Merge remote-tracking branch 'upstream/master'

pull/193/head
kx1499 2019-01-15 21:19:19 -05:00
commit a5ca2e1189
62 changed files with 3564 additions and 90 deletions

View File

@ -66,11 +66,13 @@ for a specific attribute.
## Existing MISP objects
* [objects/ail-leak](objects/ail-leak/definition.json) - information leak object as defined by the [AIL Analysis Information Leak framework](https://www.github.com/CIRCL/AIL-framework).
* [objects/ail-leak](objects/ail-leak/definition.json) - Information leak object as defined by the [AIL Analysis Information Leak framework](https://www.github.com/CIRCL/AIL-framework).
* [objects/ais-info](objects/ais-info/definition.json) - Object describing Automated Indicator Sharing (AIS) information source markings.
* [objects/android-permission](objects/android-permission/definition.json) - A set of android permissions - one or more permission(s) which can be linked to other objects (e.g. file).
* [objects/asn](objects/asn/definition.json) - Autonomous system object describing a BGP autonomous system which can include one or more network operators management an entity (e.g. ISP) along with their routing policy, routing prefixes or alike.
* [objects/av-signature](objects/av-signature/definition.json) - Antivirus detection signature.
* [objects/bank-account](objects/bank-account/definition.json) - Object describing bank account information based on account description from goAML 4.0.
* [objects/bgp-hijack](objects/bgp-hijack/definition.json) - Object encapsulating BGP Hijack description as specified, for example, by bgpstream.com
* [objects/cap-alert](objects/cap-alert/definition.json) - Common Alerting Protocol Version (CAP) alert object.
* [objects/cap-info](objects/cap-info/definition.json) - Common Alerting Protocol Version (CAP) info object.
* [objects/cap-resource](objects/cap-resource/definition.json) - Common Alerting Protocol Version (CAP) resource object.
@ -86,50 +88,66 @@ for a specific attribute.
* [objects/elf-section](objects/elf-section/definition.json) - Object describing a section of an Executable and Linkable Format (ELF).
* [objects/email](objects/email/definition.json) - An email object.
* [objects/exploit-poc](objects/exploit-poc/definition.json) - Exploit-poc object describing a proof of concept or exploit of a vulnerability. This object has often a relationship with a vulnerability object.
* [objects/facial-composite](objects/facial-composite/definition.json) A facial composite object.
* [objects/fail2ban](objects/fail2ban/definition.json) - A fail2ban object.
* [objects/file](objects/file/definition.json) - File object describing a file with meta-information.
* [objects/forensic-case](objects/forensic-case/definition.json) - An object template to describe a digital forensic case.
* [objects/forensic-evidence](objects/forensic-evidence/definition.json) - An object template to describe a digital forensic evidence.
* [objects/geolocation](objects/geolocation/definition.json) - A geolocation object to describe a location.
* [objects/gtp-attack](objects/gtp-attack/definition.json) - GTP attack object as seen on a GSM, UMTS or LTE network.
* [objects/http-request](objects/http-request/definition.json) - A single HTTP request header object.
* [objects/ip-api-address](objects/ip-api-address/definition.json) - Object describing IP Address information, as defined in [ip-api.com](http://ip-api.com).
* [objects/ip-port](objects/ip-port/definition.json) - An IP address and a port seen as a tuple (or as a triple) in a specific time frame.
* [objects/ja3](objects/ja3/definition.json) - A ja3 object which describes an SSL client fingerprint in an easy to produce and shareable way.
* [objects/legal-entity](objects/legal-entity/definition.json) - Object describing a legal entity, such as an organisation.
* [objects/macho](objects/macho/definition.json) - Object describing a Mach object file format.
* [objects/macho-section](objects/macho-section/definition.json) - Object describing a section of a Mach object file format.
* [objects/mactime-timeline-analysis](objects/mactime-timeline-analysis/definition.json) - Mactime template, used in forensic investigations to describe the timeline of a file activity.
* [objects/malware-config](objects/malware-config/definition.json) - Object describing a malware configuration recovered or extracted from a malicious binary.
* [objects/microblog](objects/microblog/definition.json) - Object describing microblog post like Twitter or Facebook.
* [objects/mutex](objects/mutex/definition.json) - Object to describe mutual exclusion locks (mutex) as seen in memory or computer program.
* [objects/netflow](objects/netflow/definition.json) - Netflow object describes an network object based on the Netflowv5/v9 minimal definition.
* [objects/network-connection](objects/network-connection/definition.json) - Network object describes a local or remote network connection.
* [objects/network-socket](objects/network-socket/definition.json) - Object to describe a local or remote network connections based on the socket data structure.
* [objects/original-imported-file](objects/original-imported-file/definition.json) - Object to describe the original files used to import data in MISP.
* [objects/passive-dns](objects/passive-dns/definition.json) - Passive DNS records as expressed in [draft-dulaunoy-dnsop-passive-dns-cof-01](https://tools.ietf.org/html/draft-dulaunoy-dnsop-passive-dns-cof-01).
* [objects/paste](objects/paste/definition.json) - Object describing a paste or similar post from a website allowing to share privately or publicly posts.
* [objects/pe](objects/pe/definition.json) - Portable Executable (PE) object.
* [objects/pe-section](objects/pe-section/definition.json) - Portable Executable (PE) object - section description.
* [objects/person](objects/person/definition.json) - A person object which describes a person or an identity.
* [objects/phishing](objects/phishing/definition.json) - Phishing template to describe a phishing website and its analysis.
* [objects/phone](objects/phone/definition.json) - A phone or mobile phone object.
* [objects/process](objects/process/definition.json) - A process object.
* [objects/regexp](objects/regexp/definition.json) - An object describing a regular expression (regex or regexp). The object can be linked via a relationship to other attributes or objects to describe how it can be represented as a regular expression.
* [objects/registry-key](objects/registry-key/definition.json) - A registry-key object.
* [objects/r2graphity](objects/r2graphity/definition.json) - Indicators extracted from binary files using radare2 and graphml.
* [objects/report](objects/report/definition.json) - Object to describe metadata used to generate an executive level report.
* [objects/research-scanner](objects/research-scanner/definition.json) - Information related to known scanning activity (e.g. from research projects)
* [objects/rtir](objects/rtir/definition.json) - RTIR - Request Tracker for Incident Response.
* [objects/sandbox-report](objects/sandbox-report/definition.json) - Sandbox report object.
* [objects/sb-signature](objects/sb-signature/definition.json) - Sandbox detection signature object.
* [objects/script](objects/script/definition.json) - Object describing a computer program written to be run in a special run-time environment. The script or shell script can be used for malicious activities but also as support tools for threat analysts.
* [objects/short-message-service](objects/short-message-service/definition.json) - Short Message Service (SMS) object template describing one or more SMS message(s).
* [objects/shortened-link](objects/shortened-link/definition.json) - Shortened link and its redirect target.
* [objects/short-message-service](objects/short-message-service/definition.json) - Short Message Service (SMS) object template describing one or more SMS message(s).
* [objects/ss7-attack](objects/ss7-attack/definition.json) - SS7 object of an attack seen on a GSM, UMTS or LTE network via SS7 logging.
* [objects/stix2-pattern](objects/stix2-pattern/definition.json) - An object describing a STIX pattern. The object can be linked via a relationship to other attributes or objects to describe how it can be represented as a STIX pattern.
* [objects/suricata](objects/suricata/definition.json) - Suricata rule with context.
* [objects/target-system](objects/target-system/definition.json) - Description about an targeted system, this could potentially be a compromissed internal system.
* [objects/target-system](objects/target-system/definition.json) - Description about an targeted system, this could potentially be a compromised internal system.
* [objects/threatgrid-report](objects/threatgrid-report/definition.json) - A threatgrid report object.
* [objects/timecode](objects/timecode/definition.json) - Timecode object to describe a start of video sequence (e.g. CCTV evidence) and the end of the video sequence.
* [objects/timesketch-timeline](objects/timesketch-timeline/definition.json) - A timesketch timeline object based on mandatory field in timesketch to describe a log entry.
* [objects/timestamp](objects/timestamp/definition.json) - A generic timestamp object to represent time including first time and last time seen. Relationship will then define the kind of time relationship.
* [objects/tor-node](objects/tor-node/definition.json) - Tor node description which are part of the Tor network at a time.
* [objects/tracking-id](objects/tracking-id/definition.json) - Analytics and tracking ID such as used in Google Analytics or other analytic platform.
* [objects/transaction](objects/transaction/definition.json) - Object describing a financial transaction.
* [objects/url](objects/url/definition.json) - url object describes an url along with its normalized field (e.g. using faup parsing library) and its metadata.
* [objects/vehicle](objects/vehicle/definition.json) - Vehicle object template to describe a vehicle information and registration.
* [objects/victim](objects/victim/definition.json) - a victim object to describe the organisation being targeted or abused.
* [objects/virustotal-report](objects/virustotal-report/definition.json) - VirusTotal report.
* [objects/vulnerability](objects/vulnerability/definition.json) - Vulnerability object to describe software or hardware vulnerability as described in a CVE.
* [objects/url](objects/url/definition.json) - url object describes an url along with its normalized field (e.g. using faup parsing library) and its metadata.
* [objects/victim](objects/victim/definition.json) - a victim object to describe the organisation being targeted or abused.
* [objects/whois](objects/whois/definition.json) - Whois records information for a domain name.
* [objects/x509](objects/x509/definition.json) - x509 object describing a X.509 certificate.
* [objects/yabin](objects/yabin/definition.json) - yabin.py generates Yara rules from function prologs, for matching and hunting binaries. ref: [yabin](https://github.com/AlienVault-OTX/yabin).
* [objects/yara](objects/yara/definition.json) - YARA object describing a YARA rule along with the version supported and context (such as memory, network, disk).
## MISP objects relationships
@ -169,9 +187,9 @@ The MISP objects model allows to add new combined indicators format based on the
~~~~
Copyright (C) 2016-2018 Andras Iklody
Copyright (C) 2016-2018 Alexandre Dulaunoy
Copyright (C) 2016-2018 CIRCL - Computer Incident Response Center Luxembourg
Copyright (C) 2016-2019 Andras Iklody
Copyright (C) 2016-2019 Alexandre Dulaunoy
Copyright (C) 2016-2019 CIRCL - Computer Incident Response Center Luxembourg
This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by

Binary file not shown.

Binary file not shown.

