This repository contains a set of Open Source Cyber Threat Intellegence information, monstly based on malware analysis and compromised URLs, IPs and domains.
The purpose of this project is to develop and test new wayes to hunt, analyze, collect and share relevants sets of IoCs to be used by SOC/CSIRT/CERT with minimun effort.
Three formats are availables to download the reports:
The majority of the informations are stored in the MISP data format. So, best way to collect data is subscribe the Digitalside-misp-feed. All sharing formats are based on MISP export format. All reports in any format can be consumed by any up-to-dated MISP instance.
Reports shared by two sharing endpoints:
Since 2019-09-23 OSINT.digitalside.it MISP feed has been added to the "Default feeds" list availables in MISP default installation. The esasy way to subscribe the feed is select the dedicated activation button.
Sync Actions -> List Feeds -> Default feeds
You can also subscribe the feed manually, following the below instructions.
Sync Actions -> List Feeds -> Add Feed
On demand query API for network indicators: IPv4, domains, urls. Take a look at the GitHub repository.
Malware samples are not included in the reports. If you need some binary file for further analysis and investigation send an email to info[at]digitalside.it, qualifing yourself as member of a SOC/CSIRT/CERT or other cyber security organization working on public safety. No commercial company will be supported at all.
Only PGP signed and encrypted emails from a valid sender will have feedback.
Reports shared here are the result of my personal Malware Analisys Lab. In this first stage of the project I'll focus the activity in find the best way to share IoC. Report contents should change in time. Anyway, backward compatibility will be granted. The goal is create an external know how to be used for correlation, digital forensics activities, threat intelligence processes, inside a workflow automation process for Incident Response.
In a second phase I'll share information about my Malware Analisys Lab. This way I hope to cover the two main IoC sharing topics:
Many reports shared are based on OSINT and CLOSINT sources. All applicables credits are granted. If something wrong, please contact me at info[at]digitalside[dot]it.
For feedback, information request, improvments and other, please open an issue on GitHub
My name is Davide Baglieri and I'm an indepented security researcher and consultant. You can find more information at the following links:
My personal purpose about this project is basically for Research & Developing in a continue education and training process I started the 23th of September 1979.