Clusters and elements to attach to MISP events or attributes (like threat actors)
Find a file
2016-08-09 15:15:53 +02:00
cluster threat-actor tools added 2016-03-17 07:37:41 +01:00
elements ProjectSauron added 2016-08-09 15:15:53 +02:00
.travis.yml Add Travis file (validate json files) 2016-04-11 12:49:57 +02:00
README.md Add Travis file (validate json files) 2016-04-11 12:49:57 +02:00

misp-galaxy

Build Status

MISP galaxy is a simple method to express a large object called cluster that can be attached to MISP events or attributes. A cluster can be composed of one or more elements. Elements are expressed as key-values. There are default elements available in MISP galaxy but those can be overwritten, replaced or updated as you wish.

Existing clusters and elements can be used as-is or as a template. MISP distribution can be applied to each cluster to permit a limited or broader distribution scheme.

Elements are from existing standards (like STIX, Veris, MISP and so on) or custom ones.

The objective is to have a comment set of clusters for organizations starting analysis but that can be expanded to localized information (which is not shared) or additional information (that can be shared).

Available clusters

Available Elements

How to contribute?

Fork the project, update or create elements or clusters and make a pull-request.

We recommend to validate the JSON file using jq before doing a pull-request.