mirror of https://github.com/MISP/misp-modules
chg: [joesandbox_query] Changed the `import_pe` param to `import_executable`
parent
cba06ab372
commit
c5b6d218bb
|
@ -11,7 +11,7 @@ inputSource = ['link']
|
||||||
moduleinfo = {'version': '0.2', 'author': 'Christian Studer',
|
moduleinfo = {'version': '0.2', 'author': 'Christian Studer',
|
||||||
'description': 'Query Joe Sandbox API with a report URL to get the parsed data.',
|
'description': 'Query Joe Sandbox API with a report URL to get the parsed data.',
|
||||||
'module-type': ['expansion']}
|
'module-type': ['expansion']}
|
||||||
moduleconfig = ['apiurl', 'apikey', 'import_pe', 'import_mitre_attack']
|
moduleconfig = ['apiurl', 'apikey', 'import_executable', 'import_mitre_attack']
|
||||||
|
|
||||||
|
|
||||||
def handler(q=False):
|
def handler(q=False):
|
||||||
|
@ -21,7 +21,7 @@ def handler(q=False):
|
||||||
apiurl = request['config'].get('apiurl') or 'https://jbxcloud.joesecurity.org/api'
|
apiurl = request['config'].get('apiurl') or 'https://jbxcloud.joesecurity.org/api'
|
||||||
apikey = request['config'].get('apikey')
|
apikey = request['config'].get('apikey')
|
||||||
parser_config = {
|
parser_config = {
|
||||||
"import_pe": request["config"].get('import_pe', "false") == "true",
|
"import_pe": request["config"].get('import_executable', "false") == "true",
|
||||||
"mitre_attack": request["config"].get('import_mitre_attack', "false") == "true",
|
"mitre_attack": request["config"].get('import_mitre_attack', "false") == "true",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue