mirror of https://github.com/MISP/misp-modules
fix: Fixed link in documentation
parent
13d683f7c6
commit
3e5b829bc5
|
@ -1048,7 +1048,7 @@ Module to get advanced information from virustotal.
|
||||||
>
|
>
|
||||||
>A module to take a MISP attribute as input and query the VirusTotal API to get additional data about it.
|
>A module to take a MISP attribute as input and query the VirusTotal API to get additional data about it.
|
||||||
>
|
>
|
||||||
>Compared to the [standard VirusTotal expansion module](https://github.com/MISP/misp-modules/blob/master/misp_modules/modules/expansion/virustotal.py), this module is made for advanced parsing of VirusTotal report, with a recursive analysis of the elements found after the first request.
|
>Compared to the [standard VirusTotal expansion module](https://github.com/MISP/misp-modules/blob/master/misp_modules/modules/expansion/virustotal_public.py), this module is made for advanced parsing of VirusTotal report, with a recursive analysis of the elements found after the first request.
|
||||||
>
|
>
|
||||||
>Thus, it requires a higher request rate limit to avoid the API to return a 204 error (Request rate limit exceeded), and the data parsed from the different requests are returned as MISP attributes and objects, with the corresponding relations between each one of them.
|
>Thus, it requires a higher request rate limit to avoid the API to return a 204 error (Request rate limit exceeded), and the data parsed from the different requests are returned as MISP attributes and objects, with the corresponding relations between each one of them.
|
||||||
- **input**:
|
- **input**:
|
||||||
|
|
|
@ -5,5 +5,5 @@
|
||||||
"input": "A domain, hash (md5, sha1, sha256 or sha512), hostname or IP address attribute.",
|
"input": "A domain, hash (md5, sha1, sha256 or sha512), hostname or IP address attribute.",
|
||||||
"output": "MISP attributes and objects resulting from the parsing of the VirusTotal report concerning the input attribute.",
|
"output": "MISP attributes and objects resulting from the parsing of the VirusTotal report concerning the input attribute.",
|
||||||
"references": ["https://www.virustotal.com/", "https://developers.virustotal.com/reference"],
|
"references": ["https://www.virustotal.com/", "https://developers.virustotal.com/reference"],
|
||||||
"features": "New format of modules able to return attributes and objects.\n\nA module to take a MISP attribute as input and query the VirusTotal API to get additional data about it.\n\nCompared to the [standard VirusTotal expansion module](https://github.com/MISP/misp-modules/blob/master/misp_modules/modules/expansion/virustotal.py), this module is made for advanced parsing of VirusTotal report, with a recursive analysis of the elements found after the first request.\n\nThus, it requires a higher request rate limit to avoid the API to return a 204 error (Request rate limit exceeded), and the data parsed from the different requests are returned as MISP attributes and objects, with the corresponding relations between each one of them."
|
"features": "New format of modules able to return attributes and objects.\n\nA module to take a MISP attribute as input and query the VirusTotal API to get additional data about it.\n\nCompared to the [standard VirusTotal expansion module](https://github.com/MISP/misp-modules/blob/master/misp_modules/modules/expansion/virustotal_public.py), this module is made for advanced parsing of VirusTotal report, with a recursive analysis of the elements found after the first request.\n\nThus, it requires a higher request rate limit to avoid the API to return a 204 error (Request rate limit exceeded), and the data parsed from the different requests are returned as MISP attributes and objects, with the corresponding relations between each one of them."
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue