mirror of
https://github.com/ail-project/ail-framework.git
synced 2024-11-29 17:27:17 +00:00
fix: [MISP exporter] fix MISP exporter CIRCL/AIL-framework#590
This commit is contained in:
parent
ab7b2bdbab
commit
86b1fda59b
3 changed files with 39 additions and 19 deletions
|
@ -13,7 +13,7 @@ import uuid
|
|||
|
||||
from abc import ABC
|
||||
|
||||
from pymisp import MISPEvent, PyMISP
|
||||
from pymisp import MISPEvent, PyMISP, PyMISPError
|
||||
from urllib3 import disable_warnings as urllib3_disable_warnings
|
||||
|
||||
sys.path.append('../../configs/keys')
|
||||
|
@ -22,9 +22,11 @@ sys.path.append(os.environ['AIL_BIN'])
|
|||
# Import Project packages
|
||||
#################################
|
||||
from exporter.abstract_exporter import AbstractExporter
|
||||
from lib.exceptions import MISPConnectionError
|
||||
from lib.ConfigLoader import ConfigLoader
|
||||
from lib.Investigations import Investigation
|
||||
from lib.objects.abstract_object import AbstractObject
|
||||
from lib.objects import ail_objects
|
||||
|
||||
# from lib.Tracker import Tracker
|
||||
|
||||
|
@ -61,7 +63,7 @@ def delete_user_misp_objects_to_export(user_id):
|
|||
# --- FUNCTIONS --- #
|
||||
|
||||
# MISPExporter -> return correct exporter by type ????
|
||||
class MISPExporter(AbstractExporter, ABC): # <- AbstractMISPExporter ???????
|
||||
class MISPExporter(AbstractExporter, ABC):
|
||||
"""MISP Exporter
|
||||
|
||||
:param url: URL of the MISP instance you want to connect to
|
||||
|
@ -97,7 +99,11 @@ class MISPExporter(AbstractExporter, ABC): # <- AbstractMISPExporter ???????
|
|||
self.ssl = None
|
||||
|
||||
def get_misp(self):
|
||||
return PyMISP(self.url, self.key, self.ssl)
|
||||
try:
|
||||
misp = PyMISP(self.url, self.key, self.ssl)
|
||||
except PyMISPError as e:
|
||||
raise MISPConnectionError(e.message)
|
||||
return misp
|
||||
|
||||
# TODO catch exception
|
||||
def get_misp_uuid(self):
|
||||
|
@ -151,6 +157,9 @@ class MISPExporter(AbstractExporter, ABC): # <- AbstractMISPExporter ???????
|
|||
# TODO EVENT REPORT ???????
|
||||
def create_event(self, objs, export=False, event_uuid=None, date=None, publish=False, info=None, tags=None,
|
||||
analysis=0, distribution=0, threat_level=4):
|
||||
# Test Connection
|
||||
if export:
|
||||
self.get_misp()
|
||||
if tags is None:
|
||||
tags = []
|
||||
event = MISPEvent()
|
||||
|
@ -197,9 +206,9 @@ class MISPExporter(AbstractExporter, ABC): # <- AbstractMISPExporter ???????
