|Alexandre Dulaunoy 4505f65523 chg: [core] missing first_seen/last_seen in JSON schema added||3 weeks ago|
|misp-core-format||3 weeks ago|
|misp-galaxy-format||1 month ago|
|misp-noticelist-format||1 year ago|
|misp-object-template-format||7 months ago|
|misp-query-format||8 months ago|
|misp-taxonomy-format||7 months ago|
|misp-warninglist-format||8 months ago|
|sightingdb-format||3 months ago|
|README.md||8 months ago|
This repository is the official source of the specification and formats used in the MISP project.
The formats are described to support other implementations which reuse the format and ensuring an interoperability with existing MISP software, other Threat Intelligence Platforms and security tools at large.
All the formats can be freely reused by everyone.
If you want to see how a threat intelligence can be easily expressed in MISP standard, the following resources might give you some ideas:
Installing MISP is also another option to see the MISP standards in action. The MISP standards are actively used in the MISP threat intelligence platform to support the complete chain from intelligence creation, sharing, distribution and synchronisation.
You’ll also need
xml2rfc - install using
sudo pip3 isntall xml2rfc
for directory in $(find . -type d -iname "misp*"); do; echo "Building $directory..."; cd $directory; make; cd ..; done;
If you want to contribute to the MISP specifications, feel free to open an issue.