misp-galaxy/README.md

38 lines
3 KiB
Markdown
Raw Normal View History

2016-02-28 08:24:57 +00:00
# misp-galaxy
2016-04-11 10:49:57 +00:00
[![Build Status](https://travis-ci.org/MISP/misp-galaxy.svg?branch=master)](https://travis-ci.org/MISP/misp-galaxy)
2016-02-28 08:24:57 +00:00
MISP galaxy is a simple method to express a large object called cluster that can be attached to MISP events or
attributes. A cluster can be composed of one or more elements. Elements are expressed as key-values. There
are default elements available in MISP galaxy but those can be overwritten, replaced or updated as you wish.
2016-02-28 08:24:57 +00:00
Existing clusters and elements can be used as-is or as a template. MISP distribution can be applied
to each cluster to permit a limited or broader distribution scheme.
2016-02-28 08:24:57 +00:00
Elements are from existing standards (like STIX, Veris, MISP and so on) or custom ones.
The objective is to have a comment set of clusters for organizations starting analysis but that can be expanded
to localized information (which is not shared) or additional information (that can be shared).
2016-02-28 08:24:57 +00:00
# Available clusters
- [cluster/threat-actor.json](cluster/threat-actor.json) - Threat Actor. MISP
2016-02-28 08:24:57 +00:00
# Available Elements
- [elements/adversary-groups.json](elements/adversary-groups.json) - Adversary groups - Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign. MISP
2016-03-01 06:48:16 +00:00
- [elements/certainty-level.json](elements/certainty-level.json) - Certainty level of an associated element or cluster.
- [elements/planning-and-operational-support-vocabulary.json](elements/planning-and-operational-support-vocabulary.json) - The PlanningAndOperationalSupportVocab is the default STIX vocabulary for expressing the planning and operational support functions available to a threat actor.
2016-02-29 07:41:31 +00:00
- [elements/threat-actor-motivation-vocabulary.json](elements/threat-actor-motivation-vocabulary.json) - The MotivationVocab is the default STIX vocabulary for expressing the motivation of a threat actor. STIX 1.2.1
2016-03-04 07:34:04 +00:00
- [elements/threat-actor-sophistication-vocabulary.json](elements/threat-actor-sophistication-vocabulary.json) - The ThreatActorSophisticationVocab enumeration is used to define the default STIX vocabulary for expressing the subjective level of sophistication of a threat actor.
- [elements/threat-actor-type-vocabulary.json](elements/threat-actor-type-vocabulary.json) - The ThreatActorTypeVocab enumeration is used to define the default STIX vocabulary for expressing the subjective type of a threat actor.
2016-02-28 08:24:57 +00:00
- [elements/threat-actor-intended-effect-vocabulary.json](elements/threat-actor-intended-effect-vocabulary.json) - The IntendedEffectVocab is the default STIX vocabulary for expressing the intended effect of a threat actor. STIX 1.2.1
- [elements/threat-actor-tools.json](elements/threat-actor-tools.json) - threat-actor-tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries. MISP
2016-02-28 08:24:57 +00:00
## How to contribute?
Fork the project, update or create elements or clusters and make a pull-request.
2016-02-28 08:24:57 +00:00
We recommend to validate the JSON file using [jq](https://stedolan.github.io/jq/) before doing a pull-request.