Rapid7 Threat Command Integration
<div class="condensed-table">
| | |
| --- | --- |
| Version | 2.3.0 (View all) |
| Compatible Kibana version(s) | 8.13.0 or higher |
| Supported Serverless project types
What’s this? | Security |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Partner |
</div>
The Rapid7 Threat Command integration allows users to retrieve IOCs (Indicator of Compromises), organization-specific Threat Command alerts, and CVEs (Common Vulnerabilities and Exposures). Furthermore, the correlation between data collected from the Rapid7 Threat Command platform (IOCs and CVEs) and the user’s environment helps to identify threats. Rapid7 Threat Command platform gives protectors the tools and clarity they need to assess their attack surface, detect suspicious behavior, and respond and remediate quickly with intelligent automation.
The Rapid7 Threat Command integration collects three types of data: ioc, alert, and vulnerability.
IOC uses the REST API to retrieve indicators from the Rapid7 Threat Command platform.
Alert uses the REST API to retrieve alerts from the Rapid7 Threat Command platform.
Vulnerability uses the REST API to retrieve CVEs from the Rapid7 Threat Command platform.
- This integration has been tested against Rapid7 Threat Command
IOC API v2
,Alert API v1
, andVulnerability API v1
. - Rapid7 Threat Command integration is compatible with Elastic stack
v8.12.0
and newer.
You need Elasticsearch for storing and searching your data and Kibana for visualizing and managing it. You can use our hosted Elasticsearch Service on Elastic Cloud, which is recommended, or self-manage the Elastic Stack on your own hardware.
Elastic Agent must be installed. For more information, refer to the link here.
You have a few options for installing and managing an Elastic Agent:
With this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.
With this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.
You can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.
There are some minimum requirements for running Elastic Agent and for more information, refer to the link here.
The minimum kibana.version* required is *8.12.0.
Check the prerequisites for Transforms.
Check the prerequisites for Actions and Connectors.
This setting enforces all active Indicators of Compromise (IOCs) to expire after this duration since their last seen time indicated in the feed. Use Elasticsearch time units in days, hours, or minutes (e.g 10d
). If invalid units are provided, default value 90d
i.e., 90 days is used to expire the indicators. More details on indicator expiration, read Expiration of Indicators of Compromise (IOCs) section.
In order to filter the results based on severity and type, one can make use of IOC Severities* and *IOC Types parameters:
- Allowed values for IOC Severities: High, Medium, Low, PendingEnrichment.
- Allowed values for IOC Types: IpAddresses, Urls, Domains, Hashes, Emails.
In order to filter the results based on severity, type, and status, one can make use of Alert Severities*, Alert Types, *Fetch Closed Alerts parameters:
- Allowed values for Alert Severities: High, Medium, Low.
- Allowed values for Alert Types: AttackIndication, DataLeakage, Phishing, BrandSecurity, ExploitableData, vip.
Individual policies need to be configured to retrieve both Closed* and *Open alerts.
In order to filter the results based on severity, one can make use of the Vulnerability Severities parameter:
- Allowed values for Vulnerability Severities: Critical, High, Medium, Low.
Click on Add row to filter out data using multiple values of the parameter.
If the integration is being upgraded from version ⇐1.16.0 to >=2.0.0, one or more actions in below sections are required for the integration to work.
The integration versions until 1.16.0
added custom security detection rules for storing matching indicators and CVEs from user indices to those ingested from Rapid7 Threat Command integration. These rules are now replaced by one or more of Elastic prebuilt detection rules. Following are the changes:
Rule in <= v1.16.0 |
Replaced by Rule in v2.0.0 |
---|---|
Rapid7 Threat Command IOCs Correlation |
Threat Intel Hash Indicator Match , Threat Intel IP Address Indicator Match , Threat Intel URL Indicator Match , Threat Intel Windows Registry Indicator Match |
Rapid7 Threat Command CVEs Correlation |
Rapid7 Threat Command CVEs Correlation |
After upgrading to 2.0.0
, users are advised to disable and delete old rules to avoid duplicate Security Alerts. Users must also install and enable new rules in their place as documented here.
The integration until version 1.16.0
adds custom indices and Data Views namely rapid7-tc-ioc-correlations
and rapid7-tc-cve-correlations
to store matching indicators and CVEs from user indices with the help of custom rules. Since the custom rules are replaced with Elastic prebuilt rules, these custom views are deleted. Users can view the same matching indicators and CVEs by navigating to Security
→ Alerts
page. Read View Detection Alert for more details.
