Initial Setup

Setting up Taxonomies

Enable Taxonomies

Enable the following taxonomies:
  • tlp
  • type
  • workflow
  • ms-caro-malware

Adding Custom Rectifyq Taxonomies

cd /var/www/MISP/app/files/taxonomies/
mkdir rectifyq
cd rectifyq
nano machinetag.json

Tips in case of copy issue:

jq . machinetag.json > temp
mv temp machinetag.json
Add the following content to machinetag.json
{
    "namespace": "rectifyq",
    "description": "Rectifyq taxonomies used for checklist, context and statistics",
    "version": 2.6,
    "predicates": [{
            "value": "category",
            "expanded": "Category"
        }, {
            "value": "sub-category",
            "expanded": "Sub-Category"
        }, {
            "value": "topic",
            "expanded": "Related topics"
        }, {
            "value": "TA-category",
            "expanded": "Threat Actor Category"
        }, {
            "value": "target",
            "expanded": "Target"
        }, {
            "value": "samples-found-in",
            "expanded": "Samples found in"
        }, {
            "value": "no-samples-in",
            "expanded": "No samples in"
        }, {
            "value": "ioc",
            "expanded": "IOC"
        }, {
            "value": "MY-relevancy",
            "expanded": "Malaysia relevancy"
        }, {
            "value": "workflow",
            "expanded": "Workflow"
        }, {
            "value": "mitre-att&ck",
            "expanded": "MITRE ATT&CK"
        }, {
            "value": "detection-rules",
            "expanded": "Detection Rules"
        }, {
            "value": "action-taken",
            "expanded": "Action taken"
        }
    ],
    "values": [{
            "predicate": "category",
            "entry": [{
                    "value": "threat",
					"colour": "#49a260",
                    "expanded": "Threat related event - mostly contains IOCs"
                }, {
                    "value": "data-breach",
					"colour": "#49a260",
                    "expanded": "Data breach related event"
                }, {
                    "value": "vulnerability",
					"colour": "#49a260",
                    "expanded": "Vulnerability related event"
                }
            ]
        }, {
            "predicate": "sub-category",
            "entry": [{
                    "value": "TA-profile",
                    "expanded": "Threat Actor Profile: Comprehensive dossiers on specific groups (e.g., APT41, Lazarus), including motives, history, and suspected origin."
                }, {
                    "value": "tool-profile",
                    "expanded": "Tooling Context: Analysis of non-malicious tools used for malicious purposes (e.g., Cobalt Strike, PowerShell, AdFind)."
                }, {
                    "value": "malware-analysis",
                    "expanded": "Technical Deep-Dive: Results from sandbox execution, reverse engineering, or static analysis of a specific sample."
                }, {
                    "value": "intrusion-analysis",
                    "expanded": "Incident Reconstruction: The story of a breach, mapping out the full kill-chain from initial access to data exfiltration."
                }, {
                    "value": "infra-profile",
                    "expanded": "Infrastructure Mapping: Details on C2 servers, IP ranges, ASN reputations, and domain registration patterns used by attackers."
                }, {
					"value": "campaign-analysis",
                    "expanded": "Strategic Grouping: Analysis of a series of related incidents/attacks over a specific timeframe, often linked by shared infrastructure, TTPs, or themes."
                }, {
                    "value": "leak-forums",
                    "expanded": "Dark Web Monitoring: Intelligence gathered from illicit underground marketplaces or forums where data/access is sold."
                }, {
                    "value": "leak-infostealer",
                    "expanded": "Stealer Logs: Specific data exfiltrated via malware like RedLine or Lumma (e.g., credentials, cookies, crypto wallets)."
                }, {
                    "value": "report",
                    "expanded": "Finished Intel: High-level narrative summaries or white papers (internal or third-party) that synthesize multiple events."
                }, {
                    "value": "zero-day",
                    "expanded": "Unpatched Exploits: High-priority indicators for vulnerabilities that have no official patch or were exploited before public awareness."
                }, {
                    "value": "branded-vuln",
                    "expanded": "High-Profile Bugs: Vulnerabilities with marketing names/logos (e.g., Heartbleed, PwnKit) that often see rapid, mass exploitation."
                }, {
                    "value": "critical-vuln",
                    "expanded": "High-Severity Flaws: Standard vulnerabilities that carry a high CVSS/EPSS score but may not have a brand name."
                }
            ]
        }, {
            "predicate": "topic",
            "entry": [{
                    "value": "mobile-attack",
                    "expanded": "Indicators and patterns related to mobile OS (Android/iOS) exploits, malicious apps, and smishing."
