mirror of
https://github.com/MISP/misp-galaxy.git
synced 2024-11-22 23:07:19 +00:00
Clusters and elements to attach to MISP events or attributes (like threat actors)
adversariesadversary-groupsattack-patternonclassificationinformation-exchangemalwaremispmisp-galaxymitre-adversarial-tacticsstixthreat-actorsthreat-huntingthreat-intelligence
cluster | ||
elements | ||
README.md |
misp-galaxy
MISP galaxy is a simple method to express a large object called cluster that can be attached to MISP events or attributes. A cluster can be composed of one or more elements. Elements are expressed as key-values. There are default elements available in MISP galaxy but those can overwritten, replaced or updated as you wish.
Existing clusters and elements can be used as-is or as a template. MISP distribution can be applied to each cluster to permit limited or a broader distribution scheme.
Available clusters
- cluster/threat-actor.json - Threat Actor
Available Elements
- elements/apt-groups.json - APT Groups - Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign.
- elements/threat-actor-intended-effect-vocabulary.json - The IntendedEffectVocab is the default STIX vocabulary for expressing the intended effect of a threat actor. STIX 1.2.1
How to contribute?
Fork the project, update or create elements or clusters and make a pull-request.