mirror of https://github.com/MISP/misp-book
Links fixed
parent
f066591761
commit
3709f66783
|
@ -10,18 +10,18 @@ You can access the taxonomy by going into 'Event Actions' and select 'List Taxon
|
|||
|
||||
12 default taxonomies are available:
|
||||
|
||||
- [Admiralty Scale](./admiralty-scale)
|
||||
- CIRCL [Taxonomy - Schemes of Classification in Incident Response and Detection](./circl)
|
||||
- DE German (DE) [Government classification markings (VS)](./de-vs)
|
||||
- [eCSIRT](./ecsirt) and IntelMQ incident classification
|
||||
- [EUCI](./euci) - EU classified information marking
|
||||
- [FIRST CSIRT Case](./first_csirt_case_classification) classification
|
||||
- [Information Security Marking Metadata](./dni-ism) from DNI (Director of National Intelligence - US)
|
||||
- [Malware](./malware) classification based on a SANS document
|
||||
- [NATO Classification Marking](./nato)
|
||||
- [OSINT Open Source Intelligence - Classification](./osint)
|
||||
- [TLP - Traffic Light Protocol](./tlp)
|
||||
- Vocabulary for Event Recording and Incident Sharing [VERIS](./veris)
|
||||
- [Admiralty Scale](https://github.com/MISP/misp-taxonomies/tree/master/admiralty-scale)
|
||||
- CIRCL [Taxonomy - Schemes of Classification in Incident Response and Detection](https://github.com/MISP/misp-taxonomies/tree/master/circl)
|
||||
- DE German (DE) [Government classification markings (VS)](https://github.com/MISP/misp-taxonomies/tree/master/de-vs)
|
||||
- [eCSIRT](https://github.com/MISP/misp-taxonomies/tree/master/ecsirt) and IntelMQ incident classification
|
||||
- [EUCI](https://github.com/MISP/misp-taxonomies/tree/master/euci) - EU classified information marking
|
||||
- [FIRST CSIRT Case](https://github.com/MISP/misp-taxonomies/tree/master/first_csirt_case_classification) classification
|
||||
- [Information Security Marking Metadata](https://github.com/MISP/misp-taxonomies/tree/master/dni-ism) from DNI (Director of National Intelligence - US)
|
||||
- [Malware](https://github.com/MISP/misp-taxonomies/tree/master/malware) classification based on a SANS document
|
||||
- [NATO Classification Marking](https://github.com/MISP/misp-taxonomies/tree/master/nato)
|
||||
- [OSINT Open Source Intelligence - Classification](https://github.com/MISP/misp-taxonomies/tree/master/osint)
|
||||
- [TLP - Traffic Light Protocol](https://github.com/MISP/misp-taxonomies/tree/master/tlp)
|
||||
- Vocabulary for Event Recording and Incident Sharing [VERIS](https://github.com/MISP/misp-taxonomies/tree/master/veris)
|
||||
|
||||
A taxonomy contains a series of tags that can use as normal tags in your MISP instance. The advantage is that you even set a specific tag as being
|
||||
exportable. This means that you can export your classification with other MISP instance and share the same taxonomies.
|
||||
|
@ -30,7 +30,7 @@ If you want to enable a specific taxonomy, you can click on the cross to enable
|
|||
|
||||
## Contributing taxonimies
|
||||
|
||||
It is quite easy. Create a JSON file describing your taxonomy as triple tags (e.g. check an existing one like [Admiralty Scale](https://github.com/MISP/misp-taxonomies/admiralty-scale)), create a directory matching your name space, put your machinetag file in the directory and pull your request. That's it. Everyone can benefit from your taxonomy and can be automatically enabled in information sharing tools like [MISP](https://www.github.com/MISP/MISP).
|
||||
It is quite easy. Create a JSON file describing your taxonomy as triple tags (e.g. check an existing one like [Admiralty Scale](https://github.com/MISP/misp-taxonomies/tree/master/admiralty-scale)), create a directory matching your name space, put your machinetag file in the directory and pull your request. That's it. Everyone can benefit from your taxonomy and can be automatically enabled in information sharing tools like [MISP](https://www.github.com/MISP/MISP).
|
||||
|
||||
## Adding a private taxonomy
|
||||
|
||||
|
|
Loading…
Reference in New Issue