This module takes an IP address attribute as input and queries the database from packetmail.net to get some information about the reputation of the IP.
+- config:
+apikey
- input:
An IP address MISP attribute.
- output:
@@ -3124,16 +3423,25 @@
Query Joe Sandbox API with a submission url to get the json report and extract its data that is parsed and converted into MISP attributes and objects.
-Query Joe Sandbox API with a submission url to get the json report and extract its data that is parsed and converted into MISP attributes and objects.
- features:
Module using the new format of modules able to return attributes and objects.
The module returns the same results as the import module joe_import taking directly the json report as input.
Even if the introspection will allow all kinds of links to call this module, obviously only the ones presenting a sample or url submission in the Joe Sandbox API will return results.
To make it work you will need to fill the 'apikey' configuration with your Joe Sandbox API key and provide a valid link as input.
+- config:
+- apiurl
+- apikey
+- import_executable
+- import_mitre_attack
- input:
Link of a Joe Sandbox sample or url submission.
- output:
@@ -3145,13 +3453,19 @@
+
A module to submit files or URLs to Joe Sandbox for an advanced analysis, and return the link of the submission.
- features:
The module requires a Joe Sandbox API key to submit files or URL, and returns the link of the submitted analysis.
It is then possible, when the analysis is completed, to query the Joe Sandbox API to get the data related to the analysis, using the joesandbox_query module directly on this submission link.
+- config:
+- apiurl
+- apikey
+- accept-tac
+- report-cache
+- systems
- input:
Sample, url (or domain) to submit to Joe Sandbox for an advanced analysis.
- output:
@@ -3163,16 +3477,19 @@
+
Deprecation notice: this module will be deprecated by December 2021, please use vmware_nsx module.
Query Lastline with an analysis link and parse the report into MISP attributes and objects.
-The analysis link can also be retrieved from the output of the lastline_submit expansion module.
- features:
The module requires a Lastline Portal username
and password
.
The module uses the new format and it is able to return MISP attributes and objects.
The module returns the same results as the lastline_import import module.
+- config:
+- username
+- password
+- verify_ssl
- input:
Link to a Lastline analysis.
- output:
@@ -3181,7 +3498,7 @@
-
+
Deprecation notice: this module will be deprecated by December 2021, please use vmware_nsx module.
Module to submit a file or URL to Lastline.
@@ -3189,6 +3506,10 @@
lastline_query module.
+- config:
+- url
+- api_token
+- key
- input:
File or URL to submit to Lastline.
- output:
@@ -3197,7 +3518,7 @@
-
+
MISP hover module for macaddress.io
- features:
@@ -3207,6 +3528,8 @@
+
Module to access Macvendors API.
- features:
The module takes a MAC address as input and queries macvendors.com for some information about it. The API returns the name of the vendor related to the address.
+- config:
+user-agent
- input:
A MAC address.
- output:
@@ -3234,8 +3559,8 @@
-
-Query the MALWAREbazaar API to get additional information about the input hash attribute.
+
+Query Malware Bazaar to get additional information about the input hash.
- features:
The module takes a hash attribute as input and queries MALWAREbazaar's API to fetch additional data about it. The result, if the payload is known on the databases, is at least one file object describing the file the input hash is related to.
@@ -3248,7 +3573,19 @@
-
+
+Lookup McAfee MVISION Insights Details
+- features:
+
+
+- config:
+- api_key
+- client_id
+- client_secret
+
+
+
+
A hover and expansion module to enrich an ip with geolocation and ASN information from an mmdb server instance, such as CIRCL's ip.circl.lu.
- features:
@@ -3256,6 +3593,9 @@