|
45 | 45 | "description": "Fetch data from the Apache Kafka distributed stream processing system.", |
46 | 46 | "module": "intelmq.bots.collectors.kafka.collector", |
47 | 47 | "parameters": { |
48 | | - "topic": "<topic>", |
49 | | - "bootstrap_servers": "localhost:9092" |
| 48 | + "bootstrap_servers": "localhost:9092", |
| 49 | + "topic": "<topic>" |
50 | 50 | } |
51 | 51 | }, |
52 | 52 | "Mail Attachment Fetcher": { |
|
110 | 110 | "extract_files": false, |
111 | 111 | "gpg_keyring": null, |
112 | 112 | "http_password": null, |
113 | | - "http_url_formatting": false, |
114 | 113 | "http_url": "<insert url of feed>", |
| 114 | + "http_url_formatting": false, |
115 | 115 | "http_username": null, |
116 | 116 | "name": "__FEED__", |
117 | 117 | "provider": "__PROVIDER__", |
118 | 118 | "rate_limit": 3600, |
119 | | - "signature_url_formatting": false, |
120 | 119 | "signature_url": null, |
| 120 | + "signature_url_formatting": false, |
121 | 121 | "ssl_client_certificate": null, |
122 | 122 | "verify_pgp_signatures": false |
123 | 123 | } |
|
251 | 251 | "description": "Collect data from ESET's TAXII API", |
252 | 252 | "module": "intelmq.bots.collectors.eset.collector", |
253 | 253 | "parameters": { |
254 | | - "username": "<username>", |
255 | | - "password": "<password>", |
| 254 | + "collection": "<collection>", |
256 | 255 | "endpoint": "eti.eset.com", |
257 | | - "time_delta": 3600, |
| 256 | + "password": "<password>", |
258 | 257 | "rate_limit": 3600, |
259 | | - "collection": "<collection>" |
| 258 | + "time_delta": 3600, |
| 259 | + "username": "<username>" |
260 | 260 | } |
261 | 261 | }, |
262 | 262 | "Github API": { |
|
416 | 416 | "module": "intelmq.bots.parsers.ci_army.parser", |
417 | 417 | "parameters": {} |
418 | 418 | }, |
| 419 | + "CZ.NIC HaaS": { |
| 420 | + "description": "CZ.NIC HaaS Parser is the bot responsible to parse the report and sanitize the information.", |
| 421 | + "module": "intelmq.bots.parsers.cznic.parser_haas", |
| 422 | + "parameters": {} |
| 423 | + }, |
| 424 | + "CZ.NIC Proki": { |
| 425 | + "description": "Parse the feed from malicious IP addresses on Czech networks.", |
| 426 | + "module": "intelmq.bots.parsers.cznic.parser_proki", |
| 427 | + "parameters": {} |
| 428 | + }, |
419 | 429 | "CertStream": { |
420 | 430 | "description": "Parse the CertStream feed.", |
421 | 431 | "module": "intelmq.bots.parsers.calidog.parser_certstream", |
|
436 | 446 | "module": "intelmq.bots.parsers.cymru.parser_full_bogons", |
437 | 447 | "parameters": {} |
438 | 448 | }, |
439 | | - "CZ.NIC HaaS": { |
440 | | - "description": "CZ.NIC HaaS Parser is the bot responsible to parse the report and sanitize the information.", |
441 | | - "module": "intelmq.bots.parsers.cznic.parser_haas", |
442 | | - "parameters": {} |
443 | | - }, |
444 | | - "CZ.NIC Proki": { |
445 | | - "description": "Parse the feed from malicious IP addresses on Czech networks.", |
446 | | - "module": "intelmq.bots.parsers.cznic.parser_proki", |
447 | | - "parameters": {} |
448 | | - }, |
449 | 449 | "DShield AS": { |
450 | 450 | "description": "Parse the DShield AS.", |
451 | 451 | "module": "intelmq.bots.parsers.dshield.parser_asn", |
|
551 | 551 | "description": "Parse key=value strings.", |
552 | 552 | "module": "intelmq.bots.parsers.key_value.parser", |
553 | 553 | "parameters": { |
554 | | - "pair_separator": " ", |
555 | | - "kv_separator": "=", |
556 | 554 | "keys": {}, |
| 555 | + "kv_separator": "=", |
| 556 | + "pair_separator": " ", |
557 | 557 | "strip_quotes": true, |
558 | 558 | "timestamp_key": null |
559 | 559 | } |
|
866 | 866 | "module": "intelmq.bots.experts.maxmind_geoip.expert", |
867 | 867 | "parameters": { |
868 | 868 | "database": "/opt/intelmq/var/lib/bots/maxmind_geoip/GeoLite2-City.mmdb", |
| 869 | + "license_key": "<insert Maxmind license key>", |
869 | 870 | "overwrite": false, |
870 | | - "use_registered": false, |
871 | | - "license_key": "<insert Maxmind license key>" |
| 871 | + "use_registered": false |
872 | 872 | } |
873 | 873 | }, |
874 | 874 | "McAfee Active Response Lookup": { |
|
927 | 927 | "description": "Adds the Risk Score from RecordedFuture IPRisk associated with source.ip or destination.ip with a local database.", |
928 | 928 | "module": "intelmq.bots.experts.recordedfuture_iprisk.expert", |
