MISP logo

MISP MISP objects to be used in MISP (2.4.80 (TBC)) system and can be used by other information sharing tool. MISP objects are in addition to MISP attributes to allow advanced combinations of attributes. The creation of these objects and their associated attributes are based on real cyber security use-cases and existing practices in information sharing.

ail-leak

An information leak as defined by the AIL Analysis Information Leak framework..

ail-leak is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

original-date

datetime

text

text

first-seen

datetime

last-seen

datetime

origin

url

sensor

text

type

text

An HTTP cookie (web cookie, browser cookie) is a small piece of data that a server sends to the user’s web browser. The browser may store it and send it back with the next request to the same server. Typically, it’s used to tell if two requests came from the same browser — keeping a user logged-in, for example. It remembers stateful information for the stateless HTTP protocol. (as defined by the Mozilla foundation..

cookie is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

cookie-value

text

text

text

cookie-name

text

cookie

cookie

type

text

credit-card

A payment card like credit card, debit card or any similar cards which can be used for financial transactions..

credit-card is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

version

text

name

text

card-security-code

text

expiration

datetime

cc-number

cc-number

comment

comment

issued

datetime

ddos

DDoS object describes a current DDoS activity from a specific or/and to a specific target. Type of DDoS can be attached to the object as a taxonomy.

ddos is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

total-bps

counter

src-port

port

last-seen

datetime

text

text

total-pps

counter

dst-port

port

ip-dst

ip-dst

protocol

text

Protocol used for the attack ['TCP', 'UDP', 'ICMP', 'IP']

ip-src

ip-src

first-seen

datetime

domain|ip

A domain and IP address seen as a tuple in a specific time frame..

domain|ip is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

ip

ip-dst

domain

domain

text

text

last-seen

datetime

first-seen

datetime

elf

Object describing a Executable and Linkable Format.

elf is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

number-sections

counter

arch

text

entrypoint-address

text

os_abi

text

text

text

type

text

elf-section

Object describing a section of an Executable and Linkable Format.

elf-section is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

sha1

sha1

name

text

text

text

sha384

sha384

sha512/224

sha512/224

size-in-bytes

size-in-bytes

ssdeep

ssdeep

sha512

sha512

sha256

sha256

flag

text

sha512/256

sha512/256

sha224

sha224

entropy

float

type

text

md5

md5

email

Email object describing an email with meta-information.

email is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

x-mailer

email-x-mailer

subject

email-subject

header

email-header

from-display-name

email-src-display-name

from

email-src

thread-index

email-thread-index

send-date

datetime

to

email-dst

reply-to

email-reply-to

attachment

email-attachment

message-id

email-message-id

to-display-name

email-dst-display-name

mime-boundary

email-mime-boundary

file

File object describing a file with meta-information.

file is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

sha1

sha1

text

text

sha384

sha384

tlsh

tlsh

mimetype

text

sha512/224

sha512/224

authentihash

authentihash

size-in-bytes

size-in-bytes

ssdeep

ssdeep

sha512

sha512

pattern-in-file

pattern-in-file

sha256

sha256

malware-sample

malware-sample

sha512/256

sha512/256

sha224

sha224

filename

filename

entropy

float

md5

md5

geolocation

An object to describe a geographic location..

geolocation is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

altitude

float

text

text

first-seen

datetime

longitude

float

latitude

float

country

text

city

text

region

text

last-seen

datetime

http-request

A single HTTP request header.

http-request is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

text

text

basicauth-user

text

proxy-user

text

method

http-method

host

hostname

cookie

text

proxy-password

text

referer

referer

uri

uri

url

url

content-type

other

basicauth-password

text

user-agent

user-agent

ip|port

An IP address and a port seen as a tuple (or as a triple) in a specific time frame..

ip|port is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

src-port

port

ip

ip-dst

text

text

last-seen

datetime

first-seen

datetime

dst-port

port

ja3

JA3 is a new technique for creating SSL client fingerprints that are easy to produce and can be easily shared for threat intelligence. Fingerprints are composed of Client Hello packet; SSL Version, Accepted Ciphers, List of Extensions, Elliptic Curves, and Elliptic Curve Formats. https://github.com/salesforce/ja3.

