-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ANY.RUN: Bugfix/Bump - Bugfixes, new TI features and dependencies updates #7
base: next
Are you sure you want to change the base?
ANY.RUN: Bugfix/Bump - Bugfixes, new TI features and dependencies updates #7
Conversation
Rename incorrect `team` value of parameter `opt_privacy_type` in `detonate` actions. The value must be `byteam`.
… to API Currently ANY.RUN Threat Intelligence API takes only major versions of OS as values in `os` parameter. OS names must be stripped from parameter's value, passed from the SOAR UI.
Add support for `Ubuntu 22.04.2` value of parameter `os` in `get intelligence` action.
Add support for new values of parameter `suricataclass` in `get intelligence` action. The following new values have been added: - Attempted User Privilege Gain - Domain Observed Used for C2 Detected - Executable code was detected - Exploit Kit Activity Detected - Malware Command and Control Activity Detected - Successful Administrator Privilege Gain - Successful Credential Theft Detected - Successful User Privilege Gain - Targeted Malicious Activity was Detected - Unsuccessful User Privilege Gain - Web Application Attack - A client was using an unusual port - A suspicious filename was detected - A system call was detected - Access to a potentially vulnerable web application - An attempted login using a suspicious username was detected - Attempt to login by a default username and password - Attempted Denial of Service - Crypto Currency Mining Activity Detected - Decode of an RPC Query - Denial of Service - Detection of a Denial of Service Attack - Detection of a non-standard protocol or event - Device Retrieving External IP Address Detected - Information Leak - Large Scale Information Leak - Possible Social Engineering Attempted - Possibly Unwanted Program Detected - A suspicious string was detected - Detection of a Network Scan - Generic ICMP event - Unknown Traffic - A TCP connection was detected The following values have been removed: - unknown
Add support for new query parameters in ANY.RUN Threat Intelligence API. The following new parameters have been added: - fileEventName - fileExtension - syncObjectName - syncObjectType - syncObjectOperation - JA3 - JA3S - JARM
Update `aiohappyeyeballs` dependency to version 2.4.6. Update `aiohttp` dependency to version 3.11.12. Update `aiosignal` dependency to version 1.3.2. Update `async_timeout` dependency to version 5.0.1. Update `attrs` dependency to version 25.1.0. Update `frozenlist` dependency to version 1.5.0. Update `idna` dependency to version 3.10. Update `multidict` dependency to version 6.1.0. Update `yarl` dependency to version 1.18.3. Update `anyrun` dependency to version 0.1.3. Latest version of `yarl` introduces new dependency - `propcache`.
Prepare new release.
Thank you for your submission! We have a total of 9 PRs open right now, and we are working hard on all of them! We will take a look as soon as we can. |
b2a7334
to
1ebfc90
Compare
}, | ||
{ | ||
"module": "anyrun", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hello @mmomin-crest
The anyrun
module is required for this connector to work. It is still not available publically, yes, but connector will not work without it. Please, tell me, if you need any additional information about it.
Please ensure your pull request (PR) adheres to the following guidelines:
Pull Request Checklist
Please check if your PR fulfills the following requirements:
<App Name>: <PR Type> - <PR Description>
next
branch of the forked repo. Create separate feature branch for raising the PR.Pull Request Type
Please check the type of change your PR introduces:
Security Considerations (REQUIRED)
please document them in the
manual_readme_content.md
.manual_readme_content.md
all methods (eg, OAuth) used to authenticatewith the service that the connector is integrating with.
manual_readme_content.md
.the Vault API.
nosemgrep
?If yes, please provide justification in an additional comment next to the ignored code.
Release Notes (REQUIRED)
team
value of parameteropt_privacy_type
indetonate
actionsos
parameter values not being passed correctly to API inget intelligence
actionUbuntu 22.04.2
value of parameteros
inget intelligence
actionsuricataclass
inget intelligence
actionget intelligence
actionWhat is the current behavior? (OPTIONAL)
opt_privacy_type
parameter is set toteam
, ANY.RUN API will return an error. The value must bebyteam
.get intelligence
action, ifos
parameter is used, TI query will return no data. Currently, ANY.RUN Threat Intelligence API takes only major versions of OS as values inos
parameter.What is the new behavior? (OPTIONAL)
opt_privacy_type
parameter now uses correct value list. Valueteam
is replaced withbyteam
.get intelligence
action OS name is now being stripped fromos
parameter, so only OS major version is passed to TI query.Pay close attention to (OPTIONAL)
get intelligence
action parametersuricataclass
no longer supportsunknown
value.Thanks for contributing!