|
181 | 181 | 'protocol.transport': 'udp', |
182 | 182 | } for destport in [17875, 24526, 54449, 9314, 4903, |
183 | 183 | 1568, 20749, 30524, 59316, 60704]] + [ |
184 | | - {'classification.type': 'spam', |
185 | | - 'classification.identifier': 'spam', |
186 | | - 'time.source': '2019-10-02T23:00:17+00:00', |
187 | | - }, |
188 | | - {'time.source': '2019-10-23T12:46:18+00:00', |
189 | | - 'classification.type': 'phishing', |
190 | | - 'classification.identifier': 'phishing', |
191 | | - }, |
192 | | - {'classification.type': 'scanner', |
193 | | - 'classification.identifier': 'darknet', |
194 | | - 'protocol.transport': 'nvp-ii', |
195 | | - 'destination.port': 0, |
196 | | - 'time.source': '2020-01-10T09:17:17+00:00', |
197 | | - }, |
198 | | - {'classification.type': 'infected-system', |
199 | | - 'classification.identifier': 'conficker', |
200 | | - 'malware.name': 'conficker', |
201 | | - 'source.port': 1997, |
202 | | - 'destination.ip': '172.16.0.22', |
203 | | - 'time.source': '2020-05-08T09:13:34+00:00', |
204 | | - }, |
205 | | - {'classification.type': 'scanner', |
206 | | - 'classification.identifier': 'scanner', |
207 | | - 'time.source': '2020-07-09T03:40:15+00:00', |
208 | | - 'source.account': 'pm', |
209 | | - }, |
210 | | - {'classification.type': 'scanner', |
211 | | - 'classification.identifier': 'darknet', |
212 | | - 'time.source': '2020-10-08T02:21:26+00:00', |
213 | | - 'protocol.transport': 'gre', |
214 | | - }, |
215 | | - {'classification.type': 'scanner', |
216 | | - 'classification.identifier': 'darknet', |
217 | | - 'time.source': '2020-10-15T09:22:10+00:00', |
218 | | - 'protocol.transport': 'ipv6-nonxt', |
219 | | - }, |
220 | | - { |
221 | | - 'classification.type': 'proxy', |
222 | | - 'classification.identifier': 'openproxy', |
223 | | - 'time.source': '2020-12-14T08:28:01+00:00', |
224 | | - 'extra.source.asns': [64496, 212682], |
225 | | - 'protocol.application': 'httpconnect', |
226 | | - 'source.port': 51915, |
227 | | - }, |
228 | | - {'classification.type': 'brute-force', |
229 | | - 'protocol.transport': 'tcp', |
230 | | - 'destination.port': 22, |
231 | | - 'source.port': 16794, |
232 | | - 'time.source': '2021-03-09T00:11:21+00:00', |
233 | | - }, |
234 | | - ] |
| 184 | + {'classification.type': 'spam', |
| 185 | + 'classification.identifier': 'spam', |
| 186 | + 'time.source': '2019-10-02T23:00:17+00:00', |
| 187 | + }, |
| 188 | + {'time.source': '2019-10-23T12:46:18+00:00', |
| 189 | + 'classification.type': 'phishing', |
| 190 | + 'classification.identifier': 'phishing', |
| 191 | + }, |
| 192 | + {'classification.type': 'scanner', |
| 193 | + 'classification.identifier': 'darknet', |
| 194 | + 'protocol.transport': 'nvp-ii', |
| 195 | + 'destination.port': 0, |
| 196 | + 'time.source': '2020-01-10T09:17:17+00:00', |
| 197 | + }, |
| 198 | + {'classification.type': 'infected-system', |
| 199 | + 'classification.identifier': 'conficker', |
| 200 | + 'malware.name': 'conficker', |
| 201 | + 'source.port': 1997, |
| 202 | + 'destination.ip': '172.16.0.22', |
| 203 | + 'time.source': '2020-05-08T09:13:34+00:00', |
| 204 | + }, |
| 205 | + {'classification.type': 'scanner', |
| 206 | + 'classification.identifier': 'scanner', |
| 207 | + 'time.source': '2020-07-09T03:40:15+00:00', |
| 208 | + 'source.account': 'pm', |
| 209 | + }, |
| 210 | + {'classification.type': 'scanner', |
| 211 | + 'classification.identifier': 'darknet', |
| 212 | + 'time.source': '2020-10-08T02:21:26+00:00', |
| 213 | + 'protocol.transport': 'gre', |
| 214 | + }, |
| 215 | + {'classification.type': 'scanner', |
| 216 | + 'classification.identifier': 'darknet', |
| 217 | + 'time.source': '2020-10-15T09:22:10+00:00', |
| 218 | + 'protocol.transport': 'ipv6-nonxt', |
| 219 | + }, |
| 220 | + { |
| 221 | + 'classification.type': 'proxy', |
| 222 | + 'classification.identifier': 'openproxy', |
| 223 | + 'time.source': '2020-12-14T08:28:01+00:00', |
| 224 | + 'extra.source.asns': [64496, 212682], |
| 225 | + 'protocol.application': 'httpconnect', |
| 226 | + 'source.port': 51915, |
| 227 | + }, |
| 228 | + {'classification.type': 'brute-force', |
| 229 | + 'protocol.transport': 'tcp', |
| 230 | + 'destination.port': 22, |
| 231 | + 'source.port': 16794, |
| 232 | + 'time.source': '2021-03-09T00:11:21+00:00', |
| 233 | + }, |
| 234 | + {'time.source': '2019-03-22T18:18:52+00:00', |
| 235 | + 'classification.type': 'infected-system', |
| 236 | + 'classification.identifier': 'conficker', |
| 237 | + 'malware.name': 'conficker', |
| 238 | + 'source.geolocation.cc': 'AT', |
| 239 | + }, |
| 240 | + {'time.source': '2019-03-22T20:18:52+00:00', |
| 241 | + 'classification.type': 'infected-system', |
| 242 | + 'classification.identifier': 'conficker', |
| 243 | + 'malware.name': 'conficker', |
| 244 | + 'source.fqdn': '21-0-16-172.example.tld', |
| 245 | + 'source.geolocation.cc': 'AT', |
| 246 | + }, |
| 247 | +] |
235 | 248 |
|
236 | 249 | # The number of events a single line in the raw data produces |
237 | 250 | NUM_EVENTS = (1, 1, 1, 1, 1, 2, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, |
238 | | - 1, 1, 10, 1, 1, 1, 1, 1, 1, 1, 1, 1) |
| 251 | + 1, 1, 10, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1) |
239 | 252 | RAWS = [] |
240 | 253 | for i, line in enumerate(RAW_LINES[3:]): |
241 | 254 | for count in range(NUM_EVENTS[i]): |
|
0 commit comments