MISP

Explore the MISP Malware & Threat Sharing Platform through its core objective to foster sharing of structured threat information among security analysts, malware researchers and IT professionals.

MISP Introduction: Features & Terminologies

What is MISP?

MISP (Malware Information Sharing Platform) is an open-source threat information platform that promotes the collection, storage and distribution of threat intelligence and IOCs related to malware, cyber attacks, financial fraud or any intelligence within a community of trusted members.

Information sharing follows a distributed model, with supported closed, semi-private, and open communities (public). Threat information can be distributed and consumed by Network Intrusion Detection Systems (NIDS), log analysis tools and Security Information and Event Management Systems (SIEM).

MISP is effectively useful for the following use cases:

  • Malware Reverse Engineering: Sharing of malware indicators to understand how different malware families function.

  • Security Investigations: Searching, validating and using indicators in investigating security breaches.

  • Intelligence Analysis: Gathering information about adversary groups and their capabilities.

  • Law Enforcement: Using indicators to support forensic investigations.

  • Risk Analysis: Researching new threats, their likelihood and occurrences.

  • Fraud Analysis: Sharing of financial indicators to detect financial fraud.

What does MISP support?

MISP provides the following core functionalities:

  • IOC database: This allows for the storage of technical and non-technical information about malware samples, incidents, attackers and intelligence.

  • Automatic Correlation: Identification of relationships between attributes and indicators from malware, attack campaigns or analysis.

  • Data Sharing: This allows for sharing of information using different models of distributions and among different MISP instances.

  • Import & Export Features: This allows the import and export of events in different formats to integrate other systems such as NIDS, HIDS, and OpenIOC.

  • Event Graph: Showcases the relationships between objects and attributes identified from events.

  • API support: Supports integration with own systems to fetch and export events and intelligence.

The following terms are commonly used within MISP and are related to the functionalities described above and the general usage of the platform:

  • Events: Collection of contextually linked information.

  • Attributes: Individual data points associated with an event, such as network or system indicators.

  • Objects: Custom attribute compositions.

  • Object References: Relationships between different objects.

  • Sightings: Time-specific occurrences of a given data point or attribute detected to provide more credibility.

  • Tags: Labels attached to events/attributes.

  • Taxonomies: Classification libraries are used to tag, classify and organise information.

  • Galaxies: Knowledge base items used to label events/attributes.

  • Indicators: Pieces of information that can detect suspicious or malicious cyber activity.

Using the System

Dashboard

The analyst's view of MISP provides functionalities to track, share and correlate events and IOCs identified during investigations. The dashboard's menu contains the following options:

  • Home button: Returns to the application's start screen, the event index page or the page set as a custom home page using the star in the top bar.

  • Event Actions: All the malware data entered into MISP comprises an event object described by its connected attributes. The Event actions menu gives access to all the functionality related to the creation, modification, deletion, publishing, searching and listing of events and attributes.

  • Dashboard: Allows to create a custom dashboard using widgets.

  • Galaxies: Shortcut to the list of MISP Galaxies on the MISP instance. More on these on the Feeds & Taxonomies Task.

  • Input Filters: Input filters alter how users enter data into this instance. Apart from the basic validation of attribute entry by type, the site administrators can define regular expression replacements and blocklists for specific values and block certain values from being exportable. Users can view these replacement and blocklist rules here, while an administrator can alter them.

  • Global Actions: Access to information about MISP and this instance. View and edit profile, view the manual, read the news or the terms of use again, see a list of the active organizations on this instance and a histogram of their contributions by an attribute type.

  • MISP: Simple link to baseurl.

  • Name: Name (Auto-generated from Mail address) of currently logged in user.

  • Envelope: Link to User Dashboard to consult some notifications and changes since the last visit. Like some of the proposals received for organization.

  • Log out: The Log out button to end your session immediately.

Event Management

The Event Actions tab is where an analyst will create all malware investigation correlations, splitting the process into three phases:

  • Event Creation

  • Populating events with attributes and attachments

  • Publishing

Follow this process to create an event based on an investigation of Emotet Epoch 4 infection with Cobalt Strike and Spambot from malware-traffic-analysis.net

Event Creation

Events begin as storage of general information about an incident or investigation. Add the description, time, and appropriate risk level for the incident by clicking the Add Event button then specify the wanted distribution level for the event to have on the MISP network and community.

According to MISP, the following distribution options are available:

  • Your organization only: This only allows members of your organisation to see the event.

  • This Community-only: Users that are part of your MISP community will be able to see the event. This includes your organization, organizations on this MISP server and organizations running MISP servers that synchronize with this server.

