mirror of https://github.com/MISP/misp-book
Update README.md
parent
f2d06ba512
commit
c79e9b46d6
|
@ -2,9 +2,9 @@
|
|||
|
||||
## Taxonomies
|
||||
|
||||
In MISP 2.4, a flexible mechanism has been introduced to support various [taxonomy of classification](https://github.com/MISP/misp-taxonomies).
|
||||
In MISP 2.4.X, a flexible mechanism has been introduced to support various [taxonomy of classification](https://github.com/MISP/misp-taxonomies).
|
||||
|
||||
You can access the taxonomy by going into 'Event Actions' and select 'List Taxonomies'.
|
||||
You can access the taxonomy by going into 'Event Actions' and select 'List Taxonomies'. For fresh install, make sure to click 'Update Taxonomies' to view available taxonomies.
|
||||
|
||||
![MISP Taxonomy index](./figures/taxonomies-index.png)
|
||||
|
||||
|
@ -12,9 +12,6 @@ The following taxonomies can be used in MISP (as local or distributed tags) or i
|
|||
|
||||
![Overview of the MISP taxonomies](./figures/taxonomy-explanation.png)
|
||||
|
||||
|
||||
The following taxonomies are described:
|
||||
|
||||
1. [Admiralty Scale](https://github.com/MISP/misp-taxonomies/tree/master/admiralty-scale): The Admiralty Scale (also called the NATO System) is used to rank the reliability of a source and the credibility of an information.
|
||||
|
||||
2. [adversary](https://github.com/MISP/misp-taxonomies/tree/master/adversary) An overview and description of the adversary infrastructure.
|
||||
|
@ -131,19 +128,50 @@ For more information, "[Information Sharing and Taxonomies Practical Classificat
|
|||
|
||||
## Adding a private taxonomy
|
||||
|
||||
<!-- ========================== I don't know if this part is nor yet relevant? ================================================= -->
|
||||
|
||||
~~~~ shell
|
||||
$ cd /var/www/MISP/app/files/taxonomies/
|
||||
$ mkdir privatetaxonomy
|
||||
$ vi machinetag.json
|
||||
~~~~
|
||||
|
||||
Create a JSON file Create a JSON file describing your taxonomy as triple tags.
|
||||
Create a JSON file describing your taxonomy as triple tags.
|
||||
|
||||
~~~~ shell
|
||||
For example :
|
||||
mkdir jirafields
|
||||
vim machinetag.json
|
||||
~~~~
|
||||
|
||||
Sample JSON with triple tags. You can use JSON validator to ame sure there is no syntax error.
|
||||
|
||||
~~~~ shell
|
||||
{
|
||||
"namespace": "jirafields",
|
||||
"description": "Some descriptive words",
|
||||
"version": 1,
|
||||
"predicates": [
|
||||
{
|
||||
"value": "xxxxxxx",
|
||||
"expanded": "xxxxxxx"
|
||||
}
|
||||
],
|
||||
"values": [
|
||||
{
|
||||
"predicate": "xxxxxx",
|
||||
"entry": [
|
||||
{
|
||||
"value": "xxxxx",
|
||||
"expanded": "xxxxxx"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
~~~~
|
||||
|
||||
Once you are happy with your file go to MISP Web GUI taxonomies/index and update the taxonomies, the newly created taxonomy should be visible, now you need to activate the tags within your taxonomy.
|
||||
|
||||
## How using Taxonomy in MISP
|
||||
## How to use Taxonomy in MISP
|
||||
|
||||
### Filtering the distribution of events among MISP instances
|
||||
|
||||
|
|
Loading…
Reference in New Issue