pymisp 2.5.3__py3-none-any.whl → 2.5.7__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pymisp might be problematic. Click here for more details.
- CHANGELOG.txt +5380 -0
- examples/__init__.py +0 -0
- examples/add_attributes_from_csv.py +74 -0
- examples/add_email_object.py +29 -0
- examples/add_fail2ban_object.py +86 -0
- examples/add_feed.py +25 -0
- examples/add_file_object.py +47 -0
- examples/add_filetype_object_from_csv.py +53 -0
- examples/add_generic_object.py +26 -0
- examples/add_github_user.py +65 -0
- examples/add_gitlab_user.py +56 -0
- examples/add_named_attribute.py +25 -0
- examples/add_organisations.py +57 -0
- examples/add_ssh_authorized_keys.py +29 -0
- examples/add_user.py +22 -0
- examples/add_vehicle_object.py +22 -0
- examples/addtag2.py +45 -0
- examples/asciidoc_generator.py +114 -0
- examples/cache_all.py +10 -0
- examples/copyTagsFromAttributesToEvent.py +68 -0
- examples/copy_list.py +93 -0
- examples/create_events.py +26 -0
- examples/cytomic_orion.py +549 -0
- examples/del.py +22 -0
- examples/delete_user.py +16 -0
- examples/edit_organisation.py +20 -0
- examples/edit_user.py +20 -0
- examples/falsepositive_disabletoids.py +136 -0
- examples/fetch_events_feed.py +15 -0
- examples/fetch_warninglist_hits.py +38 -0
- examples/freetext.py +22 -0
- examples/generate_file_objects.py +78 -0
- examples/generate_meta_feed.py +15 -0
- examples/get.py +37 -0
- examples/get_csv.py +37 -0
- examples/get_network_activity.py +187 -0
- examples/last.py +48 -0
- examples/load_csv.py +94 -0
- examples/lookup.py +28 -0
- examples/misp2cef.py +71 -0
- examples/misp2clamav.py +52 -0
- examples/openioc_to_misp.py +27 -0
- examples/proofpoint_tap.py +203 -0
- examples/proofpoint_vap.py +65 -0
- examples/search.py +48 -0
- examples/search_attributes_yara.py +40 -0
- examples/search_sighting.py +42 -0
- examples/server_sync_check_conn.py +32 -0
- examples/sharing_groups.py +15 -0
- examples/show_sightings.py +168 -0
- examples/stats_report.py +405 -0
- examples/sync_sighting.py +171 -0
- examples/tags.py +25 -0
- examples/test_sign.py +19 -0
- examples/trustar_misp.py +59 -0
- examples/up.py +21 -0
- examples/upload.py +60 -0
- examples/users_list.py +15 -0
- examples/vmray_automation.py +281 -0
- examples/vt_to_misp.py +182 -0
- examples/warninglists.py +22 -0
- examples/yara.py +38 -0
- examples/yara_dump.py +98 -0
- pymisp/api.py +33 -5
- pymisp/data/misp-objects/objects/android-app/definition.json +8 -2
- pymisp/data/misp-objects/objects/instagram-account/definition.json +66 -0
- pymisp/data/misp-objects/objects/lnk/definition.json +13 -1
- pymisp/data/misp-objects/objects/rmm/definition.json +88 -0
- pymisp/data/misp-objects/objects/spambee-report/definition.json +54 -0
- pymisp/data/misp-objects/objects/target-system/definition.json +2 -2
- pymisp/data/misp-objects/objects/vulnerability/definition.json +5 -4
- pymisp/data/misp-objects/relationships/definition.json +17 -1
- pymisp/data/misp-objects/schema_objects.json +1 -1
- pymisp/mispevent.py +95 -23
