Help: I can’t load Threat Intelligence via misp.yaml in Malcolm #752
-
cross-posted from Reddit: Hi! I’m trying to load TI into a fresh Malcolm Zeek container via misp.yaml, but nothing gets ingested. Plain .intel/CSV files load fine.
- type: misp
url: https://www.circl.lu/doc/misp/feed-osint/manifest.json What I see:
Question Thanks! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
I took the feed URLs from the MISP Default Feeds list with "feed format: misp" and ended up with this list: - type: misp
url: https://www.circl.lu/doc/misp/feed-osint/manifest.json
- type: misp
url: https://raw.githubusercontent.com/infobloxopen/threat-intelligence/refs/heads/main/indicators/misp/manifest.json
- type: misp
url: https://bazaar.abuse.ch/downloads/misp/manifest.json
- type: misp
url: https://www.botvrij.eu/data/feed-osint/manifest.json
- type: misp
url: https://threatfox.abuse.ch/downloads/misp/manifest.json
- type: misp
url: https://urlhaus.abuse.ch/downloads/misp/manifest.json (The DigitalSide Threat-Intel OSINT Feed was also listed, but I removed it from my list because it no longer appears to be up.) Like all feeds, however, your "since" value ( Just for fun, I made up this script to run each of these feeds individually with "since" times of 1 to 8 weeks, 3 months, 6 months, and 1 year: #!/usr/bin/env bash
URLS=(
'https://bazaar.abuse.ch/downloads/misp/manifest.json'
'https://raw.githubusercontent.com/infobloxopen/threat-intelligence/refs/heads/main/indicators/misp/manifest.json'
'https://threatfox.abuse.ch/downloads/misp/manifest.json'
'https://urlhaus.abuse.ch/downloads/misp/manifest.json'
'https://www.botvrij.eu/data/feed-osint/manifest.json'
'https://www.circl.lu/doc/misp/feed-osint/manifest.json'
)
for URL in ${URLS[*]}; do
for WEEK in $(seq 1 8) 13 26 52; do
FEED_HOST="$(echo "${URL}" | cut -d/ -f3)"
LINES=$(docker run --rm --entrypoint=/bin/bash ghcr.io/idaholab/malcolm/zeek:25.08.1 -c "zeek_intel_from_threat_feed.py --since '${WEEK} weeks ago' -i 'misp|${URL}' -o /tmp/indicators.zeek >/dev/null 2>&1; wc -l /tmp/indicators.zeek" | awk '{print $1}')
echo "${FEED_HOST} (${WEEK} weeks): ${LINES} lines"
done
done Here's what I learned:
Naturally I'm a bit curious about the one that doesn't return any so I'll dig into it a little more and see if there's something different about the way it's representing timestamps or something. Hopefully this is enough to get you going. |
Beta Was this translation helpful? Give feedback.
I took the feed URLs from the MISP Default Feeds list with "feed format: misp" and ended up with this list:
(The DigitalSide Threat-Intel OSINT Feed was also listed, but I removed it from my li…