mirror of
https://github.com/MISP/misp-galaxy.git
synced 2025-09-05 09:32:41 +00:00
jq sort keys
Allows automation to edit the files
This commit is contained in:
parent
4ff2a45cbb
commit
2fbd8ce485
49 changed files with 6527 additions and 6526 deletions
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"description": "Android malware galaxy based on multiple open sources.",
|
||||
"type": "android",
|
||||
"version": 3,
|
||||
"name": "Android",
|
||||
"icon": "android",
|
||||
"name": "Android",
|
||||
"namespace": "misp",
|
||||
"type": "android",
|
||||
"uuid": "84310ba3-fa6a-44aa-b378-b9e3271c58fa",
|
||||
"namespace": "misp"
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"description": "Malware Backdoor galaxy.",
|
||||
"type": "backdoor",
|
||||
"version": 1,
|
||||
"name": "Backdoor",
|
||||
"icon": "door-open",
|
||||
"name": "Backdoor",
|
||||
"namespace": "misp",
|
||||
"type": "backdoor",
|
||||
"uuid": "75436e27-cb57-4f32-bf1d-9636dd78a2bf",
|
||||
"namespace": "misp"
|
||||
"version": 1
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"description": "Banking malware galaxy.",
|
||||
"type": "banker",
|
||||
"version": 3,
|
||||
"name": "Banker",
|
||||
"icon": "usd",
|
||||
"name": "Banker",
|
||||
"namespace": "misp",
|
||||
"type": "banker",
|
||||
"uuid": "59f20cce-5420-4084-afd5-0884c0a83832",
|
||||
"namespace": "misp"
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"description": "Botnet galaxy.",
|
||||
"type": "botnet",
|
||||
"version": 2,
|
||||
"name": "Botnet",
|
||||
"icon": "sitemap",
|
||||
"name": "Botnet",
|
||||
"namespace": "misp",
|
||||
"type": "botnet",
|
||||
"uuid": "90ccdf38-1649-11e8-b8bf-e7326d553087",
|
||||
"namespace": "misp"
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"description": "List of known vulnerabilities and exploits",
|
||||
"type": "branded-vulnerability",
|
||||
"version": 2,
|
||||
"name": "Branded Vulnerability",
|
||||
"icon": "bug",
|
||||
"name": "Branded Vulnerability",
|
||||
"namespace": "misp",
|
||||
"type": "branded-vulnerability",
|
||||
"uuid": "fda8c7c2-f45a-11e7-9713-e75dac0492df",
|
||||
"namespace": "misp"
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"type": "cert-eu-govsector",
|
||||
"name": "Cert EU GovSector",
|
||||
"description": "Cert EU GovSector",
|
||||
"version": 2,
|
||||
"icon": "globe",
|
||||
"name": "Cert EU GovSector",
|
||||
"namespace": "misp",
|
||||
"type": "cert-eu-govsector",
|
||||
"uuid": "68858a48-b898-11e7-91ce-bf424ef9b662",
|
||||
"namespace": "misp"
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"type": "exploit-kit",
|
||||
"name": "Exploit-Kit",
|
||||
"description": "Exploit-Kit is an enumeration of some exploitation kits used by adversaries. The list includes document, browser and router exploit kits.It's not meant to be totally exhaustive but aim at covering the most seen in the past 5 years",
|
||||
"version": 4,
|
||||
"icon": "internet-explorer",
|
||||
"name": "Exploit-Kit",
|
||||
"namespace": "misp",
|
||||
"type": "exploit-kit",
|
||||
"uuid": "6ab240ec-bd79-11e6-a4a6-cec0c932ce01",
|
||||
"namespace": "misp"
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"description": "Malware galaxy based on Malpedia archive.",
|
||||
"type": "malpedia",
|
||||
"version": 1,
|
||||
"name": "Malpedia",
|
||||
"icon": "shield",
|
||||
"name": "Malpedia",
|
||||
"namespace": "misp",
|
||||
"type": "malpedia",
|
||||
"uuid": "1d1c9af9-37fa-4deb-a928-f9b0abc7354a",
|
||||
"namespace": "misp"
|
||||
"version": 1
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Microsoft Activity Group actor",
|
||||
"type": "microsoft-activity-group",
|
||||
"description": "Activity groups as described by Microsoft",
|
||||
"version": 3,
|
||||
"icon": "user-secret",
|
||||
"name": "Microsoft Activity Group actor",
|
||||
"namespace": "misp",
|
||||
"type": "microsoft-activity-group",
|
||||
"uuid": "74c869e8-0b8e-4e5f-96e6-cd992e07a505",
|
||||
"namespace": "misp"
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"description": "ATT&CK Tactic",
|
||||
"uuid": "c4e851fa-775f-11e7-8163-b774922098cd",
|
||||
"version": 5,
|
||||
"type": "mitre-attack-pattern",
|
||||
"name": "Attack Pattern",
|
||||
"icon": "map",
|
||||
"namespace": "deprecated"
|
||||
"name": "Attack Pattern",
|
||||
"namespace": "deprecated",
|
||||
