Skip to main content

A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, or text formats.

Project description

iocsearcher

iocsearcher is a Python library and command-line tool to extract indicators of compromise (IOCs), also known as cyber observables, from HTML, PDF, and text files. It can identify both defanged (e.g., IP address 1[.]2[.]3.[4]) and unmodified IOCs (e.g., IP address 1.2.3.4).

Supported IOCs

iocsearcher can extract the following IOC types:

  • URLs (url)
  • Domain names (fqdn)
  • IP addresses (ip)
  • IP subnets (ipNet)
  • Hashes (fileMd5,fileSha1,fileSha256)
  • Email addresses (email)
  • Copyright strings (copyright)
  • CVE vulnerability identifiers (cve)
  • Tor v3 addresses (onionAddress)
  • Social network handles (facebookHandle,githubHandle,instagramHandle, linkedinHandle,pinterestHandle,telegramHandle,twitterHandle,whatsappHandle, youtubeHandle,youtubeChannel)
  • Advertisement/analytics identifiers (googleAdsense, googleAnalytics, googleTagManager)
  • Blockchain addresses (bitcoin,bitcoincash,dashcoin,dogecoin,ethereum,litecoin,monero,tezos,zcash)
  • Payment addresses (webmoney)
  • Chinese Internet Content Provider licenses (icp)
  • Bank account numbers (iban)
  • Trademarks (trademark)
  • Universal unique identifiers (uuid)
  • Android package name (packageName)
  • Spanish NIF identifiers (nif)

Installation

pip install iocsearcher

If you get an error, try installing Python developer tools first:

sudo apt install python3-dev
pip install iocsearcher

Command Line Usage

To find IOCs in a given file just provide the -f (--file) option. By default, found IOCs are printed to stdout, defanged IOCs are rearmed, and IOCs are deduplicated so they only appear once.

iocsearcher -f file.pdf
iocsearcher -f page.html
iocsearcher -f input.txt

You can use the -o (--output) option to place IOCs to a file instead of stdout:

iocsearcher -f file.pdf -o iocs.txt

By default all regexp are applied to the input. If you are only interested in some specific IOC types, it is more efficient to specify those using the -t (--target) option, which can be applied multiple times:

iocsearcher -f file.pdf -t url -t email

You can also search for IOCs in all files in a directory using the -d (--dir) option. IOCs extracted from each file will be placed in their own .iocs file. You can also place all IOCs founds across the input files in the same output file by also adding the -o (--output) option:

iocsearcher -d directoryWithFiles -o all.iocs

In HTML files, only the readable text is examined (i.e., think of the text shown by Firefox's Reader View). If you want to scan the whole HTML content you can use the -r (--raw) option:

iocsearcher -f page.html -r

If you have a file that you want to interpret as text avoiding filetype detection, you can use the -F (--forcetext) option:

iocsearcher -f input.txt -F

You can store the text extracted from a PDF/HTML file using the -T (--text) option, which will produce a .text file for each input file:

iocsearcher -f file.pdf -T

By default IOCs are deduplicated, you can instead output the offset of each IOC without deduplication by using the -v (--verbose) option:

iocsearcher -f file.pdf -v

Library Usage

You can also use iocsearcher as a library by creating a Searcher object and then invoking the functions search_data to identify rearmed and deduplicated IOCs and search_raw to identify all matches, their offsets, and the defanged string. The Searcher object needs to be created only once to parse the regexps. Then, it can be reused to find IOCs in multiple input strings.

python3
>>> import iocsearcher
>>> from iocsearcher.searcher import Searcher
>>> test = 'Find this email contact[AT]example[dot]com'
>>> searcher = Searcher()
>>> searcher.search_data(test)
{('email', 'contact@example.com'), ('fqdn', 'example.com')}
>>> searcher.search_data(test, targets={'email'})
{('email', 'contact@example.com')}
>>> searcher.search_raw(test)
[('email', 'contact@example.com', 16, 'contact[AT]example[dot]com'), ('fqdn', 'example.com', 27, 'example[dot]com')]

