mirror of
https://github.com/mvt-project/mvt.git
synced 2024-07-01 00:19:02 +00:00
Squashed commit of the following: commit c0d9e8d5d188c13e7e5ec0612e99bfb7e25f47d4 Author: Donncha Ó Cearbhaill <donncha.ocearbhaill@amnesty.org> Date: Fri Jan 7 16:05:12 2022 +0100 Update name of indicators JSON file commit f719e49c5f942cef64931ecf422b6a6e7b8c9f17 Author: Donncha Ó Cearbhaill <donncha.ocearbhaill@amnesty.org> Date: Fri Jan 7 15:38:03 2022 +0100 Do not set indicators option on module if no indicators were loaded commit a289eb8de936f7d74c6c787cbb8daf5c5bec015c Author: Donncha Ó Cearbhaill <donncha.ocearbhaill@amnesty.org> Date: Fri Jan 7 14:43:00 2022 +0100 Simplify code for loading IoCs commit 0804563415ee80d76c13d3b38ffe639fa14caa14 Author: Donncha Ó Cearbhaill <donncha.ocearbhaill@amnesty.org> Date: Fri Jan 7 13:43:47 2022 +0100 Add metadata to IoC entries commit 97d0e893c1a0736c4931363ff40f09a030b90cf6 Author: tek <tek@randhome.io> Date: Fri Dec 17 16:43:09 2021 +0100 Implements automated loading of indicators commit c381e14df92ae4d7d846a1c97bcf6639cc526082 Author: tek <tek@randhome.io> Date: Fri Dec 17 12:41:15 2021 +0100 Improves download-indicators commit b938e02ddfd0b916fd883f510b467491a4a84e5f Author: tek <tek@randhome.io> Date: Fri Dec 17 01:44:26 2021 +0100 Adds download-indicators for mvt-ios and mvt-android
47 lines
2.4 KiB
Markdown
47 lines
2.4 KiB
Markdown
# Indicators of Compromise (IOCs)
|
|
|
|
MVT uses [Structured Threat Information Expression (STIX)](https://oasis-open.github.io/cti-documentation/stix/intro.html) files to identify potential traces of compromise.
|
|
|
|
These indicators of compromise are contained in a file with a particular structure of [JSON](https://en.wikipedia.org/wiki/JSON) with the `.stix2` or `.json` extensions.
|
|
|
|
You can indicate a path to a STIX2 indicators file when checking iPhone backups or filesystem dumps. For example:
|
|
|
|
```bash
|
|
mvt-ios check-backup --iocs ~/ios/malware.stix2 --output /path/to/iphone/output /path/to/backup
|
|
```
|
|
|
|
Or, with data from an Android backup:
|
|
|
|
```bash
|
|
mvt-android check-backup --iocs ~/iocs/malware.stix2 /path/to/android/backup/
|
|
```
|
|
|
|
After extracting forensics data from a device, you are also able to compare it with any STIX2 file you indicate:
|
|
|
|
```bash
|
|
mvt-ios check-iocs --iocs ~/iocs/malware.stix2 /path/to/iphone/output/
|
|
```
|
|
|
|
The `--iocs` option can be invoked multiple times to let MVT import multiple STIX2 files at once. For example:
|
|
|
|
```bash
|
|
mvt-ios check-backup --iocs ~/iocs/malware1.stix --iocs ~/iocs/malware2.stix2 /path/to/backup
|
|
```
|
|
|
|
It is also possible to load STIX2 files automatically from the environment variable `MVT_STIX2`:
|
|
|
|
```bash
|
|
export MVT_STIX2="/home/user/IOC1.stix2:/home/user/IOC2.stix2"
|
|
```
|
|
|
|
## Known repositories of STIX2 IOCs
|
|
|
|
- The [Amnesty International investigations repository](https://github.com/AmnestyTech/investigations) contains STIX-formatted IOCs for:
|
|
- [Pegasus](https://en.wikipedia.org/wiki/Pegasus_(spyware)) ([STIX2](https://raw.githubusercontent.com/AmnestyTech/investigations/master/2021-07-18_nso/pegasus.stix2))
|
|
- [Predator from Cytrox](https://citizenlab.ca/2021/12/pegasus-vs-predator-dissidents-doubly-infected-iphone-reveals-cytrox-mercenary-spyware/) ([STIX2](https://raw.githubusercontent.com/AmnestyTech/investigations/master/2021-12-16_cytrox/cytrox.stix2))
|
|
- [This repository](https://github.com/Te-k/stalkerware-indicators) contains IOCs for Android stalkerware including [a STIX MVT-compatible file](https://raw.githubusercontent.com/Te-k/stalkerware-indicators/master/stalkerware.stix2).
|
|
|
|
You can automaticallly download the latest public indicator files with the command `mvt-ios download-indicators` or `mvt-android download-indicators`.
|
|
|
|
Please [open an issue](https://github.com/mvt-project/mvt/issues/) to suggest new sources of STIX-formatted IOCs.
|