From c79e9b46d62ed29d9e5729cfc0ace599371d9567 Mon Sep 17 00:00:00 2001 From: makflwana Date: Mon, 11 Dec 2017 22:43:47 +1100 Subject: [PATCH] Update README.md --- taxonomy/README.md | 46 +++++++++++++++++++++++++++++++++++++--------- 1 file changed, 37 insertions(+), 9 deletions(-) diff --git a/taxonomy/README.md b/taxonomy/README.md index b58bf94..040918d 100644 --- a/taxonomy/README.md +++ b/taxonomy/README.md @@ -2,9 +2,9 @@ ## Taxonomies -In MISP 2.4, a flexible mechanism has been introduced to support various [taxonomy of classification](https://github.com/MISP/misp-taxonomies). +In MISP 2.4.X, a flexible mechanism has been introduced to support various [taxonomy of classification](https://github.com/MISP/misp-taxonomies). -You can access the taxonomy by going into 'Event Actions' and select 'List Taxonomies'. +You can access the taxonomy by going into 'Event Actions' and select 'List Taxonomies'. For fresh install, make sure to click 'Update Taxonomies' to view available taxonomies. ![MISP Taxonomy index](./figures/taxonomies-index.png) @@ -12,9 +12,6 @@ The following taxonomies can be used in MISP (as local or distributed tags) or i ![Overview of the MISP taxonomies](./figures/taxonomy-explanation.png) - -The following taxonomies are described: - 1. [Admiralty Scale](https://github.com/MISP/misp-taxonomies/tree/master/admiralty-scale): The Admiralty Scale (also called the NATO System) is used to rank the reliability of a source and the credibility of an information. 2. [adversary](https://github.com/MISP/misp-taxonomies/tree/master/adversary) An overview and description of the adversary infrastructure. @@ -131,19 +128,50 @@ For more information, "[Information Sharing and Taxonomies Practical Classificat ## Adding a private taxonomy - - ~~~~ shell $ cd /var/www/MISP/app/files/taxonomies/ $ mkdir privatetaxonomy $ vi machinetag.json ~~~~ -Create a JSON file Create a JSON file describing your taxonomy as triple tags. +Create a JSON file describing your taxonomy as triple tags. + +~~~~ shell +For example : +mkdir jirafields +vim machinetag.json +~~~~ + +Sample JSON with triple tags. You can use JSON validator to ame sure there is no syntax error. + +~~~~ shell +{ + "namespace": "jirafields", + "description": "Some descriptive words", + "version": 1, + "predicates": [ + { + "value": "xxxxxxx", + "expanded": "xxxxxxx" + } + ], + "values": [ + { + "predicate": "xxxxxx", + "entry": [ + { + "value": "xxxxx", + "expanded": "xxxxxx" + } + ] + } + ] +} +~~~~ Once you are happy with your file go to MISP Web GUI taxonomies/index and update the taxonomies, the newly created taxonomy should be visible, now you need to activate the tags within your taxonomy. -## How using Taxonomy in MISP +## How to use Taxonomy in MISP ### Filtering the distribution of events among MISP instances