Rapid7 Threat Command Integration
editRapid7 Threat Command Integration
editVersion |
2.3.0 (View all) |
Compatible Kibana version(s) |
8.13.0 or higher |
Supported Serverless project types |
Security |
Subscription level |
Basic |
Level of support |
Partner |
Overview
editThe Rapid7 Threat Command integration allows users to retrieve IOCs (Indicator of Compromises), organization-specific Threat Command alerts, and CVEs (Common Vulnerabilities and Exposures). Furthermore, the correlation between data collected from the Rapid7 Threat Command platform (IOCs and CVEs) and the user’s environment helps to identify threats. Rapid7 Threat Command platform gives protectors the tools and clarity they need to assess their attack surface, detect suspicious behavior, and respond and remediate quickly with intelligent automation.
Data streams
editThe Rapid7 Threat Command integration collects three types of data: ioc, alert, and vulnerability.
IOC uses the REST API to retrieve indicators from the Rapid7 Threat Command platform.
Alert uses the REST API to retrieve alerts from the Rapid7 Threat Command platform.
Vulnerability uses the REST API to retrieve CVEs from the Rapid7 Threat Command platform.
Compatibility
edit-
This integration has been tested against Rapid7 Threat Command
IOC API v2
,Alert API v1
, andVulnerability API v1
. -
Rapid7 Threat Command integration is compatible with Elastic stack
v8.12.0
and newer.
Requirements
editElasticsearch
editYou need Elasticsearch for storing and searching your data and Kibana for visualizing and managing it. You can use our hosted Elasticsearch Service on Elastic Cloud, which is recommended, or self-manage the Elastic Stack on your own hardware.
Elastic Agent
editElastic Agent must be installed. For more information, refer to the link here.
You have a few options for installing and managing an Elastic Agent:
Install a Fleet-managed Elastic Agent (recommended):
editWith this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.
Install Elastic Agent in standalone mode (advanced users):
editWith this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.
Install Elastic Agent in a containerized environment:
editYou can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.
There are some minimum requirements for running Elastic Agent and for more information, refer to the link here.
Other prerequisites
editThe minimum kibana.version required is 8.12.0.
Check the prerequisites for Transforms.
Check the prerequisites for Actions and Connectors.
Setup
editIntegration settings
editIOC Expiration Duration
editThis setting enforces all active Indicators of Compromise (IOCs) to expire after this duration since their last seen time indicated in the feed. Use Elasticsearch time units in days, hours, or minutes (e.g 10d
). If invalid units are provided, default value 90d
i.e., 90 days is used to expire the indicators. More details on indicator expiration, read Expiration of Indicators of Compromise (IOCs) section.
Filtering IOCs
editIn order to filter the results based on severity and type, one can make use of IOC Severities and IOC Types parameters:
- Allowed values for IOC Severities: High, Medium, Low, PendingEnrichment.
- Allowed values for IOC Types: IpAddresses, Urls, Domains, Hashes, Emails.
Filtering Alerts
editIn order to filter the results based on severity, type, and status, one can make use of Alert Severities, Alert Types, Fetch Closed Alerts parameters:
- Allowed values for Alert Severities: High, Medium, Low.
- Allowed values for Alert Types: AttackIndication, DataLeakage, Phishing, BrandSecurity, ExploitableData, vip.
Individual policies need to be configured to retrieve both Closed and Open alerts.
Filtering Vulnerabilities
editIn order to filter the results based on severity, one can make use of the Vulnerability Severities parameter:
- Allowed values for Vulnerability Severities: Critical, High, Medium, Low.
Click on Add row to filter out data using multiple values of the parameter.
Major changes after integration version 1.16.0
editIf the integration is being upgraded from version ⇐1.16.0 to >=2.0.0, one or more actions in below sections are required for the integration to work.
