Skip to content

Commit d24707e

Browse files
authored
[Abuse CH] Add Threat Fox Datastream (#3962)
Add Threat Fox Datastream to Abuse CH Integration.
1 parent 0be4c6d commit d24707e

File tree

22 files changed

+4573
-33
lines changed

22 files changed

+4573
-33
lines changed

packages/ti_abusech/_dev/build/docs/README.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,4 +20,8 @@ The AbuseCH malware data_stream retrieves threat intelligence indicators from th
2020

2121
The AbuseCH malwarebazaar data_stream retrieves threat intelligence indicators from the MalwareBazaar API endpoint `https://mb-api.abuse.ch/api/v1/`.
2222

23-
{{fields "malwarebazaar"}}
23+
{{fields "malwarebazaar"}}
24+
25+
The AbuseCH threatfox data_stream retrieves threat intelligence indicators from the Threat Fox API endpoint `https://threatfox-api.abuse.ch/api/v1/`.
26+
27+
{{fields "threatfox"}}

packages/ti_abusech/_dev/deploy/docker/docker-compose.yml

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
version: "2.3"
22
services:
33
abusech:
4-
image: docker.elastic.co/observability/stream:v0.6.1
4+
image: docker.elastic.co/observability/stream:v0.7.0
55
ports:
66
- 8080
77
volumes:
@@ -12,3 +12,15 @@ services:
1212
- http-server
1313
- --addr=:8080
1414
- --config=/files/config.yml
15+
abusech-threatfox:
16+
image: docker.elastic.co/observability/stream:v0.7.0
17+
ports:
18+
- 8081
19+
volumes:
20+
- ./files:/files:ro
21+
environment:
22+
PORT: 8081
23+
command:
24+
- http-server
25+
- --addr=:8081
26+
- --config=/files/config-threatfox.yml
Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,17 @@
1+
rules:
2+
- path: /api/v1/
3+
methods: ["POST"]
4+
request_headers:
5+
Content-Type: "application/json"
6+
body:
7+
query: "get_iocs"
8+
responses:
9+
- status_code: 200
10+
body: |-
11+
{
12+
"query_status": "ok",
13+
"data": [
14+
{"id":"841537","ioc":"wizzy.hopto.org","threat_type":"botnet_cc","threat_type_desc":"Indicator that identifies a botnet command&control server (C&C)","ioc_type":"domain","ioc_type_desc":"Domain that is used for botnet Command&control (C&C)","malware":"win.asyncrat","malware_printable":"AsyncRAT","malware_alias":null,"malware_malpedia":"https://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat","confidence_level":100,"first_seen":"2022-08-05 19:43:08 UTC","last_seen":null,"reference":"https://tria.ge/220805-w57pxsgae2","reporter":"AndreGironda","tags":["asyncrat"]},
15+
{"id":"839586","ioc":"872ff530d50579ae6bdc7cb4d658324b1d0e7a3e","threat_type":"payload","threat_type_desc":"Indicator that identifies a malware sample (payload)","ioc_type":"sha1_hash","ioc_type_desc":"SHA1 hash of a malware sample (payload)","malware":"win.vidar","malware_printable":"Vidar","malware_alias":null,"malware_malpedia":"https://malpedia.caad.fkie.fraunhofer.de/details/win.vidar","confidence_level":75,"first_seen":"2022-07-25 22:27:09 UTC","last_seen":null,"reference":"","reporter":"crep1x","tags":["Vidar"]}
16+
]
17+
}

packages/ti_abusech/changelog.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,9 @@
11
# newer versions go on top
2+
- version: "1.7.0"
3+
changes:
4+
- description: Add Threat Fox datastream
5+
type: enhancement
6+
link: https://github.com/elastic/integrations/pull/3962
27
- version: "1.6.0"
38
changes:
49
- description: Update package to ECS 8.4.0

