Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature/update docs #947

Merged
merged 44 commits into from
Feb 26, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
44 commits
Select commit Hold shift + click to select a range
cdc1700
abuseipdb
dadokkio Feb 2, 2021
b3db0d2
AnyRun
dadokkio Feb 2, 2021
6ebda02
Censys
dadokkio Feb 2, 2021
467c2a1
Crt.sh
dadokkio Feb 2, 2021
cc357a8
cuckoosandbox
dadokkio Feb 2, 2021
d9b7549
Merge branch 'develop' of https://github.com/TheHive-Project/Cortex-A…
dadokkio Feb 2, 2021
e853226
Cyberchef
dadokkio Feb 2, 2021
d016218
cybercrime
dadokkio Feb 2, 2021
38a830f
cyberprotect
dadokkio Feb 2, 2021
7b4484d
dshield
dadokkio Feb 2, 2021
7d67454
EmailRep
dadokkio Feb 2, 2021
8c03e1b
FireHOL
dadokkio Feb 2, 2021
b5087a2
Fortiguard
dadokkio Feb 2, 2021
6e5b644
greynoise
dadokkio Feb 2, 2021
eee7658
Merge branch 'develop' of https://github.com/TheHive-Project/Cortex-A…
dadokkio Feb 2, 2021
4a4a71b
hashdd
dadokkio Feb 2, 2021
a711fa5
Merge branch 'develop' of https://github.com/TheHive-Project/Cortex-A…
dadokkio Feb 3, 2021
fe8ef06
greynose template fix
dadokkio Feb 3, 2021
c2f60ef
Intezer
dadokkio Feb 4, 2021
63f2b61
rename txt in md
dadokkio Feb 4, 2021
ca25b7b
hunter.io
dadokkio Feb 4, 2021
77608d3
Merge branch 'develop' of https://github.com/TheHive-Project/Cortex-A…
dadokkio Feb 4, 2021
2b99c62
fix ipinfo template path
dadokkio Feb 4, 2021
617280c
Maltiverse
dadokkio Feb 4, 2021
7334c05
Malwarebazaar
dadokkio Feb 4, 2021
10032a4
Malwares
dadokkio Feb 4, 2021
3d201f5
nerd readme, small fixes
dadokkio Feb 5, 2021
f00c9af
OTX
dadokkio Feb 5, 2021
a16db95
Merge branch 'develop' of https://github.com/TheHive-Project/Cortex-A…
dadokkio Feb 5, 2021
33a14e7
fix in malwarebazaar
garanews Feb 5, 2021
ed314f9
Merge branch 'feature/update_docs' of https://github.com/TheHive-Proj…
dadokkio Feb 5, 2021
2acc69a
PhishingInitiative
dadokkio Feb 5, 2021
03becbb
PhishTank
dadokkio Feb 5, 2021
121b430
Merge branch 'develop' of https://github.com/TheHive-Project/Cortex-A…
dadokkio Feb 5, 2021
130a2e4
MISP
garanews Feb 5, 2021
9bd3b24
MISPWarningLists
garanews Feb 8, 2021
4f9db26
VirusShare
garanews Feb 8, 2021
744f478
EmergingThreats
garanews Feb 8, 2021
be18568
fix virusshare url
garanews Feb 8, 2021
e0821e2
add cortexutils where missing
garanews Feb 9, 2021
a73e032
import requests
garanews Feb 9, 2021
74b7c2a
fix json errors
dadokkio Feb 26, 2021
c880ea8
Merge branch 'feature/update_docs' of https://github.com/TheHive-Proj…
dadokkio Feb 26, 2021
8a53a1b
fix caption: and missing property for ProofPoint
dadokkio Feb 26, 2021
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 15 additions & 1 deletion analyzers/AbuseIPDB/AbuseIPDB.json
Original file line number Diff line number Diff line change
Expand Up @@ -29,5 +29,19 @@
"check_tlp": true,
"max_tlp": 2,
"auto_extract": false
}
},
"registration_required": true,
"subscription_required": true,
"free_subscription": true,
"service_homepage": "https://www.abuseipdb.com/",
"service_logo": {
"path": "assets/abuseipdb.png",
"caption": "abuseipdb logo"
},
"screenshots": [
{
"path": "assets/long_report.png",
"caption": "AbuseIPDB: Long report template"
}
]
}
10 changes: 10 additions & 0 deletions analyzers/AbuseIPDB/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
### AbuseIPDB
[AbuseIPDB](https://www.abuseipdb.com/) is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet.

