数据分析:情报威胁数据分析(1) 郝伟 2021/05/23 [TOC]

1. 1 数据简介简介

从马维士处获得的数据 watch_lab_vul_20190814_20210114.iso 大小约为8G。本文的目标是进行初步的分析,以理解数据的主要结构。此数据来自于安全研究团队:守望者实验室。

2. 2 数据初步分析

根据从马维士处获得的数据 watch_lab_vul_20190814_20210114.iso 大小约为8G,初步分析。 加载后发现其数据主要包括以下:

2021/01/13  10:58        40,593,629 all-15day-actively-20191015.zip
2021/01/13  10:49        17,466,698 all-15day-actively-20191115.zip
2021/01/13  10:41        43,351,510 all-15day-actively-20191215.zip
2021/01/13  10:30        31,994,299 all-15day-actively-20200715.zip
2021/01/13  10:22        28,762,592 all-15day-actively-20200815.zip
...(此处省略若干行)...
2021/01/13  09:33         1,385,256 all-1day-actively-20210107.zip
2021/01/13  09:33           711,436 all-1day-actively-20210108.zip
2021/01/13  09:32           722,372 all-1day-actively-20210109.zip
2021/01/13  09:32         2,359,520 all-1day-actively-20210110.zip
2021/01/13  09:32           629,489 all-1day-actively-20210111.zip
2021/01/13  09:30         4,497,152 all-1day-actively-20210112.zip
2021/01/13  10:50           366,273 all-1day-newly-20190814.zip
2021/01/13  11:02           365,771 all-1day-newly-20191001.zip
2021/01/13  11:02           792,608 all-1day-newly-20191002.zip
...(此处省略若干行)...
2021/01/13  09:32           353,926 all-1day-newly-20210110.zip
2021/01/13  09:32           284,088 all-1day-newly-20210111.zip
2021/01/13  09:31           299,365 all-1day-newly-20210112.zip
2021/01/13  10:59        21,129,746 all-20190304.zip
2021/01/13  10:51        21,874,317 all-20190814.zip
2021/01/13  11:02        23,333,086 all-20191001.zip
...(此处省略若干行)...
2021/01/13  12:18        31,340,313 all-20210109.zip
2021/01/13  15:09        33,018,174 all-20210110.zip
2021/01/13  15:09        28,811,251 all-20210111.zip
2021/01/13  12:17        32,702,914 all-20210112.zip
2021/01/13  10:54       111,576,741 all-30day-actively-20191031.zip
2021/01/13  10:45        61,709,015 all-30day-actively-20191130.zip
2021/01/13  10:34        99,947,666 all-30day-actively-20191231.zip
2021/01/13  10:26        50,621,121 all-30day-actively-20200731.zip
2021/01/13  10:17        50,875,585 all-30day-actively-20200831.zip
2021/01/13  10:08        40,612,473 all-30day-actively-20201031.zip
2021/01/13  09:53        31,977,140 all-30day-actively-20201130.zip
2021/01/13  09:37        57,666,666 all-30day-actively-20201231.zip
2021/01/13  10:54        47,452,025 all-30day-newly-20191031.zip
2021/01/13  10:45        20,437,381 all-30day-newly-20191130.zip
2021/01/13  10:26        12,006,766 all-30day-newly-20200731.zip
2021/01/13  10:17         6,996,820 all-30day-newly-20200831.zip
2021/01/13  10:08        11,406,961 all-30day-newly-20201031.zip
2021/01/13  09:53        10,802,681 all-30day-newly-20201130.zip
2021/01/13  09:37        10,621,794 all-30day-newly-20201231.zip
             793 个文件  8,914,168,200 字节
               0 个目录              0 可用字节

结构随机查看,发现每个压缩包的内容基本相同,于是就选择 S:\Ai.KG\data\all-1day-actively-20190814.zip 的内容进行分析。

解压后,得到以下文件列表:

2019/11/16  23:26            16,991 domain_c2-20190814day-actively.json
2019/11/16  23:26            99,529 domain_reputation-20190814day-actively.json
2019/11/16  23:26           265,186 email_reputation-20190814day-actively.json
2019/11/16  23:26           195,336 email_spamming-20190814day-actively.json
2019/11/16  23:26         2,085,552 hash_reputation-20190814day-actively.json
2019/11/16  23:26            28,015 ip_c2-20190814day-actively.json
2021/05/19  10:41         1,664,846 ip_proxy-20190814day-actively.json
2021/05/19  10:41         8,252,182 ip_reputation-20190814day-actively.json
2021/05/19  10:41           566,742 ip_spamming-20190814day-actively.json
2021/05/19  10:41           293,689 ip_tor-20190814day-actively.json
2021/05/19  10:41               719 url_c2-20190814day-actively.json
2021/05/19  10:41           657,852 url_phishing-20190814day-actively.json
2021/05/19  10:41         2,585,928 url_reputation-20190814day-actively.json

