Skip to main content

MISP

Connector Category: API Feed Source

About Integration

MISP is an open-source threat intelligence platform that facilitates sharing, storing, and correlating information on Indicators of Compromise. It also provides comprehensive information about targeted attacks, threat intelligence, financial fraud, vulnerability, or counter-terrorism.

You can integrate the MISP threat intelligence platform with Intel Exchange and use the MISP events data available in the Intel Exchange application.

Using this integration, Intel Exchange can continuously receive real-time threat intelligence feeds. You can use the features of Intel Exchange to enhance, share, or define relationships for the IOCs received from the MISP events.

You can ingest MISP events data into Intel Exchange in the following ways:

Import MISP file in Intel Exchange

If you have a MISP file format, you can import it directly into Intel Exchange as threat intel.

To import the MISP file, do the following:

  1. In Intel Exchange, click +New on the top right corner.

  2. Select Import Intel.

  3. Select MISP as the format from the drop-down list.

  4. Select a collection to post the threat data from the MISP file.

  5. Click Upload File and browse the MISP JSON file to import. Ensure that the file is less than 10 MB.

  6. Click Import.

Configure MISP as a API Feed Source

MISP is available as an out-of-the-box integration in the Intel Exchange application.

To configure MISP as an integration tool, do the following:

Configure the MISP API feed source to receive events from MISP into Intel Exchange.

Before you Start 

  • You must have the View API Feed, View Feed Source, Create Feed Source, and Update Feed Source permissions in Intel Exchange.

  • You must have the base URL and authentication key of the MISP instance.

Steps 

To configure MISP as an API feed source in Intel Exchange, follow these steps:

  1. Go to Administration > Integration Management. In FEED SOURCES, click APIs.

  2. Click Add API Source.

  3. Search and select the MISP.

  4. Click Add Instance.

    • Instance Name: Enter a unique name to identify the instance. For example, MISP-Events.

    • Base URL: Enter the base URL of the MISP instance. 

    • API Key: Enter the API key to authenticate communication between the Intel Exchange and MISP servers.

    • Proxy URL: To ingest feeds from MISP using a proxy, enter the URL of the proxy server. For example, https://www.sampledomain.com.

    • Verify SSL: Select this option to verify the SSL certificate and secure the connection between the Intel Exchange and MISP servers. By default, Verify SSL is selected.

      Note

      Enabling SSL verification is recommended. If you disable this option, it may result in the use of an expired SSL certificate while configuring the instance. This may not establish the connection properly, and you will not be notified in case of a broken or improper connection.

  5. Click Save.

After the MISP is configured successfully, you can view the feed channels. You can configure multiple instances by clicking Manage > Add More.

Configure the feed channels to retrieve events from MISP and store them in collections within Intel Exchange

Steps 

To configure the feed channel, follow these steps:

  1. Go to Administration > Integration Management. In FEED SOURCES, click APIs.

  2. Search and select the MISP.

  3. Click the vertical ellipsis, and select Manage.

  4. Click Manage Feed Channels. 

  5. Select a feed channel and turn on the toggle. Use the following information while configuring the channel:

    • Start Date and Time: Enter the date and time to start polling feeds. Select a date within 15 days from the current date.

    • Collection Name: Enter the name of the collection to store the feed data. For example, MISP Feeds. Intel Exchange creates the collection and stores all the feeds from the feed channel.

    • Published: Select this option to receive only published events from MISP. If you do not select this option, then Intel Exchange polls all events, including unpublished events.

    • Filters: To filter events based on specific parameters, follow these steps:

      1. Filter: Select a parameter to filter events. The supported parameters are Sharing Group and Organization. You can view the values of the selected parameter available in the configured MISP instance in Value.

      2. Value: Select the values to retrieve specific events. For example, Internal Sharing Group. Events associated with the selected values will be ingested.

    • Polling Cron Schedule: Select from one of the following Polling Cron Schedule types to define when to poll the data:

      • Manual: Allows you to manually poll from the source collection.

      • Auto: Allows you to automatically poll for threat intel from sources at specific time intervals. The default polling cron schedule is Auto. Enter a frequency in minutes between 60 and 10080 minutes in Polling Time. The default polling time is 240 minutes.

