Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Python module to use the MISP Taxonomies

License

NotificationsYou must be signed in to change notification settings

MISP/PyTaxonomies

Repository files navigation

Pythonic way to work with the taxonomies defined there:https://github.com/MISP/misp-taxonomies

Usage

Taxonomies and predicates are represented as immutable Python dictionaries.

Installation

pip install pytaxonomies

Basics

In [1]: from pytaxonomies import TaxonomiesIn [2]: taxonomies = Taxonomies()In [3]: taxonomies.versionOut[3]: '20160725'In [4]: taxonomies.licenseOut[4]: 'CC-BY'In [5]: taxonomies.descriptionOut[5]: 'Manifest file of MISP taxonomies available.'# How many taxonomies have been importedIn [6]: len(taxonomies)Out[6]: 27# Names of the taxonomiesIn [7]: list(taxonomies.keys())Out[7]:['tlp', 'eu-critical-sectors', 'dni-ism', 'de-vs', 'osint', 'ms-caro-malware', 'open-threat', 'circl', 'iep', 'euci', 'kill-chain', 'europol-events', 'veris', 'information-security-indicators', 'estimative-language', 'adversary', 'europol-incident', 'malware_classification', 'ecsirt', 'dhs-ciip-sectors', 'csirt_case_classification', 'nato', 'fr-classif', 'enisa', 'misp', 'admiralty-scale', 'ms-caro-malware-full']In [8]: taxonomies.get('enisa').descriptionOut[8]: 'The present threat taxonomy is an initial version that has been developed on the basis of available ENISA material. This material has been used as an ENISA-internal structuring aid for information collection and threat consolidation purposes. It emerged in the time period 2012-2015.'In [9]: taxonomies.get('enisa').versionOut[9]: 201601In [10]: taxonomies.get('enisa').nameOut[10]: 'enisa'In [11]: list(taxonomies.get('enisa').keys())Out[11]:['legal', 'outages', 'eavesdropping-interception-hijacking', 'nefarious-activity-abuse', 'physical-attack', 'failures-malfunction', 'disaster', 'unintentional-damage']In [12]: list(taxonomies.get('enisa').get('physical-attack'))Out[12]:['fraud-by-employees', 'theft', 'unauthorised-physical-access-or-unauthorised-entry-to-premises', 'theft-of-documents', 'information-leak-or-unauthorised-sharing', 'vandalism', 'damage-from-the-wafare', 'sabotage', 'coercion-or-extortion-or-corruption', 'theft-of-mobile-devices', 'theft-of-fixed-hardware', 'terrorist-attack', 'theft-of-backups', 'fraud']In [13]: taxonomies.get('enisa').get('physical-attack').get('vandalism').valueOut[13]: 'vandalism'In [14]: taxonomies.get('enisa').get('physical-attack').get('vandalism').expandedOut[14]: 'Vandalism'In [15]: taxonomies.get('enisa').get('physical-attack').get('vandalism').descriptionOut[15]: 'Act of physically damaging IT assets.'

Get machine tags

In [1]: print(taxonomies)  # or taxonomies.all_machinetags()<display the machine tags for all the taxonomies>In [2]: print(taxonomies.get('circl'))  # or taxonomies.get('circl').machinetags()circl:incident-classification="vulnerability"circl:incident-classification="malware"circl:incident-classification="fastflux"circl:incident-classification="system-compromise"circl:incident-classification="sql-injection"circl:incident-classification="scan"circl:incident-classification="XSS"circl:incident-classification="information-leak"circl:incident-classification="scam"circl:incident-classification="copyright-issue"circl:incident-classification="denial-of-service"circl:incident-classification="phishing"circl:incident-classification="spam"circl:topic="undefined"circl:topic="industry"circl:topic="ict"circl:topic="finance"circl:topic="services"circl:topic="individual"circl:topic="medical"# All entriesIn [3]: taxonomies.get('circl').amount_entries()Out[3]: 28# Amount predicatesIn [3]: len(taxonomies.get('circl'))Out[3]: 2

Expanded machine tag

In [10]: print(taxonomies.get('circl').machinetags_expanded())circl:topic="Individual"circl:topic="Services"circl:topic="Finance"circl:topic="Medical"circl:topic="Industry"circl:topic="Undefined"circl:topic="ICT"circl:incident-classification="Phishing"circl:incident-classification="Malware"circl:incident-classification="XSS"circl:incident-classification="Copyright issue"circl:incident-classification="Spam"circl:incident-classification="SQL Injection"circl:incident-classification="Scan"circl:incident-classification="Scam"circl:incident-classification="Vulnerability"circl:incident-classification="Denial of Service"circl:incident-classification="Information leak"circl:incident-classification="Fastflux"circl:incident-classification="System compromise"

[8]ページ先頭

©2009-2025 Movatter.jp