Skip to content

Commit

Permalink
chg: [manifest] updated
Browse files Browse the repository at this point in the history
  • Loading branch information
adulau committed Mar 5, 2025
1 parent d67e860 commit e94c679
Show file tree
Hide file tree
Showing 2 changed files with 15 additions and 15 deletions.
8 changes: 4 additions & 4 deletions MANIFEST.json
Original file line number Diff line number Diff line change
Expand Up @@ -561,7 +561,7 @@
{
"description": "The taxonomy is meant for large scale cybersecurity incidents, as mentioned in the Commission Recommendation of 13 May 2022, also known as the provisional agreement. It has two core parts: The nature of the incident, i.e. the underlying cause, that triggered the incident, and the impact of the incident, i.e. the impact on services, in which sector(s) of economy and society.",
"name": "nis2",
"version": 3
"version": 5
},
{
"description": "Open Threat Taxonomy v1.1 base on James Tarala of SANS http://www.auditscripts.com/resources/open_threat_taxonomy_v1.1a.pdf, https://files.sans.org/summit/Threat_Hunting_Incident_Response_Summit_2016/PDFs/Using-Open-Tools-to-Convert-Threat-Intelligence-into-Practical-Defenses-James-Tarala-SANS-Institute.pdf, https://www.youtube.com/watch?v=5rdGOOFC_yE, and https://www.rsaconference.com/writable/presentations/file_upload/str-r04_using-an-open-source-threat-model-for-prioritized-defense-final.pdf",
Expand Down Expand Up @@ -649,9 +649,9 @@
"version": 2
},
{
"description": "Runtime or software packer used to combine compressed or encrypted data with the decompression or decryption code. This code can add additional obfuscations mechanisms including polymorphic-packer or other obfuscation techniques. This taxonomy lists all the known or official packer used for legitimate use or for packing malicious binaries.",
"description": "Runtime or software packer used to combine compressed or encrypted data with the decompression or decryption code. This code can add additional obfuscations mechanisms including polymorphic-packer, virtualization or other obfuscation techniques. This taxonomy lists all the known or official packer used for legitimate use or for packing malicious binaries.",
"name": "runtime-packer",
"version": 2
"version": 3
},
{
"description": "Flags describing the sample",
Expand Down Expand Up @@ -785,5 +785,5 @@
}
],
"url": "https://raw.githubusercontent.com/MISP/misp-taxonomies/main/",
"version": "20250205"
"version": "20250305"
}
22 changes: 11 additions & 11 deletions summary.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
# Taxonomies
- Generation date: 2024-12-08
- Generation date: 2025-03-05
- license: CC-0
- description: Manifest file of MISP taxonomies available.

Expand Down Expand Up @@ -308,8 +308,8 @@
- false-positive
- classification
### cryptocurrency-threat
- description: Threats targetting cryptocurrency, based on CipherTrace report.
- version: 1
- description: Threats targeting cryptocurrency, based on CipherTrace report.
- version: 2
- Predicates
- SIM Swapping
- Crypto Dusting
Expand Down Expand Up @@ -671,8 +671,8 @@
- organosulfur-compounds
- phenylpropanoids-and-polyketides
### economical-impact
- description: Economical impact is a taxonomy to describe the financial impact as positive or negative gain to the tagged information (e.g. data exfiltration loss, a positive gain for an adversary).
- version: 4
- description: Economic impact refers to a taxonomy used to describe whether financial effects are positive or negative outcomes related to tagged information. For instance, data exfiltration loss represents a positive outcome for an adversary.
- version: 5
- Predicates
- loss
- gain
Expand Down Expand Up @@ -1294,7 +1294,7 @@
- test
### nis2
- description: The taxonomy is meant for large scale cybersecurity incidents, as mentioned in the Commission Recommendation of 13 May 2022, also known as the provisional agreement. It has two core parts: The nature of the incident, i.e. the underlying cause, that triggered the incident, and the impact of the incident, i.e. the impact on services, in which sector(s) of economy and society.
- version: 3
- version: 5
- Predicates
- impact-sectors-impacted
- impact-subsectors-impacted
Expand Down Expand Up @@ -1434,8 +1434,8 @@
- 6 - Chaser
- 7 - Accountant
### retention
- description: Add a retenion time to events to automatically remove the IDS-flag on ip-dst or ip-src attributes. We calculate the time elapsed based on the date of the event. Supported time units are: d(ays), w(eeks), m(onths), y(ears). The numerical_value is just for sorting in the web-interface and is not used for calculations.
- version: 3
- description: Add a retention time to events to automatically remove the IDS-flag on ip-dst or ip-src attributes. We calculate the time elapsed based on the date of the event. Supported time units are: d(ays), w(eeks), m(onths), y(ears). The numerical_value is just for sorting in the web-interface and is not used for calculations.
- version: 4
- Predicates
- expired
- 1d
Expand Down Expand Up @@ -1469,8 +1469,8 @@
- Predicates
- event-status
### runtime-packer
- description: Runtime or software packer used to combine compressed or encrypted data with the decompression or decryption code. This code can add additional obfuscations mechanisms including polymorphic-packer or other obfuscation techniques. This taxonomy lists all the known or official packer used for legitimate use or for packing malicious binaries.
- version: 2
- description: Runtime or software packer used to combine compressed or encrypted data with the decompression or decryption code. This code can add additional obfuscations mechanisms including polymorphic-packer, virtualization or other obfuscation techniques. This taxonomy lists all the known or official packer used for legitimate use or for packing malicious binaries.
- version: 3
- Predicates
- dex
- elf
Expand Down Expand Up @@ -1766,9 +1766,9 @@
- description: A taxonomy for describing vulnerabilities (software, hardware, or social) on different scales or with additional available information.
- version: 3
- Predicates
- sighting
- exploitability
- information
- sighting
### workflow
- description: Workflow support language is a common language to support intelligence analysts to perform their analysis on data and information.
- version: 14
Expand Down

0 comments on commit e94c679

Please sign in to comment.