tools/malware_research/gsub_pipeline_json_object.py (31 lines of code) (raw):

import json FIELDS=["process.args", "process.parent.args", "process.command_line", "process.parent.command_line", "process.working_directory", "process.parent.working_directory", "process.executable", "process.parent.executable", "file.path"] PATTERNS=[("/tmp/apt\\.data\\..{6}", "/tmp/apt.data"), ("/tmp/apt\\.sig\\..{6}", "/tmp/apt.sig"), ("/tmp/metadata-scripts.*/startup-script", "/tmp/metadata-scripts/startup-script"), ("/tmp/apt-key-gpghome\\..{10}", "/tmp/apt-key-gpghome"), ("/tmp/detonate\\..{5}", "/tmp/detonate"), ("/var/tmp/dbTemp\\..{6}","/var/tmp/dbTemp"), ("/etc/pki/nssdb/dbTemp\\..{6}","/etc/pki/nssdb/dbTemp")] output = [] for field in FIELDS: for pattern in PATTERNS: obj_out = { "gsub": { "field": field, "pattern": pattern[0], "replacement":pattern[1], "ignore_missing": True } } output.append(obj_out) print(json.dumps(output, indent=4))