This repository is the official source of the specification and formats used in the MISP project.
The formats are described to support other implementations which reuse the format and ensuring an interoperability with existing MISP software, other Threat Intelligence Platforms and security tools at large.
All the formats can be freely reused by everyone.
- misp-core-format (markdown source) which describes the core JSON format of MISP. Current Internet-Draft: 07
- misp-taxonomy-format (markdown source) which describes the taxonomy JSON format of MISP. Current Internet-Draft: 07
- misp-galaxy-format which describes the galaxy template format used to expand the threat actor modelling of MISP. Current Internet-Draft: 06
- misp-object-template-format which describes the object template format to add combinedand composite object to the MISP core format. Current Internet-Draft: 03
- misp-modules-protocol which describes the misp-modules protocol used between MISP and misp-modules.
- misp-collaborative-voting-format which describes the collaborative voting and scoring format for the feeds providers.
If you want to see how a threat intelligence can be easily expressed in MISP standard, the following resources might give you some ideas:
Installing MISP is also another option to see the MISP standards in action. The MISP standards are actively used in the MISP threat intelligence platform to support the complete chain from intelligence creation, sharing, distribution and synchronisation.
These RFCs use mmark to generate - get a release from the Github Repo and make sure it's in your PATH.
You'll also need xml2rfc
- install using sudo pip3 isntall xml2rfc
for directory in $(find . -type d -iname "misp*"); do;
echo "Building $directory...";
cd $directory;
make;
cd ..;
done;
If you want to contribute to the MISP specifications, feel free to open an issue.