https://github.com/dcso/tie-threatbus-bridge
tool to feed IoCs from DCSO TIE to Threat Bus
https://github.com/dcso/tie-threatbus-bridge
Last synced: 6 months ago
JSON representation
tool to feed IoCs from DCSO TIE to Threat Bus
- Host: GitHub
- URL: https://github.com/dcso/tie-threatbus-bridge
- Owner: DCSO
- License: other
- Created: 2020-08-28T13:24:37.000Z (almost 5 years ago)
- Default Branch: main
- Last Pushed: 2023-09-22T12:10:30.000Z (over 1 year ago)
- Last Synced: 2024-06-19T23:14:48.621Z (12 months ago)
- Language: Go
- Homepage:
- Size: 21.5 KB
- Stars: 5
- Watchers: 5
- Forks: 0
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# TIE<->ThreatBus Bridge
This tool acts as a bridge between the TIE and
[Threat Bus](https://github.com/tenzir/threatbus) software components.
It can be used to regularly query the TIE API and publishes new IOCs to
ThreatBus. This is necessary since TIE does not have a push hook to use
for that purpose.## Dependencies
We need libzmq for ZeroMQ communication to Threat Bus.
```
$ sudo apt install libzmq3-dev
```## Building
```
$ go get github.com/DCSO/tie-threatbus-bridge
```## Running
```
$ tie-threatbus-bridge -help
Usage of ./tie-threatbus-bridge:
-config string
configuration file (default "config.yaml")
-verbose
be verbose
```Example:
```
$ tie-threatbus-bridge --config config.yaml
```## Configuration
```yaml
# Collectors settings
# -------------------
collectors:
tie:
# Set to true to enable this collector
enable: true
# TIE API version. Currently: 1
api-version: 1
# Base URL for the DCSO TIE service
baseurl: https://tie.dcso.de/api/v1/iocs
# TIE token for the API
token:
# Categories to select IoCs for
categories:
- c2-server
- espionage
# Indicator types to be selected from the TIE
data-types:
- DomainName
- URLVerbatim
# Time selection constraint
since: 4h
# Query name, e.g. "updated_at_since", "created_at_since", "first_seen_since"
time-query-name: created_at_since
# Severity range to search for. Both ends need to be specified
# (range 0-6)
severity:
from: 1
to: 5
chunk-size: 100
# Maximum limit for returned IoCs, which will be returned sorted by
# data types, in the order specified in the "data-types" config field above
# Set to 0 to disable limiting.
limit:
total: 1000# Threat Bus ZeroMQ connection settings
# -------------------------------------
threatbus:
host: 1.0.0.1
port: 13372
# legacy or stix2
format: legacylogfile: /var/log/tie-threatbus-bridge.log
```## Operation
Trigger an update by sending `SIGUSR1` to the process:
```
$ kill -USR1 `pgrep tie-threatbus`
```
This is useful, for example, to trigger regular updates via a cron job.## Ideas for improvement
- Deduplication of repeating IOCs
## Contact
Sascha Steinbiss