"type": "mitre-attack-pattern",
|
||||
"uuid": "c4e851fa-775f-11e7-8163-b774922098cd",
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"version": 6,
|
||||
"description": "ATT&CK Mitigation",
|
||||
"icon": "chain",
|
||||
"name": "Course of Action",
|
||||
"description": "ATT&CK Mitigation",
|
||||
"namespace": "deprecated",
|
||||
"type": "mitre-course-of-action",
|
||||
"uuid": "6fcb4472-6de4-11e7-b5f7-37771619e14e",
|
||||
"namespace": "deprecated"
|
||||
"version": 6
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Enterprise Attack - Attack Pattern",
|
||||
"type": "mitre-enterprise-attack-attack-pattern",
|
||||
"description": "ATT&CK Tactic",
|
||||
"uuid": "fa7016a8-1707-11e8-82d0-1b73d76eb204",
|
||||
"version": 4,
|
||||
"icon": "map",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Enterprise Attack - Attack Pattern",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-enterprise-attack-attack-pattern",
|
||||
"uuid": "fa7016a8-1707-11e8-82d0-1b73d76eb204",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Enterprise Attack - Course of Action",
|
||||
"type": "mitre-enterprise-attack-course-of-action",
|
||||
"description": "ATT&CK Mitigation",
|
||||
"uuid": "fb5a36c0-1707-11e8-81f5-d732b22a4982",
|
||||
"version": 4,
|
||||
"icon": "chain",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Enterprise Attack - Course of Action",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-enterprise-attack-course-of-action",
|
||||
"uuid": "fb5a36c0-1707-11e8-81f5-d732b22a4982",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Enterprise Attack -Intrusion Set",
|
||||
"type": "mitre-enterprise-attack-intrusion-set",
|
||||
"description": "Name of ATT&CK Group",
|
||||
"uuid": "1f3b8c56-1708-11e8-b211-17a60c0f73ee",
|
||||
"version": 4,
|
||||
"icon": "user-secret",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Enterprise Attack -Intrusion Set",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-enterprise-attack-intrusion-set",
|
||||
"uuid": "1f3b8c56-1708-11e8-b211-17a60c0f73ee",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Enterprise Attack - Malware",
|
||||
"type": "mitre-enterprise-attack-malware",
|
||||
"description": "Name of ATT&CK software",
|
||||
"uuid": "fbb19af0-1707-11e8-9fd6-dbd88a04d33a",
|
||||
"version": 4,
|
||||
"icon": "optin-monster",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Enterprise Attack - Malware",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-enterprise-attack-malware",
|
||||
"uuid": "fbb19af0-1707-11e8-9fd6-dbd88a04d33a",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Enterprise Attack - Relationship",
|
||||
"type": "mitre-enterprise-attack-relationship",
|
||||
"description": "Mitre Relationship",
|
||||
"uuid": "fc404638-1707-11e8-a5cf-b78b9b562766",
|
||||
"version": 4,
|
||||
"icon": "link",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Enterprise Attack - Relationship",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-enterprise-attack-relationship",
|
||||
"uuid": "fc404638-1707-11e8-a5cf-b78b9b562766",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Enterprise Attack - Tool",
|
||||
"type": "mitre-enterprise-attack-tool",
|
||||
"description": "Name of ATT&CK software",
|
||||
"uuid": "fbfa0470-1707-11e8-be22-eb46b373fdd3",
|
||||
"version": 4,
|
||||
"icon": "gavel",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Enterprise Attack - Tool",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-enterprise-attack-tool",
|
||||
"uuid": "fbfa0470-1707-11e8-be22-eb46b373fdd3",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"uuid": "1023f364-7831-11e7-8318-43b5531983ab",
|
||||
"description": "Name of ATT&CK Group",
|
||||
"version": 7,
|
||||
"icon": "user-secret",
|
||||
"type": "mitre-intrusion-set",
|
||||
"name": "Intrusion Set",
|
||||
"namespace": "deprecated"
|
||||
"namespace": "deprecated",
|
||||
"type": "mitre-intrusion-set",
|
||||
"uuid": "1023f364-7831-11e7-8318-43b5531983ab",
|
||||
"version": 7
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"type": "mitre-malware",
|
||||
"version": 5,
|
||||
"name": "Malware",
|
||||
"uuid": "d752161c-78f6-11e7-a0ea-bfa79b407ce4",
|
||||
"icon": "optin-monster",
|
||||
"description": "Name of ATT&CK software",
|
||||
"namespace": "deprecated"
|
||||
"icon": "optin-monster",
|
||||
"name": "Malware",