- {pymisp-2.5.3.dist-info → pymisp-2.5.7.dist-info}/METADATA +23 -28
- {pymisp-2.5.3.dist-info → pymisp-2.5.7.dist-info}/RECORD +144 -30
- {pymisp-2.5.3.dist-info → pymisp-2.5.7.dist-info}/WHEEL +1 -1
- tests/57c4445b-c548-4654-af0b-4be3950d210f.json +1 -0
- tests/__init__.py +0 -0
- tests/csv_testfiles/invalid_fieldnames.csv +11 -0
- tests/csv_testfiles/valid_fieldnames.csv +4 -0
- tests/email_testfiles/mail_1.eml.zip +0 -0
- tests/email_testfiles/mail_1.msg +0 -0
- tests/email_testfiles/mail_1_bom.eml +858 -0
- tests/email_testfiles/mail_1_headers_only.eml +28 -0
- tests/email_testfiles/mail_2.eml +32 -0
- tests/email_testfiles/mail_3.eml +170 -0
- tests/email_testfiles/mail_3.msg +0 -0
- tests/email_testfiles/mail_4.msg +0 -0
- tests/email_testfiles/mail_5.msg +0 -0
- tests/email_testfiles/mail_multiple_to.eml +15 -0
- tests/email_testfiles/source +1 -0
- tests/git-vuln-finder-quagga.json +1493 -0
- tests/misp_event.json +76 -0
- tests/mispevent_testfiles/attribute.json +21 -0
- tests/mispevent_testfiles/attribute_del.json +23 -0
- tests/mispevent_testfiles/def_param.json +53 -0
- tests/mispevent_testfiles/event.json +8 -0
- tests/mispevent_testfiles/event_obj_attr_tag.json +57 -0
- tests/mispevent_testfiles/event_obj_def_param.json +62 -0
- tests/mispevent_testfiles/event_obj_tag.json +29 -0
- tests/mispevent_testfiles/event_tags.json +18 -0
- tests/mispevent_testfiles/existing_event.json +4599 -0
- tests/mispevent_testfiles/existing_event_edited.json +4601 -0
- tests/mispevent_testfiles/galaxy.json +25 -0
- tests/mispevent_testfiles/malware.json +19 -0
- tests/mispevent_testfiles/malware_exist.json +163 -0
- tests/mispevent_testfiles/misp_custom_obj.json +38 -0
- tests/mispevent_testfiles/overwrite_file/definition.json +457 -0
- tests/mispevent_testfiles/proposals.json +35 -0
- tests/mispevent_testfiles/shadow.json +148 -0
- tests/mispevent_testfiles/sighting.json +5 -0
- tests/mispevent_testfiles/simple.json +2 -0
- tests/mispevent_testfiles/test_object_template/definition.json +29 -0
- tests/new_misp_event.json +34 -0
- tests/reportlab_testfiles/HTML_event.json +1 -0
- tests/reportlab_testfiles/galaxy_1.json +1250 -0
- tests/reportlab_testfiles/image_event.json +2490 -0
- tests/reportlab_testfiles/japanese_test.json +156 -0
- tests/reportlab_testfiles/japanese_test_heavy.json +318 -0
- tests/reportlab_testfiles/long_event.json +3730 -0
- tests/reportlab_testfiles/mainly_objects_1.json +1092 -0
- tests/reportlab_testfiles/mainly_objects_2.json +977 -0
- tests/reportlab_testfiles/sighting_1.json +305 -0
- tests/reportlab_testfiles/sighting_2.json +221 -0
- tests/reportlab_testfiles/to_delete1.json +804 -0
- tests/reportlab_testfiles/to_delete2.json +1 -0
- tests/reportlab_testfiles/to_delete3.json +1 -0
- tests/reportlab_testfiles/very_long_event.json +1006 -0
- tests/reportlab_testoutputs/to_delete1.json.pdf +391 -0
- tests/reportlab_testoutputs/to_delete2.json.pdf +506 -0
- tests/reportlab_testoutputs/to_delete3.json.pdf +277 -0
- tests/search_index_result.json +69 -0
