2020-02-17 10:52:25 +01:00
|
|
|
#!/usr/bin/env python3
|
|
|
|
# -*-coding:UTF-8 -*
|
|
|
|
|
2023-02-15 11:02:47 +01:00
|
|
|
"""
|
2020-02-17 10:52:25 +01:00
|
|
|
Blueprint Flask: MISP format import export
|
2023-02-15 11:02:47 +01:00
|
|
|
"""
|
2023-01-16 16:27:49 +01:00
|
|
|
import io
|
2020-02-17 10:52:25 +01:00
|
|
|
import os
|
|
|
|
import sys
|
|
|
|
import json
|
|
|
|
|
2023-01-16 16:27:49 +01:00
|
|
|
from flask import render_template, jsonify, request, Blueprint, redirect, url_for, Response, send_file, abort
|
2023-02-15 11:02:47 +01:00
|
|
|
from flask_login import login_required, current_user
|
2020-02-17 10:52:25 +01:00
|
|
|
|
|
|
|
sys.path.append('modules')
|
|
|
|
|
|
|
|
# Import Role_Manager
|
|
|
|
from Role_Manager import login_admin, login_analyst, login_read_only
|
|
|
|
|
2022-11-22 10:47:15 +01:00
|
|
|
sys.path.append(os.environ['AIL_BIN'])
|
|
|
|
##################################
|
|
|
|
# Import Project packages
|
|
|
|
##################################
|
2023-02-15 11:02:47 +01:00
|
|
|
from exporter import MISPExporter
|
2023-03-16 14:51:53 +01:00
|
|
|
from exporter import TheHiveExporter
|
2023-04-20 10:44:17 +02:00
|
|
|
from lib.exceptions import MISPConnectionError
|
2022-11-22 10:47:15 +01:00
|
|
|
from lib.objects import ail_objects
|
2023-02-15 11:02:47 +01:00
|
|
|
from lib.Investigations import Investigation
|
2020-02-17 10:52:25 +01:00
|
|
|
|
2023-02-15 11:02:47 +01:00
|
|
|
# TODO REMOVE ME
|
2023-01-16 16:27:49 +01:00
|
|
|
from export import MispImport # TODO REMOVE ME
|
2023-03-16 14:51:53 +01:00
|
|
|
|
2023-01-16 16:27:49 +01:00
|
|
|
# TODO REMOVE ME
|
2020-02-17 10:52:25 +01:00
|
|
|
|
|
|
|
# ============ BLUEPRINT ============
|
2023-01-16 16:27:49 +01:00
|
|
|
import_export = Blueprint('import_export', __name__,
|
|
|
|
template_folder=os.path.join(os.environ['AIL_FLASK'], 'templates/import_export'))
|
2020-02-17 10:52:25 +01:00
|
|
|
|
2023-01-16 16:27:49 +01:00
|
|
|
# ============ VARIABLES ============
|
2023-02-15 11:02:47 +01:00
|
|
|
misp_exporter_objects = MISPExporter.MISPExporterAILObjects()
|
|
|
|
misp_exporter_investigation = MISPExporter.MISPExporterInvestigation()
|
2020-02-17 10:52:25 +01:00
|
|
|
|
2023-03-16 14:51:53 +01:00
|
|
|
thehive_exporter_item = TheHiveExporter.TheHiveExporterItem()
|
|
|
|
|
|
|
|
|
2020-02-17 10:52:25 +01:00
|
|
|
# ============ FUNCTIONS ============
|
|
|
|
|
2023-04-20 10:44:17 +02:00
|
|
|
def create_json_response(data, status_code):
|
|
|
|
return Response(json.dumps(data, indent=2, sort_keys=True), mimetype='application/json'), status_code
|
|
|
|
|
2020-02-17 10:52:25 +01:00
|
|
|
|
|
|
|
# ============= ROUTES ==============
|
|
|
|
@import_export.route('/import_export/import')
|
|
|
|
@login_required
|
|
|
|
@login_analyst
|
|
|
|
def import_object():
|
2020-02-18 13:47:47 +01:00
|
|
|
return render_template("import_object.html")
|
2020-02-17 10:52:25 +01:00
|
|
|
|
2023-02-15 11:02:47 +01:00
|
|
|
|
2023-01-16 16:27:49 +01:00
|
|
|
# TODO
|
2020-02-17 10:52:25 +01:00
|
|
|
@import_export.route("/import_export/import_file", methods=['POST'])
|
|
|
|
@login_required
|
|
|
|
@login_analyst