                }, {
                    "value": "ai",
                    "expanded": "Threats targeting AI models (adversarial ML), or attacks generated/enhanced by AI/LLMs."
                }, {
                    "value": "supply-chain",
                    "expanded": "Compromises of third-party vendors, software libraries (e.g., npm/PyPI), or hardware manufacturing."
                }, {
                    "value": "ics-ot",
                    "expanded": "Attacks on Industrial Control Systems, SCADA, and operational technology in critical infrastructure."
                }, {
					"value": "web3",
                    "expanded": "Threats targeting decentralized protocols, DAOs, and smart contract vulnerabilities."
                }, {
                    "value": "crypto-related",
                    "expanded": "Cryptojacking, wallet draining, and fraudulent initial offerings or exchange breaches."
                }, {
                    "value": "cloud",
                    "expanded": "Exploits targeting container orchestration (Kubernetes), serverless functions, and CSP misconfigurations."
                }, {
                    "value": "insider-threat",
                    "expanded": "Malicious or accidental data exfiltration and system sabotage by authorized users."
                }, {
                    "value": "geopolitical",
                    "expanded": "Nation-state sponsored activity, cyber-espionage, and attacks linked to physical conflicts."
                }, {
                    "value": "api-security",
                    "expanded": "Vulnerabilities in REST/GraphQL endpoints, broken authentication, and mass assignment attacks."
                }
            ]
        }, {
            "predicate": "TA-category",
            "entry": [{
                    "value": "APT",
					"colour": "#f1dfed",
                    "expanded": "Advance Persistent Threat"
                }, {
                    "value": "State-Sponsored",
					"colour": "#f1dfed",
                    "expanded": "State Sponsored"
                }, {
                    "value": "Cybercrime",
					"colour": "#f1dfed",
                    "expanded": "Cybercrime"
                }, {
                    "value": "Ransomware",
					"colour": "#f1dfed",
                    "expanded": "Ransomware"
                }, {
                    "value": "Hacktivist",
					"colour": "#f1dfed",
                    "expanded": "Hacktivist"
                }
            ]
        }, {
            "predicate": "target",
            "entry": [{
                    "value": "broad-based",
					"colour": "#ffd12e",
                    "expanded": "Broad based attacks"
                }, {
                    "value": "targeted",
					"colour": "#d92121",
                    "expanded": "Targeted attacks"
                }
            ]
        }, {
            "predicate": "samples-found-in",
            "entry": [{
                    "value": "MalwareBazaar",
                    "expanded": "MalwareBazaar"
                }, {
                    "value": "VirusTotal",
                    "expanded": "VirusTotal"
                }, {
                    "value": "Tria.ge",
                    "expanded": "Tria.ge"
                }
            ]
        }, {
            "predicate": "no-samples-in",
            "entry": [{
                    "value": "MalwareBazaar",
					"colour": "#626567",
                    "expanded": "MalwareBazaar"
                }, {
                    "value": "VirusTotal",
					"colour": "#626567",
                    "expanded": "VirusTotal"
                }, {
                    "value": "Tria.ge",
					"colour": "#626567",
                    "expanded": "Tria.ge"
                }
            ]
        }, {
            "predicate": "ioc",
            "entry": [{
                    "value": "enriched",
                    "expanded": "IOC enriched"
                }, {
                    "value": "no-detection-by-any-vendor",
                    "expanded": "No detection by any vendor"
                }, {
                    "value": "low-detection-by-any-vendor",
                    "expanded": "Low detection by any vendor"
                }
            ]
        }, {
            "predicate": "MY-relevancy",
            "entry": [{
                    "value": "not-relevant",
					"colour": "#31373d",
                    "expanded": "Not relevant to Malaysia context - good to know"
                }, {
                    "value": "potentially-relevant",
					"colour": "#55acee",
                    "expanded": "Potentially relevant to Malaysia context e.g. Infostealers impact globally"
                }, {
                    "value": "somewhat-relevant",
					"colour": "#fdcb58",
                    "expanded": "Somewhat relevant to Malaysia context e.g. APT target Asian country."
                }, {
                    "value": "relevant",
					"colour": "#dd2e44",
                    "expanded": "Highly relevant to Malaysia context e.g. APT target Malaysia"
                }
            ]
        }, {
            "predicate": "workflow",
            "entry": [{
                    "value": "check-date",
                    "expanded": "Check article date"
