diff --git a/tools/docs/images/taxonomy-explanation.pdf b/tools/docs/images/taxonomy-explanation.pdf new file mode 100644 index 0000000..b913d37 Binary files /dev/null and b/tools/docs/images/taxonomy-explanation.pdf differ diff --git a/tools/docs/images/taxonomy-explanation.svg b/tools/docs/images/taxonomy-explanation.svg new file mode 100644 index 0000000..9291287 --- /dev/null +++ b/tools/docs/images/taxonomy-explanation.svg @@ -0,0 +1,541 @@ + + + + + + + + + + + + + + + + + image/svg+xml + + + + + + + + + + + + namespacepredicate value + + + + + + + + + + + + + + + Threat Sharing + + + + + + + + + + + + admiralty-scale:source-reliability="c"admiralty-scale:Source Reliability="Fairly reliable"admiralty-scale:information-credibility="3"admiralty-scale:Information Credibility="Possibly true" + + + + + + + + + + + + nato:classification="NU" nato:Classification="NATO UNCLASSIFIED" + + + + + + tlp:amberTraffic Light Protocol:(TLP:AMBER) Information exclusively given to an organization; sharing limited within the organization to be effectively acted upon. + + + + MISP taxonomies - Flexible Classification for Information Sharing + MISP taxonomies is a solution to use existing taxonomies (or create your own) to classify your cybersecurity events, indicators and threats. This technique is integrated as a default mechanism for tagging in MISP (Malware Information Sharing Platform & Threat Sharing) and to support a distributed classification where organizations can share common taxonomies in a local or distributed fashion.Classifications are distributed as simple JSON files to use with MISP but can be easily integrated into any other information sharing software. You can also propose new taxonomies to the community. Examples of machine tags and human readable tags : + + https://github.com/MISP/misp-taxonomies/ + +