View File

@ -0,0 +1,84 @@
{
"required": [
"message-type",
"message"
],
"attributes": {
"message-type": {
"description": "the type of message extracted from the forensic-evidence.",
"ui-priority": 0,
"misp-attribute": "text",
"sane_default": [
"SMS",
"MMS",
"Instant Message (IM)",
"Voice Message"
],
"disable_correlation": true
},
"datetime-sent": {
"description": "date and the time when the message was sent.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"datetime-received": {
"description": "date and time when the message was received.",
"multiple": true,
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"Source": {
"description": "Source of the message.(Contact details)",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"destination": {
"description": "Destination of the message.(Contact details)",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"app-used": {
"description": "Application used to send the message.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"subject": {
"description": "Subject of the message if any.",
"ui-priority": 0,
"misp-attribute": "text"
},
"message": {
"description": "Message exchanged.",
"ui-priority": 0,
"misp-attribute": "text"
},
"attachments": {
"description": "External references",
"multiple": true,
"ui-priority": 0,
"categories": [
"External analysis"
],
"misp-attribute": "link"
},
"additional-comments": {
"description": "Comments.",
"ui-priority": 0,
"misp-attribute": "text",
"categories": [
"External analysis"
],
"disable_correlation": true
}
},
"version": 1,
"description": "An Object Template to gather information from evidential or interesting exchange of messages identified during a digital forensic investigation.",
"meta-category": "misc",
"uuid": "6b71f231-c502-467f-bc67-1423cd5bf800",
"name": "tsk-chats"
}

View File

@ -0,0 +1,67 @@
{
"required": [
"URL"
],
"attributes": {
"URL": {
"description": "The URL saved as bookmark.",
"ui-priority": 0,
"misp-attribute": "link"
},
"datetime-bookmarked": {
"description": "date and time when the URL was added to favorites.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"name": {
"description": "Book mark name. ",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"title": {
"description": "Title of the web page",
"ui-priority": 0,
"misp-attribute": "text"
},
"browser": {
"description": "Browser used to access the URL.",
"ui-priority": 0,
"misp-attribute": "text",
"sane_default": [
"IE",
"Safari",
"Chrome",
"Firefox",
"Opera mini",
"Chromium"
],
"disable_correlation": true
},
"domain-name": {
"description": "Domain of the URL.",
"ui-priority": 0,
"misp-attribute": "text"
},
"domain-ip": {
"description": "IP of the URL domain.",
"ui-priority": 0,
"misp-attribute": "ip-src"
},
"additional-comments": {
"description": "Comments.",
"ui-priority": 0,
"misp-attribute": "text",
"categories": [
"External analysis"
],
"disable_correlation": true
}
},
"version": 1,
"description": "An Object Template to add evidential bookmarks identified during a digital forensic investigation.",
"meta-category": "misc",
"uuid": "7d9a88a8-9934-4caa-a85b-f76bc97d5373",
"name": "tsk-web-bookmark"
}

View File

@ -0,0 +1,67 @@
{
"required": [
"URL",
"name",
"value"
],
"attributes": {
"URL": {
"description": "The website URL that created the cookie.",
"ui-priority": 0,
"misp-attribute": "link"
},
"datetime-created": {
"description": "date and time when the cookie was created.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"name": {
"description": "Name of the cookie ",
"ui-priority": 0,
"misp-attribute": "text"
},
"value": {
"description": "Value assigned to the cookie.",
"ui-priority": 0,
"misp-attribute": "text"
},
"browser": {
"description": "Browser on which the cookie was created.",
"ui-priority": 0,
"sane_default": [
"IE",
"Safari",
"Chrome",
"Firefox",
"Opera mini",
"Chromium"
],
"misp-attribute": "text"
},
"domain-name": {
"description": "Domain of the URL that created the cookie.",
"ui-priority": 0,
"misp-attribute": "text"
},
"domain-ip": {
"description": "IP of the domain that created the URL.",
"ui-priority": 0,
"misp-attribute": "ip-src"
},
"additional-comments": {
"description": "Comments.",
"ui-priority": 0,
"misp-attribute": "text",
"categories": [
"External analysis"
],
"disable_correlation": true
}
},
"version": 1,
"description": "An TSK-Autopsy Object Template to represent cookies identified during a forensic investigation.",
"meta-category": "misc",
"uuid": "40d23a4f-43be-4c9e-8328-382a2188eb1d",
"name": "tsk-web-cookie"
}

View File

@ -0,0 +1,55 @@
{
"required": [
"url",
"name"
],
"attributes": {
"url": {
"description": "The URL used to download the file.",
"ui-priority": 0,
"misp-attribute": "url"
},
"datetime-accessed": {
"description": "date and time when the file was downloaded.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"name": {
"description": "Name of the file downloaded.",
"ui-priority": 0,
"misp-attribute": "text"
},
"path-downloadedTo": {
"description": "Location the file was downloaded to.",
"ui-priority": 0,
"misp-attribute": "text"
},
"pathID": {
"description": "Id of the attribute file where the information is gathered from.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"attachment": {
"description": "The downloaded file itself.",
"ui-priority": 1,
"misp-attribute": "attachment",
"disable_correlation": true
},
"additional-comments": {
"description": "Comments.",
"ui-priority": 0,
"misp-attribute": "text",
"categories": [
"External analysis"
],
"disable_correlation": true
}
},
"version": 1,
"description": "An Object Template to add web-downloads",
"meta-category": "file",
"uuid": "ab9603a1-9dcc-48e8-a51c-b8bccc7bcc26",
"name": "tsk-web-downloads"
}

View File

@ -0,0 +1,68 @@
{
"required": [
"URL",
"datetime-accessed"
],
"attributes": {
"URL": {
"description": "The URL accessed.",
"ui-priority": 0,
"misp-attribute": "link"
},
"datetime-accessed": {
"description": "date and the time when the URL was accessed.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"referrer": {
"description": "where the URL was referred from ",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"title": {
"description": "Title of the web page",
"ui-priority": 0,
"misp-attribute": "text"
},
"domain-name": {
"description": "Domain of the URL.",
"ui-priority": 0,
"misp-attribute": "text"
},
"domain-ip": {
"description": "IP of the URL domain.",
"ui-priority": 0,
"misp-attribute": "ip-src"
},
"browser": {
"description": "Browser used to access the URL.",
"ui-priority": 0,
"misp-attribute": "text",
"sane_default": [
"IE",
"Safari",
"Chrome",
"Firefox",
"Opera mini",
"Chromium"
],
"disable_correlation": true
},
"additional-comments": {
"description": "Comments.",
"ui-priority": 0,
"misp-attribute": "text",
"categories": [
"External analysis"
],
"disable_correlation": true
}
},
"version": 1,
"description": "An Object Template to share web history information",
"meta-category": "misc",
"uuid": "e1325e52-e52e-49b1-89ad-d503c127c698",
"name": "tsk-web-history"
}

View File

@ -0,0 +1,66 @@
{
"required": [
"domain",
"text"
],
"attributes": {
"domain": {
"description": "The domain of the search engine.",
"ui-priority": 0,
"misp-attribute": "link",
"sane_default": [
"Google",
"Yahoo",
"Bing",
"Alta Vista",
"MSN"
],
"disable_correlation": true
},
"text": {
"description": "the search word or sentence.",
"ui-priority": 0,
"misp-attribute": "text"
},
"datetime-searched": {
"description": "date and time when the search was conducted.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"browser": {
"description": "Browser used.",
"ui-priority": 0,
"misp-attribute": "text",
"sane_default": [
"IE",
"Safari",
"Chrome",
"Firefox",
"Opera mini",
"Chromium"
],
"disable_correlation": true
},
"username": {
"description": "User name or ID associated with the search.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"additional-comments": {
"description": "Comments.",
"ui-priority": 0,
"misp-attribute": "text",
"categories": [
"External analysis"
],
"disable_correlation": true
}
},
"version": 1,
"description": "An Object Template to share web search query information",
"meta-category": "misc",
"uuid": "16b3f8d0-fd09-4812-a42c-b5aeff2d4c2e",
"name": "tsk-web-search-query"
}

View File

@ -12,6 +12,7 @@
"attributes": {
"sensor": {
"description": "The AIL sensor uuid where the leak was processed and analysed.",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "text"
},
@ -23,6 +24,7 @@
},
"duplicate_number": {
"description": "Number of known duplicates.",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "counter"
},
@ -62,7 +64,7 @@
"misp-attribute": "attachment"
}
},
"version": 8,
"version": 9,
"description": "An information leak as defined by the AIL Analysis Information Leak framework.",
"meta-category": "misc",
"uuid": "dc6a8fa2-0a43-4a0c-a5aa-b1a5336ca80e",

View File

@ -0,0 +1,53 @@
{
"required": [
"expected-asn",
"detected-asn",
"start",
"subnet-announced"
],
"attributes": {
"expected-asn": {
"description": "Expected Autonomous System Number",
"ui-priority": 1,
"misp-attribute": "AS"
},
"detected-asn": {
"description": "Detected Autonomous System Number",
"ui-priority": 1,
"misp-attribute": "AS"
},
"description": {
"description": "BGP Hijack details",
"ui-priority": 1,
"misp-attribute": "text"
},
"country": {
"description": "Country code of the main location of the attacking autonomous system",
"ui-priority": 1,
"misp-attribute": "text"
},
"subnet-announced": {
"description": "Subnet announced",
"ui-priority": 0,
"misp-attribute": "ip-src",
"multiple": true
},
"start": {
"description": "First time the Prefix hijack was seen",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
},
"end": {
"description": "Last time the Prefix hijack was seen",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
}
},
"version": 1,
"description": "Object encapsulating BGP Hijack description as specified, for example, by bgpstream.com",
"meta-category": "network",
"uuid": "42355673-1fab-4908-8045-00bebd91c389",
"name": "bgp-hijack"
}

View File

@ -60,6 +60,40 @@
"ui-priority": 0,
"misp-attribute": "datetime"
},
"last-updated": {
"description": "Last time the balances and totals have been updated",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
},
"current-balance": {
"description": "Current balance of address",
"disable_correlation": true,
"ui-priority": 1,
"misp-attribute": "float",
"recommended": false
},
"total-transactions": {
"description": "Total transactions performed",
"disable_correlation": true,
"ui-priority": 1,
"misp-attribute": "text",
"recommended": false
},
"total-received": {
"description": "Total balance received",
"disable_correlation": true,
"ui-priority": 1,
"misp-attribute": "float",
"recommended": false
},
"total-sent": {
"description": "Total balance sent",
"disable_correlation": true,
"ui-priority": 1,
"misp-attribute": "float",
"recommended": false
},
"text": {
"description": "Free text value",
"disable_correlation": true,

View File

@ -0,0 +1,67 @@
{
"required": [
"level",
"predicate",
"value",
"namespace"
],
"attributes": {
"namespace": {
"categories": [
"External analysis"
],
"description": "Cortex Taxonomy Namespace",
"disable_correlation": true,
"multiple": false,
"ui-priority": 0,
"misp-attribute": "text"
},
"predicate": {
"categories": [
"External analysis"
],
"description": "Cortex Taxonomy Predicate",
"disable_correlation": true,
"multiple": false,
"ui-priority": 0,
"misp-attribute": "text"
},
"value": {
"categories": [
"External analysis"
],
"description": "Cortex Taxonomy Value",
"disable_correlation": true,
"multiple": false,
"ui-priority": 0,
"misp-attribute": "text"
},
"level": {
"categories": [
"External analysis"
],
"description": "Cortex Taxonomy Level",
"disable_correlation": true,
"multiple": false,
"misp-attribute": "text",
"ui-priority": 0,
"values_list": [
"info",
"safe",
"suspicious",
"malicious"
]
},
"cortex_url": {
"description": "URL to the Cortex job",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "link"
}
},
"version": 4,
"description": "Cortex object describing an Cortex Taxonomy (or mini report)",
"meta-category": "misc",
"uuid": "bef7d23b-e796-4d46-803a-32e317896894",
"name": "cortex-taxonomy"
}

View File

@ -0,0 +1,48 @@
{
"requiredOneOf": [
"full"
],
"attributes": {
"summary": {
"description": "Cortex summary object (summary) in JSON",
"disable_correlation": false,
