mirror of https://github.com/MISP/misp-galaxy
Add [tidal] scipts to create new galaxies
parent
b4ad928722
commit
a33e9e2a14
|
@ -0,0 +1,15 @@
|
||||||
|
import requests
|
||||||
|
|
||||||
|
class TidalAPI:
|
||||||
|
def __init__(self):
|
||||||
|
self.base_url = 'https://app-api.tidalcyber.com/api/v1/'
|
||||||
|
|
||||||
|
def get_data(self, endpoint):
|
||||||
|
url = self.base_url + endpoint
|
||||||
|
try:
|
||||||
|
response = requests.get(url)
|
||||||
|
return response.json()
|
||||||
|
except Exception as e:
|
||||||
|
print(f'Error: {e}')
|
||||||
|
return None
|
||||||
|
|
|
@ -0,0 +1,62 @@
|
||||||
|
from api import TidalAPI
|
||||||
|
import json
|
||||||
|
|
||||||
|
VERSION = 1
|
||||||
|
GALAXY_PATH = "../../galaxies/"
|
||||||
|
CLUSTER_PATH = "../../clusters/"
|
||||||
|
GALAXY_UUID = "43a8fce6-08d3-46c2-957d-53606efe2c48"
|
||||||
|
|
||||||
|
def create_galaxy():
|
||||||
|
galaxy = {}
|
||||||
|
galaxy["description"] = "Tidal Campaigns Galaxy"
|
||||||
|
galaxy["name"] = "Tidal Campaigns"
|
||||||
|
galaxy["namespace"] = "tidal"
|
||||||
|
galaxy["type"] = "campaigns"
|
||||||
|
galaxy["uuid"] = GALAXY_UUID
|
||||||
|
galaxy["version"] = VERSION
|
||||||
|
return galaxy
|
||||||
|
|
||||||
|
def create_cluster(galaxy, data):
|
||||||
|
cluster = {}
|
||||||
|
values = []
|
||||||
|
|
||||||
|
for campaigns in data["data"]:
|
||||||
|
value = {}
|
||||||
|
relations = []
|
||||||
|
|
||||||
|
value["description"] = campaigns["description"]
|
||||||
|
|
||||||
|
value["meta"] = {}
|
||||||
|
value["meta"]["source"] = campaigns["source"]
|
||||||
|
value["meta"]["campaign-attack-id"] = campaigns["campaign_attack_id"]
|
||||||
|
value["meta"]["first-seen"] = campaigns["first_seen"]
|
||||||
|
value["meta"]["last-seen"] = campaigns["last_seen"]
|
||||||
|
value["meta"]["tags"] = campaigns["tags"]
|
||||||
|
value["meta"]["owner"] = campaigns["owner_name"]
|
||||||
|
|
||||||
|
value["related"] = relations
|
||||||
|
value["uuid"] = campaigns["id"]
|
||||||
|
value["value"] = campaigns["name"]
|
||||||
|
values.append(value)
|
||||||
|
|
||||||
|
cluster["authors"] = ["Tidal"]
|
||||||
|
cluster["category"] = "Threat campaigns"
|
||||||
|
cluster["description"] = "Tidal Campaigns"
|
||||||
|
cluster["name"] = "Tidal Campaigns"
|
||||||
|
cluster["source"] = "https://app-api.tidalcyber.com/api/v1/campaigns"
|
||||||
|
cluster["type"] = "campaigns"
|
||||||
|
cluster["uuid"] = galaxy["uuid"]
|
||||||
|
cluster["values"] = values
|
||||||
|
return cluster
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
api = TidalAPI()
|
||||||
|
data = api.get_data('campaigns')
|
||||||
|
galaxy = create_galaxy()
|
||||||
|
cluster = create_cluster(galaxy, data)
|
||||||
|
|
||||||
|
with open(GALAXY_PATH + "tidal-campaigns.json", "w") as galaxy_file:
|
||||||
|
json.dump(galaxy, galaxy_file, indent=4)
|
||||||
|
|
||||||
|
with open(CLUSTER_PATH + "tidal-campaigns.json", "w") as cluster_file:
|
