{"id":14628,"date":"2022-11-08T22:30:59","date_gmt":"2022-11-08T19:30:59","guid":{"rendered":"https:\/\/kifarunix.com\/?p=14628"},"modified":"2024-03-09T23:22:51","modified_gmt":"2024-03-09T20:22:51","slug":"how-to-integrate-thehive-with-misp","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/how-to-integrate-thehive-with-misp\/","title":{"rendered":"How to Integrate TheHive with MISP"},"content":{"rendered":"\n
Follow through this tutorial to learn how to integrate TheHive with MISP. TheHive, a Security Incident Response Platform (SIRP) can be integrated with MISP<\/a>, (Malware Information Sharing Platform) to make the investigation of any security incidents easy for SOC analysts, CSIRTs or CERTs.<\/p>\n\n\n\n To integrate TheHive with MISP, you can deploy each of these components on separate nodes or all on a single node. We will be using a single node for demonstration purposes in this guide.<\/p>\n\n\n\n In order to integrate TheHive with MISP, you first need to have TheHive running.<\/p>\n\n\n\n Follow through this guide to learn how to install and configure TheHive;<\/p>\n\n\n\n Install TheHive on Ubuntu 22.04\/Ubuntu 20.04<\/a><\/p>\n\n\n\n Follow through the guide below to learn how to install MISP on Ubuntu 22.04\/Ubuntu 20.04.<\/p>\n\n\n\n Install MISP on Ubuntu 22.04\/Ubuntu 20.04<\/a><\/p>\n\n\n\n You can simply download and execute the installation script on any supported system.<\/p>\n\n\n\n The integration of TheHive and MISP will both tools work hand in hand in incident analysis. MISP can be configured to sent event alerts into TheHive while TheHive can be configured as well to sent event observables into MISP for analysis.<\/p>\n\n\n\n To integrate TheHive with MISP;<\/p>\n\n\n\n Login to MISP web interface as administrative user and navigate to Administration > List Auth Keys > Add authentication Key<\/strong>;<\/p>\n\n\n\n Select the User to create an API key for, comment, defined IPs allowed to query MISP using the API key, set expiration date or leave blank to set to not expire, choose whether to set the key as read only key.<\/p>\n\n\n Click Submit to create MISP auth key;<\/p>\n\n\n\n Next, copy and save the key somewhere you would be able to retrieve when needed. Once you click take me back now<\/strong>, you wont be able to see other parts of the key.<\/p>\n\n\n\n Next, open TheHive application configuration file, Note that we are using TheHive 5 in this guide. Hence the path to configuration files may vary.<\/p>\n\n\n\n Open the application.conf file;<\/p>\n\n\n\n And append the following configs or update if already exists;<\/p>\n\n\n\n Also, ensure TheHive MISP module is enabled;<\/p>\n\n\n\n Note, the line <\/p>\n\n\n\n Allows us to use either commercially signed or private self-signed certificates. We are using the private self-signed certs generated by MISP installer in this guide.<\/p>\n\n\n\n Restart TheHive service;<\/p>\n\n\n\n Next, login to TheHive web UI and confirm the integration with MISP.<\/p>\n\n\n\n You should see the MISP icon at the bottom left corner turn to green.<\/p>\n\n\n\n Click on the ICON to view the MISP server details;<\/p>\n\n\n\n TheHive should now be able to pull any events that are published on the MISP.<\/p>\n\n\n\n You can check how to enable default opensource MISP feeds<\/a> to download events related to known Malwares, APTS, ransomware and their attributes, metadata, IOCs…<\/p>\n\n\n\n If the events are already populated\/published int the MISP, TheHive will immediately start to pull those published events as alerts;<\/p>\n\n\n You can go into the preview details of an alert to see more details;<\/p>\n\n\n\n <\/p>\n\n\n\n You can define the tags\/list of organizations for the events that you want to pull from the MISP on the integration configuration file.<\/p>\n\n\n\n With that kind of integration, any event that is created on the MISP will automatically be pulled and created on TheHive.<\/p>\n\n\n\n And that is it on integrating TheHive with MISP.<\/p>\n\n\n\nIntegrating TheHive with MISP<\/h2>\n\n\n\n
Install and Configure TheHive<\/h3>\n\n\n\n
Install MISP<\/h3>\n\n\n\n
Integrating TheHive with MISP<\/h3>\n\n\n\n
\n
<\/figure><\/div>\n\n\n
<\/figure>\n\n\n\n
\/etc\/thehive\/application.conf<\/code> and uncomment the MISP configuration settings.<\/p>\n\n\n\n
sudo vim \/etc\/thehive\/application.conf<\/code><\/pre>\n\n\n\n
# Integrate TheHive with MISP\n## MISP configuration\nmisp {\n interval: 2m\n servers: [\n {\n name = \"Kifarunix-demo MISP\" \n url = \"https:\/\/misp.kifarunix-demo.com\" \n auth {\n type = key\n key = \"OVI6wc3eBSdpdTkrmWL7W1HnPsLzyQQLIzDVxeOZ<\/strong>\"\n }\n# wsConfig {}\n wsConfig.ssl.loose.acceptAnyCertificate: true\n# caseTemplate = \"<Template_Name_goes_here>\" \n# tags = [\"misp-server-id\"]\n# max-age = 7 days\n# exclusion {\n# organisations = [\"bad organisation\", \"other orga\"]\n# tags = [\"tag1\", \"tag2\"]\n# }\n# whitelist {\n# tags = [\"tag1\", \"tag2\"]\n# }\n# includedTheHiveOrganisations = [\"*\"]\n# excludedTheHiveOrganisations = []\n }\n ]\n}\n<\/code><\/pre>\n\n\n\n
scalligraph.modules += org.thp.thehive.connector.misp.MispModule<\/code><\/pre>\n\n\n\n
wsConfig.ssl.loose.acceptAnyCertificate: true<\/code><\/pre>\n\n\n\n
sudo systemctl restart thehive<\/code><\/pre>\n\n\n\n
<\/figure>\n\n\n\n
<\/figure>\n\n\n\n
<\/figure><\/div>\n\n\n
<\/figure>\n\n\n\n
Other Tutorials;<\/h3>\n\n\n\n