mirror of https://github.com/MISP/misp-modules
[crowdstrike_falcon] Upgrade crowdstrike_falcon enrich module to new api version & add attribute creation on enrichment functionality
parent
950a76a3ad
commit
13cb1f472d
|
@ -39,6 +39,7 @@ colorama==0.4.4; python_version >= '2.7' and python_version not in '3.0, 3.1, 3.
|
||||||
colorclass==2.2.0
|
colorclass==2.2.0
|
||||||
compressed-rtf==1.0.6
|
compressed-rtf==1.0.6
|
||||||
configparser==5.0.2; python_version >= '3.6'
|
configparser==5.0.2; python_version >= '3.6'
|
||||||
|
crowdstrike-falconpy==0.9.0
|
||||||
cryptography==3.4.7; python_version >= '3.6'
|
cryptography==3.4.7; python_version >= '3.6'
|
||||||
decorator==5.0.9; python_version >= '3.5'
|
decorator==5.0.9; python_version >= '3.5'
|
||||||
deprecated==1.2.12; python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'
|
deprecated==1.2.12; python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'
|
||||||
|
|
|
@ -1,42 +1,45 @@
|
||||||
import json
|
import json
|
||||||
import requests
|
import requests
|
||||||
|
from . import check_input_attribute, standard_error_message
|
||||||
|
from falconpy import Intel
|
||||||
|
from pymisp import MISPAttribute, MISPEvent, MISPObject
|
||||||
|
|
||||||
moduleinfo = {'version': '0.1',
|
moduleinfo = {'version': '0.2',
|
||||||
'author': 'Christophe Vandeplas',
|
'author': 'Christophe Vandeplas',
|
||||||
'description': 'Module to query CrowdStrike Falcon.',
|
'description': 'Module to query CrowdStrike Falcon.',
|
||||||
'module-type': ['expansion']}
|
'module-type': ['expansion', 'hover']}
|
||||||
moduleconfig = ['api_id', 'apikey']
|
moduleconfig = ['api_id', 'apikey']
|
||||||
misperrors = {'error': 'Error'}
|
misperrors = {'error': 'Error'}
|
||||||
misp_types_in = ['domain', 'email-attachment', 'email-dst', 'email-reply-to', 'email-src', 'email-subject',
|
misp_type_in = ['domain', 'email-attachment', 'email-dst', 'email-reply-to', 'email-src', 'email-subject',
|
||||||
'filename', 'hostname', 'ip', 'ip-src', 'ip-dst', 'md5', 'mutex', 'regkey', 'sha1', 'sha256', 'uri', 'url',
|
'filename', 'hostname', 'ip', 'ip-src', 'ip-dst', 'md5', 'mutex', 'regkey', 'sha1', 'sha256', 'uri', 'url',
|
||||||
'user-agent', 'whois-registrant-email', 'x509-fingerprint-md5']
|
'user-agent', 'whois-registrant-email', 'x509-fingerprint-md5']
|
||||||
mapping_out = { # mapping between the MISP attributes types and the compatible CrowdStrike indicator types.
|
mapping_out = { # mapping between the MISP attributes type and the compatible CrowdStrike indicator types.
|
||||||
'domain': {'types': 'hostname', 'to_ids': True},
|
'domain': {'type': 'hostname', 'to_ids': True},
|
||||||
'email_address': {'types': 'email-src', 'to_ids': True},
|
'email_address': {'type': 'email-src', 'to_ids': True},
|
||||||
'email_subject': {'types': 'email-subject', 'to_ids': True},
|
'email_subject': {'type': 'email-subject', 'to_ids': True},
|
||||||
'file_name': {'types': 'filename', 'to_ids': True},
|
'file_name': {'type': 'filename', 'to_ids': True},
|
||||||
'hash_md5': {'types': 'md5', 'to_ids': True},
|
'hash_md5': {'type': 'md5', 'to_ids': True},
|
||||||
'hash_sha1': {'types': 'sha1', 'to_ids': True},
|
'hash_sha1': {'type': 'sha1', 'to_ids': True},
|
||||||
'hash_sha256': {'types': 'sha256', 'to_ids': True},
|
'hash_sha256': {'type': 'sha256', 'to_ids': True},
|
||||||
'ip_address': {'types': 'ip-dst', 'to_ids': True},
|
'ip_address': {'type': 'ip-dst', 'to_ids': True},
|
||||||
'ip_address_block': {'types': 'ip-dst', 'to_ids': True},
|
'ip_address_block': {'type': 'ip-dst', 'to_ids': True},
|
||||||
'mutex_name': {'types': 'mutex', 'to_ids': True},
|
'mutex_name': {'type': 'mutex', 'to_ids': True},
|
||||||
'registry': {'types': 'regkey', 'to_ids': True},
|
'registry': {'type': 'regkey', 'to_ids': True},
|
||||||
'url': {'types': 'url', 'to_ids': True},
|
'url': {'type': 'url', 'to_ids': True},
|
||||||
'user_agent': {'types': 'user-agent', 'to_ids': True},
|
'user_agent': {'type': 'user-agent', 'to_ids': True},
|
||||||
'x509_serial': {'types': 'x509-fingerprint-md5', 'to_ids': True},
|
'x509_serial': {'type': 'x509-fingerprint-md5', 'to_ids': True},
|
||||||
|
|
||||||
'actors': {'types': 'threat-actor'},
|
'actors': {'type': 'threat-actor', 'category': 'Attribution'},
|
||||||
'malware_families': {'types': 'text', 'categories': 'Attribution'}
|
'malware_families': {'type': 'text', 'category': 'Attribution'}
|
||||||
}
|
}
|
||||||
misp_types_out = [item['types'] for item in mapping_out.values()]
|
misp_type_out = [item['type'] for item in mapping_out.values()]
|
||||||
mispattributes = {'input': misp_types_in, 'output': misp_types_out}
|
mispattributes = {'input': misp_type_in, 'format': 'misp_standard'}
|
||||||
|
|
||||||
|
|
||||||
def handler(q=False):
|
def handler(q=False):
|
||||||
if q is False:
|
if q is False:
|
||||||
return False
|
return False
|
||||||
request = json.loads(q)
|
request = json.loads(q)
|
||||||
|
#validate CrowdStrike params
|
||||||
if (request.get('config')):
|
if (request.get('config')):
|
||||||
if (request['config'].get('apikey') is None):
|
if (request['config'].get('apikey') is None):
|
||||||
misperrors['error'] = 'CrowdStrike apikey is missing'
|
misperrors['error'] = 'CrowdStrike apikey is missing'
|
||||||
|
@ -44,41 +47,64 @@ def handler(q=False):
|
||||||
if (request['config'].get('api_id') is None):
|
if (request['config'].get('api_id') is None):
|
||||||
misperrors['error'] = 'CrowdStrike api_id is missing'
|
misperrors['error'] = 'CrowdStrike api_id is missing'
|
||||||
return misperrors
|
return misperrors
|
||||||
|
|
||||||
|
#validate attribute
|
||||||
|
if not request.get('attribute') or not check_input_attribute(request['attribute']):
|
||||||
|
return {'error': f'{standard_error_message}, which should contain at least a type, a value and an uuid.'}
|
||||||
|
attribute = request.get('attribute')
|
||||||
|
if not any(input_type == attribute.get('type') for input_type in misp_type_in):
|
||||||
|
return {'error': 'Unsupported attribute type.'}
|
||||||
|
|
||||||
client = CSIntelAPI(request['config']['api_id'], request['config']['apikey'])
|
client = CSIntelAPI(request['config']['api_id'], request['config']['apikey'])
|
||||||
|
|
||||||
|
attribute = MISPAttribute()
|
||||||
|
attribute.from_dict(**request.get('attribute') )
|
||||||
r = {"results": []}
|
r = {"results": []}
|
||||||
|
|
||||||
valid_type = False
|
valid_type = False
|
||||||
for k in misp_types_in:
|
|
||||||
if request.get(k):
|
try:
|
||||||
# map the MISP typ to the CrowdStrike type
|
