mirror of https://github.com/MISP/misp-modules
Merge pull request #564 from scottdermott/main
* Fix for @chrisr3d - [joesandbox_query] Changed the import_pe param to `import_executable`pull/565/head
commit
12359fdf93
|
@ -111,7 +111,7 @@ class JoeParser():
|
|||
if network.get(protocol):
|
||||
for packet in network[protocol]['packet']:
|
||||
timestamp = datetime.strptime(self.parse_timestamp(packet['timestamp']), '%b %d, %Y %H:%M:%S.%f')
|
||||
connections[tuple(packet[field] for field in network_behavior_fields)][protocol].add(timestamp)
|
||||
connections[tuple(packet.get(field) for field in network_behavior_fields)][protocol].add(timestamp)
|
||||
for connection, data in connections.items():
|
||||
attributes = self.prefetch_attributes_data(connection)
|
||||
if len(data.keys()) == len(set(protocols[protocol] for protocol in data.keys())):
|
||||
|
|
|
@ -21,7 +21,7 @@ def handler(q=False):
|
|||
apiurl = request['config'].get('apiurl') or 'https://jbxcloud.joesecurity.org/api'
|
||||
apikey = request['config'].get('apikey')
|
||||
parser_config = {
|
||||
"import_pe": request["config"].get('import_executable', "false") == "true",
|
||||
"import_executable": request["config"].get('import_executable', "false") == "true",
|
||||
"mitre_attack": request["config"].get('import_mitre_attack', "false") == "true",
|
||||
}
|
||||
|
||||
|
|
Loading…
Reference in New Issue