fix: [exportPDF] Adding facultative text description, sightings, tests cases

pull/354/head
Falconieri 2019-02-27 11:48:56 +01:00
parent 10b5496174
commit a9c0ce4107
4 changed files with 871 additions and 66 deletions

View File

@ -125,7 +125,7 @@ class Flowable_Tag(Flowable):
# Copy of pdfexport.py moduleconfig
moduleconfig = ["MISP_base_url_for_dynamic_link", "MISP_name_for_metadata"]
moduleconfig = ["MISP_base_url_for_dynamic_link", "MISP_name_for_metadata", "Activate_textual_description"]
# == Row colors of the table (alternating) ==
EVEN_COLOR = colors.whitesmoke
@ -174,6 +174,22 @@ NOT_A_PICTURE_MESSAGE = "This attachment is not recognized as an image. Please a
GOOD_LINK_COLOR = 'blue'
BAD_LINK_COLOR = 'red'
# == Parameters for description ==
LOW_THREAT_COLOR = 'green'
MEDIUM_THREAT_COLOR = 'orange'
HIGH_THREAT_COLOR = 'red'
# == Parameters for improvement of event's metadata ==
threat_map = {"0": "<font color =" + MEDIUM_THREAT_COLOR + "> undefined (0)</font>",
"3": "<font color =" + LOW_THREAT_COLOR + "> Low (3)</font>",
"2": "<font color =" + MEDIUM_THREAT_COLOR + "> Medium (2)</font>",
"1": "<font color =" + HIGH_THREAT_COLOR + "> High (1)</font>"}
analysis_map = {"0": "<font color =" + HIGH_THREAT_COLOR + "> Initial (0)</font>",
"1": "<font color =" + MEDIUM_THREAT_COLOR + "> Ongoing (1)</font>",
"2": "<font color =" + LOW_THREAT_COLOR + "> Completed (2)</font>"}
########################################################################
# "UTILITIES" METHODS. Not meant to be used except for development purposes
@ -338,6 +354,62 @@ def get_value_link_to_event(misp_event, item, col2_style, config=None, color=Tru
return answer
def get_date_value(misp_event, item, col2_style):
'''
Returns a flowable paragraph to add to the pdf given the misp_event date
:param misp_event: A misp event with or without "date" attributes
:param item: a list of name, in order :
["Name to be print in the pdf", "json property access name",
" Name to be display if no values found in the misp_event"]
:param col2_style: style to be applied on the returned paragraph
:return: a Paragraph to add in the pdf, regarding the values of "date"
'''
if is_safe_attribute(misp_event, item[1]):
return Paragraph(safe_string(getattr(misp_event, item[1])), col2_style)
return Paragraph(item[2], col2_style)
def get_owner_value(misp_event, item, col2_style):
'''
Returns a flowable paragraph to add to the pdf given the misp_event owner
:param misp_event: A misp event with or without "owner" attributes
:param item: a list of name, in order :
["Name to be print in the pdf", "json property access name",
" Name to be display if no values found in the misp_event"]
:param col2_style: style to be applied on the returned paragraph
:return: a Paragraph to add in the pdf, regarding the values of "owner"
'''
if is_safe_attribute(misp_event, item[1]):
return Paragraph(safe_string(getattr(misp_event, item[1])), col2_style)
return Paragraph(item[2], col2_style)
def get_threat_value(misp_event, item, col2_style):
'''
Returns a flowable paragraph to add to the pdf given the misp_event threat
:param misp_event: A misp event with or without "threat" attributes
:param item: a list of name, in order :
["Name to be print in the pdf", "json property access name",
" Name to be display if no values found in the misp_event"]
:param col2_style: style to be applied on the returned paragraph
:return: a Paragraph to add in the pdf, regarding the values of "threat"
'''
if is_safe_attribute(misp_event, item[1]) and str(getattr(misp_event, item[1])) in threat_map:
return Paragraph(threat_map[safe_string(getattr(misp_event, item[1]))], col2_style)
return Paragraph(item[2], col2_style)
def get_analysis_value(misp_event, item, col2_style):
'''
Returns a flowable paragraph to add to the pdf given the misp_event analysis
:param misp_event: A misp event with or without "analysis" attributes
:param item: a list of name, in order :
["Name to be print in the pdf", "json property access name",
" Name to be display if no values found in the misp_event"]
:param col2_style: style to be applied on the returned paragraph
:return: a Paragraph to add in the pdf, regarding the values of "analysis"
'''
if is_safe_attribute(misp_event, item[1]) and str(getattr(misp_event, item[1])) in analysis_map:
return Paragraph(analysis_map[safe_string(getattr(misp_event, item[1]))], col2_style)
return Paragraph(item[2], col2_style)
def get_timestamp_value(misp_event, item, col2_style):
'''
Returns a flowable paragraph to add to the pdf given the misp_event timestamp
@ -349,7 +421,7 @@ def get_timestamp_value(misp_event, item, col2_style):