for k in misp_type_in:
|
||||||
for item in lookup_indicator(client, request[k]):
|
if attribute.type == k:
|
||||||
r['results'].append(item)
|
# map the MISP type to the CrowdStrike type
|
||||||
|
r['results'].append(lookup_indicator(client, attribute))
|
||||||
valid_type = True
|
valid_type = True
|
||||||
|
except Exception as e:
|
||||||
|
return {'error': f"{e}"}
|
||||||
|
|
||||||
if not valid_type:
|
if not valid_type:
|
||||||
misperrors['error'] = "Unsupported attributes type"
|
misperrors['error'] = "Unsupported attributes type"
|
||||||
return misperrors
|
return misperrors
|
||||||
return r
|
return {'results': r.get('results').pop()}
|
||||||
|
|
||||||
|
|
||||||
def lookup_indicator(client, item):
|
def lookup_indicator(client, ref_attribute):
|
||||||
result = client.search_indicator(item)
|
result = client.search_indicator(ref_attribute.value)
|
||||||
for item in result:
|
misp_event = MISPEvent()
|
||||||
for relation in item['relations']:
|
misp_event.add_attribute(**ref_attribute)
|
||||||
if mapping_out.get(relation['type']):
|
|
||||||
r = mapping_out[relation['type']].copy()
|
|
||||||
r['values'] = relation['indicator']
|
|
||||||
yield(r)
|
|
||||||
for actor in item['actors']:
|
|
||||||
r = mapping_out['actors'].copy()
|
|
||||||
r['values'] = actor
|
|
||||||
yield(r)
|
|
||||||
for malware_family in item['malware_families']:
|
|
||||||
r = mapping_out['malware_families'].copy()
|
|
||||||
r['values'] = malware_family
|
|
||||||
yield(r)
|
|
||||||
|
|
||||||
|
for item in result.get('resources', []):
|
||||||
|
for relation in item.get('relations'):
|
||||||
|
if mapping_out.get(relation.get('type')):
|
||||||
|
r = mapping_out[relation.get('type')].copy()
|
||||||
|
r['value'] = relation.get('indicator')
|
||||||
|
attribute = MISPAttribute()
|
||||||
|
attribute.from_dict(**r)
|
||||||
|
misp_event.add_attribute(**attribute)
|
||||||
|
for actor in item.get('actors'):
|
||||||
|
r = mapping_out.get('actors').copy()
|
||||||
|
r['value'] = actor
|
||||||
|
attribute = MISPAttribute()
|
||||||
|
attribute.from_dict(**r)
|
||||||
|
misp_event.add_attribute(**attribute)
|
||||||
|
if item.get('malware_families'):
|
||||||
|
r = mapping_out.get('malware_families').copy()
|
||||||
|
r['value'] = f"malware_families: {' | '.join(item.get('malware_families'))}"
|
||||||
|
attribute = MISPAttribute()
|
||||||
|
attribute.from_dict(**r)
|
||||||
|
misp_event.add_attribute(**attribute)
|
||||||
|
|
||||||
|
event = json.loads(misp_event.to_json())
|
||||||
|
return {'Object': event.get('Object', []), 'Attribute': event.get('Attribute', [])}
|
||||||
|
|
||||||
def introspection():
|
def introspection():
|
||||||
return mispattributes
|
return mispattributes
|
||||||
|
@ -90,39 +116,25 @@ def version():
|
||||||
|
|
||||||
|
|
||||||
class CSIntelAPI():
|
class CSIntelAPI():
|
||||||
def __init__(self, custid=None, custkey=None, perpage=100, page=1, baseurl="https://intelapi.crowdstrike.com/indicator/v2/search/"):
|
def __init__(self, custid=None, custkey=None):
|
||||||
# customer id and key should be passed when obj is created
|
# customer id and key should be passed when obj is created
|
||||||
self.custid = custid
|
self.falcon = Intel(client_id=custid, client_secret=custkey)
|
||||||
self.custkey = custkey
|
|
||||||
|
|
||||||
self.baseurl = baseurl
|
def search_indicator(self, query):
|
||||||
self.perpage = perpage
|
r = self.falcon.query_indicator_entities(q=query)
|
||||||
self.page = page
|
|
||||||
|
|
||||||
def request(self, query):
|
|
||||||
headers = {'X-CSIX-CUSTID': self.custid,
|
|
||||||
'X-CSIX-CUSTKEY': self.custkey,
|
|
||||||
'Content-Type': 'application/json'}
|
|
||||||
|
|
||||||
full_query = self.baseurl + query
|
|
||||||
|
|
||||||
r = requests.get(full_query, headers=headers)
|
|
||||||
# 400 - bad request
|
# 400 - bad request
|
||||||
if r.status_code == 400:
|
if r.get('status_code') == 400:
|
||||||
raise Exception('HTTP Error 400 - Bad request.')
|
raise Exception('HTTP Error 400 - Bad request.')
|
||||||
|
|
||||||
# 404 - oh shit
|
# 404 - oh shit
|
||||||
if r.status_code == 404:
|
if r.get('status_code') == 404:
|
||||||
raise Exception('HTTP Error 404 - awww snap.')
|
raise Exception('HTTP Error 404 - awww snap.')
|
||||||
|
|
||||||
# catch all?
|
# catch all?
|
||||||
if r.status_code != 200:
|
if r.get('status_code') != 200:
|
||||||
raise Exception('HTTP Error: ' + str(r.status_code))
|
raise Exception('HTTP Error: ' + str(r.get('status_code')))
|
||||||
|
|
||||||
if r.text:
|
if len(r.get('body').get('errors')):
|
||||||
return r
|
raise Exception('API Error: ' + ' | '.join(r.get('body').get('errors')))
|
||||||
|
|
||||||
def search_indicator(self, item):
|
return r.get('body', {})
|
||||||
query = 'indicator?match=' + item
|
|
||||||
r = self.request(query)
|
|
||||||
return json.loads(r.text)
|
|
|
@ -2,5 +2,9 @@
|
||||||
"censys_enrich": {
|
"censys_enrich": {
|
||||||
"api_id" : "<api_id>",
|
"api_id" : "<api_id>",
|
||||||
"api_secret": "<api_secret>"
|
"api_secret": "<api_secret>"
|
||||||
|
},
|
||||||
|
"crowdstrike_falcon": {
|
||||||
|
"api_id" : "<api_id>",
|
||||||
|
"apikey": "<apikey>"
|
||||||
}
|
}
|
||||||
}
|
}
|
|
@ -511,6 +511,25 @@ class TestExpansions(unittest.TestCase):
|
||||||
response = self.misp_modules_post(query)
|
response = self.misp_modules_post(query)
|
||||||
self.assertTrue(self.get_values(response), result)
|
self.assertTrue(self.get_values(response), result)
|
||||||
|
|
||||||
|
def test_crowdstrike(self):
|
||||||
|
module_name = "crowdstrike_falcon"
|
||||||
|
query = {
|
||||||
|
"attribute": {"type": "sha256", "value": "", "uuid": ""},
|
||||||
|
"module": module_name,
|
||||||
|
"config": {}
|
||||||
|
}
|
||||||
|
if module_name in self.configs:
|
||||||
|
query['config'] = self.configs[module_name]
|
||||||
|
response = self.misp_modules_post(query)
|
||||||
|
|
||||||
|
if self.configs[module_name].get('api_id') == '<api_id>':
|
||||||
|
self.assertTrue(self.get_errors(response).startswith('HTTP Error:'))
|
||||||
|
else:
|
||||||
|
self.assertGreaterEqual(len(response.json().get('results', {}).get('Attribute')), 1)
|
||||||
|
else:
|
||||||
|
response = self.misp_modules_post(query)
|
||||||
|
self.assertTrue(self.get_errors(response).startswith('CrowdStrike apikey is missing'))
|
||||||
|
|
||||||
def test_threatminer(self):
|
def test_threatminer(self):
|
||||||
if LiveCI:
|
if LiveCI:
|
||||||
return True
|
return True
|
||||||
|
|
Loading…
Reference in New Issue