This website requires JavaScript.
Explore
Help
Register
Sign In
infosecn1nja
/
DeTTECT
mirror of
https://github.com/infosecn1nja/DeTTECT.git
Watch
1
Star
0
Fork
You've already forked DeTTECT
0
Code
Issues
Packages
Projects
Releases
Wiki
Activity
Moved into the correct folder
Browse Source
master
Marcus Bakker
2020-06-25 22:13:23 +02:00
parent
0c24492591
commit
4bff3175d2
51 changed files
with
0 additions
and
0 deletions
Show all changes
Ignore whitespace when comparing lines
Ignore changes in amount of whitespace
Ignore changes in whitespace at EOL
Show Stats
Download Patch File
Download Diff File
Expand all files
Collapse all files
0
pre-sub-techniques/20190319-RedCanary.yaml → threat-actor-data/pre-sub-techniques/20190319-RedCanary.yaml
Unescape
Escape
View File
0
pre-sub-techniques/20190528-Rapid7.yaml → threat-actor-data/pre-sub-techniques/20190528-Rapid7.yaml
Unescape
Escape
View File
0
pre-sub-techniques/20190829-Kaspersky.yaml → threat-actor-data/pre-sub-techniques/20190829-Kaspersky.yaml
Unescape
Escape
View File
0
pre-sub-techniques/20190902-ATTACK-Techniques-and-trends-in-Windows-malware.yaml → threat-actor-data/pre-sub-techniques/20190902-ATTACK-Techniques-and-trends-in-Windows-malware.yaml
Unescape
Escape
View File
0
pre-sub-techniques/20191001-CrowdStrike-software.md → threat-actor-data/pre-sub-techniques/20191001-CrowdStrike-software.md
Unescape
Escape
View File
0
pre-sub-techniques/20191001-CrowdStrike.yaml → threat-actor-data/pre-sub-techniques/20191001-CrowdStrike.yaml
Unescape
Escape
View File
0
pre-sub-techniques/20191126-RedCanary-retail-sector.yaml → threat-actor-data/pre-sub-techniques/20191126-RedCanary-retail-sector.yaml
Unescape
Escape
View File
0
pre-sub-techniques/20200220-FireEye.yaml → threat-actor-data/pre-sub-techniques/20200220-FireEye.yaml
Unescape
Escape
View File
0
pre-sub-techniques/20200306-CrowdStrike.yaml → threat-actor-data/pre-sub-techniques/20200306-CrowdStrike.yaml
Unescape
Escape
View File
0
pre-sub-techniques/20200318-RedCanary.yaml → threat-actor-data/pre-sub-techniques/20200318-RedCanary.yaml
Unescape
Escape
View File
0
pre-sub-techniques/20200331-RecordedFuture.yaml → threat-actor-data/pre-sub-techniques/20200331-RecordedFuture.yaml
Unescape
Escape
View File
0
pre-sub-techniques/20200520-ACSC.yaml → threat-actor-data/pre-sub-techniques/20200520-ACSC.yaml
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - communication.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - communication.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - education.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - education.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - energy.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - energy.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - financials.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - financials.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - government.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - government.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - health.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - health.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - hospitality.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - hospitality.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - industrial.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - industrial.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - media.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - media.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - nonprofit.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - nonprofit.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - overall.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - overall.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - pharmaceuticals.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - pharmaceuticals.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - retail.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - retail.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - services.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - services.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - technology.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - technology.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - transportation.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190319-RedCanary/attack_windows-linux-macos_Red Canary Threat Detection Report 2019 (1st edition) - transportation.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190528-Rapid7/Rapid7 Quarterly Threat Report Q1 2019-enterprise.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190528-Rapid7/Rapid7 Quarterly Threat Report Q1 2019-enterprise.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190528-Rapid7/Rapid7 Quarterly Threat Report Q1 2019-mobile.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190528-Rapid7/Rapid7 Quarterly Threat Report Q1 2019-mobile.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190829-Kaspersky/Kaspersky Incident Response report 2018.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190829-Kaspersky/Kaspersky Incident Response report 2018.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20190902-ATTACK-Techniques-and-trends-in-Windows-malware/ATTACK-Techniques-and-Trends-in-Windows-malware.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20190902-ATTACK-Techniques-and-trends-in-Windows-malware/ATTACK-Techniques-and-Trends-in-Windows-malware.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(heat-map-first-half-of-2019).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(heat-map-first-half-of-2019).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-2018).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-2018).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-2018-and-first-half-of-2019).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-2018-and-first-half-of-2019).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-first-half-of-2019).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191001-CrowdStrike/attack_windows-linux-macos_crowdstrike-overwatch-2019-mid-year-report-(seen-in-first-half-of-2019).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20191126-RedCanary/attack_windows_top-10-techniques-red-canary-detected-against-the-retail-sector-in-2019.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20191126-RedCanary/attack_windows_top-10-techniques-red-canary-detected-against-the-retail-sector-in-2019.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200220-FireEye/attack_all_fireeye-m-trends-2020.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200220-FireEye/attack_all_fireeye-m-trends-2020.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200306-CrowdStrike/attack_windows-linux-macos_crowdstrike-global-threat-report-2020.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200306-CrowdStrike/attack_windows-linux-macos_crowdstrike-global-threat-report-2020.json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(education).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(education).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(energy).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(energy).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(finance).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(finance).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(healthcare).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(healthcare).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(manufacturing).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(manufacturing).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(overall).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(overall).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(retail).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(retail).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(services).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(services).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(technology).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(technology).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(transportation).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200318-RedCanary/attack_windows-linux-macos_red-canary-threat-detection-report-2020-(transportation).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200331-RecordedFuture/attack_windows-linux-macos_recorded-future-ttp-annual-report-2019-(top-10).json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200331-RecordedFuture/attack_windows-linux-macos_recorded-future-ttp-annual-report-2019-(top-10).json
Unescape
Escape
View File
0
pre-sub-techniques/ATT&CK-Navigator-layers/20200520-ACSC/attack_all_summary-of-tradecraft-trends-for-2019-2020-ttps-used-to-target-australian-networks.json → threat-actor-data/pre-sub-techniques/ATT&CK-Navigator-layers/20200520-ACSC/attack_all_summary-of-tradecraft-trends-for-2019-2020-ttps-used-to-target-australian-networks.json
Unescape
Escape
View File
Write
Preview
Loading…
Cancel
Save
Reference in New Issue
Repository
infosecn1nja/DeTTECT
Title
Body
Create Issue