misp-and-threat-intelligence(1)
misp-and-threat-intelligence(1)
June 2021
TLP:White
What is threat intelligence?
Intelligence
Analyse
Information
Process
Data
Collect
Operational
Environment
Atomic indicators TTPs, capabiliities and infrastructure High level risks and trends
Security controls Prioritize operations Business decision making
Defend organisation Address blind spots in detection
Atomic indicators TTPs, capabiliities and infrastructure High level risks and trends
Security controls Prioritize operations Business decision making
Defend organisation Address blind spots in detection
Capability
Atomic indicators TTPs, capabiliities and infrastructure High level risks and trends
Security controls Prioritize operations Business decision making
Defend organisation Address blind spots in detection
IP-address: 1.2.3.4 malware.exe has file hash Threat group ZXY attacks
File hash: abcd1234 abcd1234 and exfiltrates energy facilities in Europe
File name: malware.exe data to 1.2.3.4 beween with objective to steal
1-Jan-21 and 2-Jan-21 company secrets
Capability
Atomic indicators TTPs, capabiliities and infrastructure High level risks and trends
Security controls Prioritize operations Business decision making
Defend organisation Address blind spots in detection
Block IP Block
Query logs for
address on malicious URL
activity
firewall on proxy
Scan endpoints
with custom IDS signatures SIEM alerts
rules
• Installation
• MISP is usually installed from source via Github
• Infrastructure integration
• Customizations for integration with security controls
• Base capabilities are included
• Needs to be tuned to your environment
• Web interface
• Multiple users and groups
• Role based access
• Contextualization
• False positive
management
27
Correlating data
• “Normal” MISP
• “Normal” MISP
• “Normal” MISP
ICS – Airgapped
• Import threat events