Removal of custom rules
editThe integration versions until 1.16.0
added custom security detection rules for storing matching indicators and CVEs from user indices to those ingested from Rapid7 Threat Command integration. These rules are now replaced by one or more of Elastic prebuilt detection rules. Following are the changes:
Rule in <= v1.16.0 |
Replaced by Rule in v2.0.0 |
---|---|
|
|
|
|
After upgrading to 2.0.0
, users are advised to disable and delete old rules to avoid duplicate Security Alerts. Users must also install and enable new rules in their place as documented here.
Removal of custom views and dashboards
editThe integration until version 1.16.0
adds custom indices and Data Views namely rapid7-tc-ioc-correlations
and rapid7-tc-cve-correlations
to store matching indicators and CVEs from user indices with the help of custom rules. Since the custom rules are replaced with Elastic prebuilt rules, these custom views are deleted. Users can view the same matching indicators and CVEs by navigating to Security
→ Alerts
page. Read View Detection Alert for more details.
Some dashboards that depended on above custom views were also removed. These dashboards include IOC Correlation
, IOC Correlation Details
, Vulnerability Correlation
, and Vulnerability Correlation Details
. Users can view these correlations by navigating to the same Security
→ Alerts
page.
Removal of custom transforms
editThis integration versions until 1.16.0
guided users to create custom transforms on datasets IOC
, Alert
, and Vulnerability
with the commands to execute from Kibana Dev Tools. Starting 2.0.0
, the integration replaces them with fleet-managed transforms, which are automatically installed and started after upgrade. Following are the changes:
Transform Name <= v1.16.0 |
Transform Name v2.0.0 |
---|---|
|
|
|
|
|
|
|
|
|
|
In versions <= v1.16.0
, the transforms ti_rapid7_threat_command_ioc_rule_transform
and ti_rapid7_threat_command_cve_rule_transform
were used to index the security alerts generated from the custom rules into custom views. Since both custom rules and custom views are deleted, these transforms are no longer required.
If users are upgrading to any version after 1.16.0
, it is advised to stop and delete all of the transforms used in older versions to avoid duplicate data and Security Alerts.
Expiration of Indicators of Compromise (IOCs)
editThe threat landscape is always evolving and therefore the IOCs need to update to reflect the current state or expired when the indicators are no longer relevant.
The ingested indicators from the integration are expired after the duration configured by IOC Expiration Duration
integration setting. This setting is required
property and must be set by the users. Refer IOC Expiration Duration section for more details.
The Elastic Transform named logs-ti_rapid7_threat_command.latest_ioc-default-*
is created to faciliate only active IOCs be available to the end users. This transform creates destination indices named logs-ti_rapid7_threat_command_latest.dest_ioc-*
which only contains active and unexpired IOCs. This latest destination index also has an alias named logs-ti_rapid7_threat_command_latest.ioc
. When querying for active indicators or setting up indicator match rules, only use the latest destination indices or the alias to avoid false positives from expired IOCs.
Dashboards are also pointing to the latest destination indices containing only active indicators.
An ILM Policy is added to avoid unbounded growth on source datastream .ds-logs-ti_rapid7_threat_command.ioc-*
indices.
ILM Policy
editDue to the addition of fleet-managed transforms, ILM policy is also added to IOC
, Alert
, and Vulnerability
datasets so that source datastream-backed indices .ds-logs-ti_rapid7_threat_command.ioc-*
, .ds-logs-ti_rapid7_threat_command.alert-*
, .ds-logs-ti_rapid7_threat_command.vulnerability-*
doesn’t lead to unbounded growth. This means data in these source indices will be deleted based on the ILM policy, which defaults to 5 days
from ingested date.
Source datastream-backed indices | Policy Name | Default Retention |
---|---|---|
|
logs-ti_rapid7_threat_command.ioc-default_policy |
5 days |
|
logs-ti_rapid7_threat_command.alert-default_policy |
5 days |
|
logs-ti_rapid7_threat_command.vulnerability-default_policy |
5 days |
The ILM policies can be modified as per user needs.
Detection Rules
editAs noted in above sections, there are 5 prebuilt detection rules that are available and need to be added by the users. 4 rules are for matching indicators, while 1 rule is for matching vulnerabilities. Following are the rules:
- Threat Intel Hash Indicator Match.
