mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
icons for the grand Master who is redesigning the overall graphical view
This commit is contained in:
parent
ecf91a5daa
commit
446bda1b09
13 changed files with 26 additions and 13 deletions
|
@ -2,6 +2,7 @@
|
|||
"type": "exploit-kit",
|
||||
"name": "Exploit-Kit",
|
||||
"description": "Exploit-Kit is an enumeration of some exploitation kits used by adversaries. The list includes document, browser and router exploit kits.It's not meant to be totally exhaustive but aim at covering the most seen in the past 5 years",
|
||||
"version": 2,
|
||||
"version": 3,
|
||||
"icon": "internet-explorer",
|
||||
"uuid": "6ab240ec-bd79-11e6-a4a6-cec0c932ce01"
|
||||
}
|
||||
|
|
|
@ -2,6 +2,7 @@
|
|||
"name": "Microsoft Activity Group actor",
|
||||
"type": "microsoft-activity-group",
|
||||
"description": "Activity groups as described by Microsoft",
|
||||
"version": 1,
|
||||
"version": 2,
|
||||
"icon": "user-secret",
|
||||
"uuid": "74c869e8-0b8e-4e5f-96e6-cd992e07a505"
|
||||
}
|
||||
|
|
|
@ -1,7 +1,8 @@
|
|||
{
|
||||
"version": 2,
|
||||
"version": 3,
|
||||
"uuid": "c4e851fa-775f-11e7-8163-b774922098cd",
|
||||
"type": "mitre-attack-pattern",
|
||||
"name": "Attack Pattern",
|
||||
"icon": "map",
|
||||
"description": "ATT&CK Tactic"
|
||||
}
|
||||
|
|
|
@ -3,5 +3,6 @@
|
|||
"name": "Course of Action",
|
||||
"description": "ATT&CK Mitigation",
|
||||
"type": "mitre-course-of-action",
|
||||
"version": 3
|
||||
"icon": "chain",
|
||||
"version": 4
|
||||
}
|
||||
|
|
|
@ -2,6 +2,7 @@
|
|||
"type": "mitre-intrusion-set",
|
||||
"uuid": "1023f364-7831-11e7-8318-43b5531983ab",
|
||||
"description": "Name of ATT&CK Group",
|
||||
"version": 3,
|
||||
"version": 5,
|
||||
"icon": "user-secret",
|
||||
"name": "Intrusion Set"
|
||||
}
|
||||
|
|
|
@ -1,7 +1,8 @@
|
|||
{
|
||||
"version": 2,
|
||||
"version": 3,
|
||||
"uuid": "d752161c-78f6-11e7-a0ea-bfa79b407ce4",
|
||||
"description": "Name of ATT&CK software",
|
||||
"name": "Malware",
|
||||
"icon": "optin-monster",
|
||||
"type": "mitre-malware"
|
||||
}
|
||||
|
|
|
@ -3,5 +3,6 @@
|
|||
"type": "mitre-tool",
|
||||
"description": "Name of ATT&CK software",
|
||||
"uuid": "d5cbd1a2-78f6-11e7-a833-7b9bccca9649",
|
||||
"version": 2
|
||||
"icon": "gavel",
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -2,6 +2,7 @@
|
|||
"name": "Preventive Measure",
|
||||
"type": "preventive-measure",
|
||||
"description": "Preventive measures based on the ransomware document overview as published in https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml# . The preventive measures are quite generic and can fit any standard Windows infrastructure and their security measures.",
|
||||
"version": 1,
|
||||
"version": 2,
|
||||
"icon": "shield",
|
||||
"uuid": "8168995b-adcd-4684-9e37-206c5771505a"
|
||||
}
|
||||
|
|
|
@ -1,7 +1,8 @@
|
|||
{
|
||||
"description": "Ransomware galaxy based on https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml",
|
||||
"type": "ransomware",
|
||||
"version": 1,
|
||||
"version": 2,
|
||||
"name": "Ransomware",
|
||||
"icon": "usd",
|
||||
"uuid": "3f44af2e-1480-4b6b-9aa8-f9bb21341078"
|
||||
}
|
||||
|
|
|
@ -2,6 +2,7 @@
|
|||
"type": "rat",
|
||||
"name": "RAT",
|
||||
"description": "remote administration tool or remote access tool (RAT), also called sometimes remote access trojan, is a piece of software or programming that allows a remote \"operator\" to control a system as if they have physical access to that system.",
|
||||
"version": 1,
|
||||
"version": 2,
|
||||
"icon": "eye",
|
||||
"uuid": "06825db6-4797-11e7-ac4d-af25fdcdd299"
|
||||
}
|
||||
|
|
|
@ -2,6 +2,7 @@
|
|||
"type": "tds",
|
||||
"name": "TDS",
|
||||
"description": "TDS is a list of Traffic Direction System used by adversaries",
|
||||
"version": 2,
|
||||
"version": 3,
|
||||
"icon": "cart-arrow-down",
|
||||
"uuid": "1b9a7d8e-bd7a-11e6-a4a6-cec0c932ce01"
|
||||
}
|
||||
|
|
|
@ -2,6 +2,7 @@
|
|||
"name": "Threat Actor",
|
||||
"type": "threat-actor",
|
||||
"description": "Threat actors are characteristics of malicious actors (or adversaries) representing a cyber attack threat including presumed intent and historically observed behaviour.",
|
||||
"version": 1,
|
||||
"version": 2,
|
||||
"icon": "user-secret",
|
||||
"uuid": "698774c7-8022-42c4-917f-8d6e4f06ada3"
|
||||
}
|
||||
|
|
|
@ -2,6 +2,7 @@
|
|||
"type": "tool",
|
||||
"name": "Tool",
|
||||
"description": "Threat actors tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.",
|
||||
"version": 1,
|
||||
"version": 2,
|
||||
"icon": "optin-monster",
|
||||
"uuid": "9b8037f7-bc8f-4de1-a797-37266619bc0b"
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue