diff --git a/expansion/index.html b/expansion/index.html index d90efd7..e252014 100644 --- a/expansion/index.html +++ b/expansion/index.html @@ -288,6 +288,13 @@ apiosintds + + +
A module tu query the AssemblyLine API with a submission ID to get the submission report and parse it. +- features:
+++The module requires the address of the AssemblyLine server you want to query as well as your credentials used for this instance. Credentials include the used-ID and an API key or the password associated to the user-ID.
+The submission ID extracted from the submission link is then used to query AssemblyLine and get the full submission report. This report is parsed to extract file objects and the associated IPs, domains or URLs the files are connecting to.
+Some more data may be parsed in the future. +- input: +Link of an AssemblyLine submission report. +- output: +MISP attributes & objects parsed from the AssemblyLine submission. +- references: +https://www.cyber.cg.ca/en/assemblyline +- requirements: +assemblyline_client: Python library to query the AssemblyLine rest API.
+
A module to submit samples and URLs to AssemblyLine for advanced analysis, and return the link of the submission. - features:
-The module requires the address of the AssemblyLine server you want to query as well as your credentials in this instance. Credentials include the user-ID and an API key or the password associated to the user-ID.
+The module requires the address of the AssemblyLine server you want to query as well as your credentials used for this instance. Credentials include the user-ID and an API key or the password associated to the user-ID.
If the sample or url is correctly submitted, you get then the link of the submission. - input: Sample, or url to submit to AssemblyLine. @@ -1795,6 +1855,37 @@ Link of the report generated in Joe Sandbox. jbxapi: Joe Sandbox API python3 library
Query Lastline with an analysis link and parse the report into MISP attributes and objects. +The analysis link can also be retrieved from the output of the lastline_submit expansion module. +- features:
+++The module uses the new format and it is able to return MISP attributes and objects. +The module returns the same results as the lastline_import import module. +- input: +Link to a Lastline analysis. +- output: +MISP attributes and objects parsed from the analysis report. +- references: +https://www.lastline.com
+
Module to submit a file or URL to Lastline. +- features:
+++The module requires a Lastline API key and token (or username and password). +When the analysis is completed, it is possible to import the generated report by feeding the analysis link to the lastline_query module. +- input: +File or URL to submit to Lastline. +- output: +Link to the report generated by Lastline. +- references: +https://www.lastline.com
+
MISP hover module for macaddress.io diff --git a/expansion/logos/lastline.png b/expansion/logos/lastline.png new file mode 100644 index 0000000..6bffe77 Binary files /dev/null and b/expansion/logos/lastline.png differ diff --git a/export_mod/logos/lastline.png b/export_mod/logos/lastline.png new file mode 100644 index 0000000..6bffe77 Binary files /dev/null and b/export_mod/logos/lastline.png differ diff --git a/import_mod/index.html b/import_mod/index.html index dfdc304..9e64834 100644 --- a/import_mod/index.html +++ b/import_mod/index.html @@ -340,6 +340,13 @@ joe_import +
Module to import and parse reports from Lastline analysis links. +- features:
+++The module uses the new format and it is able to return MISP attributes and objects. +The module returns the same results as the lastline_query expansion module. +- input: +Link to a Lastline analysis. +- output: +MISP attributes and objects parsed from the analysis report. +- references: +https://www.lastline.com
+
Module to import MISP JSON format for merging MISP events. - features:
diff --git a/import_mod/logos/lastline.png b/import_mod/logos/lastline.png new file mode 100644 index 0000000..6bffe77 Binary files /dev/null and b/import_mod/logos/lastline.png differ diff --git a/search/search_index.json b/search/search_index.json index dbd3453..d9d7b8a 100644 --- a/search/search_index.json +++ b/search/search_index.json @@ -1 +1 @@ -{"config":{"lang":["en"],"prebuild_index":false,"separator":"[\\s\\-]+"},"docs":[{"location":"","text":"Home \u00b6 MISP modules are autonomous modules that can be used for expansion and other services in MISP . The modules are written in Python 3 following a simple API interface. The objective is to ease the extensions of MISP functionalities without modifying core components. The API is available via a simple REST API which is independent from MISP installation or configuration. MISP modules support is included in MISP starting from version 2.4.28 . For more information: Extending MISP with Python modules slides from MISP training. Existing MISP modules \u00b6 Expansion modules \u00b6 Backscatter.io - a hover and expansion module to expand an IP address with mass-scanning observations. BGP Ranking - a