pymisp 2.5.7__py3-none-any.whl → 2.5.7.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pymisp might be problematic. Click here for more details.

Files changed (72) hide show
  1. CHANGELOG.txt +13 -0
  2. pymisp/data/misp-objects/objects/rmm/definition.json +1 -1
  3. {pymisp-2.5.7.dist-info → pymisp-2.5.7.1.dist-info}/METADATA +2 -2
  4. {pymisp-2.5.7.dist-info → pymisp-2.5.7.1.dist-info}/RECORD +6 -72
  5. tests/57c4445b-c548-4654-af0b-4be3950d210f.json +0 -1
  6. tests/__init__.py +0 -0
  7. tests/csv_testfiles/invalid_fieldnames.csv +0 -11
  8. tests/csv_testfiles/valid_fieldnames.csv +0 -4
  9. tests/email_testfiles/mail_1.eml.zip +0 -0
  10. tests/email_testfiles/mail_1.msg +0 -0
  11. tests/email_testfiles/mail_1_bom.eml +0 -858
  12. tests/email_testfiles/mail_1_headers_only.eml +0 -28
  13. tests/email_testfiles/mail_2.eml +0 -32
  14. tests/email_testfiles/mail_3.eml +0 -170
  15. tests/email_testfiles/mail_3.msg +0 -0
  16. tests/email_testfiles/mail_4.msg +0 -0
  17. tests/email_testfiles/mail_5.msg +0 -0
  18. tests/email_testfiles/mail_multiple_to.eml +0 -15
  19. tests/email_testfiles/source +0 -1
  20. tests/git-vuln-finder-quagga.json +0 -1493
  21. tests/misp_event.json +0 -76
  22. tests/mispevent_testfiles/attribute.json +0 -21
  23. tests/mispevent_testfiles/attribute_del.json +0 -23
  24. tests/mispevent_testfiles/def_param.json +0 -53
  25. tests/mispevent_testfiles/event.json +0 -8
  26. tests/mispevent_testfiles/event_obj_attr_tag.json +0 -57
  27. tests/mispevent_testfiles/event_obj_def_param.json +0 -62
  28. tests/mispevent_testfiles/event_obj_tag.json +0 -29
  29. tests/mispevent_testfiles/event_tags.json +0 -18
  30. tests/mispevent_testfiles/existing_event.json +0 -4599
  31. tests/mispevent_testfiles/existing_event_edited.json +0 -4601
  32. tests/mispevent_testfiles/galaxy.json +0 -25
  33. tests/mispevent_testfiles/malware.json +0 -19
  34. tests/mispevent_testfiles/malware_exist.json +0 -163
  35. tests/mispevent_testfiles/misp_custom_obj.json +0 -38
  36. tests/mispevent_testfiles/overwrite_file/definition.json +0 -457
  37. tests/mispevent_testfiles/proposals.json +0 -35
  38. tests/mispevent_testfiles/shadow.json +0 -148
  39. tests/mispevent_testfiles/sighting.json +0 -5
  40. tests/mispevent_testfiles/simple.json +0 -2
  41. tests/mispevent_testfiles/test_object_template/definition.json +0 -29
  42. tests/new_misp_event.json +0 -34
  43. tests/reportlab_testfiles/HTML_event.json +0 -1
  44. tests/reportlab_testfiles/galaxy_1.json +0 -1250
  45. tests/reportlab_testfiles/image_event.json +0 -2490
  46. tests/reportlab_testfiles/japanese_test.json +0 -156
  47. tests/reportlab_testfiles/japanese_test_heavy.json +0 -318
  48. tests/reportlab_testfiles/long_event.json +0 -3730
  49. tests/reportlab_testfiles/mainly_objects_1.json +0 -1092
  50. tests/reportlab_testfiles/mainly_objects_2.json +0 -977
  51. tests/reportlab_testfiles/sighting_1.json +0 -305
  52. tests/reportlab_testfiles/sighting_2.json +0 -221
  53. tests/reportlab_testfiles/to_delete1.json +0 -804
  54. tests/reportlab_testfiles/to_delete2.json +0 -1
  55. tests/reportlab_testfiles/to_delete3.json +0 -1
  56. tests/reportlab_testfiles/very_long_event.json +0 -1006
  57. tests/reportlab_testoutputs/to_delete1.json.pdf +0 -391
  58. tests/reportlab_testoutputs/to_delete2.json.pdf +0 -506
  59. tests/reportlab_testoutputs/to_delete3.json.pdf +0 -277
  60. tests/search_index_result.json +0 -69
  61. tests/sharing_groups.json +0 -98
  62. tests/stix1.xml-utf8 +0 -110
  63. tests/stix2.json +0 -1
  64. tests/test_analyst_data.py +0 -123
  65. tests/test_emailobject.py +0 -157
  66. tests/test_fileobject.py +0 -20
  67. tests/test_mispevent.py +0 -473
  68. tests/test_reportlab.py +0 -431
  69. tests/testlive_comprehensive.py +0 -3734
  70. tests/testlive_sync.py +0 -474
  71. {pymisp-2.5.7.dist-info → pymisp-2.5.7.1.dist-info}/LICENSE +0 -0
  72. {pymisp-2.5.7.dist-info → pymisp-2.5.7.1.dist-info}/WHEEL +0 -0