ja3 is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

description

text

first-seen

datetime

ip-dst

ip-dst

ja3-fingerprint-md5

md5

ip-src

ip-src

last-seen

datetime

macho

Object describing a file in Mach-O format..

macho is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

name

text

number-sections

counter

text

text

entrypoint-address

text

type

text

macho-section

Object describing a section of a file in Mach-O format..

macho-section is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

sha1

sha1

name

text

text

text

sha384

sha384

sha512/224

sha512/224

size-in-bytes

size-in-bytes

ssdeep

ssdeep

sha512

sha512

sha256

sha256

sha512/256

sha512/256

sha224

sha224

entropy

float

md5

md5

passive-dns

Passive DNS records as expressed in draft-dulaunoy-dnsop-passive-dns-cof-01.

passive-dns is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

rrname

text

text

text

sensor_id

text

rdata

text

time_first

datetime

time_last

datetime

zone_time_last

datetime

rrtype

text

origin

text

zone_time_first

datetime

bailiwick

text

count

counter

pe

Object describing a Portable Executable.

pe is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

legal-copyright

text

product-version

text

number-sections

counter

text

text

file-description

text

product-name

text

company-name

text

pehash

pehash

entrypoint-section-at-position

text

original-filename

filename

imphash

imphash

type

text

compilation-timestamp

datetime

entrypoint-address

text

file-version

text

impfuzzy

impfuzzy

lang-id

text

internal-filename

filename

pe-section

Object describing a section of a Portable Executable.

pe-section is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

sha1

sha1

name

text

text

text

sha384

sha384

sha512/224

sha512/224

size-in-bytes

size-in-bytes

ssdeep

ssdeep

sha512

sha512

sha256

sha256

sha512/256

sha512/256

sha224

sha224

characteristic

text

entropy

float

md5

md5

person

An person which describes a person or an identity..

person is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

text

text

last-name

last-name

place-of-birth

place-of-birth

first-name

first-name

gender

gender

The gender of a natural person. ['Male', 'Female', 'Other', 'Prefer not to say']

middle-name

middle-name

passport-expiration

passport-expiration

date-of-birth

date-of-birth

passport-number

passport-number

nationality

nationality

redress-number

redress-number

passport-country

passport-country

phone

A phone or mobile phone object which describe a phone..

phone is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

gummei

text

guti

text

imei

text

tmsi

text

serial-number

text

first-seen

datetime

imsi

text

text

text

msisdn

text

last-seen

datetime

r2graphity

Indicators extracted from files using radare2 and graphml.

r2graphity is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

ratio-api

float

callback-average

counter

callbacks

counter

memory-allocations

counter

not-referenced-strings

counter

r2-commit-version

text

referenced-strings

counter

miss-api

counter

get-proc-address

counter

dangling-strings

counter

local-references

counter

text

text

ratio-functions

float

shortest-path-to-create-thread

counter

unknown-references

counter

ratio-string

float

gml

attachment

refsglobalvar

counter

callback-largest

counter

total-api

counter

create-thread

counter

total-functions

counter

regexp

An object describing a regular expression (regex or regexp). The object can be linked via a relationship to other attributes or objects to describe how it can be represented as a regular expression..

regexp is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

regexp-type

text

Type of the regular expression syntax. ['PCRE', 'PCRE2', 'POSIX BRE', 'POSIX ERE']

comment

comment

regexp

text

registry-key

Registry key object describing a Windows registry key with value and last-modified timestamp.

registry-key is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

name

reg-name

key

reg-key

data-type

reg-datatype

data

reg-data

hive

reg-hive

last-modified

datetime

tor-node

Tor node (which protects your privacy on the internet by hiding the connection between users Internet address and the services used by the users) description which are part of the Tor network at a time..