- tests/sharing_groups.json +98 -0
- tests/stix1.xml-utf8 +110 -0
- tests/stix2.json +1 -0
- tests/test_analyst_data.py +123 -0
- tests/test_emailobject.py +157 -0
- tests/test_fileobject.py +20 -0
- tests/test_mispevent.py +473 -0
- tests/test_reportlab.py +431 -0
- tests/testlive_comprehensive.py +3734 -0
- tests/testlive_sync.py +474 -0
- pymisp/data/misp-objects/.git +0 -1
- pymisp/data/misp-objects/.gitchangelog.rc +0 -289
- pymisp/data/misp-objects/.github/workflows/codeql.yml +0 -41
- pymisp/data/misp-objects/.github/workflows/nosetests.yml +0 -39
- pymisp/data/misp-objects/.travis.yml +0 -16
- pymisp/data/misp-objects/LICENSE-software-only.md +0 -661
- pymisp/data/misp-objects/LICENSE.md +0 -36
- pymisp/data/misp-objects/README.md +0 -566
- pymisp/data/misp-objects/docs/time-related-objects.ods +0 -0
- pymisp/data/misp-objects/docs/time-related-objects.pdf +0 -0
- pymisp/data/misp-objects/jq_all_the_things.sh +0 -29
- pymisp/data/misp-objects/tools/adoc_objects.py +0 -145
- pymisp/data/misp-objects/tools/alfred_links_to_relarelationships.py +0 -48
- pymisp/data/misp-objects/tools/list_of_objects.py +0 -50
- pymisp/data/misp-objects/tools/updated.sh +0 -6
- pymisp/data/misp-objects/tools/validate_opposites.sh +0 -17
- pymisp/data/misp-objects/unique_uuid.py +0 -16
- pymisp/data/misp-objects/validate_all.sh +0 -38
- {pymisp-2.5.3.dist-info → pymisp-2.5.7.dist-info}/LICENSE +0 -0
|
@@ -0,0 +1,305 @@
|
|
|
1
|
+
{
|
|
2
|
+
"Event": {
|
|
3
|
+
"id": "60",
|
|
4
|
+
"orgc_id": "5",
|
|
5
|
+
"org_id": "1",
|
|
6
|
+
"date": "2018-08-01",
|
|
7
|
+
"threat_level_id": "3",
|
|
8
|
+
"info": "Ursnif, MALWAREMESSIAGH",
|
|
9
|
+
"published": true,
|
|
10
|
+
"uuid": "5b646415-7b48-40d5-86b4-c0070acd0835",
|
|
11
|
+
"attribute_count": "5",
|
|
12
|
+
"analysis": "2",
|
|
13
|
+
"timestamp": "1533306089",
|
|
14
|
+
"distribution": "3",
|
|
15
|
+
"proposal_email_lock": false,
|
|
16
|
+
"locked": false,
|
|
17
|
+
"publish_timestamp": "1550506283",
|
|
18
|
+
"sharing_group_id": "0",
|
|
19
|
+
"disable_correlation": false,
|
|
20
|
+
"extends_uuid": "",
|
|
21
|
+
"Org": {
|
|
22
|
+
"id": "1",
|
|
23
|
+
"name": "ORGNAME",
|
|
24
|
+
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c"
|
|
25
|
+
},
|
|
26
|
+
"Orgc": {
|
|
27
|
+
"id": "5",
|
|
28
|
+
"name": "Synovus Financial",
|
|
29
|
+
"uuid": "5a68c02d-959c-4c8a-a571-0dcac0a8060a"
|
|
30
|
+
},
|
|
31
|
+
"Attribute": [
|
|
32
|
+
{
|
|
33
|
+
"id": "8885",
|
|
34
|
+
"type": "domain",
|
|
35
|
+
"category": "Network activity",
|
|
36
|
+
"to_ids": true,
|
|
37
|
+
"uuid": "5b6464ca-e73c-4707-9b8a-d0350acd0835",
|
|
38
|
+
"event_id": "60",
|
|
39
|
+
"distribution": "5",
|
|
40
|
+
"timestamp": "1533306058",
|
|
41
|
+
"comment": "Ursnif",
|
|
42
|
+
"sharing_group_id": "0",
|
|
43
|
+
"deleted": false,
|
|
44
|
+
"disable_correlation": false,
|
|
45
|
+
"object_id": "0",
|
|
46
|
+
"object_relation": null,
|
|
47
|
+
"value": "ooiasjdnqjwbeasdasd.com",
|
|
48
|
+
"Galaxy": [],
|
|
49
|
+
