Skip to content

[Due to Trend Micro release official MISP integration, this project will decide to sustain mode] TM-MISP project was created to joint Trend Micro CTD with MISP platform which will serve as bridge to synchronize IOC object from MISP to Trend Micro Apex Central (i.e. SHA-1 hash, URL, IP or Domain) and Deep Security/Cloud One Workload Security (i.e…

License

chackco/tm-misp

Repository files navigation

Beyond Endpoint Detection and Response using TM-MISP

About

[Due to Trend Micro release official MISP integration, this project will decide to sustain mode] https://docs.trendmicro.com/en-us/enterprise/trend-micro-xdr-online-help/administrative-setti/administration/third-party-integrat/integrating-misp.aspx

Written by Nathaphon K.

Nowadays, we are in the connected world, and the Threat landscape are evolving, we are targeted by automated hacking tools from hackers such as Exploit tool kit, Virus, Trojan, Ransomware, Keylogger etc. They have been a long history among the time. The clever one was creating the tool that can do polymorphic itself to evade from the detection engine like Antivirus, Sandbox. Then, in this new era, the security expert also need the advanced analysis and automation tool.

We have many well known security vendors in the market which have created their closed loop automation eco-system which work only for their products. In reality, customer will end up with many vendor in their environment for example, Firewall, Intrusion Prevention System, Email Gateway Security, Secure Web Gateway, Security information and event management (SIEM), or Sandbox etc. The multi-vendor environment is very hard to managed. In the truth , there is no vendor that can guarantee that they will match every threat in the world. In this manner, customer will be need to add many effort for their day-to-day operation like check the Internet feed for new important IOC, then search for artifact in their network (i.e. IOC), add the user defined artifacts (i.e. IOC) in every security control points in their network to effectively block malicious one for their organization. Then, Tomorrow, they will need to redo everything again and again.

Rest API for automation
Figure 1: Rest API for Automation

We have many people try to solve this problem by created the centralize thing for automation including Security Orchestration, Automation and Response (SOAR) and threat intelligence sharing platform. For example, MISP (Malware Information Sharing Platform), an Open Source Threat Intelligence Sharing Platform which designed for security engineer who want to share threat indicators using MISP or integrate MISP into other security monitoring tools, they also support one sharing to other organization like National CERT to their related organization.

Trend Micro, as the global leader in cybersecurity, we also has concept of centralize visibility and management using Apex Central, the Apex Central support both automated Virtual Analyzer Suspicious Object (VASO) which receive from Deep Discovery family products (Sandbox) and User-defined Suspicious (UDSO) Object which support third party integration from external source using OpenIOC, STIX, and API automation, We also supported TAXII v1.x and v.2 automated feed management using Deep Discovery Director product. Trend Micro also has Deep Security Enterprise and Cloud One Workload Security product which support Application Control User-defined Suspicious Object (UDSO) using API automation.

TM-MISP Project

TM-MISP project was created to joint Trend Micro CTD with MISP platform which will serve as bridge to synchronize IOC object between MISP and Trend Micro CTD like Apex Central (i.e. SHA-1 hash, URL, IP, and Domain), Deep Discovery Director (SHA-1, SHA256, URL, IP and Domain) and Deep Security/Cloud One Workload Security (i.e. SHA256)

  • Script will connected to MISP platform and gather SHA-1, URL, IP, Domain and submit to Apex Central
  • Script will also gather SHA256 and submit to Deep Security Manager/Cloud One Workload Security, for URL, IP and Domain, Deep Security can consume from Apex Central via SPS server
  • Script will grab Virtual Analyzer Suspicious Object List from Deep Discovery Director (TAXII feed) and convert to MISP (CSV feed)
  • Start at v0.1-alpha Start 1 June 2020, 13:18 GMT+7
  • required library https://github.com/MISP/PyMISP

Reference Architecture for this Project
Figure 2: Reference Architecture for this Project

Install Guide

See at wiki https://github.com/chackco/tm-misp/wiki

tm-misp web ui
Figure 3: TM-MISP Web UI

About

[Due to Trend Micro release official MISP integration, this project will decide to sustain mode] TM-MISP project was created to joint Trend Micro CTD with MISP platform which will serve as bridge to synchronize IOC object from MISP to Trend Micro Apex Central (i.e. SHA-1 hash, URL, IP or Domain) and Deep Security/Cloud One Workload Security (i.e…

Topics

Resources

License

Stars

Watchers

Forks