|
-
-
-
-
- Network Working Group A. Dulaunoy
- Internet-Draft A. Iklody
- Intended status: Informational CIRCL
- Expires: October 12, 2018 April 10, 2018
-
-
- MISP object template format
- draft-dulaunoy-misp-object-template-format
-
- Abstract
-
- This document describes the MISP object template format which
- describes a simple JSON format to represent the various templates
- used to construct MISP objects. A public directory of common
- vocabularies MISP object templates [MISP-O] is available and relies
- on the MISP object reference format.
-
- Status of This Memo
-
- This Internet-Draft is submitted in full conformance with the
- provisions of BCP 78 and BCP 79.
-
- Internet-Drafts are working documents of the Internet Engineering
- Task Force (IETF). Note that other groups may also distribute
- working documents as Internet-Drafts. The list of current Internet-
- Drafts is at https://datatracker.ietf.org/drafts/current/.
-
- Internet-Drafts are draft documents valid for a maximum of six months
- and may be updated, replaced, or obsoleted by other documents at any
- time. It is inappropriate to use Internet-Drafts as reference
- material or to cite them other than as "work in progress."
-
- This Internet-Draft will expire on October 12, 2018.
-
- Copyright Notice
-
- Copyright (c) 2018 IETF Trust and the persons identified as the
- document authors. All rights reserved.
-
- This document is subject to BCP 78 and the IETF Trust's Legal
- Provisions Relating to IETF Documents
- (https://trustee.ietf.org/license-info) in effect on the date of
- publication of this document. Please review these documents
- carefully, as they describe your rights and restrictions with respect
- to this document. Code Components extracted from this document must
- include Simplified BSD License text as described in Section 4.e of
- the Trust Legal Provisions and are provided without warranty as
- described in the Simplified BSD License.
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 1]
-
- Internet-Draft MISP object template format April 2018
-
-
- Table of Contents
-
- 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
- 1.1. Conventions and Terminology . . . . . . . . . . . . . . . 2
- 2. Format . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
- 2.1. Overview . . . . . . . . . . . . . . . . . . . . . . . . 3
- 2.1.1. Object Template . . . . . . . . . . . . . . . . . . . 3
- 2.1.2. attributes . . . . . . . . . . . . . . . . . . . . . 4
- 2.1.3. Sample Object Template object . . . . . . . . . . . . 6
- 2.1.4. Object Relationships . . . . . . . . . . . . . . . . 9
- 3. Directory . . . . . . . . . . . . . . . . . . . . . . . . . . 10
- 3.1. Existing and public MISP object templates . . . . . . . . 10
- 4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 18
- 5. References . . . . . . . . . . . . . . . . . . . . . . . . . 18
- 5.1. Normative References . . . . . . . . . . . . . . . . . . 18
- 5.2. Informative References . . . . . . . . . . . . . . . . . 18
- Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 19
-
- 1. Introduction
-
- Due to the increased maturity of threat information sharing, the need
- arose for more complex and exhaustive data-points to be shared across
- the various sharing communities. MISP's information sharing in
- general relied on a flat structure of attributes contained within an
- event, where attributes served as atomic secluded data-points with
- some commonalities as defined by the encapsulating event. However,
- this flat structure restricted the use of more diverse and complex
- data-points described by a list of atomic values, a problem solved by
- the MISP object structure.
-
- MISP objects combine a list of attributes to represent a singular
- object with various facets. In order to bootstrap the object
- creation process and to maintain uniformity among objects describing
- similar data-points, the MISP object template format serves as a
- reusable and share-able blueprint format.
-
- MISP object templates also include a vocabulary to describe the
- various inter object and object to attribute relationships and are
- leveraged by MISP object references.
-
- 1.1. Conventions and Terminology
-
- The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
- "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
- document are to be interpreted as described in RFC 2119 [RFC2119].
-
-
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 2]
-
- Internet-Draft MISP object template format April 2018
-
-
- 2. Format
-
- MISP object templates are composed of the MISP object template (MUST)
- structure itself and a list of MISP object template elements (SHOULD)
- describing the list of possible attributes belonging to the resulting
- object, along with their context and settings.
