mirror of
https://github.com/MISP/misp-galaxy.git
synced 2025-01-18 18:46:17 +00:00
Example of galaxy including a cluster which is
default type where you can add as much element as you want. The elements are the default values known by MISP but a local instance can add more or overwrite some elements.
This commit is contained in:
commit
6e62b0ab46
3 changed files with 116 additions and 0 deletions
5
cluster/threat-actor.json
Normal file
5
cluster/threat-actor.json
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
{
|
||||||
|
"name" : "threat actor",
|
||||||
|
"description": "threat actor cluster",
|
||||||
|
"elementOneOf": ["apt-groups", "threat-actor-intended-effect-vocabulary"]
|
||||||
|
}
|
25
elements/apt-groups.json
Normal file
25
elements/apt-groups.json
Normal file
|
@ -0,0 +1,25 @@
|
||||||
|
{
|
||||||
|
"version" : 1,
|
||||||
|
"description": "Known or estimated adversary groups targeting organizations and employees",
|
||||||
|
"author": "Various",
|
||||||
|
"type": "APT Groups",
|
||||||
|
"groups" : ["Comment Crew","Sofacy"],
|
||||||
|
"details" : [
|
||||||
|
{
|
||||||
|
"group": "Comment Crew",
|
||||||
|
"description": "PLA Unit 61398 (Chinese: 61398部队, Pinyin: 61398 bùduì) is the Military Unit Cover Designator (MUCD)[1] of a People's Liberation Army advanced persistent threat unit that has been alleged to be a source of Chinese computer hacking attacks",
|
||||||
|
"refs": ["https://en.wikipedia.org/wiki/PLA_Unit_61398", "http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf"],
|
||||||
|
"country": "CN",
|
||||||
|
"synonyms": ["Comment Panda", "PLA Unit 61398", "APT 1", "Advanced Persistent Threat 1", "Byzantine Candor"]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"group": "Sofacy",
|
||||||
|
"description": "The Sofacy Group (also known as APT28, Pawn Storm, Fancy Bear and Sednit) is a cyber espionage group believed to have ties to the Russian government. Likely operating since 2007, the group is known to target government, military, and security organizations. It has been characterized as an advanced persistent threat.",
|
||||||
|
"refs": ["https://en.wikipedia.org/wiki/Sofacy_Group"],
|
||||||
|
"country": "RU",
|
||||||
|
"synonyms": ["APT 28", "APT28", "Pawn Storm", "Fancy Bear", "Sednit"]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
|
||||||
|
|
86
elements/threat-actor-intended-effect-vocabulary.json
Normal file
86
elements/threat-actor-intended-effect-vocabulary.json
Normal file
|
@ -0,0 +1,86 @@
|
||||||
|
{
|
||||||
|
"values": [
|
||||||
|
{
|
||||||
|
"value": "Advantage",
|
||||||
|
"description": "The intended effect of the incident was for the attacker to obtain some advantage over the target"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Advantage - Economic",
|
||||||
|
"description": "The intended effect of the incident was for the attacker to obtain some economic advantage over the target"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Advantage - Military",
|
||||||
|
"description": "The intended effect of the incident was for the attacker to obtain some military advantage over the target"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Advantage - Political",
|
||||||
|
"description": "The intended effect of the incident was for the attacker to obtain some political advantage over the target"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Theft",
|
||||||
|
"description": "The intended effect of the incident was to perpetrate a non-specific theft"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Theft - Intellectual Property",
|
||||||
|
"description": "The intended effect of the incident was to perpetrate a theft of intellectual property"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Theft - Credential Theft"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Theft - Identity Theft"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Theft - Theft of Proprietary Information"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Account Takeover"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Brand Damage"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Competitive Advantage"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Degradation of Service"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Denial and Deception"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Destruction"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Disruption"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Embarrassment"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Exposure"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Extortion"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Fraud"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Harassment"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "ICS Control"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Traffic Diversion"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"value": "Unauthorized Access"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"version" : 1,
|
||||||
|
"description": "The IntendedEffectVocab is the default STIX vocabulary for expressing the intended effect of a threat actor",
|
||||||
|
"author": "STIX",
|
||||||
|
"type": "threat-actor-intended-effect-vocabulary"
|
||||||
|
}
|
Loading…
Add table
Reference in a new issue