                }, {
                    "value": "review-severity",
                    "expanded": "Review Severity"
                }, {
                    "value": "check-producer",
                    "expanded": "Check producer"
                }, {
                    "value": "check-actor",
                    "expanded": "Check Threat Actor"
                }, {
                    "value": "check-target",
                    "expanded": "Check Target"
                }, {
                    "value": "check-tool",
                    "expanded": "Check Tools"
                }, {
                    "value": "check-malware",
                    "expanded": "Check Malware"
                }, {
                    "value": "check-TTP",
                    "expanded": "Check TTPs"
                }, {
                    "value": "add-ioc-context",
                    "expanded": "Add IOC contexts"
                }, {
                    "value": "check-key-indicator",
                    "expanded": "Check Key Indicator unique to TA"
                }, {
                    "value": "enrichment",
                    "expanded": "Enrichment"
                }, {
                    "value": "need-sample-sponsor",
                    "expanded": "Require Malware sample sponsor, either upload to Malware Bazaar (preferred) or upload directly to MISP(for sample with sensitive data)"
                }, {
                    "value": "to-report-to",
                    "expanded": "To report to relevant parties such as the owner, hosting provider, MyCERT, registrar or etc."
                }
            ]
        }, {
            "predicate": "mitre-att&ck",
            "entry": [{
                    "value": "from-original-src",
					"colour": "#b94b1d",
                    "expanded": "TTPs included in original source"
                }, {
                    "value": "none-from-src",
					"colour": "#b94b1d",
                    "expanded": "No TTPs included in original source"
                }, {
                    "value": "from-OTX",
					"colour": "#b94b1d",
                    "expanded": "TTPs from OTX"
                }, {
                    "value": "self-curated",
					"colour": "#b94b1d",
                    "expanded": "Self curated TTPs"
                }
            ]
        }, {
            "predicate": "detection-rules",
            "entry": [{
                    "value": "yara-from-src",
                    "expanded": "YARA from source"
                }, {
                    "value": "sigma-from-src",
                    "expanded": "Sigma rules from source"
                }, {
                    "value": "snort-from-src",
                    "expanded": "Snort rule from source"
                }, {
                    "value": "yara-from-VT",
                    "expanded": "YARA from VirusTotal"
                }, {
                    "value": "sigma-from-VT",
                    "expanded": "Sigma rules from source"
                }
            ]
        }, {
            "predicate": "action-taken",
            "entry": [{
                    "value": "VT-collection",
                    "expanded": "Added to VT Collection"
                }, {
                    "value": "VT-comment",
                    "expanded": "Added to VT comment"
                }, {
                    "value": "github",
                    "expanded": "Added to Github"
                }, {
                    "value": "diamond-model",
                    "expanded": "Created Diamond Model"
                }, {
                    "value": "x",
                    "expanded": "Shared to X"
                }, {
                    "value": "linkedin",
                    "expanded": "Shared to Linkedin"
                }, {
                    "value": "tiktok",
                    "expanded": "Shared to Tiktok"
                }, {
                    "value": "medium",
                    "expanded": "Shared to Medium"
                }, {
                    "value": "telegram",
                    "expanded": "Shared to Telegram"
                }, {
                    "value": "threatfox",
                    "expanded": "Added to ThreatFox"
                }, {
                    "value": "malwarebazaar",
                    "expanded": "Added to MalwareBazaar"
                }, {
                    "value": "phishtank",
                    "expanded": "Added to PhishTank"
                }, {
                    "value": "report-to-mycert",
                    "expanded": "Reported to MyCERT"
                }, {
                    "value": "report-to-hosting-provider",
                    "expanded": "Reported to Hosting Provider"
                }, {
                    "value": "report-to-registrar",
                    "expanded": "Reported to Registrar"
                }, {
                    "value": "urlhaus",
                    "expanded": "Added to URLHaus"
                }, {
                    "value": "urlscan.io",
                    "expanded": "Added to urlscan.io"
                }, {
                    "value": "report-google-safe-browsing",
                    "expanded": "Reported to Google Safe Browsing"
                }
            ]
        }
    ]
}