-
- MISP object templates themselves consist of a name (MUST), a meta-
- category (MUST) and a description (SHOULD). They are identified by a
- uuid (MUST) and a version (MUST). For any updates or transfer of the
- same object reference. UUID version 4 is RECOMMENDED when assigning
- it to a new object reference. The list of requirements when it comes
- to the contained MISP object template elements is defined in the
- requirements field (OPTIONAL).
-
- MISP object template elements consist of an object_relation (MUST), a
- type (MUST), an object_template_id (SHOULD), a ui_priority (SHOULD),
- a list of categories (MAY), a list of sane_default values (MAY) or a
- values_list (MAY).
-
- 2.1. Overview
-
- The MISP object template format uses the JSON [RFC8259] format. Each
- template is represented as a JSON object with meta information
- including the following fields: uuid, requiredOneOf, description,
- version, meta-category, name.
-
- 2.1.1. Object Template
-
- 2.1.1.1. uuid
-
- uuid represents the Universally Unique IDentifier (UUID) [RFC4122] of
- the object template. The uuid MUST be preserved for to keep
- consistency of the templates across instances. UUID version 4 is
- RECOMMENDED when assigning it to a new object template.
-
- uuid is represented as a JSON string. uuid MUST be present.
-
- 2.1.1.2. requiredOneOf
-
- requiredOneOf is represented as a JSON list and contains a list of
- attribute relationships of which one must be present in the object to
- be created based on the given template. The requiredOneOf field MAY
- be present.
-
-
-
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 3]
-
- Internet-Draft MISP object template format April 2018
-
-
- 2.1.1.3. required
-
- required is represented as a JSON list and contains a list of
- attribute relationships of which all must be present in the object to
- be created based on the given template. The required field MAY be
- present.
-
- 2.1.1.4. description
-
- description is represented as a JSON string and contains the assigned
- meaning given to objects created using this template. The
- description field MUST be present.
-
- 2.1.1.5. version
-
- version represents a numeric incrementing version of the object
- template. It is used to associate the object to the correct version
- of the template and together with the uuid field forms an association
- to the correct template type and version.
-
- version is represented as a JSON string. version MUST be present.
-
- 2.1.1.6. meta-category
-
- meta-category represents the sub-category of objects that the given
- object template belongs to. meta-categories are not tied to a fixed
- list of options but can be created on the fly.
-
- meta-category is represented as a JSON string. meta-category MUST be
- present.
-
- 2.1.1.7. name
-
- name represents the human-readable name of the objects created using
- the given template, describing the intent of the object package.
-
- name is represented as a JSON string. name MUST be present
-
- 2.1.2. attributes
-
- attributes is represented as a JSON list and contains a list of
- template elements used as a template for creating the individual
- attributes within the object that is to be created with the object.
-
- attributes is represented as a JSON list. attributes MUST be present.
-
-
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 4]
-
- Internet-Draft MISP object template format April 2018
-
-
- 2.1.2.1. description
-
- description is represented as a JSON string and contains the
- description of the given attribute in the context of the object with
- the given relationship. The description field MUST be present.
-
- 2.1.2.2. ui-priority
-
- ui-priority is represented by a numeric values in JSON string format
- and is meant to provide a priority for the given element in the
- object template visualisation. The ui-priority MAY be present.
-
- 2.1.2.3. misp-attribute
-
- misp-attribute is represented by a JSON string or a JSON object with
- a list of values. The value(s) are taken from the pool of types
- defined by the MISP core format's Attribute Object's type list. type
- can contain a JSON object with a list of suggested value alternatives
- encapsulated in a list within a sane_default key or a list of
- enforced value alternatives encapsulated in a list_values key.
-
- The misp-attribute field MUST be present.
-
- 2.1.2.4. disable_correlation
-
- disable_correlation is represented by a JSON boolean. The
- disable_correlation field flags the attribute(s) created by the given
- object template element to be marked as non correlating.
-
- The misp-attribute field MAY be present.
