Make PEP8 happy \o/

pr/41
Raphaël Vinot 2016-08-12 14:09:59 +02:00
parent 91675a635c
commit c6fccf1b7e
1 changed files with 125 additions and 124 deletions

View File

@ -1,6 +1,4 @@
import json import json
import stix
import csv
from stix.core import STIXPackage from stix.core import STIXPackage
import re import re
import base64 import base64
@ -18,180 +16,183 @@ moduleconfig = []
def handler(q=False): def handler(q=False):
#Just in case we have no data # Just in case we have no data
if q is False: if q is False:
return False return False
#The return value # The return value
r = {'results': []} r = {'results': []}
#Load up that JSON # Load up that JSON
q = json.loads(q) q = json.loads(q)
#It's b64 encoded, so decode that stuff # It's b64 encoded, so decode that stuff
package = str(base64.b64decode(q.get("data", None)), 'utf-8') package = str(base64.b64decode(q.get("data", None)), 'utf-8')
#If something really weird happened
if not package:
return json.dumps({"success":0})
#Load up the package into STIX # If something really weird happened
if not package:
return json.dumps({"success": 0})
# Load up the package into STIX
package = loadPackage(package) package = loadPackage(package)
#Build all the observables # Build all the observables
if package.observables: if package.observables:
for obs in package.observables: for obs in package.observables:
r["results"].append(buildObservable(obs)) r["results"].append(buildObservable(obs))
if package.threat_actors: if package.threat_actors:
for ta in package.threat_actors: for ta in package.threat_actors:
r["results"].append(buildActor(ta)) r["results"].append(buildActor(ta))
if package.indicators: if package.indicators:
for ind in package.indicators: for ind in package.indicators:
r["results"].append(buildIndicator(ind)) r["results"].append(buildIndicator(ind))
if package.exploit_targets: if package.exploit_targets:
for et in package.exploit_targets: for et in package.exploit_targets:
r["results"].append(buildExploitTarget(et)) r["results"].append(buildExploitTarget(et))
if package.campaigns: if package.campaigns:
for cpn in package.campaigns: for cpn in package.campaigns:
r["results"].append(buildCampaign(cpn)) r["results"].append(buildCampaign(cpn))
#Clean up results # Clean up results
#Don't send on anything that didn't have a value # Don't send on anything that didn't have a value
r["results"] = [x for x in r["results"] if len(x["values"]) != 0] r["results"] = [x for x in r["results"] if len(x["values"]) != 0]
return r return r
#Quick and dirty regex for IP addresses # Quick and dirty regex for IP addresses
ipre = re.compile("([0-9]{1,3}.){3}[0-9]{1,3}") ipre = re.compile("([0-9]{1,3}.){3}[0-9]{1,3}")
def buildCampaign(cpn): def buildCampaign(cpn):
""" """
Extract a campaign name Extract a campaign name
""" """
return {"values": [cpn.title], "types": ["campaign-name"]}
return {"values":[cpn.title], "types":["campaign-name"]}
def buildExploitTarget(et): def buildExploitTarget(et):
""" """
Extract CVEs from exploit targets Extract CVEs from exploit targets
""" """
r = {"values":[], "types":["vulnerability"]} r = {"values": [], "types": ["vulnerability"]}
if et.vulnerabilities: if et.vulnerabilities:
for v in et.vulnerabilities: for v in et.vulnerabilities:
if v.cve_id: if v.cve_id:
r["values"].append(v.cve_id) r["values"].append(v.cve_id)
return r
return r
def identifyHash(hsh): def identifyHash(hsh):
""" """
What's that hash!? What's that hash!?
""" """
possible_hashes = [] possible_hashes = []
hashes = [x for x in hashlib.algorithms_guaranteed] hashes = [x for x in hashlib.algorithms_guaranteed]
for h in hashes:
if len(str(hsh)) == len(hashlib.new(h).hexdigest()):
possible_hashes.append(h)
possible_hashes.append("filename|{}".format(h))
return possible_hashes
for h in hashes:
if len(str(hsh)) == len(hashlib.new(h).hexdigest()):