"ui-priority": 0,
"misp-attribute": "text"
},
"full": {
"description": "Cortex report object (full report) in JSON",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "text"
},
"start-date": {
"description": "When the Cortex analyser was started",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
},
"name": {
"description": "Cortex analyser/worker name",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "text"
},
"server-name": {
"description": "Name of the cortex server",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "text"
},
"success": {
"description": "Result of the cortex job",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "boolean"
}
},
"version": 1,
"description": "Cortex object describing a complete cortex analysis. Observables would be attribute with a relationship from this object.",
"meta-category": "misc",
"uuid": "144988f3-fa00-4374-8015-c1a32092f451",
"name": "cortex"
}

View File

@ -30,7 +30,8 @@
"External analysis"
],
"ui-priority": 1,
"misp-attribute": "domain"
"misp-attribute": "domain",
"multiple": true
},
"ip": {
"description": "IP Address",
@ -43,7 +44,7 @@
"multiple": true
}
},
"version": 5,
"version": 6,
"description": "A domain and IP address seen as a tuple in a specific time frame.",
"meta-category": "network",
"uuid": "43b3b146-77eb-4931-b4cc-b66c60f28734",

View File

@ -3,7 +3,7 @@
"uuid": "a0c666e0-fc65-4be8-b48f-3423d788b552",
"meta-category": "network",
"description": "Email object describing an email with meta-information",
"version": 11,
"version": 12,
"attributes": {
"reply-to": {
"description": "Email address the reply will be sent to",
@ -179,7 +179,6 @@
"message-id",
"reply-to",
"send-date",
"url",
"mime-boundary",
"thread-index",
"header",

View File

@ -0,0 +1,39 @@
{
"requiredOneOf": [
"facial-composite",
"text"
],
"attributes": {
"text": {
"description": "A description of the facial composite.",
"disable_correlation": true,
"ui-priority": 1,
"misp-attribute": "text"
},
"technique": {
"description": "Construction technique of the facial composite.",
"ui-priority": 0,
"misp-attribute": "text",
"values_list": [
"E-FIT",
"PROfit",
"Sketch",
"Photofit",
"EvoFIT",
"PortraitPad"
],
"disable_correlation": true
},
"facial-composite": {
"description": "Facial composite image.",
"ui-priority": 10,
"misp-attribute": "attachment",
"multiple": true
}
},
"version": 1,
"description": "An object which describes a facial composite.",
"meta-category": "misc",
"uuid": "d727bc27-d1b9-4754-972c-dea305bd5976",
"name": "facial-composite"
}

View File

@ -4,8 +4,6 @@
"size-in-bytes",
"authentihash",
"ssdeep",
"imphash",
"pehash",
"md5",
"sha1",
"sha224",
@ -18,7 +16,8 @@
"pattern-in-file",
"x509-fingerprint-sha1",
"malware-sample",
"path"
"path",
"fullpath"
],
"attributes": {
"md5": {
@ -98,7 +97,8 @@
"External analysis"
],
"ui-priority": 1,
"misp-attribute": "pattern-in-file"
"misp-attribute": "pattern-in-file",
"multiple": true
},
"text": {
"description": "Free text value to attach to the file",
@ -132,6 +132,12 @@
"ui-priority": 0,
"misp-attribute": "text"
},
"fullpath": {
"description": "Complete path of the filename including the filename",
"multiple": true,
"ui-priority": 0,
"misp-attribute": "text"
},
"tlsh": {
"description": "Fuzzy hash by Trend Micro: Locality Sensitive Hash",
"ui-priority": 0,
@ -164,7 +170,7 @@
]
}
},
"version": 11,
"version": 15,
"description": "File object describing a file with meta-information",
"meta-category": "file",
"uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",

View File

@ -0,0 +1,47 @@
{
"requiredOneOf": [
"case-number"
],
"attributes": {
"case-number": {
"description": "Any unique number assigned to the case for unique identification.",
"ui-priority": 0,
"misp-attribute": "text"
},
"case-name": {
"description": "Name to address the case.",
"ui-priority": 0,
"misp-attribute": "text"
},
"name-of-the-analyst": {
"description": "Name(s) of the analyst assigned to the case.",
"multiple": true,
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"references": {
"description": "External references",
"multiple": true,
"ui-priority": 0,
"misp-attribute": "link"
},
"analysis-start-date": {
"description": "Date when the analysis began.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"additional-comments": {
"description": "Comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
}
},
"version": 1,
"description": "An object template to describe a digital forensic case.",
"meta-category": "misc",
"uuid": "3ea36022-ae93-455e-88b1-d43aca789cac",
"name": "forensic-case"
}

View File

@ -0,0 +1,90 @@
{
"required": [
"case-number",
"evidence-number"
],
"attributes": {
"case-number": {
"description": "A unique number assigned to the case for unique identification.",
"ui-priority": 0,
"misp-attribute": "text"
},
"evidence-number": {
"description": "A unique number assigned to the evidence for unique identification.",
"ui-priority": 0,
"misp-attribute": "text"
},
"type": {
"description": "Evidence type.",
"multiple": true,
"ui-priority": 0,
"misp-attribute": "text",
"sane_default": [
"Computer",
"Network",
"Mobile Device",
"Multimedia",
"Cloud",
"IoT",
"Other"
],
"disable_correlation": true
},
"name": {
"description": "Name of the evidence acquired.",
"ui-priority": 0,
"misp-attribute": "text"
},
"acquisition-method": {
"description": "Method used for acquisition of the evidence.",
"ui-priority": 0,
"misp-attribute": "text",
"sane_default": [
"Live acquisition",
"Dead/Offline acquisition",
"Physical collection",
"Logical collection",
"File system extraction",
"Chip-off",
"Other"
],
"disable_correlation": true
},
"acquisition-tools": {
"description": "Tools used for acquisition of the evidence.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true,
"sane_default": [
"dd",
"dc3dd",
"dcfldd",
"EnCase",
"FTK Imager",
"FDAS",
"TrueBack",
"Guymager",
"IXimager",
"Other"
],
"disable_correlation": true
},
"references": {
"description": "External references",
"multiple": true,
"ui-priority": 0,
"misp-attribute": "link"
},
"additional-comments": {
"description": "Comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
}
},
"version": 2,
"description": "An object template to describe a digital forensic evidence.",
"meta-category": "misc",
"uuid": "fe44c648-63ef-43fc-b3de-af71a2e023e4",
"name": "forensic-evidence"
}

View File

@ -41,7 +41,8 @@
"altitude": {
"description": "The altitude is the decimal value of the altitude in the World Geodetic System 84 (WGS84) reference.",
"ui-priority": 0,
"misp-attribute": "float"
"misp-attribute": "float",
"disable_correlation": true
},
"address": {
"description": "Address.",
@ -63,6 +64,12 @@
"misp-attribute": "text",
"ui-priority": 1
},
"accuracy-radius": {
"description": "The approximate accuracy radius, in kilometers, around the latitude and longitude for the geographical entity (country, subdivision, city or postal code) associated with the related object. (based on geoip2 accuracy of maxmind)",
"misp-attribute": "float",
"ui-priority": 1,
"disable_correlation": true
},
"country": {
"description": "Country.",
"misp-attribute": "text",
@ -71,7 +78,8 @@
"epsg": {
"description": "EPSG Geodetic Parameter value. This is an integer value of the EPSG.",
"misp-attribute": "text",
"ui-priority": 70
"ui-priority": 70,
"disable_correlation": true
},
"spacial-reference": {
"description": "Default spacial or projection refence for this object.",
@ -84,7 +92,7 @@
]
}
},
"version": 3,
"version": 5,
"description": "An object to describe a geographic location.",
"meta-category": "misc",
"uuid": "fdd30d5f-6752-45ed-bef2-25e8ce4d8a3",

View File

@ -51,6 +51,15 @@
"ui-priority": 1,
"misp-attribute": "hostname"
},
"ip": {
"categories": [
"Network activity",
"Payload delivery"
],
"description": "The IP address of the server",
"ui-priority": 1,
"misp-attribute": "ip-dst"
},
"method": {
"categories": [
"Network activity"
@ -111,7 +120,7 @@
"misp-attribute": "user-agent"
}
},
"version": 2,
"version": 3,
"description": "A single HTTP request header",
"meta-category": "network",
"uuid": "b4a8d163-8110-4239-bfcf-e08f3a9fdf7b",

View File

@ -0,0 +1,44 @@
{
"required": [
"identifier"
],
"attributes": {
"identifier": {
"description": "Identifier of the reference. Should be unique in your system.",
"ui-priority": 1,
"misp-attribute": "text",
"categories": [
"Internal reference"
]
},
"comment": {
"description": "Comment associated to the identifier.",
"ui-priority": 0,
"misp-attribute": "comment",
"categories": [
"Internal reference"
]
},
"type": {
"description": "Type of internal reference.",
"ui-priority": 1,
"misp-attribute": "text",
"categories": [
"Internal reference"
]
},
"link": {
"description": "Link associated to the identifier.",
"ui-priority": 1,
"misp-attribute": "link",
"categories": [
"Internal reference"
]
}
},
"version": 2,
"description": "Internal reference.",
"meta-category": "misc",
"uuid": "a3984dc5-5f70-4776-9262-c19641c0ff6a",
"name": "internal-reference"
}

View File

@ -0,0 +1,101 @@
{
"name": "ip-api-address",
"meta-category": "network",
"description": "IP Address information. Useful if you are pulling your ip information from ip-api.com",
"version": 2,
"uuid": "4336f124-6264-4f72-943e-cc3797e4122b",
"attributes": {
"ip-src": {
"description": "Source IP address of the network connection.",
"ui-priority": 1,
"misp-attribute": "ip-src"
},
"asn": {
"description": "Autonomous System Number",
"ui-priority": 1,
"misp-attribute": "AS",
"disable_correlation": true
},
"organization": {
"description": "organization",
"ui-priority": 1,
"misp-attribute": "text",
"disable_correlation": true
},
"ISP": {
"description": "ISP.",
"ui-priority": 1,
"misp-attribute": "text",
"disable_correlation": true
},
"zipcode": {
"description": "Zip Code.",
"misp-attribute": "text",
"ui-priority": 1,
"disable_correlation": true
},
"city": {
"description": "City.",
"misp-attribute": "text",
"ui-priority": 1,
"disable_correlation": true
},
"state": {
"description": "State.",
"misp-attribute": "text",
"ui-priority": 1,
"disable_correlation": true
},
"country": {
"description": "Country name",
"ui-priority": 1,
"misp-attribute": "text",
"disable_correlation": true
},
"country code": {
"description": "Country code ",
"ui-priority": 1,
"misp-attribute": "text",
"disable_correlation": true
},
"region": {
"description": "Region. example: California.",
"misp-attribute": "text",
"ui-priority": 1,
"disable_correlation": true
},
"region code": {
"description": "Region code. example: CA",
"misp-attribute": "text",
"ui-priority": 1,
"disable_correlation": true
},
"latitude": {
"description": "The latitude is the decimal value of the latitude in the World Geodetic System 84 (WGS84) reference.",
"disable_correlation": true,
"ui-priority": 90,
"misp-attribute": "float"
},
"longitude": {
"description": "The longitude is the decimal value of the longitude in the World Geodetic System 84 (WGS84) reference",
"disable_correlation": true,
"ui-priority": 89,
"misp-attribute": "float"
},
"first-seen": {
"description": "First time the ASN was seen",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
},
"last-seen": {
"description": "Last time the ASN was seen",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
}
},
"requiredOneOf": [
"ip-src"
]
}

View File

@ -2,43 +2,27 @@
"name": "ja3",
"meta-category": "network",
"description": "JA3 is a new technique for creating SSL client fingerprints that are easy to produce and can be easily shared for threat intelligence. Fingerprints are composed of Client Hello packet; SSL Version, Accepted Ciphers, List of Extensions, Elliptic Curves, and Elliptic Curve Formats. https://github.com/salesforce/ja3",
"version": 2,
"version": 4,
"uuid": "09b45449-5d6e-492c-a68a-cb2e188cbfac",
"attributes": {
"ja3-fingerprint-md5": {
"description": "Hash identifying source",
"misp-attribute": "md5",
"ui-priority": 1,
"categories": [
"Network activity",
"External analysis"
]
"misp-attribute": "ja3-fingerprint-md5",
"ui-priority": 1
},
"description": {
"description": "Type of detected software ie software, malware",
"misp-attribute": "text",
"ui-priority": 1,
"categories": [
"Network activity",
"External analysis"
]
"ui-priority": 1
},
"ip-src": {
"description": "Source IP Address",
"misp-attribute": "ip-src",
"categories": [
"Network activity",
"External analysis"
],
"ui-priority": 1
},
"ip-dst": {
