• 设为首页
  • 点击收藏
  • 手机版
    手机扫一扫访问
    迪恩网络手机版
  • 关注官方公众号
    微信扫一扫关注
    迪恩网络公众号

davidonzo/Threat-Intel: Threat-Intel repository. API: https://github.com/davidon ...

原作者: [db:作者] 来自: 网络 收藏 邀请

开源软件名称:

davidonzo/Threat-Intel

开源软件地址:

https://github.com/davidonzo/Threat-Intel

开源编程语言:

Python 100.0%

开源软件介绍:

DigitalSide Threat-Intel

This repository contains a set of Open Source Cyber Threat Intellegence information, mostly based on malware analysis and compromised URLs, IPs and domains.

The purpose of this project is to develop and test new wayes to hunt, analyze, collect and share relevants sets of IoCs to be used by SOC/CSIRT/CERT with minimun effort.

Sharing formats

Three formats are availables to download the reports:

  • MISP feed and events (retention: 7 days) - [GO TO]
  • Structured Threat Information Expression - STIX™ v2 (retention: 30 days) [GO TO]
  • Comma Separated Values (retention: 30 days) [GO TO]
  • IoC lists of uniques indicators in squid like format (retention: 7 days) splitted in:
  • TAXII2 server implementation containing STIX2 bundles shared reports (retention: 24 hours) - [GO TO]

The majority of the informations are stored in the MISP data format. So, best way to collect data is subscribe the Digitalside-misp-feed. All sharing formats are based on MISP export format. All reports in any format can be consumed by any up-to-dated MISP instance.

Sharing endpoints

Reports shared by two sharing endpoints:

  • This repository: you can clone, subscribe, download managing it with the power of git!
  • OSINT.DigitalSide.it: You can crawl it for free and permit you to subscribe the MISP feed.

How to subscribe the Digitalside-misp-feed

Since 2019-09-23 OSINT.digitalside.it MISP feed has been added to the "Default feeds" list availables in MISP default installation. The esasy way to subscribe the feed is select the dedicated activation button.

  1. Login to MISP with a user having the right permissions to manage feeds
  2. Go to Sync Actions -> List Feeds -> Default feeds
  3. Find the OSINT.digitalside.it row DigitalSide MISP Feed
  4. Select the row and click on "Enable selected" button at the top of the table
    List feeds

You can also subscribe the feed manually, following the below instructions.

  1. Login to MISP with a user having the right permissions to manage feeds
  2. Go to Sync Actions -> List Feeds -> Add Feed
  3. Add the MISP feed by using the URL https://osint.digitalside.it/Threat-Intel/digitalside-misp-feed/

DigitalSide MISP Feed

Public API

Please visit the DigitalSide-API project page.

Sharing samples

Malware samples are not included in the reports. If you need some binary file for further analysis and investigation send an email to info[at]digitalside.it, qualifing yourself as member of a SOC/CSIRT/CERT or other cyber security organization working on public safety. No commercial company will be supported at all.

Only PGP signed and encrypted emails from a valid sender will have feedback.

My PGP key ID 30B31BDA. Fingerpring: 0B4C F801 E8FF E9A3 A602 D2C7 9C36 93B2 30B3 1BDA.

Workflow Automation Input/Output

Reports shared here are the result of my personal Malware Analisys Lab. In this first stage of the project I'll focus the activity in find the best way to share IoC. Report contents should change in time. Anyway, backward compatibility will be granted. The goal is create an external know how to be used for correlation, digital forensics activities, threat intelligence processes, inside a workflow automation process for Incident Response.

In a second phase I'll share information about my Malware Analisys Lab. This way I hope to cover the two main IoC sharing topics:

  • How to use OSINT data
  • How to produce OSINT data

Credits are granted!

Many reports shared are based on OSINT and CLOSINT sources. All applicables credits are granted. If something wrong, please contact me at info[at]digitalside[dot]it.

About Me

My name is Davide Baglieri and I'm an indepented security researcher and consultant. You can find more information at the following links:

My personal purpose about this project is basically for Research & Developing in a continue education and training process I started the 23th of September 1979.




鲜花

握手

雷人

路过

鸡蛋
该文章已有0人参与评论

请发表评论

全部评论

专题导读
热门推荐
阅读排行榜

扫描微信二维码

查看手机版网站

随时了解更新最新资讯

139-2527-9053

在线客服(服务时间 9:00~18:00)

在线QQ客服
地址:深圳市南山区西丽大学城创智工业园
电邮:jeky_zhao#qq.com
移动电话:139-2527-9053

Powered by 互联科技 X3.4© 2001-2213 极客世界.|Sitemap