Replies: 1 comment 3 replies
-
Hey, I really appreciate your suggestion. Right now IntelOwl does not provide a real threat intelligence platform. It just allows to retrieve data from different sources/tools at the same time. The main goal is and was to just to speed up data retrieval. So IntelOwl is agnostic in respect of each source/tool. It just gets the data and ignores completely how each tool works and which is the goal of each tool. Recently, with the increase of the success of the project, we started to think on how we could transform IntelOwl in a real threat intelligence platform that can be used for complex analysis. To do that we would need to add an important feature:
An IntelOwl user should be able to jump from an IOC extracted from a specific analysis to another one from a subsequent analysis....and so on until the analyst thinks that he got all the needed data and the "investigation" is finished. IntelOwl should also provide the chance to build and customize such flows and these flows should be executed automatically, re-used and shared. There is a first concept here. This feature would still leave to the user the duty to understand which analyzers he is more interested of, which data to extract, which data better correlate with others and which flows to create. What I mean is: if IntelOwl provided the chance to create such kind of investigations easily, it should not be biased about the extracted data. In other words, IntelOwl should not tell to the user that he would need that specific data cause only the user knows which data he needs. IntelOwl should just provide the chance to build complex flows and investigations, like the one that you mentioned. We should focus on this because IntelOwl supports too many different analyzers and tools and too many different use cases that would be really unmanagable to try to address all of them. Then, I agree that there are some specific flows that are more popular than others (like the one you suggested) and, in some way, we should help these cases more than the others. Another point of view that I have is that I don't see So, what do you think about having the chance to build flows like you mentioned from the GUI so they can be repeatable and re-usable and to leverage only the analyzers that you think are worth for your goal. That would be a custom "investigation" of yours that you could keep for yourself or, maybe, you could also share in a public repository of "investigations" types so everyone can use it.
and you would get, as a result, only the data from the executed analyzers that you think are worth (these would be specified in the "investigation" declaration). Obviously, it is not so easy to design such kind of customizable "investigation" feature and we don't have anything as a draft yet. But we aim to do something like that in the future, probably next year. Did I get your point or I wandered? :P Makes sense? I'll also move this issue to a discussion |
Beta Was this translation helpful? Give feedback.
-
Hi guys,
When investigating the intelligence, our steps are often the iteration of extracting info and then analyzing the info.
For instance, when digging into a binary, we might want to know if there are base64 encoded strings inside. So our first step would be extract encoded strings that are most likely base64 encoded. Then we can start to analyze the decoded strings.
Or it could be the scenario that we'd like to find (extract) URLs inside the binary and then analyze them.
I think IntelOwl is doing very well of what mentioned above. And I think it would be so nice if we can explore the threat intelligence with enhenced pyintelowl.
To do so, we need to design more Intelowl APIs making the data extraction and piping it to the analyzers more easily.
Here's the concept.
To make the above concept works, we need to
So what do you guys think? :D
Please correct me if I'm wrong with something.
Beta Was this translation helpful? Give feedback.
All reactions