Taxonomies used in MISP taxonomy system and can be used by other information sharing tool. https://www.circl.lu/doc/misp-taxonomies/
 
 
Go to file
makflwana 9397a9e825
MAEC 5.0 Malware Delivery Vectors
2018-05-24 23:09:13 +10:00
CERT-XLM fix: Typos in predicate names (CERT-XLM & pentest). 2018-02-07 11:04:32 +01:00
DML add DML taxonomy 2017-06-22 15:49:02 +02:00
PAP Add schema 2017-02-13 12:01:05 +01:00
accessnow Fix #67 - typo in the description of Culture-oriented organisation. 2017-05-19 12:18:49 +02:00
action-taken jq 2017-05-19 11:37:25 +02:00
admiralty-scale Cannot type Today 2017-11-22 15:11:59 +01:00
adversary Improve consistency when lising the predicates, remove duplicates 2017-07-25 14:57:25 +02:00
ais-marking AIS marking based on The AIS Marking Schema implementation is maintained by the National Cybersecurity and Communication Integration Center (NCCIC) of the U.S. Department of Homeland Security (DHS). 2017-11-04 10:30:12 +01:00
analyst-assessment type added to only allow tagging on users or organisations 2017-05-04 11:00:21 +02:00
binary-class new: Added basic binary file taxonomy. 2017-04-05 12:00:00 +01:00
circl add new incident-classification tags in circl taxonomy 2018-05-16 12:04:50 +02:00
collaborative-intelligence request detection-signature 2017-10-06 07:53:32 +02:00
copine-scale typo fixed 2018-05-22 00:55:02 +02:00
csirt_case_classification JQ all the things 2017-02-13 12:02:51 +01:00
cssa Update machinetag.json 2018-02-06 11:24:21 +01:00
cyber-threat-framework fix: version missing added in cyber-threat-framework 2018-02-18 12:14:18 +01:00
ddos A first taxonomy covering DDoS attack 2017-03-05 17:02:49 +01:00
de-vs Update README.md 2016-02-09 11:27:10 +01:00
dhs-ciip-sectors JQ all the things 2017-02-13 12:02:51 +01:00
diamond-model Update schema, fix taxonomies accordingly. 2017-02-13 16:39:06 +01:00
dni-ism Improve consistency when lising the predicates, remove duplicates 2017-07-25 14:57:25 +02:00
domain-abuse Improve consistency when lising the predicates, remove duplicates 2017-07-25 14:57:25 +02:00
economical-impact add: Economical impact is a taxonomy to describe the financial impact as positive or negative gain to the tagged information. 2018-04-24 10:24:43 +02:00
ecsirt eCSIRT taxonomy updated to fully support version mkVI of 31 March 2015 and still support IntelMQ taxonomy-type mapping. 2017-10-25 10:50:06 +02:00
enisa Improve consistency when lising the predicates, remove duplicates 2017-07-25 14:57:25 +02:00
estimative-language add: Expressing Confidence In Analytic Judgments added in estimative language namespace 2018-04-08 20:47:24 +02:00
eu-marketop-and-publicadmin JQ all the things 2017-02-13 12:02:51 +01:00
eu-nis-sector-and-subsectors fix typo 2018-05-22 10:58:01 +02:00
euci Add schema 2017-02-13 12:01:05 +01:00
europol-event Add schema 2017-02-13 12:01:05 +01:00
europol-incident JQ all the things 2017-02-13 12:02:51 +01:00
event-assessment New taxonomy event-assessment - series of assessment predicates 2017-05-04 07:52:05 +02:00
fpf Add taxonomy to classify the degree of identifiability of personal data 2018-05-02 17:11:31 +02:00
fr-classif add: exclusive property added to express exclusivity at predicate or value level 2017-11-29 07:32:37 +01:00
gdpr Add taxonomy to classify special categories of personal data as defined in the GDPR 2018-05-02 17:10:19 +02:00
honeypot-basic replace underscore with dash 2018-01-03 13:54:07 +01:00
iep Improve consistency when lising the predicates, remove duplicates 2017-07-25 14:57:25 +02:00
incident-disposition new: incident-disposition taxonomy added 2018-01-30 11:10:06 +01:00
infoleak fix: reorder infoleak predicates 2018-05-16 14:50:29 -04:00
information-security-indicators JQ all the things 2017-02-13 12:02:51 +01:00
kill-chain Merge branch 'master' of github.com:MISP/misp-taxonomies 2017-02-13 12:03:15 +01:00
maec-delivery-vectors MAEC 5.0 Malware Delivery Vectors 2018-05-24 23:09:13 +10:00
maec-malware-behavior MAEC 5.0 Malware behavior 2018-05-24 23:02:50 +10:00
maec-malware-capabilties MAEC 5.0 Malware capabilties 2018-05-24 23:05:54 +10:00
malware_classification Update schema, fix taxonomies accordingly. 2017-02-13 16:39:06 +01:00
mapping fix: typo fixed in JSON 2017-10-25 16:51:12 +02:00
misp fix: Order of predicate (misp). 2018-02-07 11:05:15 +01:00
ms-caro-malware Remove jso file 2016-07-05 21:44:02 +02:00
ms-caro-malware-full Improve consistency when lising the predicates, remove duplicates 2017-07-25 14:57:25 +02:00
nato
open_threat Fix inconsistencies between MANIFEST, directory names and taxonomies 2016-10-05 14:42:41 +02:00
osint fix: clarification of the certainty entry based on feedback from an analyst 2017-12-01 07:37:45 +01:00
passivetotal fix typo 2018-05-22 10:58:01 +02:00
pentest fix: Typos in predicate names (CERT-XLM & pentest). 2018-02-07 11:04:32 +01:00
priority-level add: new priority-level taxonomy based on NCCIC Cyber Incident Scoring System 2018-03-15 15:40:30 +01:00
rt_event_status Add schema 2017-02-13 12:01:05 +01:00
runtime-packer Fixed 2017-12-28 17:37:58 +01:00
stealth_malware stealth_malware to match taxonomy namespace 2016-10-29 11:45:37 +02:00
stix-ttp JQ all the things 2017-02-13 12:02:51 +01:00
targeted-threat-index targeted-threat-index taxonomy added 2016-12-18 12:55:55 +01:00
tlp add: exclusive property added to express exclusivity at predicate or value level 2017-11-29 07:32:37 +01:00
tools chg: Saner veris taxonomy generation 2018-05-16 14:49:53 -04:00
tor New taxonomy to describe Tor network infrastructure added 2017-05-04 07:48:05 +02:00
veris chg: Saner veris taxonomy generation 2018-05-16 14:49:53 -04:00
vocabulaire-des-probabilites-estimatives Vocabulaire des probabilités estimatives added based on the document 2017-04-03 19:07:39 +02:00
workflow Version updated 2018-04-20 11:18:24 +02:00
.travis.yml Clean travis 2017-07-25 15:51:38 +02:00
MANIFEST.json add: The COPINE Scale is a rating system created in Ireland and used in the United Kingdom to categorise the severity of images of child sex abuse. 2018-05-22 00:53:13 +02:00
README.md List of taxonomies updated 2018-05-09 07:47:03 +02:00
jq_all_the_things.sh Add schema for mapping 2017-08-31 23:16:36 +02:00
schema.json add: exclusive property added to express exclusivity at predicate or value level 2017-11-29 07:32:37 +01:00
schema_mapping.json Add schema for mapping 2017-08-31 23:16:36 +02:00
validate_all.sh Properly fix manifest. 2017-09-01 00:49:13 +02:00