打开每个文件查看,发现每个文件中并不是一个独立的Json数据,而是每行是一个json数据,即有多少行就有多少个json对象,如打开 domain_c2-20190814day-actively 文件,发现以下内容:

{"attackerInfo":[],"whois":[],"basicInfo":{"lastTime":"2019-10-22 17:12:00","firstTime":"2018-08-01 00:49:13","total":106,"data":"applegarden.net","attackAction":["c2"],"dataType":"domain","attackInProtocol":["dns"],"malwareClass":["pizd"],"tags":"="},"threatIntelligence":[{"level":75,"activeTime":"2019-10-22 17:12:00","channel":"domain_reputation"},{"level":75,"activeTime":"2019-10-22 17:12:00","channel":"domain_c2"}],"linkedAnalysis":[]}
{"attackerInfo":[],"whois":[],"basicInfo":{"lastTime":"2019-10-22 17:12:00","firstTime":"2018-08-01 00:49:13","total":148,"data":"beautyforward.net","attackAction":["c2"],"dataType":"domain","attackInProtocol":["dns"],"malwareClass":["pizd"],"tags":"="},"threatIntelligence":[{"level":75,"activeTime":"2019-10-22 17:12:00","channel":"domain_reputation"},{"level":75,"activeTime":"2019-10-22 17:12:00","channel":"domain_c2"}],"linkedAnalysis":[]}
...(以下省略若干行)...

3. 3 两个问题

为了导入数据,必需对数据格式进行全面分析,所以现在有这样的2个问题:

3.1. 3.1 问题1:一个文件中的数据格式是否全部一样?

为了回答这个问题,首先,选择一个较小的文件进行分析,如 email_apt-20210112.json

首先,部分代码参见 对json文件进行动态遍历以生成所有键的完整路径,定义以下两个函数:

import json

def analyze(json_data, paths, cur_path):
    if isinstance(json_data, dict):
        for key in json_data:
            new_path='/'.join(cur_path) + '/' + key
            if paths.count(new_path) == 0:
                paths.append(new_path)
            cur_path.append(key)
            analyze(json_data[key], paths, cur_path)
            del cur_path[-1]
    elif isinstance(json_data, list):
          cur_path.append('[*]')
          for i in range(len(json_data)):
              analyze(json_data[i], paths, cur_path)
          del cur_path[-1]
    return (paths, cur_path)

def analyze_json_path(json_data):
    paths=[]
    cur_path=['.']
    paths, cur_path = analyze(json_data, paths, cur_path)
    return paths

def get_json_path(jsonfile):
    jdata = json.loads(jsonfile)
    paths = []
    for path in analyze_json_path(jdata):
        paths.append(path)
    return paths 

filepath = r'S:\Ai.KG\data\all-1day-actively-20190814\domain_c2-20190814day-actively.json';
allpaths={}
try: 
    fp = open(filepath, 'r', encoding='utf-8')
    for line in fp.readlines():
        json_data = json.loads(line)
        paths = analyze_json_path(json_data)
        for path in paths:
            if path not in allpaths:
                allpaths[path] = 0
            allpaths[path] = allpaths[path] + 1
except Exception as e:
    print("error:", filepath)
    print(e) 
for path in allpaths:
    print(allpaths[path], path)

运行结果如下:

38 ./attackerInfo
38 ./whois
38 ./basicInfo
38 ./basicInfo/lastTime
38 ./basicInfo/firstTime
38 ./basicInfo/total
38 ./basicInfo/data
38 ./basicInfo/attackAction
38 ./basicInfo/dataType
38 ./basicInfo/attackInProtocol
38 ./basicInfo/malwareClass
38 ./basicInfo/tags
38 ./threatIntelligence
38 ./threatIntelligence/[*]/level
38 ./threatIntelligence/[*]/activeTime
38 ./threatIntelligence/[*]/channel
38 ./linkedAnalysis

根据输出结果,可见每一行的内容都相同

3.2. 3.2 问题2:所有的文件格式是否都是一样的?