929 | 929 | "parameters": { |
| 930 | + "api_token": "<insert Recorded Future IPRisk API token>", |
930 | 931 | "database": "/opt/intelmq/var/lib/bots/recordedfuture_iprisk/rfiprisk.dat", |
931 | | - "overwrite": false, |
932 | | - "api_token": "<insert Recorded Future IPRisk API token>" |
| 932 | + "overwrite": false |
933 | 933 | } |
934 | 934 | }, |
935 | 935 | "Reverse DNS": { |
|
956 | 956 | "description": "Enrich an event from Splunk search results.", |
957 | 957 | "module": "intelmq.bots.experts.splunk_saved_search.expert", |
958 | 958 | "parameters": { |
959 | | - "url": "https://splunk:8089/", |
960 | 959 | "auth_token": "VGhlIHF1aWNrIGJyb3duIGZveCBqdW1wIG92ZXIgdGhlIGxhenkgZG9nLgo=", |
| 960 | + "multiple_result_handling": [ |
| 961 | + "warn", |
| 962 | + "use_first", |
| 963 | + "send" |
| 964 | + ], |
| 965 | + "not_found": [ |
| 966 | + "warn", |
| 967 | + "send" |
| 968 | + ], |
| 969 | + "overwrite": null, |
| 970 | + "result_fields": { |
| 971 | + "result field": "event field" |
| 972 | + }, |
961 | 973 | "retry_interval": 5, |
962 | 974 | "saved_search": "search_name", |
963 | 975 | "search_parameters": { |
964 | 976 | "event field": "search parameter" |
965 | 977 | }, |
966 | | - "result_fields": { |
967 | | - "result field": "event field" |
968 | | - }, |
969 | | - "not_found": [ "warn", "send" ], |
970 | | - "multiple_result_handling": [ "warn", "use_first", "send" ], |
971 | | - "overwrite": null |
| 978 | + "url": "https://splunk:8089/" |
972 | 979 | } |
973 | 980 | }, |
974 | 981 | "Taxonomy": { |
|
980 | 987 | "description": "Check if the number of similar messages during a specified time interval exceeds a set value.", |
981 | 988 | "module": "intelmq.bots.experts.threshold.expert", |
982 | 989 | "parameters": { |
| 990 | + "add_keys": { |
| 991 | + "comment": "Threshold reached" |
| 992 | + }, |
983 | 993 | "filter_keys": "raw,time.observation", |
984 | 994 | "filter_type": "blacklist", |
985 | 995 | "redis_cache_db": "11", |
986 | 996 | "redis_cache_host": "127.0.0.1", |
987 | 997 | "redis_cache_password": null, |
988 | 998 | "redis_cache_port": "6379", |
989 | | - "timeout": 3600, |
990 | 999 | "threshold": 100, |
991 | | - "add_keys": { |
992 | | - "comment": "Threshold reached" |
993 | | - } |
| 1000 | + "timeout": 3600 |
994 | 1001 | } |
995 | 1002 | }, |
996 | 1003 | "Tor Nodes": { |
|
1182 | 1189 | "description": "Request Tracker ticket creation bot. Create linked Investigation queue ticket if needed, according to the RTIR flow", |
1183 | 1190 | "module": "intelmq.bots.outputs.rt.output", |
1184 | 1191 | "parameters": { |
1185 | | - "rt_uri": "http://localhost/REST/1.0", |
1186 | | - "verify_cert": true, |
1187 | | - "rt_user": "apiuser", |
1188 | | - "rt_password": "<password>", |
1189 | | - "queue": "Incidents", |
1190 | | - "description_attr": "event_description.text", |
1191 | 1192 | "CF_mapping": { |
1192 | | - "event_description.text": "Description", |
1193 | | - "source.ip": "IP", |
1194 | | - "classification.type": "Incident Type", |
1195 | 1193 | "classification.taxonomy": "Classification", |
1196 | | - "extra.incident.severity": "Incident Severity", |
| 1194 | + "classification.type": "Incident Type", |
| 1195 | + "event_description.text": "Description", |
1197 | 1196 | "extra.incident.importance": "Importance", |
1198 | | - "extra.organization.name": "Customer" |
| 1197 | + "extra.incident.severity": "Incident Severity", |
| 1198 | + "extra.organization.name": "Customer", |
| 1199 | + "source.ip": "IP" |
1199 | 1200 | }, |
1200 | 1201 | "create_investigation": false, |
| 1202 | + "description_attr": "event_description.text", |
| 1203 | + "final_status": "resolved", |
1201 | 1204 | "investigation_fields": "time.source,time.observation,source.ip,source.port,source.fqdn,source.url,classification.taxonomy,classification.type,classification.identifier,event_description.url,event_description.text,malware.name,protocol.application,protocol.transport", |
1202 | | - "final_status": "resolved" |
| 1205 | + "queue": "Incidents", |
| 1206 | + "rt_password": "<password>", |
| 1207 | + "rt_uri": "http://localhost/REST/1.0", |
| 1208 | + "rt_user": "apiuser", |
| 1209 | + "verify_cert": true |
1203 | 1210 | } |
1204 | 1211 | }, |
1205 | 1212 | "SMTP": { |
|
0 commit comments