mirror of https://github.com/MISP/misp-modules
add: Added documentation for the latest new modules
parent
0671f93724
commit
8805bd8649
|
@ -56,6 +56,7 @@ For more information: [Extending MISP with Python modules](https://www.misp-proj
|
||||||
* [Lastline query](misp_modules/modules/expansion/lastline_query.py) - Query Lastline with the link to an analysis and parse the report.
|
* [Lastline query](misp_modules/modules/expansion/lastline_query.py) - Query Lastline with the link to an analysis and parse the report.
|
||||||
* [macaddress.io](misp_modules/modules/expansion/macaddress_io.py) - a hover module to retrieve vendor details and other information regarding a given MAC address or an OUI from [MAC address Vendor Lookup](https://macaddress.io). See [integration tutorial here](https://macaddress.io/integrations/MISP-module).
|
* [macaddress.io](misp_modules/modules/expansion/macaddress_io.py) - a hover module to retrieve vendor details and other information regarding a given MAC address or an OUI from [MAC address Vendor Lookup](https://macaddress.io). See [integration tutorial here](https://macaddress.io/integrations/MISP-module).
|
||||||
* [macvendors](misp_modules/modules/expansion/macvendors.py) - a hover module to retrieve mac vendor information.
|
* [macvendors](misp_modules/modules/expansion/macvendors.py) - a hover module to retrieve mac vendor information.
|
||||||
|
* [MALWAREbazaar](misp_modules/modules/expansion/malwarebazaar.py) - an expansion module to query MALWAREbazaar with some payload.
|
||||||
* [ocr-enrich](misp_modules/modules/expansion/ocr_enrich.py) - an enrichment module to get OCRized data from images into MISP.
|
* [ocr-enrich](misp_modules/modules/expansion/ocr_enrich.py) - an enrichment module to get OCRized data from images into MISP.
|
||||||
* [ods-enrich](misp_modules/modules/expansion/ods_enrich.py) - an enrichment module to get text out of OpenOffice spreadsheet document into MISP (using free-text parser).
|
* [ods-enrich](misp_modules/modules/expansion/ods_enrich.py) - an enrichment module to get text out of OpenOffice spreadsheet document into MISP (using free-text parser).
|
||||||
* [odt-enrich](misp_modules/modules/expansion/odt_enrich.py) - an enrichment module to get text out of OpenOffice document into MISP (using free-text parser).
|
* [odt-enrich](misp_modules/modules/expansion/odt_enrich.py) - an enrichment module to get text out of OpenOffice document into MISP (using free-text parser).
|
||||||
|
|
|
@ -295,6 +295,24 @@ An expansion hover module to expand information about CVE id.
|
||||||
|
|
||||||
-----
|
-----
|
||||||
|
|
||||||
|
#### [cytomic_orion.py](https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/cytomic_orion.py.py)
|
||||||
|
|
||||||
|
<img src=logos/cytomic_orion.png height=60>
|
||||||
|
|
||||||
|
An expansion module to enrich attributes in MISP by quering the Cytomic Orion API
|
||||||
|
- **features**:
|
||||||
|
>This module takes an MD5 hash and searches for occurrences of this hash in the Cytomic Orion database. Returns observed files and machines.
|
||||||
|
- **input**:
|
||||||
|
>MD5, hash of the sample / malware to search for.
|
||||||
|
- **output**:
|
||||||
|
>MISP objects with sightings of the hash in Cytomic Orion. Includes files and machines.
|
||||||
|
- **references**:
|
||||||
|
>https://www.vanimpe.eu/2020/03/10/integrating-misp-and-cytomic-orion/, https://www.cytomicmodel.com/solutions/
|
||||||
|
- **requirements**:
|
||||||
|
>Access (license) to Cytomic Orion
|
||||||
|
|
||||||
|
-----
|
||||||
|
|
||||||
#### [dbl_spamhaus](https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/dbl_spamhaus.py)
|
#### [dbl_spamhaus](https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/dbl_spamhaus.py)
|
||||||
|
|
||||||
<img src=logos/spamhaus.jpg height=60>
|
<img src=logos/spamhaus.jpg height=60>
|
||||||
|
@ -681,6 +699,22 @@ Module to access Macvendors API.
|
||||||
|
|
||||||
-----
|
-----
|
||||||
|
|
||||||
|
#### [malwarebazaar](https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/malwarebazaar.py)
|
||||||
|
|
||||||
|
Query the MALWAREbazaar API to get additional information about the input hash attribute.
|
||||||
|
- **features**:
|
||||||
|
>The module takes a hash attribute as input and queries MALWAREbazaar's API to fetch additional data about it. The result, if the payload is known on the databases, is at least one file object describing the file the input hash is related to.
|
||||||
|
>
|
||||||
|
>The module is using the new format of modules able to return object since the result is one or multiple MISP object(s).
|
||||||
|
- **input**:
|
||||||
|
>A hash attribute (md5, sha1 or sha256).
|
||||||
|
- **output**:
|
||||||
|
>File object(s) related to the input attribute found on MALWAREbazaar databases.
|
||||||
|
- **references**:
|
||||||
|
>https://bazaar.abuse.ch/
|
||||||
|
|
||||||
|
-----
|
||||||
|
|
||||||
#### [ocr-enrich](https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/ocr-enrich.py)
|
#### [ocr-enrich](https://github.com/MISP/misp-modules/tree/master/misp_modules/modules/expansion/ocr-enrich.py)
|
||||||
|
|
||||||
Module to process some optical character recognition on pictures.
|
Module to process some optical character recognition on pictures.
|
||||||
|
|
|
@ -0,0 +1,8 @@
|
||||||
|
{
|
||||||
|
"description": "Query the MALWAREbazaar API to get additional information about the input hash attribute.",
|
||||||
|
"requirements": [],
|
||||||
|
"input": "A hash attribute (md5, sha1 or sha256).",
|
||||||
|
"output": "File object(s) related to the input attribute found on MALWAREbazaar databases.",
|
||||||
|
"references": ["https://bazaar.abuse.ch/"],
|
||||||
|
"features": "The module takes a hash attribute as input and queries MALWAREbazaar's API to fetch additional data about it. The result, if the payload is known on the databases, is at least one file object describing the file the input hash is related to.\n\nThe module is using the new format of modules able to return object since the result is one or multiple MISP object(s)."
|
||||||
|
}
|
Loading…
Reference in New Issue