hover and expansion module to expand an AS number with the ASN description, its history, and position in BGP Ranking. BTC scam check - An expansion hover module to instantly check if a BTC address has been abused. BTC transactions - An expansion hover module to get a blockchain balance and the transactions from a BTC address in MISP. CIRCL Passive DNS - a hover and expansion module to expand hostname and IP addresses with passive DNS information. CIRCL Passive SSL - a hover and expansion module to expand IP addresses with the X.509 certificate seen. countrycode - a hover module to tell you what country a URL belongs to. CrowdStrike Falcon - an expansion module to expand using CrowdStrike Falcon Intel Indicator API. CVE - a hover module to give more information about a vulnerability (CVE). CVE advanced - An expansion module to query the CIRCL CVE search API for more information about a vulnerability (CVE). Cuckoo submit - A hover module to submit malware sample, url, attachment, domain to Cuckoo Sandbox. DBL Spamhaus - a hover module to check Spamhaus DBL for a domain name. DNS - a simple module to resolve MISP attributes like hostname and domain to expand IP addresses attributes. docx-enrich - an enrichment module to get text out of Word document into MISP (using free-text parser). DomainTools - a hover and expansion module to get information from DomainTools whois. EUPI - a hover and expansion module to get information about an URL from the Phishing Initiative project . EQL - an expansion module to generate event query language (EQL) from an attribute. Event Query Language Farsight DNSDB Passive DNS - a hover and expansion module to expand hostname and IP addresses with passive DNS information. GeoIP - a hover and expansion module to get GeoIP information from geolite/maxmind. Greynoise - a hover to get information from greynoise. hashdd - a hover module to check file hashes against hashdd.com including NSLR dataset. hibp - a hover module to lookup against Have I Been Pwned? intel471 - an expansion module to get info from Intel471 . IPASN - a hover and expansion to get the BGP ASN of an IP address. iprep - an expansion module to get IP reputation from packetmail.net. Joe Sandbox submit - Submit files and URLs to Joe Sandbox. Joe Sandbox query - Query Joe Sandbox with the link of an analysis and get the parsed data. macaddress.io - a hover module to retrieve vendor details and other information regarding a given MAC address or an OUI from MAC address Vendor Lookup . See integration tutorial here . macvendors - a hover module to retrieve mac vendor information. ocr-enrich - an enrichment module to get OCRized data from images into MISP. ods-enrich - an enrichment module to get text out of OpenOffice spreadsheet document into MISP (using free-text parser). odt-enrich - an enrichment module to get text out of OpenOffice document into MISP (using free-text parser). onyphe - a modules to process queries on Onyphe. onyphe_full - a modules to process full queries on Onyphe. OTX - an expansion module for OTX . passivetotal - a passivetotal module that queries a number of different PassiveTotal datasets. pdf-enrich - an enrichment module to extract text from PDF into MISP (using free-text parser). pptx-enrich - an enrichment module to get text out of PowerPoint document into MISP (using free-text parser). qrcode - a module decode QR code, barcode and similar codes from an image and enrich with the decoded values. rbl - a module to get RBL (Real-Time Blackhost List) values from an attribute. reversedns - Simple Reverse DNS expansion service to resolve reverse DNS from MISP attributes. securitytrails - an expansion module for securitytrails . shodan - a minimal shodan expansion module. Sigma queries - Experimental expansion module querying a sigma rule to convert it into all the available SIEM signatures. Sigma syntax validator - Sigma syntax validator. sourcecache - a module to cache a specific link from a MISP instance. STIX2 pattern syntax validator - a module to check a STIX2 pattern syntax. ThreatCrowd - an expansion module for ThreatCrowd . threatminer - an expansion module to expand from ThreatMiner . urlhaus - Query urlhaus to get additional data about a domain, hash, hostname, ip or url. urlscan - an expansion module to query urlscan.io . virustotal - an expansion module to query the VirusTotal API with a high request rate limit required. (More details about the API: here ) virustotal_public - an expansion module to query the VirusTotal API with a public key and a low request rate limit. (More details about the API: here ) VMray - a module to submit a sample to VMray. VulnDB - a module to query VulnDB . Vulners - an expansion module to expand information about CVEs using Vulners API. whois - a module to query a local instance of uwhois . wikidata - a wikidata expansion module. xforce - an IBM X-Force Exchange expansion module. xlsx-enrich - an enrichment module to get text out of an Excel document into MISP (using free-text parser). YARA query - a module to create