[Due to Trend Micro release official MISP integration, this project will decide to sustain mode] https://docs.trendmicro.com/en-us/enterprise/trend-micro-xdr-online-help/administrative-setti/administration/third-party-integrat/integrating-misp.aspx
Nowadays, we are in the connected world, and the Threat landscape are evolving, we are targeted by automated hacking tools from hackers such as Exploit tool kit, Virus, Trojan, Ransomware, Keylogger etc. They have been a long history among the time. The clever one was creating the tool that can do polymorphic itself to evade from the detection engine like Antivirus, Sandbox. Then, in this new era, the security expert also need the advanced analysis and automation tool.
We have many well known security vendors in the market which have created their closed loop automation eco-system which work only for their products. In reality, customer will end up with many vendor in their environment for example, Firewall, Intrusion Prevention System, Email Gateway Security, Secure Web Gateway, Security information and event management (SIEM), or Sandbox etc. The multi-vendor environment is very hard to managed. In the truth , there is no vendor that can guarantee that they will match every threat in the world. In this manner, customer will be need to add many effort for their day-to-day operation like check the Internet feed for new important IOC, then search for artifact in their network (i.e. IOC), add the user defined artifacts (i.e. IOC) in every security control points in their network to effectively block malicious one for their organization. Then, Tomorrow, they will need to redo everything again and again.
Figure 1: Rest API for Automation
We have many people try to solve this problem by created the centralize thing for automation including Security Orchestration, Automation and Response (SOAR) and threat intelligence sharing platform. For example, MISP (Malware Information Sharing Platform), an Open Source Threat Intelligence Sharing Platform which designed for security engineer who want to share threat indicators using MISP or integrate MISP into other security monitoring tools, they also support one sharing to other organization like National CERT to their related organization.
Trend Micro, as the global leader in cybersecurity, we also has concept of centralize visibility and management using Apex Central, the Apex Central support both automated Virtual Analyzer Suspicious Object (VASO) which receive from Deep Discovery family products (Sandbox) and User-defined Suspicious (UDSO) Object which support third party integration from external source using OpenIOC, STIX, and API automation, We also supported TAXII v1.x and v.2 automated feed management using Deep Discovery Director product. Trend Micro also has Deep Security Enterprise and Cloud One Workload Security product which support Application Control User-defined Suspicious Object (UDSO) using API automation.
TM-MISP project was created to joint Trend Micro CTD with MISP platform which will serve as bridge to synchronize IOC object between MISP and Trend Micro CTD like Apex Central (i.e. SHA-1 hash, URL, IP, and Domain), Deep Discovery Director (SHA-1, SHA256, URL, IP and Domain) and Deep Security/Cloud One Workload Security (i.e. SHA256)
- Script will connected to MISP platform and gather SHA-1, URL, IP, Domain and submit to Apex Central
- Script will also gather SHA256 and submit to Deep Security Manager/Cloud One Workload Security, for URL, IP and Domain, Deep Security can consume from Apex Central via SPS server
- Script will grab Virtual Analyzer Suspicious Object List from Deep Discovery Director (TAXII feed) and convert to MISP (CSV feed)
- Start at v0.1-alpha Start 1 June 2020, 13:18 GMT+7
- required library https://github.com/MISP/PyMISP
Figure 2: Reference Architecture for this Project
See at wiki https://github.com/chackco/tm-misp/wiki