Some dashboards that depended on above custom views were also removed. These dashboards include IOC Correlation
, IOC Correlation Details
, Vulnerability Correlation
, and Vulnerability Correlation Details
. Users can view these correlations by navigating to the same Security
→ Alerts
page.
This integration versions until 1.16.0
guided users to create custom transforms on datasets IOC
, Alert
, and Vulnerability
with the commands to execute from Kibana Dev Tools. Starting 2.0.0
, the integration replaces them with fleet-managed transforms, which are automatically installed and started after upgrade. Following are the changes:
Transform Name <= v1.16.0 |
Transform Name v2.0.0 |
---|---|
ti_rapid7_threat_command_unique_ioc_transform |
logs-ti_rapid7_threat_command.latest_ioc-default-* |
ti_rapid7_threat_command_ioc_rule_transform |
N/A |
ti_rapid7_threat_command_unique_alert_transform |
logs-ti_rapid7_threat_command.latest_alert-default-* |
ti_rapid7_threat_command_unique_cve_transform |
logs-ti_rapid7_threat_command.latest_vulnerability-default-* |
ti_rapid7_threat_command_cve_rule_transform |
N/A |
In versions <= v1.16.0
, the transforms ti_rapid7_threat_command_ioc_rule_transform
and ti_rapid7_threat_command_cve_rule_transform
were used to index the security alerts generated from the custom rules into custom views. Since both custom rules and custom views are deleted, these transforms are no longer required.
If users are upgrading to any version after 1.16.0
, it is advised to stop and delete all of the transforms used in older versions to avoid duplicate data and Security Alerts.
The threat landscape is always evolving and therefore the IOCs need to update to reflect the current state or expired when the indicators are no longer relevant.
The ingested indicators from the integration are expired after the duration configured by IOC Expiration Duration
integration setting. This setting is required
property and must be set by the users. Refer IOC Expiration Duration section for more details.
The Elastic Transform named logs-ti_rapid7_threat_command.latest_ioc-default-*
is created to faciliate only active IOCs be available to the end users. This transform creates destination indices named logs-ti_rapid7_threat_command_latest.dest_ioc-*
which only contains active and unexpired IOCs. This latest destination index also has an alias named logs-ti_rapid7_threat_command_latest.ioc
. When querying for active indicators or setting up indicator match rules, only use the latest destination indices or the alias to avoid false positives from expired IOCs.
Dashboards are also pointing to the latest destination indices containing only active indicators.
An ILM Policy is added to avoid unbounded growth on source datastream .ds-logs-ti_rapid7_threat_command.ioc-*
indices.
Due to the addition of fleet-managed transforms, ILM policy is also added to IOC
, Alert
, and Vulnerability
datasets so that source datastream-backed indices .ds-logs-ti_rapid7_threat_command.ioc-*
, .ds-logs-ti_rapid7_threat_command.alert-*
, .ds-logs-ti_rapid7_threat_command.vulnerability-*
doesn’t lead to unbounded growth. This means data in these source indices will be deleted based on the ILM policy, which defaults to 5 days
from ingested date.
Source datastream-backed indices | Policy Name | Default Retention |
---|---|---|
.ds-logs-ti_rapid7_threat_command.ioc-* |
logs-ti_rapid7_threat_command.ioc-default_policy | 5 days |
.ds-logs-ti_rapid7_threat_command.alert-* |
logs-ti_rapid7_threat_command.alert-default_policy | 5 days |
.ds-logs-ti_rapid7_threat_command.vulnerability-* |
logs-ti_rapid7_threat_command.vulnerability-default_policy | 5 days |
The ILM policies can be modified as per user needs.
As noted in above sections, there are 5 prebuilt detection rules that are available and need to be added by the users. 4 rules are for matching indicators, while 1 rule is for matching vulnerabilities. Following are the rules:
- Threat Intel Hash Indicator Match.
- Threat Intel IP Address Indicator Match.
- Threat Intel URL Indicator Match.
- Threat Intel Windows Registry Indicator Match.
- Rapid7 Threat Command CVEs Correlation.
- In Kibana, go to Security > Rules > Detection rules (SIEM).