YARA rules from single hash attributes. YARA syntax validator - YARA syntax validator. Export modules \u00b6 CEF module to export Common Event Format (CEF). Cisco FireSight Manager ACL rule module to export as rule for the Cisco FireSight manager ACL. GoAML export module to export in GoAML format . Lite Export module to export a lite event. Mass EQL Export module to export applicable attributes from an event to a mass EQL query. PDF export module to export an event in PDF. Nexthink query format module to export in Nexthink query format. osquery module to export in osquery query format. ThreatConnect module to export in ThreatConnect CSV format. ThreatStream module to export in ThreatStream format. Import modules \u00b6 CSV import Customizable CSV import module. Cuckoo JSON Cuckoo JSON import. Email Import Email import module for MISP to import basic metadata. GoAML import Module to import GoAML XML format. Joe Sandbox import Parse data from a Joe Sandbox json report. OCR Optical Character Recognition (OCR) module for MISP to import attributes from images, scan or faxes. OpenIOC OpenIOC import based on PyMISP library. ThreatAnalyzer - An import module to process ThreatAnalyzer archive.zip/analysis.json sandbox exports. VMRay - An import module to process VMRay export. How to contribute your own module? \u00b6 Fork the project, add your module, test it and make a pull-request. Modules can be also private as you can add a module in your own MISP installation. For further information please see Contribute . Licenses \u00b6 For further Information see also the license file .","title":"Home"},{"location":"#home","text":"MISP modules are autonomous modules that can be used for expansion and other services in MISP . The modules are written in Python 3 following a simple API interface. The objective is to ease the extensions of MISP functionalities without modifying core components. The API is available via a simple REST API which is independent from MISP installation or configuration. MISP modules support is included in MISP starting from version 2.4.28 . For more information: Extending MISP with Python modules slides from MISP training.","title":"Home"},{"location":"#existing-misp-modules","text":"","title":"Existing MISP modules"},{"location":"#expansion-modules","text":"Backscatter.io - a hover and expansion module to expand an IP address with mass-scanning observations. BGP Ranking - a hover and expansion module to expand an AS number with the ASN description, its history, and position in BGP Ranking. BTC scam check - An expansion hover module to instantly check if a BTC address has been abused. BTC transactions - An expansion hover module to get a blockchain balance and the transactions from a BTC address in MISP. CIRCL Passive DNS - a hover and expansion module to expand hostname and IP addresses with passive DNS information. CIRCL Passive SSL - a hover and expansion module to expand IP addresses with the X.509 certificate seen. countrycode - a hover module to tell you what country a URL belongs to. CrowdStrike Falcon - an expansion module to expand using CrowdStrike Falcon Intel Indicator API. CVE - a hover module to give more information about a vulnerability (CVE). CVE advanced - An expansion module to query the CIRCL CVE search API for more information about a vulnerability (CVE). Cuckoo submit - A hover module to submit malware sample, url, attachment, domain to Cuckoo Sandbox. DBL Spamhaus - a hover module to check Spamhaus DBL for a domain name. DNS - a simple module to resolve MISP attributes like hostname and domain to expand IP addresses attributes. docx-enrich - an enrichment module to get text out of Word document into MISP (using free-text parser). DomainTools - a hover and expansion module to get information from DomainTools whois. EUPI - a hover and expansion module to get information about an URL from the Phishing Initiative project . EQL - an expansion module to generate event query language (EQL) from an attribute. Event Query Language Farsight DNSDB Passive DNS - a hover and expansion module to expand hostname and IP addresses with passive DNS information. GeoIP - a hover and expansion module to get GeoIP information from geolite/maxmind. Greynoise - a hover to get information from greynoise. hashdd - a hover module to check file hashes against hashdd.com including NSLR dataset. hibp - a hover module to lookup against Have I Been Pwned? intel471 - an expansion module to get info from Intel471 . IPASN - a hover and expansion to get the BGP ASN of an IP address. iprep - an expansion module to get IP reputation from packetmail.net. Joe Sandbox submit - Submit files and URLs to Joe Sandbox. Joe Sandbox query - Query Joe Sandbox with the link of an analysis and get the parsed data. macaddress.io - a hover module to retrieve vendor details and other information regarding a given MAC address or an OUI from MAC address Vendor Lookup . See integration tutorial here . macvendors - a hover module to retrieve mac vendor information. ocr-enrich - an