|
|
|
|
def import_object_file():
|
2020-02-18 13:47:47 +01:00
|
|
|
error = None
|
2020-02-17 10:52:25 +01:00
|
|
|
|
|
|
|
is_file = False
|
|
|
|
if 'file' in request.files:
|
|
|
|
file = request.files['file']
|
|
|
|
if file:
|
|
|
|
if file.filename:
|
|
|
|
is_file = True
|
|
|
|
|
2020-02-18 13:47:47 +01:00
|
|
|
all_imported_obj = []
|
2020-02-17 10:52:25 +01:00
|
|
|
if is_file:
|
|
|
|
filename = MispImport.sanitize_import_file_path(file.filename)
|
|
|
|
file.save(filename)
|
|
|
|
map_uuid_global_id = MispImport.import_objs_from_file(filename)
|
|
|
|
os.remove(filename)
|
2020-02-18 13:47:47 +01:00
|
|
|
for obj_uuid in map_uuid_global_id:
|
2022-11-22 10:47:15 +01:00
|
|
|
dict_obj = MispImport.get_global_id_from_id(map_uuid_global_id[obj_uuid])
|
|
|
|
obj = ail_objects.get_object(dict_obj['type'], dict_obj['subtype'], dict_obj['id'])
|
2020-02-18 13:47:47 +01:00
|
|
|
dict_obj['uuid'] = obj_uuid
|
2022-11-22 10:47:15 +01:00
|
|
|
dict_obj['url'] = obj.get_link(flask_context=True)
|
|
|
|
dict_obj['node'] = obj.get_svg_icon()
|
2020-02-18 13:47:47 +01:00
|
|
|
all_imported_obj.append(dict_obj)
|
2020-02-17 10:52:25 +01:00
|
|
|
|
2020-02-18 13:47:47 +01:00
|
|
|
if not all_imported_obj:
|
|
|
|
error = "error: Empty or invalid JSON file"
|
|
|
|
|
|
|
|
return render_template("import_object.html", all_imported_obj=all_imported_obj, error=error)
|
2020-02-17 10:52:25 +01:00
|
|
|
|
2023-01-16 16:27:49 +01:00
|
|
|
|
2023-01-18 16:28:08 +01:00
|
|
|
@import_export.route("/misp/objects/export", methods=['GET'])
|
2020-02-17 10:52:25 +01:00
|
|
|
@login_required
|
|
|
|
@login_analyst
|
2023-01-16 16:27:49 +01:00
|
|
|
def objects_misp_export():
|
2020-02-19 16:15:41 +01:00
|
|
|
user_id = current_user.get_id()
|
2023-01-16 16:27:49 +01:00
|
|
|
object_types = ail_objects.get_all_objects_with_subtypes_tuple()
|
2023-02-15 11:02:47 +01:00
|
|
|
to_export = MISPExporter.get_user_misp_objects_to_export(user_id)
|
2023-01-16 16:27:49 +01:00
|
|
|
return render_template("export_object.html", object_types=object_types, to_export=to_export)
|
2020-02-19 16:15:41 +01:00
|
|
|
|
|
|
|
|
2023-01-18 16:28:08 +01:00
|
|
|
@import_export.route("/misp/objects/export/post", methods=['POST'])
|
2020-02-17 17:01:16 +01:00
|
|
|
@login_required
|
|
|
|
@login_analyst
|
2023-01-16 16:27:49 +01:00
|
|
|
def objects_misp_export_post():
|
2020-02-19 16:15:41 +01:00
|
|
|
user_id = current_user.get_id()
|
|
|
|
|
|
|
|
# Get new added Object
|
2023-01-16 16:27:49 +01:00
|
|
|
new_export = []
|
|
|
|
user_lvl_export = {}
|
2020-02-17 17:01:16 +01:00
|
|
|
for obj_tuple in list(request.form):
|
2023-01-16 16:27:49 +01:00
|
|
|
# GET NEW LEVEL
|
|
|
|
if obj_tuple[0] == '{':
|
|
|
|
obj_j = obj_tuple.replace("'", "\"")
|
|
|
|
obj_dict = json.loads(obj_j) # TODO sanitize
|
|
|
|
lvl = int(request.form.getlist(obj_tuple)[0])
|
|
|
|
user_lvl_export[f"{obj_dict['type']}:{obj_dict['subtype']}:{obj_dict['id']}"] = lvl
|
|
|
|
|
2020-02-17 17:01:16 +01:00
|
|
|
l_input = request.form.getlist(obj_tuple)
|
|
|
|
if len(l_input) == 3:
|
2023-01-16 16:27:49 +01:00
|
|
|
if l_input[0] != 'Object type...':
|
|
|
|