:return: a Paragraph to add in the pdf, regarding the values of "timestamp"
'''
if is_safe_attribute(misp_event, item[1]):
return Paragraph(str(getattr(misp_event, item[1]).strftime(EXPORT_DATE_FORMAT)), col2_style)
return Paragraph(safe_string(getattr(misp_event, item[1]).strftime(EXPORT_DATE_FORMAT)), col2_style)
return Paragraph(item[2], col2_style)
@ -379,7 +451,7 @@ def get_attributes_number_value(misp_event, item, col2_style):
:return: a Paragraph to add in the pdf, regarding the values of "attributes"
'''
if is_safe_attribute(misp_event, item[1]):
return Paragraph(str(len(getattr(misp_event, item[1]))), col2_style)
return Paragraph(safe_string(len(getattr(misp_event, item[1]))), col2_style)
return Paragraph(item[2], col2_style)
@ -443,10 +515,12 @@ def is_safe_attribute(curr_object, attribute_name):
return hasattr(curr_object, attribute_name) and getattr(curr_object, attribute_name) is not None and getattr(
curr_object, attribute_name) != ""
def is_safe_attribute_table(curr_object, attribute_name):
return hasattr(curr_object, attribute_name) and getattr(curr_object, attribute_name) is not None and getattr(
curr_object, attribute_name) != []
def create_flowable_table_from_one_attribute(misp_attribute):
'''
Returns a table (flowalbe) representing the attribute
@ -496,6 +570,12 @@ def create_flowable_table_from_one_attribute(misp_attribute):
if is_safe_attribute_table(misp_attribute, item[1]):
data.append([Paragraph(item[0], col1_style), get_tag_value(misp_attribute, item, col2_style)])
# Tags
item = ["Sighting", 'Sighting', "None"]
if is_safe_attribute_table(misp_attribute, item[1]):
data.append([Paragraph(item[0], col1_style),
create_flowable_paragraph_from_sightings(misp_attribute, item, col2_style)])
return create_flowable_table_from_data(data)
@ -741,22 +821,6 @@ def create_flowable_table_from_event(misp_event, config=None):
:return: a table that can be added to a pdf
'''
# To reduce code size, and automate it a bit, triplet (Displayed Name, object_attribute_name,
# to_display_if_not_present) are store in the following list
list_attr_automated = [
# ["Event ID", 'id', "None"],
["Date", 'date', "None"],
["Owner org", 'owner', "None"],
["Threat level", 'threat_level_id', "None"], # TODO : improve design
["Analysis", 'analysis', "None"], # TODO : improve design + Ask where the enum is !
# TODO : Not present ["Email", 'email', "None"],
# TODO : ["Distribution", 'distribution', "None"],
# TODO : ["First recorded change", 'TODO', "None"],
# TODO : ["Last change", 'TODO', "None"],
# TODO : ["Modification map", 'TODO', "None"],
# TODO : ["Sightings", 'TODO', "None"]
]
data = []
col1_style, col2_style = get_table_styles()
@ -765,19 +829,22 @@ def create_flowable_table_from_event(misp_event, config=None):
item = ["UUID", 'uuid', "None"]
data.append([Paragraph(item[0], col1_style), get_value_link_to_event(misp_event, item, col2_style, config)])
# Automated adding of standard (python) attributes of the misp event
# Note that PEP 0363 may change the syntax in future release : https://www.python.org/dev/peps/pep-0363/
for item in list_attr_automated:
if hasattr(misp_event, item[1]):
# The attribute exist, we fetch it and create the row
data.append(
[Paragraph(item[0], col1_style),
get_unoverflowable_paragraph(getattr(misp_event, item[1]), col2_style)])
else:
# The attribute does not exist ,we print a default text on the row
data.append([Paragraph(item[0], col1_style), Paragraph(item[2], col2_style)])
# Date
item = ["Date", 'date', "None"]
data.append([Paragraph(item[0], col1_style), get_date_value(misp_event, item, col2_style)])
# Owner
item = ["Owner org", 'owner', "None"]
data.append([Paragraph(item[0], col1_style), get_owner_value(misp_event, item, col2_style)])
# Threat
item = ["Threat level", 'threat_level_id', "None"]
data.append([Paragraph(item[0], col1_style), get_threat_value(misp_event, item, col2_style)])
# Analysis
item = ["Analysis", 'analysis', "None"]
data.append([Paragraph(item[0], col1_style), get_analysis_value(misp_event, item, col2_style)])
# Manual addition
# Info
item = ["Info", 'info', "None"]
data.append([Paragraph(item[0], col1_style), get_value_link_to_event(misp_event, item, col2_style, config)])
@ -805,6 +872,111 @@ def create_flowable_table_from_event(misp_event, config=None):
return create_flowable_table_from_data(data)
def create_flowable_description_from_event(misp_event, config=None):
'''
Returns a Paragraph presenting a MISP event
:param misp_event: A misp event (complete or not)
:return: a paragraph that can be added to a pdf
'''
'''
The event "{EventName}" | that occurred on {EventDate}, | had been shared by {Organisation Name} | on the {Date}.
