2020-01-31 16:01:47 +00:00
|
|
|
#!/usr/bin/env python3
|
|
|
|
# -*-coding:UTF-8 -*
|
|
|
|
|
|
|
|
import os
|
2020-02-17 16:01:16 +00:00
|
|
|
import io
|
2020-01-31 16:01:47 +00:00
|
|
|
import sys
|
|
|
|
import uuid
|
|
|
|
|
2022-11-28 14:01:40 +00:00
|
|
|
sys.path.append(os.environ['AIL_BIN'])
|
|
|
|
from lib.objects import ail_objects
|
2020-01-31 16:01:47 +00:00
|
|
|
|
2022-11-28 14:01:40 +00:00
|
|
|
from export import AILObjects
|
2022-03-22 08:50:41 +00:00
|
|
|
|
2020-01-31 16:01:47 +00:00
|
|
|
|
2022-11-28 14:01:40 +00:00
|
|
|
from lib.Investigations import Investigation
|
2020-02-21 14:03:48 +00:00
|
|
|
|
2022-11-28 14:01:40 +00:00
|
|
|
# # TODO: # FIXME: REFACTOR ME => use UI/Global config
|
2020-02-18 16:02:00 +00:00
|
|
|
sys.path.append('../../configs/keys')
|
2020-02-21 10:03:28 +00:00
|
|
|
try:
|
|
|
|
from mispKEYS import misp_url, misp_key, misp_verifycert
|
|
|
|
except:
|
|
|
|
misp_url = ''
|
|
|
|
misp_key = ''
|
|
|
|
misp_verifycert = False
|
2020-02-18 16:02:00 +00:00
|
|
|
|
2020-01-31 16:01:47 +00:00
|
|
|
# MISP
|
|
|
|
from pymisp import MISPEvent, MISPObject, PyMISP
|
|
|
|
|
2020-02-17 16:01:16 +00:00
|
|
|
def is_valid_obj_to_export(obj_type, obj_subtype, obj_id):
|
2022-11-28 14:01:40 +00:00
|
|
|
if not ail_objects.is_valid_object_type(obj_type):
|
2020-02-17 16:01:16 +00:00
|
|
|
return False
|
2022-11-28 14:01:40 +00:00
|
|
|
if not ail_objects.is_valid_object_subtype(obj_type, obj_subtype):
|
2020-02-17 16:01:16 +00:00
|
|
|
return False
|
2022-11-28 14:01:40 +00:00
|
|
|
if not ail_objects.exists_obj(obj_type, obj_subtype, obj_id):
|
2020-02-17 16:01:16 +00:00
|
|
|
return False
|
|
|
|
return True
|
|
|
|
|
|
|
|
def sanitize_obj_export_lvl(lvl):
|
|
|
|
try:
|
|
|
|
lvl = int(lvl)
|
|
|
|
except:
|
|
|
|
lvl = 0
|
|
|
|
return lvl
|
|
|
|
|
|
|
|
def get_export_filename(json_content):
|
2020-02-21 13:35:34 +00:00
|
|
|
return 'ail_export_{}.json'.format(json_content.uuid)
|
2020-02-17 16:01:16 +00:00
|
|
|
|
|
|
|
def create_in_memory_file(json_content):
|
|
|
|
return io.BytesIO(json_content.encode())
|
2020-01-31 16:01:47 +00:00
|
|
|
|
|
|
|
def add_relation_ship_to_create(set_relationship, dict_obj, dict_new_obj):
|
2022-11-28 14:01:40 +00:00
|
|
|
global_id = ail_objects.get_obj_global_id(dict_obj['type'], dict_obj.get('subtype', ''), dict_obj['id'])
|
|
|
|
global_id_new = ail_objects.get_obj_global_id(dict_new_obj['type'], dict_new_obj.get('subtype', ''), dict_new_obj['id'])
|
2020-01-31 16:01:47 +00:00
|
|
|
if global_id > global_id_new:
|
|
|
|
res = (global_id, global_id_new)
|
|
|
|
else:
|
|
|
|
res = (global_id_new, global_id)
|
|
|
|
set_relationship.add( res )
|
|
|
|
|
|
|
|
# # TODO: add action by obj type
|
|
|
|
# ex => Domain
|
|
|
|
def add_obj_to_create(all_obj_to_export, set_relationship, dict_obj):
|
2022-11-28 14:01:40 +00:00
|
|
|
all_obj_to_export.add(ail_objects.get_obj_global_id(dict_obj['type'], dict_obj.get('subtype', ''), dict_obj['id']))
|
2020-01-31 16:01:47 +00:00
|
|
|
|
|
|
|
def add_obj_to_create_by_lvl(all_obj_to_export, set_relationship, dict_obj, lvl):