tor-node is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

address

ip-src

text

text

version_line

text

first-seen

datetime

published

datetime

document

text

version

text

description

text

fingerprint

text

nickname

text

flags

text

last-seen

datetime

url

url object describes an url along with its normalized field (like extracted using faup parsing library) and its metadata..

url is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

credential

text

text

text

last-seen

datetime

first-seen

datetime

fragment

text

host

hostname

subdomain

text

resource_path

text

tld

text

domain

domain

url

url

port

port

scheme

text

domain_without_tld

text

query_string

text

vulnerability

Vulnerability object describing common vulnerability enumeration.

vulnerability is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

id

vulnerability

summary

text

text

text

references

link

published

datetime

modified

datetime

vulnerable_configuration

text

whois

Whois records information for a domain name..

whois is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

creation-date

datetime

text

text

registar

whois-registrar

expiration-date

datetime

registrant-phone

whois-registrant-phone

registrant-email

whois-registrant-email

modification-date

datetime

registrant-name

whois-registrant-name

domain

domain

x509

x509 object describing a X.509 certificate.

x509 is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

subject

text

pubkey-info-size

text

x509-fingerprint-sha256

sha256

validity-not-after

datetime

version

text

x509-fingerprint-sha1

sha1

pubkey-info-exponent

text

serial-number

text

raw-base64

text

pubkey-info-modulus

text

issuer

text

text

text

pubkey-info-algorithm

text

validity-not-before

datetime

x509-fingerprint-md5

md5

yabin

yabin.py generates Yara rules from function prologs, for matching and hunting binaries. ref: https://github.com/AlienVault-OTX/yabin.

yabin is a MISP object available in JSON format at this location The JSON format can be freely reused in your application or automatically enabled in MISP.
Object attribute MISP attribute type Description Disable correlation

version

comment

yara

yara

yara-hunt

yara

comment

comment

whitelist

comment

Relationships

Default type of relationships in MISP objects.

Relationships are part of MISP object and available in JSON format at this location. The JSON format can be freely reused in your application or automatically enabled in MISP.

Name of relationship Description Format

derived-from

The information in the target object is based on information from the source object.

['misp', 'stix-2.0']

duplicate-of

The referenced source and target objects are semantically duplicates of each other.

['misp', 'stix-2.0']

related-to

The referenced source is related to the target object.

['misp', 'stix-2.0']

attributed-to

This referenced source is attributed to the target object.

['misp', 'stix-2.0']

targets

This relationship describes that the source object targets the target object.

['misp', 'stix-2.0']

uses

This relationship describes the use by the source object of the target object.

['misp', 'stix-2.0']

indicates

This relationships describes that the source object indicates the target object.

['misp', 'stix-2.0']

mitigates

This relationship describes a source object which mitigates the target object.

['misp', 'stix-2.0']

variant-of

This relationship describes a source object which is a variant of the target object

['misp', 'stix-2.0']

impersonates

This relationship describe a source object which impersonates the target object

['misp', 'stix-2.0']

authored-by

This relationship describes the author of a specific object.

['misp']

located

This relationship describes the location (of any type) of a specific object.

['misp']

included-in

This relationship describes an object included in another object.

['misp']

analysed-with

This relationship describes an object analysed by another object.

['misp']

claimed-by

This relationship describes an object claimed by another object.

['misp']

communicates-with

This relationship describes an object communicating with another object.

['misp']

dropped-by

This relationship describes an object dropped by another object.

['misp']

executed-by

This relationship describes an object executed by another object.

['misp']

affects

This relationship describes an object affected by another object.

['misp']

beacons-to

This relationship describes an object beaconing to another object.

['misp']

abuses

This relationship describes an object which abuses another object.

['misp']

exfiltrates-to

This relationship describes an object exfiltrating to another object.

['misp']

identifies

This relationship describes an object which identifies another object.

['misp']

intercepts

This relationship describes an object which intercepts another object.

['misp']

calls

This relationship describes an object which calls another objects.

['misp']

detected-as

This relationship describes an object which is detected as another object.

['misp']

triggers

This relationship describes an object which triggers another object.

['misp']