TwiTi - Tool For Extracting IOCs From Tweet


TwiTi, a tool for extracting IOCs from tweets, can collect a large number of fresh, accurate IOCs.
TwiTi does

  • classifying whether a tweet contains IOCs or not.
  • extracting IOCs from a tweet and also from links mentioned in a tweet.

For more details please refer to our paper,
"#Twiti: Social Listening for Threat Intelligence" (TheWebConf 2021)
Also, you can find supplementary materials of the paper in data directory.


Requirements

Python
pip install -r requirements.txt

NER

TwiTi utilizes NER model for text processing. NER model should be built before run.
Please refer to ner/README.md for more information.


Run

Run commands below in TwiTi directory


IOC extraction
python -m ioc_extractor --help

Tweet classification
python -m classifier --help

Remarks on data license

License may change over time. Almost all the data owners state that they may revise ToS at any time without notice. For example, at the time of our investigation, AlienVault did not provide any legal terms about OTX data usage right in its End-User License Agreement. We instead found the following statement in its website.

Most threat data sharing products or services are limited in what they provide or require users to pay extra for what the provider deems as "premium" features. ... OTX alleviates that problem by providing a comprehensive threat intelligence service that’s 100% free, along with multiple methods for your security tools.

Hence, we interpreted AlienVault OTX as being "available for commercial use". However, its End-User License Agreement has been updated since April 2021 and it now clearly states that

OTX is free to end users for non-commercial use.

This license restriction affects on the amount of IOCs by data use restriction in Section 5.1 of our paper.




Source: feedproxy.google.com
TwiTi - Tool For Extracting IOCs From Tweet TwiTi - Tool For Extracting IOCs From Tweet Reviewed by Anonymous on 2:30 PM Rating: 5