Skip to content

Latest commit

 

History

History
62 lines (41 loc) · 2.04 KB

README.md

File metadata and controls

62 lines (41 loc) · 2.04 KB

karton-misp-pusher

Listens for new samples in the karton pipeline and uploads them to MISP.

Configs are parsed using the mwdb-iocextract project. This means, that we operate on a higher level than raw JSON configs, and makes it possible to correlate different samples and campaigns (for example, by the used crypto material).

Author: CERT.pl

Maintainers: nazywam

Consumes:

{
    "type": "config",
}

Result:

config in misp

Usage

First of all, make sure you have setup the core system: https://github.com/CERT-Polska/karton. More info here.

Then install karton-misp-pusher from PyPi:

$ pip install karton-misp-pusher

$ karton-misp-pusher --misp-url https://misp.url --misp-key SECRET123

You can also add optional xrefs to mwdb with --mwdb-url, or skip MISP verification with --misp-insecure. For more options see --help.

Adding Galaxy clusters relationship

It's possible to link new events to existing MISP Galaxy clusters using a mapping file.

The mapping file is a simple JSON document that assings a cluster UUID for each malware family in your ecosystem.

An example using the Malpedia MISP Galaxy would be:

{
    "404keylogger": "6b87fada-86b3-449d-826d-a89858121b68",
    "agenttesla": "b88e29cf-79d9-42bc-b369-0383b5e04380",
    "amadey": "77f2c81f-be07-475a-8d77-f59b4847f696"
}

A value can be null, in which case configs of that family will be silently ignored instead of raising an error. This is useful if you want to ignore configs of a particular family.

With that ready you can then launch the karton service with the --galaxy-clusters-mapping argument pointing to the file.

Co-financed by the Connecting Europe Facility by of the European Union