Before diving into the
procedure, let me give you some terminologies.
TAXII - Trusted
Automated eXchange of Indicator Information. A free and open transport
mechanism that standardizes the automated exchange of cyber threat information.
STIX - Structured Threat
Information Expression. A language for describing cyber threat information
in a standardized and
structured manner to enable the exchange of cyber threat intelligence (CTI).
http://hailataxii.com/
- Hail a TAXII.com is a repository of Open Source Cyber Threat Intellegence
feeds in STIX format.
Kivred –
A simple taxi client to fetch data from taxi service provider such as
hailataxii.
Indicator
– contains a pattern that can be used to detect suspicious or malicious cyber
activity.
Observed
Data – conveys information observed on a system or network (e.g., an IP
address).
TTPs -
Tactics, Techniques, and Procedures. (e.i., Malware, Attack Pattern)
Note: If you are experiencing kivred to be (Not Responding)
this is due to a no or poor threading implementation. Please wait for a couple
of minutes as the code is running in the background.
Snort – Is a network
intrusion detection prevention system.
For our first demo, we
are going to use the guest.phishtank_com feed.
Check out http://hailataxii.com/
for info.
1. Fill in the form.
2. We found out about a latest Indicator of type URL Watchlist.
(e.i. This URL:[http://swisscom.myfreesites.net/] was identified by phishtank.com as part of a phishing email. This URL appears to still be online as of 2017-06-14T23:43:59+00:00. More detailed infomation can be found at http://www.phishtank.com/phish_detail.php?phish_id=5049760
3. Notice the scrollbar and imagine the amount of result we have gathered, remember when we fill the form, we only wanted threat intelligence from June 15 2017 to June 16 2017.
For the next demonstration, we are going to use the guest.EmergingThreats_rules feed.
Notice that we did not provide from and to option.
Notice that we did not provide from and to option.
Example of snort rule
provided by rules.emergingthreats.net:
alert tcp $HOME_NET any
-> 37.187.22.88 32000 (msg:"ET CNC Shadowserver Reported CnC Server
Port 32000 Group 1"; flags:S;
reference:url,doc.emergingthreats.net/bin/view/Main/BotCC;
reference:url,www.shadowserver.org; threshold: type limit, track by_src,
seconds 360, count 1; classtype:trojan-activity; flowbits:set,ET.Evil; flowbits:set,ET.BotccIP;
sid:2405053; rev:3617;)
alert tcp $HOME_NET any
-> 154.35.64.54 6768 (msg:"ET CNC Shadowserver Reported CnC Server Port
6768 Group 1"; flags:S;
reference:url,doc.emergingthreats.net/bin/view/Main/BotCC;
reference:url,www.shadowserver.org; threshold: type limit, track by_src,
seconds 360, count 1; classtype:trojan-activity; flowbits:set,ET.Evil;
flowbits:set,ET.BotccIP; sid:2405038; rev:3617;)
Click on the observables
button.
Click on the TTPs
buttons to see the Tactics, Techniques and procedures.
Click on the Raw button to see the raw output
for more information.
Good to know when using kivred:
1. You can copy and paste the results to notepad for searching of specific data.
2. Avoid requesting with long period of time stamp. A connection and chunk size error often occurs.
Kivred is written in python version 3.4
Help and improve, the project is on github.
https://github.com/CodesInTheShell/kivred/
Denial of grace is not my thing, if you wish to donate feel free to contact me.
How I wish to see http://intelsecuretech.blogspot.com to www.intelsecuretech.com
References and more information can be found on the following:
https://www.oasis-open.org/
https://oasis-open.github.io/cti-documentation/
http://hailataxii.com/
Comments
Post a Comment