- Click on Add Elastic Rules.
- In the integrations search bar, type and search for each of the 5 rules from above.
- Click on Install rule to install the rule.
- To enable a detection rule, switch on the rule’s Enabled toggle.
- In Kibana, go to Security > Rules > Detection rules (SIEM).
- Under Installed Rules, click on each of the 5 rules from above.
- Click on
Edit rule settings
. - Under Actions tab, choose a connector from the list
Select a connector type
. - Configure the connector.
For more details on Rule Actions, read Rule Actions. For adding Webhook Connector to Rule Actions, read Webhook - Case Management.
- IOC API fetches IOCs within the past six months. Hence, indicators from the most recent six months can be collected.
- For prebuilt Elastic rules, you can not modify most settings. Create a duplicate rule to change any parameter.
If you don’t see any data for IOCs, Alerts, or CVEs, check the Agent logs to see if there are errors.
Common errors:
Module is not included in the ETP Suite subscription. Verify the system modules of your account using below CURL request.
curl -u "<account_id>:<api_key>" https://api.intsights.com/public/v1/account/system-modules
Misconfigured settings, like
Account ID
,Access Key
orfilter parameters
. Verify credentials using below CURL request.curl -u "<account_id>:<api_key>" --head https://api.intsights.com/public/v1/test-credentials
If it gives Non-200 response then regenerate the API key from the IntSights ETP Suite UI from the Subscription page.
If you don’t see any correlation for IOCs or CVEs,
- Check whether transforms are running without any errors. If you face any issues in transforms please refer to Troubleshooting transforms.
- Check whether source indices fields (e.g.
source.ip
,url.full
,vulnerability.id
etc.) are mapped according to the ECS schema.
Retrieves all the related IOCs (Indicator of Compromises) over time.
**Example**
An example event for ioc
looks as following:
{
"@timestamp": "2022-06-16T10:39:07.851Z",
"agent": {
"ephemeral_id": "f8dfeb31-2b56-4f8e-bb91-d4b94b8086da",
"id": "8299ae35-ee0e-4107-9acb-1b6acfdda1fb",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.13.0"
},
"data_stream": {
"dataset": "ti_rapid7_threat_command.ioc",
"namespace": "98425",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "8299ae35-ee0e-4107-9acb-1b6acfdda1fb",
"snapshot": false,
"version": "8.13.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"threat"
],
"created": "2024-08-02T06:09:57.917Z",
"dataset": "ti_rapid7_threat_command.ioc",
"ingested": "2024-08-02T06:10:07Z",
"kind": "enrichment",
"module": "ti_rapid7_threat_command",
"original": "{\"firstSeen\":\"2022-05-04T20:11:04.000Z\",\"lastSeen\":\"2022-06-15T20:11:04.000Z\",\"lastUpdateDate\":\"2022-06-16T10:39:07.851Z\",\"relatedCampaigns\":[],\"relatedMalware\":[\"remcos\"],\"relatedThreatActors\":[],\"reportedFeeds\":[{\"confidenceLevel\":2,\"id\":\"5b68306df84f7c8696047fdd\",\"name\":\"Test Feed\"}],\"score\":13.26086956521739,\"severity\":\"Low\",\"status\":\"Active\",\"tags\":[\"Test\"],\"type\":\"IpAddresses\",\"value\":\"89.160.20.112\",\"whitelisted\":false}",
"risk_score": 13.26087,
"type": [
"indicator"
]
},
"input": {
"type": "httpjson"
},
"rapid7": {
"tc": {
"ioc": {
"deleted_at": "2022-08-05T10:39:07.851Z",
"expiration_duration": "50d",
"first_seen": "2022-05-04T20:11:04.000Z",
"last_seen": "2022-06-15T20:11:04.000Z",
"last_update_date": "2022-06-16T10:39:07.851Z",
"related": {
"malware": [
"remcos"
]
},
"reported_feeds": [
{
"confidence": 2,
"id": "5b68306df84f7c8696047fdd",
"name": "Test Feed"
}
],
"score": 13.26086956521739,
"severity": "Low",
"status": "Active",
"tags": [
"Test"
],
"type": "IpAddresses",
"value": "89.160.20.112",
"whitelisted": "false"
}
}
},
"related": {
"ip": [
"89.160.20.112"
]
},
"tags": [
"preserve_original_event",
"forwarded",
"rapid7-threat-command-ioc",
"Test"
],
"threat": {
"indicator": {
"as": {
"number": 29518,
"organization": {
"name": "Bredband2 AB"
}
},
"confidence": "Low",
"first_seen": "2022-05-04T20:11:04.000Z",
"geo": {
"city_name": "Linköping",
"continent_name": "Europe",
"country_iso_code": "SE",
"country_name": "Sweden",
"location": {
"lat": 58.4167,
"lon": 15.6167
},
"region_iso_code": "SE-E",
"region_name": "Östergötland County"
},
"ip": "89.160.20.112",
"last_seen": "2022-06-15T20:11:04.000Z",
"modified_at": "2022-06-16T10:39:07.851Z",
"name": "89.160.20.112",
"provider": [
"Test Feed"
],
"type": "ipv4-addr"
}
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
labels.is_ioc_transform_source | Indicates whether an IOC is in the raw source data stream, or the in latest destination index. | constant_keyword |
log.offset | Log offset | long |
rapid7.tc.ioc.deleted_at | The timestamp when indicator is (or will be) expired. | date |
rapid7.tc.ioc.expiration_duration | The configured expiration duration. | keyword |
rapid7.tc.ioc.first_seen | IOC first seen date in Unix Millisecond Timestamp. | date |
rapid7.tc.ioc.geolocation | Geographical location of an IP address. | keyword |
rapid7.tc.ioc.last_seen | IOC last seen date in Unix Millisecond Timestamp. | date |
rapid7.tc.ioc.last_update_date | IOC last update date in Unix Millisecond Timestamp. | date |
rapid7.tc.ioc.provider | List of the indicator providers. | keyword |
rapid7.tc.ioc.related.campaigns | List of IOC related campaigns. | keyword |
rapid7.tc.ioc.related.malware | List of IOC related malware families. | keyword |
rapid7.tc.ioc.related.threat_actors | List of IOC related threat actors. | keyword |
rapid7.tc.ioc.reported_feeds.confidence | Confidence level of the reported feed. | double |
rapid7.tc.ioc.reported_feeds.id | ID of the reported feed. | keyword |
rapid7.tc.ioc.reported_feeds.name | Name of the reported feed. | keyword |
rapid7.tc.ioc.score | IOC score between 0 - 100. | double |
rapid7.tc.ioc.severity | IOC severity. Allowed values: High, Medium, Low, PendingEnrichment. | keyword |
rapid7.tc.ioc.status | State of the IOC. Allowed values: Active, Retired. | keyword |
rapid7.tc.ioc.tags | List of IOC tags. | keyword |
rapid7.tc.ioc.type | IOC type. | keyword |
rapid7.tc.ioc.value | IOC value. | keyword |
rapid7.tc.ioc.whitelisted | An indicator which states if the IOC was checked and found as whitelisted or not. | keyword |
threat.indicator.first_seen | The date and time when intelligence source first reported sighting this indicator. | date |
threat.indicator.last_seen | The date and time when intelligence source last reported sighting this indicator. | date |
threat.indicator.modified_at | The date and time when intelligence source last modified information for this indicator. | date |
Retrieves organization-specific Threat Command alerts over time.
