Giter VIP home page Giter VIP logo

data's People

Contributors

bryant1410 avatar kbandla avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

data's Issues

Implement tagging

Work on the implementation of tagging mechanism within the table and json contexts

Add ESET SBDH report

Release date: (7/1/2016)

Vendor: ESET

Link: http://www.welivesecurity.com/2016/07/01/espionage-toolkit-targeting-central-eastern-europe-uncovered

PDF:

Group:

Other: SBDH toolkit

Hashes:
1345b6189441cd1ed9036ef098adf12746ecf7cb
15b956feee0fa42f89c67ca568a182c348e20ead
f2a1e4b58c9449776bd69f62a8f2ba7a72580da2
7f32cae8d6821fd50de571c40a8342acaf858541
5DDBDD3CF632F7325D6C261BCC516627D772381A
4B94E8A10C5BCA43797283ECD24DF24421E411D2
D2E9EB26F3212D96E341E4CBA7483EF46DF8A1BE
09C56B14DB3785033C8FDEC41F7EA9497350EDAE

Add FireEye report: APT GROUP SENDS SPEAR PHISHING EMAILS TO INDIAN GOVERNMENT OFFICIALS

Release date: (06/03/2016)

Vendor: FireEye

Link: https://www.fireeye.com/blog/threat-research/2016/06/apt_group_sends_spea.html

PDF:

Group: suspected Pakistan-based APT group

Other:
On May 18, 2016, FireEye Labs observed a suspected Pakistan-based APT group sending spear phishing emails to Indian government officials. This threat actor has been active for several years and conducting suspected intelligence collection operations against South Asian political and military targets.

SHA-1 hashes don't match what is listed, change everytime

I'm writing a script to download all of the pdfs for local viewing. I noticed that all of the SHA-1 hashes of the downloaded files didn't match those in the csv and json files.

Sample:

PaloAlto_PrinceofPersiaGameOver(06-28-2016).pdf
Reported SHA-1:   3f92bfbfdb0fee7eda8613fc3a6ff515ffceb972
Calculated SHA-1: 88c16ea6054c620b3d322e74b9a565570ba9ec89
Bitdefender_Pacifier-APT(7-1-2016).pdf
Reported SHA-1:   6289dff2cbd2750c76517007989483922179fa40
Calculated SHA-1: 7092c099c42701a17292c0fbcc4573a5f302975c
Cymmetria_Unveiling-Patchwork(Jul-7-16).pdf
Reported SHA-1:   955ddb4453827e2c1664f2924e75b21fb0c0496d
Calculated SHA-1: 557a6c573ea2b6f89d7ebe3d4947ec2672ae757e
ESET_targeting-Central-and-EasternEurope(07-01-2016).pdf
Reported SHA-1:   8d9af4bb8b4bafcb9e58ab21e1419abd2eed46b2
Calculated SHA-1: 1cb7178f8cbb5733e30d9301e4be3e1efcb9d2dd
JPCERT_AsruexShortcutFiles(06-30-2016).pdf
Reported SHA-1:   0ddd9b23aaa773615e7d6392969d40b332e0c85f
Calculated SHA-1: 7b312a852aaa0156d09d61dd0bc0212ff3d30420
Proofpoint_NetTraveler-TargetsRussianEuropean(07-07-2016).pdf
Reported SHA-1:   d647ecd9a694447bc8ee9096f425ba29d93f7fb7
Calculated SHA-1: d95b55d084c7bf68d7a6dcc3275a56a01753f135
Kaspersky_DroppingElephant(07-08-2016).pdf
Reported SHA-1:   e0606a9e6a785d942b50d281d87550dc03d3666e
Calculated SHA-1: 354393d7471b6895e55373b3f96991267bd694c6

I deleted all of the files and ran the code again. This time I got different /incorrect SHA-1 hashes.

