pymisp 2.5.7__py3-none-any.whl → 2.5.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pymisp might be problematic. Click here for more details.
- pymisp/api.py +1 -0
- pymisp/data/misp-objects/objects/rmm/definition.json +1 -1
- {pymisp-2.5.7.dist-info → pymisp-2.5.8.dist-info}/METADATA +4 -4
- {pymisp-2.5.7.dist-info → pymisp-2.5.8.dist-info}/RECORD +6 -135
- CHANGELOG.txt +0 -5380
- examples/__init__.py +0 -0
- examples/add_attributes_from_csv.py +0 -74
- examples/add_email_object.py +0 -29
- examples/add_fail2ban_object.py +0 -86
- examples/add_feed.py +0 -25
- examples/add_file_object.py +0 -47
- examples/add_filetype_object_from_csv.py +0 -53
- examples/add_generic_object.py +0 -26
- examples/add_github_user.py +0 -65
- examples/add_gitlab_user.py +0 -56
- examples/add_named_attribute.py +0 -25
- examples/add_organisations.py +0 -57
- examples/add_ssh_authorized_keys.py +0 -29
- examples/add_user.py +0 -22
- examples/add_vehicle_object.py +0 -22
- examples/addtag2.py +0 -45
- examples/asciidoc_generator.py +0 -114
- examples/cache_all.py +0 -10
- examples/copyTagsFromAttributesToEvent.py +0 -68
- examples/copy_list.py +0 -93
- examples/create_events.py +0 -26
- examples/cytomic_orion.py +0 -549
- examples/del.py +0 -22
- examples/delete_user.py +0 -16
- examples/edit_organisation.py +0 -20
- examples/edit_user.py +0 -20
- examples/falsepositive_disabletoids.py +0 -136
- examples/fetch_events_feed.py +0 -15
- examples/fetch_warninglist_hits.py +0 -38
- examples/freetext.py +0 -22
- examples/generate_file_objects.py +0 -78
- examples/generate_meta_feed.py +0 -15
- examples/get.py +0 -37
- examples/get_csv.py +0 -37
- examples/get_network_activity.py +0 -187
- examples/last.py +0 -48
- examples/load_csv.py +0 -94
- examples/lookup.py +0 -28
- examples/misp2cef.py +0 -71
- examples/misp2clamav.py +0 -52
- examples/openioc_to_misp.py +0 -27
- examples/proofpoint_tap.py +0 -203
- examples/proofpoint_vap.py +0 -65
- examples/search.py +0 -48
- examples/search_attributes_yara.py +0 -40
- examples/search_sighting.py +0 -42
- examples/server_sync_check_conn.py +0 -32
- examples/sharing_groups.py +0 -15
- examples/show_sightings.py +0 -168
- examples/stats_report.py +0 -405
- examples/sync_sighting.py +0 -171
- examples/tags.py +0 -25
- examples/test_sign.py +0 -19
- examples/trustar_misp.py +0 -59
- examples/up.py +0 -21
- examples/upload.py +0 -60
- examples/users_list.py +0 -15
- examples/vmray_automation.py +0 -281
- examples/vt_to_misp.py +0 -182
- examples/warninglists.py +0 -22
- examples/yara.py +0 -38
- examples/yara_dump.py +0 -98
- tests/57c4445b-c548-4654-af0b-4be3950d210f.json +0 -1
- tests/__init__.py +0 -0
- tests/csv_testfiles/invalid_fieldnames.csv +0 -11
- tests/csv_testfiles/valid_fieldnames.csv +0 -4
- tests/email_testfiles/mail_1.eml.zip +0 -0
- tests/email_testfiles/mail_1.msg +0 -0
- tests/email_testfiles/mail_1_bom.eml +0 -858
- tests/email_testfiles/mail_1_headers_only.eml +0 -28
- tests/email_testfiles/mail_2.eml +0 -32
- tests/email_testfiles/mail_3.eml +0 -170
- tests/email_testfiles/mail_3.msg +0 -0