|
||||
"namespace": "deprecated",
|
||||
"type": "mitre-malware",
|
||||
"uuid": "d752161c-78f6-11e7-a0ea-bfa79b407ce4",
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Mobile Attack - Attack Pattern",
|
||||
"type": "mitre-mobile-attack-attack-pattern",
|
||||
"description": "ATT&CK Tactic",
|
||||
"uuid": "1c6d1332-1708-11e8-847c-e3c5643c41a5",
|
||||
"version": 4,
|
||||
"icon": "map",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Mobile Attack - Attack Pattern",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-mobile-attack-attack-pattern",
|
||||
"uuid": "1c6d1332-1708-11e8-847c-e3c5643c41a5",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Mobile Attack - Course of Action",
|
||||
"type": "mitre-mobile-attack-course-of-action",
|
||||
"description": "ATT&CK Mitigation",
|
||||
"uuid": "0282356a-1708-11e8-8f53-975633d5c03c",
|
||||
"version": 4,
|
||||
"icon": "chain",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Mobile Attack - Course of Action",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-mobile-attack-course-of-action",
|
||||
"uuid": "0282356a-1708-11e8-8f53-975633d5c03c",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Mobile Attack - Intrusion Set",
|
||||
"type": "mitre-mobile-attack-intrusion-set",
|
||||
"description": "Name of ATT&CK Group",
|
||||
"uuid": "0314e554-1708-11e8-b049-8f8a42b5bb62",
|
||||
"version": 4,
|
||||
"icon": "user-secret",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Mobile Attack - Intrusion Set",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-mobile-attack-intrusion-set",
|
||||
"uuid": "0314e554-1708-11e8-b049-8f8a42b5bb62",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Mobile Attack - Malware",
|
||||
"type": "mitre-mobile-attack-malware",
|
||||
"description": "Name of ATT&CK software",
|
||||
"uuid": "03e3853a-1708-11e8-95c1-67cf3f801a18",
|
||||
"version": 4,
|
||||
"icon": "optin-monster",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Mobile Attack - Malware",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-mobile-attack-malware",
|
||||
"uuid": "03e3853a-1708-11e8-95c1-67cf3f801a18",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Mobile Attack - Relationship",
|
||||
"type": "mitre-mobile-attack-relationship",
|
||||
"description": "Mitre Relationship",
|
||||
"uuid": "fc8471aa-1707-11e8-b306-33cbe96a1ede",
|
||||
"version": 4,
|
||||
"icon": "link",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Mobile Attack - Relationship",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-mobile-attack-relationship",
|
||||
"uuid": "fc8471aa-1707-11e8-b306-33cbe96a1ede",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Mobile Attack - Tool",
|
||||
"type": "mitre-mobile-attack-tool",
|
||||
"description": "Name of ATT&CK software",
|
||||
"uuid": "1d0b4bce-1708-11e8-9e6e-1b130c9b0a91",
|
||||
"version": 4,
|
||||
"icon": "gavel",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Mobile Attack - Tool",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-mobile-attack-tool",
|
||||
"uuid": "1d0b4bce-1708-11e8-9e6e-1b130c9b0a91",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Pre Attack - Attack Pattern",
|
||||
"type": "mitre-pre-attack-attack-pattern",
|
||||
"description": "ATT&CK Tactic",
|
||||
"uuid": "1f665850-1708-11e8-9cfe-4792b2a91402",
|
||||
"version": 4,
|
||||
"icon": "map",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Pre Attack - Attack Pattern",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-pre-attack-attack-pattern",
|
||||
"uuid": "1f665850-1708-11e8-9cfe-4792b2a91402",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Pre Attack - Intrusion Set",
|
||||
"type": "mitre-pre-attack-intrusion-set",
|
||||
"description": "Name of ATT&CK Group",
|
||||
"uuid": "1fb6d5b4-1708-11e8-9836-8bbc8ce6866e",
|
||||
"version": 4,
|
||||
"icon": "user-secret",
|
||||
"namespace": "mitre-attack"
|
||||
"name": "Pre Attack - Intrusion Set",
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-pre-attack-intrusion-set",
|
||||
"uuid": "1fb6d5b4-1708-11e8-9836-8bbc8ce6866e",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"uuid": "1f8e3bae-1708-11e8-8e97-4bd2150e5aae",
|
||||
"description": "Mitre Relationship",
|
||||
"version": 5,
|
||||
"icon": "link",
|
||||
"type": "mitre-pre-attack-relationship",
|
||||