"description": "Destination IP address",
"misp-attribute": "ip-dst",
"categories": [
"Network activity",
"External analysis"
],
"ui-priority": 1
},
"first-seen": {

View File

@ -0,0 +1,56 @@
{
"requiredOneOf": [
"filepath",
"file_activity",
"datetime"
],
"attributes": {
"file-path": {
"description": "Location of the file on the disc",
"ui-priority": 0,
"misp-attribute": "text"
},
"datetime": {
"description": "Date and time when the operation was conducted on the file",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"file_size": {
"description": "Determines the file size in bytes",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"activityType": {
"description": "Determines the type of activity conducted on the file at a given time",
"ui-priority": 0,
"misp-attribute": "text",
"sane_default": [
"Accessed",
"Created",
"Changed",
"Modified",
"Other"
],
"disable_correlation": true
},
"filePermissions": {
"description": "Describes permissions assigned the file",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"file": {
"description": "Mactime output file",
"ui-priority": 0,
"misp-attribute": "attachment",
"disable_correlation": true
}
},
"version": 3,
"description": "Mactime template, used in forensic investigations to describe the timeline of a file activity",
"meta-category": "file",
"uuid": "9297982e-be62-4772-a665-c91f5a8d639",
"name": "mactime-timeline-analysis"
}

View File

@ -0,0 +1,51 @@
{
"requiredOneOf": [
"config"
],
"attributes": {
"config": {
"description": "Raw (decrypted, decoded) text of the malware configuration.",
"ui-priority": 1,
"misp-attribute": "text"
},
"format": {
"sane_default": [
"JSON",
"yaml",
"INI",
"other"
],
"description": "Original format of the malware configuration.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"encrypted": {
"description": "Encrypted or encoded text of the malware configuration in base64.",
"ui-priority": 1,
"misp-attribute": "text"
},
"password": {
"description": "Password or encryption key used to encrypt the malware configuration.",
"ui-priority": 1,
"misp-attribute": "text"
},
"last-seen": {
"description": "When the malware configuration has been seen for the last time.",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
},
"first-seen": {
"description": "When the malware configuration has been seen for the first time.",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
}
},
"version": 1,
"description": "Malware configuration recovered or extracted from a malicious binary.",
"meta-category": "file",
"uuid": "8200b79b-1d8c-49a8-9a63-7710e613c059",
"name": "malware-config"
}

View File

@ -30,7 +30,7 @@
]
},
"username": {
"description": "Username who posted the microblog post",
"description": "Username who posted the microblog post (without the @ prefix)",
"ui-priority": 0,
"misp-attribute": "text"
},
@ -62,7 +62,7 @@
"misp-attribute": "text"
}
},
"version": 4,
"version": 5,
"description": "Microblog post like a Twitter tweet or a post on a Facebook wall.",
"meta-category": "misc",
"uuid": "8ec8c911-ddbe-4f5b-895b-fbff70c42a60",

View File

@ -3,7 +3,7 @@
"uuid": "af16764b-f8e5-4603-9de1-de34d272f80b",
"meta-category": "network",
"description": "A local or remote network connection.",
"version": 1,
"version": 2,
"attributes": {
"ip-src": {
"description": "Source IP address of the nework connection.",
@ -59,7 +59,8 @@
"ICMP",
"ARP"
],
"misp-attribute": "text"
"misp-attribute": "text",
"disable_correlation": true
},
"layer4-protocol": {
"description": "Layer 4 protocol of the network connection.",
@ -68,7 +69,8 @@
"TCP",
"UDP"
],
"misp-attribute": "text"
"misp-attribute": "text",
"disable_correlation": true
},
"layer7-protocol": {
"description": "Layer 7 protocol of the network connection.",
@ -78,7 +80,8 @@
"HTTPS",
"FTP"
],
"misp-attribute": "text"
"misp-attribute": "text",
"disable_correlation": true
},
"first-packet-seen": {
"misp-attribute": "datetime",

View File

@ -0,0 +1,37 @@
{
"requiredOneOf": [
"imported-sample",
"type"
],
"attributes": {
"imported-sample": {
"description": "The original imported file itself (binary).",
"ui-priority": 1,
"disable_correlation": true,
"misp-attribute": "attachment"
},
"format": {
"description": "Format of data imported.",
"ui-priority": 1,
"disable_correlation": true,
"misp-attribute": "text",
"sane_default": [
"STIX 1.0",
"STIX 1.1",
"STIX 1.2",
"STIX 2.0",
"OpenIOC"
]
},
"uri": {
"description": "URI related to the imported file.",
"ui-priority": 0,
"misp-attribute": "uri"
}
},
"version": 2,
"description": "Object describing the original file used to import data in MISP.",
"meta-category": "file",
"uuid": "4cd560e9-2cfe-40a1-9964-7b2e797ecac5",
"name": "original-imported-file"
}

View File

@ -19,7 +19,9 @@
"codepad.org",
"safebin.net",
"hastebin.com",
"ghostbin.com"
"ghostbin.com",
"paste.ee",
"0bin.net"
],
"description": "Original source of the paste or post.",
"ui-priority": 0,
@ -39,7 +41,12 @@
"url": {
"misp-attribute": "url",
"ui-priority": 0,
"description": "Link to the original source of the paste or post."
"description": "Link to the original source of the paste or post (when used maliciously)."
},
"link": {
"misp-attribute": "link",
"ui-priority": 0,
"description": "Link to the original source of the source or post (when used legitimately for OSINT source or alike)."
},
"last-seen": {
"description": "When the paste has been accessible or seen for the last time.",
@ -54,7 +61,7 @@
"misp-attribute": "datetime"
}
},
"version": 3,
"version": 4,
"description": "Paste or similar post from a website allowing to share privately or publicly posts.",
"meta-category": "misc",
"uuid": "cedc055c-78aa-49a4-bfd7-4cc30cecef12",

View File

@ -0,0 +1,253 @@
{
"requiredOneOf": [
"text",
"first-packet-seen",
"last-packet-seen"
],
"attributes": {
"capture-length": {
"description": "Capture length set on the captured interface.",
"disable_correlation": true,
"ui-priority": 1,
"misp-attribute": "text"
},
"capture-interface": {
"description": "Interface name where the packet capture was running.",
"disable_correlation": true,
"ui-priority": 1,
"misp-attribute": "text"
},
"protocol": {
"description": "Capture protocol (linktype name).",
"disable_correlation": true,
"ui-priority": 1,
"misp-attribute": "text",
"sane_default": [
"PER_PACKET",
"UNKNOWN",
"ETHERNET",
"TOKEN_RING",
"SLIP",
"PPP",
"FDDI",
"FDDI_BITSWAPPED",
"RAW_IP",
"ARCNET",
"ARCNET_LINUX",
"ATM_RFC1483",
"LINUX_ATM_CLIP",
"LAPB",
"ATM_PDUS",
"ATM_PDUS_UNTRUNCATED",
"NULL",
"ASCEND",
"ISDN",
"IP_OVER_FC",
"PPP_WITH_PHDR",
"IEEE_802_11",
"IEEE_802_11_PRISM",
"IEEE_802_11_WITH_RADIO",
"IEEE_802_11_RADIOTAP",
"IEEE_802_11_AVS",
"SLL",
"FRELAY",
"FRELAY_WITH_PHDR",
"CHDLC",
"CISCO_IOS",
"LOCALTALK",
"OLD_PFLOG",
"HHDLC",
"DOCSIS",
"COSINE",
"WFLEET_HDLC",
"SDLC",
"TZSP",
"ENC",
"PFLOG",
"CHDLC_WITH_PHDR",
"BLUETOOTH_H4",
"MTP2",
"MTP3",
"IRDA",
"USER0",
"USER1",
"USER2",
"USER3",
"USER4",
"USER5",
"USER6",
"USER7",
"USER8",
"USER9",
"USER10",
"USER11",
"USER12",
"USER13",
"USER14",
"USER15",
"SYMANTEC",
"APPLE_IP_OVER_IEEE1394",
"BACNET_MS_TP",
"NETTL_RAW_ICMP",
"NETTL_RAW_ICMPV6",
"GPRS_LLC",
"JUNIPER_ATM1",
"JUNIPER_ATM2",
"REDBACK",
"NETTL_RAW_IP",
"NETTL_ETHERNET",
"NETTL_TOKEN_RING",
"NETTL_FDDI",
"NETTL_UNKNOWN",
"MTP2_WITH_PHDR",
"JUNIPER_PPPOE",
"GCOM_TIE1",
"GCOM_SERIAL",
"NETTL_X25",
"K12",
"JUNIPER_MLPPP",
"JUNIPER_MLFR",
"JUNIPER_ETHER",
"JUNIPER_PPP",
"JUNIPER_FRELAY",
"JUNIPER_CHDLC",
"JUNIPER_GGSN",
"LINUX_LAPD",
"CATAPULT_DCT2000",
"BER",
"JUNIPER_VP",
"USB_FREEBSD",
"IEEE802_16_MAC_CPS",
"NETTL_RAW_TELNET",
"USB_LINUX",
"MPEG",
"PPI",
"ERF",
"BLUETOOTH_H4_WITH_PHDR",
"SITA",
"SCCP",
"BLUETOOTH_HCI",
"IPMB",
"IEEE802_15_4",
"X2E_XORAYA",
"FLEXRAY",
"LIN",
"MOST",
"CAN20B",
"LAYER1_EVENT",
"X2E_SERIAL",
"I2C",
"IEEE802_15_4_NONASK_PHY",
"TNEF",
"USB_LINUX_MMAPPED",
"GSM_UM",
"DPNSS",
"PACKETLOGGER",
"NSTRACE_1_0",
"NSTRACE_2_0",
"FIBRE_CHANNEL_FC2",
"FIBRE_CHANNEL_FC2_WITH_FRAME_DELIMS",
"JPEG_JFIF",
"IPNET",
"SOCKETCAN",
"IEEE_802_11_NETMON",
"IEEE802_15_4_NOFCS",
"RAW_IPFIX",
"RAW_IP4",
"RAW_IP6",
"LAPD",
"DVBCI",
"MUX27010",
"MIME",
"NETANALYZER",
"NETANALYZER_TRANSPARENT",
"IP_OVER_IB_SNOOP",
"MPEG_2_TS",
"PPP_ETHER",
"NFC_LLCP",
"NFLOG",
"V5_EF",
"BACNET_MS_TP_WITH_PHDR",
"IXVERIWAVE",
"SDH",
"DBUS",
"AX25_KISS",
"AX25",
"SCTP",
"INFINIBAND",
"JUNIPER_SVCS",
"USBPCAP",
"RTAC_SERIAL",
"BLUETOOTH_LE_LL",
"WIRESHARK_UPPER_PDU",
"STANAG_4607",
"STANAG_5066_D_PDU",
"NETLINK",
"BLUETOOTH_LINUX_MONITOR",
"BLUETOOTH_BREDR_BB",
"BLUETOOTH_LE_LL_WITH_PHDR",
"NSTRACE_3_0",
"LOGCAT",
"LOGCAT_BRIEF",
"LOGCAT_PROCESS",
"LOGCAT_TAG",
"LOGCAT_THREAD",
"LOGCAT_TIME",
"LOGCAT_THREADTIME",
"LOGCAT_LONG",
"PKTAP",
"EPON",
"IPMI_TRACE",
"LOOP",
"JSON",
"NSTRACE_3_5",
"ISO14443",
"GFP_T",
"GFP_F",
"IP_OVER_IB_PCAP",
"JUNIPER_VN",
"USB_DARWIN",
"LORATAP",
"3MB_ETHERNET",
"VSOCK",
"NORDIC_BLE",
"NETMON_NET_NETEVENT",
"NETMON_HEADER",
"NETMON_NET_FILTER",
"NETMON_NETWORK_INFO_EX",
"MA_WFP_CAPTURE_V4",
"MA_WFP_CAPTURE_V6",
"MA_WFP_CAPTURE_2V4",
"MA_WFP_CAPTURE_2V6",
"MA_WFP_CAPTURE_AUTH_V4",
"MA_WFP_CAPTURE_AUTH_V6",
"JUNIPER_ST",
"ETHERNET_MPACKET",
"DOCSIS31_XRA31"
]
},
"text": {
"description": "A description of the packet capture.",
"disable_correlation": true,
"ui-priority": 1,
"misp-attribute": "text"
},
"first-packet-seen": {
"description": "When the first packet has been seen.",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
},
"last-packet-seen": {
"description": "When the last packet has been seen.",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
}
},
"version": 2,
"description": "Network packet capture metadata",
"meta-category": "network",
"uuid": "0784aefa-ec3a-4eca-a431-c31ed7058bd3",
"name": "pcap-metadata"
}

View File

@ -1,7 +1,8 @@
{
"requiredOneOf": [
"first-name",
"last-name"
"last-name",
"alias"
],
"attributes": {
"text": {
@ -94,7 +95,17 @@
"misp-attribute": "redress-number"
},
"social-security-number": {
"description": "Social security number",
"description": "Social security number.",
"ui-priority": 0,
"misp-attribute": "text"
},
"birth-certificate-number": {
"description": "Birth Certificate Number",
"ui-priority": 0,
"misp-attribute": "text"
},
"ofac-identification-number": {
"description": "ofac-identification Number",
"ui-priority": 0,
"misp-attribute": "text"
},
@ -104,9 +115,45 @@
"misp-attribute": "nationality",
"multiple": true,
"disable_correlation": true
},
"nic-hdl": {
"description": "NIC Handle (Network Information Centre handle) of the person.",
"ui-priority": 10,
"misp-attribute": "text",
"multiple": true
},
"phone-number": {
"description": "Phone number of the person.",
"ui-priority": 10,
"misp-attribute": "phone-number",
"multiple": true
},
"fax-number": {
"description": "Fax number of the person.",
"ui-priority": 10,
"misp-attribute": "phone-number",
"multiple": true
},
"address": {
"description": "Postal address of the person.",
"ui-priority": 10,
"misp-attribute": "text",
"multiple": true
},
"e-mail": {
"description": "Email address of the person.",
"ui-priority": 10,
"misp-attribute": "email-src",
"multiple": true
},
"portrait": {
"description": "Portrait of the person.",
"ui-priority": 10,
"misp-attribute": "attachment",
"multiple": true
}
},
"version": 3,
"version": 7,
"description": "An object which describes a person or an identity.",
"meta-category": "misc",
"uuid": "a15b0477-e9d1-4b9c-9546-abe78a4f4248",

View File

@ -0,0 +1,69 @@
{
"requiredOneOf": [
"url"
],
"attributes": {
"url": {
"description": "Original url of the phishing website",
"ui-priority": 1,
"misp-attribute": "url"
},
"phishtank-id": {
"description": "Phishtank ID of the reported phishing",
"ui-priority": 1,
"misp-attribute": "text"
},
"phishtank-detail-url": {
"description": "Phishtank detail URL to the reported phishing",
"misp-attribute": "link",
"ui-priority": 1
},
"submission-time": {
"description": "When the phishing was submitted and/or reported",
"ui-priority": 0,
"misp-attribute": "datetime"
},
"verified": {
"description": "The phishing has been verified by the team handling the phishing",
"ui-priority": 0,
"values_list": [
"No",
"Yes"
],
"misp-attribute": "text",
"disable_correlation": true
},
"verification-time": {
"description": "When the phishing was verified",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"online": {
"description": "If the phishing is online and operational, by default is yes",
"ui-priority": 0,
