[[message.message]]
Loading...
Loading conversion...
[[ convert.name ]]
STIX MISP
MISP STIX
[[ convert.public ? 'Public' : 'Private' ]]
Description
[[ convert.description ]]
No description provided.
Details
[[ convert.uuid ]]
[[ share_key ]]
[[ convert.input_text ]]
[[ convert.output_text ]]
| ID | Version | Status | Created | Comment |
|---|---|---|---|---|
| #[[ h.id ]] | v[[ h.version ]] | [[ h.status ]] | [[ formatDate(h.created_at) ]] | [[ h.comment || '—' ]] |
No version history yet
How to read this graph
Navigation
Drag nodes to reposition. Scroll to zoom. Drag background to pan. Click a node to open its details in the sidebar. Right-click for more actions.
MISP graph
The Event is the root. It connects to Objects (groups like file, domain-ip) and standalone Attributes. Object references (contains, related-to) are shown as labeled arrows.
■ Event
⬡ Object
● Network (IP, domain, URL)
● Payload (hash, file)
● External analysis
● Other
STIX graph
The Report is the root. Relationships connect indicators, malware, threat-actors and attack-patterns. observed-data wrappers are hidden.
■ Report
■ Grouping
⬡ Indicator
⬡ Malware
■ Threat Actor
▲ Attack Pattern
● ipv4 / domain / file
■ TLP marking
Input vs Output
Switch between Input and Output to compare how the conversion reorganized the data.
Graph powered by Pivotick