"name": "Pre Attack - Relationship",
|
||||
"namespace": "mitre-attack"
|
||||
"namespace": "mitre-attack",
|
||||
"type": "mitre-pre-attack-relationship",
|
||||
"uuid": "1f8e3bae-1708-11e8-8e97-4bd2150e5aae",
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Tool",
|
||||
"type": "mitre-tool",
|
||||
"description": "Name of ATT&CK software",
|
||||
"icon": "gavel",
|
||||
"version": 5,
|
||||
"name": "Tool",
|
||||
"namespace": "deprecated",
|
||||
"type": "mitre-tool",
|
||||
"uuid": "d5cbd1a2-78f6-11e7-a833-7b9bccca9649",
|
||||
"namespace": "deprecated"
|
||||
"version": 5
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Preventive Measure",
|
||||
"type": "preventive-measure",
|
||||
"description": "Preventive measures based on the ransomware document overview as published in https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml# . The preventive measures are quite generic and can fit any standard Windows infrastructure and their security measures.",
|
||||
"version": 3,
|
||||
"icon": "shield",
|
||||
"name": "Preventive Measure",
|
||||
"namespace": "misp",
|
||||
"type": "preventive-measure",
|
||||
"uuid": "8168995b-adcd-4684-9e37-206c5771505a",
|
||||
"namespace": "misp"
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"description": "Ransomware galaxy based on https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml",
|
||||
"type": "ransomware",
|
||||
"version": 4,
|
||||
"name": "Ransomware",
|
||||
"icon": "btc",
|
||||
"name": "Ransomware",
|
||||
"namespace": "misp",
|
||||
"type": "ransomware",
|
||||
"uuid": "3f44af2e-1480-4b6b-9aa8-f9bb21341078",
|
||||
"namespace": "misp"
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"type": "rat",
|
||||
"name": "RAT",
|
||||
"description": "remote administration tool or remote access tool (RAT), also called sometimes remote access trojan, is a piece of software or programming that allows a remote \"operator\" to control a system as if they have physical access to that system.",
|
||||
"version": 3,
|
||||
"icon": "eye",
|
||||
"name": "RAT",
|
||||
"namespace": "misp",
|
||||
"type": "rat",
|
||||
"uuid": "06825db6-4797-11e7-ac4d-af25fdcdd299",
|
||||
"namespace": "misp"
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"type": "sector",
|
||||
"name": "Sector",
|
||||
"description": "Activity sectors",
|
||||
"version": 2,
|
||||
"icon": "industry",
|
||||
"name": "Sector",
|
||||
"namespace": "misp",
|
||||
"type": "sector",
|
||||
"uuid": "e1bb134c-ae4d-11e7-8aa9-f78a37325439",
|
||||
"namespace": "misp"
|
||||
"version": 2
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"description": "Malware stealer galaxy.",
|
||||
"type": "stealer",
|
||||
"version": 1,
|
||||
"name": "Stealer",
|
||||
"icon": "key",
|
||||
"name": "Stealer",
|
||||
"namespace": "misp",
|
||||
"type": "stealer",
|
||||
"uuid": "f2ef4033-9001-4427-a418-df8c48e6d054",
|
||||
"namespace": "misp"
|
||||
"version": 1
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"type": "tds",
|
||||
"name": "TDS",
|
||||
"description": "TDS is a list of Traffic Direction System used by adversaries",
|
||||
"version": 4,
|
||||
"icon": "cart-arrow-down",
|
||||
"name": "TDS",
|
||||
"namespace": "misp",
|
||||
"type": "tds",
|
||||
"uuid": "1b9a7d8e-bd7a-11e6-a4a6-cec0c932ce01",
|
||||
"namespace": "misp"
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"name": "Threat Actor",
|
||||
"type": "threat-actor",
|
||||
"description": "Threat actors are characteristics of malicious actors (or adversaries) representing a cyber attack threat including presumed intent and historically observed behaviour.",
|
||||
"version": 3,
|
||||
"icon": "user-secret",
|
||||
"name": "Threat Actor",
|
||||
"namespace": "misp",
|
||||
"type": "threat-actor",
|
||||
"uuid": "698774c7-8022-42c4-917f-8d6e4f06ada3",
|
||||
"namespace": "misp"
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -1,9 +1,9 @@
|
|||
{
|
||||
"type": "tool",
|
||||
"name": "Tool",
|
||||
"description": "Threat actors tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.",
|
||||
"version": 3,
|
||||
"icon": "optin-monster",
|
||||
"name": "Tool",
|
||||
"namespace": "misp",
|
||||
"type": "tool",
|
||||
"uuid": "9b8037f7-bc8f-4de1-a797-37266619bc0b",
|
||||
"namespace": "misp"
|
||||
"version": 3
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue