mirror of
https://github.com/valitydev/Cortex-Analyzers.git
synced 2024-11-06 09:05:19 +00:00
Rework the issue template to make it easier to use.
This commit is contained in:
parent
0705cd61ae
commit
3e37a4354a
2
.gitignore
vendored
2
.gitignore
vendored
@ -5,3 +5,5 @@ thehive-templates/*.sh
|
|||||||
|
|
||||||
.idea
|
.idea
|
||||||
.DS_Store
|
.DS_Store
|
||||||
|
|
||||||
|
Cortex-analyzers.iml
|
||||||
|
@ -1,6 +1,9 @@
|
|||||||
#!/usr/bin/env python
|
#!/usr/bin/env python
|
||||||
# -*- coding: utf-8 -*-
|
# -*- coding: utf-8 -*
|
||||||
|
"""This analyzer leverages abuse_finder, an Open Source Python library provided by CERT Société Générale to help
|
||||||
|
automatically find the most appropriate contact for abuse reports.
|
||||||
|
See https://github.com/certsocietegenerale/abuse_finder for further reference.
|
||||||
|
"""
|
||||||
|
|
||||||
import sys
|
import sys
|
||||||
import json
|
import json
|
||||||
@ -32,7 +35,7 @@ class AbuseFinderAnalyzer(Analyzer):
|
|||||||
elif self.data_type == "url":
|
elif self.data_type == "url":
|
||||||
return url_abuse(self.getData())
|
return url_abuse(self.getData())
|
||||||
else:
|
else:
|
||||||
self.error("datatype not handled")
|
self.error("invalid datatype")
|
||||||
|
|
||||||
def run(self):
|
def run(self):
|
||||||
self.report({'abuse_finder':self.abuse()})
|
self.report({'abuse_finder':self.abuse()})
|
||||||
|
@ -68,9 +68,9 @@ class CIRCLPassiveDNSAnalyzer(Analyzer):
|
|||||||
elif self.data_type == 'domain':
|
elif self.data_type == 'domain':
|
||||||
query = self.getData()
|
query = self.getData()
|
||||||
if '/' in query:
|
if '/' in query:
|
||||||
self.error('\'/\' in domain. use url data type instead.')
|
self.error('\'/\' found in the supplied domain. use the URL datatype instead')
|
||||||
else:
|
else:
|
||||||
self.error('Incompatible data type.')
|
self.error('invalid datatype')
|
||||||
self.report({'results': self.query(query)})
|
self.report({'results': self.query(query)})
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
|
@ -9,7 +9,7 @@
|
|||||||
"check_tlp": false,
|
"check_tlp": false,
|
||||||
"max_tlp": 3
|
"max_tlp": 3
|
||||||
},
|
},
|
||||||
"description": "Check if this IOC has been processed in different MISP instances.",
|
"description": "Query multiple MISP instances for events containing an observable.",
|
||||||
"dataTypeList": ["domain", "ip", "url", "fqdn", "uri_path","user-agent", "hash", "email", "mail", "mail_subject" , "registry", "regexp", "other", "filename"],
|
"dataTypeList": ["domain", "ip", "url", "fqdn", "uri_path","user-agent", "hash", "email", "mail", "mail_subject" , "registry", "regexp", "other", "filename"],
|
||||||
"command": "MISP/misp.py"
|
"command": "MISP/misp.py"
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user