- Threat Intel IP Address Indicator Match.
- Threat Intel URL Indicator Match.
- Threat Intel Windows Registry Indicator Match.
- Rapid7 Threat Command CVEs Correlation.
Install and Enable Detection Rule in Elasticsearch
edit- In Kibana, go to Security > Rules > Detection rules (SIEM).
- Click on Add Elastic Rules.
- In the integrations search bar, type and search for each of the 5 rules from above.
- Click on Install rule to install the rule.
- To enable a detection rule, switch on the rule’s Enabled toggle.
Add Connectors for rules
edit- In Kibana, go to Security > Rules > Detection rules (SIEM).
- Under Installed Rules, click on each of the 5 rules from above.
-
Click on
Edit rule settings
. -
Under Actions tab, choose a connector from the list
Select a connector type
. - Configure the connector.
For more details on Rule Actions, read Rule Actions. For adding Webhook Connector to Rule Actions, read Webhook - Case Management.
Limitations
edit- IOC API fetches IOCs within the past six months. Hence, indicators from the most recent six months can be collected.
- For prebuilt Elastic rules, you can not modify most settings. Create a duplicate rule to change any parameter.
Troubleshooting
edit-
If you don’t see any data for IOCs, Alerts, or CVEs, check the Agent logs to see if there are errors.
Common errors:
-
Module is not included in the ETP Suite subscription. Verify the system modules of your account using below CURL request.
curl -u "<account_id>:<api_key>" https://api.intsights.com/public/v1/account/system-modules
-
Misconfigured settings, like
Account ID
,Access Key
orfilter parameters
. Verify credentials using below CURL request.curl -u "<account_id>:<api_key>" --head https://api.intsights.com/public/v1/test-credentials
If it gives Non-200 response then regenerate the API key from the IntSights ETP Suite UI from the Subscription page.
-
-
If you don’t see any correlation for IOCs or CVEs,
- Check whether transforms are running without any errors. If you face any issues in transforms please refer to Troubleshooting transforms.
-
Check whether source indices fields (e.g.
source.ip
,url.full
,vulnerability.id
etc.) are mapped according to the ECS schema.
Logs reference
editIOC
editRetrieves all the related IOCs (Indicator of Compromises) over time.
Example
An example event for ioc
looks as following:
{ "@timestamp": "2022-06-16T10:39:07.851Z", "agent": { "ephemeral_id": "f8dfeb31-2b56-4f8e-bb91-d4b94b8086da", "id": "8299ae35-ee0e-4107-9acb-1b6acfdda1fb", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.13.0" }, "data_stream": { "dataset": "ti_rapid7_threat_command.ioc", "namespace": "98425", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "8299ae35-ee0e-4107-9acb-1b6acfdda1fb", "snapshot": false, "version": "8.13.0" }, "event": { "agent_id_status": "verified", "category": [ "threat" ], "created": "2024-08-02T06:09:57.917Z", "dataset": "ti_rapid7_threat_command.ioc", "ingested": "2024-08-02T06:10:07Z", "kind": "enrichment", "module": "ti_rapid7_threat_command", "original": "{\"firstSeen\":\"2022-05-04T20:11:04.000Z\",\"lastSeen\":\"2022-06-15T20:11:04.000Z\",\"lastUpdateDate\":\"2022-06-16T10:39:07.851Z\",\"relatedCampaigns\":[],\"relatedMalware\":[\"remcos\"],\"relatedThreatActors\":[],\"reportedFeeds\":[{\"confidenceLevel\":2,\"id\":\"5b68306df84f7c8696047fdd\",\"name\":\"Test Feed\"}],\"score\":13.26086956521739,\"severity\":\"Low\",\"status\":\"Active\",\"tags\":[\"Test\"],\"type\":\"IpAddresses\",\"value\":\"89.160.20.112\",\"whitelisted\":false}", "risk_score": 13.26087, "type": [ "indicator" ] }, "input": { "type": "httpjson" }, "rapid7": { "tc": { "ioc": { "deleted_at": "2022-08-05T10:39:07.851Z", "expiration_duration": "50d", "first_seen": "2022-05-04T20:11:04.000Z", "last_seen": "2022-06-15T20:11:04.000Z", "last_update_date": "2022-06-16T10:39:07.851Z", "related": { "malware": [ "remcos" ] }, "reported_feeds": [ { "confidence": 2, "id": "5b68306df84f7c8696047fdd", "name": "Test Feed" } ], "score": 13.26086956521739, "severity": "Low", "status": "Active", "tags": [ "Test" ], "type": "IpAddresses", "value": "89.160.20.112", "whitelisted": "false" } } }, "related": { "ip": [ "89.160.20.112" ] }, "tags": [ "preserve_original_event", "forwarded", "rapid7-threat-command-ioc", "Test" ], "threat": { "indicator": { "as": { "number": 29518, "organization": { "name": "Bredband2 AB" } }, "confidence": "Low", "first_seen": "2022-05-04T20:11:04.000Z", "geo": { "city_name": "Linköping", "continent_name": "Europe", "country_iso_code": "SE", "country_name": "Sweden", "location": { "lat": 58.4167, "lon": 15.6167 }, "region_iso_code": "SE-E", "region_name": "Östergötland County" }, "ip": "89.160.20.112", "last_seen": "2022-06-15T20:11:04.000Z", "modified_at": "2022-06-16T10:39:07.851Z", "name": "89.160.20.112", "provider": [ "Test Feed" ], "type": "ipv4-addr" } } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
labels.is_ioc_transform_source |
Indicates whether an IOC is in the raw source data stream, or the in latest destination index. |
constant_keyword |
log.offset |
Log offset |
long |
rapid7.tc.ioc.deleted_at |
The timestamp when indicator is (or will be) expired. |
date |
rapid7.tc.ioc.expiration_duration |
The configured expiration duration. |
keyword |
rapid7.tc.ioc.first_seen |
IOC first seen date in Unix Millisecond Timestamp. |
date |
rapid7.tc.ioc.geolocation |
Geographical location of an IP address. |
keyword |
rapid7.tc.ioc.last_seen |
IOC last seen date in Unix Millisecond Timestamp. |
date |
rapid7.tc.ioc.last_update_date |
IOC last update date in Unix Millisecond Timestamp. |
date |
rapid7.tc.ioc.provider |
List of the indicator providers. |
keyword |
rapid7.tc.ioc.related.campaigns |
List of IOC related campaigns. |
keyword |
rapid7.tc.ioc.related.malware |
List of IOC related malware families. |
keyword |
rapid7.tc.ioc.related.threat_actors |
List of IOC related threat actors. |
keyword |
rapid7.tc.ioc.reported_feeds.confidence |
Confidence level of the reported feed. |
double |
rapid7.tc.ioc.reported_feeds.id |
ID of the reported feed. |
keyword |
rapid7.tc.ioc.reported_feeds.name |
Name of the reported feed. |
keyword |
rapid7.tc.ioc.score |
IOC score between 0 - 100. |
double |
rapid7.tc.ioc.severity |
IOC severity. Allowed values: High, Medium, Low, PendingEnrichment. |
keyword |
rapid7.tc.ioc.status |
State of the IOC. Allowed values: Active, Retired. |
keyword |
rapid7.tc.ioc.tags |
List of IOC tags. |
keyword |
rapid7.tc.ioc.type |
IOC type. |
keyword |
rapid7.tc.ioc.value |
IOC value. |
keyword |
rapid7.tc.ioc.whitelisted |
An indicator which states if the IOC was checked and found as whitelisted or not. |
keyword |
threat.indicator.first_seen |
The date and time when intelligence source first reported sighting this indicator. |
date |
threat.indicator.last_seen |
The date and time when intelligence source last reported sighting this indicator. |
date |
threat.indicator.modified_at |
The date and time when intelligence source last modified information for this indicator. |
date |
Alert
editRetrieves organization-specific Threat Command alerts over time.