new_type, new_subtype = l_input[0].split(':', 1)
|
|
|
|
if not new_subtype:
|
|
|
|
new_subtype = ''
|
|
|
|
new_export.append({'type': new_type, 'subtype': new_subtype, 'id': l_input[1], 'lvl': l_input[2]})
|
|
|
|
|
|
|
|
objects = []
|
|
|
|
invalid_obj = []
|
|
|
|
for obj in new_export:
|
|
|
|
if not ail_objects.exists_obj(obj['type'], obj['subtype'], obj['id']):
|
|
|
|
invalid_obj.append(obj)
|
2020-02-18 17:02:00 +01:00
|
|
|
else:
|
2023-01-16 16:27:49 +01:00
|
|
|
objects.append(obj)
|
2023-02-15 11:02:47 +01:00
|
|
|
for obj in MISPExporter.get_user_misp_objects_to_export(user_id):
|
2023-01-16 16:27:49 +01:00
|
|
|
if not ail_objects.exists_obj(obj['type'], obj['subtype'], obj['id']):
|
|
|
|
invalid_obj.append(obj)
|
2020-02-18 17:02:00 +01:00
|
|
|
else:
|
2023-01-16 16:27:49 +01:00
|
|
|
str_id = f"{obj['type']}:{obj['subtype']}:{obj['id']}"
|
|
|
|
if str_id in user_lvl_export:
|
|
|
|
obj['lvl'] = user_lvl_export[str_id]
|
|
|
|
objects.append(obj)
|
|
|
|
|
|
|
|
if invalid_obj:
|
|
|
|
object_types = ail_objects.get_all_objects_with_subtypes_tuple()
|
|
|
|
return render_template("export_object.html", object_types=object_types,
|
|
|
|
to_export=objects, l_obj_invalid=invalid_obj)
|
|
|
|
|
|
|
|
export = request.form.get('export_to_misp', False)
|
|
|
|
distribution = request.form.get('misp_event_distribution')
|
2023-02-15 11:02:47 +01:00
|
|
|
threat_level = request.form.get('threat_level_id')
|
2023-01-16 16:27:49 +01:00
|
|
|
analysis = request.form.get('misp_event_analysis')
|
|
|
|
info = request.form.get('misp_event_info')
|
|
|
|
publish = request.form.get('misp_event_info', False)
|
|
|
|
|
|
|
|
objs = ail_objects.get_objects(objects)
|
2023-04-20 10:44:17 +02:00
|
|
|
try:
|
|
|
|
event = misp_exporter_objects.create_event(objs, distribution=distribution, threat_level=threat_level,
|
2023-02-15 11:02:47 +01:00
|
|
|
analysis=analysis, info=info, export=export, publish=publish)
|
2023-04-20 10:44:17 +02:00
|
|
|
except MISPConnectionError as e:
|
|
|
|
return create_json_response({"error": e.message}, 400)
|
2023-01-16 16:27:49 +01:00
|
|
|
|
2023-02-15 11:02:47 +01:00
|
|
|
MISPExporter.delete_user_misp_objects_to_export(user_id)
|
2023-01-16 16:27:49 +01:00
|
|
|
if not export:
|
2023-04-20 10:44:17 +02:00
|
|
|
event_uuid = event[10:46]
|
|
|
|
# TODO ADD JAVASCRIPT REFRESH PAGE IF RESP == 200
|
|
|
|
return send_file(io.BytesIO(event.encode()), as_attachment=True,
|
|
|
|
download_name=f'ail_export_{event_uuid}.json')
|
2023-01-16 16:27:49 +01:00
|
|
|
else:
|
|
|
|
object_types = ail_objects.get_all_objects_with_subtypes_tuple()
|
|
|
|
return render_template("export_object.html", object_types=object_types,
|
|
|
|
misp_url=event['url'])
|
2020-02-19 16:15:41 +01:00
|
|
|
|
|
|
|
|
2023-01-18 16:28:08 +01:00
|
|
|
@import_export.route("/misp/objects/export/add", methods=['GET'])
|
2020-02-19 16:15:41 +01:00
|
|
|
@login_required
|
|
|
|
@login_analyst
|
|
|
|
def add_object_id_to_export():
|
|
|
|
user_id = current_user.get_id()
|
2023-01-16 16:27:49 +01:00
|
|
|
obj_type = request.args.get('type')
|
|
|
|
obj_id = request.args.get('id')
|
|
|
|
obj_subtype = request.args.get('subtype')
