Hivelime is a comprehensive integration between TheHive and Sublime. Utilizing Sublime webhooks, Hivelime can be effortlessly configured to create alerts on TheHive!
Functionalities
Triggered event (malicious email detection) is parsed and converted into an actionable TheHive alert with tags, observables;
Request signing can be used if SUBLIME_SIGNING_KEY variable is provided;
Observables have detailed tags to further analyze, filter or use in remediation step;
Built with both Security and OPS in mind. HiveLime has small footprint, great performance on various workloads and easily deployable with minimal configuration;
Tags can be provided in configuration to be appended to alerts created by HiveLime;
Alert has a brief summary description with links to detection, flagged rules and important information.
Alert Examples
Usage
Parameters should be provided via environment variables. Please see docker-compose file.
Run the app via docker or via simply ./hivelime
HiveLime will listen http://SERVER_ADDRESS/sublime/event. Make sure to provide /sublime/event url resource to Sublime Webhook action configuration.
Notes
Alert reference is first 8 chars of detection CanonicalID;