To request access this dataset you will need to login with an IMPACT account. Accounts are free. If you don't have one please register.
This dataset is no longer available and has a current status of 'Withdrawn'.
Please see the catalog for a listing of currently available datasets.

Summary

DS-0609
GT Malware Unsolicited Email Daily Feed
Dataset
Georgia Tech
Georgia Tech
03/01/2016
Data collection is ongoing
5 (lowest rank is 56)

Category & Restrictions

Unsolicited Bulk Email Data
unsolicited emails, malware, threat intelligence
Quasi-Restricted
true

Description


GT Malware Unsolicited Email Daily Feed

This dataset contains a daily feed of unsolicited email produced by the Georgia Tech Information Security Center??s malware analysis system. Supplemental metadata included with the feed associates each message with a specific suspect Windows executable, which is run in a sterile, isolated environment, with controlled access to the Internet, for a short period of time. Network activity comprising each sample's generation of unsolicited email is recorded and made available in raw (packet capture, or PCAP) and plaintext (mbox and CSV) formats.

The CSV file, which contains a small subset of information present in the PCAP and mbox file sets, is named according to the date on which the corresponding set of executables were processed. Each entry in the CSV file comprises a 4-tuple that provides the executable's MD5 hash, the message sender (From:) address, a recipient (To:) address, and the subject (Subject:) of a given message. Note that in the CSV file, for a given message there is at most one recipient provided, even if the field contains multiple addresses.

This dataset is structured as a set of archives that each correspond to a single day of sample processing-based unsolicited email collection. Each archive decompresses to a top-level folder containing a CSV file, a PCAP subdirectory, and an mbox subdirectory for that day. The PCAP and mbox subdirectories each contain a set of files that are named according to the MD5 of the sample that produced the corresponding messages.

Note that the SMTP/MSA_SMTP redirection mechanism used to implement this feed is fully transparent. Thus, while an examination of the dataset??s PCAP files may suggest that a given sample is able to interact with an Internet mail exchange, such outbound traffic is transparently redirected to a high performance spamtrap operated by the Georgia Tech Information Security Center.
This dataset is the subject of ongoing measurement and data collection. As such the data is continuously growing. Researchers who are granted access will be able to download updates for a period of one year after their request.

Additional Details

N/A
Size is growing as more data is collected
false
true
georgia, tech, unsolicited, email, feed, malware, daily, gt, gt malware unsolicited email daily feed, 609, 2016, georgia tech, pcap, file, csv, message, mbox, sample, dataset, day, note, subdirectory, files, md5, smtp, produced, subject, executable, recipient, center, security, named, time, archive, capture, level, environment, unsolicited bulk email data, performance, subset, structured, implement, outbound, formats, processed, interact, network, exchange, included, entry, redirection, examination, multiple, specific, windows, comprises, short, traffic, correspond, executables, folder, field, sender, sterile, processing, messages, bulk, metadata, system, packet, subdirectories, generation, based, period, transparently, redirected, raw, analysis, hash, archives, access, sets, plaintext, suspect, spamtrap, comprising, controlled, single, msa, associates, mechanism, activity, isolated, decompresses, operated, transparent, tuple, top, supplemental, mail