|
|
|
|
# # TODO: filter by export mode or filter on all global ?
|
|
|
|
if lvl >= 0:
|
|
|
|
add_obj_to_create(all_obj_to_export, add_obj_to_create, dict_obj)
|
|
|
|
|
|
|
|
if lvl > 0:
|
|
|
|
lvl = lvl - 1
|
|
|
|
|
|
|
|
# # TODO: filter by correlation types
|
2022-11-28 14:01:40 +00:00
|
|
|
obj_correlations = ail_objects.get_obj_correlations(dict_obj['type'], dict_obj.get('subtype', ''), dict_obj['id'])
|
2020-01-31 16:01:47 +00:00
|
|
|
for obj_type in obj_correlations:
|
|
|
|
dict_new_obj = {'type': obj_type}
|
2022-03-22 08:50:41 +00:00
|
|
|
if obj_type=='pgp' or obj_type=='cryptocurrency' or obj_type=='username':
|
2020-01-31 16:01:47 +00:00
|
|
|
for subtype in obj_correlations[obj_type]:
|
|
|
|
dict_new_obj['subtype'] = subtype
|
|
|
|
for obj_id in obj_correlations[obj_type][subtype]:
|
|
|
|
dict_new_obj['id'] = obj_id
|
|
|
|
add_obj_to_create_by_lvl(all_obj_to_export, set_relationship, dict_new_obj, lvl)
|
|
|
|
add_relation_ship_to_create(set_relationship, dict_obj, dict_new_obj)
|
|
|
|
|
|
|
|
else:
|
|
|
|
for obj_id in obj_correlations[obj_type]:
|
|
|
|
dict_new_obj['id'] = obj_id
|
|
|
|
add_obj_to_create_by_lvl(all_obj_to_export, set_relationship, dict_new_obj, lvl)
|
|
|
|
add_relation_ship_to_create(set_relationship, dict_obj, dict_new_obj)
|
|
|
|
|
|
|
|
|
|
|
|
add_obj_to_create_by_lvl(all_obj_to_export, set_relationship, dict_obj, lvl)
|
|
|
|
|
|
|
|
|
2020-02-18 16:02:00 +00:00
|
|
|
def create_list_of_objs_to_export(l_obj, r_type='json'):
|
2020-01-31 16:01:47 +00:00
|
|
|
all_obj_to_export = set()
|
|
|
|
set_relationship = set()
|
|
|
|
for obj in l_obj:
|
|
|
|
add_obj_to_create_by_lvl(all_obj_to_export, set_relationship, obj, obj.get('lvl', 1))
|
|
|
|
|
|
|
|
# create MISP objects
|
|
|
|
dict_misp_obj = create_all_misp_obj(all_obj_to_export, set_relationship)
|
|
|
|
|
|
|
|
# create object relationships
|
|
|
|
for obj_global_id_1, obj_global_id_2 in set_relationship:
|
|
|
|
dict_relationship = get_relationship_between_global_obj(obj_global_id_1, obj_global_id_2)
|
|
|
|
if dict_relationship:
|
|
|
|
obj_src = dict_misp_obj[dict_relationship['src']]
|
|
|
|
obj_dest = dict_misp_obj[dict_relationship['dest']]
|
|
|
|
obj_src.add_reference(obj_dest.uuid, dict_relationship['relation'], 'add a comment')
|
|
|
|
|
|
|
|
event = MISPEvent()
|
|
|
|
event.info = 'AIL framework export'
|
2020-02-21 13:35:34 +00:00
|
|
|
event.uuid = str(uuid.uuid4())
|
2020-01-31 16:01:47 +00:00
|
|
|
for obj_global_id in dict_misp_obj:
|
|
|
|
misp_obj = dict_misp_obj[obj_global_id]
|
2020-02-21 13:42:18 +00:00
|
|
|
AILObjects.create_map_obj_event_uuid(event.uuid, obj_global_id)
|
|
|
|
AILObjects.create_map_obj_uuid_golbal_id(event.uuid, obj_global_id)
|
2020-01-31 16:01:47 +00:00
|
