.. |
android.json
|
fix: UUID issues
|
2019-05-07 12:09:39 +02:00 |
attck4fraud.json
|
chg: [attck4fraud] jq all the things
|
2019-10-20 20:07:29 +02:00 |
backdoor.json
|
add tools used by TA505 + others
|
2020-02-12 15:39:16 +01:00 |
banker.json
|
add reference for Emotet/Geodo
|
2018-11-22 09:00:43 +01:00 |
botnet.json
|
add AESDDoS Botnet
|
2019-05-02 10:15:26 +02:00 |
branded_vulnerability.json
|
chg: [branded_vulnerability] version updated
|
2019-05-25 08:41:33 +02:00 |
cert-eu-govsector.json
|
chg: [cert-eu-govsector] version fixed
|
2019-02-21 07:19:04 +01:00 |
election-guidelines.json
|
fix: Wrong (duplicate) value.
|
2019-03-09 06:29:26 +01:00 |
exploit-kit.json
|
remove empty strings
|
2019-08-19 17:04:07 +02:00 |
malpedia.json
|
chg: [malpedia] fixes
|
2020-03-05 10:48:28 +01:00 |
microsoft-activity-group.json
|
add GALLIUM as microsoft activities group and similar to Operation Soft Cell
|
2019-12-13 11:47:31 +01:00 |
misinfosec-amitt-misinformation-pattern.json
|
fix: [misinfosec] fixes inconsistent filename
|
2019-10-20 18:53:02 +02:00 |
mitre-attack-pattern.json
|
fix: [attack] fixes old MITRE relationships not being removed
|
2019-10-27 21:06:26 +01:00 |
mitre-course-of-action.json
|
fix: [attack] fixes old MITRE relationships not being removed
|
2019-10-27 21:06:26 +01:00 |
mitre-enterprise-attack-attack-pattern.json
|
chg: further categorization of galaxies
|
2018-10-19 14:15:20 +02:00 |
mitre-enterprise-attack-course-of-action.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-enterprise-attack-intrusion-set.json
|
fix: Duplicate values, typos.
|
2019-05-06 17:17:16 +02:00 |
mitre-enterprise-attack-malware.json
|
jq
|
2018-10-19 10:23:09 +02:00 |
mitre-enterprise-attack-tool.json
|
jq
|
2018-10-19 10:23:09 +02:00 |
mitre-intrusion-set.json
|
fix: [attack] fixes old MITRE relationships not being removed
|
2019-10-27 21:06:26 +01:00 |
mitre-malware.json
|
fix: [attack] fixes old MITRE relationships not being removed
|
2019-10-27 21:06:26 +01:00 |
mitre-mobile-attack-attack-pattern.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-mobile-attack-course-of-action.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-mobile-attack-intrusion-set.json
|
fix: Duplicate values, typos.
|
2019-05-06 17:17:16 +02:00 |
mitre-mobile-attack-malware.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-mobile-attack-tool.json
|
jq
|
2018-10-19 10:23:09 +02:00 |
mitre-pre-attack-attack-pattern.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-pre-attack-intrusion-set.json
|
chg: [att&ck] July ATT&CK release included in MISP galaxy
|
2019-08-01 15:51:03 +02:00 |
mitre-tool.json
|
fix: [attack] fixes old MITRE relationships not being removed
|
2019-10-27 21:06:26 +01:00 |
o365-exchange-techniques.json
|
fix: o365-exchange-techniques (duplicate values, duplicate UUIDs)
|
2019-05-13 11:15:38 +02:00 |
preventive-measure.json
|
Update preventive-measure.json
|
2019-03-17 21:47:54 +00:00 |
ransomware.json
|
add clop ransomware extension
|
2020-03-02 13:33:38 +01:00 |
rat.json
|
add SdBbot
|
2020-03-06 14:33:19 +01:00 |
region.json
|
new galaxy - Region based on UN M49
|
2019-09-26 13:01:41 +02:00 |
sector.json
|
fix: UUID issues
|
2019-05-07 12:09:39 +02:00 |
social-dark-patterns.json
|
add: [dark-pattern] add a source
|
2019-12-03 17:09:57 +01:00 |
stealer.json
|
Add Ave Maria Stealer
|
2019-04-13 17:01:31 +02:00 |
surveillance-vendor.json
|
add clusters to surveillance-vendor galaxy
|
2019-12-05 12:06:10 +01:00 |
target-information.json
|
complete Zimbabwe cluster
|
2020-01-21 10:51:07 +01:00 |
tds.json
|
zTDS
|
2018-12-22 11:51:40 +01:00 |
threat-actor.json
|
Merge pull request #519 from danielplohmann/crowdstrike2020report
|
2020-03-05 09:07:16 +01:00 |
tool.json
|
add tools used by TA505 + others
|
2020-02-12 15:39:16 +01:00 |