"values_list": [
"Yes",
"No"
],
"misp-attribute": "text",
"disable_correlation": true
},
"takedown-time": {
"description": "When the phishing was taken down",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"target": {
"description": "Targeted organisation by the phishing",
"ui-priority": 0,
"misp-attribute": "text"
}
},
"version": 1,
"description": "Phishing template to describe a phishing website and its analysis.",
"meta-category": "network",
"uuid": "2dad6f9d-d425-4217-8fda-0b0a2d815307",
"name": "phishing"
}

View File

@ -3,7 +3,7 @@
"uuid": "02aeef94-ac23-455c-addb-731757ceafb5",
"meta-category": "misc",
"description": "Object describing a system process.",
"version": 1,
"version": 3,
"attributes": {
"creation-time": {
"description": "Local date/time at which the process was created.",
@ -25,28 +25,72 @@
"pid": {
"description": "Process ID of the process.",
"ui-priority": 1,
"misp-attribute": "text"
"misp-attribute": "text",
"disable_correlation": true
},
"parent-pid": {
"description": "Process ID of the parent process.",
"ui-priority": 1,
"misp-attribute": "text"
"misp-attribute": "text",
"disable_correlation": true
},
"child-pid": {
"description": "Process ID of the child(ren) process.",
"ui-priority": 1,
"misp-attribute": "text",
"multiple": true
"multiple": true,
"disable_correlation": true
},
"port": {
"description": "Port(s) owned by the process.",
"ui-priority": 1,
"misp-attribute": "src-port",
"multiple": true
"multiple": true,
"disable_correlation": true
},
"command-line": {
"description": "Command line of the process",
"ui-priority": 1,
"misp-attribute": "text"
},
"current-directory": {
"description": "Current working directory of the process",
"ui-priority": 2,
"misp-attribute": "filename",
"disable_correlation": true
},
"image": {
"description": "Path of process image",
"ui-priority": 1,
"misp-attribute": "filename"
},
"parent-command-line": {
"description": "Command line of the parent process",
"ui-priority": 1,
"misp-attribute": "text"
},
"parent-image": {
"description": "Path of parent process image",
"ui-priority": 1,
"misp-attribute": "filename"
},
"user": {
"description": "User context of the process",
"ui-priority": 2,
"misp-attribute": "text",
"disable_correlation": true
},
"integrity-level": {
"description": "Integrity level of the process",
"ui-priority": 2,
"misp-attribute": "text",
"disable_correlation": true
}
},
"requiredOneOf": [
"name",
"pid"
"pid",
"image",
"command-line"
]
}

View File

@ -0,0 +1,171 @@
{
"required": [
"source",
"type",
"name"
],
"attributes": {
"event-id": {
"description": "A unique number which identifies the event.",
"ui-priority": 1,
"misp-attribute": "text",
"disable_correlation": true
},
"name": {
"description": "Name of the event.",
"ui-priority": 2,
"misp-attribute": "text",
"disable_correlation": true
},
"event-channel": {
"description": " Channel through which the event occurred",
"ui-priority": 3,
"misp-attribute": "text",
"disable_correlation": true,
"sane_default": [
"Application",
"System",
"Security",
"Setup",
"other"
]
},
"event-type": {
"description": "Event-type assigned to the event",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true,
"sane_default": [
"Admin",
"Operational",
"Audit",
"Analytic",
"Debug",
"other"
]
},
"source": {
"description": "The source of the event log - application/software that logged the event.",
"ui-priority": 0,
"misp-attribute": "text"
},
"event-date-time": {
"description": "Date and time when the event was logged.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"level": {
"description": "Determines the event severity.",
"ui-priority": 0,
"misp-attribute": "text",
"sane_default": [
"Information",
"Warning",
"Error",
"Critical",
"Success Audit",
"Failure Audit"
]
},
"Computer": {
"description": "Computer name on which the event occurred",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"User": {
"description": "Name or the User ID the event is associated with.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"Operational-code": {
"description": "The opcode (numeric value or name) associated with the activity carried out by the event.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"log": {
"description": "Log file where the event was recorded.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"task-category": {
"description": "Activity by the event publisher",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"Keywords": {
"description": "Tags used for the event for the purpose of filtering or searching.",
"ui-priority": 0,
"misp-attribute": "text",
"sane_default": [
"Network",
"Security",
"Resource not found",
"other"
]
},
"Processor-ID": {
"description": "ID of the processor that processed the event.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"Thread-ID": {
"description": "Thread id that generated the event.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"Session-ID": {
"description": "Terminal server session ID.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"Correlation-ID": {
"description": "Unique activity identity which relates the event to a process. ",
"ui-priority": 0,
"misp-attribute": "text"
},
"Relative-Correlation-ID": {
"description": "Related activity ID which identity similar activities which occurred as a part of the event.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"kernel-time": {
"description": "Execution time of the kernel mode instruction.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"user-time": {
"description": "Date and time when the user instruction was executed.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"Event-data": {
"description": "Event data description.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"comment": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
}
},
"version": 1,
"description": "Event log object template to share information of the activities conducted on a system. ",
"meta-category": "misc",
"uuid": "94e3aee9-cb99-4503-9bf6-7da3db5de55e",
"name": "python-etvx-event-log"
}

View File

@ -0,0 +1,98 @@
{
"required": [
"key"
],
"requiredOneOf": [
"logon-user-name"
],
"attributes": {
"key": {
"description": "Registry key where the information is retrieved from.",
"ui-priority": 0,
"misp-attribute": "text"
},
"key-last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"logon-user-name": {
"description": "Name assigned to the user profile.",
"ui-priority": 0,
"misp-attribute": "text"
},
"recent-folders-accessed": {
"description": "List of recent folders accessed by the user.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"recent-files-accessed": {
"description": "List of recent files accessed by the user.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"typed-urls": {
"description": "Urls typed by the user in internet explorer",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"applications-installed": {
"description": "List of applications installed.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"applications-run": {
"description": "List of applications set to run on the system.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"external-devices": {
"description": "List of external devices connected to the system by the user.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"user-init": {
"description": "Applications or processes set to run when the user logs onto the windows system.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"nukeOnDelete": {
"description": "Determines if the Recycle bin option has been disabled.",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"network-connected-to": {
"description": "List of networks the user connected the system to.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"mount-points": {
"description": "Details of the mount points created on the system.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true,
"disable_correlation": true
},
"comments": {
"description": "Additional information related to the user profile",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
}
},
"version": 1,
"description": "Regripper Object template designed to present user specific configuration details extracted from the NTUSER.dat hive.",
"meta-category": "misc",
"uuid": "f9dc7b7e-8ab1-4dde-95d9-67e41b461c65",
"name": "regripper-NTUser"
}

View File

@ -0,0 +1,68 @@
{
"required": [
"key"
],
"requiredOneOf": [
"user-name",
"last-login-time",
"login-count"
],
"attributes": {
"key": {
"description": "Registry key where the information is retrieved from.",
"ui-priority": 0,
"misp-attribute": "text"
},
"key-last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"user-name": {
"description": "User name assigned to the user profile.",
"ui-priority": 0,
"misp-attribute": "text"
},
"full-user-name": {
"description": "Full name assigned to the user profile.",
"ui-priority": 0,
"misp-attribute": "text"
},
"last-login-time": {
"description": "Date and time when the user last logged onto the system.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"pwd-reset-time": {
"description": "Date and time when the password was last reset.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"pwd-fail-date": {
"description": "Date and time when a password last failed for this user profile.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"login-count": {
"description": "Number of times the user logged-in onto the system.",
"ui-priority": 0,
"misp-attribute": "counter",
"disable_correlation": true
},
"comments": {
"description": "Full name assigned to the user profile.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
}
},
"version": 1,
"description": "Regripper Object template designed to present user profile details extracted from the SAM hive.",
"meta-category": "misc",
"uuid": "112efd9a-2137-4198-92ed-7c91043e2cd4",
"name": "regripper-sam-hive-single-user"
}

View File

@ -0,0 +1,54 @@
{
"required": [
"key"
],
"requiredOneOf": [
"group-name"
],
"attributes": {
"key": {
"description": "Registry key where the information is retrieved from.",
"ui-priority": 0,
"misp-attribute": "text"
},
"key-last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"group-name": {
"description": "Name assigned to the profile.",
"ui-priority": 0,
"misp-attribute": "text"
},
"full-name": {
"description": "Full name assigned to the profile.",
"ui-priority": 0,
"misp-attribute": "text"
},
"last-write-date-time": {
"description": "Date and time when the group key was updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"group-comment": {
"description": "Any group comment added.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"group-users": {
"description": "Users belonging to the group",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
}
},
"version": 1,
"description": "Regripper Object template designed to present group profile details extracted from the SAM hive.",
"meta-category": "misc",
"uuid": "b924bae1-2dec-4d2d-a8c2-b03305222b7c",
"name": "regripper-sam-hive-user-group"
}

View File

@ -0,0 +1,59 @@
{
"required": [
"key",
"BHO-name"
],
"attributes": {
"key": {
"description": "Software hive key where the information is retrieved from.",
"ui-priority": 0,
"misp-attribute": "text"
},
"last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"BHO-name": {
"description": "Name of the browser helper object.",
"ui-priority": 0,
"misp-attribute": "text"
},
"BHO-key-last-write-time": {
"description": "Date and time when the BHO key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"class": {
"description": "Class to which the BHO belongs to.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"module": {
"description": "DLL module the BHO belongs to.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"comments": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"references": {
"description": "References to the BHO.",
"ui-priority": 0,
"misp-attribute": "link",
"multiple": true
}
},
"version": 1,
"description": "Regripper Object template designed to gather information of the browser helper objects installed on the system.",
"meta-category": "misc",
"uuid": "e7b46b5a-d2d2-4a05-bc25-2ac8d4683ae2",
"name": "regripper-software-hive-BHO"
}

View File

@ -0,0 +1,53 @@
{
"required": [
"key",
"DLL-name",
"DLL-path"
],
"attributes": {
"key": {
"description": "Software hive key where the information is retrieved from.",
"ui-priority": 0,
"misp-attribute": "text"