The analyzer comes in only one flavor.

#### Requirements
You need a valid AbuseIPDB API integration subscription to use the analyzer:

- Provide your API key as a value for the `key` parameter.
- Set the `days` parameter to limit temporal range in search
Binary file added analyzers/AbuseIPDB/assets/abuseipdb.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added analyzers/AbuseIPDB/assets/long_report.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
19 changes: 19 additions & 0 deletions analyzers/AnyRun/AnyRun_Sandbox_Analysis.json
Original file line number Diff line number Diff line change
Expand Up @@ -32,5 +32,24 @@
"required": true,
"defaultValue": true
}
],
"registration_required": true,
"subscription_required": true,
"free_subscription": false,
"service_homepage": "https://any.run/",
"service_logo": {
"path": "assets/anyrun.png",
"caption": "AnyRun logo"
},
"screenshots": [
{
"path": "assets/short_report.png",
"caption": "AnyRun: Short report template"
},

{
"path": "assets/long_report.png",
"caption": "AnyRun: Long report template"
}
]
}
15 changes: 15 additions & 0 deletions analyzers/AnyRun/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
### AnyRun
[ANY.RUN](https://any.run/) is a malware sandbox service in the cloud. By using this analyzer, an analyst can submit a suspicious file or URL to the service for analysis and get a report. The report can contain various information such as:

- Interactive access
- Research threats by filter in public submissions
- File and URL dynamic analysis
- Mitre ATT&CK mapping
- Detailed malware reports

#### Requirements
You need a valid AnyRun API integration subscription to use the analyzer. Free plan does not provide API access.

- Provide your API token as a value for the `token` parameter.
- Define the privacy setting in `privacy_type` parameter.
- Set `verify_ssl` parameter as false if you connection requires it
Binary file added analyzers/AnyRun/assets/AnyRun.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added analyzers/AnyRun/assets/long_report.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added analyzers/AnyRun/assets/short_report.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
14 changes: 14 additions & 0 deletions analyzers/Censys/Censys.json
Original file line number Diff line number Diff line change
Expand Up @@ -23,5 +23,19 @@
"multi": false,
"required": true
}
],
"registration_required": true,
"subscription_required": true,
"free_subscription": true,
"service_homepage": "https://censys.io/",
"service_logo": {
"path": "assets/censys.png",
"caption": "Censys logo"
},
"screenshots": [
{
"path": "assets/long_report.png",
"caption": "Censys: Long report template"
}
]
}
8 changes: 8 additions & 0 deletions analyzers/Censys/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,8 @@
### Censys
[Censys](https://censys.io/) is a platform that helps information security practitioners discover, monitor, and analyze devices that are accessible from the Internet. Regularly probes every public IP address and popular domain names, curate and enrich the resulting data, and make it intelligible through an interactive search engine and API.

#### Requirements
You need a valid Censys API integration subscription to use the analyzer.

- Provide your API uid as values for the `uid` parameter.
- Provide your API key as values for the `key` parameter.
Binary file added analyzers/Censys/assets/censys.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added analyzers/Censys/assets/long_report.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
20 changes: 16 additions & 4 deletions analyzers/Crtsh/Crtsh.json
Original file line number Diff line number Diff line change
Expand Up @@ -6,13 +6,25 @@
"version": "1.0",
"baseConfig": "Crtsh",
"config": {
"check_tlp": false,
"max_tlp": 3
"check_tlp": false,
"max_tlp": 3
},
"description": "Query domains against the certificate transparency lists available at crt.sh.",
"dataTypeList": ["domain"],
"command": "Crtsh/crtshquery.py",
"configurationItems": [
"configurationItems": [],
"registration_required": true,
"subscription_required": true,
"free_subscription": true,
"service_homepage": "https://crt.sh/",
"service_logo": {
"path": "assets/logo.png",
"caption": "Sectigo logo"
},
"screenshots": [
{
"path": "assets/long_report.png",
"caption": "Crt: Long report template"
}
]

}
5 changes: 5 additions & 0 deletions analyzers/Crtsh/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
### Crtsh
[Crtsh](https://crt.sh/) is a platform that permits you search for certificates that have been logged by CT.

#### Requirements
It does not require any requirements.
Binary file added analyzers/Crtsh/assets/logo.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added analyzers/Crtsh/assets/long_report.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
16 changes: 15 additions & 1 deletion analyzers/CuckooSandbox/CuckooSandbox_File_Analysis.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "CuckooSandbox_File_Analysis_Inet",
"version": "1.2",
"author": "Andrea Garavaglia, LDO-CERT",
"url": "https://github.com/garanews/Cortex-Analyzers",
"url": "https://github.com/TheHive-Project/Cortex-Analyzers",
"license": "AGPL-V3",
"description": "Cuckoo Sandbox file analysis with Internet access.",
"dataTypeList": ["file"],
Expand Down Expand Up @@ -38,5 +38,19 @@
"multi": false,
"required": false
}
],
"registration_required": false,
"subscription_required": false,
"free_subscription": false,
"service_homepage": "https://cuckoosandbox.org/",
"service_logo": {
"path": "assets/cuckoosandbox.png",
"caption": "CuckooSandbox logo"
},
"screenshots": [
{
"path": "assets/long_report.png",
"caption": "CuckooSandbox: Long report template"
}
]
}
17 changes: 15 additions & 2 deletions analyzers/CuckooSandbox/CuckooSandbox_Url_Analysis.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"name": "CuckooSandbox_Url_Analysis",
"version": "1.2",
"author": "Andrea Garavaglia, LDO-CERT",
"url": "https://github.com/garanews/Cortex-Analyzers",
"url": "https://github.com/TheHive-Project/Cortex-Analyzers",
"license": "AGPL-V3",
"description": "Cuckoo Sandbox URL analysis.",
"dataTypeList": ["url"],
Expand Down Expand Up @@ -38,6 +38,19 @@
"multi": false,
"required": false
}
],
"registration_required": false,
"subscription_required": false,
"free_subscription": false,
"service_homepage": "https://cuckoosandbox.org/",
"service_logo": {
"path": "assets/cuckoosandbox.png",
"caption": "CuckooSandbox logo"
},
"screenshots": [
{
"path": "assets/long_report.png",
"caption": "CuckooSandbox: Long report template"
}
]

}
17 changes: 17 additions & 0 deletions analyzers/CuckooSandbox/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
### CuckooSandbox

[CuckooSandbox](https://cuckoosandbox.org/) is an advanced, extremely modular, and 100% open source automated malware analysis system with infinite application opportunities.

- Analyze many different malicious files (executables, office documents, pdf files, emails, etc) as well as malicious websites under Windows, Linux, macOS, and Android virtualized environments.
- Trace API calls and general behavior of the file and distill this into high level information and signatures comprehensible by anyone.
- Dump and analyze network traffic, even when encrypted with SSL/TLS. With native network routing support to drop all traffic or route it through InetSIM, a network interface, or a VPN.
- Perform advanced memory analysis of the infected virtualized system through Volatility as well as on a process memory granularity using YARA.

The analyzer comes in two different flavour to analzye url or file with internet access.

#### Requirements

You need to have your cuckoosandox deployed in your infrastructure. You can download it and follow installation instructions.