'''
text = ""
item = ["Info", 'info', "None"]
if is_safe_attribute(misp_event, item[1]):
text += "The event '"
text += str(getattr(misp_event, item[1]))
text += "'"
else:
text += "This event"
item = ["Event date", 'timestamp', "None"]
if is_safe_attribute(misp_event, item[1]):
text += " that occurred on "
text += str(getattr(misp_event, item[1]).strftime(EXPORT_DATE_FORMAT))
text += ","
item = ["Creator Org", 'Orgc', "None", "name"]
text += " had been shared by "
if is_safe_attribute(misp_event, item[1]):
text += safe_string(getattr(getattr(misp_event, item[1]), item[3]))
else:
text += " an unknown organisation"
item = ["Date", 'date', "None"]
if is_safe_attribute(misp_event, item[1]):
text += " on the "
text += str(getattr(misp_event, item[1]))
else:
text += " on an unknown date"
text += "."
'''
The threat level of this event is {ThreatLevel} and the analysis that was made of this event is {AnalysisLevel}.
'''
item = ["Threat level", 'threat_level_id', "None"]
text += " The threat level of this event is "
if is_safe_attribute(misp_event, item[1]) and str(getattr(misp_event, item[1])) in threat_map:
text += threat_map[str(getattr(misp_event, item[1]))]
else:
text += " unknown"
item = ["Analysis", 'analysis', "None"]
text += " and the analysis that was made of this event is "
if is_safe_attribute(misp_event, item[1]) and str(getattr(misp_event, item[1])) in analysis_map:
text += analysis_map[str(getattr(misp_event, item[1]))]
else:
text += " undefined"
text += "."
'''
The event is currently {Published} and has associated attributes {Attribute Number}.
'''
item = ["Published", 'published', "None", "publish_timestamp"]
text += " The event is currently "
if is_safe_attribute(misp_event, item[1]) and getattr(misp_event, item[1]):
text += " published"
if is_safe_attribute(misp_event, item[3]):
text += " since " + getattr(misp_event, item[3]).strftime(EXPORT_DATE_FORMAT)
else:
text += " private"
# Number of Attributes
item = ["# Attributes", 'Attribute', "None"]
text += ", has "
if is_safe_attribute_table(misp_event, item[1]):
text += str(len(getattr(misp_event, item[1])))
else:
text += " 0"
text += " associated attributes"
# Number of Objects
item = ["# Objects", 'Object', "None"]
text += " and has "
if is_safe_attribute_table(misp_event, item[1]):
text += str(len(getattr(misp_event, item[1])))
else:
text += " 0"
text += " associated objects."
'''
For more information on the event, please consult the rest of the document
'''
text += "<br/>For more information on the event, please consult following information."
col1_style, col2_style = get_table_styles()
description_style = ParagraphStyle(name='Description', parent=col2_style, alignment=TA_JUSTIFY)
return Paragraph(text, description_style)
def create_flowable_table_from_attributes(misp_event):
'''
Returns a list of flowables representing the list of attributes of a misp event.