},
"last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"DLL-name": {
"description": "Name of the DLL file.",
"ui-priority": 0,
"misp-attribute": "text"
},
"DLL-path": {
"description": "Path where the DLL file is stored.",
"ui-priority": 0,
"misp-attribute": "text"
},
"DLL-last-write-time": {
"description": "Date and time when the DLL file was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"comments": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"references": {
"description": "References to the DLL file.",
"ui-priority": 0,
"misp-attribute": "link",
"multiple": true
}
},
"version": 1,
"description": "Regripper Object template designed to gather information of the DLL files installed on the system.",
"meta-category": "misc",
"uuid": "7893be05-8398-451e-ab1e-5e25ea4a8859",
"name": "regripper-software-hive-appInit-DLLS"
}

View File

@ -0,0 +1,49 @@
{
"required": [
"key",
"executable-file-name",
"path"
],
"attributes": {
"key": {
"description": "Software hive key where the information is retrieved from.",
"ui-priority": 0,
"misp-attribute": "text"
},
"last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"executable-file-name": {
"description": "Name of the executable file.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"path": {
"description": "Path of the executable file.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"comments": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"references": {
"description": "References to the application installed.",
"ui-priority": 0,
"misp-attribute": "link",
"multiple": true
}
},
"version": 1,
"description": "Regripper Object template designed to gather information of the application paths.",
"meta-category": "misc",
"uuid": "9f2d3c9b-9a82-42a7-82c2-733115d101c8",
"name": "regripper-software-hive-application-paths"
}

View File

@ -0,0 +1,57 @@
{
"required": [
"key",
"app-name"
],
"attributes": {
"key": {
"description": "Software hive key where the information is retrieved from.",
"ui-priority": 0,
"misp-attribute": "text"
},
"key-path": {
"description": "Path of the key.",
"ui-priority": 0,
"misp-attribute": "text"
},
"last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"app-name": {
"description": "Name of the application.",
"ui-priority": 0,
"misp-attribute": "text"
},
"app-last-write-time": {
"description": "Date and time when the application key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"version": {
"description": "Version of the application.",
"ui-priority": 0,
"misp-attribute": "text"
},
"comments": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"references": {
"description": "References to the application installed.",
"ui-priority": 0,
"misp-attribute": "link",
"multiple": true
}
},
"version": 1,
"description": "Regripper Object template designed to gather information of the applications installed on the system.",
"meta-category": "misc",
"uuid": "7a8fb6b4-cbbd-4de5-b893-7b0a5c4858cd",
"name": "regripper-software-hive-applications-installed"
}

View File

@ -0,0 +1,55 @@
{
"required": [
"key",
"shell",
"shell-path"
],
"attributes": {
"key": {
"description": "Software hive key where the information is retrieved from.",
"ui-priority": 0,
"misp-attribute": "text"
},
"last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"shell": {
"description": "Type of shell used to execute the command.",
"ui-priority": 0,
"misp-attribute": "text",
"sane_default": [
"exe",
"cmd",
"bat",
"hta",
"pif",
"Other"
],
"disable_correlation": true
},
"shell-path": {
"description": "Path of the shell.",
"ui-priority": 0,
"misp-attribute": "text"
},
"command": {
"description": "Command executed.",
"ui-priority": 0,
"misp-attribute": "text"
},
"comments": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
}
},
"version": 1,
"description": "Regripper Object template designed to gather information of the shell commands executed on the system.",
"meta-category": "misc",
"uuid": "a7dc3697-89ce-46dc-a64d-0b1015457978",
"name": "regripper-software-hive-command-shell"
}

View File

@ -0,0 +1,126 @@
{
"required": [
"win-cv-path",
"CurrentVersion"
],
"attributes": {
"win-cv-path": {
"description": "key where the windows information is retrieved from",
"ui-priority": 0,
"misp-attribute": "text"
},
"last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"RegisteredOrganization": {
"description": "Name of the registered organization.",
"ui-priority": 0,
"misp-attribute": "text"
},
"RegisteredOwner": {
"description": "Name of the registered owner.",
"ui-priority": 0,
"misp-attribute": "text"
},
"CurrentVersion": {
"description": "Current version of windows",
"ui-priority": 0,
"disable_correlation": true,
"misp-attribute": "text"
},
"CurrentBuild": {
"description": "Build number of the windows OS.",
"ui-priority": 0,
"misp-attribute": "text"
},
"SoftwareType": {
"description": "Software type of windows.",
"ui-priority": 0,
"sane_default": [
"System",
"Application",
"other"
],
"misp-attribute": "text",
"disable_correlation": true
},
"InstallationType": {
"description": "Type of windows installation.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"InstallDate": {
"description": "Date when windows was installed.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"SystemRoot": {
"description": "Root directory.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"PathName": {
"description": "Path to the root directory.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"EditionID": {
"description": "Windows edition.",
"ui-priority": 0,
"misp-attribute": "text"
},
"ProductName": {
"description": "Name of the windows version.",
"ui-priority": 0,
"misp-attribute": "text"
},
"ProductID": {
"description": "ID of the product version.",
"ui-priority": 0,
"misp-attribute": "text"
},
"CSDVersion": {
"description": "Version of the service pack installed.",
"ui-priority": 0,
"misp-attribute": "text"
},
"CurrentBuildType": {
"description": "Current build type of the OS.",
"ui-priority": 0,
"misp-attribute": "text"
},
"BuildLab": {
"description": "Windows BuildLab string.",
"ui-priority": 0,
"misp-attribute": "text"
},
"BuildGUID": {
"description": "Build ID.",
"ui-priority": 0,
"misp-attribute": "text"
},
"BuildLabEx": {
"description": "Windows BuildLabEx string.",
"ui-priority": 0,
"misp-attribute": "text"
},
"comment": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "comment",
"disable_correlation": true
}
},
"version": 1,
"description": "Regripper Object template designed to gather general windows information extracted from the software-hive.",
"meta-category": "misc",
"uuid": "03200c25-4bf5-4282-9852-001a51ab20f1",
"name": "regripper-software-hive-windows-general-info"
}

View File

@ -0,0 +1,63 @@
{
"required": [
"key",
"application-name",
"application-path"
],
"attributes": {
"key": {
"description": "Software hive key where the information is retrieved from.",
"ui-priority": 0,
"sane_default": [
"Run",
"RunOnce",
"Runservices",
"Terminal",
"Other"
],
"misp-attribute": "text",
"disable_correlation": true
},
"key-path": {
"description": "Path of the key.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"application-name": {
"description": "Name of the application run.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"application-path": {
"description": "Path where the application is installed.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"comments": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"references": {
"description": "References to the applications.",
"ui-priority": 0,
"misp-attribute": "link",
"multiple": true
}
},
"version": 1,
"description": "Regripper Object template designed to gather information of the applications set to run on the system.",
"meta-category": "misc",
"uuid": "4bae06d1-3996-4028-88ec-7c7d54cc1d94",
"name": "regripper-software-hive-software-run"
}

View File

@ -0,0 +1,160 @@
{
"required": [
"user-profile-key-path",
"SID"
],
"attributes": {
"user-profile-key-path": {
"description": "key where the user-profile information is retrieved from.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"user-profile-key-last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"user-profile-path": {
"description": "Path of the user profile on the system",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"SID": {
"description": "Security identifier assigned to the user profile.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"user-profile-last-write-time": {
"description": "Date and time when the user profile was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"winlogon-key-path": {
"description": "winlogon key referred in order to retrieve default user information",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"winlogon-key-last-write-time": {
"description": "Date and time when the winlogon key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"DefaultUserName": {
"description": "user-name of the default user.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"Shell": {
"description": "Shell set to run when the user logs onto the system.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true,
"multiple": true
},
"UserInit": {
"description": "Applications and files set to run when the user logs onto the system (User logon activity).",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
},
"Legal-notice-caption": {
"description": "Message title set to display when the user logs-in.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true,
"disable_correlation": true
},
"Legal-notice-text": {
"description": "Message set to display when the user logs-in.",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true,
"disable_correlation": true
},
"PreCreateKnownFolders": {
"description": "create known folders key",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"ReportBootOk": {
"description": "Flag to check if the reboot was successful.",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"AutoRestartShell": {
"description": "Value of the flag set to auto restart the shell if it crashes or shuts down automatically.",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"PasswordExpiryWarining": {
"description": "Number of times the password expiry warning appeared.",
"ui-priority": 0,
"misp-attribute": "counter",
"disable_correlation": true
},
"PowerdownAfterShutDown": {
"description": "Flag value- if the system is set to power down after it is shutdown.",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"ShutdownWithoutLogon": {
"description": "Value of the flag set to enable shutdown without requiring a user to login.",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"WinStationsDisabled": {
"description": "Flag value set to enable/disable logons to the system.",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"DisableCAD": {
"description": "Flag to determine if user login is enabled by pressing Ctrl+ALT+Delete.",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"AutoAdminLogon": {
"description": "Flag value to determine if autologon is enabled for a user without entering the password.",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"CachedLogonCount": {
"description": "Number of times the user has logged into the system.",
"ui-priority": 0,
"misp-attribute": "counter",
"disable_correlation": true
},
"ShutdownFlags": {
"description": "Number of times shutdown is initiated from a process when the user is logged-in.",
"ui-priority": 0,
"misp-attribute": "counter",
"disable_correlation": true
},
"Comments": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
}
},
"version": 1,
"description": "Regripper Object template designed to gather user profile information when the user logs onto the system, gathered from the software hive.",
"meta-category": "misc",
"uuid": "df03d0e4-3e6b-4e56-951a-142eae4cad59",
"name": "regripper-software-hive-userprofile-winlogon"
}

View File

@ -0,0 +1,50 @@
{
"required": [
"profile"
],
"attributes": {
"profile": {
"description": "Firewall Profile type",
"ui-priority": 0,
"sane_default": [
"Domain Profile",
"Standard Profile",
"Network Profile",
"Public Profile",
"Private Profile",
"other"
],
"misp-attribute": "text",
"disable_correlation": true
},
"last-write-time": {
"description": "Date and time when the firewall profile policy was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"enbled-firewall": {