packages/ti_abusech/data_stream/malware/sample_event.json

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,34 +1,34 @@
11
{
2-
"@timestamp": "2022-04-11T08:43:51.252Z",
2+
"@timestamp": "2022-08-06T00:06:27.079Z",
33
"abusech": {
44
"malware": {}
55
},
66
"agent": {
7-
"ephemeral_id": "3c096aaa-3fd9-4560-87fe-375b99890402",
8-
"id": "0cd371ed-8f03-437b-909d-8daccf9843fc",
7+
"ephemeral_id": "1760e1ca-6974-4a32-80c6-0e7e58a6d573",
8+
"id": "87d4d8f8-b034-42ba-a5bb-33ff670e619e",
99
"name": "docker-fleet-agent",
1010
"type": "filebeat",
11-
"version": "8.0.0"
11+
"version": "8.3.0"
1212
},
1313
"data_stream": {
1414
"dataset": "ti_abusech.malware",
1515
"namespace": "ep",
1616
"type": "logs"
1717
},
1818
"ecs": {
19-
"version": "8.3.0"
19+
"version": "8.4.0"
2020
},
2121
"elastic_agent": {
22-
"id": "0cd371ed-8f03-437b-909d-8daccf9843fc",
22+
"id": "87d4d8f8-b034-42ba-a5bb-33ff670e619e",
2323
"snapshot": false,
24-
"version": "8.0.0"
24+
"version": "8.3.0"
2525
},
2626
"event": {
2727
"agent_id_status": "verified",
2828
"category": "threat",
29-
"created": "2022-04-11T08:43:51.252Z",
29+
"created": "2022-08-06T00:06:27.079Z",
3030
"dataset": "ti_abusech.malware",
31-
"ingested": "2022-04-11T08:43:52Z",
31+
"ingested": "2022-08-06T00:06:30Z",
3232
"kind": "enrichment",
3333
"original": "{\"file_size\":\"1563\",\"file_type\":\"unknown\",\"firstseen\":\"2021-10-05 04:17:02\",\"imphash\":null,\"md5_hash\":\"9cd5a4f0231a47823c4adba7c8ef370f\",\"sha256_hash\":\"7c0852d514df7faf8fdbfa4f358cc235dd1b1a2d843cc65495d03b502e4099f2\",\"signature\":null,\"ssdeep\":\"48:yazkS7neW+mfe4CJjNXcq5Co4Fr1PpsHn:yrmGNt5mbP2n\",\"tlsh\":\"T109314C5E7822CA70B91AD69300C22D8C2F53EAF229E6686C3BDD4C86FA1344208CF1\",\"urlhaus_download\":\"https://urlhaus-api.abuse.ch/v1/download/7c0852d514df7faf8fdbfa4f358cc235dd1b1a2d843cc65495d03b502e4099f2/\",\"virustotal\":null}",
3434
"type": "indicator"

packages/ti_abusech/data_stream/malwarebazaar/sample_event.json

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"@timestamp": "2022-04-11T08:44:21.828Z",
2+
"@timestamp": "2022-08-06T00:08:33.562Z",
33
"abusech": {
44
"malwarebazaar": {
55
"anonymous": 0,
@@ -15,31 +15,31 @@
1515
}
1616
},
1717
"agent": {
18-
"ephemeral_id": "15657330-8e8b-49be-b82d-529320d9c53c",
19-
"id": "0cd371ed-8f03-437b-909d-8daccf9843fc",
18+
"ephemeral_id": "7d65c47e-ccda-4f97-9896-6118ffb92a61",
19+
"id": "87d4d8f8-b034-42ba-a5bb-33ff670e619e",
2020
"name": "docker-fleet-agent",
2121
"type": "filebeat",
22-
"version": "8.0.0"
22+
"version": "8.3.0"
2323
},
2424
"data_stream": {
2525
"dataset": "ti_abusech.malwarebazaar",
2626
"namespace": "ep",
2727
"type": "logs"
2828
},
2929
"ecs": {
30-
"version": "8.3.0"
30+
"version": "8.4.0"
3131
},
3232
"elastic_agent": {
33-
"id": "0cd371ed-8f03-437b-909d-8daccf9843fc",
33+
"id": "87d4d8f8-b034-42ba-a5bb-33ff670e619e",
3434
"snapshot": false,
35-
"version": "8.0.0"
35+
"version": "8.3.0"
3636
},
3737
"event": {
3838
"agent_id_status": "verified",
3939
"category": "threat",
40-
"created": "2022-04-11T08:44:21.828Z",
40+
"created": "2022-08-06T00:08:33.562Z",
4141
"dataset": "ti_abusech.malwarebazaar",
42-
"ingested": "2022-04-11T08:44:22Z",
42+
"ingested": "2022-08-06T00:08:36Z",
4343
"kind": "enrichment",
4444
"original": "{\"anonymous\":0,\"code_sign\":[],\"dhash_icon\":null,\"file_name\":\"7a6c03013a2f2ab8b9e8e7e5d226ea89e75da72c1519e.exe\",\"file_size\":432640,\"file_type\":\"exe\",\"file_type_mime\":\"application/x-dosexec\",\"first_seen\":\"2021-10-05 14:02:45\",\"imphash\":\"f34d5f2d4577ed6d9ceec516c1f5a744\",\"intelligence\":{\"clamav\":null,\"downloads\":\"11\",\"mail\":null,\"uploads\":\"1\"},\"last_seen\":null,\"md5_hash\":\"1fc1c2997c8f55ac10496b88e23f5320\",\"origin_country\":\"FR\",\"reporter\":\"abuse_ch\",\"sha1_hash\":\"42c7153680d7402e56fe022d1024aab49a9901a0\",\"sha256_hash\":\"7a6c03013a2f2ab8b9e8e7e5d226ea89e75da72c1519e78fd28b2253ea755c28\",\"sha3_384_hash\":\"d63e73b68973bc73ab559549aeee2141a48b8a3724aabc0d81fb14603c163a098a5a10be9f6d33b888602906c0d89955\",\"signature\":\"RedLineStealer\",\"ssdeep\":\"12288:jhhl1Eo+iEXvpb1C7drqAd1uUaJvzXGyO2F5V3bS1jsTacr:7lL\",\"tags\":[\"exe\",\"RedLineStealer\"],\"telfhash\":null,\"tlsh\":\"T13794242864BFC05994E3EEA12DDCA8FBD99A55E3640C743301B4633B8B52B84DE4F479\"}",
4545
"type": "indicator"
Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
fields:
2+
tags:
3+
- preserve_original_event

0 commit comments

Comments
 (0)