-
Notifications
You must be signed in to change notification settings - Fork 458
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Rapid7] Initial Release for the Rapid7 #4904
Changes from 5 commits
03c32b2
0d46825
c695727
1709c9d
5956e30
54dbb26
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
dependencies: | ||
ecs: | ||
reference: [email protected] |
Large diffs are not rendered by default.
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
version: '2.3' | ||
services: | ||
ti_rapid7_threat_command: | ||
image: docker.elastic.co/observability/stream:v0.7.0 | ||
hostname: ti_rapid7_threat_command | ||
ports: | ||
- 8080 | ||
volumes: | ||
- ./files:/files:ro | ||
environment: | ||
PORT: "8080" | ||
command: | ||
- http-server | ||
- --addr=:8080 | ||
- --config=/files/config.yml |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
rules: | ||
- path: /public/v2/app/elastic/iocs | ||
request_headers: | ||
authorization: ["Basic .*"] | ||
query_params: | ||
lastUpdatedFrom: "{lastUpdatedFrom:.*}" | ||
methods: [GET] | ||
responses: | ||
- status_code: 200 | ||
body: |- | ||
{"content":[{"value":"http://89.160.20.112/test/example.jpg","type":"Urls","status":"Active","severity":"Low","score":13.26086956521739,"lastUpdateDate":"2022-05-08T10:39:07.841Z","lastSeen":"2022-05-04T20:06:10.000Z","firstSeen":"2022-05-04T20:06:10.000Z","relatedMalware":["remcos"],"relatedCampaigns":[],"relatedThreatActors":[],"reportedFeeds":[{"id":"5b68306df84f7c8696047fdd","name":"Test Feed","confidenceLevel":2}],"whitelisted":false,"tags":[]},{"value":"89.160.20.112","type":"IpAddresses","status":"Active","severity":"Low","score":13.26086956521739,"lastUpdateDate":"2022-05-05T10:39:07.851Z","lastSeen":"2022-05-04T20:11:04.000Z","firstSeen":"2022-05-04T20:11:04.000Z","relatedMalware":["remcos"],"relatedCampaigns":[],"relatedThreatActors":[],"reportedFeeds":[{"id":"5b68306df84f7c8696047fdd","name":"Test Feed","confidenceLevel":2}],"whitelisted":false,"tags":["Test"]}]} | ||
- path: /public/v1/data/alerts/alerts-list | ||
request_headers: | ||
authorization: ["Basic .*"] | ||
query_params: | ||
lastUpdatedFrom: "{lastUpdatedFrom:.*}" | ||
methods: [GET] | ||
responses: | ||
- status_code: 200 | ||
body: |- | ||
["123456789abcdefgh8866123","123456789zxcvbnmas8a8q60"] | ||
- path: /public/v1/data/alerts/get-complete-alert/123456789abcdefgh8866123 | ||
request_headers: | ||
authorization: ["Basic .*"] | ||
methods: [GET] | ||
responses: | ||
- status_code: 200 | ||
body: |- | ||
{"_id":"123456789abcdefgh8866123","FoundDate":"2022-11-02T10:03:56.139Z","Details":{"Title":"Suspected Phishing Domain - 'example.com'","Type":"Phishing","SubType":"RegisteredSuspiciousDomain","Severity":"Low","Tags":[{"Name":"Phishing Domain - Default Detection Rule","CreatedBy":"ProfilingRule","_id":"1al3p6789zxcvbnmas8a8q60"}],"Source":{"Type":"WHOIS servers","NetworkType":"ClearWeb","URL":"http://example.com"},"Images":["1al5s6789z6e2b0m9s8a8q60"],"Description":"A suspicious domain 'example.com' was found to have characteristics indicating it may be used to carry out phishing attacks. | Recommendations: It is recommended to block the domain in your URL filtering and mail systems. This can prevent phishing emails being received by your employees and access to websites attempting to steal sensitive information. Click “Remediate” in order to initiate the takedown process for this domain."},"Assignees":[],"Assets":[{"Type":"Domains","Value":"example.com"}],"TakedownStatus":"NotSent","IsFlagged":false,"UpdateDate":"2022-11-02T10:03:56.139Z","RelatedIocs":["example.com"],"RelatedThreatIDs":["6a4e7t9a111bd0003bcc2a57"],"Closed":{"IsClosed":true}} | ||
- path: /public/v1/data/alerts/get-complete-alert/123456789zxcvbnmas8a8q60 | ||
request_headers: | ||
authorization: ["Basic .*"] | ||
methods: [GET] | ||
responses: | ||
- status_code: 200 | ||
body: |- | ||
