
transfer_encoding |
+text |
+
+ The form of encoding used to safely transfer the entity to the user + |
+
+ + |
+
+ + |
+
via |
+text |
+
+ General header added by proxies + |
+
+ + |
+
+ + |
+
address
text
onion-address
onion address of the Tor node seen.
+Onion address of the Tor node seen.
@@ -73500,6 +74824,19 @@ tor-hiddenservice is a MISP object available in JSON format at
language
text
Language(s) detected on the onion address.
++
+
last-seen
datetime
title
text
Known title(s) of the Tor onion address.
++
+
url object describes an url along with its normalized field (like extracted using faup parsing library) and its metadata.
@@ -76899,6 +78249,19 @@ url is a MISP object available in JSON format atdom-hash
+dom-hash
Dom-hash of the URL
++
+
domain
domain
Represent an user action.
++ + | ++user-action is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP. + | +
Object attribute | +MISP attribute type | +Description | +Disable correlation | +Multiple | +
---|---|---|---|---|
action |
+text |
+
+ Action performed by the user ['Click', 'Install', 'Execute', 'Plug', 'Scan', 'Unknown'] + |
+
+ + |
+
+ + |
+
description |
+text |
+
+ Description of the action performed by the user + |
+
+ + |
+
+ + |
+
text
The list of sectors that the victim belong to ['academia - university', 'aerospace', 'agriculture', 'automotive', 'communications', 'construction', 'defence', 'dissident', 'education', 'energy', 'engineering', 'entertainment', 'financial services', 'government local', 'government national', 'government public services', 'government regional', 'healthcare', 'hospitality leisure', 'information and cultural industries', 'infrastructure', 'insurance', 'international organization', 'legal', 'manufacturing', 'mining', 'non profit', 'pharmaceuticals', 'political party', 'retail', 'technology', 'telecommunications', 'think tank', 'transportation', 'utilities']
+The list of sectors that the victim belong to ['academia - university', 'aerospace', 'agriculture', 'automotive', 'communications', 'construction', 'defence', 'dissident', 'education', 'energy', 'engineering', 'entertainment', 'faith-based organization', 'financial services', 'government local', 'government national', 'government public services', 'government regional', 'healthcare', 'hospitality leisure', 'information and cultural industries', 'infrastructure', 'insurance', 'international organization', 'justice', 'law enforcement', 'legal', 'manufacturing', 'mining', 'non profit', 'pharmaceuticals', 'political party', 'retail', 'technology', 'telecommunications', 'telecommunications - internet service provider', 'telecommunications - managed service provider', 'telecommunications - hosting provider', 'think tank', 'transportation', 'utilities']
@@ -81515,6 +82944,11 @@ youtube-video is a MISP object available in JSON format at
The source object is summarized by the target object.
['misp']
releasable-to
The source object is releasable to the target object.
['misp']