Merge pull request #518 from goodlandsecurity/trustar-integration

Trustar integration
pull/531/head
Raphaël Vinot 2020-01-24 11:39:38 +01:00 committed by GitHub
commit 202519b0ac
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 80 additions and 0 deletions

14
examples/trustar.conf Normal file
View File

@ -0,0 +1,14 @@
[trustar]
# endpoint that provides oauth token
auth_endpoint = https://api.trustar.co/oauth/token
# base API URL access endpoint
api_endpoint = https://api.trustar.co/api/1.3
# Generate and copy your API key and secret on user API settings page on Station: https://station.trustar.co/settings/api
user_api_key = '#{API_KEY}'
user_api_secret = '#{API_SECRET}'
# OPTIONAL: enter one or more comma-separate enclave IDs to submit to - get these from API settings page on Station
# enclave_ids = abcdef,1234f

66
examples/trustar_misp.py Normal file
View File

@ -0,0 +1,66 @@
from trustar import TruStar, datetime_to_millis
from datetime import datetime, timedelta
from keys import misp_url, misp_key, misp_verifycert
from pymisp import ExpandedPyMISP, MISPEvent, MISPOrganisation
tru = TruStar()
misp = ExpandedPyMISP(misp_url, misp_key, misp_verifycert)
now = datetime.now()
# date range for pulling reports is last 4 hours when script is run
to_time = datetime.now()
from_time = to_time - timedelta(hours=4)
# convert to millis since epoch
to_time = datetime_to_millis(to_time)
from_time = datetime_to_millis(from_time)
rhisac = "7a33144f-aef3-442b-87d4-dbf70d8afdb0"
reports = tru.get_reports(from_time=from_time,
to_time=to_time,
is_enclave=True,
enclave_ids=rhisac)
# loop through each trustar report and create MISP events for each
for report in reports:
# initialize and set MISPOrganisation()
orgc = MISPOrganisation()
orgc.name = 'RH-ISAC'
orgc.id = '#{ORGC.ID}' # organisation id
orgc.uuid = '#{ORGC.UUID}' # organisation uuid
# initialize and set MISPEvent()
event = MISPEvent()
event.Orgc = orgc
event.info = report.title
event.distribution = 0 # Optional, defaults to MISP.default_event_distribution in MISP config
event.threat_level_id = 2 # Optional, defaults to MISP.default_event_threat_level in MISP config
event.analysis = 0 # Optional, defaults to 0 (initial analysis)
# get tags for report
for tag in tru.get_enclave_tags(report.id):
event.add_tag(tag.name)
# get indicators for report
for indicator in tru.get_indicators_for_report(report.id):
# map trustar indicator type to MISP format
indicator_type = {
"MD5": "md5",
"SHA1": "sha1",
"SHA256": "sha256",
"SOFTWARE": "filename",
"URL": "link",
"EMAIL_ADDRESS": "email-src",
"IP": "ip-dst",
"MALWARE": "malware-type",
"CIDR_BLOCK": "ip-src",
"CVE": "vulnerability",
"THREAT_ACTOR": "threat-actor"
}
event.add_attribute(indicator_type.get(indicator.type), indicator.value)
# post each event to MISP via API
misp.add_event(event.to_json())