**Example**
An example event for alert
looks as following:
{
"@timestamp": "2022-11-02T10:12:46.260Z",
"agent": {
"ephemeral_id": "0a1f430f-ec76-4046-9683-49dd5ebaeab2",
"id": "34592ccf-10ae-4d24-a28c-97be832bde99",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.13.0"
},
"data_stream": {
"dataset": "ti_rapid7_threat_command.alert",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "34592ccf-10ae-4d24-a28c-97be832bde99",
"snapshot": false,
"version": "8.13.0"
},
"event": {
"agent_id_status": "verified",
"created": "2024-06-26T07:01:05.859Z",
"dataset": "ti_rapid7_threat_command.alert",
"id": "123456789zxcvbnmas8a8q60",
"ingested": "2024-06-26T07:01:15Z",
"kind": "alert",
"module": "ti_rapid7_threat_command",
"original": "{\"Assets\":[{\"Type\":\"Domains\",\"Value\":\"example.com\"}],\"Assignees\":[],\"Closed\":{\"IsClosed\":true},\"Details\":{\"Description\":\"A suspicious subdomain 'example.com' was found to have characteristics indicating it may be used to carry out phishing attacks. | Recommendations: It is recommended to block the domain in your URL filtering and mail systems. This can prevent phishing emails being received by your employees and access to websites attempting to steal sensitive information. Click “Remediate” in order to initiate the takedown process for this domain.\",\"Images\":[],\"Severity\":\"Low\",\"Source\":{\"NetworkType\":\"ClearWeb\",\"Type\":\"WHOIS servers\",\"URL\":\"http://example.com\"},\"SubType\":\"RegisteredSuspiciousDomain\",\"Tags\":[{\"CreatedBy\":\"ProfilingRule\",\"Name\":\"Phishing Domain - Default Detection Rule\",\"_id\":\"1al3p6789z6c2b7m9s8a8q60\"}],\"Title\":\"Suspected Phishing Domain - 'example.com'\",\"Type\":\"Phishing\"},\"FoundDate\":\"2022-11-02T10:12:46.260Z\",\"IsFlagged\":false,\"RelatedIocs\":[\"example.com\"],\"RelatedThreatIDs\":[\"6a4e7t9a111bd0003bcc2a55\"],\"TakedownStatus\":\"NotSent\",\"UpdateDate\":\"2022-11-02T10:12:46.260Z\",\"_id\":\"123456789zxcvbnmas8a8q60\"}",
"reference": "https://dashboard.ti.insight.rapid7.com/#/threat-command/alerts/?search=123456789zxcvbnmas8a8q60"
},
"input": {
"type": "httpjson"
},
"rapid7": {
"tc": {
"alert": {
"assets": [
{
"type": "Domains",
"value": "example.com"
}
],
"details": {
"description": "A suspicious subdomain 'example.com' was found to have characteristics indicating it may be used to carry out phishing attacks. | Recommendations: It is recommended to block the domain in your URL filtering and mail systems. This can prevent phishing emails being received by your employees and access to websites attempting to steal sensitive information. Click “Remediate” in order to initiate the takedown process for this domain.",
"severity": "Low",
"source": {
"network_type": "ClearWeb",
"type": "WHOIS servers",
"url": "http://example.com"
},
"subtype": "RegisteredSuspiciousDomain",
"tags": [
{
"created_by": "ProfilingRule",
"id": "1al3p6789z6c2b7m9s8a8q60",
"name": "Phishing Domain - Default Detection Rule"
}
],
"title": "Suspected Phishing Domain - 'example.com'",
"type": "Phishing"
},
"found_date": "2022-11-02T10:12:46.260Z",
"id": "123456789zxcvbnmas8a8q60",
"is_closed": true,
"is_flagged": false,
"related_iocs": [
"example.com"
],
"related_threat_ids": [
"6a4e7t9a111bd0003bcc2a55"
],
"takedown_status": "NotSent",
"update_date": "2022-11-02T10:12:46.260Z"
}
}
},
"tags": [
"preserve_original_event",
"forwarded",
"rapid7-threat-command-alert",
"Phishing Domain - Default Detection Rule"
]
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
rapid7.tc.alert.assets.type | Type of an asset. | keyword |
rapid7.tc.alert.assets.value | Value of an asset. | keyword |
rapid7.tc.alert.assignees | List of assignees. | keyword |
rapid7.tc.alert.details.description | Description of an alert. | keyword |
rapid7.tc.alert.details.images | List of alert images. | keyword |
rapid7.tc.alert.details.severity | Alert severity. Allowed values: High, Medium, Low. | keyword |
rapid7.tc.alert.details.source.date | Source date of an alert in Unix Millisecond Timestamp. | date |
rapid7.tc.alert.details.source.email | Source email. | keyword |
rapid7.tc.alert.details.source.leak_name | Name of the leak DBs in data leakage alerts. | keyword |
rapid7.tc.alert.details.source.network_type | Source network type. Allowed values: ClearWeb, DarkWeb. | keyword |
rapid7.tc.alert.details.source.type | Alert’s source type. Allowed values: ApplicationStores, BlackMarkets, HackingForums, SocialMedia, PasteSites, Others. | keyword |
rapid7.tc.alert.details.source.url | Source url. | keyword |
rapid7.tc.alert.details.subtype | Subtype of an alert. | keyword |
rapid7.tc.alert.details.tags.created_by | Name of the person who created the tag. | keyword |
rapid7.tc.alert.details.tags.id | Unique ID of the tag. | keyword |
rapid7.tc.alert.details.tags.name | Value of tag. | keyword |
rapid7.tc.alert.details.title | Title of an alert. | keyword |
rapid7.tc.alert.details.type | Type of an alert. Allowed values: AttackIndication, DataLeakage, Phishing, BrandSecurity, ExploitableData, vip. | keyword |
rapid7.tc.alert.found_date | Found date of an alert in Unix Millisecond Timestamp. | date |
rapid7.tc.alert.id | Unique ID of an alert. | keyword |
rapid7.tc.alert.is_closed | If true, the alert is closed. | boolean |
rapid7.tc.alert.is_flagged | If true, the alert is flagged. | boolean |
rapid7.tc.alert.related_iocs | List of related IOCs. | keyword |
rapid7.tc.alert.related_threat_ids | List of related threat IDs. | keyword |
rapid7.tc.alert.takedown_status | Alert remediation status. | keyword |
rapid7.tc.alert.update_date | Last update date of an alert in Unix Millisecond Timestamp. | date |
Retrieves CVEs (Common Vulnerabilities and Exposures) over time.