Setting up Galaxies

Disable unnecessary Galaxies

Disable the following unnecessary galaxies
  • All under ‘deprecated’ namespace
  • Ammunitions
  • Busy is the New Stupid framework
  • Cancer
  • Cert EU GovSector
  • Election guidelines
  • Firearms
  • Handicap
  • NACE
  • NAICS
  • Tea Matrix
  • UAVs/UCAVs
  • UKHSA Culture Collections

Dashboard

Import following dashboard config
{
    "UserSetting": {
        "id": "1",
        "setting": "dashboard",
        "value": [
            {
                "widget": "MispStatusWidget",
                "config": [],
                "position": {
                    "x": "10",
                    "y": "10",
                    "width": "2",
                    "height": "2"
                }
            },
            {
                "widget": "TrendingTagsWidget",
                "config": {
                    "alias": "Top Category [Threat, Data Breach, Vulnerability]",
                    "time_window": "-1",
                    "include": [
                        "rectifyq:category"
                    ]
                },
                "position": {
                    "x": "0",
                    "y": "0",
                    "width": "3",
                    "height": "2"
                }
            },
            {
                "widget": "AuthenticationFailureWidget",
                "config": [],
                "position": {
                    "x": "10",
                    "y": "7",
                    "width": "2",
                    "height": "1"
                }
            },
            {
                "widget": "MispAdminWorkerWidget",
                "config": [],
                "position": {
                    "x": "10",
                    "y": "0",
                    "width": "2",
                    "height": "7"
                }
            },
            {
                "widget": "TrendingTagsWidget",
                "config": {
                    "alias": "Top Sub-Category",
                    "time_window": "-1",
                    "include": [
                        "rectifyq:sub-category"
                    ]
                },
                "position": {
                    "x": "0",
                    "y": "2",
                    "width": "3",
                    "height": "3"
                }
            },
            {
                "widget": "TrendingTagsWidget",
                "config": {
                    "alias": "Top Relevancy",
                    "time_window": "-1",
                    "include": [
                        "rectifyq:MY-relevancy"
                    ]
                },
                "position": {
                    "x": "0",
                    "y": "5",
                    "width": "3",
                    "height": "2"
                }
            },
            {
                "widget": "TrendingTagsWidget",
                "config": {
                    "alias": "Top TA-Category",
                    "time_window": "-1",
                    "include": [
                        "rectifyq:TA-category"
                    ]
                },
                "position": {
                    "x": "0",
                    "y": "7",
                    "width": "3",
                    "height": "2"
                }
            },
            {
                "widget": "TrendingTagsWidget",
                "config": {
                    "alias": "Top MITRE ATT&CK",
                    "time_window": "-1",
                    "include": [
                        "rectifyq:mitre-att&ck"
                    ]
                },
                "position": {
                    "x": "0",
                    "y": "9",
                    "width": "3",
                    "height": "3"
                }
            },
            {
                "widget": "APIActivityWidget",
                "config": [],
                "position": {
                    "x": "10",
                    "y": "8",
                    "width": "2",
                    "height": "1"
                }
            },
            {
                "widget": "LoginsWidget",
                "config": [],
                "position": {
                    "x": "10",
                    "y": "9",
                    "width": "2",
                    "height": "1"
                }
            },
            {
                "widget": "TrendingTagsWidget",
                "config": {
                    "alias": "Top Producer",
                    "time_window": "-1",
                    "include": [
                        "misp-galaxy:producer="
                    ],
                    "threshold": 100
                },
                "position": {
                    "x": "3",
                    "y": "0",
                    "width": "3",
                    "height": "15"
                }
            },
            {
                "widget": "TrendingTagsWidget",
                "config": {
                    "alias": "Top Detection Included",
                    "time_window": "-1",
                    "include": [
                        "rectifyq:detection"
                    ]
                },
                "position": {
                    "x": "0",
                    "y": "12",
                    "width": "3",
                    "height": "3"
                }
            },
            {
                "widget": "TrendingTagsWidget",
                "config": {
                    "alias": "Top Ransomware",
                    "time_window": "-1",
                    "include": [
                        "misp-galaxy:ransomware="
                    ],
                    "threshold": "100"
                },
                "position": {
                    "x": "6",
                    "y": "5",
                    "width": "2",
                    "height": "10"
                }
            },
            {
                "widget": "TrendingTagsWidget",
                "config": {
                    "alias": "Top 10 Malpedia",
                    "time_window": "-1",
                    "include": [
                        "misp-galaxy:malpedia="
                    ],
                    "threshold": "10"
                },
                "position": {
                    "x": "6",
                    "y": "0",
                    "width": "2",
                    "height": "5"
                }
            },
            {
                "widget": "TrendingTagsWidget",
                "config": {
                    "alias": "Threat Actor",
                    "time_window": "-1",
                    "include": [
                        "misp-galaxy:threat-actor="
                    ],
                    "threshold": "100"
                },
                "position": {
                    "x": "8",
                    "y": "0",
                    "width": "2",
                    "height": "15"
                }
            }
        ],
        "user_id": "1",
        "timestamp": "1742012921"
    }
}