@ -842,7 +1014,8 @@ def create_flowable_table_from_tags(misp_event):
col1_style, col2_style = get_table_styles()
i = 0
if is_safe_attribute_table(misp_event, "Tag") : # and len(getattr(misp_event, "Tag")) > 1: # 'Tag' can exist and be empty
if is_safe_attribute_table(misp_event,
"Tag"): # and len(getattr(misp_event, "Tag")) > 1: # 'Tag' can exist and be empty
# There is some tags for this object
for item in getattr(misp_event, "Tag"):
flowable_table.append(create_flowable_tag(item))
@ -883,6 +1056,43 @@ def create_flowable_table_from_objects(misp_event):
return flowable_table
def create_flowable_paragraph_from_sightings(misp_attribute, item, col2_style):
'''
Returns a Table (flowable) to add to a pdf, representing the list of sightings of an event or a misp event
:param misp_event: A misp event
:return: a table of flowable to add to the pdf
'''
col1_style, col2_style = get_table_styles()
i = 0
POSITIVE_SIGHT_COLOR = 'green'
NEGATIVE_SIGHT_COLOR = 'red'
MISC_SIGHT_COLOR = 'orange'
list_sighting = [0, 0, 0]
if is_safe_attribute_table(misp_attribute, "Sighting"):
# There is some tags for this object
for item in getattr(misp_attribute, "Sighting"):
# TODO : When Sightings will be object : if is_safe_attribute(item, "type"):
if "type" in item:
# Store the likes/dislikes depending on their types
list_sighting[int(item["type"])] += 1
i += 1
# Create the sighting text
sight_text = "<font color =" + POSITIVE_SIGHT_COLOR + "> Positive : " + str(list_sighting[0]) + "</font>"
sight_text += " / " + "<font color =" + NEGATIVE_SIGHT_COLOR + "> Negative : " + str(
list_sighting[1]) + "</font>"
sight_text += " / " + "<font color =" + MISC_SIGHT_COLOR + "> Misc. : " + str(list_sighting[2]) + "</font>"
answer_sighting = Paragraph(sight_text, col2_style)
else:
# No tags for this object
answer_sighting = Paragraph("No sighting", col2_style)
return answer_sighting
########################################################################
# Handling static parts drawn on the upper layer
@ -960,39 +1170,36 @@ def collect_parts(misp_event, config=None):
# Create stuff
title_style = ParagraphStyle(name='Column_1', parent=sample_style_sheet['Heading1'], alignment=TA_CENTER)
title = get_value_link_to_event(misp_event, ["Info", 'info', "None"], title_style, config, False)
# Add all parts to final PDF
flowables.append(title)
if config is not None and moduleconfig[2] in config:
description = Paragraph("Description", sample_style_sheet['Heading2'])
description_text = create_flowable_description_from_event(misp_event, config)
flowables.append(description)
flowables.append(description_text)
subtitle = Paragraph("General information", sample_style_sheet['Heading2'])
table_general_metainformation = create_flowable_table_from_event(misp_event, config)
event_attributes_title = Paragraph("Attributes", sample_style_sheet['Heading2'])
table_direct_attributes = create_flowable_table_from_attributes(misp_event)
event_objects_title = Paragraph("Objects", sample_style_sheet['Heading2'])
table_objects = create_flowable_table_from_objects(misp_event)
event_sighting_title = Paragraph("Sighting", sample_style_sheet['Heading2'])
# TODO : table_event_sightings = create_flowable_table_from_sightings(misp_event)
# If you want to output the full json (as debug), just add next line
# paragraph_2 = Paragraph(str(misp_event.to_json()), sample_style_sheet['Code'])
# Add all parts to final PDF
flowables.append(title)
flowables.append(subtitle)
flowables.append(table_general_metainformation)
flowables.append(PageBreak())
event_attributes_title = Paragraph("Attributes", sample_style_sheet['Heading2'])
table_direct_attributes = create_flowable_table_from_attributes(misp_event)
flowables.append(event_attributes_title)
flowables += table_direct_attributes
flowables.append(PageBreak())
event_objects_title = Paragraph("Objects", sample_style_sheet['Heading2'])
table_objects = create_flowable_table_from_objects(misp_event)
flowables.append(event_objects_title)
flowables += table_objects
