Rectifyq’s MISP Style Guide

Traffic Light Protocol (TLP)

TLPFormal DefinitionRectifyq’s audience
🔴 tlp:redFor the eyes and ears of individual recipients only, no further disclosure.Rectifyq + specific recipients
🟠 tlp:amberLimited disclosure, recipients can only spread this on a need-to-know basis within their organization and its clients.Rectifyq + Cyberheroes
🟢 tlp:greenLimited disclosure, recipients can spread this within their community.Rectifyq + Cyberheroes + Cybervigilantes
⚪ tlp:clearInformation can be shared publicly in accordance with the law.Everyone

Severity definition

SeverityDescriptionExample
High
  • State sponsored TA
  • APT + targeted
  • Custom malware/tool + targeted
  • 0day + exploited in wild
  • Lazarus APT (North Korea)
  • FIN7 + target company A
  • Custom and targeting company A
  • Currently being exploited
Medium
  • APT + broad-based
  • Ransomware (Threat & Data Breach)
  • Tool Profile
  • Supply chain related
  • 0day + POC
  • Critical/High/Branded Vulnerability
  • FIN7 + Multiple countries
  • Any ransomware related
  • Any tool profiles
  • Any supply chain related
  • No actual case reported yet
  • Vuln focused w malware sample(s) exploiting it
Low
  • Cybercrime - broad-based
  • Commodity malware
  • Infostealer leaks
  • Phishing, clickfix, defacements campaigns
  • Infostealer, clickfix, etc
  • Lumma stealer, redline, vidar, etc
Undefined
  • News article
  • Indictment
  • Achievement
  • To be removed
Other articles that may still be interesting to be recorded.

APT definition - Advanced Persistence Threat. Not only limited to State Sponsored.

Category

CategoryDescriptio
ThreatIn-depth analysis of specific cyber threats. The focus is on technical details, including Indicators of Compromise (IOCs) and the Tactics, Techniques, and Procedures (TTPs) utilized by threat actors.
Data BreachArticles covering confirmed or alleged incidents of unauthorized data access or exfiltration. Key content focuses on the scope of the compromised data, affected entities, or reports concerning ransomware victim claims.
VulnerabilityArticles that details the vulnerability's impact, and its exploitation status (e.g., availability of a Proof-of-Concept (POC) or active exploitation in the wild).

Sub-category

Sub-categoryDescription
Threat Actor ProfileA detailed report on a specific Threat Actor (who they are), how they attack, what tools they use, and all the past campaigns we think they are responsible for.
Tool ProfileA report that focuses on a single hacking tool (or a normal tool that hackers abuse). It explains how it works, which hacker groups use it, and how you can detect and block it.
Malware AnalysisDeep dive analysis of malware either static, dynamic or reverse engineer the malware sample(s) to understand how it works, capabilities, potential attributions and other intelligence requirements.
Intrusion Analysis (Incident Analysis)A close-up look at one single successful attack on only against specific target (usually one). It maps out the entire story, from how the hacker first got in until they achieved their final goal (like stealing data).
Campaign AnalysisA report that looks at several related attacks against multiple targets. It helps connect the dots to see a bigger picture of what a hacker group is trying to achieve strategically.
Leaks ForumReports focused on illegal underground forums where hackers post and try to sell or share data they claim to have stolen from a company.
Leaks InfostealerAn analysis focused on finding stolen data logs (like passwords) from "Infostealer" malware that are linked to a specific company or organization.
Zero-dayUnpatched Exploits: High-priority indicators for vulnerabilities that have no official patch or were exploited before public awareness.
Branded VulnerabilityHigh-Profile Bugs: Vulnerabilities with marketing names/logos (e.g., Heartbleed, PwnKit) that often see rapid, mass exploitation."
Critical VulnerabilityHigh-Severity Flaws: Standard vulnerabilities that carry a high CVSS/EPSS score but may not have a brand name
ReportOther related cybersecurity or intelligence reports that is relevant.

