41 lines
1.5 KiB
Python
41 lines
1.5 KiB
Python
from taxii2client import Collection
|
|
|
|
import stix2
|
|
|
|
# This example is based on the medallion server with default_data.json
|
|
# See https://github.com/oasis-open/cti-taxii-server for more information
|
|
|
|
|
|
def main():
|
|
collection = Collection("http://127.0.0.1:5000/trustgroup1/collections/52892447-4d7e-4f70-b94d-d7f22742ff63/",
|
|
user="admin", password="Password0")
|
|
|
|
# instantiate TAXII data source
|
|
taxii = stix2.TAXIICollectionSource(collection)
|
|
|
|
# get (url watch indicator)
|
|
indicator_fw = taxii.get("indicator--d81f86b9-975b-bc0b-775e-810c5ad45a4f")
|
|
print("\n\n-------Queried for Indicator - got:")
|
|
print(indicator_fw.serialize(indent=4))
|
|
|
|
# all versions (url watch indicator - currently two)
|
|
indicator_fw_versions = taxii.all_versions("indicator--d81f86b9-975b-bc0b-775e-810c5ad45a4f")
|
|
print("\n\n------Queried for indicator (all_versions()) - got:")
|
|
for indicator in indicator_fw_versions:
|
|
print(indicator.serialize(indent=4))
|
|
|
|
# add TAXII filter (ie filter should be passed to TAXII)
|
|
query_filter = stix2.Filter("type", "in", "malware")
|
|
|
|
# query() - but with filter attached. There are no malware objects in this collection
|
|
malwares = taxii.query(query=query_filter)
|
|
print("\n\n\n--------Queried for Malware string (with above filter attached) - got:")
|
|
for malware in malwares:
|
|
print(malware.serialize(indent=4))
|
|
if not malwares:
|
|
print(malwares)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main()
|