# TODO : flowables.append(PageBreak())
# TODO : flowables.append(event_sighting_title)
# TODO : flowables += table_event_sightings
# If you want to output the full json (as debug), just add next line and add it to flowables
# paragraph_2 = Paragraph(str(misp_event.to_json()), sample_style_sheet['Code'])
return flowables

View File

@ -0,0 +1,305 @@
{
"Event": {
"id": "60",
"orgc_id": "5",
"org_id": "1",
"date": "2018-08-01",
"threat_level_id": "3",
"info": "Ursnif, MALWAREMESSIAGH",
"published": true,
"uuid": "5b646415-7b48-40d5-86b4-c0070acd0835",
"attribute_count": "5",
"analysis": "2",
"timestamp": "1533306089",
"distribution": "3",
"proposal_email_lock": false,
"locked": false,
"publish_timestamp": "1550506283",
"sharing_group_id": "0",
"disable_correlation": false,
"extends_uuid": "",
"Org": {
"id": "1",
"name": "ORGNAME",
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c"
},
"Orgc": {
"id": "5",
"name": "Synovus Financial",
"uuid": "5a68c02d-959c-4c8a-a571-0dcac0a8060a"
},
"Attribute": [
{
"id": "8885",
"type": "domain",
"category": "Network activity",
"to_ids": true,
"uuid": "5b6464ca-e73c-4707-9b8a-d0350acd0835",
"event_id": "60",
"distribution": "5",
"timestamp": "1533306058",
"comment": "Ursnif",
"sharing_group_id": "0",
"deleted": false,
"disable_correlation": false,
"object_id": "0",
"object_relation": null,
"value": "ooiasjdnqjwbeasdasd.com",
"Galaxy": [],
"ShadowAttribute": [],
"Sighting": [
{
"id": "8",
"attribute_id": "8885",
"event_id": "60",
"org_id": "1",
"date_sighting": "1551253950",
"uuid": "5c7641bf-a4e8-4d5d-a653-03240a00020f",
"source": "",
"type": "0",
"Organisation": {
"id": "1",
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
"name": "ORGNAME"
},
"attribute_uuid": "5b6464ca-e73c-4707-9b8a-d0350acd0835"
}
]
},
{
"id": "8886",
"type": "domain",
"category": "Network activity",
"to_ids": true,
"uuid": "5b6464ca-45f8-43d0-8b78-d0350acd0835",
"event_id": "60",
"distribution": "5",
"timestamp": "1533306058",
"comment": "Ursnif",
"sharing_group_id": "0",
"deleted": false,
"disable_correlation": false,
"object_id": "0",
"object_relation": null,
"value": "eqowiesajenqweasd.com",
"Galaxy": [],
"ShadowAttribute": [],
"Sighting": [
{
"id": "9",
"attribute_id": "8886",
"event_id": "60",
"org_id": "1",
"date_sighting": "1551253959",
"uuid": "5c7641c7-f020-4643-92b4-03240a00020f",
"source": "",
"type": "1",
"Organisation": {
"id": "1",
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
"name": "ORGNAME"
},
"attribute_uuid": "5b6464ca-45f8-43d0-8b78-d0350acd0835"
}
]
},
{
"id": "8887",
"type": "domain",
"category": "Network activity",
"to_ids": true,
"uuid": "5b6464ca-8c84-4c2d-95d9-d0350acd0835",
"event_id": "60",
"distribution": "5",
"timestamp": "1533306058",
"comment": "Ursnif",
"sharing_group_id": "0",
"deleted": false,
"disable_correlation": false,
"object_id": "0",
"object_relation": null,
"value": "dquohwdihaewqdcas.com",
"Galaxy": [],
"ShadowAttribute": [],
"Sighting": [
{
"id": "10",
"attribute_id": "8887",
"event_id": "60",
"org_id": "1",
"date_sighting": "1551253962",
"uuid": "5c7641cb-ccc0-44ee-ab75-03240a00020f",
"source": "",
"type": "1",
"Organisation": {
"id": "1",
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
"name": "ORGNAME"
},
"attribute_uuid": "5b6464ca-8c84-4c2d-95d9-d0350acd0835"
}
]
},
{
"id": "8888",
"type": "domain",
"category": "Network activity",
"to_ids": true,
"uuid": "5b6464ca-e0a0-40e0-8e21-d0350acd0835",
"event_id": "60",
"distribution": "5",
"timestamp": "1533306058",
"comment": "Ursnif",
"sharing_group_id": "0",
"deleted": false,
"disable_correlation": false,
"object_id": "0",
"object_relation": null,
"value": "diqjwhebseqhbasdh.com",
"Galaxy": [],
"ShadowAttribute": [],
"Sighting": [
{
"id": "11",
"attribute_id": "8888",
"event_id": "60",
"org_id": "1",
"date_sighting": "1551253968",
"uuid": "5c7641d5-58bc-4d20-9a84-05f10a00020f",
"source": "honeyp",
"type": "2",
"Organisation": {
"id": "1",
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
"name": "ORGNAME"
},
"attribute_uuid": "5b6464ca-e0a0-40e0-8e21-d0350acd0835"
},
{
"id": "12",
"attribute_id": "8888",
"event_id": "60",
"org_id": "1",
"date_sighting": "1551253976",
"uuid": "5c7641db-a9a0-49b0-b536-05f10a00020f",
"source": "dede",
"type": "1",
"Organisation": {
"id": "1",
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
"name": "ORGNAME"
},
"attribute_uuid": "5b6464ca-e0a0-40e0-8e21-d0350acd0835"
}
]
},
{
"id": "8889",
"type": "url",
"category": "Payload delivery",
"to_ids": true,
"uuid": "5b6464e9-e73c-484d-a0b3-c0070acd0835",
"event_id": "60",
"distribution": "5",
"timestamp": "1533306089",
"comment": "Ursnif dropped file",
"sharing_group_id": "0",
"deleted": false,
"disable_correlation": false,
"object_id": "0",
"object_relation": null,
"value": "http:\/\/sistemait.it\/softaculous\/backup\/client.rar",
"Galaxy": [],
"ShadowAttribute": [],
"Sighting": [
{
"id": "7",
"attribute_id": "8889",
"event_id": "60",
"org_id": "1",
"date_sighting": "1551253943",
"uuid": "5c7641b7-b618-4e41-a9c9-03240a00020f",
"source": "",
"type": "0",
"Organisation": {
"id": "1",
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
"name": "ORGNAME"
},
"attribute_uuid": "5b6464e9-e73c-484d-a0b3-c0070acd0835"
}
]
}
],
"ShadowAttribute": [],
"RelatedEvent": [],
"Galaxy": [
{
"id": "4",
"uuid": "59f20cce-5420-4084-afd5-0884c0a83832",
"name": "Banker",
"type": "banker",
"description": "Banking malware galaxy.",
"version": "3",
"icon": "usd",
"namespace": "misp",
"GalaxyCluster": [
{
"id": "289",
"collection_uuid": "b9448d2a-a23c-4bf2-92a1-d860716ba2f3",
"type": "banker",
"value": "Gozi",
"tag_name": "misp-galaxy:banker=\"Gozi\"",
"description": "Banking trojan delivered primarily via email (typically malspam) and exploit kits. Gozi 1.0 source leaked in 2010",
"galaxy_id": "4",
"source": "Open Sources",
"authors": [
"Unknown",
"raw-data"
],
"version": "16",
"uuid": "",
"tag_id": "86",
"meta": {
"date": [
"First seen ~ 2007"
],
"refs": [
"https:\/\/www.secureworks.com\/research\/gozi",
"https:\/\/www.gdatasoftware.com\/blog\/2016\/11\/29325-analysis-ursnif-spying-on-your-data-since-2007",
"https:\/\/lokalhost.pl\/gozi_tree.txt"
],
"synonyms": [
"Ursnif",
"CRM",
"Snifula",
"Papras"
]
}
}
]
}
],
"Object": [],
"Tag": [
{
"id": "85",
"name": "PasteBin: MALWAREMESSIAGH",
"colour": "#ab34e3",
"exportable": true,
"user_id": "0",
"hide_tag": false,
"numerical_value": null
},
{
"id": "86",
"name": "misp-galaxy:banker=\"Gozi\"",
"colour": "#0088cc",
"exportable": true,
"user_id": "0",
"hide_tag": false,
"numerical_value": null
}
]
}
}

View File

@ -0,0 +1,221 @@
{
"Event": {
"id": "1",
"orgc_id": "1",
"org_id": "1",
"date": "2019-02-18",
"threat_level_id": "2",
"info": "This is the description",
"published": false,
"uuid": "5c6ab833-676c-42f3-95d2-034f0a00020f",
"attribute_count": "2",
"analysis": "1",
"timestamp": "1551253649",
"distribution": "1",
"proposal_email_lock": false,
"locked": false,
"publish_timestamp": "0",
"sharing_group_id": "0",
"disable_correlation": false,
"extends_uuid": "",
"event_creator_email": "admin@admin.test",
"Org": {
"id": "1",
"name": "ORGNAME",
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c"
},
"Orgc": {
"id": "1",
"name": "ORGNAME",
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c"
},
"Attribute": [
{
"id": "1",
"type": "comment",
"category": "Antivirus detection",
"to_ids": false,
"uuid": "5c6ab897-0f68-44ca-8d62-0c150a00020f",
"event_id": "1",
"distribution": "0",
"timestamp": "1550497961",
"comment": "Contextual commentary",
"sharing_group_id": "0",
"deleted": false,
"disable_correlation": false,
"object_id": "0",
"object_relation": null,
"value": "Value to test",
"Galaxy": [
{
"id": "15",
"uuid": "90ccdf38-1649-11e8-b8bf-e7326d553087",
"name": "Botnet",
"type": "botnet",
"description": "Botnet galaxy.",
"version": "2",
"icon": "sitemap",
"namespace": "misp",
"GalaxyCluster": [
{
"id": "2511",
"collection_uuid": "0d58f329-1356-468c-88ab-e21fbb64c02b",
"type": "botnet",
"value": "Asprox",
"tag_name": "misp-galaxy:botnet=\"Asprox\"",
"description": "The Asprox botnet (discovered around 2008), also known by its aliases Badsrc and Aseljo, is a botnet mostly involved in phishing scams and performing SQL injections into websites in order to spread malware.",
"galaxy_id": "15",
"source": "MISP Project",
"authors": [
"Various"
],
"version": "18",
"uuid": "",
"tag_id": "1",
"meta": {
"date": [
"2008"
],
"refs": [
"https:\/\/en.wikipedia.org\/wiki\/Asprox_botnet"
],
"synonyms": [
"Badsrc",
"Aseljo",
"Danmec",
"Hydraflux"
]
}
}
]
}
],
"ShadowAttribute": [],
"Tag": [
{
"id": "1",
"name": "misp-galaxy:botnet=\"Asprox\"",
"colour": "#0088cc",
"exportable": true,
"user_id": "0",
"hide_tag": false,
"numerical_value": null
}
],
"Sighting": [
{
"id": "5",
"attribute_id": "1",
"event_id": "1",
"org_id": "1",
"date_sighting": "1551253653",
"uuid": "5c764095-129c-4e81-956d-0e1a0a00020f",
"source": "",
"type": "1",
"Organisation": {
"id": "1",
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
"name": "ORGNAME"
},
"attribute_uuid": "5c6ab897-0f68-44ca-8d62-0c150a00020f"
}
]
},
{
"id": "242460",
"type": "target-external",
"category": "Targeting data",
"to_ids": true,
"uuid": "5c764091-273c-4821-92ad-0e1a0a00020f",
"event_id": "1",
"distribution": "2",
"timestamp": "1551253649",
"comment": "This is a contextual comment",
"sharing_group_id": "0",
"deleted": false,
"disable_correlation": false,
"object_id": "0",
"object_relation": null,
"value": "testvalue",
"Galaxy": [],
"ShadowAttribute": [],
"Sighting": [
{
"id": "6",
"attribute_id": "242460",
"event_id": "1",
"org_id": "1",
"date_sighting": "1551253653",
"uuid": "5c764095-26ec-4de1-99f2-0e1a0a00020f",
"source": "",
"type": "0",
"Organisation": {
"id": "1",
"uuid": "5c6983c8-3af8-4304-869c-4800d6c1883c",
"name": "ORGNAME"
},
"attribute_uuid": "5c764091-273c-4821-92ad-0e1a0a00020f"
}
]
}
],
"ShadowAttribute": [],
"RelatedEvent": [],
"Galaxy": [
{
"id": "15",
"uuid": "90ccdf38-1649-11e8-b8bf-e7326d553087",
"name": "Botnet",
"type": "botnet",
"description": "Botnet galaxy.",
"version": "2",
"icon": "sitemap",
"namespace": "misp",
"GalaxyCluster": [
{
"id": "2511",
"collection_uuid": "0d58f329-1356-468c-88ab-e21fbb64c02b",
"type": "botnet",
"value": "Asprox",
"tag_name": "misp-galaxy:botnet=\"Asprox\"",
"description": "The Asprox botnet (discovered around 2008), also known by its aliases Badsrc and Aseljo, is a botnet mostly involved in phishing scams and performing SQL injections into websites in order to spread malware.",
"galaxy_id": "15",
"source": "MISP Project",
"authors": [
"Various"
],
"version": "18",
"uuid": "",
"tag_id": "1",
"meta": {
"date": [
"2008"
],
"refs": [
"https:\/\/en.wikipedia.org\/wiki\/Asprox_botnet"
],
"synonyms": [
"Badsrc",
"Aseljo",
"Danmec",
"Hydraflux"
]
}
}
]
}
],
"Object": [],
"Tag": [
{
"id": "1",
"name": "misp-galaxy:botnet=\"Asprox\"",
"colour": "#0088cc",
"exportable": true,
"user_id": "0",
"hide_tag": false,
"numerical_value": null
}
]
}
}

View File

@ -26,6 +26,8 @@ class TestMISPEvent(unittest.TestCase):
self.test_image_folder = self.root + "image_json/"
self.storage_folder = self.root + "reportlab_testoutputs/"
self.storage_image_folder = self.root + "reportlab_test_image_outputs/"
self.moduleconfig = ["MISP_base_url_for_dynamic_link", "MISP_name_for_metadata", "Activate_textual_description"]
def init_event(self):
self.mispevent.info = 'This is a test'
@ -91,9 +93,8 @@ class TestMISPEvent(unittest.TestCase):
else:
config = {}
moduleconfig = ["MISP_base_url_for_dynamic_link", "MISP_name_for_metadata"]
config[moduleconfig[0]] = "http://localhost:8080"
config[moduleconfig[1]] = "My Wonderful CERT"
config[self.moduleconfig[0]] = "http://localhost:8080"
config[self.moduleconfig[1]] = "My Wonderful CERT"
self.init_event()
self.mispevent.load_file(self.test_folder + 'very_long_event.json')
@ -106,8 +107,7 @@ class TestMISPEvent(unittest.TestCase):
else:
config = {}
moduleconfig = ["MISP_base_url_for_dynamic_link", "MISP_name_for_metadata"]
config[moduleconfig[0]] = "http://localhost:8080"
config[self.moduleconfig[0]] = "http://localhost:8080"
self.init_event()
self.mispevent.load_file(self.test_folder + 'very_long_event.json')
@ -120,8 +120,7 @@ class TestMISPEvent(unittest.TestCase):
else:
config = {}
moduleconfig = ["MISP_base_url_for_dynamic_link", "MISP_name_for_metadata"]
config[moduleconfig[1]] = "My Wonderful CERT"
config[self.moduleconfig[1]] = "My Wonderful CERT"
self.init_event()
self.mispevent.load_file(self.test_folder + 'very_long_event.json')