enrichment module to get OCRized data from images into MISP. ods-enrich - an enrichment module to get text out of OpenOffice spreadsheet document into MISP (using free-text parser). odt-enrich - an enrichment module to get text out of OpenOffice document into MISP (using free-text parser). onyphe - a modules to process queries on Onyphe. onyphe_full - a modules to process full queries on Onyphe. OTX - an expansion module for OTX . passivetotal - a passivetotal module that queries a number of different PassiveTotal datasets. pdf-enrich - an enrichment module to extract text from PDF into MISP (using free-text parser). pptx-enrich - an enrichment module to get text out of PowerPoint document into MISP (using free-text parser). qrcode - a module decode QR code, barcode and similar codes from an image and enrich with the decoded values. rbl - a module to get RBL (Real-Time Blackhost List) values from an attribute. reversedns - Simple Reverse DNS expansion service to resolve reverse DNS from MISP attributes. securitytrails - an expansion module for securitytrails . shodan - a minimal shodan expansion module. Sigma queries - Experimental expansion module querying a sigma rule to convert it into all the available SIEM signatures. Sigma syntax validator - Sigma syntax validator. sourcecache - a module to cache a specific link from a MISP instance. STIX2 pattern syntax validator - a module to check a STIX2 pattern syntax. ThreatCrowd - an expansion module for ThreatCrowd . threatminer - an expansion module to expand from ThreatMiner . urlhaus - Query urlhaus to get additional data about a domain, hash, hostname, ip or url. urlscan - an expansion module to query urlscan.io . virustotal - an expansion module to query the VirusTotal API with a high request rate limit required. (More details about the API: here ) virustotal_public - an expansion module to query the VirusTotal API with a public key and a low request rate limit. (More details about the API: here ) VMray - a module to submit a sample to VMray. VulnDB - a module to query VulnDB . Vulners - an expansion module to expand information about CVEs using Vulners API. whois - a module to query a local instance of uwhois . wikidata - a wikidata expansion module. xforce - an IBM X-Force Exchange expansion module. xlsx-enrich - an enrichment module to get text out of an Excel document into MISP (using free-text parser). YARA query - a module to create YARA rules from single hash attributes. YARA syntax validator - YARA syntax validator.","title":"Expansion modules"},{"location":"#export-modules","text":"CEF module to export Common Event Format (CEF). Cisco FireSight Manager ACL rule module to export as rule for the Cisco FireSight manager ACL. GoAML export module to export in GoAML format . Lite Export module to export a lite event. Mass EQL Export module to export applicable attributes from an event to a mass EQL query. PDF export module to export an event in PDF. Nexthink query format module to export in Nexthink query format. osquery module to export in osquery query format. ThreatConnect module to export in ThreatConnect CSV format. ThreatStream module to export in ThreatStream format.","title":"Export modules"},{"location":"#import-modules","text":"CSV import Customizable CSV import module. Cuckoo JSON Cuckoo JSON import. Email Import Email import module for MISP to import basic metadata. GoAML import Module to import GoAML XML format. Joe Sandbox import Parse data from a Joe Sandbox json report. OCR Optical Character Recognition (OCR) module for MISP to import attributes from images, scan or faxes. OpenIOC OpenIOC import based on PyMISP library. ThreatAnalyzer - An import module to process ThreatAnalyzer archive.zip/analysis.json sandbox exports. VMRay - An import module to process VMRay export.","title":"Import modules"},{"location":"#how-to-contribute-your-own-module","text":"Fork the project, add your module, test it and make a pull-request. Modules can be also private as you can add a module in your own MISP installation. For further information please see Contribute .","title":"How to contribute your own module?"},{"location":"#licenses","text":"For further Information see also the license file .","title":"Licenses"},{"location":"contribute/","text":"How to add your own MISP modules? \u00b6 Create your module in misp_modules/modules/expansion/ , misp_modules/modules/export_mod/ , or misp_modules/modules/import_mod/ . The module should have at minimum three functions: introspection function that returns a dict of the supported attributes (input and output) by your expansion module. handler function which accepts a JSON document to expand the values and return a dictionary of the expanded values. version function that returns a dict with the version and the associated meta-data including potential configurations required of the module. Don't forget to return an error key and value if an error is raised to propagate it to the MISP user-interface. Your module's script name should also be added in the __all__ list of