  • Connected communities: Users who are part of your MISP community will see the event, including all organizations on this MISP server, all organisations on MISP servers synchronizing with this server, and the hosting organizations of servers that are two hops away from this one.

  • All communities: This will share the event with all MISP communities, allowing the event to be freely propagated from one server to the next.

MISP provides a means to add a sharing group, where an analyst can define a predefined list of organizations to share events.

Event details can also be populated by filling out predefined fields on a defined template, including adding attributes to the event. Use the email details of the CobaltStrike investigation to populate details of the event using the Phishing E-mail category from the templates by selecting Populate from.

Attributes & Attachments

Attributes can be added manually or imported through other formats such as OpenIOC and ThreatConnect. To add them manually, click the Add Attribute and populate the form fields.

Some essential options to note are:

  • For Intrusion Detection System: This allows the attribute to be used as an IDS signature when exporting the NIDS data unless it overrides the permitted list. If not set, the attribute is considered contextual information and not used for automatic detection.

  • Batch import: If there are several attributes of the same type to enter (such as a list of IP addresses, it is possible to join them all into the same value field, separated by a line break between each line. This will allow the system to create separate lines for each attribute.

Analyst can also add file attachments to the event. These may include malware, report files from external analysis or simply artefacts dropped by the malware. Always check the Malware checkbox to mark the file as malware to ensure that it is zipped and passworded to protect users from accidentally downloading and executing the file.

Publish Event

Once the analysts have created events, the organization admin will review and publish those events to add them to the pool of events. This will also share the events to the distribution channels set during the creation of the events.

How many distribution options does MISP provide to share threat information?

4

Which user has the role to publish events?

organization admin

Feeds & Taxonomies

Feeds

Feeds are resources containing indicators that can be imported into MISP and provide attributed information about security events. These feeds provide analysts and organizations with continuously updated information on threats and adversaries and aid in their proactive defense against attacks.

MISP Feeds provide a way to:

  • Exchange threat information.

  • Preview events along with associated attributes and objects.

  • Select and import events to your instance.

  • Correlate attributes identified between events and feeds.

Feeds are enabled and managed by the Site Admin for the analysts to obtain information on events and indicators.

Taxonomies

Taxonomy is classifying information based on standard features or attributes. On MISP, taxonomies are used to categorize events, indicators and threat actors based on tags that identify them.

Analysts can use taxonomies to:

  • Set events for further processing by external tools such as VirusTotal.

  • Ensure events are classified appropriately before the Organization Admin publishes them.

  • Enrich intrusion detection systems' export values with tags that fit specific deployments.

Taxonomies are expressed in machine tags, which comprise three vital parts:

  • Namespace: Defines the tag's property to be used.

  • Predicate: Specifies the property attached to the data.

  • Value: Numerical or text details to map the property.

Taxonomies are listed under the Event Actions tab. The site admin can enable relevant taxonomies.

Tagging

Information from feeds and taxonomies, tags can be placed on events and attributes to identify them based on the indicators or threats identified correctly. Tagging allows for effective sharing of threat information between users, communities and other organizations using MISP to identify various threats.

Add tags by clicking on the buttons in the Tags section and searching from the available options appropriate to the case. The buttons represent global tags and local tags. It is important to note that you can add your unique tags to your MISP instance as an analyst or organization that would allow you to ingest, navigate through and share information quickly within the organization.

Tagging at Event level vs Attribute Level

Tags can be added to an event and attributes. Tags are also inheritable when set. It is recommended to set tags on the entire event and only include tags on attributes when they are an exception from what the event indicates. This will provide a more fine-grained analysis.

The minimal subset of Tags

The following tags can be considered a must-have to provide a well-defined event for distribution:

  • Traffic Light Protocol: Provides a colour schema to guide how intelligence can be shared.

  • Confidence: Provides an indication as to whether or not the data being shared is of high quality and has been vetted so that it can be trusted to be good for immediate usage.

  • Origin: Describes the source of information and whether it was from automation or manual investigation.

  • Permissible Actions Protocol: An advanced classification that indicates how the data can be used to search for compromises within the organization.

Scenario Event

CIRCL (Computer Incident Respons Center Luxembourg) published an event associated with PupyRAT infection. Your organization is on alert for remote access trojans and malware in the wild, and you have been tasked to investigate this event and correlate the details with your SIEM. Use what you have learned to identify the event and complete this task.

What event ID has been assigned to the PupyRAT event?

The event is associated with the adversary gaining ______ into organizations.

Remote Access

What IP address has been mapped as the PupyRAT C2 Server?

From the Intrusion Set Galaxy, what attack group is known to use this form of attack?

There is a taxonomy tag set with a Certainty level of 50. Which one is it?

Additional Resources

Last updated