"ShadowAttribute": [],
|
|
50
|
+
"Sighting": [
|
|
51
|
+
{
|
|
52
|
+
"id": "8",
|
|
53
|
+
"attribute_id": "8885",
|
|
54
|
+
"event_id": "60",
|
|
55
|
+
"org_id": "1",
|
|
56
|
+
"date_sighting": "1551253950",
|
|
57
|
+
"uuid": "5c7641bf-a4e8-4d5d-a653-03240a00020f",
|
|
58
|
+
"source": "",
|
|
59
|
+
"type": "0",
|
|
60
|
+
"Organisation": {
|
|
61
|
+
"id": "1",
|
|
62
|
+
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
|
|
63
|
+
"name": "ORGNAME"
|
|
64
|
+
},
|
|
65
|
+
"attribute_uuid": "5b6464ca-e73c-4707-9b8a-d0350acd0835"
|
|
66
|
+
}
|
|
67
|
+
]
|
|
68
|
+
},
|
|
69
|
+
{
|
|
70
|
+
"id": "8886",
|
|
71
|
+
"type": "domain",
|
|
72
|
+
"category": "Network activity",
|
|
73
|
+
"to_ids": true,
|
|
74
|
+
"uuid": "5b6464ca-45f8-43d0-8b78-d0350acd0835",
|
|
75
|
+
"event_id": "60",
|
|
76
|
+
"distribution": "5",
|
|
77
|
+
"timestamp": "1533306058",
|
|
78
|
+
"comment": "Ursnif",
|
|
79
|
+
"sharing_group_id": "0",
|
|
80
|
+
"deleted": false,
|
|
81
|
+
"disable_correlation": false,
|
|
82
|
+
"object_id": "0",
|
|
83
|
+
"object_relation": null,
|
|
84
|
+
"value": "eqowiesajenqweasd.com",
|
|
85
|
+
"Galaxy": [],
|
|
86
|
+
"ShadowAttribute": [],
|
|
87
|
+
"Sighting": [
|
|
88
|
+
{
|
|
89
|
+
"id": "9",
|
|
90
|
+
"attribute_id": "8886",
|
|
91
|
+
"event_id": "60",
|
|
92
|
+
"org_id": "1",
|
|
93
|
+
"date_sighting": "1551253959",
|
|
94
|
+
"uuid": "5c7641c7-f020-4643-92b4-03240a00020f",
|
|
95
|
+
"source": "",
|
|
96
|
+
"type": "1",
|
|
97
|
+
"Organisation": {
|
|
98
|
+
"id": "1",
|
|
99
|
+
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
|
|
100
|
+
"name": "ORGNAME"
|
|
101
|
+
},
|
|
102
|
+
"attribute_uuid": "5b6464ca-45f8-43d0-8b78-d0350acd0835"
|
|
103
|
+
}
|
|
104
|
+
]
|
|
105
|
+
},
|
|
106
|
+
{
|
|
107
|
+
"id": "8887",
|
|
108
|
+
"type": "domain",
|
|
109
|
+
"category": "Network activity",
|
|
110
|
+
"to_ids": true,
|
|
111
|
+
"uuid": "5b6464ca-8c84-4c2d-95d9-d0350acd0835",
|
|
112
|
+
"event_id": "60",
|
|
113
|
+
"distribution": "5",
|
|
114
|
+
"timestamp": "1533306058",
|
|
115
|
+
"comment": "Ursnif",
|
|
116
|
+
"sharing_group_id": "0",
|
|
117
|
+
"deleted": false,
|
|
118
|
+
"disable_correlation": false,
|
|
119
|
+
"object_id": "0",
|
|
120
|
+
"object_relation": null,
|
|
121
|
+
"value": "dquohwdihaewqdcas.com",
|
|
122
|
+
"Galaxy": [],
|
|
123
|
+
"ShadowAttribute": [],
|
|
124
|
+
"Sighting": [
|
|
125
|
+
{
|
|
126
|
+
"id": "10",
|
|
127
|
+
"attribute_id": "8887",
|
|
128
|
+
"event_id": "60",
|
|
129
|
+
"org_id": "1",
|
|
130
|
+
"date_sighting": "1551253962",
|
|
131
|
+
"uuid": "5c7641cb-ccc0-44ee-ab75-03240a00020f",
|
|
132
|
+
"source": "",
|
|
133
|
+
"type": "1",
|
|
134
|
+
"Organisation": {
|
|
135
|
+
"id": "1",
|
|
136
|
+
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
|
|
137
|
+
"name": "ORGNAME"
|
|
138
|
+
},
|
|
139
|
+
"attribute_uuid": "5b6464ca-8c84-4c2d-95d9-d0350acd0835"
|
|
140
|
+
}
|
|
141
|
+
]
|
|
142
|
+
},
|
|
143
|
+
{
|
|
144
|
+
"id": "8888",
|
|
145
|
+
