Links fixed

pull/2/head
Alexandre Dulaunoy 2017-11-05 11:43:58 +01:00
parent 44f4a2d3b1
commit 5759b00bbd
No known key found for this signature in database
GPG Key ID: 09E2CD4944E6CBCD
1 changed files with 2 additions and 2 deletions

View File

@ -35,8 +35,8 @@ Discover how MISP is used today in multiple organisations. Not only to store, sh
<li> <strong>feed import</strong>: flexible tool to import and integrate MISP <a href="/feeds/">feed</a> and any threatintel or OSINT feed from third parties. Many <a href="/feeds/">default feeds</a> are included in standard MISP installation.</li>
<li> <strong>delegating of sharing</strong>: allows a simple pseudo-anonymous mechanism to delegate publication of event/indicators to another organization.
<li> Flexible <strong>API</strong> to integrate MISP with your own solutions. MISP is bundled with <a href="https://github.com/MISP/PyMISP">PyMISP</a> which is a flexible Python Library to fetch, add or update events attributes, handle malware samples or search for attributes.
<li> <strong>Adjustable taxonomy</strong> to classify and tag events following your own classification schemes or <a href="https://github.com/MISP/misp-taxonomies">existing taxonomies</a>. The taxonomy can be local to your MISP but also shareable among MISP instances.
<li> <strong>Intelligence vocabularies</strong> called MISP galaxy and bundled with existing <a href="https://www.misp-project.org/galaxy.org">threat actors, malware, RAT, ransomware or MITRE ATT&CK</a> which can be easily linked with events in MISP.
<li> <strong>Adjustable taxonomy</strong> to classify and tag events following your own classification schemes or <a href="https://github.com/MISP/misp-taxonomies">existing taxonomies</a>. The taxonomy can be local to your MISP but also shareable among MISP instances. MISP comes with a default set of well-known <a href="/taxonomies.html">taxonomies and classification schemes</a> to support standard classification as used by ENISA, Europol, DHS, CSIRTs or many other organisations.
<li> <strong>Intelligence vocabularies</strong> called MISP galaxy and bundled with existing <a href="galaxy.html">threat actors, malware, RAT, ransomware or MITRE ATT&CK</a> which can be easily linked with events in MISP.
<li> <strong>Expansion modules in Python</strong> to expand MISP with your own services or activate already available <a href="https://github.com/MISP/misp-modules">misp-modules</a>.
<li> <strong>Sighting support</strong> to get observations from organizations concerning shared indicators and attributes. Sighting <a href="https://www.circl.lu/doc/misp/automation/index.html#sightings-api">can be contributed</a> via MISP user-interface, API as MISP document or STIX sighting documents. Starting with MISP 2.4.66, <a href="https://www.misp.software/2017/02/16/Sighting-The-Next-Level.html">Sighting has been extended</a> to support false-negative sighting or expiration sighting.</li>
<li> <strong>STIX support</strong>: export data in the STIX format (XML and JSON) including export in STIX 2.0 format.</li>