||||||
|
json.dump(cluster, cluster_file, indent=4)
|
|
@ -0,0 +1,73 @@
|
||||||
|
from api import TidalAPI
|
||||||
|
import json
|
||||||
|
|
||||||
|
VERSION = 1
|
||||||
|
GALAXY_PATH = "../../galaxies/"
|
||||||
|
CLUSTER_PATH = "../../clusters/"
|
||||||
|
GALAXY_UUID = "41c3e5c0-de5c-4edb-b48b-48cd8e7519e6"
|
||||||
|
|
||||||
|
def create_galaxy():
|
||||||
|
galaxy = {}
|
||||||
|
galaxy["description"] = "Tidal Threat Group Galaxy"
|
||||||
|
galaxy["name"] = "Tidal Threat Group"
|
||||||
|
galaxy["namespace"] = "tidal"
|
||||||
|
galaxy["type"] = "threat-group"
|
||||||
|
galaxy["uuid"] = GALAXY_UUID
|
||||||
|
galaxy["version"] = VERSION
|
||||||
|
return galaxy
|
||||||
|
|
||||||
|
|
||||||
|
def create_cluster(galaxy, data):
|
||||||
|
cluster = {}
|
||||||
|
values = []
|
||||||
|
|
||||||
|
for group in data["data"]:
|
||||||
|
value = {}
|
||||||
|
relations = []
|
||||||
|
# TODO check for id and associated_group_id and add to relations
|
||||||
|
for entry in group["associated_groups"]:
|
||||||
|
relation = {}
|
||||||
|
relation["dest-uuid"] = entry["id"]
|
||||||
|
relation["type"] = "related-to"
|
||||||
|
relations.append(relation)
|
||||||
|
|
||||||
|
value["description"] = group["description"]
|
||||||
|
|
||||||
|
value["meta"] = {}
|
||||||
|
value["meta"]["source"] = group["source"]
|
||||||
|
value["meta"]["group-attack-id"] = group["group_attack_id"]
|
||||||
|
value["meta"]["country"] = [country["country_code"] for country in group["country"]]
|
||||||
|
value["meta"]["observed_country"] = [country["country_code"] for country in group["observed_country"]]
|
||||||
|
value["meta"]["motive"] = [motive["name"] for motive in group["observed_motivation"]]
|
||||||
|
value["meta"]["target-category"] = [sector["name"] for sector in group["observed_sector"]]
|
||||||
|
value["meta"]["tags"] = group["tags"]
|
||||||
|
value["meta"]["owner"] = group["owner_name"]
|
||||||
|
|
||||||
|
value["related"] = relations
|
||||||
|
value["uuid"] = group["id"]
|
||||||
|
value["value"] = group["name"]
|
||||||
|
values.append(value)
|
||||||
|
|
||||||
|
cluster["authors"] = ["Tidal"]
|
||||||
|
cluster["category"] = "Threat Group"
|
||||||
|
cluster["description"] = "Tidal Threat Groups"
|
||||||
|
cluster["name"] = "Tidal Threat Group"
|
||||||
|
cluster["source"] = "https://app-api.tidalcyber.com/api/v1/groups"
|
||||||
|
cluster["type"] = "threat-group"
|
||||||
|
cluster["uuid"] = galaxy["uuid"]
|
||||||
|
cluster["values"] = values
|
||||||
|
return cluster
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
|
||||||
|
api = TidalAPI()
|
||||||
|
data = api.get_data("groups")
|
||||||
|
galaxy = create_galaxy()
|
||||||
|
cluster = create_cluster(galaxy, data)
|
||||||
|
|
||||||
|
with open(GALAXY_PATH + "tidal-threat-group.json", "w") as galaxy_file:
|
||||||
|
json.dump(galaxy, galaxy_file, indent=4)
|
||||||
|
|
||||||
|
with open(CLUSTER_PATH + "tidal-threat-group.json", "w") as cluster_file:
