mirror of https://github.com/MISP/misp-modules
support url analyses
parent
380b8d46ba
commit
9377a892f4
|
@ -64,11 +64,16 @@ class JoeParser():
|
||||||
self.process_references = {}
|
self.process_references = {}
|
||||||
|
|
||||||
def parse_joe(self):
|
def parse_joe(self):
|
||||||
self.parse_fileinfo()
|
if self.analysis_type() == "file":
|
||||||
|
self.parse_fileinfo()
|
||||||
|
else:
|
||||||
|
self.parse_url_analysis()
|
||||||
|
|
||||||
self.parse_system_behavior()
|
self.parse_system_behavior()
|
||||||
self.parse_network_behavior()
|
self.parse_network_behavior()
|
||||||
self.parse_network_interactions()
|
self.parse_network_interactions()
|
||||||
self.parse_dropped_files()
|
self.parse_dropped_files()
|
||||||
|
|
||||||
if self.attributes:
|
if self.attributes:
|
||||||
self.handle_attributes()
|
self.handle_attributes()
|
||||||
if self.references:
|
if self.references:
|
||||||
|
@ -137,7 +142,7 @@ class JoeParser():
|
||||||
for protocol in data.keys():
|
for protocol in data.keys():
|
||||||
network_connection_object.add_attribute('layer{}-protocol'.format(protocols[protocol]), **{'type': 'text', 'value': protocol})
|
network_connection_object.add_attribute('layer{}-protocol'.format(protocols[protocol]), **{'type': 'text', 'value': protocol})
|
||||||
self.misp_event.add_object(**network_connection_object)
|
self.misp_event.add_object(**network_connection_object)
|
||||||
self.references[self.fileinfo_uuid].append({'idref': network_connection_object.uuid, 'relationship': 'initiates'})
|
self.references[self.analysisinfo_uuid].append({'idref': network_connection_object.uuid, 'relationship': 'initiates'})
|
||||||
else:
|
else:
|
||||||
for protocol, timestamps in data.items():
|
for protocol, timestamps in data.items():
|
||||||
network_connection_object = MISPObject('network-connection')
|
network_connection_object = MISPObject('network-connection')
|
||||||
|
@ -146,7 +151,7 @@ class JoeParser():
|
||||||
network_connection_object.add_attribute('first-packet-seen', **{'type': 'datetime', 'value': min(timestamps)})
|
network_connection_object.add_attribute('first-packet-seen', **{'type': 'datetime', 'value': min(timestamps)})
|
||||||
network_connection_object.add_attribute('layer{}-protocol'.format(protocols[protocol]), **{'type': 'text', 'value': protocol})
|
network_connection_object.add_attribute('layer{}-protocol'.format(protocols[protocol]), **{'type': 'text', 'value': protocol})
|
||||||
self.misp_event.add_object(**network_connection_object)
|
self.misp_event.add_object(**network_connection_object)
|
||||||
self.references[self.fileinfo_uuid].append({'idref': network_connection_object.uuid, 'relationship': 'initiates'})
|
self.references[self.analysisinfo_uuid].append({'idref': network_connection_object.uuid, 'relationship': 'initiates'})
|
||||||
|
|
||||||
def parse_system_behavior(self):
|
def parse_system_behavior(self):
|
||||||
system = self.data['behavior']['system']
|
system = self.data['behavior']['system']
|
||||||
|
@ -163,7 +168,7 @@ class JoeParser():
|
||||||
self.misp_event.add_object(**process_object)
|
self.misp_event.add_object(**process_object)
|
||||||
for field, to_call in process_activities.items():
|
for field, to_call in process_activities.items():
|
||||||
to_call(process_object.uuid, process[field])
|
to_call(process_object.uuid, process[field])
|
||||||
self.references[self.fileinfo_uuid].append({'idref': process_object.uuid, 'relationship': 'calls'})
|
self.references[self.analysisinfo_uuid].append({'idref': process_object.uuid, 'relationship': 'calls'})
|
||||||
self.process_references[(general['targetid'], general['path'])] = process_object.uuid
|
self.process_references[(general['targetid'], general['path'])] = process_object.uuid
|
||||||
|
|
||||||
def parse_fileactivities(self, process_uuid, fileactivities):
|
def parse_fileactivities(self, process_uuid, fileactivities):
|
||||||
|
@ -176,15 +181,36 @@ class JoeParser():
|
||||||
for call in files['call']:
|
for call in files['call']:
|
||||||
self.attributes['filename'][call['path']].add((process_uuid, file_references_mapping[feature]))
|
self.attributes['filename'][call['path']].add((process_uuid, file_references_mapping[feature]))
|
||||||
|
|
||||||
|
def analysis_type(self):
|
||||||
|
generalinfo = self.data['generalinfo']
|
||||||
|
|
||||||
|
if generalinfo['target']['sample']:
|
||||||
|
return "file"
|
||||||
|
elif generalinfo['target']['url']:
|
||||||
|
return "url"
|
||||||
|
else:
|
||||||
|
raise Exception("Unknown analysis type")
|
||||||
|
|
||||||
|
def parse_url_analysis(self):
|
||||||
|
generalinfo = self.data["generalinfo"]
|
||||||
|
|
||||||
|
url_object = MISPObject("url")
|
||||||
|
self.analysisinfo_uuid = url_object.uuid
|
||||||
|
|
||||||
|
url_object.add_attribute("url", generalinfo["target"]["url"])
|
||||||
|
self.misp_event.add_object(**url_object)
|
||||||
|
|
||||||
def parse_fileinfo(self):
|
def parse_fileinfo(self):
|
||||||
fileinfo = self.data['fileinfo']
|
fileinfo = self.data['fileinfo']
|
||||||
|
|
||||||
file_object = MISPObject('file')
|
file_object = MISPObject('file')
|
||||||
|
self.analysisinfo_uuid = file_object.uuid
|
||||||
|
|
||||||
for field in file_object_fields:
|
for field in file_object_fields:
|
||||||
file_object.add_attribute(field, **{'type': field, 'value': fileinfo[field]})
|
file_object.add_attribute(field, **{'type': field, 'value': fileinfo[field]})
|
||||||
for field, mapping in file_object_mapping.items():
|
for field, mapping in file_object_mapping.items():
|
||||||
attribute_type, object_relation = mapping
|
attribute_type, object_relation = mapping
|
||||||
file_object.add_attribute(object_relation, **{'type': attribute_type, 'value': fileinfo[field]})
|
file_object.add_attribute(object_relation, **{'type': attribute_type, 'value': fileinfo[field]})
|
||||||
self.fileinfo_uuid = file_object.uuid
|
|
||||||
if not fileinfo.get('pe'):
|
if not fileinfo.get('pe'):
|
||||||
self.misp_event.add_object(**file_object)
|
self.misp_event.add_object(**file_object)
|
||||||
return
|
return
|
||||||
|
|
Loading…
Reference in New Issue