Example
An example event for alert
looks as following:
{ "@timestamp": "2022-11-02T10:12:46.260Z", "agent": { "ephemeral_id": "0a1f430f-ec76-4046-9683-49dd5ebaeab2", "id": "34592ccf-10ae-4d24-a28c-97be832bde99", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.13.0" }, "data_stream": { "dataset": "ti_rapid7_threat_command.alert", "namespace": "ep", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "34592ccf-10ae-4d24-a28c-97be832bde99", "snapshot": false, "version": "8.13.0" }, "event": { "agent_id_status": "verified", "created": "2024-06-26T07:01:05.859Z", "dataset": "ti_rapid7_threat_command.alert", "id": "123456789zxcvbnmas8a8q60", "ingested": "2024-06-26T07:01:15Z", "kind": "alert", "module": "ti_rapid7_threat_command", "original": "{\"Assets\":[{\"Type\":\"Domains\",\"Value\":\"example.com\"}],\"Assignees\":[],\"Closed\":{\"IsClosed\":true},\"Details\":{\"Description\":\"A suspicious subdomain 'example.com' was found to have characteristics indicating it may be used to carry out phishing attacks. | Recommendations: It is recommended to block the domain in your URL filtering and mail systems. This can prevent phishing emails being received by your employees and access to websites attempting to steal sensitive information. Click “Remediate” in order to initiate the takedown process for this domain.\",\"Images\":[],\"Severity\":\"Low\",\"Source\":{\"NetworkType\":\"ClearWeb\",\"Type\":\"WHOIS servers\",\"URL\":\"http://example.com\"},\"SubType\":\"RegisteredSuspiciousDomain\",\"Tags\":[{\"CreatedBy\":\"ProfilingRule\",\"Name\":\"Phishing Domain - Default Detection Rule\",\"_id\":\"1al3p6789z6c2b7m9s8a8q60\"}],\"Title\":\"Suspected Phishing Domain - 'example.com'\",\"Type\":\"Phishing\"},\"FoundDate\":\"2022-11-02T10:12:46.260Z\",\"IsFlagged\":false,\"RelatedIocs\":[\"example.com\"],\"RelatedThreatIDs\":[\"6a4e7t9a111bd0003bcc2a55\"],\"TakedownStatus\":\"NotSent\",\"UpdateDate\":\"2022-11-02T10:12:46.260Z\",\"_id\":\"123456789zxcvbnmas8a8q60\"}", "reference": "https://dashboard.ti.insight.rapid7.com/#/threat-command/alerts/?search=123456789zxcvbnmas8a8q60" }, "input": { "type": "httpjson" }, "rapid7": { "tc": { "alert": { "assets": [ { "type": "Domains", "value": "example.com" } ], "details": { "description": "A suspicious subdomain 'example.com' was found to have characteristics indicating it may be used to carry out phishing attacks. | Recommendations: It is recommended to block the domain in your URL filtering and mail systems. This can prevent phishing emails being received by your employees and access to websites attempting to steal sensitive information. Click “Remediate” in order to initiate the takedown process for this domain.", "severity": "Low", "source": { "network_type": "ClearWeb", "type": "WHOIS servers", "url": "http://example.com" }, "subtype": "RegisteredSuspiciousDomain", "tags": [ { "created_by": "ProfilingRule", "id": "1al3p6789z6c2b7m9s8a8q60", "name": "Phishing Domain - Default Detection Rule" } ], "title": "Suspected Phishing Domain - 'example.com'", "type": "Phishing" }, "found_date": "2022-11-02T10:12:46.260Z", "id": "123456789zxcvbnmas8a8q60", "is_closed": true, "is_flagged": false, "related_iocs": [ "example.com" ], "related_threat_ids": [ "6a4e7t9a111bd0003bcc2a55" ], "takedown_status": "NotSent", "update_date": "2022-11-02T10:12:46.260Z" } } }, "tags": [ "preserve_original_event", "forwarded", "rapid7-threat-command-alert", "Phishing Domain - Default Detection Rule" ] }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
