trs
leverages OpenAI and ChromaDB to analyze and chat with cyber threat intelligence reports and blogs.
Supply a threat report URL to pre-built commands for summarization, MITRE TTP extraction, mindmap creation, and identification of detection opportunities, or run your own custom prompts against the URLs text content.
Each URLs text is stored in a Chroma vector database so you can have QnA / Retrieval-Augmented-Generation (RAG) chat sessions with your stored data.
The OpenAI model gpt-4-1106-preview
is used in order to support larger contexts more easily, but feel free to swap this out for another model.
Full documentation: https://trs.deadbits.ai
Clone repository
git clone https://github.com/deadbits/trs.git
cd trs
Setup Python virtual environment
python3 -m venv venv
source venv/bin/activate
Install Python requirements
pip install -r requirements.txt
Set your OpenAI API key:
export OPENAI_API_KEY="sk-..."
Run command line application
python trs-cli.py --chat
Set your OpenAI API key:
.streamlit/secrets.toml
Run Streamlit web interface
streamlit run trs-streamlit.py
[!IMPORTANT] Per Streamlit's documentation, "Streamlit runs your script from top to bottom at every user interaction or code change." This can lead to high memory usage due to ChromaDB being loaded into memory over and over. Right now, the CLI is the recommended mode of interaction.
More screenshots are available here.
Command | Description |
---|---|
!summ |
Generate a summary of the URL content including key takeaways, summary paragraph, MITRE TTPs, and Mermaid mindmap for a report overview. |
!detect |
Identify any threat detection opportunities within the URL content. |
!custom |
Fetch the URL content and process it with a custom prompt. |
all other input | Run RAG pipeline with input as query |
Before you can use the chat functionality, you must first process a URL with one of the commands above so the vector database has some context to use.
Any input that is not a !command
will be sent to the RAG pipeline.
If the answer is not available in the context, you won't get an answer.
π >> Summarize the LemurLoot malware functionality
2023-10-14 14:51:51.140 | INFO | trs.vectordb:query:84 - Querying database for: Summarize the LemurLoot malware functionality
2023-10-14 14:51:51.840 | INFO | trs.vectordb:query:90 - Found 3 results
2023-10-14 14:51:51.841 | INFO | trs.llm:qna:98 - sending qna prompt
2023-10-14 14:51:51.841 | INFO | trs.llm:_call_openai:41 - Calling OpenAI
2023-10-14 14:51:51.854 | INFO | trs.llm:_call_openai:59 - token count: 2443
π€ >>
The LemurLoot malware has several functionalities. It uses the header field βX-siLock-Step1β to receive commands from the operator, with two well-defined commands: -1 and -2.
Command β-1β retrieves Azure system settings from MOVEit Transfer and performs SQL queries to retrieve files. Command β-2β deletes a user account with the LoginName and
RealName set to "Health Check Service". If any other values are received, the web shell opens a specified file and retrieves it. If no values are specified, it creates the
βHealth Check Serviceβ admin user and creates an active session.
Custom prompt templates can be saved to the prompts/
directory as text files with the .txt
extension. The !custom
command will look for prompts by file basename in that directory, add the URL's text content to the template, and send it to the LLM for processing.
Custom prompts must include the format string {document}
so the URL text content can be added.
The Streamlit application offers some functionality that the CLI tool does not, including:
View prompt and response history
View database records
This project is licensed under the Apache 2.0 License - see the LICENSE.md file for details.