CC - Elisa Azzali CC - Tim Morgan CC - Quinn Dombrowski Public - - PowerPoint PPT Presentation

cc elisa azzali cc tim morgan cc quinn dombrowski public
SMART_READER_LITE
LIVE PREVIEW

CC - Elisa Azzali CC - Tim Morgan CC - Quinn Dombrowski Public - - PowerPoint PPT Presentation

THE cloud data feed CC - Elisa Azzali CC - Tim Morgan CC - Quinn Dombrowski Public domain - Theodore C. Marceau CC - Erik Christensen Damn-fast and effective malware info sharing with MISP by Christophe Vandeplas http://misp-project.org


slide-1
SLIDE 1
slide-2
SLIDE 2

THE cloud data feed

slide-3
SLIDE 3

CC - Elisa Azzali

slide-4
SLIDE 4

CC - Tim Morgan

slide-5
SLIDE 5

CC - Quinn Dombrowski

slide-6
SLIDE 6

Public domain - Theodore C. Marceau

slide-7
SLIDE 7

CC - Erik Christensen

slide-8
SLIDE 8
slide-9
SLIDE 9

Damn-fast and effective malware info sharing with MISP

by Christophe Vandeplas

http://misp-project.org

slide-10
SLIDE 10

MISP is…

S a repository of malware, IOCs and threat related technical

information

S a sharing platform that enables partners to instantly share the

above mentioned data

S a collaboration system, S that converts your and your partners' information into

protection for its entire user community

S that helps you identify links between your incidents and the

collective threat intelligence from your interconnected partners

slide-11
SLIDE 11

History

S Originally developed by Christophe Vandeplas, in his free time S Adopted by the Belgian Defense and later on by NATO S NATO started investing into the development of MISP S Open source - AGPL S CIRCL : added tools and APIs around MISP S Today Andras Iklody is the main developer S Rapidly growing user community, improvements and new features are

being added by various 3rd parties

slide-12
SLIDE 12

What issues does MISP try to tackle?

slide-13
SLIDE 13

The situation without MISP

S There has always been some level of information sharing S But most of the time it happened ad hoc:

S Phone call S e-mail with a CSV with malicious IP addresses S Or for people we don't like: PDFs with indicators in the text

slide-14
SLIDE 14

The situation without MISP

S Data doesn't reach target audience S Recipients end up with something they can't really use S or even worse, something that they already have – meaning

they could have maybe prevented an incident, had they shared the information

S a lot of duplication of effort S You end up with a lot of information that you cannot really

exploit which, again, leads to attacks being successful that could have been prevented

slide-15
SLIDE 15

How does MISP work?

S Various ways to interact

with the data in MISP:

S Web interface S API S Indirectly (exports / imports)

slide-16
SLIDE 16

Inter connectivity

S supporting a wide range of connectivity options

slide-17
SLIDE 17

The data structure at a glance

S Designed not to overwhelm users S The main design concept: Capture what is actually important S An Event contains Attributes S Attributes: IOCs, Context, CVEs external resources, malware

samples, …

S Attributes have a category and a type S They can be marked to be included in the IDS exports S They can have contextual comments

slide-18
SLIDE 18
slide-19
SLIDE 19

Sharing and collaboration

S Share your data with other users of the same instance S Share your data with users of interconnected instances S Distribution settings

S Sharing groups in

upcoming version S Topology example

at CIRCL

S Email alert on publish

(PGP encrypted/signed)

slide-20
SLIDE 20

Sharing and collaboration

S Collaborate using Proposals

S Create a proposal to an event that you do not own S The creating organization will get notified S They can accept / discard your proposal

slide-21
SLIDE 21

Sharing and collaboration

S Discuss ongoing events using the forums

S Add comments to events (keeping the releasability) S Create threads not related to specific events

slide-22
SLIDE 22

Sharing and collaboration

slide-23
SLIDE 23

That was the theory, now the practical part

slide-24
SLIDE 24

Adding stuff in MISP

S Manual input

S Enter data via the

interface

S Use the free-text import

tool

S Use a template

S Feed MISP via the APIs /

upload tools

S Import from sandbox

(GFI)