rapid7.tc.alert.assets.type |
Type of an asset. |
keyword |
rapid7.tc.alert.assets.value |
Value of an asset. |
keyword |
rapid7.tc.alert.assignees |
List of assignees. |
keyword |
rapid7.tc.alert.details.description |
Description of an alert. |
keyword |
rapid7.tc.alert.details.images |
List of alert images. |
keyword |
rapid7.tc.alert.details.severity |
Alert severity. Allowed values: High, Medium, Low. |
keyword |
rapid7.tc.alert.details.source.date |
Source date of an alert in Unix Millisecond Timestamp. |
date |
rapid7.tc.alert.details.source.email |
Source email. |
keyword |
rapid7.tc.alert.details.source.leak_name |
Name of the leak DBs in data leakage alerts. |
keyword |
rapid7.tc.alert.details.source.network_type |
Source network type. Allowed values: ClearWeb, DarkWeb. |
keyword |
rapid7.tc.alert.details.source.type |
Alert’s source type. Allowed values: ApplicationStores, BlackMarkets, HackingForums, SocialMedia, PasteSites, Others. |
keyword |
rapid7.tc.alert.details.source.url |
Source url. |
keyword |
rapid7.tc.alert.details.subtype |
Subtype of an alert. |
keyword |
rapid7.tc.alert.details.tags.created_by |
Name of the person who created the tag. |
keyword |
rapid7.tc.alert.details.tags.id |
Unique ID of the tag. |
keyword |
rapid7.tc.alert.details.tags.name |
Value of tag. |
keyword |
rapid7.tc.alert.details.title |
Title of an alert. |
keyword |
rapid7.tc.alert.details.type |
Type of an alert. Allowed values: AttackIndication, DataLeakage, Phishing, BrandSecurity, ExploitableData, vip. |
keyword |
rapid7.tc.alert.found_date |
Found date of an alert in Unix Millisecond Timestamp. |
date |
rapid7.tc.alert.id |
Unique ID of an alert. |
keyword |
rapid7.tc.alert.is_closed |
If true, the alert is closed. |
boolean |
rapid7.tc.alert.is_flagged |
If true, the alert is flagged. |
boolean |
rapid7.tc.alert.related_iocs |
List of related IOCs. |
keyword |
rapid7.tc.alert.related_threat_ids |
List of related threat IDs. |
keyword |
rapid7.tc.alert.takedown_status |
Alert remediation status. |
keyword |
rapid7.tc.alert.update_date |
Last update date of an alert in Unix Millisecond Timestamp. |
date |
Vulnerability
editRetrieves CVEs (Common Vulnerabilities and Exposures) over time.
Example
An example event for vulnerability
looks as following:
{ "@timestamp": "2020-08-24T21:46:48.619Z", "agent": { "ephemeral_id": "98178c63-7de1-4041-877c-bf829b4fc0d3", "id": "34592ccf-10ae-4d24-a28c-97be832bde99", "name": "docker-fleet-agent", "type": "filebeat", "version": "8.13.0" }, "data_stream": { "dataset": "ti_rapid7_threat_command.vulnerability", "namespace": "ep", "type": "logs" }, "ecs": { "version": "8.11.0" }, "elastic_agent": { "id": "34592ccf-10ae-4d24-a28c-97be832bde99", "snapshot": false, "version": "8.13.0" }, "event": { "agent_id_status": "verified", "category": [ "threat", "vulnerability" ], "created": "2024-06-26T07:02:37.947Z", "dataset": "ti_rapid7_threat_command.vulnerability", "ingested": "2024-06-26T07:02:49Z", "kind": "event", "module": "ti_rapid7_threat_command", "original": "{\"cpe\":[{\"Range\":{\"VersionEndExcluding\":\"\",\"VersionEndIncluding\":\"4.0.0\",\"VersionStartExcluding\":\"\",\"VersionStartIncluding\":\"1.0.0\"},\"Title\":\"Php\",\"Value\":\"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*\",\"VendorProduct\":\"php