**Example**
An example event for vulnerability
looks as following:
{
"@timestamp": "2020-08-24T21:46:48.619Z",
"agent": {
"ephemeral_id": "98178c63-7de1-4041-877c-bf829b4fc0d3",
"id": "34592ccf-10ae-4d24-a28c-97be832bde99",
"name": "docker-fleet-agent",
"type": "filebeat",
"version": "8.13.0"
},
"data_stream": {
"dataset": "ti_rapid7_threat_command.vulnerability",
"namespace": "ep",
"type": "logs"
},
"ecs": {
"version": "8.11.0"
},
"elastic_agent": {
"id": "34592ccf-10ae-4d24-a28c-97be832bde99",
"snapshot": false,
"version": "8.13.0"
},
"event": {
"agent_id_status": "verified",
"category": [
"threat",
"vulnerability"
],
"created": "2024-06-26T07:02:37.947Z",
"dataset": "ti_rapid7_threat_command.vulnerability",
"ingested": "2024-06-26T07:02:49Z",
"kind": "event",
"module": "ti_rapid7_threat_command",
"original": "{\"cpe\":[{\"Range\":{\"VersionEndExcluding\":\"\",\"VersionEndIncluding\":\"4.0.0\",\"VersionStartExcluding\":\"\",\"VersionStartIncluding\":\"1.0.0\"},\"Title\":\"Php\",\"Value\":\"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*\",\"VendorProduct\":\"php php\"}],\"cveId\":\"CVE-2020-7064\",\"cvssScore\":5.4,\"exploitAvailability\":false,\"firstMentionDate\":\"N/A\",\"intsightsScore\":16,\"lastMentionDate\":\"2020-04-01T04:15:00.000Z\",\"mentionsAmount\":0,\"mentionsPerSource\":{\"ClearWebCyberBlogs\":0,\"CodeRepositories\":0,\"DarkWeb\":0,\"Exploit\":0,\"HackingForum\":0,\"InstantMessage\":0,\"PasteSite\":0,\"SocialMedia\":0},\"publishedDate\":\"2020-04-01T04:15:00.000Z\",\"relatedCampaigns\":[\"SolarWinds\"],\"relatedMalware\":[\"doppeldridex\",\"dridex\"],\"relatedThreatActors\":[\"doppelspider\"],\"severity\":\"Low\",\"updateDate\":\"2020-08-24T21:46:48.619Z\",\"vulnerabilityOrigin\":[\"Qualys\"]}",
"type": [
"indicator"
]
},
"input": {
"type": "httpjson"
},
"rapid7": {
"tc": {
"vulnerability": {
"cpe": [
{
"range": {
"version": {
"end": {
"including": "4.0.0"
},
"start": {
"including": "1.0.0"
}
}
},
"title": "Php",
"value": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"vendor_product": "php php"
}
],
"cvss_score": 5.4,
"exploit_availability": false,
"id": "CVE-2020-7064",
"intsights_score": 16,
"mention": {
"first_date": "N/A",
"last_date": "2020-04-01T04:15:00.000Z"
},
"mentions": {
"source": {
"clear_web_cyber_blogs": 0,
"code_repositories": 0,
"dark_web": 0,
"exploit": 0,
"hacking_forum": 0,
"instant_message": 0,
"paste_site": 0,
"social_media": 0
},
"total": 0
},
"origin": [
"Qualys"
],
"published_date": "2020-04-01T04:15:00.000Z",
"related": {
"campaigns": [
"SolarWinds"
],
"malware": [
"doppeldridex",
"dridex"
],
"threat_actors": [
"doppelspider"
]
},
"severity": "Low",
"update_date": "2020-08-24T21:46:48.619Z"
}
}
},
"tags": [
"preserve_original_event",
"forwarded",
"rapid7-threat-command-vulnerability"
],
"vulnerability": {
"classification": "CVSS",
"enumeration": "CVE",
"id": "CVE-2020-7064",
"reference": "https://dashboard.ti.insight.rapid7.com/#/risk-analyzer/vulnerabilities?search=CVE-2020-7064",
"scanner": {
"vendor": "Rapid7"
},
"score": {
"base": 5.4
},
"severity": "Low"
}
}
**Exported fields**
Field | Description | Type |
---|---|---|
@timestamp | Event timestamp. | date |
cloud.image.id | Image ID for the cloud instance. | keyword |
data_stream.dataset | Data stream dataset. | constant_keyword |
data_stream.namespace | Data stream namespace. | constant_keyword |
