You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The relevant file attributes in the hashlookup object are converted to indicators, similar as the file object type (meaning SHA1, MD5, etc. should become indicators).
Actual behavior
None of the file attributes are converted to indicators. It's added as a x-misp-object, but the indicators are not extracted.
Steps to reproduce
Add a hashlookup object. Search for the event.
parser = MISPtoSTIX21Parser()
parser.parse_misp_event(misp_event)
stix_objects = parser.stix_objects
for el in stix_objects:
if el.type == 'indicator':
print(el)
Version
2.4.182
Python version
3.8
Relevant log output
No response
Extra attachments
No response
Code of Conduct
I agree to follow this project's Code of Conduct
The text was updated successfully, but these errors were encountered:
MISP-STIX usage
Integration for Sentinel
Expected behavior
The relevant file attributes in the
hashlookup
object are converted to indicators, similar as thefile
object type (meaning SHA1, MD5, etc. should becomeindicators
).Actual behavior
None of the file attributes are converted to indicators. It's added as a
x-misp-object
, but the indicators are not extracted.Steps to reproduce
Add a hashlookup object. Search for the event.
Version
2.4.182
Python version
3.8
Relevant log output
No response
Extra attachments
No response
Code of Conduct
The text was updated successfully, but these errors were encountered: