Giter Site home page Giter Site logo

misp / misp-galaxy Goto Github PK

View Code? Open in Web Editor NEW
508.0 48.0 254.0 35 MB

Clusters and elements to attach to MISP events or attributes (like threat actors)

Home Page: https://misp-galaxy.org/

License: Other

Shell 1.21% Python 90.36% JavaScript 8.00% CSS 0.43%
threat-hunting information-exchange misp classification misp-galaxy threat-actors stix threat-intelligence adversaries mitre-adversarial-tactics

misp-galaxy's Introduction

misp-galaxy

Python application

Screenshot - MISP galaxy integeration in MISP threat intelligence platform

MISP galaxy is a simple method to express a large object called cluster that can be attached to MISP events or attributes. A cluster can be composed of one or more elements. Elements are expressed as key-values. There are default knowledge base (such as Threat Actors, Tools, Ransomware, ATT&CK matrixes) available in MISP galaxy but those can be overwritten, replaced, updated, forked and shared as you wish.

Existing clusters and vocabularies can be used as-is or as a common knowledge base. MISP distribution can be applied to each cluster to permit a limited or broader distribution scheme.

Galaxies can be also used to expressed existing matrix-like standards such as MITRE ATT&CK(tm) or custom ones.

The objective is to have a comment set of clusters for organizations starting analysis but that can be expanded to localized information (which is not shared) or additional information (that can be shared).

Available Galaxy - clusters

360.net Threat Actors

360.net Threat Actors - Known or estimated adversary groups as identified by 360.net.

Category: actor - source: https://apt.360.net/aptlist - total: 42 elements

[HTML] - [JSON]

Ammunitions

Ammunitions - Common ammunitions galaxy

Category: firearm - source: https://ammo.com/ - total: 409 elements

[HTML] - [JSON]

Android

Android - Android malware galaxy based on multiple open sources.

Category: tool - source: Open Sources - total: 433 elements

[HTML] - [JSON]

Azure Threat Research Matrix

Azure Threat Research Matrix - The purpose of the Azure Threat Research Matrix (ATRM) is to educate readers on the potential of Azure-based tactics, techniques, and procedures (TTPs). It is not to teach how to weaponize or specifically abuse them. For this reason, some specific commands will be obfuscated or parts will be omitted to prevent abuse.

Category: atrm - source: https://github.com/microsoft/Azure-Threat-Research-Matrix - total: 90 elements

[HTML] - [JSON]

attck4fraud

attck4fraud - attck4fraud - Principles of MITRE ATT&CK in the fraud domain

Category: guidelines - source: Open Sources - total: 71 elements

[HTML] - [JSON]

Backdoor

Backdoor - A list of backdoor malware.

Category: tool - source: Open Sources - total: 28 elements

[HTML] - [JSON]

Banker

Banker - A list of banker malware.

Category: tool - source: Open Sources - total: 53 elements

[HTML] - [JSON]

Bhadra Framework

Bhadra Framework - Bhadra Threat Modeling Framework

Category: mobile - source: https://arxiv.org/pdf/2005.05110.pdf - total: 47 elements

[HTML] - [JSON]

Botnet

Botnet - botnet galaxy

Category: tool - source: MISP Project - total: 130 elements

[HTML] - [JSON]

Branded Vulnerability

Branded Vulnerability - List of known vulnerabilities and attacks with a branding

Category: vulnerability - source: Open Sources - total: 14 elements

[HTML] - [JSON]

Cert EU GovSector

Cert EU GovSector - Cert EU GovSector

Category: sector - source: CERT-EU - total: 6 elements

[HTML] - [JSON]

China Defence Universities Tracker

China Defence Universities Tracker - The China Defence Universities Tracker is a database of Chinese institutions engaged in military or security-related science and technology research. It was created by ASPI’s International Cyber Policy Centre.

Category: academic-institution - source: ASPI International Cyber Policy Centre - total: 159 elements

[HTML] - [JSON]

CONCORDIA Mobile Modelling Framework - Attack Pattern

CONCORDIA Mobile Modelling Framework - Attack Pattern - A list of Techniques in CONCORDIA Mobile Modelling Framework.

Category: cmtmf-attack-pattern - source: https://5g4iot.vlab.cs.hioa.no/ - total: 93 elements

[HTML] - [JSON]

Country

Country - Country meta information based on the database provided by geonames.org.

Category: country - source: MISP Project - total: 252 elements

[HTML] - [JSON]

Cryptominers

Cryptominers - A list of cryptominer and cryptojacker malware.

Category: Cryptominers - source: Open Source Intelligence - total: 5 elements

[HTML] - [JSON]

Actor Types

Actor Types - DISARM is a framework designed for describing and understanding disinformation incidents.

Category: disarm - source: https://github.com/DISARMFoundation/DISARMframeworks - total: 33 elements

[HTML] - [JSON]

Countermeasures

Countermeasures - DISARM is a framework designed for describing and understanding disinformation incidents.

Category: disarm - source: https://github.com/DISARMFoundation/DISARMframeworks - total: 139 elements

[HTML] - [JSON]

Detections

Detections - DISARM is a framework designed for describing and understanding disinformation incidents.

Category: disarm - source: https://github.com/DISARMFoundation/DISARMframeworks - total: 94 elements

[HTML] - [JSON]

Techniques

Techniques - DISARM is a framework designed for describing and understanding disinformation incidents.

Category: disarm - source: https://github.com/DISARMFoundation/DISARMframeworks - total: 298 elements

[HTML] - [JSON]

Election guidelines

Election guidelines - Universal Development and Security Guidelines as Applicable to Election Technology.

Category: guidelines - source: Open Sources - total: 23 elements

[HTML] - [JSON]

Entity

Entity - Description of entities that can be involved in events.

Category: actor - source: MISP Project - total: 4 elements

[HTML] - [JSON]

Exploit-Kit

Exploit-Kit - Exploit-Kit is an enumeration of some exploitation kits used by adversaries. The list includes document, browser and router exploit kits.It's not meant to be totally exhaustive but aim at covering the most seen in the past 5 years

Category: tool - source: MISP Project - total: 52 elements

[HTML] - [JSON]

Firearms

Firearms - Common firearms galaxy

Category: firearm - source: https://www.impactguns.com - total: 5953 elements

[HTML] - [JSON]

FIRST DNS Abuse Techniques Matrix

FIRST DNS Abuse Techniques Matrix - The Domain Name System (DNS) is a critical part of the Internet, including mapping domain names to IP addresses. Malicious threat actors use domain names, their corresponding technical resources, and other parts of the DNS infrastructure, including its protocols, for their malicious cyber operations. CERTs are confronted with reported DNS abuse on a continuous basis, and rely heavily on DNS analysis and infrastructure to protect their constituencies. Understanding the international customary norms applicable for detecting and mitigating DNS abuse from the perspective of the global incident response community is critical for the open Internet’s stability, security and resiliency. See also https://www.first.org/global/sigs/dns/ for more information.

Category: first-dns - source: https://www.first.org/global/sigs/dns/ - total: 21 elements

[HTML] - [JSON]

GSMA MoTIF

GSMA MoTIF - Mobile Threat Intelligence Framework (MoTIF) Principles.

Category: attack-pattern - source: https://www.gsma.com/solutions-and-impact/technologies/security/latest-news/establishing-motif-the-mobile-threat-intelligence-framework/ - total: 50 elements

[HTML] - [JSON]

Intelligence Agencies

Intelligence Agencies - List of intelligence agencies

Category: Intelligence Agencies - source: https://en.wikipedia.org/wiki/List_of_intelligence_agencies - total: 436 elements

[HTML] - [JSON]

INTERPOL DWVA Taxonomy

INTERPOL DWVA Taxonomy - This taxonomy defines common forms of abuses and entities that represent real-world actors and service that are part of a larger Darknet- and Cryptoasset Ecosystems.

Category: dwva - source: https://interpol-innovation-centre.github.io/DW-VA-Taxonomy/ - total: 94 elements

[HTML] - [JSON]

Malpedia

Malpedia - Malware galaxy cluster based on Malpedia.

Category: tool - source: Malpedia - total: 3038 elements

[HTML] - [JSON]

Microsoft Activity Group actor

Microsoft Activity Group actor - Activity groups as described by Microsoft

Category: actor - source: MISP Project - total: 79 elements

[HTML] - [JSON]

Misinformation Pattern

Misinformation Pattern - AM!TT Technique

Category: misinformation-pattern - source: https://github.com/misinfosecproject/amitt_framework - total: 61 elements

[HTML] - [JSON]

MITRE ATLAS Attack Pattern

MITRE ATLAS Attack Pattern - MITRE ATLAS Attack Pattern - Adversarial Threat Landscape for Artificial-Intelligence Systems

Category: attack-pattern - source: https://github.com/mitre-atlas/atlas-navigator-data - total: 82 elements

[HTML] - [JSON]

MITRE ATLAS Course of Action

MITRE ATLAS Course of Action - MITRE ATLAS Mitigation - Adversarial Threat Landscape for Artificial-Intelligence Systems

Category: course-of-action - source: https://github.com/mitre-atlas/atlas-navigator-data - total: 20 elements

[HTML] - [JSON]

Attack Pattern

Attack Pattern - ATT&CK tactic

Category: attack-pattern - source: https://github.com/mitre/cti - total: 1141 elements

[HTML] - [JSON]

Course of Action

Course of Action - ATT&CK Mitigation

Category: course-of-action - source: https://github.com/mitre/cti - total: 281 elements

[HTML] - [JSON]

MITRE D3FEND

MITRE D3FEND - A knowledge graph of cybersecurity countermeasures.

Category: d3fend - source: https://d3fend.mitre.org/ - total: 171 elements

[HTML] - [JSON]

mitre-data-component

mitre-data-component - Data components are parts of data sources.

Category: data-component - source: https://github.com/mitre/cti - total: 117 elements

[HTML] - [JSON]

mitre-data-source

mitre-data-source - Data sources represent the various subjects/topics of information that can be collected by sensors/logs.

Category: data-source - source: https://github.com/mitre/cti - total: 40 elements

[HTML] - [JSON]

Assets

Assets - A list of asset categories that are commonly found in industrial control systems.

Category: asset - source: https://collaborate.mitre.org/attackics/index.php/All_Assets - total: 7 elements

[HTML] - [JSON]

Groups

Groups - Groups are sets of related intrusion activity that are tracked by a common name in the security community. Groups are also sometimes referred to as campaigns or intrusion sets. Some groups have multiple names associated with the same set of activities due to various organizations tracking the same set of activities by different names. Groups are mapped to publicly reported technique use and referenced in the ATT&CK for ICS knowledge base. Groups are also mapped to reported software used during intrusions.

Category: actor - source: https://collaborate.mitre.org/attackics/index.php/Groups - total: 10 elements

[HTML] - [JSON]

Levels

Levels - Based on the Purdue Model to aid ATT&CK for ICS users to understand which techniques are applicable to their environment.

Category: level - source: https://collaborate.mitre.org/attackics/index.php/All_Levels - total: 3 elements

[HTML] - [JSON]

Software

Software - Software is a generic term for custom or commercial code, operating system utilities, open-source software, or other tools used to conduct behavior modeled in ATT&CK for ICS.

Category: tool - source: https://collaborate.mitre.org/attackics/index.php/Software - total: 17 elements

[HTML] - [JSON]

Tactics

Tactics - A list of all 11 tactics in ATT&CK for ICS

Category: tactic - source: https://collaborate.mitre.org/attackics/index.php/All_Tactics - total: 9 elements

[HTML] - [JSON]

Techniques

Techniques - A list of Techniques in ATT&CK for ICS.

Category: attack-pattern - source: https://collaborate.mitre.org/attackics/index.php/All_Techniques - total: 78 elements

[HTML] - [JSON]

Intrusion Set

Intrusion Set - Name of ATT&CK Group

Category: actor - source: https://github.com/mitre/cti - total: 165 elements

[HTML] - [JSON]

Malware

Malware - Name of ATT&CK software

Category: tool - source: https://github.com/mitre/cti - total: 705 elements

[HTML] - [JSON]

mitre-tool

mitre-tool - Name of ATT&CK software

Category: tool - source: https://github.com/mitre/cti - total: 87 elements

[HTML] - [JSON]

NACE

NACE - version 2.1 - The Statistical Classification of Economic Activities in the European Community, commonly referred to as NACE (for the French term "nomenclature statistique des activités économiques dans la Communauté européenne"), is the industry standard classification system used in the European Union.

Category: sector - source: https://ec.europa.eu/eurostat/web/metadata/classifications - total: 1047 elements

[HTML] - [JSON]

NAICS

NAICS - The North American Industry Classification System or NAICS is a classification of business establishments by type of economic activity (the process of production).

Category: sector - source: North American Industry Classification System - NAICS - total: 2125 elements

[HTML] - [JSON]

NICE Competency areas

NICE Competency areas - Competency areas based on the NIST NICE framework

Category: workforce - source: https://csrc.nist.gov/pubs/sp/800/181/r1/final - total: 11 elements

[HTML] - [JSON]

NICE Knowledges

NICE Knowledges - Knowledge based on the NIST NICE framework

Category: workforce - source: https://csrc.nist.gov/pubs/sp/800/181/r1/final - total: 640 elements

[HTML] - [JSON]

OPM codes in cybersecurity

OPM codes in cybersecurity - Office of Personnel Management codes in cybersecurity

Category: workforce - source: https://dw.opm.gov/datastandards/referenceData/2273/current - total: 52 elements

[HTML] - [JSON]

NICE Skills

NICE Skills - Skills based on the NIST NICE framework

Category: workforce - source: https://csrc.nist.gov/pubs/sp/800/181/r1/final - total: 556 elements

[HTML] - [JSON]

NICE Tasks

NICE Tasks - Tasks based on the NIST NICE framework

Category: workforce - source: https://csrc.nist.gov/pubs/sp/800/181/r1/final - total: 1084 elements

[HTML] - [JSON]

NICE Work Roles

NICE Work Roles - Work roles based on the NIST NICE framework

Category: workforce - source: https://csrc.nist.gov/pubs/sp/800/181/r1/final - total: 52 elements

[HTML] - [JSON]

o365-exchange-techniques

o365-exchange-techniques - o365-exchange-techniques - Office365/Exchange related techniques by @johnLaTwC and @inversecos

Category: guidelines - source: Open Sources, https://www.inversecos.com/2021/09/office365-attacks-bypassing-mfa.html - total: 62 elements

[HTML] - [JSON]

online-service

online-service - Known public online services.

Category: tool - source: Open Sources - total: 1 elements

[HTML] - [JSON]

Preventive Measure

Preventive Measure - Preventive measures based on the ransomware document overview as published in https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml# . The preventive measures are quite generic and can fit any standard Windows infrastructure and their security measures.

Category: measure - source: MISP Project - total: 20 elements

[HTML] - [JSON]

Producer

Producer - List of threat intelligence producer from security vendors to CERTs including any producer of intelligence at large.

Category: actor - source: MISP Project - total: 33 elements

[HTML] - [JSON]

Ransomware

Ransomware - Ransomware galaxy based on https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml and http://pastebin.com/raw/GHgpWjar

Category: tool - source: Various - total: 1799 elements

[HTML] - [JSON]

RAT

RAT - remote administration tool or remote access tool (RAT), also called sometimes remote access trojan, is a piece of software or programming that allows a remote "operator" to control a system as if they have physical access to that system.

Category: tool - source: MISP Project - total: 265 elements

[HTML] - [JSON]

Regions UN M49

Regions UN M49 - Regions based on UN M49.

Category: location - source: https://unstats.un.org/unsd/methodology/m49/overview/ - total: 32 elements

[HTML] - [JSON]

rsit

rsit - rsit

Category: rsit - source: https://github.com/enisaeu/Reference-Security-Incident-Taxonomy-Task-Force - total: 39 elements

[HTML] - [JSON]

Sector

Sector - Activity sectors

Category: sector - source: CERT-EU - total: 118 elements

[HTML] - [JSON]

Sigma-Rules

Sigma-Rules - MISP galaxy cluster based on Sigma Rules.

Category: rules - source: https://github.com/jstnk9/MISP/tree/main/misp-galaxy/sigma - total: 2924 elements

[HTML] - [JSON]

Dark Patterns

Dark Patterns - Dark Patterns are user interface that tricks users into making decisions that benefit the interface's holder to the expense of the user.

Category: dark-patterns - source: CIRCL - total: 19 elements

[HTML] - [JSON]

SoD Matrix

SoD Matrix - SOD Matrix

Category: sod-matrix - source: https://github.com/cudeso/SoD-Matrix - total: 276 elements

[HTML] - [JSON]

Stealer

Stealer - A list of malware stealer.

Category: tool - source: Open Sources - total: 16 elements

[HTML] - [JSON]

Surveillance Vendor

Surveillance Vendor - List of vendors selling surveillance technologies including malware, interception devices or computer exploitation services.

Category: actor - source: MISP Project - total: 50 elements

[HTML] - [JSON]

Target Information

Target Information - Description of targets of threat actors.

Category: target - source: Various - total: 241 elements

[HTML] - [JSON]

TDS

TDS - TDS is a list of Traffic Direction System used by adversaries

Category: tool - source: MISP Project - total: 11 elements

[HTML] - [JSON]

Tea Matrix

Tea Matrix - Tea Matrix

Category: tea-matrix - source: ** - total: 7 elements

[HTML] - [JSON]

Threat Actor

Threat Actor - Known or estimated adversary groups targeting organizations and employees. Adversary groups are regularly confused with their initial operation or campaign. threat-actor-classification meta can be used to clarify the understanding of the threat-actor if also considered as operation, campaign or activity group.

Category: actor - source: MISP Project - total: 716 elements

[HTML] - [JSON]

Tidal Campaigns

Tidal Campaigns - Tidal Campaigns Cluster

Category: Campaigns - source: https://app-api.tidalcyber.com/api/v1/campaigns/ - total: 48 elements

[HTML] - [JSON]

Tidal Groups

Tidal Groups - Tidal Groups Galaxy

Category: Threat Groups - source: https://app-api.tidalcyber.com/api/v1/groups/ - total: 172 elements

[HTML] - [JSON]

Tidal References

Tidal References - Tidal References Cluster

Category: References - source: https://app-api.tidalcyber.com/api/v1/references/ - total: 4261 elements

[HTML] - [JSON]

Tidal Software

Tidal Software - Tidal Software Cluster

Category: Software - source: https://app-api.tidalcyber.com/api/v1/software/ - total: 1003 elements

[HTML] - [JSON]

Tidal Tactic

Tidal Tactic - Tidal Tactic Cluster

Category: Tactic - source: https://app-api.tidalcyber.com/api/v1/tactic/ - total: 14 elements

[HTML] - [JSON]

Tidal Technique

Tidal Technique - Tidal Technique Cluster

Category: Technique - source: https://app-api.tidalcyber.com/api/v1/technique/ - total: 202 elements

[HTML] - [JSON]

Threat Matrix for storage services

Threat Matrix for storage services - Microsoft Defender for Cloud threat matrix for storage services contains attack tactics, techniques and mitigations relevant storage services delivered by cloud providers.

Category: tmss - source: https://github.com/microsoft/Threat-matrix-for-storage-services - total: 40 elements

[HTML] - [JSON]

Tool

Tool - threat-actor-tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.

Category: tool - source: MISP Project - total: 603 elements

[HTML] - [JSON]

UAVs/UCAVs

UAVs/UCAVs - Unmanned Aerial Vehicles / Unmanned Combat Aerial Vehicles

Category: military equipment - source: Popular Mechanics - total: 36 elements

[HTML] - [JSON]

UKHSA Culture Collections

UKHSA Culture Collections - UK Health Security Agency Culture Collections represent deposits of cultures that consist of expertly preserved, authenticated cell lines and microbial strains of known provenance.

Category: virus - source: https://www.culturecollections.org.uk - total: 6638 elements

[HTML] - [JSON]

Online documentation

The misp-galaxy.org website provides an easily navigable resource for all MISP galaxy clusters.

A readable PDF overview of the MISP galaxy is available or HTML and generated from the JSON.

How to contribute?

License

The MISP galaxy (JSON files) are dual-licensed under:

or

 Copyright (c) 2015-2024 Alexandre Dulaunoy - [email protected]
 Copyright (c) 2015-2024 CIRCL - Computer Incident Response Center Luxembourg
 Copyright (c) 2015-2024 Andras Iklody
 Copyright (c) 2015-2024 Raphael Vinot
 Copyright (c) 2015-2024 Deborah Servili
 Copyright (c) 2016-2024 Various contributors to MISP Project

 Redistribution and use in source and binary forms, with or without modification,
 are permitted provided that the following conditions are met:

    1. Redistributions of source code must retain the above copyright notice,
       this list of conditions and the following disclaimer.
    2. Redistributions in binary form must reproduce the above copyright notice,
       this list of conditions and the following disclaimer in the documentation
       and/or other materials provided with the distribution.

 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
 WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
 IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
 INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
 BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
 LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
 OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
 OF THE POSSIBILITY OF SUCH DAMAGE.

misp-galaxy's People

Contributors

3c7 avatar adulau avatar agathemgt avatar badis-dev avatar bartblaze avatar botherder avatar chrisr3d avatar cudeso avatar cvandeplas avatar danielplohmann avatar delta-sierra avatar dependabot[bot] avatar ecrimelabs avatar gallypette avatar iglocska avatar jloehel avatar jstnk9 avatar kafeine avatar mathieu4141 avatar mokaddem avatar nmd03 avatar nyx0 avatar r0ny123 avatar rafiot avatar raw-data avatar rmkml avatar sebdraven avatar stefankelm avatar th4nat0s avatar vvx7 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

misp-galaxy's Issues

Relations to add

  • Related
    --> Mirai
    --> Mirai Sora
    --> Mirai Owari

  • dropped/dropped-by
    --> Fallout (exploit-kit) - dropped
    --> SmokeLoader (tool) - dropped-by

  • dropped/dropped-by
    --> Fallout (exploit-kit) - dropped
    --> Kraken Cryptor Ransomware (ransomware -should be added-) - dropped-by

  • dropped/dropped-by
    --> Fallout (exploit-kit) - dropped
    --> Smoke Loader (mitre-entreprise-malware) - dropped-by

  • dropped/dropped-by
    --> Fallout (exploit-kit) - dropped
    --> GandCrab Ransomware (ransomware) - dropped-by

  • dropped/dropped-by
    --> Fallout (exploit-kit) - dropped
    --> SAVEfiles (ransomware) - dropped-by

  • uses/used-by
    --> APT28 (threat-actor) - uses
    --> LoJax (tool) - used-by

  • variant-of
    --> BankBot (android)
    --> Razdel (android or banking - galaxy to choose)

Provide a short desc: How to update galaxies from repo

Within MISP --> List Galaxies there is a link called Update Galaxies. The user would expect that an execution would fetch an updated list of galaxies from the repository (but it don´t). How is it possible to update the galaxies? Thanks in advance!

bildschirmfoto 2017-01-26 um 15 37 31

Issue with malpedia cluster (duplicate UUIDs)

That's the output of my new test case:

{                                          
  "4038c3bc-b559-45bb-bac1-9665a54dedf9": [
    "Malpedia|Bahamut (Android)",          
    "Malpedia|Bahamut (Windows)"           
  ],                                       
  "8a42a699-1746-498b-a558-e7113bb916c0": [
    "Malpedia|Cpuminer (Android)",         
    "Malpedia|Cpuminer (ELF)"              
  ],                                       
  "8269e779-db23-4c94-aafb-36ee94879417": [
    "Malpedia|DualToy (Android)",          
    "Malpedia|DualToy (iOS)",              
    "Malpedia|DualToy (Windows)"           
  ],
  "4305d59a-0d07-4021-a902-e7996378898b": [
    "Malpedia|FlexiSpy (Android)",         
    "Malpedia|FlexiSpy (symbian)",         
    "Malpedia|FlexiSpy (Windows)"          
  ],                                       
  "0caf0292-b01a-4439-b56f-c75b71900bc0": [
    "Malpedia|Lazarus (Android)",          
    "Malpedia|Lazarus (Windows)"           
  ],                                       
  "0a7d9d22-a26d-4a2b-ab9b-b296176c3ecf": [
    "Malpedia|X-Agent (Android)",          
    "Malpedia|X-Agent (ELF)",              
    "Malpedia|X-Agent (OS X)",             
    "Malpedia|X-Agent (Windows)"           
  ],
  "22ef1e56-7778-41d1-9b2b-737aa5bf9777": [
    "Malpedia|Retefe (Android)",
    "Malpedia|Retefe (Windows)"
  ],
  "479353aa-c6d7-47a7-b5f0-3f97fd904864": [
    "Malpedia|Erebus (ELF)",
    "Malpedia|Erebus (Windows)"
  ],                                       
  "17e12216-a303-4a00-8283-d3fe92d0934c": [
    "Malpedia|Mirai (ELF)",
    "Malpedia|Mirai (Windows)"
  ],
  "6d5a5357-4126-4950-b8c3-ee78b1172217": [
    "Malpedia|Mokes (ELF)",
    "Malpedia|Mokes (OS X)",
    "Malpedia|Mokes (Windows)"
  ],
  "47a8fedb-fd60-493a-9b7d-082bdb85621e": [
    "Malpedia|Wirenet (ELF)",
    "Malpedia|Wirenet (OS X)"
  ],
  "bc32df24-8e80-44bc-80b0-6a4d55661aa5": [
    "Malpedia|WireLurker (iOS)",
    "Malpedia|WireLurker (OS X)"
  ],
  "4b2ab902-811e-4b50-8510-43454d77d027": [
    "Malpedia|Crisis (OS X)",
    "Malpedia|Crisis (Windows)"
  ],
  "d674ffd2-1f27-403b-8fe9-b4af6e303e5c": [
    "Malpedia|Uroburos (OS X)",
    "Malpedia|Uroburos (Windows)"
  ],
  "7f8166e2-c7f4-4b48-a07b-681b61a8f2c1": [
    "Malpedia|Winnti (OS X)",
    "Malpedia|Winnti (Windows)"
  ]
}

There are a few entries of different malwares with the same UUID, and this should be fixed asap (cc @koike). I can easily do it myself, but I don't know how the file is generated (not with the script in the repo, for sure).
Is it a problem if I manually give different UUIDs to the entries?

Adding / Removing Custom Galaxies

Yo yo yo!
Jimbo from the "D" again -

So the taxonomies are coming out just fine.

Moving on to galaxies.

I was told that I need to place the galaxy data into two separate spots.
I used this reference to make an educated guess as to where:
https://www.misp-project.org/misp-training/3.2-misp-galaxy.pdf

My galaxy file was named test-galaxy.json

I placed this file into both the ./galaxy folder and the ./cluster folder

My ./galaxy folder .json looked like this:

{
"name": "TEST GALAXY",
"type": "test-galaxy",
"description": "This galaxy is to confirm that you can make test galaxies",
"version": 1,
"uuid": "5855933e-45e6-11e9-b210-d663bd873d93"
}

My ./clusters folder .json looked like this:

{
"description": "threat-actor-tools is an enumeration of tools used by adversaries. The list includes malware but also common software regularly used by the adversaries.",
"type": "tool",
"version": 1,
"name": "test-cluster",
"uuid": "623555c8-45ec-11e9-b210-d663bd873d93",
"authors": "James Palazzolo - LabyrINTh CIS",
"source": "MISP Project",
"values": [{
"description": "Test Value",
"meta": {
"refs": [
"https://thehackernews.com/search/label/Zusy%20Malware",
"http://blog.trendmicro.com/trendlabs-security-intelligence/the-tinbatinybanker-malware/"
],
"synonyms": [
"Test Value",
"Testaroo",
"TinyTester"
],
"uuid": "9cccfede-45ec-11e9-b210-d663bd873d93",
"value": "Test Galaxy Value"
}
}]
}

Both files passed through jsonlint and I could have sworn I was following the schema correctly...
MISP did recognize the galaxy:

image

However, I now have two issues.

First issue: I removed the .json file from both ./galaxy folder and the ./clusters folder. When I hit update galaxies it's still there lol...

image

How do I purge this from the list?

Second issue: it recognized the galaxy but none of the cluster information was attributed over and so the galaxy values were empty. What am I doing wrong here?

I'm sure it's something simple -

Jimbo

duplicate entries within the galaxies

With more an more galaxies appearing more and more duplicate entries appear in the different galaxies.
This leads to inconsistency in the labeling of the data and confusion of the user.

Examples:

  • galaxy ransomware: Cryptowall, Locky
  • galaxy tool: Cryptowall, Locky

I believe these issues should be tackled before merging pull-requests.

This issue is also for talking about:

  • for what things do we want to create new galaxies?
  • finding solutions to move entries tagged in an old galaxy to the new one. For example: "tool:locky" to "ransomware:locky"

Possible update to cluster tool.json (Xbash)

I would like to propose the following update to the tool.json cluster specifically regarding xbash:

update description to:
"description": "Xbash is a malware family that is targeting Linux and Microsoft Windows servers. We can tie this malware, which we have named Xbash, to the Iron Group, a threat actor group known for previous ransomware attacks. Xbash was developed using Python and converted into self-contained Linux ELF executables by abusing the legitimate tool PyInstaller for distribution. Xbash aimed on discovering unprotected services, deleting victim’s MySQL, PostgreSQL and MongoDB databases, and ransom for Bitcoins. Linux based systems are targeted for ransomware and botnet capabilities. The ransomware targets and deletes linux databases and there is no evidence of any functionality that makes recovery even possible by payment the ransom. Where as, windows based systems are targeted for coinmining & self-propagating capabilities. Xbash spreads by attacking weak passwords and unpatched vulnerabilities.",

add the following refs:
https://unit42.paloaltonetworks.com/unit42-xbash-combines-botnet-ransomware-coinmining-worm-targets-linux-windows/

Duplicate ELECTRUM in clusters/threat-actor.json

    {                                                                           
      "value": "ELECTRUM",                                                      
      "description": "Adversaries abusing ICS (based on Dragos Inc adversary list).",
      "meta": {                                                                 
        "refs": [                                                               
          "https://dragos.com/adversaries.html",                                
          "https://dragos.com/media/2017-Review-Industrial-Control-System-Threats.pdf"
        ],                                                                      
        "mode-of-operation": "Electric grid disruption and long-term persistence",
        "since": "2016",                                                        
        "capabilities": "CRASHOVERRIDE",                                        
        "victimology": "Ukraine, Electric Utilities",                           
        "synonyms": [                                                           
          "Sandworm"                                                            
        ]                                                                       
      },                                                                        
      "uuid": "a2d44915-6cff-43cf-8a53-f4850058ad05"                            
    },                                                                          

and

    {                                                                           
      "value": "ELECTRUM",                                                      
      "description": "Dragos, Inc. tracks the adversary group behind CRASHOVERRIDE as ELECTRUM and assesses with high confidence through confidential sources that ELECTRUM has direct ties to the Sandworm team. Our intelligence ICS WorldView customers have received a comp
      "meta": {                                                                 
        "refs": [                                                               
          "https://dragos.com/blog/crashoverride/CrashOverride-01.pdf",         
          "https://www.welivesecurity.com/wp-content/uploads/2017/06/Win32_Industroyer.pdf",
          "https://dragos.com/media/2017-Review-Industrial-Control-System-Threats.pdf"
        ],                                                                      
        "synonyms": [                                                           
          "Sandworm"                                                            
        ]                                                                       
      },                                                                        
      "uuid": "feac86e4-6bb2-4ba0-ac99-806aeb0a776c"                            
    },

CSV to misp galaxy converter

CSV to misp galaxy converter to easily converting existing CSV file into a cluster.

The idea is the following, a simple python script to generate a cluster (JSON) from a CSV file. The parameter of the Python script might be the following:

-f 1:description -f 2:value -f 3:abcd

where the number is the field number in the CSV and the field name in the galaxy. Other field than "description" and "value" are considered as meta.

Tailgater Team duplicate

Tailgater Team is defined twice in the threat-actors:

    {
      "value": "Aurora Panda",
      "refs": [
        "http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html"
      ],
      "country": "CN",
      "synonyms": [
        "APT 17",
        "Deputy Dog",
        "Group 8",
        "APT17",
        "Hidden Lynx",
        "Tailgater Team"
      ]
    },
    {
      "value": "Axiom",
      "refs": [
        "http://securelist.com/blog/research/57585/winnti-faq-more-than-just-a-game/",
        "http://williamshowalter.com/a-universal-windows-bootkit/"
      ],
      "country": "CN",
      "synonyms": [
        "Winnti Group",
        "Tailgater Team",
        "Group 72",
        "Group72",
        "Tailgater",
        "Ragebeast",
        "Blackfly"
      ]
    },```

git submodule update --init --force fails with: error: no such remote ref f0ac7aeb3cb857bb2242e69ee2d3471a2e812d22

From https://github.com/MISP/MISP
 * branch                2.4        -> FETCH_HEAD

git submodule update --init --force
Submodule path 'Plugin/DebugKit': checked out '8649a612001fa1caee82d9c432b8223cef221104'
Submodule path 'PyMISP': checked out '748a3100528cd91cc49779110884afe0bc80ddb0'
Submodule path 'app/Lib/cakephp': checked out 'ab5578dbc9f88e661d2b017489cd156fca961429'
Submodule path 'app/Lib/random_compat': checked out '088c04e2f261c33bed6ca5245491cfca69195ccf'
Submodule path 'app/files/misp-galaxy': checked out 'de66295539a94b95b7d3be8e3410665502906f46'
Submodule path 'app/files/misp-objects': checked out '39bd2641aa33ce733151bbf74fdbd3da6118a20e'
Submodule path 'app/files/noticelists': checked out '028f569e26b5b47286167b7d39f81cd1791eb04e'
Submodule path 'app/files/taxonomies': checked out '60f62aa527f1b817930cc8aa1c2fdf4a41f9451b'
Submodule path 'app/files/warninglists': checked out '2b6b07b28a2937f658accc2f7eeb825396b8120c'
error: no such remote ref f0ac7aeb3cb857bb2242e69ee2d3471a2e812d22
Fetched in submodule path 'cti-python-stix2', but it did not contain f0ac7aeb3cb857bb2242e69ee2d3471a2e812d22. Direct fetching of that commit failed.

