Views:
The Malware Information Sharing Platform (MISP) can receive events and indicators from the Trend Threat Intelligence feed.
Prerequisites:

Add the feed in MISP Parent topic

Access the Trend Threat Intelligence Feed through the built-in feeds functionality in MISP.

Procedure

  1. In the MISP web interface, select Sync ActionsFeeds.
  2. Click Add Feed to display the configuration page.
  3. Select Enabled.
  4. Enter the Name and Provider for the feed.
  5. Enter the regional feed URL from the table below.
  6. Enter the API token as follows: Authorization: Bearer <your_token>
  7. Click Submit to save the configuration.

Add custom galaxies Parent topic

After adding the Trend Threat Intelligence Feed in MISP, you can add or update Trend Micro galaxies using the Python script available here.
Alternatively, you can manually add custom galaxies by following the steps below.

Procedure

  1. Download the relevant galaxy JavaScript Object Notation (JSON) files from the URL for your region shown in the table below.
  2. Copy the files to the galaxies folder (location may vary): /var/www/MISP/app/files/misp-galaxy/galaxies/
  3. Click Force Update Galaxies to save changes.

Add custom clusters Parent topic

After adding the Trend Threat Intelligence Feed in MISP, you can add or update Trend Micro clusters using the Python script available here.
Alternatively, you can manually add custom galaxies by following the steps below.

Procedure

  1. Download the relevant cluster JSON files from the URL for your region shown in the table below.
  2. Copy the files to the clusters folder (location may vary): /var/www/MISP/app/files/misp-galaxy/clusters/
  3. Click Force Update Galaxies to save changes.