|
|||
class MISPExporterAILObjects(MISPExporter):
|
||||
"""MISPExporter AILObjects
|
||||
|
||||
:param url: URL of the MISP instance you want to connect to
|
||||
:param key: API key of the user you want to use
|
||||
:param ssl: can be True or False (to check or to not check the validity of the certificate. Or a CA_BUNDLE in case of self signed or other certificate (the concatenation of all the crt of the chain)
|
||||
:param url: URL of the MISP instance you want to connect to :param key: API key of the user you want to use
|
||||
:param ssl: can be True or False (to check or to not check the validity of the certificate. Or a CA_BUNDLE in
|
||||
case of self signed or other certificate (the concatenation of all the crt of the chain)
|
||||
"""
|
||||
|
||||
def __init__(self, url='', key='', ssl=False):
|
||||
|
@ -222,9 +231,9 @@ class MISPExporterAILObjects(MISPExporter):
|
|||
class MISPExporterInvestigation(MISPExporter):
|
||||
"""MISPExporter Investigation
|
||||
|
||||
:param url: URL of the MISP instance you want to connect to
|
||||
:param key: API key of the user you want to use
|
||||
:param ssl: can be True or False (to check or to not check the validity of the certificate. Or a CA_BUNDLE in case of self signed or other certificate (the concatenation of all the crt of the chain)
|
||||
:param url: URL of the MISP instance you want to connect to :param key: API key of the user you want to use
|
||||
:param ssl: can be True or False (to check or to not check the validity of the certificate. Or a CA_BUNDLE in
|
||||
case of self signed or other certificate (the concatenation of all the crt of the chain)
|
||||
"""
|
||||
|
||||
def __init__(self, url='', key='', ssl=False):
|
||||
|
|
|
@ -1,18 +1,21 @@
|
|||
#!/usr/bin/env python3
|
||||
# -*-coding:UTF-8 -*
|
||||
|
||||
class AIL_ERROR(Exception):
|
||||
"""docstring for AIL_ERROR."""
|
||||
from pymisp import PyMISPError
|
||||
|
||||
class AILError(Exception):
|
||||
def __init__(self, message):
|
||||
super(AIL_ERROR, self).__init__(message)
|
||||
super(AILError, self).__init__(message)
|
||||
self.message = message
|
||||
|
||||
class UpdateInvestigationError(AIL_ERROR):
|
||||
class UpdateInvestigationError(AILError):
|
||||
pass
|
||||
|
||||
class NewTagError(AIL_ERROR):
|
||||
class NewTagError(AILError):
|
||||
pass
|
||||
|
||||
class ModuleQueueError(AIL_ERROR):
|
||||
class ModuleQueueError(AILError):
|
||||
pass
|
||||
|
||||
class MISPConnectionError(AILError):
|
||||
pass
|
||||
|
|
|
@ -23,6 +23,7 @@ sys.path.append(os.environ['AIL_BIN'])
|
|||
##################################
|
||||
from exporter import MISPExporter
|
||||
from exporter import TheHiveExporter
|
||||
from lib.exceptions import MISPConnectionError
|
||||
from lib.objects import ail_objects
|
||||
from lib.Investigations import Investigation
|
||||
|
||||
|
@ -44,6 +45,9 @@ thehive_exporter_item = TheHiveExporter.TheHiveExporterItem()
|
|||
|
||||
# ============ FUNCTIONS ============
|
||||
|
||||
def create_json_response(data, status_code):
|
||||
return Response(json.dumps(data, indent=2, sort_keys=True), mimetype='application/json'), status_code
|
||||
|
||||
|
||||
# ============= ROUTES ==============
|
||||
@import_export.route('/import_export/import')
|
||||
|
@ -151,14 +155,18 @@ def objects_misp_export_post():
|
|||
publish = request.form.get('misp_event_info', False)
|
||||
|
||||
objs = ail_objects.get_objects(objects)
|
||||
try:
|
||||
event = misp_exporter_objects.create_event(objs, distribution=distribution, threat_level=threat_level,
|
||||
analysis=analysis, info=info, export=export, publish=publish)
|
||||
except MISPConnectionError as e:
|
||||
return create_json_response({"error": e.message}, 400)
|
||||
|
||||
MISPExporter.delete_user_misp_objects_to_export(user_id)
|
||||
|
||||
if not export:
|
||||
return send_file(io.BytesIO(event['event'].encode()), as_attachment=True,
|
||||
download_name=f'ail_export_{event["uuid"]}.json')
|
||||
event_uuid = event[10:46]
|
||||
# TODO ADD JAVASCRIPT REFRESH PAGE IF RESP == 200
|
||||
return send_file(io.BytesIO(event.encode()), as_attachment=True,
|
||||
download_name=f'ail_export_{event_uuid}.json')
|
||||
else:
|
||||
object_types = ail_objects.get_all_objects_with_subtypes_tuple()
|
||||
return render_template("export_object.html", object_types=object_types,
|
||||
|
|
Loading…
Reference in a new issue