Clusters and elements to attach to MISP events or attributes (like threat actors) https://www.misp-project.org/galaxy.html
 
 
Go to file
Alexandre Dulaunoy bfea2b7948
add: [doc] contribution doc added
2018-12-01 11:06:49 +01:00
clusters add Aurora Ransomware metadata 2018-11-26 09:30:54 +01:00
doc/images MISP galaxy screenshot 2016-12-17 10:44:29 +01:00
galaxies chg: removal of older unused relationships 2018-10-17 08:20:12 +02:00
misp Mapping triples/machine tags with galaxy, clusters and so on 2016-08-12 09:43:26 +02:00
tools fix: [graph.py] small fix to make it work 2018-10-19 14:59:09 +02:00
vocabularies add sector vocabulary 2017-11-08 12:15:47 +01:00
.travis.yml Initial Json schema 2017-02-13 18:32:53 +01:00
CONTRIBUTE.md add: [doc] contribution doc added 2018-12-01 11:06:49 +01:00
README.md chg: [doc] Added some dependency pointers. 2018-11-29 14:22:39 +09:00
jq_all_the_things.sh fix: automatically fix missing uuids 2018-10-12 10:55:24 +02:00
schema_clusters.json chg: further categorization of galaxies 2018-10-19 14:15:20 +02:00
schema_galaxies.json Schema updated to have namespace key at galaxy level 2018-05-18 16:34:41 +02:00
schema_misp.json Add validators for vocabularies and misp 2017-07-25 17:39:06 +02:00
schema_vocabularies.json Add validators for vocabularies and misp 2017-07-25 17:39:06 +02:00
validate_all.sh Remove the executable flag from the json files 2017-10-25 12:25:36 -04:00

README.md

misp-galaxy

Build Status

MISP galaxy is a simple method to express a large object called cluster that can be attached to MISP events or attributes. A cluster can be composed of one or more elements. Elements are expressed as key-values. There are default vocabularies available in MISP galaxy but those can be overwritten, replaced or updated as you wish.

Existing clusters and vocabularies can be used as-is or as a template. MISP distribution can be applied to each cluster to permit a limited or broader distribution scheme.

Vocabularies are from existing standards (like STIX, Veris, MISP and so on) or custom ones.

The objective is to have a comment set of clusters for organizations starting analysis but that can be expanded to localized information (which is not shared) or additional information (that can be shared).

Dependencies

To create your own Galaxies the following tools are needed to run the validation scripts.

  • jsonschema (>v2.4)
  • jq
  • moreutils (sponge)

On a Debian flavoured distribution you can potentially do this:

sudo apt install jq moreutils python3-jsonschema
sudo wget -O /usr/local/bin/jsonschema https://gist.githubusercontent.com/SteveClement/e6ac60e153e9657913000216fc77c6ef/raw/c273ace06ad338d609dd2c84a0a6e215a268ea11/jsonschema
sudo chmod +x /usr/local/bin/jsonschema # This will only work with jsonschema >2.4 (before no CLI interface was available)

Available clusters

Available Vocabularies

A readable PDF overview of the MISP galaxy is available or HTML and generated from the JSON.

Common

Threat Actor

MISP Integration

Starting from MISP 2.4.56, galaxy is integrated within the MISP threat sharing platform and users can directly benefit from the available clusters to attach them to the MISP event.

MISP Integration of the MISP galaxy

How to contribute?

In the world of threat intelligence, there are many different models or approaches to order, classify or describe threat actors, threats or activity groups. We welcome new ways of describing threat intelligence as the galaxy model allows to reuse the ones you use or trust for your organization or community.

Fork the project, update or create elements or clusters and make a pull-request.

We recommend to validate the JSON file using jq and validate_all.sh before doing a pull-request.

License

MISP galaxy is licensed under CC0 1.0 Universal (CC0 1.0) - Public Domain Dedication.