mirror of https://github.com/MISP/PyMISP
commit
202519b0ac
|
@ -0,0 +1,14 @@
|
|||
[trustar]
|
||||
|
||||
# endpoint that provides oauth token
|
||||
auth_endpoint = https://api.trustar.co/oauth/token
|
||||
|
||||
# base API URL access endpoint
|
||||
api_endpoint = https://api.trustar.co/api/1.3
|
||||
|
||||
# Generate and copy your API key and secret on user API settings page on Station: https://station.trustar.co/settings/api
|
||||
user_api_key = '#{API_KEY}'
|
||||
user_api_secret = '#{API_SECRET}'
|
||||
|
||||
# OPTIONAL: enter one or more comma-separate enclave IDs to submit to - get these from API settings page on Station
|
||||
# enclave_ids = abcdef,1234f
|
|
@ -0,0 +1,66 @@
|
|||
from trustar import TruStar, datetime_to_millis
|
||||
from datetime import datetime, timedelta
|
||||
from keys import misp_url, misp_key, misp_verifycert
|
||||
from pymisp import ExpandedPyMISP, MISPEvent, MISPOrganisation
|
||||
|
||||
|
||||
tru = TruStar()
|
||||
|
||||
misp = ExpandedPyMISP(misp_url, misp_key, misp_verifycert)
|
||||
|
||||
now = datetime.now()
|
||||
|
||||
# date range for pulling reports is last 4 hours when script is run
|
||||
to_time = datetime.now()
|
||||
from_time = to_time - timedelta(hours=4)
|
||||
|
||||
# convert to millis since epoch
|
||||
to_time = datetime_to_millis(to_time)
|
||||
from_time = datetime_to_millis(from_time)
|
||||
|
||||
rhisac = "7a33144f-aef3-442b-87d4-dbf70d8afdb0"
|
||||
reports = tru.get_reports(from_time=from_time,
|
||||
to_time=to_time,
|
||||
is_enclave=True,
|
||||
enclave_ids=rhisac)
|
||||
|
||||
# loop through each trustar report and create MISP events for each
|
||||
for report in reports:
|
||||
# initialize and set MISPOrganisation()
|
||||
orgc = MISPOrganisation()
|
||||
orgc.name = 'RH-ISAC'
|
||||
orgc.id = '#{ORGC.ID}' # organisation id
|
||||
orgc.uuid = '#{ORGC.UUID}' # organisation uuid
|
||||
# initialize and set MISPEvent()
|
||||
event = MISPEvent()
|
||||
event.Orgc = orgc
|
||||
event.info = report.title
|
||||
event.distribution = 0 # Optional, defaults to MISP.default_event_distribution in MISP config
|
||||
event.threat_level_id = 2 # Optional, defaults to MISP.default_event_threat_level in MISP config
|
||||
event.analysis = 0 # Optional, defaults to 0 (initial analysis)
|
||||
|
||||
# get tags for report
|
||||
for tag in tru.get_enclave_tags(report.id):
|
||||
event.add_tag(tag.name)
|
||||
|
||||
# get indicators for report
|
||||
for indicator in tru.get_indicators_for_report(report.id):
|
||||
|
||||
# map trustar indicator type to MISP format
|
||||
indicator_type = {
|
||||
"MD5": "md5",
|
||||
"SHA1": "sha1",
|
||||
"SHA256": "sha256",
|
||||
"SOFTWARE": "filename",
|
||||
"URL": "link",
|
||||
"EMAIL_ADDRESS": "email-src",
|
||||
"IP": "ip-dst",
|
||||
"MALWARE": "malware-type",
|
||||
"CIDR_BLOCK": "ip-src",
|
||||
"CVE": "vulnerability",
|
||||
"THREAT_ACTOR": "threat-actor"
|
||||
}
|
||||
event.add_attribute(indicator_type.get(indicator.type), indicator.value)
|
||||
|
||||
# post each event to MISP via API
|
||||
misp.add_event(event.to_json())
|
Loading…
Reference in New Issue