在回答了问题1,现在再分析其他文件以回答问题2。在代码中添加文件夹遍历函数,得到以下内容:

dirname=R'S:\Ai.KG\data\all-1day-actively-20190814'
for filename in os.listdir(dirname):
    print(filename.center(70, '*'))
    filepath = os.path.join(dirname, filename)
    allpaths={}
    try: 
        fp = open(filepath, 'r', encoding='utf-8')
        for line in fp.readlines():
            json_data = json.loads(line)
            paths = analyze_json_path(json_data)
            for path in paths:
                if path not in allpaths:
                    allpaths[path] = 0
                allpaths[path] = allpaths[path] + 1
    except Exception as e:
        print("error:", filepath)
        print(e) 
    for path in allpaths:
        print(allpaths[path], path)

代码行后的结果

*****************domain_c2-20190814day-actively.json******************
38 ./attackerInfo
38 ./whois
38 ./basicInfo
38 ./basicInfo/lastTime
38 ./basicInfo/firstTime
38 ./basicInfo/total
38 ./basicInfo/data
38 ./basicInfo/attackAction
38 ./basicInfo/dataType
38 ./basicInfo/attackInProtocol
38 ./basicInfo/malwareClass
38 ./basicInfo/tags
38 ./threatIntelligence
38 ./threatIntelligence/[*]/level
38 ./threatIntelligence/[*]/activeTime
38 ./threatIntelligence/[*]/channel
38 ./linkedAnalysis
*************domain_reputation-20190814day-actively.json**************
265 ./attackerInfo
265 ./whois
265 ./basicInfo
265 ./basicInfo/lastTime
265 ./basicInfo/firstTime
265 ./basicInfo/total
265 ./basicInfo/data
265 ./basicInfo/attackAction
265 ./basicInfo/dataType
265 ./basicInfo/attackInProtocol
265 ./basicInfo/malwareClass
265 ./basicInfo/tags
265 ./threatIntelligence
265 ./threatIntelligence/[*]/level
265 ./threatIntelligence/[*]/activeTime
265 ./threatIntelligence/[*]/channel
265 ./linkedAnalysis
1 ./threatIntelligence/[*]/domain
1 ./threatIntelligence/[*]/source
1 ./threatIntelligence/[*]/saveTime
1 ./threatIntelligence/[*]/class
1 ./threatIntelligence/[*]/tags
1 ./threatIntelligence/[*]/ip
**************email_reputation-20190814day-actively.json**************
618 ./basicInfo
618 ./basicInfo/lastTime
618 ./basicInfo/firstTime
618 ./basicInfo/total
618 ./basicInfo/data
618 ./basicInfo/attackAction
618 ./basicInfo/dataType
618 ./basicInfo/attackInProtocol
618 ./basicInfo/malwareClass
618 ./basicInfo/tags
618 ./threatIntelligence
618 ./threatIntelligence/[*]/level
618 ./threatIntelligence/[*]/activeTime
618 ./threatIntelligence/[*]/channel
618 ./linkedAnalysis
124 ./threatIntelligence/[*]/ip
1 ./threatIntelligence/[*]/source
1 ./threatIntelligence/[*]/saveTime
1 ./threatIntelligence/[*]/email
***************email_spamming-20190814day-actively.json***************
452 ./basicInfo
452 ./basicInfo/lastTime
452 ./basicInfo/firstTime
452 ./basicInfo/total
452 ./basicInfo/data
452 ./basicInfo/attackAction
452 ./basicInfo/dataType
452 ./basicInfo/attackInProtocol
452 ./basicInfo/malwareClass
452 ./basicInfo/tags
452 ./threatIntelligence
452 ./threatIntelligence/[*]/level
452 ./threatIntelligence/[*]/activeTime
452 ./threatIntelligence/[*]/channel
452 ./linkedAnalysis
23 ./threatIntelligence/[*]/ip
1 ./threatIntelligence/[*]/source
1 ./threatIntelligence/[*]/saveTime
1 ./threatIntelligence/[*]/email
**************hash_reputation-20190814day-actively.json***************
4616 ./basicInfo
4616 ./basicInfo/firstTime
4616 ./basicInfo/lastTime
4616 ./basicInfo/total
4616 ./basicInfo/data
4616 ./basicInfo/attackAction
4616 ./basicInfo/dataType
4616 ./basicInfo/origin
4616 ./basicInfo/origin/sha1
4616 ./basicInfo/origin/sha256
4616 ./basicInfo/origin/md5
4616 ./basicInfo/malwareClass
4616 ./basicInfo/tags
4616 ./threatIntelligence
4616 ./threatIntelligence/[*]/level
4616 ./threatIntelligence/[*]/activeTime
4616 ./threatIntelligence/[*]/channel
4616 ./linkedAnalysis
*******************ip_c2-20190814day-actively.json********************
45 ./attackerInfo
45 ./whois
45 ./basicInfo
45 ./basicInfo/lastTime
45 ./basicInfo/firstTime
45 ./basicInfo/total
45 ./basicInfo/data
45 ./basicInfo/attackAction
45 ./basicInfo/dataType
45 ./basicInfo/attackInProtocol
45 ./basicInfo/malwareClass
45 ./basicInfo/location
45 ./basicInfo/location/cityName
45 ./basicInfo/location/countryCode
45 ./basicInfo/location/latitude
45 ./basicInfo/location/countryName
45 ./basicInfo/location/provinceName
45 ./basicInfo/location/longitude
45 ./basicInfo/tags
45 ./threatIntelligence
45 ./threatIntelligence/[*]/level
45 ./threatIntelligence/[*]/activeTime
45 ./threatIntelligence/[*]/channel
45 ./linkedAnalysis
6 ./threatIntelligence/[*]/domain
2 ./threatIntelligence/[*]/ip
2 ./threatIntelligence/[*]/source
2 ./threatIntelligence/[*]/saveTime
2 ./threatIntelligence/[*]/class
******************ip_proxy-20190814day-actively.json******************
error: S:\Ai.KG\data\all-1day-actively-20190814\ip_proxy-20190814day-actively.json
Expecting property name enclosed in double quotes: line 2 column 1 (char 2)
***************ip_reputation-20190814day-actively.json****************
error: S:\Ai.KG\data\all-1day-actively-20190814\ip_reputation-20190814day-actively.json
Expecting property name enclosed in double quotes: line 2 column 1 (char 2)
****************ip_spamming-20190814day-actively.json*****************
error: S:\Ai.KG\data\all-1day-actively-20190814\ip_spamming-20190814day-actively.json
Expecting property name enclosed in double quotes: line 2 column 1 (char 2)
*******************ip_tor-20190814day-actively.json*******************
error: S:\Ai.KG\data\all-1day-actively-20190814\ip_tor-20190814day-actively.json
Expecting property name enclosed in double quotes: line 2 column 1 (char 2)
*******************url_c2-20190814day-actively.json*******************
error: S:\Ai.KG\data\all-1day-actively-20190814\url_c2-20190814day-actively.json
Expecting property name enclosed in double quotes: line 2 column 1 (char 2)
****************url_phishing-20190814day-actively.json****************
error: S:\Ai.KG\data\all-1day-actively-20190814\url_phishing-20190814day-actively.json
Expecting property name enclosed in double quotes: line 2 column 1 (char 2)
***************url_reputation-20190814day-actively.json***************
error: S:\Ai.KG\data\all-1day-actively-20190814\url_reputation-20190814day-actively.json
Expecting property name enclosed in double quotes: line 2 column 1 (char 2)