"type": "domain",
|
|
146
|
+
"category": "Network activity",
|
|
147
|
+
"to_ids": true,
|
|
148
|
+
"uuid": "5b6464ca-e0a0-40e0-8e21-d0350acd0835",
|
|
149
|
+
"event_id": "60",
|
|
150
|
+
"distribution": "5",
|
|
151
|
+
"timestamp": "1533306058",
|
|
152
|
+
"comment": "Ursnif",
|
|
153
|
+
"sharing_group_id": "0",
|
|
154
|
+
"deleted": false,
|
|
155
|
+
"disable_correlation": false,
|
|
156
|
+
"object_id": "0",
|
|
157
|
+
"object_relation": null,
|
|
158
|
+
"value": "diqjwhebseqhbasdh.com",
|
|
159
|
+
"Galaxy": [],
|
|
160
|
+
"ShadowAttribute": [],
|
|
161
|
+
"Sighting": [
|
|
162
|
+
{
|
|
163
|
+
"id": "11",
|
|
164
|
+
"attribute_id": "8888",
|
|
165
|
+
"event_id": "60",
|
|
166
|
+
"org_id": "1",
|
|
167
|
+
"date_sighting": "1551253968",
|
|
168
|
+
"uuid": "5c7641d5-58bc-4d20-9a84-05f10a00020f",
|
|
169
|
+
"source": "honeyp",
|
|
170
|
+
"type": "2",
|
|
171
|
+
"Organisation": {
|
|
172
|
+
"id": "1",
|
|
173
|
+
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
|
|
174
|
+
"name": "ORGNAME"
|
|
175
|
+
},
|
|
176
|
+
"attribute_uuid": "5b6464ca-e0a0-40e0-8e21-d0350acd0835"
|
|
177
|
+
},
|
|
178
|
+
{
|
|
179
|
+
"id": "12",
|
|
180
|
+
"attribute_id": "8888",
|
|
181
|
+
"event_id": "60",
|
|
182
|
+
"org_id": "1",
|
|
183
|
+
"date_sighting": "1551253976",
|
|
184
|
+
"uuid": "5c7641db-a9a0-49b0-b536-05f10a00020f",
|
|
185
|
+
"source": "dede",
|
|
186
|
+
"type": "1",
|
|
187
|
+
"Organisation": {
|
|
188
|
+
"id": "1",
|
|
189
|
+
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
|
|
190
|
+
"name": "ORGNAME"
|
|
191
|
+
},
|
|
192
|
+
"attribute_uuid": "5b6464ca-e0a0-40e0-8e21-d0350acd0835"
|
|
193
|
+
}
|
|
194
|
+
]
|
|
195
|
+
},
|
|
196
|
+
{
|
|
197
|
+
"id": "8889",
|
|
198
|
+
"type": "url",
|
|
199
|
+
"category": "Payload delivery",
|
|
200
|
+
"to_ids": true,
|
|
201
|
+
"uuid": "5b6464e9-e73c-484d-a0b3-c0070acd0835",
|
|
202
|
+
"event_id": "60",
|
|
203
|
+
"distribution": "5",
|
|
204
|
+
"timestamp": "1533306089",
|
|
205
|
+
"comment": "Ursnif dropped file",
|
|
206
|
+
"sharing_group_id": "0",
|
|
207
|
+
"deleted": false,
|
|
208
|
+
"disable_correlation": false,
|
|
209
|
+
"object_id": "0",
|
|
210
|
+
"object_relation": null,
|
|
211
|
+
"value": "http:\/\/sistemait.it\/softaculous\/backup\/client.rar",
|
|
212
|
+
"Galaxy": [],
|
|
213
|
+
"ShadowAttribute": [],
|
|
214
|
+
"Sighting": [
|
|
215
|
+
{
|
|
216
|
+
"id": "7",
|
|
217
|
+
"attribute_id": "8889",
|
|
218
|
+
"event_id": "60",
|
|
219
|
+
"org_id": "1",
|
|
220
|
+
"date_sighting": "1551253943",
|
|
221
|
+
"uuid": "5c7641b7-b618-4e41-a9c9-03240a00020f",
|
|
222
|
+
"source": "",
|
|
223
|
+
"type": "0",
|
|
224
|
+
"Organisation": {
|
|
225
|
+
"id": "1",
|
|
226
|
+
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
|
|
227
|
+
"name": "ORGNAME"
|
|
228
|
+
},
|
|
229
|
+
"attribute_uuid": "5b6464e9-e73c-484d-a0b3-c0070acd0835"
|
|
230
|
+
}
|
|
231
|
+
]
|
|
232
|
+
}
|
|
233
|
+
],
|
|
234
|
+
"ShadowAttribute": [],
|
|
235
|
+
"RelatedEvent": [],
|
|
