mirror of https://github.com/MISP/misp-galaxy
Script to generate the cluster is the following, UUIDv5 based on standard misp-stix source UUIDv4. ~~~python lcluster = [] for v in data: cluster = {} cluster['value'] = v['threat_actor'] cluster['meta'] = {} cluster['meta']['sector'] = v['sector'] cluster['meta']['synonyms'] = v['synonyms'] cluster['meta']['refs'] = [] cluster['meta']['refs'].append('https://learn.microsoft.com/en-us/microsoft-365/security/intelligence/microsoft-threat-actor-naming?view=o365-worldwide') _uuid = uuid.uuid5(uuid.UUID("76beed5f-7251-457e-8c2a-b45f7b589d3d"), "{}".format(cluster['value'])) cluster['uuid'] = str(_uuid) lcluster.append(cluster) ~~~ Relationships might be added in a later stage to map with the MISP threat actor galaxy. |
||
---|---|---|
.. | ||
360net.json | ||
android.json | ||
atrm.json | ||
attck4fraud.json | ||
backdoor.json | ||
banker.json | ||
bhadra-framework.json | ||
botnet.json | ||
branded_vulnerability.json | ||
cancer.json | ||
cert-eu-govsector.json | ||
china-defence-universities.json | ||
cmtmf-attack-pattern.json | ||
country.json | ||
cryptominers.json | ||
election-guidelines.json | ||
exploit-kit.json | ||
first-dns.json | ||
handicap.json | ||
malpedia.json | ||
microsoft-activity-group.json | ||
misinfosec-amitt-misinformation-pattern.json | ||
mitre-attack-pattern.json | ||
mitre-course-of-action.json | ||
mitre-enterprise-attack-attack-pattern.json | ||
mitre-enterprise-attack-course-of-action.json | ||
mitre-enterprise-attack-intrusion-set.json | ||
mitre-enterprise-attack-malware.json | ||
mitre-enterprise-attack-tool.json | ||
mitre-ics-assets.json | ||
mitre-ics-groups.json | ||
mitre-ics-levels.json | ||
mitre-ics-software.json | ||
mitre-ics-tactics.json | ||
mitre-ics-techniques.json | ||
mitre-intrusion-set.json | ||
mitre-malware.json | ||
mitre-mobile-attack-attack-pattern.json | ||
mitre-mobile-attack-course-of-action.json | ||
mitre-mobile-attack-intrusion-set.json | ||
mitre-mobile-attack-malware.json | ||
mitre-mobile-attack-tool.json | ||
mitre-pre-attack-attack-pattern.json | ||
mitre-pre-attack-intrusion-set.json | ||
mitre-tool.json | ||
o365-exchange-techniques.json | ||
online-service.json | ||
preventive-measure.json | ||
ransomware.json | ||
rat.json | ||
region.json | ||
rsit.json | ||
sector.json | ||
sigma-rules.json | ||
social-dark-patterns.json | ||
sod-matrix.json | ||
stealer.json | ||
surveillance-vendor.json | ||
target-information.json | ||
tds.json | ||
tea-matrix.json | ||
threat-actor.json | ||
tool.json | ||
uavs.json |