由此可见,部分文件中有不内的内容,同时还有几个文件格式不一样。 经分析发现,不能转换的文件是因为两种情况:

  • 内容本身就是一个完整的json文件; 处理方法:按单独的json文件处理。
  • 内容是由多个文件组成,但是一段json已经格式化好了,分成多个行。 根据 \n}\n{\n 替换为 \n},\n{\n 同时加上开头和结尾使其成为一个独立的文件。
import json, os


def load_json(json_filepath):
    data = []
    with open(json_filepath, 'r', encoding='utf-8') as load_f: 
         data =  json.load(load_f)
    return data

def save_file(content, filename):
    fp = open(filename, 'w+', encoding='utf-8')
    fp.write(content)
    fp.close()

def analyze(json_data, paths, cur_path):
    if isinstance(json_data, dict):
        for key in json_data:
            new_path='/'.join(cur_path) + '/' + key
            if paths.count(new_path) == 0:
                paths.append(new_path)
            cur_path.append(key)
            analyze(json_data[key], paths, cur_path)
            del cur_path[-1]
    elif isinstance(json_data, list):
          cur_path.append('[*]')
          for i in range(len(json_data)):
              analyze(json_data[i], paths, cur_path)
          del cur_path[-1]
    return (paths, cur_path)

def analyze_json_path(json_data):
    paths=[]
    cur_path=['.']
    paths, cur_path = analyze(json_data, paths, cur_path)
    return paths

def get_json_path(jsonfile):
    jdata = load_json(jsonfile)
    paths = []
    for path in analyze_json_path(jdata):
        paths.append(path)
    return paths


dirname=R'S:\Ai.KG\data\all-1day-actively-20190814'

jsonfilelist=[]
for filename in os.listdir(dirname):
    filepath = os.path.join(dirname, filename)
    allpaths={}
    try: 
        fp = open(filepath, 'r', encoding='utf-8')
        for line in fp.readlines():
            json_data = json.loads(line)
            paths = analyze_json_path(json_data)
            for path in paths:
                if path not in allpaths:
                    allpaths[path] = 0
                allpaths[path] = allpaths[path] + 1
        fp.close()
        print(filename.center(70, '*'))
    except Exception as e:
        jsonfilelist.append(filepath)
        try:
            paths = get_json_path(filepath)
            for path in paths:
                if path not in allpaths:
                    allpaths[path] = 0
                allpaths[path] = allpaths[path] + 1
        except Exception as e1:
            pass
    for path in allpaths:
        print(allpaths[path], path)



for filepath in jsonfilelist:
    content = ''
    try:
        with open(filepath, 'r', encoding='utf-8') as fp: 
            content = ''.join(fp.readlines())
        content = '{ "items": [' + content.replace('\n}\n{\n', '\n},\n{\n') + ']}'
        #save_file(content, filepath + '.txt')
        items = json.loads(content)
        allpaths = {}
        for item in items['items']:
            paths = analyze_json_path(item)
            for path in paths:
                if path not in allpaths:
                    allpaths[path] = 0
                allpaths[path] = allpaths[path] + 1

        paths = analyze_json_path(json.loads(content))
        print('*' * 80)
        print(filepath)
#        for path in paths:
#            print(path.replace('./items/[*]', '.'))
        for path in allpaths:
            print(allpaths[path], path)
    except:
        print('** error **', filepath)
(base) C:\Gitee.com\MyNotes> cmd /C "C:\ProgramData\Anaconda3\python.exe c:\Users\hwaus\.vscode\extensions\ms-python.python-2021.4.765268190\pythonFiles\lib\python\debugpy\launcher 49813 -- c:\Gitee.com\MyNotes\zTemSourceCodes\20210524_thread_info_path_analysis.py "
*****************domain_c2-20190814day-actively.json******************
38 ./attackerInfo
38 ./whois
38 ./basicInfo
38 ./basicInfo/lastTime
38 ./basicInfo/firstTime
38 ./basicInfo/total
38 ./basicInfo/data
38 ./basicInfo/attackAction
38 ./basicInfo/dataType
38 ./basicInfo/attackInProtocol
38 ./basicInfo/malwareClass
38 ./basicInfo/tags
38 ./threatIntelligence
38 ./threatIntelligence/[*]/level
38 ./threatIntelligence/[*]/activeTime
38 ./threatIntelligence/[*]/channel
38 ./linkedAnalysis
*************domain_reputation-20190814day-actively.json**************
265 ./attackerInfo
265 ./whois
265 ./basicInfo
265 ./basicInfo/lastTime
265 ./basicInfo/firstTime
265 ./basicInfo/total
265 ./basicInfo/data
265 ./basicInfo/attackAction
265 ./basicInfo/dataType
265 ./basicInfo/attackInProtocol
265 ./basicInfo/malwareClass
265 ./basicInfo/tags
265 ./threatIntelligence
265 ./threatIntelligence/[*]/level
265 ./threatIntelligence/[*]/activeTime
265 ./threatIntelligence/[*]/channel
265 ./linkedAnalysis
1 ./threatIntelligence/[*]/domain
1 ./threatIntelligence/[*]/source
1 ./threatIntelligence/[*]/saveTime
1 ./threatIntelligence/[*]/class
1 ./threatIntelligence/[*]/tags
1 ./threatIntelligence/[*]/ip
**************email_reputation-20190814day-actively.json**************
618 ./basicInfo
618 ./basicInfo/lastTime
618 ./basicInfo/firstTime
618 ./basicInfo/total
618 ./basicInfo/data
618 ./basicInfo/attackAction
618 ./basicInfo/dataType
618 ./basicInfo/attackInProtocol
618 ./basicInfo/malwareClass
618 ./basicInfo/tags
618 ./threatIntelligence
618 ./threatIntelligence/[*]/level
618 ./threatIntelligence/[*]/activeTime
618 ./threatIntelligence/[*]/channel
618 ./linkedAnalysis
124 ./threatIntelligence/[*]/ip
1 ./threatIntelligence/[*]/source
1 ./threatIntelligence/[*]/saveTime
1 ./threatIntelligence/[*]/email
***************email_spamming-20190814day-actively.json***************
452 ./basicInfo
452 ./basicInfo/lastTime
452 ./basicInfo/firstTime
452 ./basicInfo/total
452 ./basicInfo/data
452 ./basicInfo/attackAction
452 ./basicInfo/dataType
452 ./basicInfo/attackInProtocol
452 ./basicInfo/malwareClass
452 ./basicInfo/tags
452 ./threatIntelligence
452 ./threatIntelligence/[*]/level
452 ./threatIntelligence/[*]/activeTime
452 ./threatIntelligence/[*]/channel
452 ./linkedAnalysis
23 ./threatIntelligence/[*]/ip
1 ./threatIntelligence/[*]/source
1 ./threatIntelligence/[*]/saveTime
1 ./threatIntelligence/[*]/email
**************hash_reputation-20190814day-actively.json***************
4616 ./basicInfo
4616 ./basicInfo/firstTime
4616 ./basicInfo/lastTime
4616 ./basicInfo/total
4616 ./basicInfo/data
4616 ./basicInfo/attackAction
4616 ./basicInfo/dataType
4616 ./basicInfo/origin
4616 ./basicInfo/origin/sha1
4616 ./basicInfo/origin/sha256
4616 ./basicInfo/origin/md5
4616 ./basicInfo/malwareClass
4616 ./basicInfo/tags
4616 ./threatIntelligence
4616 ./threatIntelligence/[*]/level
4616 ./threatIntelligence/[*]/activeTime
4616 ./threatIntelligence/[*]/channel
4616 ./linkedAnalysis
*******************ip_c2-20190814day-actively.json********************
45 ./attackerInfo
45 ./whois
45 ./basicInfo
45 ./basicInfo/lastTime
45 ./basicInfo/firstTime
45 ./basicInfo/total
45 ./basicInfo/data
45 ./basicInfo/attackAction
45 ./basicInfo/dataType
45 ./basicInfo/attackInProtocol
45 ./basicInfo/malwareClass
45 ./basicInfo/location
45 ./basicInfo/location/cityName
45 ./basicInfo/location/countryCode
45 ./basicInfo/location/latitude
45 ./basicInfo/location/countryName
45 ./basicInfo/location/provinceName
45 ./basicInfo/location/longitude
45 ./basicInfo/tags
45 ./threatIntelligence
45 ./threatIntelligence/[*]/level
45 ./threatIntelligence/[*]/activeTime
45 ./threatIntelligence/[*]/channel
45 ./linkedAnalysis
6 ./threatIntelligence/[*]/domain
