mirror of https://github.com/MISP/PyMISP
				
				
				
			
		
			
				
	
	
		
			95 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			95 lines
		
	
	
		
			3.0 KiB
		
	
	
	
		
			Python
		
	
	
| #!/usr/bin/env python
 | |
| # -*- coding: utf-8 -*-
 | |
| 
 | |
| mispUrl = ''
 | |
| mispKey = ''
 | |
| 
 | |
| ###############################
 | |
| # file use for internal tag
 | |
| # some sample can be find here : 
 | |
| #	https://github.com/eset/malware-ioc
 | |
| #	https://github.com/fireeye/iocs
 | |
| csvTaxonomyFile = "taxonomy.csv"
 | |
| 
 | |
| # csv delimiter : ";" with quotechar : "
 | |
| 
 | |
| ###############################
 | |
| # link sample
 | |
| 	#~ <links>
 | |
| 		#~ <link rel="threatcategory">APT</link>
 | |
| 		#~ <link rel="threatgroup">APT12</link>
 | |
| 		#~ <link rel="category">Backdoor</link>
 | |
| 		#~ <link rel="license">Apache 2.0</link>
 | |
| 	#~ </links>
 | |
| 
 | |
| #	@link from csv
 | |
| #		= rel attribut from <link>
 | |
| #	@value from csv
 | |
| #		= value 
 | |
| #	@keep
 | |
| #		0 : don't create tag
 | |
| #		1 : tag created
 | |
| #	@taxonomy
 | |
| #		define tag for misp
 | |
| #	@comment
 | |
| #		litte description but not use
 | |
| 
 | |
| 
 | |
| #########################################
 | |
| # https://www.circl.lu/doc/misp/categories-and-types/index.html
 | |
| #	/\
 | |
| #	||
 | |
| #	||
 | |
| #	\/
 | |
| # http://schemas.mandiant.com/
 | |
| 
 | |
| # @index = Context/search form ioc
 | |
| # @(1, 2, 3)
 | |
| #	1. categorie mapping
 | |
| #	2. type mapping
 | |
| #	3. optionnal comment
 | |
| 
 | |
| 
 | |
| iocMispMapping = {
 | |
| 				
 | |
| 				('DriverItem/DriverName') : (u'Artifacts dropped',u'other', u'DriverName. '),
 | |
| 				
 | |
| 				('DnsEntryItem/Host') : (u'Network activity',u'domain'),
 | |
| 				
 | |
| 				('Email/To') : (u'Targeting data',u'target-email'),
 | |
| 				('Email/Date') : (u'Other',u'comment',u'EmailDate. '),
 | |
| 				('Email/Body') : (u'Payload delivery',u'email-subject'),
 | |
| 				('Email/From') : (u'Payload delivery',u'email-dst'),
 | |
| 				('Email/Subject') : (u'Payload delivery',u'email-subject'),
 | |
| 				('Email/Attachment/Name') : (u'Payload delivery',u'email-attachment'),
 | |
| 				  
 | |
| 				('FileItem/Md5sum') : (u'External analysis',u'md5'),
 | |
| 				('FileItem/Sha1sum') : (u'External analysis',u'sha1'),
 | |
| 				('FileItem/FileName') : (u'External analysis',u'filename'),
 | |
| 				('FileItem/FullPath') : (u'External analysis',u'filename'),
 | |
| 				('FileItem/FilePath') : (u'External analysis',u'filename'),
 | |
| 				('FileItem/Sha256sum') : (u'External analysis',u'sha256'),
 | |
| 				
 | |
| 				('Network/URI') : (u'Network activity',u'uri'),
 | |
| 				('Network/DNS') : (u'Network activity',u'domain'),
 | |
| 				('Network/String') : (u'Network activity',u'ip-dst'),
 | |
| 				('Network/UserAgent') : (u'Network activity',u'user-agent'),
 | |
| 				
 | |
| 				('PortItem/localIP') : (u'Network activity',u'ip-dst'),
 | |
| 				
 | |
| 				('ProcessItem/name') : (u'External analysis',u'pattern-in-memory', u'ProcessName. '),
 | |
| 				('ProcessItem/path') : (u'External analysis',u'pattern-in-memory', u'ProcessPath. '),
 | |
| 				('ProcessItem/Mutex') : (u'Artifacts dropped',u'mutex', u'mutex'),
 | |
| 				('ProcessItem/Pipe/Name') : (u'Artifacts dropped',u'named pipe'),
 | |
| 				('ProcessItem/Mutex/Name') : (u'Artifacts dropped',u'mutex', u'MutexName. '),
 | |
| 				
 | |
| 				('RegistryItem/Text') : (u'Artifacts dropped',u'regkey', u'RegistryText. '),
 | |
| 				('RegistryItem/Path') : (u'Artifacts dropped',u'regkey', u'RegistryPath. '),
 | |
| 				
 | |
| 				('ServiceItem/name') : (u'Artifacts dropped',u'windows-service-name'),
 | |
| 				('ServiceItem/type') : (u'Artifacts dropped',u'pattern-in-memory', u'ServiceType. '),
 | |
| 				
 | |
| 				('Snort/Snort') : (u'Network activity',u'snort'),
 | |
| 				
 | |
| 				}
 |