Not every IOC deserve to enter your internal MISP instance, for obvious quality reasons. But it may be usefull for you analyst to be able to do a broader research on IOC published online.
This tool allows you to qualify one or more potential malicious observables of various type (URL, MD5, SHA1, SHA256, SHA512, IPv4, IPv6, domain etc..). You can run this tool with a Gnu/Linux environement. The Windows compatibility is currently working in BETA version.
BTG was born from a need for Conix's collaborators. During their activities, SOC and DFIR analysts face off a lot of information and metadata of multiple nature that they must classify as malicious or not.
Many knowledge-bases of malicious known activity (aka IOC) are accessible online on various website like VirusTotal, ZeusTracker etc. SOC and CERT can also have their own internal database such as MISP.
Daily tasks for SOC and DFIR analysts is therefore marked out by the research of data like IP addresses, hashs, domains; on these private or public knowledge-bases; these are repetitive and time-consuming actions.
Thus CERT-Conix created a tool allowing analysts to qualify such elements searching many sources.
CuckooSandbox API
Cybercrime-tracker
DShield
Google Safe Browsing
IRIS-H
Lehigh
Malekal
Malshare
Malwaredomainlist
Malwaredomains
MalwareTeks
MISP (Malware Information Sharing Platform)
MISP Crawler
Nothink
OpenPhish
OTX
RansomwareTracker
SpamHaus
SSLBlacklist
Tor exit nodes
Viper
VirusShare
VirusTotal
Vxvault
VxStream (hybrid-analysis)
ZeusTracker
sudo apt install python3 python3-pip git
git clone https://github.com/conix-security/BTG
cd BTG
sudo pip3 install -r requirements.txt
cp config.ini.editme config.ini
vim config.ini
Activate and fill licence key for modules you need to use.
python3 BTG.py http://mydomain.com 1a72dca1f6a961f528007ef04b6959d8 45.34.191.173
- Lancelot Bogard
- Robin Marsollier