2016-08-04 17:07:07 +02:00
<!-- This is a comment.
And Justice for All! -->
# Quick Start
2016-11-05 21:27:45 +01:00
The Malware Information Sharing Platform (MISP) tool facilitates the exchange of Indicators of Compromise (IOCs) about targeted malware and attacks, within your community of trusted members. MISP is a distributed IOC database containing technical and non-technical information. Exchanging such information should result in faster detection of targeted attacks and improve the detection ratio, whilst also reducing the number of false positives.
2018-02-20 18:20:57 +01:00
With the focus on automation and standards, MISP provides you with a powerful API via PyMISP, jump ahead to these chapters to get started.
2015-10-06 09:49:55 +02:00
2016-08-04 17:07:07 +02:00
## Create an Event
![Create an Event in MISP ](figures/AddEvent.jpg )
2016-09-22 13:16:12 +02:00
You only have to add a few pieces of information to register your Event. Further details will be specified after the Event has been added.
2016-08-04 17:07:07 +02:00
## Describe Event
2018-02-20 18:24:58 +01:00
Red is totally normal. No worries. (In future releases this will potentially change to a more harmonious color)
2016-08-04 17:07:07 +02:00
![Describe Event ](figures/AddEventOK.jpg )
2016-09-22 13:16:12 +02:00
Now you can specify the information for your Event (you will need to scroll the window).
2016-08-04 17:07:07 +02:00
### Free-Text Import Tool
![Use Freetext import ](figures/AddEventDescription.jpg )
2016-09-22 13:16:12 +02:00
If you have a list of indicators from which you would like to quickly generate attributes then the **Free-text import tool** is
just what you need. Simply paste your list of indicators (separated by line-breaks) into this tool.
2016-08-04 17:07:07 +02:00
![FreeText Import result ](figures/FreeTextImportResult.jpg )
2016-11-05 21:27:45 +01:00
The tool will help you to find similarities between your import and other issues already registered in MISP.
2016-08-04 17:07:07 +02:00
![FreeText Suggest ](figures/FreeTextSuggest.jpg )
2016-09-22 13:16:12 +02:00
For example, you can see the ID of all related Events and view their information.
2016-08-04 17:07:07 +02:00
### Tags and Taglist
#### Using existing Data
2016-09-22 13:16:12 +02:00
Another easy way to add information is to use Tags. You can see the result of adding existing Tags (circl:incident-classification=XSS ans circl:incident-classification="information-leak).
2016-08-04 17:07:07 +02:00
![Add Tag ](figures/SelectTag.jpg )
2016-09-22 13:16:12 +02:00
By clicking the button, you can add more tags from an existing Taglist.
2016-08-04 17:07:07 +02:00
![Taglist ](figures/AddEventTagsList.jpg )
2016-09-22 13:16:12 +02:00
In particular the "Taxonomy Library: circl" Taglist is very complete, as you can see:
2016-08-04 17:07:07 +02:00
![Select Tag from Taglis ](figures/AddEventSelectTag.jpg )
#### Make your own Taglist
2016-09-22 13:16:12 +02:00
If you want make your own Taglist, select Add Tag.
2016-08-04 17:07:07 +02:00
![Select Add New Tag ](figures/SelectAddNewTag.jpg )
2016-09-22 13:16:12 +02:00
You will see the following window:
2016-08-04 17:07:07 +02:00
![Define Tag ](figures/AddTag.jpg )
2016-09-22 13:16:12 +02:00
Then, when you add the new tag it will appear in the Custom Taglist.
2016-08-04 17:07:07 +02:00
### Suggestions
2016-09-22 13:16:12 +02:00
The following attribute types should be added for each Event:
2016-08-04 17:07:07 +02:00
- ip-src: source IP of attacker
- email-src: email used to send malware
- md5/sha1/sha256: checksum
- Hostname: full host/dnsname of attacker
- Domain: domain name used in malware
## Browsing Events
2016-09-22 13:16:12 +02:00
To see your Event, select List Events from the menu Events Action. You can click any row and select a filter.
2016-08-04 17:07:07 +02:00
![Browsing Events ](figures/ListEvents.png )
2016-08-04 10:56:43 +02:00
2016-09-22 13:16:12 +02:00
If you click on your Event's number, you can see all the information related to your Event.
2015-10-06 09:49:55 +02:00
2016-08-04 17:07:07 +02:00
![See Event ](figures/SeeEvent.jpg )
2015-10-06 09:49:55 +02:00
2016-08-04 17:07:07 +02:00
## Export Events for Log Search
2015-10-06 09:49:55 +02:00
2016-09-22 13:16:12 +02:00
Export functionality is designed to automatically generate signatures for intrusion detection systems. To enable signature generation for a given attribute, the Signature field of this attribute must be set to Yes. Note that not all attribute types are applicable for signature generation, currently we only support NIDS signature generation for IP, domains, host names, user agents etc., and hash list generation for MD5/SHA1 values of file artifacts. Support for more attribute types is planned.
2015-10-06 09:49:55 +02:00
2016-08-04 17:07:07 +02:00
![Quick Export ](figures/Export.jpg )
2015-10-06 09:49:55 +02:00
2016-09-22 13:16:12 +02:00
Simply click on any of the following buttons to download the appropriate data for log correlation.
2015-10-06 09:49:55 +02:00
2017-09-18 09:16:15 +02:00
![Select Format ](figures/SelectExport.jpg )