README.md

MISP Taxonomies

Build Status

MISP Taxonomies is a set of common classification libraries to tag, classify and organise information. Taxonomy allows to express the same vocabulary among a distributed set of users and organisations.

Taxonomies that can be used in MISP (2.4) and other information sharing tool and expressed in Machine Tags (Triple Tags). A machine tag is composed of a namespace (MUST), a predicate (MUST) and an (OPTIONAL) value. Machine tags are often called triple tag due to their format.

Overview of the MISP taxonomies

The following taxonomies can be used in MISP (as local or distributed tags) or in other tools and software willing to share common taxonomies among security information sharing tools.

The following taxonomies are described:

Admiralty Scale

The Admiralty Scale (also called the NATO System) is used to rank the reliability of a source and the credibility of an information.

Adversary

An overview and description of the adversary infrastructure.

CIRCL Taxonomy - Schemes of Classification in Incident Response and Detection

CIRCL Taxonomy is a simple scheme for incident classification and area topic where the incident took place.

Cyber Kill Chain from Lockheed Martin

Cyber Kill Chain from Lockheed Martin as described in Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains.

Cyber Threat Framework from DNI.gov

The Cyber Threat Framework was developed by the US Government to enable consistent characterization and categorization of cyber threat events, and to identify trends or changes in the activities of cyber adversaries.

DE German (DE) Government classification markings (VS)

Taxonomy for the handling of protectively marked information in MISP with German (DE) Government classification markings (VS).

DHS CIIP Sectors

DHS critical sectors as described in https://www.dhs.gov/critical-infrastructure-sectors.

Diamond Model for Intrusion Analysis

The Diamond Model for Intrusion Analysis, a phase-based model developed by Lockheed Martin, aims to help categorise and identify the stage of an attack as described in http://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf.

Detection Maturity Level

The Detection Maturity Level (DML) model is a capability maturity model for referencing ones maturity in detecting cyber attacks. It's designed for organizations who perform intel-driven detection and response and who put an emphasis on having a mature detection program.

Domain Name Abuse

Taxonomy to tag domain names used for cybercrime. We suggest to use europol-incident(./europol-incident) to tag abuse-activity.

eCSIRT and IntelMQ incident classification

eCSIRT incident classification Appendix C of the eCSIRT EU project including IntelMQ updates.

ENISA ENISA Threat Taxonomy

ENISA Threat Taxonomy - A tool for structuring threat information as published

Estimative Language Estimative Language (ICD 203)

Estimative language - including likelihood or probability of event based on the Intelligence Community Directive 203 (ICD 203) (6.2.(a)).

EU NIS Critical Infrastructure Operators

Market operators and public administrations that must comply to some notifications requirements under EU NIS directive.