php\"}],\"cveId\":\"CVE-2020-7064\",\"cvssScore\":5.4,\"exploitAvailability\":false,\"firstMentionDate\":\"N/A\",\"intsightsScore\":16,\"lastMentionDate\":\"2020-04-01T04:15:00.000Z\",\"mentionsAmount\":0,\"mentionsPerSource\":{\"ClearWebCyberBlogs\":0,\"CodeRepositories\":0,\"DarkWeb\":0,\"Exploit\":0,\"HackingForum\":0,\"InstantMessage\":0,\"PasteSite\":0,\"SocialMedia\":0},\"publishedDate\":\"2020-04-01T04:15:00.000Z\",\"relatedCampaigns\":[\"SolarWinds\"],\"relatedMalware\":[\"doppeldridex\",\"dridex\"],\"relatedThreatActors\":[\"doppelspider\"],\"severity\":\"Low\",\"updateDate\":\"2020-08-24T21:46:48.619Z\",\"vulnerabilityOrigin\":[\"Qualys\"]}", "type": [ "indicator" ] }, "input": { "type": "httpjson" }, "rapid7": { "tc": { "vulnerability": { "cpe": [ { "range": { "version": { "end": { "including": "4.0.0" }, "start": { "including": "1.0.0" } } }, "title": "Php", "value": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "vendor_product": "php php" } ], "cvss_score": 5.4, "exploit_availability": false, "id": "CVE-2020-7064", "intsights_score": 16, "mention": { "first_date": "N/A", "last_date": "2020-04-01T04:15:00.000Z" }, "mentions": { "source": { "clear_web_cyber_blogs": 0, "code_repositories": 0, "dark_web": 0, "exploit": 0, "hacking_forum": 0, "instant_message": 0, "paste_site": 0, "social_media": 0 }, "total": 0 }, "origin": [ "Qualys" ], "published_date": "2020-04-01T04:15:00.000Z", "related": { "campaigns": [ "SolarWinds" ], "malware": [ "doppeldridex", "dridex" ], "threat_actors": [ "doppelspider" ] }, "severity": "Low", "update_date": "2020-08-24T21:46:48.619Z" } } }, "tags": [ "preserve_original_event", "forwarded", "rapid7-threat-command-vulnerability" ], "vulnerability": { "classification": "CVSS", "enumeration": "CVE", "id": "CVE-2020-7064", "reference": "https://dashboard.ti.insight.rapid7.com/#/risk-analyzer/vulnerabilities?search=CVE-2020-7064", "scanner": { "vendor": "Rapid7" }, "score": { "base": 5.4 }, "severity": "Low" } }
Exported fields
Field | Description | Type |
---|---|---|
@timestamp |
Event timestamp. |
date |
cloud.image.id |
Image ID for the cloud instance. |
keyword |
data_stream.dataset |
Data stream dataset. |
constant_keyword |
data_stream.namespace |
Data stream namespace. |
constant_keyword |
data_stream.type |
Data stream type. |
constant_keyword |
host.containerized |
If the host is a container. |
boolean |
host.os.build |
OS build information. |
keyword |
host.os.codename |
OS codename, if any. |
keyword |
input.type |
Input type |
keyword |
log.offset |
Log offset |
long |
rapid7.tc.vulnerability.cpe.range.version.end.excluding |
The CPE version end range. |
version |
rapid7.tc.vulnerability.cpe.range.version.end.including |
The CPE version end range. |
version |
rapid7.tc.vulnerability.cpe.range.version.start.excluding |
The CPE version start range. |
version |
rapid7.tc.vulnerability.cpe.range.version.start.including |
The CPE version start range. |
version |
rapid7.tc.vulnerability.cpe.title |
Title of CPE. |
keyword |
rapid7.tc.vulnerability.cpe.value |
Value of CPE. |
keyword |
rapid7.tc.vulnerability.cpe.vendor_product |
Vendor and Product of CPE. |
keyword |
rapid7.tc.vulnerability.cvss_score |
The severity score from NVD. |
double |
rapid7.tc.vulnerability.exploit_availability |
If true, exploit is available for this CVE. |
boolean |
rapid7.tc.vulnerability.id |
Unique ID of a CVE. |
keyword |
rapid7.tc.vulnerability.intsights_score |
The severity score from Rapid7 Threat Command. |
double |
rapid7.tc.vulnerability.mention.first_date |
CVE’s first mention date. |
keyword |
rapid7.tc.vulnerability.mention.last_date |
CVE’s last mention date. |