-
- 2.1.2.5. categories
-
- categories is represented by a JSON list containing one or several
- valid options from the list of verbs valid for the category field in
- the Attribute object within the MISP core format.
-
- The categories field MAY be present.
-
- 2.1.2.6. multiple
-
- multiple is represented by a JSON boolean value. It marks the MISP
- object template element as a multiple input field, allowing for
- several attributes to be created by the element within the same
- object.
-
- The multiple field MAY be present.
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 5]
-
- Internet-Draft MISP object template format April 2018
-
-
- 2.1.2.7. sane_default
-
- sane_default is represented by a JSON list containing one or several
- recommended/sane values for an attribute. sane_default is mutually
- exclusive with values_list.
-
- The sane_default field MAY be present.
-
- 2.1.2.8. values_list
-
- values_list is represented by a JSON List containing one or several
- of fixed values for an attribute. values_list is mutually exclusive
- with sane_default.
-
- The value_list field MAY be present.
-
- 2.1.3. Sample Object Template object
-
- The MISP object template directory is publicly available [MISP-O] in
- a git repository and contains more than 60 object templates. As
- illustration, two sample objects templates are included.
-
- 2.1.3.1. credit-card object template
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 6]
-
- Internet-Draft MISP object template format April 2018
-
-
- {
- "requiredOneOf": [
- "cc-number"
- ],
- "attributes": {
- "version": {
- "description": "Version of the card.",
- "ui-priority": 0,
- "misp-attribute": "text"
- },
- "comment": {
- "description": "A description of the card.",
- "ui-priority": 0,
- "misp-attribute": "comment"
- },
- "card-security-code": {
- "description": "Card security code (CSC, CVD, CVV, CVC and SPC) as embossed or printed on the card.",
- "ui-priority": 0,
- "misp-attribute": "text"
- },
- "name": {
- "description": "Name of the card owner.",
- "ui-priority": 0,
- "misp-attribute": "text"
- },
- "issued": {
- "description": "Initial date of validity or issued date.",
- "ui-priority": 0,
- "misp-attribute": "datetime"
- },
- "expiration": {
- "description": "Maximum date of validity",
- "ui-priority": 0,
- "misp-attribute": "datetime"
- },
- "cc-number": {
- "description": "credit-card number as encoded on the card.",
- "ui-priority": 0,
- "misp-attribute": "cc-number"
- }
- },
- "version": 2,
- "description": "A payment card like credit card, debit card or any similar cards which can be used for financial transactions.",
- "meta-category": "financial",
- "uuid": "2b9c57aa-daba-4330-a738-56f18743b0c7",
- "name": "credit-card"
- }
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 7]
-
- Internet-Draft MISP object template format April 2018
-
-
- 2.1.3.2. credential object template
-
- {
- "requiredOneOf": [
- "password"
- ],
- "attributes": {
- "text": {
- "description": "A description of the credential(s)",
- "disable_correlation": true,
- "ui-priority": 1,
- "misp-attribute": "text"
- },
- "username": {
- "description": "Username related to the password(s)",
- "ui-priority": 1,
- "misp-attribute": "text"
- },
- "password": {
- "description": "Password",
- "multiple": true,
- "ui-priority": 1,
- "misp-attribute": "text"
- },
- "type": {
- "description": "Type of password(s)",
- "ui-priority": 1,
- "misp-attribute": "text",
- "values_list": [
- "password",
- "api-key",
- "encryption-key",
- "unknown"
- ]
- },
- "origin": {
- "description": "Origin of the credential(s)",
- "ui-priority": 1,
- "misp-attribute": "text",
- "sane_default": [
- "bruteforce-scanning",
- "malware-analysis",
- "memory-analysis",
- "network-analysis",
- "leak",
- "unknown"
- ]
- },
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 8]
-
- Internet-Draft MISP object template format April 2018
-
-
- "format": {
- "description": "Format of the password(s)",
- "ui-priority": 1,
- "misp-attribute": "text",
- "values_list": [
- "clear-text",
- "hashed",
- "encrypted",
- "unknown"
- ]
- },
- "notification": {
- "description": "Mention of any notification(s) towards the potential owner(s) of the credential(s)",
- "ui-priority": 1,
- "misp-attribute": "text",
- "multiple": true,
- "values_list": [
- "victim-notified",
- "service-notified",
- "none"
- ]
- }
- },
- "version": 2,
- "description": "Credential describes one or more credential(s) including password(s), api key(s) or decryption key(s).",
- "meta-category": "misc",
- "uuid": "a27e98c9-9b0e-414c-8076-d201e039ca09",
- "name": "credential"
- }
-
- 2.1.4. Object Relationships
-
- 2.1.4.1. name
-
- name represents the human-readable relationship type which can be
- used when creating MISP object relations.