You can also open a document without needing to provide its type, get its text, and then use a Searcher object to search for IOCs in the text:

python3
>>> import iocsearcher
>>> from iocsearcher.document import open_document
>>> from iocsearcher.searcher import Searcher
>>> doc = open_document(filepath)
>>> text,_ = doc.get_text() if doc is not None else ""
>>> searcher = Searcher()
>>> searcher.search_data(text)

If the file is not a PDF, HTML, or text document, then open_document throws a warning and returns None

Defang and Rearm

Many security reports defang (i.e., remove the teeth from) malicious indicators, especially network indicators such as URLs, domains, IP addresses, and email addresses. This practice helps to prevent users from inadvertently clicking on a malicious indicator and start a network connection to it. Defanged indicators do not follow the indicator specification and thus required relaxed regular expressions to detect them.

iocsearcher supports some popular defang operations and rearms the IOCs by default so that deduplication works even if the same IOC has been defanged in different ways.

However, it is not possible to support all defang operations, as every analyst can come up with their own. If you think iocsearcher is missing support for some popular defang operation, let us know by providing pointers to reports that use them.

Customizing the Regular Expressions

The default regular expressions used by iocsearcher are stored in data/patterns.ini

If you want to modify a regexp, add a regexp, change the IOC type associated to a regexp, or disable validation for an existing regexp, you can create a copy of patterns.ini, edit your copy, and pass it as input to iocsearcher using the -P (--patterns) option:

iocsearcher -f file.pdf -P mypatterns.ini

Note that if you add a new regexp, the output will be the outermost group if a group exists, and the whole match if the regexp has no groups.

Related Tools

There exist multiple other open-source IOC extraction tools. In our FGCS journal paper we propose a novel evaluation methodology for IOC extraction tools and apply it to compare iocsearcher with the following tools:

We encourage you to read our paper if you have questions about how iocsearcher compares with the above tools and to try the above tools if iocsearcher does not meet your goals.

References

The design and evaluation of iocsearcher and the comparison with prior IOC extraction tools are detailed in our FGCS journal paper:

Juan Caballero, Gibran Gomez, Srdjan Matic, Gustavo Sánchez, Silvia Sebastián, and Arturo Villacañas. GoodFATR: A Platform for Automated Threat Report Collection and IOC Extraction. In Future Generation Computer Systems, 2023.

Contributors

The main developer and maintainer for iocsearcher is Juan Caballero. Other members of the MaliciaLab at the IMDEA Software Institute have contributed fixes and helped with testing: Gibran Gomez, Silvia Sebastian, Srdjan Matic

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

iocsearcher-1.0.0.tar.gz (29.3 kB view details)

Uploaded Source

Built Distribution

iocsearcher-1.0.0-py3-none-any.whl (28.7 kB view details)

Uploaded Python 3

File details

Details for the file iocsearcher-1.0.0.tar.gz.

File metadata

  • Download URL: iocsearcher-1.0.0.tar.gz
  • Upload date:
  • Size: 29.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.6

File hashes

Hashes for iocsearcher-1.0.0.tar.gz
Algorithm Hash digest
SHA256 7b3f108c6035344c0597834dce5c69f7c4243cc067e28d7e40a00fe0456fa70e
MD5 d4dcbeb0f814594bf48209b28aad7abd
BLAKE2b-256 bd58651d01c4a11f4d8679595733251ac3e735ff72b2a8c416263415d9d238d9

See more details on using hashes here.

File details

Details for the file iocsearcher-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: iocsearcher-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 28.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.10.6

File hashes

Hashes for iocsearcher-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 04209198717e29e3ba083fe5b9cab25cbbe5bb6a33f1f2ed1e438088edb977f7
MD5 275aba3da82a27775594cc40ac694039
BLAKE2b-256 84f87dec0633cf2044686b82c16adbcbf276ae69e02d6e0d62fb962af9ccdb47

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page