keyword |
rapid7.tc.vulnerability.mentions.source.clear_web_cyber_blogs |
The number of times a CVE is mentioned by ClearWebCyberBlogs. |
long |
rapid7.tc.vulnerability.mentions.source.code_repositories |
The number of times a CVE is mentioned by CodeRepositories. |
long |
rapid7.tc.vulnerability.mentions.source.dark_web |
The number of times a CVE is mentioned by DarkWeb. |
long |
rapid7.tc.vulnerability.mentions.source.exploit |
The number of times a CVE is mentioned by Exploit. |
long |
rapid7.tc.vulnerability.mentions.source.hacking_forum |
The number of times a CVE is mentioned by HackingForum. |
long |
rapid7.tc.vulnerability.mentions.source.instant_message |
The number of times a CVE is mentioned by InstantMessage. |
long |
rapid7.tc.vulnerability.mentions.source.paste_site |
The number of times a CVE is mentioned by PasteSite. |
long |
rapid7.tc.vulnerability.mentions.source.social_media |
The number of times a CVE is mentioned by SocialMedia. |
long |
rapid7.tc.vulnerability.mentions.total |
The number of times a CVE is mentioned across all sources. |
long |
rapid7.tc.vulnerability.origin |
The origin of vulnerability. |
keyword |
rapid7.tc.vulnerability.published_date |
CVE’s publish date in ISO 8601 format. |
date |
rapid7.tc.vulnerability.related.campaigns |
List of related threat campaigns. |
keyword |
rapid7.tc.vulnerability.related.malware |
List of related malware. |
keyword |
rapid7.tc.vulnerability.related.threat_actors |
List of related threat actors. |
keyword |
rapid7.tc.vulnerability.severity |
CVE severity. Allowed values: Critical, High, Medium, Low. |
keyword |
rapid7.tc.vulnerability.update_date |
CVE’s update date in ISO 8601 format. |
date |
Changelog
editChangelog
Version | Details | Kibana version(s) |
---|---|---|
2.3.0 |
Enhancement (View pull request) |
8.13.0 or higher |
2.2.1 |
Bug fix (View pull request) |
8.13.0 or higher |
2.2.0 |
Enhancement (View pull request) |
8.13.0 or higher |
2.1.0 |
Enhancement (View pull request) |
8.13.0 or higher |
2.0.3 |
Bug fix (View pull request) |
8.13.0 or higher |
2.0.2 |
Bug fix (View pull request) |
8.13.0 or higher |
2.0.1 |
Bug fix (View pull request) |
8.13.0 or higher |
2.0.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.17.0 |
Enhancement (View pull request) |
8.13.0 or higher |
1.16.0 |
Enhancement (View pull request) |
8.12.0 or higher |
1.15.0 |
Enhancement (View pull request) |
8.12.0 or higher |
1.14.1 |
Enhancement (View pull request) |
8.7.1 or higher |
1.14.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.13.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.12.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.11.1 |
Bug fix (View pull request) |
8.7.1 or higher |
1.11.0 |
Enhancement (View pull request) |
— |
1.10.0 |
Enhancement (View pull request) Bug fix (View pull request) Bug fix (View pull request) |
— |
1.9.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.8.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.7.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.6.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.5.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.4.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.3.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.2.0 |
Enhancement (View pull request) |
8.7.1 or higher |
1.1.0 |
Enhancement (View pull request) |
8.4.0 or higher |
1.0.0 |
Enhancement (View pull request) |
8.4.0 or higher |
0.1.0 |
Enhancement (View pull request) |
— |