Who said you need to spend some to get some? If its threat intelligence products such as Virus Total, Xforce and AlienVaultTI to enrich alert data such as URL’s, Hashes and IP’s, we all use open source tools in our day to day work.
Share integrations to open-source or free online tools here so everyone in the community can start running incident response playbooks and accelerate their remediation.
Hey, we all have to look out for each other.
This is a terrific whiteboard video on specific open-source products you can realistically implement to create a high-functioning SOC: https://www.siemplify.co/blog/the-open-source-soc-whiteboard-video/
I'd love to know what others are using for open-source Threat Intelligence to enrich alert data. VirusTotal has only 4 queries per hour with its free license...
Hello @Dilip_Kommanabo , I'm Arnaud, the one presenting in the video.
I can provide some guidance on how I've set this up at a high level but it's all very flexible and there is no strictly right answer.
The first question to ask is whether whether Wazuh is right for you. If you're just starting our with Elasticsearch, simpler would be better and Wazuh is an extra layer on top that comes with added complexities (like making sure all the fields use the Elastic Common Schema naming convention). Additionally there was recently the introduction of a rules engine in Elasticsearch 7.6 which can move the detection logic from the client to the server. The Wazuh agent has some nice additional functionality but I'd start with just Elasticsearch and some Beats agents.
Either way you can look over the Wazuh installation instructions which also goes over the installation of Elasticsearch or to the Elasticsearch installation page directly. For a staging environment you're fine with a single cluster member but in production you would want at least 3. Install Winlogbeat & Auditbeat on some servers and configure them with the Elasticsearch server IP, no additional configuration required. You now have the core of the system.
Note that the "magic" in Elasticsearch comes from adhering to the Elastic Common Schema format. This means the fields names in all the logs you send to Elasticsearch need to be re-written into a specific naming convention. All the pre-canned ML jobs, rules, dashboards, visualizations, etc. have been created with these field names so when you write your logs in this format everything just works. If you use the Beats agents or one of the modules they support this field renaming is done automatically by the agent, saving you a lot of time and effort.
MISP has their own installation page and also allows you to download pre-configured vmware and ova images. This is what I used. Just go subscribe to some of the installed feeds and grab the API key from the Users page. You'll need this to configure the Siemplify integration.
I personally run Suricata and Zeek off a 4GB Raspberry Pi 4 attached to a span port on my switch so it sees all inbound/outbound traffic. On the RPi4 I also install the Filebeat agent and configure it to look at the files created by both of these products. Because Filebeat has a module for each of these products I don't have to worry about re-naming the fields for ECS. Note that installing Beats agents on ARM devices can be a bit tricky but you can just use a Linux server instead.
pfSense is really just a placeholder for any firewall, although it is quite good. You can setup another Filebeat agent on any machine you want to have act as a Syslog listener and send your firewall Syslog messages to this machine.
I hope that helps. Let me know if you have any additional questions.
Arnaud-
Take a look at downloading the MISP image. It comes with 2 very good free threat feeds. You can also search Docker Hub for the image provided by the Harvard IT Security Team. Last time I used it there were over 40 free feeds I could subscribe to.
Arnaud-
@Szymon_Kozicki The Public API of virustotal actually has a rate limit of 4 queries per minutes with a daily quota of 1000 requests/day and a maximum of 30000 requests/month.
Like
Many plugins are also available to Enrich, Export, Import.
Here are a few example of the service available to interact with MISP:
Full list of MISP modules here.
You guys talked about ELK, here are some other projects related that you might be interested in:
Here are some other stuff you might like:
There you go, that's a start 🙂