|
||||||
|
json.dump(cluster, cluster_file, indent=4)
|
|
@ -0,0 +1,73 @@
|
||||||
|
from api import TidalAPI
|
||||||
|
import json
|
||||||
|
|
||||||
|
VERSION = 1
|
||||||
|
GALAXY_PATH = "../../galaxies/"
|
||||||
|
CLUSTER_PATH = "../../clusters/"
|
||||||
|
GALAXY_UUID = "38d62d8b-4c49-489a-9bc4-8e294c4f04f7"
|
||||||
|
|
||||||
|
def create_galaxy():
|
||||||
|
galaxy = {}
|
||||||
|
galaxy["description"] = "Tidal Software Galaxy"
|
||||||
|
galaxy["name"] = "Tidal Software"
|
||||||
|
galaxy["namespace"] = "tidal"
|
||||||
|
galaxy["type"] = "software"
|
||||||
|
galaxy["uuid"] = GALAXY_UUID
|
||||||
|
galaxy["version"] = VERSION
|
||||||
|
return galaxy
|
||||||
|
|
||||||
|
def create_cluster(galaxy, data):
|
||||||
|
cluster = {}
|
||||||
|
values = []
|
||||||
|
|
||||||
|
for software in data["data"]:
|
||||||
|
value = {}
|
||||||
|
relations = []
|
||||||
|
# TODO check for relations etc.
|
||||||
|
for entry in software["groups"]:
|
||||||
|
relation = {}
|
||||||
|
relation["dest-uuid"] = entry["id"]
|
||||||
|
relation["type"] = "used-by"
|
||||||
|
relations.append(relation)
|
||||||
|
for entry in software["associated_software"]:
|
||||||
|
relation = {}
|
||||||
|
relation["dest-uuid"] = entry["id"]
|
||||||
|
relation["type"] = "related-to"
|
||||||
|
relations.append(relation)
|
||||||
|
|
||||||
|
value["description"] = software["description"]
|
||||||
|
|
||||||
|
value["meta"] = {}
|
||||||
|
value["meta"]["source"] = software["source"]
|
||||||
|
value["meta"]["type"] = software["type"]
|
||||||
|
value["meta"]["software-attack-id"] = software["software_attack_id"]
|
||||||
|
value["meta"]["platforms"] = software["platforms"]
|
||||||
|
value["meta"]["tags"] = software["tags"]
|
||||||
|
value["meta"]["owner"] = software["owner_name"]
|
||||||
|
|
||||||
|
value["related"] = relations
|
||||||
|
value["uuid"] = software["id"]
|
||||||
|
value["value"] = software["name"]
|
||||||
|
values.append(value)
|
||||||
|
|
||||||
|
cluster["authors"] = ["Tidal"]
|
||||||
|
cluster["category"] = "Threat software"
|
||||||
|
cluster["description"] = "Tidal Threat Groups"
|
||||||
|
cluster["name"] = "Tidal Threat software"
|
||||||
|
cluster["source"] = "https://app-api.tidalcyber.com/api/v1/software"
|
||||||
|
cluster["type"] = "threat-software"
|
||||||
|
cluster["uuid"] = galaxy["uuid"]
|
||||||
|
cluster["values"] = values
|
||||||
|
return cluster
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
api = TidalAPI()
|
||||||
|
data = api.get_data('software')
|
||||||
|
galaxy = create_galaxy()
|
||||||
|
cluster = create_cluster(galaxy, data)
|
||||||
|
|
||||||
|
with open(GALAXY_PATH + "tidal-software.json", "w") as galaxy_file:
|
||||||
|
json.dump(galaxy, galaxy_file, indent=4)
|
||||||
|
|
||||||
|
with open(CLUSTER_PATH + "tidal-software.json", "w") as cluster_file:
|
||||||
|
json.dump(cluster, cluster_file, indent=4)
|
Loading…
Reference in New Issue