mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
Merge branch 'master' of https://github.com/Delta-Sierra/misp-galaxy into Delta-Sierra-master
This commit is contained in:
commit
52f088efc9
5 changed files with 21 additions and 10 deletions
|
@ -40,17 +40,14 @@ to localized information (which is not shared) or additional information (that c
|
|||
- [clusters/mitre-enterprise-attack-attack-pattern.json](clusters/mitre-enterprise-attack-attack-pattern.json) - Attack Pattern - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Enterprise Attack
|
||||
- [clusters/mitre-enterprise-attack-course-of-action.json](clusters/mitre-enterprise-attack-course-of-action.json) - Course of Action - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Enterprise Attack
|
||||
- [clusters/mitre-enterprise-attack-intrusion-set.json](clusters/mitre-enterprise-attack-intrusion-set.json) - Intrusion Set - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Enterprise Attack - Malware - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Enterprise Attack
|
||||
- [clusters/mitre-enterprise-attack-relationship.json](clusters/mitre-enterprise-attack-relationship.json) - Relationship . MITRE Relationship - V2.0 Enterprise Attack
|
||||
- [clusters/mitre-enterprise-attack-tool.json](clusters/mitre-enterprise-attack-tool.json) - Tool - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Enterprise Attack
|
||||
- [clusters/mitre-mobile-attack-attack-pattern.json](clusters/mitre-mobile-attack-attack-pattern.json) - Attack Pattern - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Mobile Attack
|
||||
- [clusters/mitre-mobile-attack-course-of-action.json](clusters/mitre-mobile-attack-course-of-action.json) - Course of Action - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Mobile Attack
|
||||
- [clusters/mitre-mobile-attack-intrusion-set.json](clusters/mitre-mobile-attack-intrusion-set.json) - Intrusion Set - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Mobile Attack
|
||||
- [clusters/mitre-mobile-attack-malware.json](clusters/mitre-mobile-attack-malware.json) - Malware - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Mobile Attack
|
||||
- [clusters/mitre-mobile-attack-relationship.json](clusters/mitre-mobile-attack-relationship.json) - Relationship . MITRE Relationship - V2.0 Mobile Attack
|
||||
- [clusters/mitre-mobile-attack-tool.json](clusters/mitre-mobile-attack-tool.json) - Tool - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Mobile Attack
|
||||
- [clusters/mitre-pre-attack-attack-pattern.json](clusters/mitre-pre-attack-attack-pattern.json) - Attack Pattern - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Pre Attack
|
||||
- [clusters/mitre-pre-attack-intrusion-set.json](clusters/mitre-pre-attack-intrusion-set.json) - Intrusion Set - MITRE Adversarial Tactics, Techniques & Common Knowledge (ATT&CK) - v2.0 Pre Attack
|
||||
- [clusters/mitre-pre-attack-relationship.json](clusters/mitre-pre-attack-relationship.json) - Relationship . MITRE Relationship - V2.0 Pre Attack
|
||||
|
||||
- [clusters/sectors.json](clusters/sectors.json) - Activity sectors
|
||||
- [clusters/cert-eu-govsector.json](clusters/cert-eu-govsector.json) - Cert EU GovSector
|
||||
|
@ -121,5 +118,3 @@ or
|
|||
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
||||
OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||
~~~~~
|
||||
|
||||
|
||||
|
|
|
@ -697,7 +697,8 @@
|
|||
"refs": [
|
||||
"https://en.wikipedia.org/wiki/Mirai_(malware)",
|
||||
"https://researchcenter.paloaltonetworks.com/2018/09/unit42-multi-exploit-iotlinux-botnets-mirai-gafgyt-target-apache-struts-sonicwall/",
|
||||
"https://www.bleepingcomputer.com/news/security/mirai-iot-malware-uses-aboriginal-linux-to-target-multiple-platforms/"
|
||||
"https://www.bleepingcomputer.com/news/security/mirai-iot-malware-uses-aboriginal-linux-to-target-multiple-platforms/",
|
||||
"https://www.bleepingcomputer.com/news/security/new-mirai-variant-comes-with-27-exploits-targets-enterprise-devices/"
|
||||
]
|
||||
},
|
||||
"related": [
|
||||
|
@ -1148,5 +1149,5 @@
|
|||
"value": "Chalubo"
|
||||
}
|
||||
],
|
||||
"version": 18
|
||||
"version": 19
|
||||
}
|
||||
|
|
|
@ -158,7 +158,21 @@
|
|||
},
|
||||
"uuid": "3c2325e4-b740-11e8-9504-b32b4d974add",
|
||||
"value": "Blacknurse"
|
||||
},
|
||||
{
|
||||
"description": "SPOILER is a security vulnerability on modern computer central processing units that uses speculative execution to improve the efficiency of Rowhammer and other related memory and cache attacks. According to reports, all modern Intel CPUs are vulnerable to the attack. AMD has stated that its processors are not vulnerable.",
|
||||
"meta": {
|
||||
"refs": [
|
||||
"https://arxiv.org/pdf/1903.00446v1.pdf",
|
||||
"https://appleinsider.com/articles/19/03/05/new-spoiler-vulnerability-in-all-intel-core-processors-exposed-by-researchers",
|
||||
"https://www.overclock3d.net/news/cpu_mainboard/spoiler_alert_-_intel_cpus_impacted_by_new_vulnerability/1",
|
||||
"https://www.1e.com/news-insights/blogs/the-spoiler-vulnerability/",
|
||||
"https://www.bleepingcomputer.com/news/security/amd-believes-spoiler-vulnerability-does-not-impact-its-processors/"
|
||||
]
|
||||
},
|
||||
"uuid": "3434339f-ea87-472e-a330-62d2b5cf2c26",
|
||||
"value": "SPOILER"
|
||||
}
|
||||
],
|
||||
"version": 2
|
||||
"version": 3
|
||||
}
|
||||
|
|
|
@ -2543,7 +2543,8 @@
|
|||
"refs": [
|
||||
"https://researchcenter.paloaltonetworks.com/2017/04/unit42-cardinal-rat-active-two-years/",
|
||||
"https://www.scmagazine.com/cardinal-rats-unique-downloader-allowed-it-to-avoid-detection-for-years/article/651927/",
|
||||
"https://www.cyber.nj.gov/threat-profiles/trojan-variants/cardinal"
|
||||
"https://www.cyber.nj.gov/threat-profiles/trojan-variants/cardinal",
|
||||
"https://unit42.paloaltonetworks.com/cardinal-rat-sins-again-targets-israeli-fin-tech-firms/"
|
||||
]
|
||||
},
|
||||
"uuid": "cb23f563-a8b9-4427-9884-594e8d3cc836",
|
||||
|
|
|
@ -6643,7 +6643,7 @@
|
|||
"GoldMouse"
|
||||
]
|
||||
},
|
||||
"uuid": "5b776efb-c334-4cd2-92c7-7123f06726ae",
|
||||
"uuid": "ee7f535d-cc3e-40f3-99f3-c97963cfa250",
|
||||
"value": "APT-C-27"
|
||||
}
|
||||
],
|
||||
|
|
Loading…
Reference in a new issue