possible_hashes.append(h)
possible_hashes.append("filename|{}".format(h))
return possible_hashes
def buildIndicator(ind): def buildIndicator(ind):
""" """
Extract hashes Extract hashes
and other fun things and other fun things
like that like that
""" """
r = {"values":[], "types":[]} r = {"values": [], "types": []}
# Try to get hashes. I hate stix
if ind.observable:
return buildObservable(ind.observable)
return r
#Try to get hashes. I hate stix
if ind.observable:
return buildObservable(ind.observable)
return r
def buildActor(ta): def buildActor(ta):
""" """
Extract the name Extract the name
and comment of a and comment of a
threat actor threat actor
""" """
r = {"values":[ta.title], "types":["threat-actor"]} r = {"values": [ta.title], "types": ["threat-actor"]}
return r return r
def buildObservable(o): def buildObservable(o):
""" """
Take a STIX observable Take a STIX observable
and extract the value and extract the value
and category and category
""" """
#Life is easier with json # Life is easier with json
if not isinstance(o, dict): if not isinstance(o, dict):
o = json.loads(o.to_json()) o = json.loads(o.to_json())
#Make a new record to store values in # Make a new record to store values in
r = {"values":[]} r = {"values": []}
#Get the object properties. This contains all the # Get the object properties. This contains all the
#fun stuff like values # fun stuff like values
if "observable_composition" in o: if "observable_composition" in o:
#May as well be useless # May as well be useless
return r return r
props = o["object"]["properties"]
#If it has an address_value field, it's gonna be an address props = o["object"]["properties"]
print(props)
#Kinda obvious really
if "address_value" in props:
#We've got ourselves a nice little address
value = props["address_value"]
if isinstance(value, dict): # If it has an address_value field, it's gonna be an address
#Sometimes it's embedded in a dictionary # print(props)
value = value["value"] # Kinda obvious really
if "address_value" in props:
#Is it an IP? # We've got ourselves a nice little address
if ipre.match(str(value)): value = props["address_value"]
#Yes! if isinstance(value, dict):
r["values"].append(value) # Sometimes it's embedded in a dictionary
r["types"] = ["ip-src", "ip-dst"] value = value["value"]
else:
#Probably a domain yo # Is it an IP?
r["values"].append(value) if ipre.match(str(value)):
r["types"] = ["domain", "hostname"] # Yes!
r["values"].append(value)
r["types"] = ["ip-src", "ip-dst"]
else:
# Probably a domain yo
r["values"].append(value)
r["types"] = ["domain", "hostname"]
if "hashes" in props:
for hsh in props["hashes"]:
r["values"].append(hsh["simple_hash_value"]["value"])
r["types"] = identifyHash(hsh["simple_hash_value"]["value"])
return r
if "hashes" in props:
for hsh in props["hashes"]:
r["values"].append(hsh["simple_hash_value"]["value"])
r["types"] = identifyHash(hsh["simple_hash_value"]["value"])
return r
def loadPackage(data): def loadPackage(data):
#Write the stix package to a tmp file # Write the stix package to a tmp file
with open("/tmp/stixdump", "w") as f: with open("/tmp/stixdump", "w") as f:
f.write(data) f.write(data)
try:
#Try loading it into every format we know of
try: try:
package = STIXPackage().from_xml(open("/tmp/stixdump", "r")) # Try loading it into every format we know of
except: try:
package = STIXPackage().from_json(open("/tmp/stixdump", "r")) package = STIXPackage().from_xml(open("/tmp/stixdump", "r"))
except Exception as ex: except:
print("Failed to load package") package = STIXPackage().from_json(open("/tmp/stixdump", "r"))
raise ValueError("COULD NOT LOAD STIX PACKAGE!") except Exception:
return package print("Failed to load package")
raise ValueError("COULD NOT LOAD STIX PACKAGE!")
return package
def introspection(): def introspection():
modulesetup = {} modulesetup = {}