-
- name is represented as a JSON string. name MUST be present.
-
- 2.1.4.2. description
-
- description is represented as a JSON string and contains the
- description of the object relationship type. The description field
- MUST be present.
-
-
-
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 9]
-
- Internet-Draft MISP object template format April 2018
-
-
- 2.1.4.3. format
-
- format is represented by a JSON list containing a list of formats
- that the relationship type is valid for and can be mapped to. The
- format field MUST be present.
-
- 3. Directory
-
- The MISP object template directory is publicly available [MISP-O] in
- a git repository. The repository contains an objects directory,
- which contains a directory per object type, containing a file named
- definition.json which contains the definition of the object template
- in the above described format.
-
- A relationships directory is also included, containing a
- definition.json file which contains a list of MISP object relation
- definitions. There are more than 125 existing templates object
- documented in [MISP-O-DOC].
-
- 3.1. Existing and public MISP object templates
-
- o tsk-chats - An Object Template to gather information from
- evidential or interesting exchange of messages identified during a
- digital forensic investigation.
-
- o tsk-web-bookmark - An Object Template to add evidential bookmarks
- identified during a digital forensic investigation.
-
- o tsk-web-cookie - An TSK-Autopsy Object Template to represent
- cookies identified during a forensic investigation.
-
- o tsk-web-downloads - An Object Template to add web-downloads.
-
- o tsk-web-history - An Object Template to share web history
- information.
-
- o tsk-web-search-query - An Object Template to share web search
- query information.
-
- o ail-leak - An information leak as defined by the AIL Analysis
- Information Leak framework.
-
- o ais-info - Automated Indicator Sharing (AIS) Information Source
- Markings.
-
- o android-permission - A set of android permissions - one or more
- permission(s) which can be linked to other objects (e.g. malware,
- app).
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 10]
-
- Internet-Draft MISP object template format April 2018
-
-
- o annotation - An annotation object allowing analysts to add
- annotations, comments, executive summary to a MISP event, objects
- or attributes.
-
- o anonymisation - Anonymisation object describing an anonymisation
- technique used to encode MISP attribute values. Reference:
- <https://www.caida.org/tools/taxonomy/anonymization.xml>.
-
- o asn - Autonomous system object describing an autonomous system
- which can include one or more network operators management an
- entity (e.g. ISP) along with their routing policy, routing
- prefixes or alike.
-
- o authenticode-signerinfo - Authenticode Signer Info.
-
- o av-signature - Antivirus detection signature.
-
- o bank-account - An object describing bank account information based
- on account description from goAML 4.0.
-
- o bgp-hijack - Object encapsulating BGP Hijack description as
- specified, for example, by bgpstream.com.
-
- o cap-alert - Common Alerting Protocol Version (CAP) alert object.
-
- o cap-info - Common Alerting Protocol Version (CAP) info object.
-
- o cap-resource - Common Alerting Protocol Version (CAP) resource
- object.
-
- o coin-address - An address used in a cryptocurrency.
-
- o cookie - An HTTP cookie (web cookie, browser cookie) is a small
- piece of data that a server sends to the user's web browser. The
- browser may store it and send it back with the next request to the
- same server. Typically, it's used to tell if two requests came
- from the same browser -- keeping a user logged-in, for example.
- It remembers stateful information for the stateless HTTP protocol.
- (as defined by the Mozilla foundation.
-
- o cortex - Cortex object describing a complete cortex analysis.
- Observables would be attribute with a relationship from this
- object.