- tests/email_testfiles/mail_4.msg +0 -0
- tests/email_testfiles/mail_5.msg +0 -0
- tests/email_testfiles/mail_multiple_to.eml +0 -15
- tests/email_testfiles/source +0 -1
- tests/git-vuln-finder-quagga.json +0 -1493
- tests/misp_event.json +0 -76
- tests/mispevent_testfiles/attribute.json +0 -21
- tests/mispevent_testfiles/attribute_del.json +0 -23
- tests/mispevent_testfiles/def_param.json +0 -53
- tests/mispevent_testfiles/event.json +0 -8
- tests/mispevent_testfiles/event_obj_attr_tag.json +0 -57
- tests/mispevent_testfiles/event_obj_def_param.json +0 -62
- tests/mispevent_testfiles/event_obj_tag.json +0 -29
- tests/mispevent_testfiles/event_tags.json +0 -18
- tests/mispevent_testfiles/existing_event.json +0 -4599
- tests/mispevent_testfiles/existing_event_edited.json +0 -4601
- tests/mispevent_testfiles/galaxy.json +0 -25
- tests/mispevent_testfiles/malware.json +0 -19
- tests/mispevent_testfiles/malware_exist.json +0 -163
- tests/mispevent_testfiles/misp_custom_obj.json +0 -38
- tests/mispevent_testfiles/overwrite_file/definition.json +0 -457
- tests/mispevent_testfiles/proposals.json +0 -35
- tests/mispevent_testfiles/shadow.json +0 -148
- tests/mispevent_testfiles/sighting.json +0 -5
- tests/mispevent_testfiles/simple.json +0 -2
- tests/mispevent_testfiles/test_object_template/definition.json +0 -29
- tests/new_misp_event.json +0 -34
- tests/reportlab_testfiles/HTML_event.json +0 -1
- tests/reportlab_testfiles/galaxy_1.json +0 -1250
- tests/reportlab_testfiles/image_event.json +0 -2490
- tests/reportlab_testfiles/japanese_test.json +0 -156
- tests/reportlab_testfiles/japanese_test_heavy.json +0 -318
- tests/reportlab_testfiles/long_event.json +0 -3730
- tests/reportlab_testfiles/mainly_objects_1.json +0 -1092
- tests/reportlab_testfiles/mainly_objects_2.json +0 -977
- tests/reportlab_testfiles/sighting_1.json +0 -305
- tests/reportlab_testfiles/sighting_2.json +0 -221
- tests/reportlab_testfiles/to_delete1.json +0 -804
- tests/reportlab_testfiles/to_delete2.json +0 -1
- tests/reportlab_testfiles/to_delete3.json +0 -1
- tests/reportlab_testfiles/very_long_event.json +0 -1006
- tests/reportlab_testoutputs/to_delete1.json.pdf +0 -391
- tests/reportlab_testoutputs/to_delete2.json.pdf +0 -506
- tests/reportlab_testoutputs/to_delete3.json.pdf +0 -277
- tests/search_index_result.json +0 -69
- tests/sharing_groups.json +0 -98
- tests/stix1.xml-utf8 +0 -110
- tests/stix2.json +0 -1
- tests/test_analyst_data.py +0 -123
- tests/test_emailobject.py +0 -157
- tests/test_fileobject.py +0 -20
- tests/test_mispevent.py +0 -473
- tests/test_reportlab.py +0 -431
- tests/testlive_comprehensive.py +0 -3734
- tests/testlive_sync.py +0 -474
- {pymisp-2.5.7.dist-info → pymisp-2.5.8.dist-info}/LICENSE +0 -0
- {pymisp-2.5.7.dist-info → pymisp-2.5.8.dist-info}/WHEEL +0 -0
tests/misp_event.json
DELETED
|
@@ -1,76 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"Attribute": [
|
|
3
|
-
{
|
|
4
|
-
"ShadowAttribute": [],
|
|
5
|
-
"category": "Payload delivery",
|
|
6
|
-
"comment": "",
|
|
7
|
-
"deleted": false,
|
|
8
|
-
"distribution": "5",
