From e0d8462227d61319cc5bfe9f1211812e05adb084 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Wed, 9 Mar 2016 07:25:54 +0100 Subject: [PATCH] Example of module introspection including meta information --- README.md | 36 ++++++++++++++++++++++++++++++------ 1 file changed, 30 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index e434fee..2346bd4 100644 --- a/README.md +++ b/README.md @@ -36,21 +36,45 @@ MISP uses the **modules** function to discover the available MISP modules and th [ { "mispattributes": { + "input": [ + "hostname", + "domain", + "ip-src", + "ip-dst", + "module-username", + "module-password" + ], "output": [ "ip-src", - "ip-dst" - ], - "input": [ + "ip-dst", "hostname", "domain" ] }, - "type": "expansion", + "meta": "0.1", + "name": "passivetotal", + "type": "expansion" + }, + { + "mispattributes": { + "input": [ + "hostname", + "domain" + ], + "output": [ + "ip-src", + "ip-dst" + ] + }, + "meta": { + "description": "Simple DNS expansion services to resolve IP address from MISP attributes", + "version": "0.1", + "author": "Alexandre Dulaunoy" + }, "name": "dns", - "version": "0.1" + "type": "expansion" } ] - ~~~ The MISP module service returns the available modules in a JSON array containing each module name along with their supported input attributes.