Threat Actors: Conflict between "Operation C-Major" and "HummingBad"

actor "HummingBad" has synonym "Operation C-Major", but "Operation C-Major" is also a key of its own (without "HummingBad" as synonyms, so there is an asymmetry in naming).

I was also not able to find any documentation that indicates a connection between "HummingBad" and "Operation C-Major", so I would propose to delete that synonym for "HummingBad" and treat them individually.

MITRE ATT&CK mapping issues with current MISP-galaxy implementation - uuid not unique

I am currently working on a new version of the MITRE ATT&CK to MISP-galaxy convertor.
(which should be in one script and should also suppor the relationships natively)

The issue I'm encountering is with the enterprise-attack, pre-attack and mobile-attack common entities. They are included in each "domain/phase", but are referred by the same uuid. (as they are the same object)

For example uuid bef4c620-0787-42a8-a96d-b7eb6e85917c. In the MITRE ATT&CK they are used in different bundles. (see below where count > 2)

~/Documents/Projects/MITRE-ATTACK$ fgrep -r -h '"id"' .  | fgrep -v bundle  | sed -E 's/\s+//' | sort | uniq -c  | sort -n | tail -n 14
      2 "id": "x-mitre-tactic--d90bd741-2edb-4e74-8a6f-435143ad7bbb",
      2 "id": "x-mitre-tactic--e78d7d60-41b5-49b7-b0a9-5c5d4cbabe17",
      2 "id": "x-mitre-tactic--f30c2753-e6b2-4186-818d-99b8b1a0322b",
      2 "id": "x-mitre-tactic--f72804c5-f15a-449e-a5da-2eecd181f813",
      3 "id": "tool--9de2308e-7bed-43a3-8e58-f194b3586700",
      3 "id": "x-mitre-tactic--0a93fd8e-4a83-4c15-8203-db290e5f2ac6",
      4 "id": "intrusion-set--090242d7-73fc-4738-af68-20162f7a5aae",
      4 "id": "intrusion-set--23b6a0f5-fa95-46f9-a6f3-4549c5e45ec8",
      4 "id": "intrusion-set--6a2e693f-24e5-451a-9f88-b36a108e5662",
      4 "id": "intrusion-set--8f5e8dc7-739d-4f5e-a8a1-a66e004d7063",
      4 "id": "intrusion-set--d6e88e18-81e8-4709-82d8-973095da1e70",
      6 "id": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
      6 "id": "intrusion-set--bef4c620-0787-42a8-a96d-b7eb6e85917c",
      9 "id": "marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168",

However MISP seems to have included this same object, split over different 'clusters':

~/Documents/Projects/misp-galaxy/clusters$ fgrep -R bef4c620-0787-42a8-a96d-b7eb6e85917c . 
./mitre-enterprise-attack-intrusion-set.json:      "uuid": "bef4c620-0787-42a8-a96d-b7eb6e85917c",
./mitre-intrusion-set.json:        "uuid": "bef4c620-0787-42a8-a96d-b7eb6e85917c"
./microsoft-activity-group.json:          "dest-uuid": "bef4c620-0787-42a8-a96d-b7eb6e85917c",
./mitre-mobile-attack-intrusion-set.json:      "uuid": "bef4c620-0787-42a8-a96d-b7eb6e85917c",
./mitre-enterprise-attack-intrusion-set.new.json:            "uuid": "bef4c620-0787-42a8-a96d-b7eb6e85917c"
./threat-actor.json:          "dest-uuid": "bef4c620-0787-42a8-a96d-b7eb6e85917c",
./mitre-pre-attack-intrusion-set.json:      "uuid": "bef4c620-0787-42a8-a96d-b7eb6e85917c",

This gives the impression that these objects are not identical, and will also break automagic correlations (and data-validation of unique uuids)

This was caused by the switch of the mitre-intrusion-set to separate clusters for enterprise-attack, mobile-attack.
My question is therefore: why exactly was everything moved to those 3 sub-clusters?
Shouldn't some "common" things be kept together? (like: malware, tool, intrusion-set)
While we could still split some others?

I know such a change would require implementation changes in MISP. But right now this seems wrong as we are breaking the UUID concept. Now you can't rely on a UUID to be unique.

Ok the validator is really strict :)

The validator kill the file is the Json is incorrect :)

  • sponge clusters/tool.json
  • jq .
    parse error: Expected another array element at line 363, column 9
  • for dir in 'galaxies/*.json'
  • cat galaxies/exploit-kit.json

$ls clusters/tool.json -lh
-rw-r--r-- 1 thanat0s thanat0s 0 Feb 25 09:31 clusters/tool.json

duplicate actors - merging 2 entries

How should we approach the situation where 2 entries in the threat-actors.json file should be merged to one single entry?
Both already have a uuid.
Example:

  • Callisto
  • Malware Reusers

Duplicates in Pre Attack - Relationship

Pre Attack - Relationship - Identify job postings and needs/gaps related-to Identify job postings and needs/gaps                       
Pre Attack - Relationship - Identify business relationships related-to Identify business relationships                                 
Pre Attack - Relationship - Dynamic DNS related-to Dynamic DNS     
Pre Attack - Relationship - Analyze organizational skillsets and deficiencies related-to Analyze organizational skillsets and deficiencies
Pre Attack - Relationship - Acquire OSINT data sets and information related-to Acquire OSINT data sets and information                 
Pre Attack - Relationship - Acquire OSINT data sets and information related-to Acquire OSINT data sets and information                 
Pre Attack - Relationship - Identify supply chains related-to Identify supply chains                                                   
Pre Attack - Relationship - Acquire OSINT data sets and information related-to Acquire OSINT data sets and information                 
Pre Attack - Relationship - Identify supply chains related-to Identify supply chains                                                   
Pre Attack - Relationship - APT1 uses Compromise 3rd party infrastructure to support delivery                                          
Pre Attack - Relationship - Analyze organizational skillsets and deficiencies related-to Analyze organizational skillsets and deficiencies
Pre Attack - Relationship - Compromise 3rd party infrastructure to support delivery related-to Compromise 3rd party infrastructure to support delivery
Pre Attack - Relationship - Identify job postings and needs/gaps related-to Identify job postings and needs/gaps                       
Pre Attack - Relationship - Conduct social engineering related-to Conduct social engineering                                           
Pre Attack - Relationship - Conduct social engineering related-to Conduct social engineering                                           
Pre Attack - Relationship - Identify supply chains related-to Identify supply chains                                                   
Pre Attack - Relationship - Identify job postings and needs/gaps related-to Identify job postings and needs/gaps                       
Pre Attack - Relationship - Identify job postings and needs/gaps related-to Identify job postings and needs/gaps                       
Pre Attack - Relationship - Analyze organizational skillsets and deficiencies related-to Analyze organizational skillsets and deficiencies
Pre Attack - Relationship - Acquire and/or use 3rd party infrastructure services related-to Acquire and/or use 3rd party infrastructure services
Pre Attack - Relationship - Analyze organizational skillsets and deficiencies related-to Analyze organizational skillsets and deficiencies
Pre Attack - Relationship - Identify job postings and needs/gaps related-to Identify job postings and needs/gaps                       
Pre Attack - Relationship - Acquire OSINT data sets and information related-to Acquire OSINT data sets and information                 
Pre Attack - Relationship - Acquire or compromise 3rd party signing certificates related-to Acquire or compromise 3rd party signing certificates
Pre Attack - Relationship - Conduct social engineering related-to Conduct social engineering                                           
Pre Attack - Relationship - Identify supply chains related-to Identify supply chains                                                   
Pre Attack - Relationship - Determine 3rd party infrastructure services related-to Determine 3rd party infrastructure services         
Pre Attack - Relationship - Conduct social engineering related-to Conduct social engineering                                           
Pre Attack - Relationship - Obfuscate infrastructure related-to Obfuscate infrastructure                                               
Pre Attack - Relationship - Acquire OSINT data sets and information related-to Acquire OSINT data sets and information                 
Pre Attack - Relationship - Friend/Follow/Connect to targets of interest related-to Friend/Follow/Connect to targets of interest       
Pre Attack - Relationship - Analyze organizational skillsets and deficiencies related-to Analyze organizational skillsets and deficiencies
Pre Attack - Relationship - Identify supply chains related-to Identify supply chains                                                   
Pre Attack - Relationship - Acquire and/or use 3rd party software services related-to Acquire and/or use 3rd party software services   
Pre Attack - Relationship - Conduct social engineering related-to Conduct social engineering                                           ```

Inconsistent naming of countries in threat_actors

What is the ISO followed by the threat_actors file in clusters? ISO3166?

Sometimes, there are names like "Russia" or like "Russian Federation".

Shouldn't it be using the same name or convert everything to ISO 3166-1 alpha 2?

Threat Actors: Merge "HiddenLynx" into "Aurora Panda"

Currently, there is a value "HiddenLynx" in the threat-actor.json but "Hidden Lynx" is also already listed under "Aurora Panda".
Therefore, the "HiddenLynx" key could be deleted and its symantec reference could be merged into "Aurora Panda".

Adding new threat actors to the galaxies

Adding new threat actors to the galaxies

Work environment

Questions Answers
Type of issue Question
OS version (server) centOS
OS version (client) Ubuntu
PHP version 5.6
MISP version / git hash 2.4.101
Browser If applicable

Current problem

We have detected that some threat actors from Mitre Attack are missing and we would like to add them to our current galaxies. Is there any way to do that?

Thanks in advance.

Duplicates in Pre Attack - Attack Pattern

There are 3 entries with the same value: "Analyze organizational skillsets and deficiencies"
2 with this one: "Identify business relationships"
2 with "Acquire and/or use 3rd party infrastructure services"
3 with "Identify job postings and needs/gaps"
3 "Conduct social engineering"
3 "Identify supply chains"
2 "Obfuscate infrastructure"
2 "Connect to targets of interest"
2 "Determine 3rd party infrastructure services"
2 "Compromise 3rd party infrastructure to support delivery"
2 "Acquire or compromise 3rd party signing certificates"
3 "Acquire OSINT data sets and information"
2 "Acquire and/or use 3rd party software services"
2 "Dynamic DNS"

Help wanted - Integration with MISP

Hello,

I am looking to see if you could further explain how this is integrated into MISP? I've not seen the concept of clusters till this repo, so not sure where to begin. Interested to start looking at this, looks very promising.

Few utf8 chinese issues

find -name "*.json" -exec iconv -f UTF-8 {} -o /dev/null ;
iconv: illegal input sequence at position 499
iconv: illegal input sequence at position 2178
iconv: illegal input sequence at position 479
iconv: illegal input sequence at position 500
iconv: illegal input sequence at position 6374

$./chk_dup.py
Json load error in threat-actor.json
Json load error in tool.json
Json load error in preventive-measure.json
Json load error in microsoft-activity-group.json
Json load error in ransomware.json

Example in ransom
"description": "my-Little-Ransomware; AES(128); .已加密 .encrypted; ",
"description": "my-Little-Ransomware; AES(128); .已[mJ.[mF .encrypted; ",
2e e5 b7 b2 e5 8a a0 e5 af 86

Any correction recommendation ... ?? What is the file encoding supposed to be ??

Cluster 'threat actor' - proposed new fields

For the threat actor cluster, I suggest the following additional fields that we use in our CTI db.
In our day to day activities, they are quite useful for filtering, statistics/trends, etc.

Field = Motive
Values = Cybercrime, Cyberwar, Espionage, Hacktivism, Hacktivism-Nationalists, Jihadism, Other, Unknown

Field = Type
Values = Indendent group, State or State-sponsored group, Individual, Other, Unknown

Field = First Seen
Value = Date

Field = Last Seen
Value = Date

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.