@ -134,9 +133,8 @@ class TestMISPEvent(unittest.TestCase):
else:
config = {}
moduleconfig = ["MISP_base_url_for_dynamic_link", "MISP_name_for_metadata"]
config[moduleconfig[0]] = "http://localhost:8080"
config[moduleconfig[1]] = "My Wonderful CERT"
config[self.moduleconfig[0]] = "http://localhost:8080"
config[self.moduleconfig[1]] = "My Wonderful CERT"
self.init_event()
self.mispevent.load_file(self.test_folder + 'image_event.json')
@ -149,9 +147,8 @@ class TestMISPEvent(unittest.TestCase):
else:
config = {}
moduleconfig = ["MISP_base_url_for_dynamic_link", "MISP_name_for_metadata"]
config[moduleconfig[0]] = "http://localhost:8080"
config[moduleconfig[1]] = "My Wonderful CERT"
config[self.moduleconfig[0]] = "http://localhost:8080"
config[self.moduleconfig[1]] = "My Wonderful CERT"
self.init_event()
self.mispevent.load_file(self.test_folder + 'mainly_objects_1.json')
@ -164,15 +161,57 @@ class TestMISPEvent(unittest.TestCase):
else:
config = {}
moduleconfig = ["MISP_base_url_for_dynamic_link", "MISP_name_for_metadata"]
config[moduleconfig[0]] = "http://localhost:8080"
config[moduleconfig[1]] = "My Wonderful CERT"
config[self.moduleconfig[0]] = "http://localhost:8080"
config[self.moduleconfig[1]] = "My Wonderful CERT"
self.init_event()
self.mispevent.load_file(self.test_folder + 'mainly_objects_2.json')
reportlab_generator.register_value_to_file(reportlab_generator.convert_event_in_pdf_buffer(self.mispevent, config),
self.storage_folder + "mainly_objects_2.pdf")
def test_sightings_1_json(self):
if self.check_python_2():
self.assertTrue(True)
else:
config = {}
config[self.moduleconfig[0]] = "http://localhost:8080"
config[self.moduleconfig[1]] = "My Wonderful CERT"
self.init_event()
self.mispevent.load_file(self.test_folder + 'sighting_1.json')
reportlab_generator.register_value_to_file(reportlab_generator.convert_event_in_pdf_buffer(self.mispevent, config),
self.storage_folder + "sighting_1.pdf")
def test_sightings_2_json(self):
if self.check_python_2():
self.assertTrue(True)
else:
config = {}
config[self.moduleconfig[0]] = "http://localhost:8080"
config[self.moduleconfig[1]] = "My Wonderful CERT"
self.init_event()
self.mispevent.load_file(self.test_folder + 'sighting_2.json')
reportlab_generator.register_value_to_file(reportlab_generator.convert_event_in_pdf_buffer(self.mispevent, config),
self.storage_folder + "sighting_2.pdf")
def test_textual_json(self):
if self.check_python_2():
self.assertTrue(True)
else:
config = {}
config[self.moduleconfig[0]] = "http://localhost:8080"
config[self.moduleconfig[1]] = "My Wonderful CERT"
config[self.moduleconfig[2]] = True
self.init_event()
self.mispevent.load_file(self.test_folder + 'very_long_event.json')
reportlab_generator.register_value_to_file(reportlab_generator.convert_event_in_pdf_buffer(self.mispevent, config),
self.storage_folder + "textual.pdf")
def test_batch_image_events(self):
# Test case ONLY for manual testing. Needs to download a full list of image events !
@ -229,3 +268,36 @@ class TestMISPEvent(unittest.TestCase):
self.storage_folder + curr_file + ".pdf")
print("Elapsed time : " + str(time.time() - t))
# Local run : 1958.930s for 1064 files
def test_batch_OSINT_with_config_events(self):
# Test case ONLY for manual testing. Needs to download a full list of OSINT events !
if self.check_python_2():
self.assertTrue(True)
elif not manual_testing :
self.assertTrue(True)
else:
self.init_event()
config = {}
config[self.moduleconfig[0]] = "http://localhost:8080"
config[self.moduleconfig[1]] = "My Wonderful CERT"
config[self.moduleconfig[2]] = True
file_nb = str(len(os.listdir(self.test_batch_folder)))
i = 0
t = time.time()
for curr_file in os.listdir(self.test_batch_folder):
self.mispevent = MISPEvent()
file_path = self.test_batch_folder + curr_file
print("Current file : " + file_path + " " + str(i) + " over " + file_nb)
i += 1
self.mispevent.load_file(file_path)
reportlab_generator.register_value_to_file(
reportlab_generator.convert_event_in_pdf_buffer(self.mispevent, config),
self.storage_folder + curr_file + ".pdf")
print("Elapsed time : " + str(time.time() - t))
# Local run : 1958.930s for 1064 files