tests/misp_event.json DELETED
@@ -1,76 +0,0 @@
1
- {
2
- "Attribute": [
3
- {
4
- "ShadowAttribute": [],
5
- "category": "Payload delivery",
6
- "comment": "",
7
- "deleted": false,
8
- "distribution": "5",
9
- "event_id": "2",
10
- "id": "7",
11
- "sharing_group_id": "0",
12
- "timestamp": "1465681304",
13
- "to_ids": false,
14
- "type": "url",
15
- "uuid": "575c8598-f1f0-4c16-a94a-0612c0a83866",
16
- "value": "http://fake.website.com/malware/is/here"
17
- },
18
- {
19
- "ShadowAttribute": [],
20
- "category": "Payload type",
21
- "comment": "",
22
- "deleted": false,
23
- "distribution": "5",
24
- "event_id": "2",
25
- "id": "6",
26
- "sharing_group_id": "0",
27
- "timestamp": "1465681801",
28
- "to_ids": false,
29
- "type": "text",
30
- "uuid": "575c8549-9010-4555-8b37-057ac0a83866",
31
- "value": "Locky"
32
- }
33
- ],
34
- "Org": {
35
- "id": "1",
36
- "name": "ORGNAME",
37
- "uuid": "57586e9a-4a64-4f79-9009-4dc1c0a83866"
38
- },
39
- "Orgc": {
40
- "id": "1",
41
- "name": "ORGNAME",
42
- "uuid": "57586e9a-4a64-4f79-9009-4dc1c0a83866"
43
- },
44
- "RelatedEvent": [],
45
- "ShadowAttribute": [],
46
- "Tag": [
47
- {
48
- "colour": "#005a5a",
49
- "exportable": true,
50
- "id": "6",
51
- "name": "ecsirt:malicious-code=\"ransomware\""
52
- },
53
- {
54
- "colour": "#142bf7",
55
- "exportable": true,
56
- "id": "1",
57
- "name": "for_intelmq_processing"
58
- }
59
- ],
60
- "analysis": "0",
61
- "attribute_count": "2",
62
- "date": "2016-06-09",
63
- "distribution": "0",
64
- "id": "2",
65
- "info": "A Random Event",
66
- "locked": false,
67
- "org_id": "1",
68
- "orgc_id": "1",
69
- "proposal_email_lock": false,
70
- "publish_timestamp": "0",
71
- "published": false,
72
- "sharing_group_id": "0",
73
- "threat_level_id": "1",
74
- "timestamp": "1465681801",
75
- "uuid": "5758ebf5-c898-48e6-9fe9-5665c0a83866"
76
- }
@@ -1,21 +0,0 @@
1
- {
2
- "Attribute": [
3
- {
4
- "Tag": [
5
- {
6
- "name": "osint"
7
- }
8
- ],
9
- "category": "Payload delivery",
10
- "disable_correlation": false,
11
- "to_ids": true,
12
- "type": "filename",
13
- "value": "bar.exe"
14
- }
15
- ],
16
- "analysis": "1",
17
- "date": "2017-12-31",
18
- "distribution": "1",
19
- "info": "This is a test",
20
- "threat_level_id": "1"
21
- }
@@ -1,23 +0,0 @@
1
- {
2
- "Attribute": [
3
- {
4
- "Tag": [
5
- {
6
- "name": "osint"
7
- }
8
- ],
9
- "category": "Payload delivery",
10
- "deleted": true,
11
- "disable_correlation": false,
12
- "id": "42",
13
- "to_ids": true,
14
- "type": "filename",
15
- "value": "bar.exe"
16
- }
17
- ],
18
- "analysis": "1",
19
- "date": "2017-12-31",
20
- "distribution": "1",
21
- "info": "This is a test",
22
- "threat_level_id": "1"
23
- }
@@ -1,53 +0,0 @@
1
- {
2
- "Object": [
3
- {
4
- "Attribute": [
5
- {
6
- "category": "Attribution",
7
- "disable_correlation": false,
8
- "object_relation": "registrar",
9
- "to_ids": false,
10
- "type": "whois-registrar",
11
- "value": "registar.example.com"
12
- },
13
- {
14
- "category": "Network activity",
15
- "disable_correlation": false,
16
- "object_relation": "domain",
17
- "to_ids": true,
18
- "type": "domain",
19
- "value": "domain.example.com"
20
- },
21
- {
22
- "category": "Network activity",
23
- "disable_correlation": true,
24
- "object_relation": "nameserver",
25
- "to_ids": false,
26
- "type": "hostname",
27
- "value": "ns1.example.com"
28
- },
29
- {
30
- "category": "External analysis",
31
- "disable_correlation": false,
32
- "object_relation": "nameserver",
33
- "to_ids": true,
34
- "type": "hostname",
35
- "value": "ns2.example.com"
36
- }
37
- ],
38
- "description": "Whois records information for a domain name or an IP address.",
39
- "distribution": "5",
40
- "meta-category": "network",
41
- "name": "whois",
42
- "sharing_group_id": "0",
43
- "template_uuid": "429faea1-34ff-47af-8a00-7c62d3be5a6a",
44
- "template_version": "10",
45
- "uuid": "a"
46
- }
47
- ],
48
- "analysis": "1",
49
- "date": "2017-12-31",