236
|
+
"Galaxy": [
|
|
237
|
+
{
|
|
238
|
+
"id": "4",
|
|
239
|
+
"uuid": "59f20cce-5420-4084-afd5-0884c0a83832",
|
|
240
|
+
"name": "Banker",
|
|
241
|
+
"type": "banker",
|
|
242
|
+
"description": "Banking malware galaxy.",
|
|
243
|
+
"version": "3",
|
|
244
|
+
"icon": "usd",
|
|
245
|
+
"namespace": "misp",
|
|
246
|
+
"GalaxyCluster": [
|
|
247
|
+
{
|
|
248
|
+
"id": "289",
|
|
249
|
+
"collection_uuid": "b9448d2a-a23c-4bf2-92a1-d860716ba2f3",
|
|
250
|
+
"type": "banker",
|
|
251
|
+
"value": "Gozi",
|
|
252
|
+
"tag_name": "misp-galaxy:banker=\"Gozi\"",
|
|
253
|
+
"description": "Banking trojan delivered primarily via email (typically malspam) and exploit kits. Gozi 1.0 source leaked in 2010",
|
|
254
|
+
"galaxy_id": "4",
|
|
255
|
+
"source": "Open Sources",
|
|
256
|
+
"authors": [
|
|
257
|
+
"Unknown",
|
|
258
|
+
"raw-data"
|
|
259
|
+
],
|
|
260
|
+
"version": "16",
|
|
261
|
+
"uuid": "",
|
|
262
|
+
"tag_id": "86",
|
|
263
|
+
"meta": {
|
|
264
|
+
"date": [
|
|
265
|
+
"First seen ~ 2007"
|
|
266
|
+
],
|
|
267
|
+
"refs": [
|
|
268
|
+
"https:\/\/www.secureworks.com\/research\/gozi",
|
|
269
|
+
"https:\/\/www.gdatasoftware.com\/blog\/2016\/11\/29325-analysis-ursnif-spying-on-your-data-since-2007",
|
|
270
|
+
"https:\/\/lokalhost.pl\/gozi_tree.txt"
|
|
271
|
+
],
|
|
272
|
+
"synonyms": [
|
|
273
|
+
"Ursnif",
|
|
274
|
+
"CRM",
|
|
275
|
+
"Snifula",
|
|
276
|
+
"Papras"
|
|
277
|
+
]
|
|
278
|
+
}
|
|
279
|
+
}
|
|
280
|
+
]
|
|
281
|
+
}
|
|
282
|
+
],
|
|
283
|
+
"Object": [],
|
|
284
|
+
"Tag": [
|
|
285
|
+
{
|
|
286
|
+
"id": "85",
|
|
287
|
+
"name": "PasteBin: MALWAREMESSIAGH",
|
|
288
|
+
"colour": "#ab34e3",
|
|
289
|
+
"exportable": true,
|
|
290
|
+
"user_id": "0",
|
|
291
|
+
"hide_tag": false,
|
|
292
|
+
"numerical_value": null
|
|
293
|
+
},
|
|
294
|
+
{
|
|
295
|
+
"id": "86",
|
|
296
|
+
"name": "misp-galaxy:banker=\"Gozi\"",
|
|
297
|
+
"colour": "#0088cc",
|
|
298
|
+
"exportable": true,
|
|
299
|
+
"user_id": "0",
|
|
300
|
+
"hide_tag": false,
|
|
301
|
+
"numerical_value": null
|
|
302
|
+
}
|
|
303
|
+
]
|
|
304
|
+
}
|
|
305
|
+
}
|
|
@@ -0,0 +1,221 @@
|
|
|
1
|
+
{
|
|
2
|
+
"Event": {
|
|
3
|
+
"id": "1",
|
|
4
|
+
"orgc_id": "1",
|
|
5
|
+
"org_id": "1",
|
|
6
|
+
"date": "2019-02-18",
|
|
7
|
+
"threat_level_id": "2",
|
|
8
|
+
"info": "This is the description",
|
|
9
|
+
"published": false,
|
|
10
|
+
"uuid": "5c6ab833-676c-42f3-95d2-034f0a00020f",
|
|
11
|
+
"attribute_count": "2",
|
|
12
|
+
"analysis": "1",
|
|
13
|
+
"timestamp": "1551253649",
|
|
14
|
+
"distribution": "1",
|
|
15
|
+
"proposal_email_lock": false,
|
|
16
|
+
"locked": false,
|
|
17
|
+
"publish_timestamp": "0",
|
|
18
|
+
"sharing_group_id": "0",
|
|
19
|
+
"disable_correlation": false,
|
|
20
|
+
"extends_uuid": "",
|
|
21
|
+
"event_creator_email": "admin@admin.test",
|
|
22
|
+
"Org": {
|
|
23
|
+
"id": "1",
|
|
24
|
+
"name": "ORGNAME",
|
|
25
|
+
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c"
|
|
26
|
+
},
|
|
27
|
+
"Orgc": {