{"_id":"123456789zxcvbnmas8a8q60","FoundDate":"2022-11-02T10:12:46.260Z","Details":{"Title":"Suspected Phishing Domain - 'example.com'","Type":"Phishing","SubType":"RegisteredSuspiciousDomain","Severity":"Low","Tags":[{"Name":"Phishing Domain - Default Detection Rule","CreatedBy":"ProfilingRule","_id":"1al3p6789z6c2b7m9s8a8q60"}],"Source":{"Type":"WHOIS servers","NetworkType":"ClearWeb","URL":"http://example.com"},"Images":[],"Description":"A suspicious subdomain 'example.com' was found to have characteristics indicating it may be used to carry out phishing attacks. | Recommendations: It is recommended to block the domain in your URL filtering and mail systems. This can prevent phishing emails being received by your employees and access to websites attempting to steal sensitive information. Click “Remediate” in order to initiate the takedown process for this domain."},"Assignees":[],"Assets":[{"Type":"Domains","Value":"example.com"}],"TakedownStatus":"NotSent","IsFlagged":false,"UpdateDate":"2022-11-02T10:12:46.260Z","RelatedIocs":["example.com"],"RelatedThreatIDs":["6a4e7t9a111bd0003bcc2a55"],"Closed":{"IsClosed":true}} | ||
- path: /public/v1/cves/get-cves-list | ||
request_headers: | ||
authorization: ["Basic .*"] | ||
query_params: | ||
updateDateFrom: "{updateDateFrom:.*}" | ||
methods: [GET] | ||
responses: | ||
- status_code: 200 | ||
body: |- | ||
{"content":[{"cveId":"CVE-2020-7064","cpe":[{"Title":"Php","Value":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","VendorProduct":"php php","Range":{"VersionStartIncluding":"1.0.0","VersionEndIncluding":"4.0.0","VersionStartExcluding":"","VersionEndExcluding":""}}],"publishedDate":"2020-04-01T04:15:00.000Z","updateDate":"2020-08-24T21:46:48.619Z","severity":"Low","intsightsScore":16,"cvssScore":5.4,"mentionsAmount":0,"mentionsPerSource":{"SocialMedia":0,"PasteSite":0,"HackingForum":0,"InstantMessage":0,"DarkWeb":0,"CodeRepositories":0,"Exploit":0,"ClearWebCyberBlogs":0},"firstMentionDate":"N/A","lastMentionDate":"2020-04-01T04:15:00.000Z","exploitAvailability":false,"vulnerabilityOrigin":["Qualys"],"relatedMalware":["doppeldridex","dridex"],"relatedCampaigns":["SolarWinds"],"relatedThreatActors":["doppelspider"]}]} |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
- name: '@timestamp' | ||
type: date | ||
description: Event timestamp. |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,26 @@ | ||
- external: ecs | ||
name: threat.enrichments.matched.atomic | ||
- external: ecs | ||
name: threat.enrichments.matched.field | ||
- external: ecs | ||
name: threat.enrichments.matched.id | ||
- external: ecs | ||
name: threat.enrichments.matched.index | ||
- external: ecs | ||
name: threat.enrichments.matched.occurred | ||
- external: ecs | ||
name: threat.enrichments.matched.type | ||
- external: ecs | ||
name: vulnerability.classification | ||
- external: ecs | ||
name: vulnerability.enumeration | ||
- external: ecs | ||
name: vulnerability.id | ||
- external: ecs | ||
name: vulnerability.reference | ||
- external: ecs | ||
name: vulnerability.scanner.vendor | ||
- external: ecs | ||
name: vulnerability.score.base | ||
- external: ecs | ||
name: vulnerability.severity |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,176 @@ | ||
- name: rapid7.tc.vulnerability | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Why is this sub-namespaced rather than Will there be future rapid7 packages that are not "Threat Command"? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Yes, the elastic security team is currently working on the InsightVM Integration of Rapid7 as @jamiehynds mentioned here. So we thought to keep the field name as rapid7.tc.vulnerability because both products are of Rapid7 and we can differentiate the field name between their products. Let me know your thoughts on this. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Yeah, OK. Thanks. |
||
type: group | ||
fields: | ||
- name: cpe | ||
type: group | ||
fields: | ||
- name: range | ||
type: group | ||
fields: | ||
- name: version | ||
type: group | ||
fields: | ||
- name: end | ||
type: group | ||
fields: | ||
- name: excluding | ||
type: version | ||
- name: including | ||
type: version | ||
- name: start | ||
type: group | ||
fields: | ||
- name: excluding | ||
type: version | ||
- name: including | ||
type: version | ||
- name: title | ||
type: keyword | ||
- name: value | ||
type: keyword | ||
- name: vendor_product | ||
type: keyword | ||
- name: cvss_score | ||
type: double | ||
- name: exploit_availability | ||
type: boolean | ||
- name: id | ||
type: keyword | ||
- name: intsights_score | ||
type: double | ||
- name: mention | ||
type: group | ||
fields: | ||
- name: first_date | ||
type: keyword | ||
- name: last_date | ||
type: keyword | ||
- name: mentions | ||
type: group | ||
fields: | ||
- name: source | ||
type: group | ||
fields: | ||
- name: clear_web_cyber_blogs | ||
type: long | ||
- name: code_repositories | ||
type: long | ||
- name: dark_web | ||
type: long | ||
- name: exploit | ||
type: long | ||
- name: hacking_forum | ||
type: long | ||
- name: instant_message | ||
type: long | ||
- name: paste_site | ||
type: long | ||
- name: social_media | ||
type: long | ||
- name: total | ||
type: long | ||
- name: origin | ||
type: keyword | ||
- name: published_date | ||
type: date | ||
- name: related | ||
type: group | ||
fields: | ||
- name: campaigns | ||
type: keyword | ||
- name: malware | ||
type: keyword | ||
- name: threat_actors | ||
type: keyword | ||
- name: severity | ||
type: keyword | ||
- name: update_date | ||
type: date | ||
- name: threat.enrichments.indicator | ||
type: group | ||
fields: | ||
- name: cpe | ||
type: group | ||
fields: | ||
- name: range | ||
type: group | ||
fields: | ||
- name: version | ||
type: group | ||
fields: | ||
- name: end | ||
type: group | ||
fields: | ||
- name: excluding | ||
type: version | ||
- name: including | ||
type: version | ||
- name: start | ||
type: group | ||
fields: | ||
- name: excluding | ||
type: version | ||
- name: including | ||
type: version | ||
- name: title | ||
type: keyword | ||
- name: value | ||
type: keyword | ||
- name: vendor_product | ||
type: keyword | ||
- name: cvss_score | ||
type: double | ||
- name: exploit_availability | ||
type: boolean | ||
- name: id | ||
type: keyword | ||
- name: intsights_score | ||
type: double | ||
- name: mention | ||
type: group | ||
fields: | ||
- name: first_date | ||
type: keyword | ||
- name: last_date | ||
type: keyword | ||
- name: mentions | ||
type: group | ||
fields: | ||
- name: source | ||
type: group | ||
fields: | ||
- name: clear_web_cyber_blogs | ||
type: long | ||
- name: code_repositories | ||
type: long | ||
- name: dark_web | ||
type: long | ||
- name: exploit | ||
type: long | ||
- name: hacking_forum | ||
type: long | ||
- name: instant_message | ||
type: long | ||
- name: paste_site | ||
type: long | ||
- name: social_media | ||
type: long | ||
- name: total | ||
type: long | ||
- name: origin | ||
type: keyword | ||
- name: published_date | ||
type: date | ||
- name: related | ||
type: group | ||
fields: | ||
- name: campaigns | ||
type: keyword | ||
- name: malware | ||
type: keyword | ||
- name: threat_actors | ||
type: keyword | ||
- name: severity | ||
type: keyword | ||
- name: update_date | ||
type: date |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
start: true |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
source: | ||
index: | ||
- .internal.alerts-security.alerts-default-* | ||
query: | ||
bool: | ||
filter: | ||
- match_phrase: | ||
kibana.alert.rule.tags: Rapid7 Threat Command | ||
- match_phrase: | ||
kibana.alert.rule.tags: CVE | ||
- match_phrase: | ||
kibana.alert.rule.category: Indicator Match Rule | ||
dest: | ||
index: rapid7-tc-cve-correlations | ||
pipeline: 0.1.0-ti_rapid7_threat_command-cve-rule-transform-pipeline | ||
frequency: 30m | ||
sync: | ||
time: | ||
field: '@timestamp' | ||
delay: 60s | ||
latest: | ||
unique_key: | ||
- kibana.alert.uuid | ||
sort: '@timestamp' | ||
description: This transform creates index to populate the Vulnerability Correlation and Vulnerability Correlation Details Dashboards. |
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
- name: '@timestamp' | ||
type: date | ||
description: Event timestamp. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.