"description": "Boolean flag to determine if the firewall is enabled.",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"disable-notification": {
"description": "Boolean flag to determine if firewall notifications are enabled.",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"comment": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
}
},
"version": 1,
"description": "Regripper Object template designed to present firewall configuration information extracted from the system-hive.",
"meta-category": "misc",
"uuid": "d9839b3c-c013-4ba7-b5e5-2787198b9e07",
"name": "regripper-system-hive-firewall-configuration"
}

View File

@ -0,0 +1,89 @@
{
"required": [
"computer-name"
],
"attributes": {
"computer-name": {
"description": "name of the computer under analysis",
"ui-priority": 0,
"misp-attribute": "text"
},
"last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"shutdown-time": {
"description": "Date and time when the system was shutdown.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"timezone-last-write-time": {
"description": "Date and time when the timezone key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"timezone-bias": {
"description": "Offset in minutes from UTC. Offset added to the local time to get a UTC value.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"timezone-standard-name": {
"description": "Timezone standard name used during non-daylight saving months.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"timezone-standard-date": {
"description": "Standard date - non daylight saving months",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"timezone-standard-bias": {
"description": "value in minutes to be added to the value of timezone-bias to generate the bias used during standard time.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"timezone-daylight-name": {
"description": "Timezone name used during daylight saving months.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"timezone-daylight-date": {
"description": "Daylight date - daylight saving months",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"timezone-daylight-bias": {
"description": "value in minutes to be added to the value of timezone-bias to generate the bias used during daylight time.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"fDenyTSConnections:": {
"description": "Specifies whether remote connections are enabled or disabled on the system.",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"comment": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "",
"disable_correlation": true
}
},
"version": 1,
"description": "Regripper Object template designed to present general system properties extracted from the system-hive.",
"meta-category": "misc",
"uuid": "5ac85401-cbf1-4d05-a85e-1784546881e4",
"name": "regripper-system-hive-general-configuration"
}

View File

@ -0,0 +1,106 @@
{
"required": [
"network-key"
],
"attributes": {
"network-key": {
"description": "Registry key assigned to the network",
"ui-priority": 0,
"misp-attribute": "text"
},
"network-key-last-write-time": {
"description": "Date and time when the network key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"network-key-path": {
"description": "Path of the key where the information is retrieved from.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"TCPIP-key": {
"description": "TCPIP key",
"ui-priority": 0,
"misp-attribute": "text"
},
"TCPIP-key-last-write-time": {
"description": "Datetime when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"DHCP-domain": {
"description": "Name of the DHCP domain service",
"ui-priority": 0,
"misp-attribute": "text"
},
"DHCP-IP-address": {
"description": "DHCP service - IP address",
"ui-priority": 0,
"misp-attribute": "ip-dst"
},
"DHCP-subnet-mask": {
"description": "DHCP subnet mask - IP address.",
"ui-priority": 0,
"misp-attribute": "ip-dst"
},
"DHCP-name-server": {
"description": "DHCP Name server - IP address.",
"ui-priority": 0,
"misp-attribute": "ip-dst"
},
"DHCP-server": {
"description": "DHCP server - IP address.",
"ui-priority": 0,
"misp-attribute": "ip-dst"
},
"interface-GUID": {
"description": "GUID value assigned to the interface.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"interface-last-write-time": {
"description": "Last date and time when the interface key was updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"interface-name": {
"description": "Name of the interface.",
"ui-priority": 0,
"misp-attribute": "text"
},
"interface-PnpInstanceID": {
"description": "Plug and Play instance ID assigned to the interface.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"interface-MediaSubType": {
"description": "",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"interface-IPcheckingEnabled": {
"description": "",
"ui-priority": 0,
"misp-attribute": "boolean",
"disable_correlation": true
},
"additional-comments": {
"description": "Comments.",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
}
},
"version": 1,
"description": "Regripper object template designed to gather network information from the system-hive.",
"meta-category": "misc",
"uuid": "a5a3ba3a-ba2e-42a4-be45-b36809ae56f0",
"name": "regripper-system-hive-network-information."
}

View File

@ -0,0 +1,98 @@
{
"required": [
"name"
],
"attributes": {
"name": {
"description": "name of the key",
"ui-priority": 0,
"misp-attribute": "text"
},
"last-write-time": {
"description": "Date and time when the key was last updated.",
"ui-priority": 0,
"misp-attribute": "datetime",
"disable_correlation": true
},
"display": {
"description": "Display name/information of the service or the driver.",
"ui-priority": 0,
"misp-attribute": "text"
},
"image-path": {
"description": "Path of the service/drive",
"ui-priority": 0,
"misp-attribute": "text"
},
"type": {
"description": "Service/driver type.",
"ui-priority": 0,
"sane_default": [
"Kernel driver",
"File system driver",
"Own process",
"Share process",
"Interactive",
"Other"
],
"misp-attribute": "text",
"disable_correlation": true
},
"start": {
"description": "When the service/driver starts or executes.",
"ui-priority": 0,
"sane_default": [
"Boot start",
"System start",
"Auto start",
"Manual",
"Disabled"
],
"misp-attribute": "text",
"disable_correlation": true
},
"group": {
"description": "Group to which the system/driver belong to.",
"ui-priority": 0,
"sane_default": [
"Base",
"Boot Bus Extender",
"Boot File System",
"Cryptography",
"Extended base",
"Event Log",
"Filter",
"FSFilter Bottom",
"FSFilter Infrastructure",
"File System",
"FSFilter Virtualization",
"Keyboard Port",
"Network",
"NDIS",
"Parallel arbitrator",
"Pointer Port",
"PnP Filter",
"ProfSvc_Group",
"PNP_TDI",
"SCSI Miniport",
"SCSI CDROM Class",
"System Bus Extender",
"Video Save",
"other"
],
"misp-attribute": "text",
"disable_correlation": true
},
"comment": {
"description": "Additional comments.",
"ui-priority": 0,
"misp-attribute": "",
"disable_correlation": true
}
},
"version": 1,
"description": "Regripper Object template designed to gather information regarding the services/drivers from the system-hive.",
"meta-category": "misc",
"uuid": "78cdae45-2061-4b49-b1d6-71f562094a73",
"name": "regripper-system-hive-services-drivers"
}

View File

@ -10,7 +10,8 @@
"categories": [
"Other",
"Internal reference"
]
],
"multiple": true
},
"case-number": {
"description": "Case number",

View File

@ -0,0 +1,80 @@
{
"required": [
"project",
"scanning_ip"
],
"attributes": {
"project": {
"description": "Description of scanning project",
"ui-priority": 1,
"disable_correlation": true,
"misp-attribute": "text"
},
"scanning_ip": {
"description": "IP address used by project",
"categories": [
"Network activity",
"External analysis"
],
"ui-priority": 1,
"misp-attribute": "ip-src",
"multiple": true
},
"domain": {
"description": "Domain related to project",
"ui-priority": 1,
"multiple": true,
"misp-attribute": "domain"
},
"asn": {
"description": "Autonomous System Number related to project",
"ui-priority": 0,
"disable_correlation": true,
"misp-attribute": "AS"
},
"scheduled_start": {
"description": "Scheduled start of scanning activity",
"disable_correlation": true,
"ui-priority": 1,
"multiple": true,
"misp-attribute": "datetime"
},
"scheduled_end": {
"description": "Scheduled end of scanning activity",
"disable_correlation": true,
"ui-priority": 0,
"multiple": true,
"misp-attribute": "datetime"
},
"contact_email": {
"description": "Project contact information",
"disable_correlation": true,
"categories": [
"Network activity",
"Social network"
],
"ui-priority": 1,
"misp-attribute": "email-dst",
"multiple": true
},
"contact_phone": {
"description": "Phone number related to project",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "phone-number",
"multiple": true
},
"project_url": {
"description": "URL related to project",
"disable_correlation": true,
"ui-priority": 1,
"misp-attribute": "link",
"multiple": true
}
},
"version": 20190102,
"description": "Information related to known scanning activity (e.g. from research projects)",
"meta-category": "network",
"uuid": "d690e956-fc8a-11e8-8eb2-f2801f1b9fd1",
"name": "research-scanner"
}

View File

@ -44,6 +44,16 @@
"ui-priority": 0,
"misp-attribute": "text"
},
"sandbox-file": {
"description": "File related to sandbox run",
"misp-attribute": "attachment",
"disable_correlation": true,
"ui-priority": 1,
"categories": [
"External analysis"
],
"multiple": true
},
"sandbox-type": {
"description": "The type of sandbox used",
"misp-attribute": "text",
@ -92,7 +102,7 @@
]
}
},
"version": 1,
"version": 2,
"description": "Sandbox report",
"meta-category": "misc",
"uuid": "4d3fffd2-cd07-4357-96e0-a51c988faaef",

View File

@ -0,0 +1,26 @@
{
"required": [
"datetime",
"message"
],
"attributes": {
"datetime": {
"description": "datetime of the message",
"disable_correlation": true,
"ui-priority": 1,
"misp-attribute": "datetime",
"recommended": true
},
"message": {
"description": "message",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "text"
}
},
"version": 1,
"description": "A timesketch message entry.",
"meta-category": "misc",
"uuid": "ef27fb19-7e71-43e0-b6f6-6f03ab67666f",
"name": "timesketch_message"
}

View File

@ -0,0 +1,58 @@
{
"requiredOneOf": [
"id"
],
"attributes": {
"id": {
"description": "Tracking code",
"ui-priority": 1,
"misp-attribute": "text"
},
"tracker": {
"description": "Name of the tracker - organisation doing the tracking and/or analytics",
"ui-priority": 1,
"misp-attribute": "text",
"sane_default": [
"Google Analytics",
"Piwik",
"Kissmetrics",
"Woopra",
"Chartbeat"
]
},
"description": {
"description": "Description of the tracking id",
"ui-priority": 1,
"misp-attribute": "text"
},
"url": {
"description": "URL where the tracking id was found",
"ui-priority": 1,
"multiple": true,
"misp-attribute": "url"
},
"hostname": {
"description": "hostname where the tracking id was found",
"ui-priority": 0,
"misp-attribute": "hostname",
"multiple": true
},
"first-seen": {
"description": "First time the tracking code was seen",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
},
"last-seen": {
"description": "Last time the tracking code was seen",
"disable_correlation": true,
"ui-priority": 0,
"misp-attribute": "datetime"
}
},
"version": 2,
"description": "Analytics and tracking ID such as used in Google Analytics or other analytic platform.",
"meta-category": "network",
"uuid": "3681c62a-2c75-48d8-99f2-6a3444ce2393",
"name": "tracking-id"
}

View File

@ -1,6 +1,7 @@
{
"required": [
"url"
"requiredOneOf": [
"url",
"resource_path"
],
"attributes": {
"fragment": {
@ -95,7 +96,7 @@
"misp-attribute": "hostname"
}
},
"version": 6,
"version": 7,
"description": "url object describes an url along with its normalized field (like extracted using faup parsing library) and its metadata.",
"meta-category": "network",
"uuid": "60efb77b-40b5-4c46-871b-ed1ed999fce5",

View File

@ -0,0 +1,52 @@
{
"requiredOneOf": [
"description",
"year",
"make",
"model",
"license-plate-number",
"vin"
],
"attributes": {
"description": {
"description": "Description of the vehicle",
"ui-priority": 1,
"misp-attribute": "text",
"disable_correlation": true
},
"year": {
"description": "Year of manufacturing of the vehicle",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"make": {
"description": "Manufacturer of the vehicle",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"model": {
