Clusters and elements to attach to MISP events or attributes (like threat actors) https://www.misp-project.org/galaxy.html
 
 
 
 
Go to file
rmkml de9cc6898a Add GetCrypt Ransomware 2019-05-25 13:30:15 +02:00
clusters Add GetCrypt Ransomware 2019-05-25 13:30:15 +02:00
doc/images MISP galaxy screenshot 2016-12-17 10:44:29 +01:00
galaxies chg: [attack-pattern] Sync kill-chain with data from MITRE. 2019-05-13 10:59:30 +02:00
misp Mapping triples/machine tags with galaxy, clusters and so on 2016-08-12 09:43:26 +02:00
tools chg: [tools] fix the attribution confidence level 2019-03-19 16:49:19 +01:00
vocabularies Update cert-eu-motive.json 2019-02-20 22:08:24 +00:00
.travis.yml chg: Add PyMISPGalaxies test 2019-05-13 11:45:30 +02:00
CONTRIBUTE.md add: [doc] contribution doc added 2018-12-01 11:06:49 +01:00
LICENSE.md chg: [licensing] 2-clause BSD added in addition to CC0 2018-12-10 12:38:21 +01:00
README.md remove mitre-relationships from readme 2019-03-20 11:47:01 +01:00
jq_all_the_things.sh fix: automatically fix missing uuids 2018-10-12 10:55:24 +02:00
schema_clusters.json chg: further categorization of galaxies 2018-10-19 14:15:20 +02:00
schema_galaxies.json chg: [schema] optional kill_chain_order field added 2019-02-15 08:57:45 +01:00
schema_misp.json Add validators for vocabularies and misp 2017-07-25 17:39:06 +02:00
schema_vocabularies.json Add validators for vocabularies and misp 2017-07-25 17:39:06 +02:00
validate_all.sh Remove the executable flag from the json files 2017-10-25 12:25:36 -04:00

README.md

misp-galaxy

Build Status

MISP galaxy is a simple method to express a large object called cluster that can be attached to MISP events or attributes. A cluster can be composed of one or more elements. Elements are expressed as key-values. There are default vocabularies available in MISP galaxy but those can be overwritten, replaced or updated as you wish.

Existing clusters and vocabularies can be used as-is or as a template. MISP distribution can be applied to each cluster to permit a limited or broader distribution scheme.

Vocabularies are from existing standards (like STIX, Veris, MISP and so on) or custom ones.

The objective is to have a comment set of clusters for organizations starting analysis but that can be expanded to localized information (which is not shared) or additional information (that can be shared).

Available clusters

Available Vocabularies

A readable PDF overview of the MISP galaxy is available or HTML and generated from the JSON.

Common

Threat Actor

MISP Integration

Starting from MISP 2.4.56, galaxy is integrated within the MISP threat sharing platform and users can directly benefit from the available clusters to attach them to the MISP event.

MISP Integration of the MISP galaxy

How to contribute?

License

The MISP galaxy (JSON files) are dual-licensed under:

or

 Copyright (c) 2015-2019 Alexandre Dulaunoy - a@foo.be
 Copyright (c) 2015-2019 CIRCL - Computer Incident Response Center Luxembourg
 Copyright (c) 2015-2019 Andras Iklody
 Copyright (c) 2015-2019 Raphael Vinot
 Copyright (c) 2015-2019 Deborah Servili
 Copyright (c) 2016-2019 Various contributors to MISP Project

 Redistribution and use in source and binary forms, with or without modification,
 are permitted provided that the following conditions are met:

    1. Redistributions of source code must retain the above copyright notice,
       this list of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright notice,
       this list of conditions and the following disclaimer in the documentation
       and/or other materials provided with the distribution.

 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
 INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
 BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
 OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 OF THE POSSIBILITY OF SUCH DAMAGE.