-
Notifications
You must be signed in to change notification settings - Fork 145
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
1309 osint extension #1310
base: main
Are you sure you want to change the base?
1309 osint extension #1310
Changes from all commits
3a90dcf
2062362
c253e3b
54f345e
e01dab8
6240378
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -491,6 +491,11 @@ | |
"type": "string_t", | ||
"is_array": true | ||
}, | ||
"campaign": { | ||
"caption": "Campaign", | ||
"description": "The campaign object describes details about the campaign that was the source of the activity.", | ||
"type": "campaign" | ||
}, | ||
"caption": { | ||
"caption": "Caption", | ||
"description": "A short description or caption of the device. For example: <code>Scanner 1</code> or <code>Database Manager</code>.", | ||
|
@@ -1497,6 +1502,36 @@ | |
"description": "Specific pattern, algorithm, fingerprint, or model used for detection.", | ||
"type": "string_t" | ||
}, | ||
"detection_pattern_type": { | ||
"caption": "Detection Pattern", | ||
"description": "Specifies the type of detection pattern used to identify the associated threat indicator. This field identifies whether the pattern is based on behavioral analysis, static indicators, or heuristic methods.", | ||
"type": "string_t" | ||
}, | ||
"detection_pattern_type_id": { | ||
"caption": "Detection Pattern Type ID", | ||
"description": "The normalised identifier of the detection pattern type.", | ||
"sibling": "detection_pattern_type", | ||
"type": "integer_t", | ||
"enum": { | ||
"0": { | ||
"caption": "Unknown", | ||
"description": "The type is not mapped." | ||
}, | ||
"1": { | ||
"caption": "Behavioral analysis" | ||
}, | ||
"2": { | ||
"caption": "Static indicators" | ||
}, | ||
"3": { | ||
"caption": "Heuristic methods" | ||
}, | ||
"99": { | ||
"caption": "Other", | ||
"description": "Any other type of detection pattern type." | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The standard formula of words used for the description of the 99 value in any enum is:
|
||
} | ||
} | ||
}, | ||
"detection_system": { | ||
"caption": "Detection System", | ||
"description": "The name of the type of data security tool or system that the finding, detection, or alert originated from. E.g., Endpoint, Secure Email Gateway, etc.", | ||
|
@@ -2105,6 +2140,11 @@ | |
"type": "extension", | ||
"is_array": true | ||
}, | ||
"external_id": { | ||
"caption": "External ID", | ||
"description": "A unique identifier assigned by an external system for cross-referencing.", | ||
"type": "string_t" | ||
}, | ||
"factor_type": { | ||
"caption": "Factor Type", | ||
"description": "The type of authentication factor used in an authentication attempt.", | ||
|
@@ -2513,6 +2553,12 @@ | |
"description": "The impact of the finding, valid range 0-100.", | ||
"type": "integer_t" | ||
}, | ||
"intrusion_sets": { | ||
"caption": "Intrusion Sets", | ||
"description": "A grouping of adversarial behaviors and resources believed to be associated with specific threat actors or campaigns. Intrusion sets often encompass multiple campaigns and are used to organize related activities under a common label.", | ||
"type": "string_t", | ||
"is_array": true | ||
}, | ||
"injection_type": { | ||
"caption": "Injection Type", | ||
"description": "The process injection method, normalized to the caption of the injection_type_id value. In the case of 'Other', it is defined by the event source.", | ||
|
@@ -5127,6 +5173,11 @@ | |
"description": "The tree id is a unique SMB identifier which represents an open connection to a share.", | ||
"type": "string_t" | ||
}, | ||
"threat_actor": { | ||
"caption": "Threat Actor", | ||
"description": "The Threat Actor object describes the characteristics and metadata of a threat actor.", | ||
"type": "threat_actor" | ||
}, | ||
"ttl": { | ||
"caption": "TTL", | ||
"description": "The time interval that the resource record may be cached. Zero value means that the resource record can only be used for the transaction in progress, and should not be cached.", | ||
|
@@ -5221,6 +5272,11 @@ | |
"description": "The size in bytes of an attribute before truncation. See specific usage.", | ||
"type": "integer_t" | ||
}, | ||
"uploaded_time": { | ||
"caption": "Uploaded Time", | ||
"description": "The timestamp indicating when the associated indicator or intelligence was added to the system or repository.", | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. A dictionary attribute like |
||
"type": "timestamp_t" | ||
}, | ||
"url": { | ||
"caption": "URL", | ||
"description": "The URL object that pertains to the event or object. See specific usage.", | ||
|
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,12 @@ | ||
{ | ||
"caption": "Campaign", | ||
"description": "Campaign represent organized efforts by threat actors to achieve malicious objectives over a period, often characterized by shared tactics, techniques, and procedures (TTPs).", | ||
"extends": "object", | ||
"name": "campaign", | ||
"attributes": { | ||
"name": { | ||
"description": "The name of a specific campaign associated with a cyber threat.", | ||
"requirement": "optional" | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Is it conceivable that there could be a campaign without a name? If not, then it should be |
||
} | ||
} | ||
} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
{ | ||
"caption": "Threat Actor", | ||
"description": "Threat actor is responsible for the observed malicious activity.", | ||
"extends": "object", | ||
"name": "threat_actor", | ||
"attributes": { | ||
"name": { | ||
"description": "The name of the threat actor.", | ||
"requirement": "optional" | ||
}, | ||
"type": { | ||
"caption": "Threat Actor Type", | ||
"description": "The classification of the threat actor based on their motivations, capabilities, or affiliations. Common types include nation-state actors, cybercriminal groups, hacktivists, or insider threats.", | ||
"requirement": "optional" | ||
}, | ||
"type_id": { | ||
"caption": "Threat Actor Type ID", | ||
"description": "The normalized datastore resource type identifier.", | ||
"requirement": "recommended", | ||
"enum": { | ||
"0": { | ||
"caption": "Unknown", | ||
"description": "The threat actor type is unknown." | ||
}, | ||
"1": { | ||
"caption": "Nation-state" | ||
}, | ||
"2": { | ||
"caption": "Cybercriminal" | ||
}, | ||
"3": { | ||
"caption": "Hacktivists" | ||
}, | ||
"4": { | ||
"caption": "Insider" | ||
}, | ||
"99": { | ||
"caption": "Other", | ||
"description": "The threat actor type is not mapped." | ||
} | ||
} | ||
} | ||
} | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The standard formula of words used for the description of a string sibling to an enum is:
Yes, there are some exceptions to this but they are defects to my mind.