-
- o cortex-taxonomy - Cortex object describing an Cortex Taxonomy (or
- mini report).
-
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 11]
-
- Internet-Draft MISP object template format April 2018
-
-
- o course-of-action - An object describing a specific measure taken
- to prevent or respond to an attack.
-
- o cowrie - Cowrie honeypot object template.
-
- o credential - Credential describes one or more credential(s)
- including password(s), api key(s) or decryption key(s).
-
- o credit-card - A payment card like credit card, debit card or any
- similar cards which can be used for financial transactions.
-
- o ddos - DDoS object describes a current DDoS activity from a
- specific or/and to a specific target. Type of DDoS can be
- attached to the object as a taxonomy.
-
- o device - An object to define a device.
-
- o diameter-attack - Attack as seen on diameter authentication
- against a GSM, UMTS or LTE network.
-
- o domain-ip - A domain and IP address seen as a tuple in a specific
- time frame.
-
- o elf - Object describing a Executable and Linkable Format.
-
- o elf-section - Object describing a section of an Executable and
- Linkable Format.
-
- o email - Email object describing an email with meta-information.
-
- o exploit-poc - Exploit-poc object describing a proof of concept or
- exploit of a vulnerability. This object has often a relationship
- with a vulnerability object.
-
- o facial-composite - An object which describes a facial composite.
-
- o fail2ban - Fail2ban event.
-
- o file - File object describing a file with meta-information.
-
- o forensic-case - An object template to describe a digital forensic
- case.
-
- o forensic-evidence - An object template to describe a digital
- forensic evidence.
-
- o geolocation - An object to describe a geographic location.
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 12]
-
- Internet-Draft MISP object template format April 2018
-
-
- o gtp-attack - GTP attack object as seen on a GSM, UMTS or LTE
- network.
-
- o http-request - A single HTTP request header.
-
- o ilr-impact - Institut Luxembourgeois de Regulation - Impact.
-
- o ilr-notification-incident - Institut Luxembourgeois de Regulation
- - Notification d'incident.
-
- o internal-reference - Internal reference.
-
- o interpol-notice - An object which describes a Interpol notice.
-
- o ip-api-address - IP Address information. Useful if you are
- pulling your ip information from ip-api.com.
-
- o ip-port - An IP address (or domain or hostname) and a port seen as
- a tuple (or as a triple) in a specific time frame.
-
- o irc - An IRC object to describe an IRC server and the associated
- channels.
-
- o ja3 - JA3 is a new technique for creating SSL client fingerprints
- that are easy to produce and can be easily shared for threat
- intelligence. Fingerprints are composed of Client Hello packet;
- SSL Version, Accepted Ciphers, List of Extensions, Elliptic
- Curves, and Elliptic Curve Formats.
- <https://github.com/salesforce/ja3>.
-
- o legal-entity - An object to describe a legal entity.
-
- o lnk - LNK object describing a Windows LNK binary file (aka Windows
- shortcut).
-
- o macho - Object describing a file in Mach-O format.
-
- o macho-section - Object describing a section of a file in Mach-O
- format.
-
- o mactime-timeline-analysis - Mactime template, used in forensic
- investigations to describe the timeline of a file activity.
-
- o malware-config - Malware configuration recovered or extracted from
- a malicious binary.
-
- o microblog - Microblog post like a Twitter tweet or a post on a
- Facebook wall.
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 13]
-
- Internet-Draft MISP object template format April 2018
-
-
- o mutex - Object to describe mutual exclusion locks (mutex) as seen
- in memory or computer program.
-
- o netflow - Netflow object describes an network object based on the
- Netflowv5/v9 minimal definition.
-
- o network-connection - A local or remote network connection.
-
- o network-socket - Network socket object describes a local or remote
- network connections based on the socket data structure.
-
- o misc - An object which describes an organization.
-
- o original-imported-file - Object describing the original file used
- to import data in MISP.
-
- o passive-dns - Passive DNS records as expressed in draft-dulaunoy-
- dnsop-passive-dns-cof-01.
-
- o paste - Paste or similar post from a website allowing to share
- privately or publicly posts.