50
- "distribution": "1",
51
- "info": "This is a test",
52
- "threat_level_id": "1"
53
- }
@@ -1,8 +0,0 @@
1
- {
2
- "analysis": "1",
3
- "date": "2017-12-31",
4
- "distribution": "1",
5
- "info": "This is a test",
6
- "published": true,
7
- "threat_level_id": "1"
8
- }
@@ -1,57 +0,0 @@
1
- {
2
- "Object": [
3
- {
4
- "Attribute": [
5
- {
6
- "Tag": [
7
- {
8
- "name": "blah"
9
- }
10
- ],
11
- "category": "Payload delivery",
12
- "disable_correlation": true,
13
- "object_relation": "filename",
14
- "to_ids": true,
15
- "type": "filename",
16
- "value": "bar"
17
- }
18
- ],
19
- "ObjectReference": [
20
- {
21
- "comment": "foo",
22
- "object_uuid": "a",
23
- "referenced_uuid": "b",
24
- "relationship_type": "baz"
25
- }
26
- ],
27
- "description": "File object describing a file with meta-information",
28
- "distribution": "5",
29
- "meta-category": "file",
30
- "name": "file",
31
- "sharing_group_id": "0",
32
- "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
33
- "template_version": "25",
34
- "uuid": "a"
35
- },
36
- {
37
- "Attribute": [
38
- {
39
- "category": "Network activity",
40
- "disable_correlation": false,
41
- "object_relation": "url",
42
- "to_ids": true,
43
- "type": "url",
44
- "value": "https://www.circl.lu"
45
- }
46
- ],
47
- "description": "url object describes an url along with its normalized field (like extracted using faup parsing library) and its metadata.",
48
- "distribution": "5",
49
- "meta-category": "network",
50
- "name": "url",
51
- "sharing_group_id": "0",
52
- "template_uuid": "60efb77b-40b5-4c46-871b-ed1ed999fce5",
53
- "template_version": "10",
54
- "uuid": "b"
55
- }
56
- ]
57
- }
@@ -1,62 +0,0 @@
1
- {
2
- "Object": [
3
- {
4
- "Attribute": [
5
- {
6
- "Tag": [
7
- {
8
- "name": "blah"
9
- }
10
- ],
11
- "category": "Payload delivery",
12
- "disable_correlation": true,
13
- "object_relation": "filename",
14
- "to_ids": true,
15
- "type": "filename",
16
- "value": "bar"
17
- },
18
- {
19
- "category": "Artifacts dropped",
20
- "disable_correlation": false,
21
- "object_relation": "pattern-in-file",
22
- "to_ids": true,
23
- "type": "pattern-in-file",
24
- "value": "baz"
25
- }
26
- ],
27
- "description": "File object describing a file with meta-information",
28
- "distribution": "5",
29
- "meta-category": "file",
30
- "name": "file",
31
- "sharing_group_id": "0",
32
- "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
33
- "template_version": "25",
34
- "uuid": "a"
35
- },
36
- {
37
- "Attribute": [
38
- {
39
- "Tag": [
40
- {
41
- "name": "blah"
42
- }
43
- ],
44
- "category": "Payload delivery",
45
- "disable_correlation": true,
46
- "object_relation": "filename",
47
- "to_ids": true,
48
- "type": "filename",
49
- "value": "baz"
50
- }
51
- ],
52
- "description": "File object describing a file with meta-information",
53
- "distribution": "5",
54
- "meta-category": "file",
55
- "name": "file",
56
- "sharing_group_id": "0",
57
- "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
58
- "template_version": "25",
59
- "uuid": "b"
60
- }
61
- ]
62
- }
@@ -1,29 +0,0 @@
1
- {
2
- "Object": [
3
- {
4
- "Attribute": [
5
- {
6
- "category": "Payload delivery",
7
- "disable_correlation": false,
8
- "object_relation": "filename",
9
- "to_ids": true,
10
- "type": "filename",
11
- "value": "bar"
12
- }
13
- ],
14
- "Tag": [
15
- {
16
- "name": "osint"
17
- }
18
- ],
19
- "description": "File object describing a file with meta-information",
20
- "distribution": 5,
21
- "meta-category": "file",
22
- "name": "file",
23
- "sharing_group_id": 0,
24
- "template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
25
- "template_version": 9,
26
- "uuid": "a"
27
- }
28
- ]
29
- }
@@ -1,18 +0,0 @@
1
- {
2
- "Tag": [
3
- {
4
- "name": "bar"
5
- },
6
- {
7
- "name": "baz"
8
- },
9
- {
10
- "name": "foo"
11
- }
12
- ],
13
- "analysis": "1",
14
- "date": "2017-12-31",
15
- "distribution": "1",
16
- "info": "This is a test",
17
- "threat_level_id": "1"
18
- }