The address of the machine must be se as `url` parameter and relative token as the value for the `token` parameter.
Depending on your network configuration you can configure `verifyssl` and `cert_path` accordingly.
Binary file added analyzers/CuckooSandbox/assets/cuckoosandbox.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added analyzers/CuckooSandbox/assets/long_report.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
58 changes: 36 additions & 22 deletions analyzers/CyberChef/CyberChef_FromBase64.json
Original file line number Diff line number Diff line change
@@ -1,24 +1,38 @@
{
"name": "CyberChef_FromBase64",
"version": "1.0",
"author": "Wes Lambert",
"url": "https://github.com/TheHive-Project/Cortex-Analyzers",
"license": "AGPL-V3",
"description": "Convert Base64 with CyberChef Server",
"dataTypeList": ["other"],
"baseConfig": "CyberChef",
"config": {
"service": "FromBase64"
},
"command": "CyberChef/cyberchef.py",
"configurationItems": [
{
"name": "url",
"description": "CyberChef Server URL",
"type": "string",
"multi": false,
"required": true,
"defaultValue": "http://192.168.1.178:3000/"
}
]
"name": "CyberChef_FromBase64",
"version": "1.0",
"author": "Wes Lambert",
"url": "https://github.com/TheHive-Project/Cortex-Analyzers",
"license": "AGPL-V3",
"description": "Convert Base64 with CyberChef Server",
"dataTypeList": ["other"],
"baseConfig": "CyberChef",
"config": {
"service": "FromBase64"
},
"command": "CyberChef/cyberchef.py",
"configurationItems": [
{
"name": "url",
"description": "CyberChef Server URL",
"type": "string",
"multi": false,
"required": true,
"defaultValue": "http://192.168.1.178:3000/"
}
],
"registration_required": false,
"subscription_required": false,
"free_subscription": false,
"service_homepage": "https://github.com/gchq/CyberChef-server",
"service_logo": {
"path": "assets/cyberchef.png",
"caption": "logo"
},
"screenshots": [
{
"path": "assets/long_report.png",
"caption": "Cyberchef: long report"
}
]
}
58 changes: 36 additions & 22 deletions analyzers/CyberChef/CyberChef_FromCharCode.json
Original file line number Diff line number Diff line change
@@ -1,24 +1,38 @@
{
"name": "CyberChef_FromCharCode",
"version": "1.0",
"author": "Wes Lambert",
"url": "https://github.com/TheHive-Project/Cortex-Analyzers",
"license": "AGPL-V3",
"description": "Convert Char Code with CyberChef Server",
"dataTypeList": ["other"],
"baseConfig": "CyberChef",
"config": {
"service": "FromCharCode"
},
"command": "CyberChef/cyberchef.py",
"configurationItems": [
{
"name": "url",
"description": "CyberChef Server URL",
"type": "string",
"multi": false,
"required": true,
"defaultValue": "http://192.168.1.178:3000/"
}
]
"name": "CyberChef_FromCharCode",
"version": "1.0",
"author": "Wes Lambert",
"url": "https://github.com/TheHive-Project/Cortex-Analyzers",
"license": "AGPL-V3",
"description": "Convert Char Code with CyberChef Server",
"dataTypeList": ["other"],
"baseConfig": "CyberChef",
"config": {
"service": "FromCharCode"
},
"command": "CyberChef/cyberchef.py",
"configurationItems": [
{
"name": "url",
"description": "CyberChef Server URL",
"type": "string",
"multi": false,
"required": true,
"defaultValue": "http://192.168.1.178:3000/"
}
],
"registration_required": false,
"subscription_required": false,
"free_subscription": false,
"service_homepage": "https://github.com/gchq/CyberChef-server",
"service_logo": {
"path": "assets/cyberchef.png",
"caption": "logo"
},
"screenshots": [
{
"path": "assets/long_report.png",
"caption": "Cyberchef: long report"
}
]
}
Loading