Skip to content

Commit b51a610

Browse files
committedSep 18, 2023
MISP Update
1 parent b37a1b3 commit b51a610

File tree

3 files changed

+10
-2
lines changed

3 files changed

+10
-2
lines changed
 
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
let MISPFeed = externaldata(Listingdate: string, SHA1: string, Listingreason: string )[@"https://sslbl.abuse.ch/blacklist/sslblacklist.csv"] with (format="csv", ignoreFirstRecord=True);
2+
MISPFeed
3+
| take 100
4+
// With the current MDE Logs there is no usecase for this MISP feed, but maybe you ingest other logs which can be enriched with this MISP feed.

‎MISP/MISP Feed Implementation Status/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
| Feed Name | Provider | Feed Format | Sentinel | Defender For Endpoint | Notes
44
| --- | --- | --- | --- | --- | --- |
5-
| [abuse.ch SSL IPBL](https://sslbl.abuse.ch/blacklist/sslblacklist.csv) | abuse.ch | csv | |||
5+
| [abuse.ch SSL IPBL](https://sslbl.abuse.ch/blacklist/sslblacklist.csv) | abuse.ch | csv | :heavy_check_mark: | :heavy_check_mark: ||
66
| [blocklist.de/lists/all.txt](https://lists.blocklist.de/lists/all.txt) | blocklist.de | freetext | :heavy_check_mark: | :heavy_check_mark: ||
77
| [blockrules of rules.emergingthreats.net](https://rules.emergingthreats.net/blockrules/compromised-ips.txt) | rules.emergingthreats.net | csv | :heavy_check_mark: | :heavy_check_mark: ||
88
| [ci-badguys.txt](https://cinsscore.com/list/ci-badguys.txt) | cinsscore.com | freetext | :heavy_check_mark: | :heavy_check_mark: ||
@@ -40,7 +40,6 @@
4040
| [SMTP data](https://dataplane.org/smtpdata.txt) | dataplane.org | csv | |||
4141
| [SMTP greet](https://dataplane.org/smtpgreet.txt) | dataplane.org | csv | |||
4242
| [SSH Bruteforce IPs](https://feeds.honeynet.asia/bruteforce/latest-sshbruteforce-unique.csv) | APNIC Community Honeynet Project | csv | |||
43-
| [sshpwauth.txt](https://dataplane.org/sshpwauth.txt) | dataplane.org | csv | |||
4443
| [Telnet Bruteforce IPs](https://feeds.honeynet.asia/bruteforce/latest-telnetbruteforce-unique.csv) | APNIC Community Honeynet Project | csv | |||
4544
| [TELNET login](https://dataplane.org/telnetlogin.txt) | dataplane.org | csv | |||
4645
| [The Botvrij.eu Data](https://www.botvrij.eu/data/feed-osint) | Botvrij.eu | misp | |||
@@ -72,6 +71,7 @@ Some feeds that are mentioned on [MISPs Feed page](https://www.misp-project.org/
7271
| [IPs from High-Confidence DGA-Based C&Cs Actively Resolving - requires a valid license](https://osint.bambenekconsulting.com/feeds/c2-ipmasterlist-high.txt) | osint.bambenekconsulting.com | Commercial licence requried for the feed |
7372
| [mirai.security.gives](https://mirai.security.gives/data/ip_list.txt) | security.gives | Externaldata() timeout. |
7473
| [Panels Tracker](https://benkow.cc/export.php) | Benkow.cc | Externaldata(), does not support this datatype.|
74+
| [sshpwauth.txt](https://dataplane.org/sshpwauth.txt) | dataplane.org | csv | Partial query failure: Unable to perform requested operation. (message: 'Error with persistent storage path '' (operation ''). Extended error information: 'Uri does not provide a blob name: 'https://dataplane.org/sshpwauth.txt'' |
7575
| [This list contains all browser mining domains - A list to prevent browser mining only](https://gitlab.com/ZeroDot1/CoinBlockerLists/raw/master/list_browser.txt?inline=false) | ZeroDot1 - CoinBlockerLists | Read from IStreamSource failed |
7676
| [This list contains all domains - A list for administrators to prevent mining in networks](https://gitlab.com/ZeroDot1/CoinBlockerLists/raw/master/list.txt?inline=false) | ZeroDot1 - CoinBlockerLists | Read from IStreamSource failed |
7777
| [This list contains all optional domains - An additional list for administrators](https://gitlab.com/ZeroDot1/CoinBlockerLists/raw/master/list_optional.txt?inline=false) | ZeroDot1 - CoinBlockerLists | Read from IStreamSource failed |
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,4 @@
1+
let MISPFeed = externaldata(Listingdate: string, SHA1: string, Listingreason: string )[@"https://sslbl.abuse.ch/blacklist/sslblacklist.csv"] with (format="csv", ignoreFirstRecord=True);
2+
MISPFeed
3+
| take 100
4+
// With the current MDE Logs there is no usecase for this MISP feed, but maybe you ingest other logs which can be enriched with this MISP feed.

0 commit comments

Comments
 (0)
Please sign in to comment.