|
|
9
|
-
"event_id": "2",
|
|
10
|
-
"id": "7",
|
|
11
|
-
"sharing_group_id": "0",
|
|
12
|
-
"timestamp": "1465681304",
|
|
13
|
-
"to_ids": false,
|
|
14
|
-
"type": "url",
|
|
15
|
-
"uuid": "575c8598-f1f0-4c16-a94a-0612c0a83866",
|
|
16
|
-
"value": "http://fake.website.com/malware/is/here"
|
|
17
|
-
},
|
|
18
|
-
{
|
|
19
|
-
"ShadowAttribute": [],
|
|
20
|
-
"category": "Payload type",
|
|
21
|
-
"comment": "",
|
|
22
|
-
"deleted": false,
|
|
23
|
-
"distribution": "5",
|
|
24
|
-
"event_id": "2",
|
|
25
|
-
"id": "6",
|
|
26
|
-
"sharing_group_id": "0",
|
|
27
|
-
"timestamp": "1465681801",
|
|
28
|
-
"to_ids": false,
|
|
29
|
-
"type": "text",
|
|
30
|
-
"uuid": "575c8549-9010-4555-8b37-057ac0a83866",
|
|
31
|
-
"value": "Locky"
|
|
32
|
-
}
|
|
33
|
-
],
|
|
34
|
-
"Org": {
|
|
35
|
-
"id": "1",
|
|
36
|
-
"name": "ORGNAME",
|
|
37
|
-
"uuid": "57586e9a-4a64-4f79-9009-4dc1c0a83866"
|
|
38
|
-
},
|
|
39
|
-
"Orgc": {
|
|
40
|
-
"id": "1",
|
|
41
|
-
"name": "ORGNAME",
|
|
42
|
-
"uuid": "57586e9a-4a64-4f79-9009-4dc1c0a83866"
|
|
43
|
-
},
|
|
44
|
-
"RelatedEvent": [],
|
|
45
|
-
"ShadowAttribute": [],
|
|
46
|
-
"Tag": [
|
|
47
|
-
{
|
|
48
|
-
"colour": "#005a5a",
|
|
49
|
-
"exportable": true,
|
|
50
|
-
"id": "6",
|
|
51
|
-
"name": "ecsirt:malicious-code=\"ransomware\""
|
|
52
|
-
},
|
|
53
|
-
{
|
|
54
|
-
"colour": "#142bf7",
|
|
55
|
-
"exportable": true,
|
|
56
|
-
"id": "1",
|
|
57
|
-
"name": "for_intelmq_processing"
|
|
58
|
-
}
|
|
59
|
-
],
|
|
60
|
-
"analysis": "0",
|
|
61
|
-
"attribute_count": "2",
|
|
62
|
-
"date": "2016-06-09",
|
|
63
|
-
"distribution": "0",
|
|
64
|
-
"id": "2",
|
|
65
|
-
"info": "A Random Event",
|
|
66
|
-
"locked": false,
|
|
67
|
-
"org_id": "1",
|
|
68
|
-
"orgc_id": "1",
|
|
69
|
-
"proposal_email_lock": false,
|
|
70
|
-
"publish_timestamp": "0",
|
|
71
|
-
"published": false,
|
|
72
|
-
"sharing_group_id": "0",
|
|
73
|
-
"threat_level_id": "1",
|
|
74
|
-
"timestamp": "1465681801",
|
|
75
|
-
"uuid": "5758ebf5-c898-48e6-9fe9-5665c0a83866"
|
|
76
|
-
}
|
|
@@ -1,21 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"Attribute": [
|
|
3
|
-
{
|
|
4
|
-
"Tag": [
|
|
5
|
-
{
|
|
6
|
-
"name": "osint"
|
|
7
|
-
}
|
|
8
|
-
],
|
|
9
|
-
"category": "Payload delivery",
|
|
10
|
-
"disable_correlation": false,
|
|
11
|
-
"to_ids": true,
|
|
12
|
-
"type": "filename",
|
|
13
|
-
"value": "bar.exe"
|
|
14
|
-
}
|
|
15
|
-
],
|
|
16
|
-
"analysis": "1",
|
|
17
|
-
"date": "2017-12-31",
|
|
18
|
-
"distribution": "1",
|
|
19
|
-
"info": "This is a test",
|
|
20
|
-
"threat_level_id": "1"
|
|
21
|
-
}
|
|
@@ -1,23 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"Attribute": [
|
|
3
|
-
{
|
|
4
|
-
"Tag": [
|
|
5
|
-
{
|
|
6
|
-
"name": "osint"
|
|
7
|
-
}
|
|
8
|
-
],
|
|
9
|
-
"category": "Payload delivery",
|
|
10
|
-
"deleted": true,
|
|
11
|
-
"disable_correlation": false,
|
|
12
|
-
"id": "42",
|
|
13
|
-
"to_ids": true,
|
|
14
|
-
"type": "filename",
|
|
15
|
-
"value": "bar.exe"
|
|
16
|
-
}
|
|
17
|
-
],
|
|
18
|
-
"analysis": "1",
|
|
19
|
-