EUCI classification

EU classified information (EUCI) means any information or material designated by a EU security classification, the unauthorised disclosure of which could cause varying degrees of prejudice to the interests of the European Union or of one or more of the Member States as described.

Europol Incident

EUROPOL class of incident taxonomy

Europol Events

EUROPOL type of events taxonomy

FIRST CSIRT Case classification

FIRST CSIRT Case Classification.

FIRST Information Exchange Policy (IEP) framework

Information Security Indicators - ETSI GS ISI 001-1 (V1.1.2): ISI Indicators

Information security indicators have been standardized by the ETSI Industrial Specification Group (ISG) ISI. These indicators provide the basis to switch from a qualitative to a quantitative culture in IT Security Scope of measurements: External and internal threats (attempt and success), user's deviant behaviours, nonconformities and/or vulnerabilities (software, configuration, behavioural, general security framework).

Information Security Marking Metadata DNI (Director of National Intelligence - US)

ISM (Information Security Marking Metadata) V13 as described by DNI.gov.

Malware classification

Malware classification based on a SANS whitepaper about malware.

ms-caro-malware Malware Type and Platform classification based on Microsoft's implementation of the Computer Antivirus Research Organization (CARO) Naming Scheme and Malware Terminology.

NATO Classification Marking

Marking of Classified and Unclassified materials as described by the North Atlantic Treaty Organization, NATO.

Open Threat Taxonomy v1.1

Open Threat Taxonomy v1.1 base on James Tarala of SANS ref.

STIX-TTP

STIX-TTP exposes a set classification tools that represents the behavior or modus operandi of cyber adversaries as normalized in STIX. TTPs consist of the specific adversary behavior (attack patterns, malware, exploits) exhibited, resources leveraged (tools, infrastructure, personas), information on the victims targeted (who, what or where), relevant ExploitTargets being targeted, intended effects, relevant kill chain phases, handling guidance, source of the TTP information, etc.

Targeted Threat Index is a metric for assigning an overall threat ranking score to email messages that deliver malware to a victims computer.

The Targeted Threat Index is a metric for assigning an overall threat ranking score to email messages that deliver malware to a victims computer. The TTI metric was first introduced at SecTor 2013 by Seth Hardy as part of the talk “RATastrophe: Monitoring a Malware Menagerie” along with Katie Kleemola and Greg Wiseman. More info about TTI.

The Permissible Actions Protocol - or short: PAP - was designed to indicate how the received information can be used.

The Permissible Actions Protocol - or short: PAP - was designed to indicate how the received information can be used. It's a protocol/taxonomy similar to TLP informing the recipients of information what they can do with the received information.

TLP - Traffic Light Protocol

The Traffic Light Protocol - or short: TLP - was designed with the objective to create a favorable classification scheme for sharing sensitive information while keeping the control over its distribution at the same time.

Vocabulary for Event Recording and Incident Sharing VERIS

Vocabulary for Event Recording and Incident Sharing is a format created by the VERIS community.

Reserved Taxonomy

The following taxonomy namespaces are reserved and used internally to MISP.

  • galaxy mapping taxonomy with cluster:element:"value".

Documentation

A documentation of the taxonomies is generated automatically from the taxonomies description and available in PDF and HTML.

How to contribute your taxonomy?

It is quite easy. Create a JSON file describing your taxonomy as triple tags (e.g. check an existing one like Admiralty Scale), create a directory matching your name space, put your machinetag file in the directory and pull your request. That's it. Everyone can benefit from your taxonomy and can be automatically enabled in information sharing tools like MISP.

For more information, "Information Sharing and Taxonomies Practical Classification of Threat Indicators using MISP" presentation given to the last MISP training in Luxembourg.

How to add your private taxonomy to MISP

$ cd /var/www/MISP/app/files/taxonomies/
$ mkdir privatetaxonomy
$ cd privatetaxonomy
$ vi machinetag.json

Create a JSON file Create a JSON file describing your taxonomy as triple tags.

Once you are happy with your file go to MISP Web GUI taxonomies/index and update the taxonomies, the newly created taxonomy should be visible, now you need to activate the tags within your taxonomy.

MISP Taxonomies - tools

machinetag.py is a parsing tool to dump taxonomies expressed in Machine Tags (Triple Tags) and list all valid tags from a specific taxonomy.

% cd tools
% python machinetag.py
        admiralty-scale:source-reliability="a"
        admiralty-scale:source-reliability="b"
        admiralty-scale:source-reliability="c"
        admiralty-scale:source-reliability="d"
        admiralty-scale:source-reliability="e"
        admiralty-scale:source-reliability="f"
        admiralty-scale:information-credibility="1"
        admiralty-scale:information-credibility="2"
        admiralty-scale:information-credibility="3"
        admiralty-scale:information-credibility="4"
        admiralty-scale:information-credibility="5"
        admiralty-scale:information-credibility="6"
        ...

License

The MISP taxonomies are licensed under CC0 1.0 Universal (CC0 1.0) - Public Domain Dedication. If a specific author of a taxonomy wants to license it under a different license, a pull request can be requested.