2 ./threatIntelligence/[*]/ip
2 ./threatIntelligence/[*]/source
2 ./threatIntelligence/[*]/saveTime
2 ./threatIntelligence/[*]/class
1 ./attackerInfo
1 ./whois
1 ./basicInfo
1 ./basicInfo/lastTime
1 ./basicInfo/firstTime
1 ./basicInfo/total
1 ./basicInfo/data
1 ./basicInfo/dataType
1 ./basicInfo/attackAction
1 ./basicInfo/attackInProtocol
1 ./basicInfo/malwareClass
1 ./basicInfo/tags
1 ./threatIntelligence
1 ./threatIntelligence/[*]/level
1 ./threatIntelligence/[*]/activeTime
1 ./threatIntelligence/[*]/channel
1 ./linkedAnalysis
********************************************************************************
S:\Ai.KG\data\all-1day-actively-20190814\ip_proxy-20190814day-actively.json
1464 ./attackerInfo
1464 ./whois
1464 ./basicInfo
1464 ./basicInfo/lastTime
1464 ./basicInfo/firstTime
1464 ./basicInfo/total
1464 ./basicInfo/data
1464 ./basicInfo/attackAction
1464 ./basicInfo/dataType
1464 ./basicInfo/attackInProtocol
1464 ./basicInfo/malwareClass
1464 ./basicInfo/location
1464 ./basicInfo/location/cityName
1464 ./basicInfo/location/countryCode
1464 ./basicInfo/location/latitude
1464 ./basicInfo/location/countryName
1464 ./basicInfo/location/provinceName
1464 ./basicInfo/location/longitude
1464 ./basicInfo/tags
1464 ./threatIntelligence
1464 ./threatIntelligence/[*]/level
1464 ./threatIntelligence/[*]/port
1464 ./threatIntelligence/[*]/activeTime
1464 ./threatIntelligence/[*]/channel
1464 ./threatIntelligence/[*]/anonymity
1464 ./threatIntelligence/[*]/type
1464 ./linkedAnalysis
244 ./threatIntelligence/[*]/email
1 ./threatIntelligence/[*]/exit
1 ./threatIntelligence/[*]/server
1 ./threatIntelligence/[*]/ORPort
1 ./threatIntelligence/[*]/DIRPort
********************************************************************************
S:\Ai.KG\data\all-1day-actively-20190814\ip_proxy-20190814day-actively1.josn
1464 ./attackerInfo
1464 ./whois
1464 ./basicInfo
1464 ./basicInfo/lastTime
1464 ./basicInfo/firstTime
1464 ./basicInfo/total
1464 ./basicInfo/data
1464 ./basicInfo/attackAction
1464 ./basicInfo/dataType
1464 ./basicInfo/attackInProtocol
1464 ./basicInfo/malwareClass
1464 ./basicInfo/location
1464 ./basicInfo/location/cityName
1464 ./basicInfo/location/countryCode
1464 ./basicInfo/location/latitude
1464 ./basicInfo/location/countryName
1464 ./basicInfo/location/provinceName
1464 ./basicInfo/location/longitude
1464 ./basicInfo/tags
1464 ./threatIntelligence
1464 ./threatIntelligence/[*]/level
1464 ./threatIntelligence/[*]/port
1464 ./threatIntelligence/[*]/activeTime
1464 ./threatIntelligence/[*]/channel
1464 ./threatIntelligence/[*]/anonymity
1464 ./threatIntelligence/[*]/type
1464 ./linkedAnalysis
244 ./threatIntelligence/[*]/email
1 ./threatIntelligence/[*]/exit
1 ./threatIntelligence/[*]/server
1 ./threatIntelligence/[*]/ORPort
1 ./threatIntelligence/[*]/DIRPort
********************************************************************************
S:\Ai.KG\data\all-1day-actively-20190814\ip_reputation-20190814day-actively.json
9162 ./attackerInfo
9162 ./whois
9162 ./basicInfo
9162 ./basicInfo/lastTime
9162 ./basicInfo/firstTime
9162 ./basicInfo/total
9162 ./basicInfo/data
9162 ./basicInfo/attackAction
9162 ./basicInfo/dataType
9162 ./basicInfo/attackInProtocol
9162 ./basicInfo/malwareClass
9162 ./basicInfo/location
9162 ./basicInfo/location/cityName
9162 ./basicInfo/location/countryCode
9162 ./basicInfo/location/latitude
9162 ./basicInfo/location/countryName
9162 ./basicInfo/location/provinceName
9162 ./basicInfo/location/longitude
9162 ./basicInfo/tags
9162 ./threatIntelligence
9162 ./threatIntelligence/[*]/level
9162 ./threatIntelligence/[*]/activeTime
9162 ./threatIntelligence/[*]/channel
9162 ./linkedAnalysis
301 ./threatIntelligence/[*]/port
300 ./threatIntelligence/[*]/anonymity
300 ./threatIntelligence/[*]/type
157 ./threatIntelligence/[*]/email
31 ./threatIntelligence/[*]/exit
31 ./threatIntelligence/[*]/server
31 ./threatIntelligence/[*]/ORPort
31 ./threatIntelligence/[*]/DIRPort
10 ./threatIntelligence/[*]/ip
10 ./threatIntelligence/[*]/source
10 ./threatIntelligence/[*]/saveTime
2 ./threatIntelligence/[*]/class
8 ./threatIntelligence/[*]/domain
8 ./threatIntelligence/[*]/tags
1 ./threatIntelligence/[*]/description
********************************************************************************
S:\Ai.KG\data\all-1day-actively-20190814\ip_spamming-20190814day-actively.json