"date": "2017-12-31",
|
|
20
|
-
"distribution": "1",
|
|
21
|
-
"info": "This is a test",
|
|
22
|
-
"threat_level_id": "1"
|
|
23
|
-
}
|
|
@@ -1,53 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"Object": [
|
|
3
|
-
{
|
|
4
|
-
"Attribute": [
|
|
5
|
-
{
|
|
6
|
-
"category": "Attribution",
|
|
7
|
-
"disable_correlation": false,
|
|
8
|
-
"object_relation": "registrar",
|
|
9
|
-
"to_ids": false,
|
|
10
|
-
"type": "whois-registrar",
|
|
11
|
-
"value": "registar.example.com"
|
|
12
|
-
},
|
|
13
|
-
{
|
|
14
|
-
"category": "Network activity",
|
|
15
|
-
"disable_correlation": false,
|
|
16
|
-
"object_relation": "domain",
|
|
17
|
-
"to_ids": true,
|
|
18
|
-
"type": "domain",
|
|
19
|
-
"value": "domain.example.com"
|
|
20
|
-
},
|
|
21
|
-
{
|
|
22
|
-
"category": "Network activity",
|
|
23
|
-
"disable_correlation": true,
|
|
24
|
-
"object_relation": "nameserver",
|
|
25
|
-
"to_ids": false,
|
|
26
|
-
"type": "hostname",
|
|
27
|
-
"value": "ns1.example.com"
|
|
28
|
-
},
|
|
29
|
-
{
|
|
30
|
-
"category": "External analysis",
|
|
31
|
-
"disable_correlation": false,
|
|
32
|
-
"object_relation": "nameserver",
|
|
33
|
-
"to_ids": true,
|
|
34
|
-
"type": "hostname",
|
|
35
|
-
"value": "ns2.example.com"
|
|
36
|
-
}
|
|
37
|
-
],
|
|
38
|
-
"description": "Whois records information for a domain name or an IP address.",
|
|
39
|
-
"distribution": "5",
|
|
40
|
-
"meta-category": "network",
|
|
41
|
-
"name": "whois",
|
|
42
|
-
"sharing_group_id": "0",
|
|
43
|
-
"template_uuid": "429faea1-34ff-47af-8a00-7c62d3be5a6a",
|
|
44
|
-
"template_version": "10",
|
|
45
|
-
"uuid": "a"
|
|
46
|
-
}
|
|
47
|
-
],
|
|
48
|
-
"analysis": "1",
|
|
49
|
-
"date": "2017-12-31",
|
|
50
|
-
"distribution": "1",
|
|
51
|
-
"info": "This is a test",
|
|
52
|
-
"threat_level_id": "1"
|
|
53
|
-
}
|
|
@@ -1,57 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"Object": [
|
|
3
|
-
{
|
|
4
|
-
"Attribute": [
|
|
5
|
-
{
|
|
6
|
-
"Tag": [
|
|
7
|
-
{
|
|
8
|
-
"name": "blah"
|
|
9
|
-
}
|
|
10
|
-
],
|
|
11
|
-
"category": "Payload delivery",
|
|
12
|
-
"disable_correlation": true,
|
|
13
|
-
"object_relation": "filename",
|
|
14
|
-
"to_ids": true,
|
|
15
|
-
"type": "filename",
|
|
16
|
-
"value": "bar"
|
|
17
|
-
}
|
|
18
|
-
],
|
|
19
|
-
"ObjectReference": [
|
|
20
|
-
{
|
|
21
|
-
"comment": "foo",
|
|
22
|
-
"object_uuid": "a",
|
|
23
|
-
"referenced_uuid": "b",
|
|
24
|
-
"relationship_type": "baz"
|
|
25
|
-
}
|
|
26
|
-
],
|
|
27
|
-
"description": "File object describing a file with meta-information",
|
|
28
|
-
"distribution": "5",
|
|
29
|
-
"meta-category": "file",
|
|
30
|
-
"name": "file",
|
|
31
|
-
"sharing_group_id": "0",
|
|
32
|
-
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
|
33
|
-
"template_version": "25",
|
|
34
|
-
"uuid": "a"
|
|
35
|
-
},
|
|
36
|
-
{
|
|
37
|
-
"Attribute": [
|
|
38
|
-
{
|
|
39
|
-
"category": "Network activity",
|
|
40
|
-
"disable_correlation": false,
|
|
41
|
-
"object_relation": "url",
|
|
42
|
-
"to_ids": true,
|
|
43
|
-
"type": "url",
|
|
44
|
-
"value": "https://www.circl.lu"