data_stream.type | Data stream type. | constant_keyword |
host.containerized | If the host is a container. | boolean |
host.os.build | OS build information. | keyword |
host.os.codename | OS codename, if any. | keyword |
input.type | Input type | keyword |
log.offset | Log offset | long |
rapid7.tc.vulnerability.cpe.range.version.end.excluding | The CPE version end range. | version |
rapid7.tc.vulnerability.cpe.range.version.end.including | The CPE version end range. | version |
rapid7.tc.vulnerability.cpe.range.version.start.excluding | The CPE version start range. | version |
rapid7.tc.vulnerability.cpe.range.version.start.including | The CPE version start range. | version |
rapid7.tc.vulnerability.cpe.title | Title of CPE. | keyword |
rapid7.tc.vulnerability.cpe.value | Value of CPE. | keyword |
rapid7.tc.vulnerability.cpe.vendor_product | Vendor and Product of CPE. | keyword |
rapid7.tc.vulnerability.cvss_score | The severity score from NVD. | double |
rapid7.tc.vulnerability.exploit_availability | If true, exploit is available for this CVE. | boolean |
rapid7.tc.vulnerability.id | Unique ID of a CVE. | keyword |
rapid7.tc.vulnerability.intsights_score | The severity score from Rapid7 Threat Command. | double |
rapid7.tc.vulnerability.mention.first_date | CVE’s first mention date. | keyword |
rapid7.tc.vulnerability.mention.last_date | CVE’s last mention date. | keyword |
rapid7.tc.vulnerability.mentions.source.clear_web_cyber_blogs | The number of times a CVE is mentioned by ClearWebCyberBlogs. | long |
rapid7.tc.vulnerability.mentions.source.code_repositories | The number of times a CVE is mentioned by CodeRepositories. | long |
rapid7.tc.vulnerability.mentions.source.dark_web | The number of times a CVE is mentioned by DarkWeb. | long |
rapid7.tc.vulnerability.mentions.source.exploit | The number of times a CVE is mentioned by Exploit. | long |
rapid7.tc.vulnerability.mentions.source.hacking_forum | The number of times a CVE is mentioned by HackingForum. | long |
rapid7.tc.vulnerability.mentions.source.instant_message | The number of times a CVE is mentioned by InstantMessage. | long |
rapid7.tc.vulnerability.mentions.source.paste_site | The number of times a CVE is mentioned by PasteSite. | long |
rapid7.tc.vulnerability.mentions.source.social_media | The number of times a CVE is mentioned by SocialMedia. | long |
rapid7.tc.vulnerability.mentions.total | The number of times a CVE is mentioned across all sources. | long |
rapid7.tc.vulnerability.origin | The origin of vulnerability. | keyword |
rapid7.tc.vulnerability.published_date | CVE’s publish date in ISO 8601 format. | date |
rapid7.tc.vulnerability.related.campaigns | List of related threat campaigns. | keyword |
rapid7.tc.vulnerability.related.malware | List of related malware. | keyword |
rapid7.tc.vulnerability.related.threat_actors | List of related threat actors. | keyword |
rapid7.tc.vulnerability.severity | CVE severity. Allowed values: Critical, High, Medium, Low. | keyword |
rapid7.tc.vulnerability.update_date | CVE’s update date in ISO 8601 format. | date |
**Changelog**
Version | Details | Kibana version(s) |
---|---|---|
2.3.0 | pass:[] Enhancement (View pull request) Add "preserve_original_event" tag to documents with event.kind manually set to "pipeline_error". |
8.13.0 or higher |
2.2.1 | pass:[] Bug fix (View pull request) Update link in the Rapid7 Threat Command Integration. |