|
|
28
|
+
"id": "1",
|
|
29
|
+
"name": "ORGNAME",
|
|
30
|
+
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c"
|
|
31
|
+
},
|
|
32
|
+
"Attribute": [
|
|
33
|
+
{
|
|
34
|
+
"id": "1",
|
|
35
|
+
"type": "comment",
|
|
36
|
+
"category": "Antivirus detection",
|
|
37
|
+
"to_ids": false,
|
|
38
|
+
"uuid": "5c6ab897-0f68-44ca-8d62-0c150a00020f",
|
|
39
|
+
"event_id": "1",
|
|
40
|
+
"distribution": "0",
|
|
41
|
+
"timestamp": "1550497961",
|
|
42
|
+
"comment": "Contextual commentary",
|
|
43
|
+
"sharing_group_id": "0",
|
|
44
|
+
"deleted": false,
|
|
45
|
+
"disable_correlation": false,
|
|
46
|
+
"object_id": "0",
|
|
47
|
+
"object_relation": null,
|
|
48
|
+
"value": "Value to test",
|
|
49
|
+
"Galaxy": [
|
|
50
|
+
{
|
|
51
|
+
"id": "15",
|
|
52
|
+
"uuid": "90ccdf38-1649-11e8-b8bf-e7326d553087",
|
|
53
|
+
"name": "Botnet",
|
|
54
|
+
"type": "botnet",
|
|
55
|
+
"description": "Botnet galaxy.",
|
|
56
|
+
"version": "2",
|
|
57
|
+
"icon": "sitemap",
|
|
58
|
+
"namespace": "misp",
|
|
59
|
+
"GalaxyCluster": [
|
|
60
|
+
{
|
|
61
|
+
"id": "2511",
|
|
62
|
+
"collection_uuid": "0d58f329-1356-468c-88ab-e21fbb64c02b",
|
|
63
|
+
"type": "botnet",
|
|
64
|
+
"value": "Asprox",
|
|
65
|
+
"tag_name": "misp-galaxy:botnet=\"Asprox\"",
|
|
66
|
+
"description": "The Asprox botnet (discovered around 2008), also known by its aliases Badsrc and Aseljo, is a botnet mostly involved in phishing scams and performing SQL injections into websites in order to spread malware.",
|
|
67
|
+
"galaxy_id": "15",
|
|
68
|
+
"source": "MISP Project",
|
|
69
|
+
"authors": [
|
|
70
|
+
"Various"
|
|
71
|
+
],
|
|
72
|
+
"version": "18",
|
|
73
|
+
"uuid": "",
|
|
74
|
+
"tag_id": "1",
|
|
75
|
+
"meta": {
|
|
76
|
+
"date": [
|
|
77
|
+
"2008"
|
|
78
|
+
],
|
|
79
|
+
"refs": [
|
|
80
|
+
"https:\/\/en.wikipedia.org\/wiki\/Asprox_botnet"
|
|
81
|
+
],
|
|
82
|
+
"synonyms": [
|
|
83
|
+
"Badsrc",
|
|
84
|
+
"Aseljo",
|
|
85
|
+
"Danmec",
|
|
86
|
+
"Hydraflux"
|
|
87
|
+
]
|
|
88
|
+
}
|
|
89
|
+
}
|
|
90
|
+
]
|
|
91
|
+
}
|
|
92
|
+
],
|
|
93
|
+
"ShadowAttribute": [],
|
|
94
|
+
"Tag": [
|
|
95
|
+
{
|
|
96
|
+
"id": "1",
|
|
97
|
+
"name": "misp-galaxy:botnet=\"Asprox\"",
|
|
98
|
+
"colour": "#0088cc",
|
|
99
|
+
"exportable": true,
|
|
100
|
+
"user_id": "0",
|
|
101
|
+
"hide_tag": false,
|
|
102
|
+
"numerical_value": null
|
|
103
|
+
}
|
|
104
|
+
],
|
|
105
|
+
"Sighting": [
|
|
106
|
+
{
|
|
107
|
+
"id": "5",
|
|
108
|
+
"attribute_id": "1",
|
|
109
|
+
"event_id": "1",
|
|
110
|
+
"org_id": "1",
|
|
111
|
+
"date_sighting": "1551253653",
|
|
112
|
+
"uuid": "5c764095-129c-4e81-956d-0e1a0a00020f",
|
|
113
|
+
"source": "",
|
|
114
|
+
"type": "1",
|
|
115
|
+
"Organisation": {
|
|
116
|
+
"id": "1",
|
|
117
|
+
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
|
|
118
|
+
"name": "ORGNAME"
|
|
119
|
+
},
|
|
120
|
+
"attribute_uuid": "5c6ab897-0f68-44ca-8d62-0c150a00020f"
|
|
121
|
+
}
|
|
122
|
+
]
|
|
123
|
+
},
|
|
124
|
+
{
|
|
125
|
+
"id": "242460",