S Use the REST API S Upload MISP XML /

OpenIOC / Threatconnect export

slide-25
SLIDE 25

Simple interface to create attributes

slide-26
SLIDE 26

Free-text Import Tool

slide-27
SLIDE 27

Templates

S Less experienced users will get a simple form to fill out that

caters to your expectations

slide-28
SLIDE 28

REST API

S Allows you to interact with events and attributes S You build scripts that modify data to MISP in a simple

XML/JSON format using the REST API

S MISP takes care of the rest (access control, synchronization,

notifications, correlation,)

slide-29
SLIDE 29

Importing options

slide-30
SLIDE 30

Exploiting data within MISP

S Finding data in MISP S Correlation and pivoting S Giving data context by

tagging

S Visualization and building

tools that leverage MISP data

slide-31
SLIDE 31

Finding data

slide-32
SLIDE 32

Correlation and pivoting

S Detecting similarities between events can be crucial

S Helps analysts find similarities between attacks S Discover an ongoing campaign S Same threat actors behind a series of attacks S See trends in ongoing attacks

S Correlation happens each time you enter data into MISP

slide-33
SLIDE 33

Example

slide-34
SLIDE 34

Example

S So we found 2 correlated events, both of which are OSINT

reports about Operation Ke3chang

S While pivoting through the relations, MISP built a chart

showing the relations as we traversed them:

slide-35
SLIDE 35

Tagging

S Tagging allows us to group events together based on

arbitrary commonalities

S Source (PRIVINT, OSINT, etc) S TLP S Campaigns or Threat actors S Type of event (for example malicious attachment)

S Local to the instance S Search-able, usable as a filter in the API S Upcoming version: tags can be filters on the synchronization

slide-36
SLIDE 36

Example

S So in this case, we found an event that should be tagged

Ke3chang too

S Using Ke3chang as a filter option we get the following result

now:

slide-37
SLIDE 37

Visualization

S Pivoting graph as shown before S Using Maltego plugin (developed

by Andrzej Dereszowski)

S Using MISP-Graph (tool

developed by Alexandre Dulaunoy from CIRCL)

S Upcoming graphing tool in the

MISP UI

slide-38
SLIDE 38

Feeding your defenses

S Export formats of MISP S Feed systems using MISP S A flexible API S Build and use tools that

use the MISP APIs

slide-39
SLIDE 39

Exporting options

slide-40
SLIDE 40

Export formats

S NIDS (Suricata, Snort, STIX/CyBox) S HIDS (OpenIOC, STIX/CyBox, CSV) S SIEMs S DNS level firewalls (DNS Response Policy Zones) S Forensic scanners S Throw values obtained from CSV exports against your

logfiles, pcaps, …

S ...

slide-41
SLIDE 41

API

S Tools ingesting the exports of MISP S Built by the community and shared on

the MISP github repository

S A modular import/export feature is

planned that will make development for MISP easier

S We always welcome more additions!

slide-42
SLIDE 42

FAQ

slide-43
SLIDE 43

Why adopt MISP?

S Create, ingest and share IOCs S Building defenses form others work S MISP is constantly evolving S Is already widely adopted S It is commercially supported S Is open-source , free and developed by a non-profit

slide-44
SLIDE 44

Do you provide threat intelligence data feeds?

S NO S The MISP Project takes care of software development S We plan a public MISP with only OSINT data

slide-45
SLIDE 45

Where can I find support?

S Website: http://misp-project.org S Community Support

S Users mailing list:

https://groups.google.com/forum/#!forum/misp-users

S Developers mailing list:

https://groups.google.com/forum/#!forum/misp-devel

S Documentation: User & Install guide S Source code: https://github.com/MISP S Issue tracking: https://github.com/MISP/MISP/issues

S Commercial Support

S See website and ask your own vendor

slide-46
SLIDE 46

Next big step !

S Bring people together S Coordinate contributions S Roadmap based on needs from all the users S Guarantee long term survival

slide-47
SLIDE 47

QUESTIONS? http://misp-project.org

Contact / participate/ sponsor: info@misp-project.org Users list: https://groups.google.com/forum/#!forum/misp-users Developers list: https://groups.google.com/forum/#!forum/misp-devel Github: http://github.com/MISP/MISP

Do you want to support the non-profit MISP project? Contact us for partnership !