8.13.0 or higher |
2.2.0 | pass:[] Enhancement (View pull request) Do not remove event.original in main ingest pipeline. |
8.13.0 or higher |
2.1.0 | pass:[] Enhancement (View pull request) Add "preserve_original_event" tag to documents with event.kind set to "pipeline_error". |
8.13.0 or higher |
2.0.3 | pass:[] Bug fix (View pull request) Fix labels.is_ioc_transform_source values |
8.13.0 or higher |
2.0.2 | pass:[] Bug fix (View pull request) Add missing fields in transform |
8.13.0 or higher |
2.0.1 | pass:[] Bug fix (View pull request) Fix ECS date mapping on threat fields. |
8.13.0 or higher |
2.0.0 | pass:[] Enhancement (View pull request) Add support for IOC expiration |
8.13.0 or higher |
1.17.0 | pass:[] Enhancement (View pull request) Update the kibana constraint to ^8.13.0. Modified the field definitions to remove ECS fields made redundant by the ecs@mappings component template. |
8.13.0 or higher |
1.16.0 | pass:[] Enhancement (View pull request) Improve handling of empty responses. |
8.12.0 or higher |
1.15.0 | pass:[] Enhancement (View pull request) Set sensitive values as secret. |
8.12.0 or higher |
1.14.1 | pass:[] Enhancement (View pull request) Changed owners |
8.7.1 or higher |
1.14.0 | pass:[] Enhancement (View pull request) Limit request tracer log count to five. |
8.7.1 or higher |
1.13.0 | pass:[] Enhancement (View pull request) ECS version updated to 8.11.0. |
8.7.1 or higher |
1.12.0 | pass:[] Enhancement (View pull request) Improve event.original check to avoid errors if set. |
8.7.1 or higher |
1.11.1 | pass:[] Bug fix (View pull request) Fix required stack capabilities |
8.7.1 or higher |
1.11.0 | pass:[] Enhancement (View pull request) Set partner owner type. |
— |
1.10.0 | pass:[] Enhancement (View pull request) Update format version to 3.0.0. Add owner.type to package manifest. pass:[] Bug fix (View pull request) Change the ECS event.type value from info to indicator for the vulnerability data stream. pass:[] Bug fix (View pull request) Update indicator rules with predefined indices instead of all |
— |
1.9.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.10.0 and align ECS categorization fields. |
8.7.1 or higher |
1.8.0 | pass:[] Enhancement (View pull request) Add tags.yml file so that integration’s dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI. |
8.7.1 or higher |
1.7.0 | pass:[] Enhancement (View pull request) Update package-spec to 2.10.0. |
8.7.1 or higher |
1.6.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.9.0. |
8.7.1 or higher |
1.5.0 | pass:[] Enhancement (View pull request) Convert visualizations to lens. |
8.7.1 or higher |
1.4.0 | pass:[] Enhancement (View pull request) Ensure event.kind is correctly set for pipeline errors. |
8.7.1 or higher |
1.3.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.8.0. |
8.7.1 or higher |
1.2.0 | pass:[] Enhancement (View pull request) Add a new flag to enable request tracing |
8.7.1 or higher |
1.1.0 | pass:[] Enhancement (View pull request) Update package to ECS 8.7.0. |
8.4.0 or higher |
1.0.0 | pass:[] Enhancement (View pull request) Release Rapid7 Threat Command as GA. |
8.4.0 or higher |
0.1.0 | pass:[] Enhancement (View pull request) Initial draft for Rapid7 Threat Command integration along with "IOC", "Alert" and "Vulnerability" data stream and detection rule to correlate IOCs and Vulnerabilities against the user data. |
— |