Output modification utilities help abstract away the current MAEC XML implementation to provide alternate views for working with MAEC that either do not require XML knowledge or that translate MAEC into another standard language.
The MAEC to HTML
utility to convert MAEC XML to HTML has been deprecated, and the functionality of the utility has been incorporated into the STIX-to-HTML utility.
STIX to HTML
is an XSLT stylesheet that can transform a STIX XML document (with MAEC content) into a human-readable HTML view. It was designed to be leveraged by developers, either as a mechanism for batch rendering STIX (MAEC) documents or to be embedded as a visualization component within a STIX-capable application. Because STIX to HTML
is an XSLT stylesheet, users must be familiar with XSLT or XSLT processing libraries/engines (e.g., Saxon or libxslt) in order to use it.
STIX to HTML
was created by and for developers, and therefore, customization and extension capabilities have been prioritized. Documentation on how to customize STIX to HTML
to fit your application or operational needs can be found in the usage guide.
The MAEC to OVAL
utility converts MAEC XML into OVAL 5.7 definitions, tests, and objects. It extracts registry key Objects and file Objects from the Actions in a MAEC Package or Bundle XML document.
The utility is at the proof of concept stage of development.
MAEC modules enable other malware analysis tools to natively generate MAEC content.
Cuckoo Sandbox is an automated dynamic malware analysis system. The MAEC Cuckoo module enables Cuckoo to output MAEC output natively (i.e., the module is available as a Cuckoo “reporting” module).
MAEC translator utilities enable translation of non-MAEC analysis tool output into MAEC content.
Anubis is a service for analyzing malware. Windows executables are submitted on-line to the Anubis server, and XML-based analysis reports are generated in response.
The Anubis to MAEC
utility generates MAEC Package output from an Anubis XML file.
ThreatAnalyzer (previously known as GFI Sandbox) is a software-based, dynamic analysis sandbox for malware analysis.
The GFI Sandbox to MAEC
utility generates MAEC Package output from a GFI Sandbox v4 XML file.
pefile is a multi-platform Python module to process PE files. The output of pefile is useful for malware analysis.
The pefile to MAEC
Python library converts output from the pefile utility to MAEC XML content.
ThreatExpert is an automated threat analysis system. After a malware sample is submitted through an on-line interface, the ThreatExpert system generates a threat report.
The ThreatExpert to MAEC
utility generates MAEC Package output from a ThreatExpert XML file.
VirusTotal is an online service that analyses suspicious files and URLs.
The VT to MAEC
queries VirusTotal against an MD5 (or a file that will then be hashed) and returns the results in a MAEC Package.
The MAEC project develops and maintains an API to aid developers in parsing, creating, and manipulating MAEC content.
The python-maec
library provides two levels of APIs to help in the creation, consumption, and manipulation of MAEC content.
A low-level API is provided by auto-generated XML Schema-Python class bindings. Using these bindings, any MAEC content can be parsed from or written to XML, but the use of the bindings requires some knowledge of the actual MAEC schemas.
A higher-level API consists of manually designed Python classes. These “native classes” are intended to behave more like Python programmers would expect. Because they are designed manually, they currently do not support the entire MAEC standard; instead, they support only those Object types expected to be used most frequently. These “native classes” also support exporting their content as Python dictionaries and lists, which can easily be converted to JSON. Importing from JSON is also supported.