Not every IOC deserve to enter your internal MISP instance, for obvious quality reasons. But it may be usefull for you analyst to be able to do a broader research on IOC published online.
This tool allows you to qualify one or more potential malicious observables of various type (URL, MD5, SHA1, SHA256, SHA512, IPv4, IPv6, domain etc..). You can run this tool with a Gnu/Linux environement. The Windows compatibility is currently working in BETA version.
BTG was born from a need for Conix's collaborators. During their activities, SOC and DFIR analysts face off a lot of information and metadata of multiple nature that they must classify as malicious or not.
Many knowledge-bases of malicious known activity (aka IOC) are accessible online on various website like VirusTotal, ZeusTracker etc. SOC and CERT can also have their own internal database such as MISP.
Daily tasks for SOC and DFIR analysts is therefore marked out by the research of data like IP addresses, hashs, domains; on these private or public knowledge-bases; these are repetitive and time-consuming actions.
Thus CERT-Conix created a tool allowing analysts to qualify such elements searching many sources.
CuckooSandbox API Cybercrime-tracker FeodoTracker DShield Google Safe Browsing IRIS-H Lehigh Malekal Malshare Malwareconfig Malwaredomainlist Malwaredomains MalwareTeks MetaDefender MISP (Malware Information Sharing Platform) MISP Crawler Nothink OpenPhish OTX RansomwareTracker SpamHaus SSLBlacklist Tor exit nodes UrlHaus Viper VirusShare VirusTotal Vxvault VxStream (hybrid-analysis) ZeusTracker
sudo apt install python3 python3-pip git redis-server git clone https://github.com/conix-security/BTG cd BTG sudo pip3 install -r requirements.txt sudo python3 setup.py install vim ~/.config/BTG/btg.cfg
Activate and fill licence key for modules you need to use.
btg http://mydomain.com 1a72dca1f6a961f528007ef04b6959d8 188.8.131.52
- Lancelot Bogard (v1)
- Tanguy Becam (v2)
- Alexandra Toussaint
- Hicham Megherbi
- Robin Marsollier