|
|
45
|
-
}
|
|
46
|
-
],
|
|
47
|
-
"description": "url object describes an url along with its normalized field (like extracted using faup parsing library) and its metadata.",
|
|
48
|
-
"distribution": "5",
|
|
49
|
-
"meta-category": "network",
|
|
50
|
-
"name": "url",
|
|
51
|
-
"sharing_group_id": "0",
|
|
52
|
-
"template_uuid": "60efb77b-40b5-4c46-871b-ed1ed999fce5",
|
|
53
|
-
"template_version": "10",
|
|
54
|
-
"uuid": "b"
|
|
55
|
-
}
|
|
56
|
-
]
|
|
57
|
-
}
|
|
@@ -1,62 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"Object": [
|
|
3
|
-
{
|
|
4
|
-
"Attribute": [
|
|
5
|
-
{
|
|
6
|
-
"Tag": [
|
|
7
|
-
{
|
|
8
|
-
"name": "blah"
|
|
9
|
-
}
|
|
10
|
-
],
|
|
11
|
-
"category": "Payload delivery",
|
|
12
|
-
"disable_correlation": true,
|
|
13
|
-
"object_relation": "filename",
|
|
14
|
-
"to_ids": true,
|
|
15
|
-
"type": "filename",
|
|
16
|
-
"value": "bar"
|
|
17
|
-
},
|
|
18
|
-
{
|
|
19
|
-
"category": "Artifacts dropped",
|
|
20
|
-
"disable_correlation": false,
|
|
21
|
-
"object_relation": "pattern-in-file",
|
|
22
|
-
"to_ids": true,
|
|
23
|
-
"type": "pattern-in-file",
|
|
24
|
-
"value": "baz"
|
|
25
|
-
}
|
|
26
|
-
],
|
|
27
|
-
"description": "File object describing a file with meta-information",
|
|
28
|
-
"distribution": "5",
|
|
29
|
-
"meta-category": "file",
|
|
30
|
-
"name": "file",
|
|
31
|
-
"sharing_group_id": "0",
|
|
32
|
-
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
|
33
|
-
"template_version": "25",
|
|
34
|
-
"uuid": "a"
|
|
35
|
-
},
|
|
36
|
-
{
|
|
37
|
-
"Attribute": [
|
|
38
|
-
{
|
|
39
|
-
"Tag": [
|
|
40
|
-
{
|
|
41
|
-
"name": "blah"
|
|
42
|
-
}
|
|
43
|
-
],
|
|
44
|
-
"category": "Payload delivery",
|
|
45
|
-
"disable_correlation": true,
|
|
46
|
-
"object_relation": "filename",
|
|
47
|
-
"to_ids": true,
|
|
48
|
-
"type": "filename",
|
|
49
|
-
"value": "baz"
|
|
50
|
-
}
|
|
51
|
-
],
|
|
52
|
-
"description": "File object describing a file with meta-information",
|
|
53
|
-
"distribution": "5",
|
|
54
|
-
"meta-category": "file",
|
|
55
|
-
"name": "file",
|
|
56
|
-
"sharing_group_id": "0",
|
|
57
|
-
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
|
58
|
-
"template_version": "25",
|
|
59
|
-
"uuid": "b"
|
|
60
|
-
}
|
|
61
|
-
]
|
|
62
|
-
}
|
|
@@ -1,29 +0,0 @@
|
|
|
1
|
-
{
|
|
2
|
-
"Object": [
|
|
3
|
-
{
|
|
4
|
-
"Attribute": [
|
|
5
|
-
{
|
|
6
|
-
"category": "Payload delivery",
|
|
7
|
-
"disable_correlation": false,
|
|
8
|
-
"object_relation": "filename",
|
|
9
|
-
"to_ids": true,
|
|
10
|
-
"type": "filename",
|
|
11
|
-
"value": "bar"
|
|
12
|
-
}
|
|
13
|
-
],
|
|
14
|
-
"Tag": [
|
|
15
|
-
{
|
|
16
|
-
"name": "osint"
|
|
17
|
-
}
|
|
18
|
-
],
|
|
19
|
-
"description": "File object describing a file with meta-information",
|
|
20
|
-
"distribution": 5,
|
|
21
|
-
"meta-category": "file",
|
|
22
|
-
"name": "file",
|
|
23
|
-
"sharing_group_id": 0,
|
|
24
|
-
"template_uuid": "688c46fb-5edb-40a3-8273-1af7923e2215",
|
|
25
|
-
"template_version": 9,
|
|
26
|
-
"uuid": "a"
|
|
27
|
-
}
|
|
28
|
-
]
|
|
29
|
-
}
|