-
- o pcap-metadata - Network packet capture metadata.
-
- o pe - Object describing a Portable Executable.
-
- o pe-section - Object describing a section of a Portable Executable.
-
- o person - An object which describes a person or an identity.
-
- o phishing - Phishing template to describe a phishing website and
- its analysis.
-
- o phishing-kit - Object to describe a phishing-kit.
-
- o phone - A phone or mobile phone object which describe a phone.
-
- o process - Object describing a system process.
-
- o python-etvx-event-log - Event log object template to share
- information of the activities conducted on a system. .
-
- o r2graphity - Indicators extracted from files using radare2 and
- graphml.
-
- o regexp - An object describing a regular expression (regex or
- regexp). The object can be linked via a relationship to other
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 14]
-
- Internet-Draft MISP object template format April 2018
-
-
- attributes or objects to describe how it can be represented as a
- regular expression.
-
- o registry-key - Registry key object describing a Windows registry
- key with value and last-modified timestamp.
-
- o regripper-NTUser - Regripper Object template designed to present
- user specific configuration details extracted from the NTUSER.dat
- hive.
-
- o regripper-sam-hive-single-user - Regripper Object template
- designed to present user profile details extracted from the SAM
- hive.
-
- o regripper-sam-hive-user-group - Regripper Object template designed
- to present group profile details extracted from the SAM hive.
-
- o regripper-software-hive-BHO - Regripper Object template designed
- to gather information of the browser helper objects installed on
- the system.
-
- o regripper-software-hive-appInit-DLLS - Regripper Object template
- designed to gather information of the DLL files installed on the
- system.
-
- o regripper-software-hive-application-paths - Regripper Object
- template designed to gather information of the application paths.
-
- o regripper-software-hive-applications-installed - Regripper Object
- template designed to gather information of the applications
- installed on the system.
-
- o regripper-software-hive-command-shell - Regripper Object template
- designed to gather information of the shell commands executed on
- the system.
-
- o regripper-software-hive-windows-general-info - Regripper Object
- template designed to gather general windows information extracted
- from the software-hive.
-
- o regripper-software-hive-software-run - Regripper Object template
- designed to gather information of the applications set to run on
- the system.
-
- o regripper-software-hive-userprofile-winlogon - Regripper Object
- template designed to gather user profile information when the user
- logs onto the system, gathered from the software hive.
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 15]
-
- Internet-Draft MISP object template format April 2018
-
-
- o regripper-system-hive-firewall-configuration - Regripper Object
- template designed to present firewall configuration information
- extracted from the system-hive.
-
- o regripper-system-hive-general-configuration - Regripper Object
- template designed to present general system properties extracted
- from the system-hive.
-
- o regripper-system-hive-network-information. - Regripper object
- template designed to gather network information from the system-
- hive.
-
- o regripper-system-hive-services-drivers - Regripper Object template
- designed to gather information regarding the services/drivers from
- the system-hive.
-
- o report - Metadata used to generate an executive level report.
-
- o research-scanner - Information related to known scanning activity
- (e.g. from research projects).
-
- o rogue-dns - Rogue DNS as defined by CERT.br.
-
- o rtir - RTIR - Request Tracker for Incident Response.
-
- o sandbox-report - Sandbox report.
-
- o sb-signature - Sandbox detection signature.
-
- o script - Object describing a computer program written to be run in
- a special run-time environment. The script or shell script can be
- used for malicious activities but also as support tools for threat
- analysts.
-
- o shell-commands - Object describing a series of shell commands
- executed. This object can be linked with malicious files in order
- to describe a specific execution of shell commands.
-
- o short-message-service - Short Message Service (SMS) object
- template describing one or more SMS message. Restriction of the
- initial format 3GPP 23.038 GSM character set doesn't apply.
-
- o shortened-link - Shortened link and its redirect target.
-
- o splunk - Splunk / Splunk ES object.
-
- o ss7-attack - SS7 object of an attack seen on a GSM, UMTS or LTE
- network via SS7 logging.
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 16]
-
- Internet-Draft MISP object template format April 2018
-
-
- o ssh-authorized-keys - An object to store ssh authorized keys file.
-
- o stix2-pattern - An object describing a STIX pattern. The object
- can be linked via a relationship to other attributes or objects to
- describe how it can be represented as a STIX pattern.
-
- o suricata - An object describing one or more Suricata rule(s) along
- with version and contextual information.
-
- o target-system - Description about an targeted system, this could
- potentially be a compromissed internal system.
-
- o threatgrid-report - ThreatGrid report.
-
- o timecode - Timecode object to describe a start of video sequence
- (e.g. CCTV evidence) and the end of the video sequence.
-
- o timesketch-timeline - A timesketch timeline object based on
- mandatory field in timesketch to describe a log entry.
-
- o timesketch_message - A timesketch message entry.
-
- o timestamp - A generic timestamp object to represent time including
- first time and last time seen. Relationship will then define the
- kind of time relationship.
-
- o tor-hiddenservice - Tor hidden service (onion service) object.
-
- o tor-node - Tor node (which protects your privacy on the internet
- by hiding the connection between users Internet address and the
- services used by the users) description which are part of the Tor
- network at a time.
-
- o tracking-id - Analytics and tracking ID such as used in Google
- Analytics or other analytic platform.
-
- o transaction - An object to describe a financial transaction.
-
- o url - url object describes an url along with its normalized field
- (like extracted using faup parsing library) and its metadata.
-
- o vehicle - Vehicle object template to describe a vehicle
- information and registration.
-
- o victim - Victim object describes the target of an attack or abuse.
-
- o virustotal-report - VirusTotal report.
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 17]
-
- Internet-Draft MISP object template format April 2018
-
-
- o vulnerability - Vulnerability object describing a common
- vulnerability enumeration which can describe published,
- unpublished, under review or embargo vulnerability for software,
- equipments or hardware.
-
- o whois - Whois records information for a domain name or an IP
- address.
-
- o x509 - x509 object describing a X.509 certificate.
-
- o yabin - yabin.py generates Yara rules from function prologs, for
- matching and hunting binaries. ref: <https://github.com/
- AlienVault-OTX/yabin>.
-
- o yara - An object describing a YARA rule along with its version.
-
- 4. Acknowledgements
-
- The authors wish to thank all the MISP community who are supporting
- the creation of open standards in threat intelligence sharing.
-
- 5. References
-
- 5.1. Normative References
-
- [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
- Requirement Levels", BCP 14, RFC 2119,
- DOI 10.17487/RFC2119, March 1997,
- <https://www.rfc-editor.org/info/rfc2119>.
-
- [RFC4122] Leach, P., Mealling, M., and R. Salz, "A Universally
- Unique IDentifier (UUID) URN Namespace", RFC 4122,
- DOI 10.17487/RFC4122, July 2005,
- <https://www.rfc-editor.org/info/rfc4122>.
-
- [RFC8259] Bray, T., Ed., "The JavaScript Object Notation (JSON) Data
- Interchange Format", STD 90, RFC 8259,
- DOI 10.17487/RFC8259, December 2017,
- <https://www.rfc-editor.org/info/rfc8259>.
-
- 5.2. Informative References
-
- [MISP-O] MISP, "MISP Objects - shared and common object templates",
- <https://github.com/MISP/misp-objects>.
-
- [MISP-O-DOC]
- "MISP objects directory", 2018,
- <https://www.misp-project.org/objects.html>.
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 18]
-
- Internet-Draft MISP object template format April 2018
-
-
- Authors' Addresses
-
- Alexandre Dulaunoy
- Computer Incident Response Center Luxembourg
- 16, bd d'Avranches
- Luxembourg L-1611
- Luxembourg
-
- Phone: +352 247 88444
- Email: alexandre.dulaunoy@circl.lu
-
-
- Andras Iklody
- Computer Incident Response Center Luxembourg
- 16, bd d'Avranches
- Luxembourg L-1611
- Luxembourg
-
- Phone: +352 247 88444
- Email: andras.iklody@circl.lu
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- Dulaunoy & Iklody Expires October 12, 2018 [Page 19]
|