|
|
if misp_obj:
|
|
|
|
# add object to event
|
|
|
|
event.add_object(dict_misp_obj[obj_global_id])
|
|
|
|
|
2020-02-21 13:35:34 +00:00
|
|
|
return event
|
2020-01-31 16:01:47 +00:00
|
|
|
|
2022-11-28 14:01:40 +00:00
|
|
|
# TODO REFACTOR ME
|
2020-01-31 16:01:47 +00:00
|
|
|
def create_all_misp_obj(all_obj_to_export, set_relationship):
|
|
|
|
dict_misp_obj = {}
|
|
|
|
for obj_global_id in all_obj_to_export:
|
|
|
|
obj_type, obj_id = obj_global_id.split(':', 1)
|
|
|
|
dict_misp_obj[obj_global_id] = create_misp_obj(obj_type, obj_id)
|
|
|
|
return dict_misp_obj
|
|
|
|
|
2022-11-28 14:01:40 +00:00
|
|
|
# TODO REFACTOR ME
|
2020-01-31 16:01:47 +00:00
|
|
|
def create_misp_obj(obj_type, obj_id):
|
2022-11-28 14:01:40 +00:00
|
|
|
if obj_type in ['cryptocurrency', 'pgp', 'username']:
|
2022-03-22 08:50:41 +00:00
|
|
|
obj_subtype, obj_id = obj_id.split(':', 1)
|
2022-11-28 14:01:40 +00:00
|
|
|
else:
|
|
|
|
obj_subtype = ''
|
|
|
|
misp_obj = ail_objects.get_misp_object(obj_type, obj_subtype, obj_id)
|
|
|
|
return misp_obj
|
|
|
|
|
2020-01-31 16:01:47 +00:00
|
|
|
|
|
|
|
def get_relationship_between_global_obj(obj_global_id_1, obj_global_id_2):
|
|
|
|
obj_type_1 = obj_global_id_1.split(':', 1)[0]
|
|
|
|
obj_type_2 = obj_global_id_2.split(':', 1)[0]
|
|
|
|
type_tuple = [obj_type_1, obj_type_2]
|
|
|
|
|
|
|
|
if 'image' in type_tuple: # or screenshot ## TODO:
|
|
|
|
if obj_type_1 == 'image':
|
|
|
|
src = obj_global_id_1
|
|
|
|
dest = obj_global_id_2
|
|
|
|
else:
|
|
|
|
src = obj_global_id_2
|
|
|
|
dest = obj_global_id_1
|
|
|
|
return {'relation': 'screenshot-of', 'src': src, 'dest': dest}
|
|
|
|
elif 'decoded' in type_tuple:
|
|
|
|
if obj_type_1 == 'decoded':
|
|
|
|
src = obj_global_id_1
|
|
|
|
dest = obj_global_id_2
|
|
|
|
else:
|
|
|
|
src = obj_global_id_2
|
|
|
|
dest = obj_global_id_1
|
|
|
|
return {'relation': 'included-in', 'src': src, 'dest': dest}
|
2020-02-04 12:04:09 +00:00
|
|
|
elif 'pgp' in type_tuple:
|
|
|
|
if obj_type_1 == 'pgp':
|
|
|
|
src = obj_global_id_1
|
|
|
|
dest = obj_global_id_2
|
|
|
|
else:
|
|
|
|
src = obj_global_id_2
|
|
|
|
dest = obj_global_id_1
|
|
|
|
return {'relation': 'extracted-from', 'src': src, 'dest': dest}
|
2020-01-31 16:01:47 +00:00
|
|
|
elif 'cryptocurrency':
|
2020-02-04 12:04:09 +00:00
|
|
|
if obj_type_1 == 'cryptocurrency':
|
|
|
|
src = obj_global_id_1
|
|
|
|
dest = obj_global_id_2
|
|
|
|
else:
|
|
|
|
src = obj_global_id_2
|
|
|
|
dest = obj_global_id_1
|
|
|
|
return {'relation': 'extracted-from', 'src': src, 'dest': dest}
|
|
|
|
elif 'domain' in type_tuple:
|
|
|
|
if 'item' in type_tuple:
|
|
|
|
if obj_type_1 == 'item':
|
|
|
|
src = obj_global_id_1
|
|
|
|
dest = obj_global_id_2
|
|
|
|
else:
|
|
|
|
src = obj_global_id_2
|
|
|
|
dest = obj_global_id_1
|
|
|
|
return {'relation': 'extracted-from', 'src': src, 'dest': dest} # replave by crawled-from
|
|
|
|
elif 'item' in type_tuple:
|
|
|
|
if 'domain' in type_tuple:
|
|
|
|
if obj_type_1 == 'item':
|
|
|
|
src = obj_global_id_1
|
|
|
|
dest = obj_global_id_2
|
|
|
|
else:
|
|
|
|
src = obj_global_id_2
|
|
|
|
dest = obj_global_id_1
|
|
|
|
return {'relation': 'extracted-from', 'src': src, 'dest': dest} # replave by crawled-from
|
|
|
|
return None
|
2020-01-31 16:01:47 +00:00
|
|
|
|
2020-02-18 16:02:00 +00:00
|
|
|
def sanitize_event_distribution(distribution):
|
|
|
|
try:
|
|
|
|
int(distribution)
|
|
|
|
if (0 <= distribution <= 3):
|
|
|
|
return distribution
|
|
|
|
else:
|
|
|
|
return 0
|
|
|
|
except:
|
|
|
|
return 0
|
|
|
|
|
|
|
|
def sanitize_event_threat_level_id(threat_level_id):
|
|
|
|
try:
|
|
|
|
int(threat_level_id)
|
|
|
|
if (1 <= threat_level_id <= 4):
|
|
|
|
return threat_level_id
|
|
|
|
else:
|
|
|
|
return 4
|
|
|
|
except:
|
|
|
|
return 4
|
|
|
|
|
|
|
|
def sanitize_event_analysis(analysis):
|
|
|
|
try:
|
|
|
|
int(analysis)
|
|
|
|
if (0 <= analysis <= 2):
|
|
|
|
return analysis
|
|
|
|
else:
|
|
|
|
return 0
|
|
|
|
except:
|
|
|
|
return 0
|
|
|
|
|
2020-02-21 10:03:28 +00:00
|
|
|
# # TODO: return error
|
|
|
|
def ping_misp():
|
|
|
|
try:
|
|
|
|
PyMISP(misp_url, misp_key, misp_verifycert)
|
|
|
|
return True
|
|
|
|
except Exception as e:
|
|
|
|
print(e)
|
|
|
|
return False
|
|
|
|
|
2020-02-18 16:02:00 +00:00
|
|
|
def create_misp_event(event, distribution=0, threat_level_id=4, publish=False, analysis=0, event_info=None):
|
|
|
|
if event_info:
|
|
|
|
event.info = event_info
|
|
|
|
event.distribution = sanitize_event_distribution(distribution)
|
|
|
|
event.threat_level_id = sanitize_event_threat_level_id(threat_level_id)
|
|
|
|
event.analysis = sanitize_event_analysis(analysis)
|
|
|
|
if publish:
|
|
|
|
event.publish()
|
|
|
|
|
|
|
|
# # TODO: handle multiple MISP instance
|
|
|
|
misp = PyMISP(misp_url, misp_key, misp_verifycert)
|
2020-02-21 10:36:22 +00:00
|
|
|
#print(event.to_json())
|
2022-03-07 14:12:01 +00:00
|
|
|
|
2020-02-21 14:01:39 +00:00
|
|
|
misp_event = misp.add_event(event)
|
2020-02-21 14:47:05 +00:00
|
|
|
#print(misp_event)
|
2020-02-18 16:02:00 +00:00
|
|
|
# # TODO: handle error
|
|
|
|
event_metadata = extract_event_metadata(misp_event)
|
|
|
|
return event_metadata
|
|
|
|
|
|
|
|
def extract_event_metadata(event):
|
|
|
|
event_metadata = {}
|
2020-02-21 14:09:16 +00:00
|
|
|
event_metadata['uuid'] = event['Event']['uuid']
|
|
|
|
event_metadata['id'] = event['Event']['id']
|
2020-02-18 16:02:00 +00:00
|
|
|
if misp_url[-1] == '/':
|
|
|
|
event_metadata['url'] = misp_url + 'events/view/' + str(event_metadata['id'])
|
|
|
|
else:
|
|
|
|
event_metadata['url'] = misp_url + '/events/view/' + str(event_metadata['id'])
|
|
|
|
return event_metadata
|
|
|
|
|
2020-01-31 16:01:47 +00:00
|
|
|
######
|
|
|
|
#
|
2020-02-18 16:02:00 +00:00
|
|
|
# EXPORT LVL DEFINITION: (== Correl<tion DEPTH)
|
2020-01-31 16:01:47 +00:00
|
|
|
#
|
|
|
|
# LVL 0 => PARTIAL Only add core item Correlation
|
|
|
|
# LVL 1 => DETAILED Also add correlated_items correlation
|
|
|
|
######
|
|
|
|
|
2022-03-07 14:12:01 +00:00
|
|
|
# # TODO: # create object relationships
|
|
|
|
def create_investigation_event(investigation_uuid):
|
|
|
|
investigation = Investigation(investigation_uuid)
|
|
|
|
|
|
|
|
event = MISPEvent()
|
|
|
|
event.info = investigation.get_info()
|
2022-03-11 08:29:48 +00:00
|
|
|
event.uuid = investigation.get_uuid(separator=True)
|
2022-03-07 14:12:01 +00:00
|
|
|
event.date = investigation.get_date()
|
|
|
|
event.analysis = investigation.get_analysis()
|
|
|
|
event.threat_level_id = investigation.get_threat_level()
|
|
|
|
|
2022-03-11 08:29:48 +00:00
|
|
|
event.distribution = 0
|
2022-03-07 14:12:01 +00:00
|
|
|
|
2022-03-11 08:29:48 +00:00
|
|
|
# tags
|
|
|
|
for tag in investigation.get_tags():
|
|
|
|
event.add_tag(tag)
|
|
|
|
# objects
|
2022-03-07 14:12:01 +00:00
|
|
|
investigation_objs = investigation.get_objects()
|
|
|
|
for obj in investigation_objs:
|
|
|
|
# if subtype -> obj_id = 'subtype:type'
|
|
|
|
if obj['subtype']:
|
|
|
|
obj_id = f"{obj['subtype']}:{obj['id']}"
|
|
|
|
else:
|
|
|
|
obj_id = obj['id']
|
|
|
|
misp_obj = create_misp_obj(obj['type'], obj_id)
|
|
|
|
if misp_obj:
|
|
|
|
event.add_object(misp_obj)
|
|
|
|
|
|
|
|
# if publish:
|
|
|
|
# event.publish()
|
|
|
|
|
2022-03-11 08:29:48 +00:00
|
|
|
# print(event.to_json())
|
2022-03-07 14:12:01 +00:00
|
|
|
misp = PyMISP(misp_url, misp_key, misp_verifycert)
|
2022-03-11 14:46:29 +00:00
|
|
|
if misp.event_exists(event.uuid):
|
|
|
|
misp_event = misp.update_event(event)
|
|
|
|
else:
|
|
|
|
misp_event = misp.add_event(event)
|
2022-03-07 14:12:01 +00:00
|
|
|
|
|
|
|
# # TODO: handle error
|
|
|
|
event_metadata = extract_event_metadata(misp_event)
|
2022-03-11 14:46:29 +00:00
|
|
|
if event_metadata.get('uuid'):
|
|
|
|
if misp_url[-1] == '/':
|
|
|
|
url = misp_url[:-1]
|
|
|
|
else:
|
|
|
|
url = misp_url
|
|
|
|
investigation.add_misp_events(url)
|
2022-03-07 14:12:01 +00:00
|
|
|
return event_metadata
|
|
|
|
|
|
|
|
# if __name__ == '__main__':
|
2020-01-31 16:01:47 +00:00
|
|
|
|
2022-03-07 14:12:01 +00:00
|
|
|
# l_obj = [{'id': 'bfd5f1d89e55b10a8b122a9d7ce31667ec1d086a', 'type': 'decoded', 'lvl': 2}]
|
|
|
|
# create_list_of_objs_to_export(l_obj)
|
2020-01-31 16:01:47 +00:00
|
|
|
|
|
|
|
#print(event.to_json())
|