chg: [doc] modules doc added

pull/12/head
Alexandre Dulaunoy 2019-08-04 07:55:16 +02:00
parent aa41d441e0
commit 3ae52fdd52
No known key found for this signature in database
GPG Key ID: 09E2CD4944E6CBCD
1 changed files with 1 additions and 1 deletions

View File

@ -37,7 +37,7 @@ Discover how MISP is used today in multiple organisations. Not only to store, sh
<li> Flexible <strong>API</strong> to integrate MISP with your own solutions. MISP is bundled with <a href="https://github.com/MISP/PyMISP">PyMISP</a> which is a flexible Python Library to fetch, add or update events attributes, handle malware samples or search for attributes.</li> <li> Flexible <strong>API</strong> to integrate MISP with your own solutions. MISP is bundled with <a href="https://github.com/MISP/PyMISP">PyMISP</a> which is a flexible Python Library to fetch, add or update events attributes, handle malware samples or search for attributes.</li>
<li> <strong>adjustable taxonomy</strong> to classify and tag events following your own classification schemes or <a href="https://github.com/MISP/misp-taxonomies">existing taxonomies</a>. The taxonomy can be local to your MISP but also shareable among MISP instances. MISP comes with a default set of well-known <a href="/taxonomies.html">taxonomies and classification schemes</a> to support standard classification as used by ENISA, Europol, DHS, CSIRTs or many other organisations.</li> <li> <strong>adjustable taxonomy</strong> to classify and tag events following your own classification schemes or <a href="https://github.com/MISP/misp-taxonomies">existing taxonomies</a>. The taxonomy can be local to your MISP but also shareable among MISP instances. MISP comes with a default set of well-known <a href="/taxonomies.html">taxonomies and classification schemes</a> to support standard classification as used by ENISA, Europol, DHS, CSIRTs or many other organisations.</li>
<li> <strong>intelligence vocabularies</strong> called MISP galaxy and bundled with existing <a href="galaxy.html">threat actors, malware, RAT, ransomware or MITRE ATT&CK</a> which can be easily linked with events in MISP.</li> <li> <strong>intelligence vocabularies</strong> called MISP galaxy and bundled with existing <a href="galaxy.html">threat actors, malware, RAT, ransomware or MITRE ATT&CK</a> which can be easily linked with events in MISP.</li>
<li> <strong>expansion modules in Python</strong> to expand MISP with your own services or activate already available <a href="https://github.com/MISP/misp-modules">misp-modules</a>. <li> <strong><a href="https://misp.github.io/misp-modules/">expansion modules</a> in Python</strong> to expand MISP with your own services or activate already available <a href="https://github.com/MISP/misp-modules">misp-modules</a>.
<li> <strong>sighting support</strong> to get observations from organizations concerning shared indicators and attributes. Sighting <a href="https://www.circl.lu/doc/misp/automation/index.html#sightings-api">can be contributed</a> via MISP user-interface, API as MISP document or STIX sighting documents. Starting with MISP 2.4.66, <a href="https://www.misp.software/2017/02/16/Sighting-The-Next-Level.html">Sighting has been extended</a> to support false-negative sighting or expiration sighting.</li> <li> <strong>sighting support</strong> to get observations from organizations concerning shared indicators and attributes. Sighting <a href="https://www.circl.lu/doc/misp/automation/index.html#sightings-api">can be contributed</a> via MISP user-interface, API as MISP document or STIX sighting documents. Starting with MISP 2.4.66, <a href="https://www.misp.software/2017/02/16/Sighting-The-Next-Level.html">Sighting has been extended</a> to support false-negative sighting or expiration sighting.</li>
<li> <strong>STIX support</strong>: export data in the STIX format (XML and JSON) including export/import in STIX 2.0 format.</li> <li> <strong>STIX support</strong>: export data in the STIX format (XML and JSON) including export/import in STIX 2.0 format.</li>
<li> <strong>integrated encryption and signing of the notifications</strong> via PGP and/or S/MIME depending of the user preferences.</li> <li> <strong>integrated encryption and signing of the notifications</strong> via PGP and/or S/MIME depending of the user preferences.</li>