    • TLP: Set the TLP for the feeds that do not have a TLP already assigned. The default TLP is Amber. Alternatively, you can select None to ensure that no TLP is assigned to the feeds.

    • Default Source Confidence: Enter the confidence score for the feeds that do not have a confidence score already assigned. The default confidence score is 100.

    • Deprecates after: Specify the number of days after which the threat data (indicator) will be marked as deprecated, unless the source defines its own expiry duration. The allowed range is 1-180 days.

    • Custom Score: Select the Relevance and Severity Score for the channel.

    • Tags: Select the tags to identify and categorize the feeds.

  6. Click Save.

The feed channel is configured, and you can poll feeds from the channel.

Test the connectivity of the MISP API feed channels to ensure that the connection with the correct API endpoint is established and that you have permission to poll feeds.

Before you Start

  • Ensure that the MISP API feed source is enabled.

  • Ensure that the feed channel for which you want to test connectivity is enabled.

Steps 

To test the connectivity of a feed channel, follow these steps:

  1. Go to Administration > Integration Management. In FEED SOURCES, click APIs.

  2. Search and select the MISP app.

  3. On a feed channel, click the vertical ellipsis and select View Details.

  4. In the Working Status section, click Test Connectivity.

If the connection is established, then the working status shows Running. If the connectivity is broken, then the working status shows a Connection Error. Hover over the tooltip next to Connection Error to view the error code.

Note

When a feed channel loses connectivity, it is automatically disabled, and the system attempts to restore the connectivity three times every hour. If the connectivity is successfully restored, the feed channel is automatically re-enabled.

To understand the error code and troubleshoot broken connectivity, see Troubleshoot Integrations.

After configuring the MISP integration on the Intel Exchange application, you can view the intel received on the Intel Exchange application. The Intel Exchange application mainly receives Indicator STIX Objects through this integration.

  1. On the MISP integration configuration page, select View Intel.

  2. View the indicators received from MISP in Threat Data.

MISP Objects Ingested in Intel Exchange

MISP objects are used in the MISP system and can also be used by other information sharing tools. These objects and their associated attributes are created based on real cyber security use-cases. For more information about MISP objects, see MISP Objects.

In Intel Exchange, all intel that is received is converted into STIX objects. The following MISP objects acquired in Intel Exchange are converted to STIX objects. The rest of the MISP objects are converted to custom objects.

  • ASN

  • CIDR

  • Domain

  • Email

  • IP

  • MAC address

  • MD5

  • Mutex

  • Port

  • Registry Key

  • SHA1

  • SHA224

  • SHA256

  • SHA384

  • SHA512

  • SSDEEP

  • URL

  • Malware

  • Threat Actor

  • Attack Pattern

  • Course of Action

  • DDoS

  • DNS Record

  • Domain crawled

  • Domain IP

  • Geo location

  • HTTP request

  • Phishing kit

  • Registry key

  • Report

  • Shortened link

  • STIX2 pattern

  • Tor-node

  • Victim

Publish MISP Feed to Collections

Intel Exchange enables you to publish malicious objects with context and metadata received from MISP to subscribers so that they can take action and share with others.

To publish the MISP feed to the collections, follow these steps:

  1. From Administration, select Integration Management, and select Rules under Actions.

  2. Click New Rule.

  3. Enter the rule name and description to identify the rule.

  4. Select Tags to categorize and identify the rule.

  5. Click Submit.

  6. In the Source box, select MISP and its collections from the Source and Collection drop-down menu to poll threat intel.

  7. Define a condition to apply to the rule.

    For more information on defining rules and conditions, see Automation Rules.

  8. To define an action after a condition has been met, add an action by hovering below the condition box or expand Actions under Component on the left side of the screen and select Publish to Collection.

  9. Select CTIX as the application to implement the rule.

  10. Select the default account for the application.

  11. Select Fast & Light as the Analyser to publish the information in non-editable mode.

  12. Select server collections to post the intel about malicious objects and metadata.

  13. Click Save.

Add MISP as a STIX Subscriber in Intel Exchange

In Intel Exchange, configure MISP as a STIX subscriber to send threat intel from Intel Exchange. Retain the MISP credentials, that is the MISP URL, and the MISP Authkey handy to configure CTIX in the MISP platform. For more information on adding a STIX subscriber in Intel Exchange, see Add Subscribers Manually in CTIX.