Git Product home page Git Product logo

cortex's Introduction

Join the chat at https://gitter.im/TheHive-Project/TheHive

Cortex tries to solve a common problem frequently encountered by SOCs, CSIRTs and security researchers in the course of threat intelligence, digital forensics and incident response: how to analyze observables they have collected, at scale, by querying a single tool instead of several?

Cortex, an open source and free software, has been created by TheHive Project for this very purpose. Observables, such as IP and email addresses, URLs, domain names, files or hashes, can be analyzed one by one or in bulk mode using a Web interface. Analysts can also automate these operations thanks to the Cortex REST API.

By using Cortex, you won't need to rewrite the wheel every time you'd like to use a service or a tool to analyze an observable and help you investigate the case at hand. Leverage one of the several analyzers it contains and if you are missing a tool or a service, create a suitable program easily and make it available for the whole team (or better, for the whole community) thanks to Cortex.

Cortex and TheHive

Along with MISP, Cortex is the perfect companion for TheHive. Starting from Buckfast (TheHive version 2.10), you can analyze tens or hundreds of observables in a few clicks using one or several Cortex instances depending on your OPSEC needs and security requirements. Moreover, TheHive comes with a report template engine that allows you to adjust the output of Cortex analyzers to your taste instead of having to create your own JSON parsers for Cortex output.

Cortex and MISP

Starting from Cortex 1.1.1, Cortex can be integrated with MISP in two ways:

Details

Architecture

Cortex is written in Scala. The front-end uses AngularJS with Bootstrap. Its REST API is stateless which allows it to be horizontally scalable. The provided analyzers are written in Python. Additional analyzers may be written using the same language or any other language supported by Linux.

Analyzers

Cortex has 24 analyzers listed below:

  • Abuse Finder: use CERT-SG's Abuse Finder to find the abuse contact associated with domain names, URLs, IP and email addresses.
  • CERT.at PassiveDNS*: Check CERT.at Passive DNS Service for a given domain.
  • CIRCLPassiveDNS*: Check CIRCL's Passive DNS for a given domain.
  • CIRCLPassiveSSL*: Check CIRCL's Passive SSL service for a given IP address or certificate hash.
  • DNSDB*: leverage Farsight's DNSDB for pDNS.
  • DomainTools*: look up domain names, IP addresses, WHOIS records, etc. using the popular DomainTools service API.
  • File Info: parse files in several formats such as OLE and OpenXML to detect VBA macros, extract their source code, generate useful information on PE, PDF files and much more.
  • FireHOL Blocklists: check IP addresses against the FireHOL blocklists.
  • GoogleSafebrowsing*: check URLs against Google Safebrowsing.
  • Hippocampe: query threat feeds through Hippocampe, a FOSS tool that centralizes feeds and allows you to associate a confidence level to each one of them (that can be changed over time) and get a score indicating the data quality.
  • Joe Sandbox*: analyze URLs and files using the powerful Joe Sandbox malware analysis solution.
  • MaxMind: geolocation.
  • MISP Search*: search for MISP events in one or several MISP instances containing the observable submitted as input.
  • Nessus: use Tenable's Nessus Vulnerability Scanner to scan an IP address or a FQDN.
  • Outlook MsgParser: parse Outlook message files automatically and show the key information it contains such as headers, attachments etc.
  • OTXQuery*: query AlienVault Open Threat Exchange for IPs, domains, URLs, or file hashes.
  • PassiveTotal*: leverage RiskIQ's PassiveTotal service to gain invaluable insight on observables, identify overlapping infrastructure using Passive DNS, WHOIS, SSL certificates and more.
  • Phishing Initiative*: query Phishing Initiative to assess whether a URL has been flagged a phishing site.
  • PhishTank*: query PhishTank to assess whether a URL has been flagged a phishing site.
  • URLCategory: check the Fortinet categories of URLs.
  • VirusShare: check whether a file/hash is available on VirusShare.com.
  • VirusTotal*: look up files, URLs and hashes through VirusTotal.
  • VMRay*: analyze files using VMRay.
  • Yara: check files against YARA rules using yara-python.

The star (*) indicates that the analyzer needs an API key, a user account or special access from the service provider to work correctly. We do not provide API keys, user accounts or request access on your behalf. You have to use your own or contact the service provider.

Documentation

We have made several guides available in the Documentation repository.

License

Cortex is an open source and free software released under the AGPL (Affero General Public License). We, TheHive Project, are committed to ensure that Cortex will remain a free and open source project on the long-run.

Updates

Information, news and updates are regularly posted on TheHive Project Twitter account and on the blog.

Contributing

We welcome your contributions, particularly new analyzers that can take away the load off overworked fellow analysts. Please feel free to fork the code, play with it, make some patches and send us pull requests using issues.

We do have a Code of conduct. Make sure to check it out before contributing.

Support

Please open an issue on GitHub if you'd like to report a bug or request a feature.

Important Note: if you encounter an issue with an analyzer or would like to request a new one or an improvement to an existing analyzer, please open an issue on the analyzers' dedicated GitHub repository. If you have problems with TheHive or would like to request a TheHive-related feature, please open an issue on its dedicated GitHub repository.

Alternatively, if you need to contact the project team, send an email to [email protected].

Community Discussions

We have set up a Google forum at https://groups.google.com/a/thehive-project.org/d/forum/users. To request access, you need a Google account. You may create one using a Gmail address or without one.

Website

https://thehive-project.org/

cortex's People

Contributors

jeromeleonard avatar nadouani avatar saadkadhi avatar to-om avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.