Enable Plugins

Enrichment
  • Plugin.Enrichment_vulnerability_lookup_enabled
  • Plugin.Enrichment_html_to_markdown_enabled
  • Plugin.Enrichment_extract_url_components_enabled
  • Plugin.Enrichment_mmdb_lookup_enabled
Import
  • Plugin.Import_csvimport_enabled
  • Plugin.Import_ocr_enabled
  • Plugin.Import_mispjson_enabled
Export

Enable Warning List

Warning List
  • List of known hashes with common false-positives (based on Florian Roth input list)

  • List of known hashes for empty files

  • List of known Windows 10 connection endpoints

  • List of known Office 365 IP address ranges

  • List of known Office 365 IP address ranges in China

  • cisco-umbrella-blockpage-ipv4

  • List of RFC 1918 CIDR blocks

  • List of RFC 5735 CIDR blocks

  • RFC 6598 CIDR blocks

  • List of known Apple IP ranges

  • Censys IP Ranges Used for Scanning

  • Shodan IP Ranges Used for Scanning

  • List of known Cloudflare IP ranges

  • List of known Zscaler IP address ranges

  • Parking domains

  • Parking domains name server

  • List of known microsoft domains

  • Captive Portal Detection Hostnames

  • List of known google domains

  • List of known Office 365 URLs

  • Top 1000 website from Alexa

  • List of known URL Shorteners domains

Optional: Enforce MFA

Administration > Server Settings & Maintenance > Security

Security.otp_disabled False
Security.otp_required True

Change OS Timezone

timedatectl list-timezones
sudo timedatectl set-timezone Asia/Kuala_Lumpur