"description": "Model of the vehicle",
"ui-priority": 0,
"misp-attribute": "text",
"disable_correlation": true
},
"vin": {
"description": "Vehicle identification number (VIN)",
"ui-priority": 0,
"misp-attribute": "text"
},
"license-plate-number": {
"description": "License plate number",
"ui-priority": 0,
"misp-attribute": "text",
"multiple": true
}
},
"version": 1,
"description": "Vehicle object template to describe a vehicle information and registration",
"meta-category": "misc",
"uuid": "683c076c-f695-4ff2-8efa-e98a418049f4",
"name": "vehicle"
}

View File

@ -1,6 +1,8 @@
{
"requiredOneOf": [
"name"
"name",
"regions",
"sectors"
],
"attributes": {
"description": {

View File

@ -1,12 +1,13 @@
{
"version": 12,
"version": 14,
"values": [
{
"name": "derived-from",
"description": "The information in the target object is based on information from the source object.",
"format": [
"misp",
"stix-2.0"
"stix-2.0",
"alfred"
]
},
{
@ -22,7 +23,8 @@
"description": "The referenced source is related to the target object.",
"format": [
"misp",
"stix-2.0"
"stix-2.0",
"alfred"
]
},
{
@ -46,7 +48,8 @@
"description": "The referenced source is containing the target object.",
"format": [
"misp",
"stix-1.1"
"stix-1.1",
"alfred"
]
},
{
@ -182,12 +185,13 @@
"description": "This relationship describes the use by the source object of the target object.",
"format": [
"misp",
"stix-2.0"
"stix-2.0",
"alfred"
]
},
{
"name": "indicates",
"description": "This relationships describes that the source object indicates the target object.",
"description": "This relationship describes that the source object indicates the target object.",
"format": [
"misp",
"stix-2.0"
@ -206,7 +210,8 @@
"description": "This relationship describes a source object which is a variant of the target object",
"format": [
"misp",
"stix-2.0"
"stix-2.0",
"alfred"
]
},
{
@ -259,13 +264,6 @@
"misp"
]
},
{
"name": "dropped-by",
"description": "This relationship describes an object dropped by another object.",
"format": [
"misp"
]
},
{
"name": "drops",
"description": "This relationship describes an object which drops another object",
@ -284,14 +282,16 @@
"name": "affects",
"description": "This relationship describes an object affected by another object.",
"format": [
"misp"
"misp",
"alfred"
]
},
{
"name": "beacons-to",
"description": "This relationship describes an object beaconing to another object.",
"format": [
"misp"
"misp",
"alfred"
]
},
{
@ -305,21 +305,24 @@
"name": "exfiltrates-to",
"description": "This relationship describes an object exfiltrating to another object.",
"format": [
"misp"
"misp",
"alfred"
]
},
{
"name": "identifies",
"description": "This relationship describes an object which identifies another object.",
"format": [
"misp"
"misp",
"alfred"
]
},
{
"name": "intercepts",
"description": "This relationship describes an object which intercepts another object.",
"format": [
"misp"
"misp",
"alfred"
]
},
{
@ -578,7 +581,8 @@
"name": "owner-of",
"description": "This relationship describes an object which owns another object.",
"format": [
"cert-eu"
"cert-eu",
"alfred"
]
},
{
@ -611,7 +615,315 @@
},
{
"name": "exploits",
"description": "This relationships describes an object (like a PoC/exploit) which exploits another object (such as a vulnerability object).",
"description": "This relationship describes an object (like a PoC/exploit) which exploits another object (such as a vulnerability object).",
"format": [
"misp"
]
},
{
"name": "signed-by",
"description": "This relationship describes an object signed by another object.",
"format": [
"misp"
]
},
{
"name": "delivered-by",
"description": "This relationship describes an object by another object (such as exploit kit, dropper).",
"format": [
"misp"
]
},
{
"name": "controls",
"description": "This relationship describes an object which controls another object.",
"format": [
"misp"
]
},
{
"name": "annotates",
"description": "This relationships describes an object which annotates another object.",
"format": [
"misp"
]
},
{
"name": "references",
"description": "This relationships describes an object which references another object or attribute.",
"format": [
"misp"
]
},
{
"name": "child-of",
"description": "A child semantic link to a parent.",
"format": [
"alfred"
]
},
{
"name": "compromised",
"description": "Represents the semantic link of having compromised something.",
"format": [
"alfred"
]
},
{
"name": "connects",
"description": "The initiator of a connection.",
"format": [
"alfred"
]
},
{
"name": "connects-to",
"description": "The destination or target of a connection.",
"format": [
"alfred"
]
},
{
"name": "cover-term-for",
"description": "Represents the semantic link of one thing being the cover term for another.",
"format": [
"alfred"
]
},
{
"name": "disclosed-to",
"description": "Semantic link indicating where information is disclosed to.",
"format": [
"alfred"
]
},
{
"name": "downloads",
"description": "Represents the semantic link of one thing downloading another.",
"format": [
"alfred"
]
},
{
"name": "downloads-from",
"description": "Represents the semantic link of malware being downloaded from a location.",
"format": [
"alfred"
]
},
{
"name": "generated",
"description": "Represents the semantic link of an alert generated from a signature.",
"format": [
"alfred"
]
},
{
"name": "implements",
"description": "One data object implements another.",
"format": [
"alfred"
]
},
{
"name": "initiates",
"description": "Represents the semantic link of a communication initiating an event.",
"format": [
"alfred"
]
},
{
"name": "instance-of",
"description": "Represents the semantic link between a FILE and FILE_BINARY.",
"format": [
"alfred"
]
},
{
"name": "issuer-of",
"description": "Represents the semantic link of being the issuer of something.",
"format": [
"alfred"
]
},
{
"name": "linked-to",
"description": "Represents the semantic link of being associated with something.",
"format": [
"alfred"
]
},
{
"name": "not-relevant-to",
"description": "Represents the semantic link of a comm that is not relevant to an EVENT.",
"format": [
"alfred"
]
},
{
"name": "part-of",
"description": "Represents the semantic link that defines one thing to be part of another in a hierachial structure from the child to the parent.",
"format": [
"alfred"
]
},
{
"name": "processed-by",
"description": "Represents the semantic link of something has been processed by another program.",
"format": [
"alfred"
]
},
{
"name": "produced",
"description": "Represents the semantic link of something having produced something else.",
"format": [
"alfred"
]
},
{
"name": "queried-for",
"description": "The IP Address or domain being queried for.",
"format": [
"alfred"
]
},
{
"name": "query-returned",
"description": "The IP Address or domain returned as the result of a query.",
"format": [
"alfred"
]
},
{
"name": "registered",
"description": "Represents the semantic link of someone registered some thing.",
"format": [
"alfred"
]
},
{
"name": "registered-to",
"description": "Represents the semantic link of something being registered to.",
"format": [
"alfred"
]
},
{
"name": "relates",
"description": "Represents the semantic link between HBS Comms and communication addresses.",
"format": [
"alfred"
]
},
{
"name": "relevant-to",
"description": "Represents the semantic link of a comm that is relevant to an EVENT.",
"format": [
"alfred"
]
},
{
"name": "resolves-to",
"description": "Represents the semantic link of resolving to something.",
"format": [
"alfred"
]
},
{
"name": "responsible-for",
"description": "Represents the semantic link of some entity being responsible for something.",
"format": [
"alfred"
]
},
{
"name": "seeded",
"description": "Represents the semantic link of a seeded domain redirecting to another site.",
"format": [
"alfred"
]
},
{
"name": "sends",
"description": "A sends semantic link meaning 'who sends what'.",
"format": [
"alfred"
]
},
{
"name": "sends-as-bcc-to",
"description": "A sends to as BCC semantic link meaning 'what sends to who as BCC'.",
"format": [
"alfred"
]
},
{
"name": "sends-as-cc-to",
"description": "A sends to as CC semantic link meaning 'what sends to who as CC'.",
"format": [
"alfred"
]
},
{
"name": "sends-to",
"description": "A sends to semantic link meaning 'what sends to who'.",
"format": [
"alfred"
]
},
{
"name": "spoofer-of",
"description": "The represents the semantic link of having spoofed something.",
"format": [
"alfred"
]
},
{
"name": "subdomain-of",
"description": "Represents a domain being a subdomain of another.",
"format": [
"alfred"
]
},
{
"name": "supersedes",
"description": "One data object supersedes another.",
"format": [
"alfred"
]
},
{
"name": "triggered-on",
"description": "Represents the semantic link of an alert triggered on an event.",
"format": [
"alfred"
]
},
{
"name": "uploads",
"description": "Represents the semantic link of one thing uploading another.",
"format": [
"alfred"
]
},
{
"name": "user-of",
"description": "The represents the semantic link of being the user of something.",
"format": [
"alfred"
]
},
{
"name": "works-for",
"description": "Represents the semantic link of working for something.",
"format": [
"alfred"
]
},
{
"name": "witness-of",
"description": "Represents an object being a witness of something.",
"format": [
"misp"
]

View File

@ -3,7 +3,7 @@
#
#
# A simple converter of MISP objects to asciidoctor format
# Copyright (C) 2017 Alexandre Dulaunoy
# Copyright (C) 2017-2018 Alexandre Dulaunoy
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License as
@ -84,14 +84,18 @@ def asciidoc(content=False, adoc=None, t='title',title=''):
#output = '\n{}\n'.format
#output = '[cols=\",a\"]\n'
output = output + '|===\n'
output = output + '|Object attribute | MISP attribute type | Description | Disable correlation\n'
output = output + '|Object attribute | MISP attribute type | Description | Disable correlation | Multiple\n'
adoc = adoc + output
for v in content['attributes']:
disableCorrelation = 'icon:minus[] '
description = 'icon:minus[] '
multiple = 'icon:minus[] '
if 'disable_correlation' in content['attributes'][v]:
if content['attributes'][v]['disable_correlation']:
disableCorrelation = 'icon:check[] '
if 'multiple' in content['attributes'][v]:
if content['attributes'][v]['multiple']:
multiple = 'icon:check[] '
if 'description' in content['attributes'][v]:
if content['attributes'][v]['description']:
description = '{}'.format(content['attributes'][v]['description'])
@ -101,7 +105,7 @@ def asciidoc(content=False, adoc=None, t='title',title=''):
if 'sane_default' in content['attributes'][v]:
values = content['attributes'][v]['sane_default']
description = '{} {}'.format(content['attributes'][v]['description'],values)
output = '\n| {} | {} a| {} a| {}\n'.format(v, content['attributes'][v]['misp-attribute'], description ,disableCorrelation)
output = '\n| {} | {} a| {} a| {} a| {}\n'.format(v, content['attributes'][v]['misp-attribute'], description ,disableCorrelation, multiple)
adoc = adoc + output
output = '\n|===\n'
adoc = adoc + output

View File

@ -0,0 +1,48 @@
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
from pathlib import Path
import json
name_ontology = 'alfred'
relationships_path = Path('..', 'relationships', 'definition.json')
with open(relationships_path) as f:
relationships = json.load(f)
rel_fast_lookup = {entry['name']: entry for entry in relationships['values']}
ontology_path = Path('alfred-ontology.json')
with open(ontology_path) as f:
ontology = json.load(f)
links = ontology['data']['linkTypes']
for linktype in links:
link_name = linktype['name'].lower().replace('_', '-')
link_description = linktype['description']
if link_name in rel_fast_lookup:
if rel_fast_lookup[link_name]['description'] != link_description:
print(link_name)
print('\t MISP:', rel_fast_lookup[link_name]['description'])
print('\t Alfred:', link_description)
for entry in relationships['values']:
if entry['name'] == link_name:
if name_ontology not in entry['format']:
entry['format'].append(name_ontology)
break
# Update the fast lookup to avoid duplicates.
rel_fast_lookup = {entry['name']: entry for entry in relationships['values']}
else:
if link_name not in rel_fast_lookup:
linktype['name'] = link_name
linktype['format'] = [name_ontology]
relationships['values'].append(linktype)
else:
print("Duplicate", link_name)
with open(relationships_path, 'w') as f:
json.dump(relationships, f, indent=2)