PaloAlto_PrinceofPersiaGameOver(06-28-2016).pdf
Reported SHA-1:   3f92bfbfdb0fee7eda8613fc3a6ff515ffceb972
Calculated SHA-1: b4518eb101c228e815ed6707eaa3988d3c9f731d
Bitdefender_Pacifier-APT(7-1-2016).pdf
Reported SHA-1:   6289dff2cbd2750c76517007989483922179fa40
Calculated SHA-1: 83e791a84ea77977e466514996fd3268c5ed8ba6
Cymmetria_Unveiling-Patchwork(Jul-7-16).pdf
Reported SHA-1:   955ddb4453827e2c1664f2924e75b21fb0c0496d
Calculated SHA-1: 378aed8b08e92e45d111fd51173cb6ac50edc2a2
ESET_targeting-Central-and-EasternEurope(07-01-2016).pdf
Reported SHA-1:   8d9af4bb8b4bafcb9e58ab21e1419abd2eed46b2
Calculated SHA-1: a0aff4e9e78fe99a358d520a4091328c8271d353
JPCERT_AsruexShortcutFiles(06-30-2016).pdf
Reported SHA-1:   0ddd9b23aaa773615e7d6392969d40b332e0c85f
Calculated SHA-1: 9b9fbcd9da3874154fa406f82d19c76272d153d4
Proofpoint_NetTraveler-TargetsRussianEuropean(07-07-2016).pdf
Reported SHA-1:   d647ecd9a694447bc8ee9096f425ba29d93f7fb7
Calculated SHA-1: 6b4fbf8d178569a1c6afdd0c4812ce051374ffac
Kaspersky_DroppingElephant(07-08-2016).pdf
Reported SHA-1:   e0606a9e6a785d942b50d281d87550dc03d3666e
Calculated SHA-1: 6e323df8f1cf1fe33edfffe91f5ac88b6693091b

Is box watermarking the downloads to make them each unique? Are there instructions on how to download these files "correctly" so hashes match? If the hashes are never going to match, you might not want to include them at all in the data files.

Missing dates for some entries

{'Date': 'X',
 'Filename': 'fireeye-china-chopper-report',
 'Link': 'https://app.box.com/s/yvk5tr8poletupw82biic0ucpvynvoyj',
 'SHA-1': '8a3a657ac02569c1324ade4cca562ae8c5781f94',
 'Source': 'FireEye',
 'Title': 'The Little Malware That Could: Detecting And Defeating The China Chopper Web Shell',
 'Year': '2013'}

{'Date': 'X',
 'Filename': '2q-report-on-targeted-attack-campaigns',
 'Link': 'https://app.box.com/s/bwgb7uhh6p4bdkyvlw94dpq19tq0fvbv',
 'SHA-1': 'f69e4d23674d06ee459d2abbecc5f3f4cbd58047',
 'Source': 'Trend Micro',
 'Title': '2Q Report On Targeted Attack Campaigns',
 'Year': '2013'}

{'Date': 'X',
 'Filename': 'energy-at-risk',
 'Link': 'https://app.box.com/s/z7lwte5v91lz2rkfywd9s1grnqeuy1fk',
 'SHA-1': 'f03931c7214e71f4bfcc6a5008acb3f4bb1cb0e3',
 'Source': 'KPMG',
 'Title': 'Energy At Risk: A Study Of It Security In The Energy And Natural Resources Industry',
 'Year': '2013'}

{'Date': 'X',
 'Filename': 'AdversaryIntelligenceReport_DeepPanda_0 (1)',
 'Link': 'https://app.box.com/s/6po2pgedkjf4br5p7tm51go7p5g3z6g3',
 'SHA-1': '1d53861aafea11d9a60e798b90d623c8e7c7b9e7',
 'Source': 'Crowdstrike',
 'Title': 'Deep Panda',
 'Year': '2014'}

Double listed report

The note was published in 2013, but is listed twice in both the CSV and JSON files.

NYTimes_Attackers_Evolve_Quickly,Survival Of The Fittest: New York Times Attackers Evolve Quickly,FireEye,https://app.box.com/s/fkg2mxeqpb2ivx9neyz6bseopy1dfg5p,5f17e7b886d2388ffc134157dd1b66aa65372b59,08/12/2013,2013
NYTimes_Attackers_Evolve_Quickly,Survival Of The Fittest: New York Times Attackers Evolve Quickly,FireEye,https://app.box.com/s/fkg2mxeqpb2ivx9neyz6bseopy1dfg5p,5f17e7b886d2388ffc134157dd1b66aa65372b59,08/12/2014,2014

Box Static download links.

Would it be possible to provide static direct download links along with the current ones, so that it be possible to parse the csv/json on new pushes and auto grab pdfs as they are added to the list.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.