mirror of https://github.com/MISP/PyMISP
Merge branch 'master' of github.com:MISP/PyMISP
commit
c875fde6ea
|
@ -0,0 +1,51 @@
|
|||
#!/usr/bin/env python
|
||||
# -*- coding: utf-8 -*-
|
||||
|
||||
from pymisp import PyMISP
|
||||
from keys import misp_url, misp_key,misp_verifycert
|
||||
import argparse
|
||||
import os
|
||||
import json
|
||||
|
||||
|
||||
def init(url, key):
|
||||
return PyMISP(url, key, misp_verifycert, 'json')
|
||||
|
||||
|
||||
def search(m, quiet, url, controller, out=None, **kwargs):
|
||||
result = m.search(controller, **kwargs)
|
||||
if quiet:
|
||||
for e in result['response']:
|
||||
print('{}{}{}\n'.format(url, '/events/view/', e['Event']['id']))
|
||||
elif out is None:
|
||||
for e in result['response']:
|
||||
print(json.dumps(e) + '\n')
|
||||
else:
|
||||
with open(out, 'w') as f:
|
||||
for e in result['response']:
|
||||
f.write(json.dumps(e) + '\n')
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
parser = argparse.ArgumentParser(description='Get all the events matching a value for a given param.')
|
||||
parser.add_argument("-p", "--param", required=True, help="Parameter to search (e.g. category, org, etc.)")
|
||||
parser.add_argument("-s", "--search", required=True, help="String to search.")
|
||||
parser.add_argument("-a", "--attributes", action='store_true', help="Search attributes instead of events")
|
||||
parser.add_argument("-q", "--quiet", action='store_true', help="Only display URLs to MISP")
|
||||
parser.add_argument("-o", "--output", help="Output file")
|
||||
|
||||
args = parser.parse_args()
|
||||
|
||||
if args.output is not None and os.path.exists(args.output):
|
||||
print('Output file already exists, abort.')
|
||||
exit(0)
|
||||
|
||||
misp = init(misp_url, misp_key)
|
||||
kwargs = {args.param: args.search}
|
||||
|
||||
if args.attributes:
|
||||
controller='attributes'
|
||||
else:
|
||||
controller='events'
|
||||
|
||||
search(misp, args.quiet, misp_url, controller, args.output, **kwargs)
|
|
@ -541,6 +541,8 @@ class PyMISP(object):
|
|||
return self.add_named_attribute(event, 'domain', domain, category, to_ids, comment, distribution, proposal)
|
||||
|
||||
def add_domain_ip(self, event, domain, ip, category='Network activity', to_ids=True, comment=None, distribution=None, proposal=False):
|
||||
if isinstance(ip, str):
|
||||
ip = [ip]
|
||||
composed = list(map(lambda x: '%s|%s' % (domain, x), ip))
|
||||
return self.add_named_attribute(event, 'domain|ip', composed, category, to_ids, comment, distribution, proposal)
|
||||
|
||||
|
|
|
@ -228,7 +228,7 @@ class MISPAttribute(object):
|
|||
if self.data:
|
||||
to_return['data'] = base64.b64encode(self.data.getvalue()).decode()
|
||||
if self.encrypt:
|
||||
to_return['entrypt'] = self.encrypt
|
||||
to_return['encrypt'] = self.encrypt
|
||||
to_return = _int_to_str(to_return)
|
||||
return to_return
|
||||
|
||||
|
|
|
@ -42,7 +42,7 @@ class TestBasic(unittest.TestCase):
|
|||
event = self.misp.new_event(0, 1, 0, "This is a test")
|
||||
event_id = self._clean_event(event)
|
||||
to_check = {u'Event': {u'info': u'This is a test', u'locked': False,
|
||||
u'attribute_count': None, 'disable_correlation': False, u'analysis': u'0',
|
||||
u'attribute_count': u'0', 'disable_correlation': False, u'analysis': u'0',
|
||||
u'ShadowAttribute': [], u'published': False,
|
||||
u'distribution': u'0', u'event_creator_email': u'admin@admin.test', u'Attribute': [], u'proposal_email_lock': False,
|
||||
u'Org': {u'name': u'ORGNAME'},
|
||||
|
|
Loading…
Reference in New Issue