|
|
|
|
obj_lvl = request.args.get('lvl')
|
|
|
|
|
|
|
|
try:
|
|
|
|
obj_lvl = int(obj_lvl)
|
|
|
|
except:
|
|
|
|
obj_lvl = 0
|
|
|
|
|
|
|
|
if not ail_objects.exists_obj(obj_type, obj_subtype, obj_id):
|
|
|
|
abort(404)
|
2023-02-15 11:02:47 +01:00
|
|
|
MISPExporter.add_user_misp_object_to_export(user_id, obj_type, obj_subtype, obj_id, lvl=obj_lvl)
|
2020-02-19 16:15:41 +01:00
|
|
|
# redirect
|
2023-01-16 16:27:49 +01:00
|
|
|
return redirect(url_for('import_export.objects_misp_export'))
|
|
|
|
|
|
|
|
|
2023-01-18 16:28:08 +01:00
|
|
|
@import_export.route("/misp/objects/export/delete", methods=['GET'])
|
2023-01-16 16:27:49 +01:00
|
|
|
@login_required
|
|
|
|
@login_analyst
|
|
|
|
def delete_object_id_to_export():
|
|
|
|
user_id = current_user.get_id()
|
|
|
|
obj_type = request.args.get('type')
|
|
|
|
obj_id = request.args.get('id')
|
|
|
|
obj_subtype = request.args.get('subtype')
|
|
|
|
|
2023-02-15 11:02:47 +01:00
|
|
|
MISPExporter.delete_user_misp_object_to_export(user_id, obj_type, obj_subtype, obj_id)
|
2023-01-16 16:27:49 +01:00
|
|
|
return jsonify(success=True)
|
|
|
|
|
2020-02-19 16:15:41 +01:00
|
|
|
|
2023-01-18 16:28:08 +01:00
|
|
|
@import_export.route("/investigation/misp/export", methods=['GET'])
|
2022-03-07 15:12:01 +01:00
|
|
|
@login_required
|
|
|
|
@login_analyst
|
|
|
|
def export_investigation():
|
|
|
|
investigation_uuid = request.args.get("uuid")
|
2023-02-15 11:02:47 +01:00
|
|
|
investigation = Investigation(investigation_uuid)
|
|
|
|
if not investigation.exists():
|
|
|
|
abort(404)
|
|
|
|
if misp_exporter_objects.ping_misp():
|
2023-03-16 14:51:53 +01:00
|
|
|
event = misp_exporter_investigation.export(investigation)
|
2023-01-16 16:27:49 +01:00
|
|
|
print(event)
|
2022-03-07 15:12:01 +01:00
|
|
|
else:
|
2023-01-16 16:27:49 +01:00
|
|
|
return Response(json.dumps({"error": "Can't reach MISP Instance"}, indent=2, sort_keys=True),
|
|
|
|
mimetype='application/json'), 400
|
2022-03-07 15:12:01 +01:00
|
|
|
return redirect(url_for('investigations_b.show_investigation', uuid=investigation_uuid))
|
2023-01-18 16:28:08 +01:00
|
|
|
|
|
|
|
|
|
|
|
@import_export.route("/thehive/objects/case/export", methods=['POST'])
|
|
|
|
@login_required
|
|
|
|
@login_analyst
|
|
|
|
def create_thehive_case():
|
|
|
|
description = request.form['hive_description']
|
|
|
|
title = request.form['hive_case_title']
|
2023-03-16 14:51:53 +01:00
|
|
|
threat_level = request.form['threat_level_hive']
|
|
|
|
tlp = request.form['hive_tlp']
|
2023-01-18 16:28:08 +01:00
|
|
|
item_id = request.form['obj_id']
|
|
|
|
|
2023-02-15 11:02:47 +01:00
|
|
|
item = ail_objects.get_object('item', '', item_id)
|
2023-01-18 16:28:08 +01:00
|
|
|
if not item.exists():
|
|
|
|
abort(404)
|
|
|
|
|
2023-03-16 14:51:53 +01:00
|
|
|
case_id = thehive_exporter_item.export(item.get_id(), description=description, title=title,
|
|
|
|
threat_level=threat_level, tlp=tlp)
|
2023-01-18 16:28:08 +01:00
|
|
|
if case_id:
|
2023-03-16 14:51:53 +01:00
|
|
|
return redirect(thehive_exporter_item.get_case_url(case_id))
|
2023-01-18 16:28:08 +01:00
|
|
|
else:
|
|
|
|
return 'error'
|