Threat Actor Category

TA CategoryDescriptionExample
APTHighly sophisticated, long-term clandestine campaigns. These actors have significant resources and focus on stealth to maintain persistent access to a network for espionage or data theft. Can be State sponsored, can be cybercrime.Dark Basin, Lazarus, FIN7
State SponsoredHighly-skilled hackers funded and directed by a government of certain nation.APT28 (Fancy Bear), APT34 (OilRig), Lazarus Group
CybercrimeIndividuals or organized groups (Cybercriminals) whose primary motivation is financial gain.FIN7
RansomwareAn organized collective of cybercriminals that develops, distributes, and operates sophisticated ransomware strains, often employing the Ransomware-as-a-Service (RaaS) model and double extortion tactics.LockBit, BlackCat (ALPHV), Clop
HacktivistHackers motivated by a political, social, or ideological cause, using hacking as a form of protest.Anonymous, LulzSec, OpIsrael

Target

TargetDetails
Broad-based
  • Commodity
  • Opportunistic
  • Everyone is a target, no exclusion
  • Everyone is a target, some exclusion such as specific country, locale, etc.
  • Specific Language - still broad (example targeting German/Mandarin Speaking)
  • Specific country - political events, etc.
  • Specific group of people (red-teamers, pentesters, gamers, etc.)
TargetedSpecific Target - specially crafted based on opportunity or targets Information Attack Space
  • Specific Individual/Company/Organization

Target vs Victim

CharacteristicsTargetVictim
InclusivityAll target is a victimNot all victim is a target
DetailsMust contain specific key indicators (multiple) that directs to the target.Most of the articles with specified country etc. is victim limited to their telemetry (who is their customer)
ExampleBased on keyword in the spear-phishing email which only relevant to the target and vulnerability exploited is opportunity TA used against the victim. Based on the telemetry of the vendor, it is found that country X has been affected in this campaign.
Defined asspecifically targeting at least

Relevancy

RelevancyExample
🔴RelevantAPT targeting Malaysian entity.
🟡Somewhat RelevantAPT target Asian country.
🔵Potentially RelevantInfostealers impact globally.
⚫Not RelevantGood to know only.

p.s. Not relevant does not mean to be ignored, it can be use to improve our security detection or prevention from the lesson learn of the incident. It is just lower priority compared to other three as the event may specifically targeting organizations that is not related to Malaysia, or targeting specific language speakers (e.g. russian language) and etc.

Rectifyq’s Workflow

WorkflowDescription
Check DateEnsure MISP Event Date is same as the date the article was posted.
Review SeveritySelect MISP Event severity as per above severity definition.
Check ProducerEnsure correct Producer is tagged in MISP Event galaxy.
Check ActorAdd Threat Actor tag in MISP Event Galaxy, if there is none in Galaxy, add as attribute and tag as create missing galaxy.
Check TargetAdd Target Information and Sector tag in MISP Event Galaxy.
Check ToolAdd related tools tag in MISP Event Galaxy.
Check MalwareAdd Malpedia tag in MISP Event Galaxy
Check TTPEnsure MITRE ATT&CK in MISP Event Galaxy is accurate, priority goes to Malaysia related event (may need to self curate if not provided by the Producer)
Add IOC ContextAdd comments with relevant context in each attributes. (e.g. 84c82835a5d21bbcf75a61706d8ab549 - WannaCry Ransomware)
Check Key IndicatorAdd related attributes/objects with details that may be used for attribution such as:
- username:password used by TA in the infection chain
- decryption key used
- mutexes
- password for archives
- sender email addressess
- language used
- etc.
Need sample sponsorRequire Malware sample sponsor, either upload to Malware Bazaar (preferred) or upload directly to MISP(for sample with sensitive data)
To Report toTo report to relevant parties such as the owner, hosting provider, MyCERT, registrar or etc.

Topics

TopicsDescription
geopoliticalGeopolitical Related
ics-otIndustrial Control System (ICS) and Operational Technology (OT)
mobile-attackMobile Attack
supply-chainSupply Chain