495 ./attackerInfo
495 ./whois
495 ./basicInfo
495 ./basicInfo/lastTime
495 ./basicInfo/firstTime
495 ./basicInfo/total
495 ./basicInfo/data
495 ./basicInfo/attackAction
495 ./basicInfo/dataType
495 ./basicInfo/attackInProtocol
495 ./basicInfo/malwareClass
495 ./basicInfo/location
495 ./basicInfo/location/cityName
495 ./basicInfo/location/countryCode
495 ./basicInfo/location/latitude
495 ./basicInfo/location/countryName
495 ./basicInfo/location/provinceName
495 ./basicInfo/location/longitude
495 ./basicInfo/tags
495 ./threatIntelligence
495 ./threatIntelligence/[*]/level
495 ./threatIntelligence/[*]/activeTime
495 ./threatIntelligence/[*]/channel
495 ./linkedAnalysis
80 ./threatIntelligence/[*]/port
80 ./threatIntelligence/[*]/anonymity
80 ./threatIntelligence/[*]/type
89 ./threatIntelligence/[*]/email
32 ./threatIntelligence/[*]/exit
32 ./threatIntelligence/[*]/server
32 ./threatIntelligence/[*]/ORPort
32 ./threatIntelligence/[*]/DIRPort
7 ./threatIntelligence/[*]/ip
7 ./threatIntelligence/[*]/source
7 ./threatIntelligence/[*]/saveTime
7 ./threatIntelligence/[*]/tags
2 ./threatIntelligence/[*]/reportDesc
2 ./threatIntelligence/[*]/reportName
********************************************************************************
S:\Ai.KG\data\all-1day-actively-20190814\ip_tor-20190814day-actively.json
307 ./attackerInfo
307 ./whois
307 ./basicInfo
307 ./basicInfo/lastTime
307 ./basicInfo/firstTime
307 ./basicInfo/total
307 ./basicInfo/data
307 ./basicInfo/attackAction
307 ./basicInfo/dataType
307 ./basicInfo/attackInProtocol
307 ./basicInfo/malwareClass
307 ./basicInfo/location
307 ./basicInfo/location/cityName
307 ./basicInfo/location/countryCode
307 ./basicInfo/location/latitude
307 ./basicInfo/location/countryName
307 ./basicInfo/location/provinceName
307 ./basicInfo/location/longitude
307 ./basicInfo/tags
307 ./threatIntelligence
307 ./threatIntelligence/[*]/exit
307 ./threatIntelligence/[*]/server
307 ./threatIntelligence/[*]/level
307 ./threatIntelligence/[*]/activeTime
307 ./threatIntelligence/[*]/channel
307 ./threatIntelligence/[*]/ORPort
307 ./threatIntelligence/[*]/DIRPort
307 ./linkedAnalysis
7 ./threatIntelligence/[*]/email
4 ./threatIntelligence/[*]/port
4 ./threatIntelligence/[*]/anonymity
4 ./threatIntelligence/[*]/type
2 ./threatIntelligence/[*]/ip
2 ./threatIntelligence/[*]/source
2 ./threatIntelligence/[*]/saveTime
2 ./threatIntelligence/[*]/tags
********************************************************************************
S:\Ai.KG\data\all-1day-actively-20190814\url_c2-20190814day-actively.json
1 ./attackerInfo
1 ./whois
1 ./basicInfo
1 ./basicInfo/lastTime
1 ./basicInfo/firstTime
1 ./basicInfo/total
1 ./basicInfo/data
1 ./basicInfo/dataType
1 ./basicInfo/attackAction
1 ./basicInfo/attackInProtocol
1 ./basicInfo/malwareClass
1 ./basicInfo/tags
1 ./threatIntelligence
1 ./threatIntelligence/[*]/level
1 ./threatIntelligence/[*]/activeTime
1 ./threatIntelligence/[*]/channel
1 ./linkedAnalysis
********************************************************************************
S:\Ai.KG\data\all-1day-actively-20190814\url_phishing-20190814day-actively.json
795 ./attackerInfo
795 ./whois
795 ./basicInfo
795 ./basicInfo/lastTime
795 ./basicInfo/firstTime
795 ./basicInfo/total
795 ./basicInfo/data
795 ./basicInfo/dataType
795 ./basicInfo/attackAction
795 ./basicInfo/attackInProtocol
795 ./basicInfo/malwareClass
795 ./basicInfo/tags
795 ./threatIntelligence
795 ./threatIntelligence/[*]/level
795 ./threatIntelligence/[*]/activeTime
795 ./threatIntelligence/[*]/channel
792 ./threatIntelligence/[*]/target
795 ./linkedAnalysis
********************************************************************************
S:\Ai.KG\data\all-1day-actively-20190814\url_reputation-20190814day-actively.json
4036 ./attackerInfo
4036 ./whois
4036 ./basicInfo
4036 ./basicInfo/lastTime
4036 ./basicInfo/firstTime
4036 ./basicInfo/total
4036 ./basicInfo/data
4036 ./basicInfo/dataType
4036 ./basicInfo/attackAction
4036 ./basicInfo/attackInProtocol
4036 ./basicInfo/malwareClass
4036 ./basicInfo/tags
4036 ./threatIntelligence
4036 ./threatIntelligence/[*]/level
4036 ./threatIntelligence/[*]/activeTime
4036 ./threatIntelligence/[*]/channel
792 ./threatIntelligence/[*]/target
4036 ./linkedAnalysis

4. 4 结论

数据初步处理已经完成,待进一步分析。

results matching ""

    No results matching ""