|
|
126
|
+
"type": "target-external",
|
|
127
|
+
"category": "Targeting data",
|
|
128
|
+
"to_ids": true,
|
|
129
|
+
"uuid": "5c764091-273c-4821-92ad-0e1a0a00020f",
|
|
130
|
+
"event_id": "1",
|
|
131
|
+
"distribution": "2",
|
|
132
|
+
"timestamp": "1551253649",
|
|
133
|
+
"comment": "This is a contextual comment",
|
|
134
|
+
"sharing_group_id": "0",
|
|
135
|
+
"deleted": false,
|
|
136
|
+
"disable_correlation": false,
|
|
137
|
+
"object_id": "0",
|
|
138
|
+
"object_relation": null,
|
|
139
|
+
"value": "testvalue",
|
|
140
|
+
"Galaxy": [],
|
|
141
|
+
"ShadowAttribute": [],
|
|
142
|
+
"Sighting": [
|
|
143
|
+
{
|
|
144
|
+
"id": "6",
|
|
145
|
+
"attribute_id": "242460",
|
|
146
|
+
"event_id": "1",
|
|
147
|
+
"org_id": "1",
|
|
148
|
+
"date_sighting": "1551253653",
|
|
149
|
+
"uuid": "5c764095-26ec-4de1-99f2-0e1a0a00020f",
|
|
150
|
+
"source": "",
|
|
151
|
+
"type": "0",
|
|
152
|
+
"Organisation": {
|
|
153
|
+
"id": "1",
|
|
154
|
+
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
|
|
155
|
+
"name": "ORGNAME"
|
|
156
|
+
},
|
|
157
|
+
"attribute_uuid": "5c764091-273c-4821-92ad-0e1a0a00020f"
|
|
158
|
+
}
|
|
159
|
+
]
|
|
160
|
+
}
|
|
161
|
+
],
|
|
162
|
+
"ShadowAttribute": [],
|
|
163
|
+
"RelatedEvent": [],
|
|
164
|
+
"Galaxy": [
|
|
165
|
+
{
|
|
166
|
+
"id": "15",
|
|
167
|
+
"uuid": "90ccdf38-1649-11e8-b8bf-e7326d553087",
|
|
168
|
+
"name": "Botnet",
|
|
169
|
+
"type": "botnet",
|
|
170
|
+
"description": "Botnet galaxy.",
|
|
171
|
+
"version": "2",
|
|
172
|
+
"icon": "sitemap",
|
|
173
|
+
"namespace": "misp",
|
|
174
|
+
"GalaxyCluster": [
|
|
175
|
+
{
|
|
176
|
+
"id": "2511",
|
|
177
|
+
"collection_uuid": "0d58f329-1356-468c-88ab-e21fbb64c02b",
|
|
178
|
+
"type": "botnet",
|
|
179
|
+
"value": "Asprox",
|
|
180
|
+
"tag_name": "misp-galaxy:botnet=\"Asprox\"",
|
|
181
|
+
"description": "The Asprox botnet (discovered around 2008), also known by its aliases Badsrc and Aseljo, is a botnet mostly involved in phishing scams and performing SQL injections into websites in order to spread malware.",
|
|
182
|
+
"galaxy_id": "15",
|
|
183
|
+
"source": "MISP Project",
|
|
184
|
+
"authors": [
|
|
185
|
+
"Various"
|
|
186
|
+
],
|
|
187
|
+
"version": "18",
|
|
188
|
+
"uuid": "",
|
|
189
|
+
"tag_id": "1",
|
|
190
|
+
"meta": {
|
|
191
|
+
"date": [
|
|
192
|
+
"2008"
|
|
193
|
+
],
|
|
194
|
+
"refs": [
|
|
195
|
+
"https:\/\/en.wikipedia.org\/wiki\/Asprox_botnet"
|
|
196
|
+
],
|
|
197
|
+
"synonyms": [
|
|
198
|
+
"Badsrc",
|
|
199
|
+
"Aseljo",
|
|
200
|
+
"Danmec",
|
|
201
|
+
"Hydraflux"
|
|
202
|
+
]
|
|
203
|
+
}
|
|
204
|
+
}
|
|
205
|
+
]
|
|
206
|
+
}
|
|
207
|
+
],
|
|
208
|
+
"Object": [],
|
|
209
|
+
"Tag": [
|
|
210
|
+
{
|
|
211
|
+
"id": "1",
|
|
212
|
+
"name": "misp-galaxy:botnet=\"Asprox\"",
|
|
213
|
+
"colour": "#0088cc",
|
|
214
|
+
"exportable": true,
|
|
215
|
+
"user_id": "0",
|
|
216
|
+
"hide_tag": false,
|
|
217
|
+
"numerical_value": null
|
|
218
|
+
}
|
|
219
|
+
]
|
|
220
|
+
}
|
|
221
|
+
}
|