|Alexandre Dulaunoy 92b133f929||2 weeks ago|
|misp-core-format||2 weeks ago|
|misp-galaxy-format||8 months ago|
|misp-noticelist-format||2 years ago|
|misp-object-template-format||1 year ago|
|misp-query-format||1 year ago|
|misp-taxonomy-format||1 year ago|
|misp-warninglist-format||1 year ago|
|sightingdb-format||5 months ago|
|threat-actor-naming||3 months ago|
|README.md||1 year ago|
This repository is the official source of the specification and formats used in the MISP project.
The formats are described to support other implementations which reuse the format and ensuring an interoperability with existing MISP software, other Threat Intelligence Platforms and security tools at large.
All the formats can be freely reused by everyone.
If you want to see how a threat intelligence can be easily expressed in MISP standard, the following resources might give you some ideas:
Installing MISP is also another option to see the MISP standards in action. The MISP standards are actively used in the MISP threat intelligence platform to support the complete chain from intelligence creation, sharing, distribution and synchronisation.
You'll also need
xml2rfc - install using
sudo pip3 isntall xml2rfc
for directory in $(find . -type d -iname "misp*"); do; echo "Building $directory..."; cd $directory; make; cd ..; done;
If you want to contribute to the MISP specifications, feel free to open an issue.