Skip to content
This repository was archived by the owner on Mar 16, 2023. It is now read-only.
ericmoret edited this page Jul 13, 2016 · 27 revisions

logo

What is MineMeld?

An extensible Threat Intelligence processing framework.

What is MineMeld for?

MineMeld is a tool to manipulate list of indicators and transform/aggregate them for consumption by third party enforcement infrastructure. MineMeld has many use-cases and can easily be extended to fulfill many more. Here are a few examples:

  • Connect to the VirBL Virus Blacklist feed and transform it for enforcement by Palo Alto Networks EDL (External Dynamic List) objects
  • Mine Office 365 IP addresses provided by Microsoft and create a EDL list out of them for usage in a Palo Alto Networks security policy to further restrict trafic
  • Aggregate AUS-CERT and FS-ISAC Threat Intelligence feeds, removing duplicates, expiring entries and consolidating attack directions and confidence levels then make this list available for enforcement by third party tools

MineMeld versions

XXX

Where from here?

Where is the code?

There are 2 main components of MineMeld. Each component has its own repo:

The library of node prototypes is maintained in minemeld-node-prototypes.

How can I contribute?

Credits

XXX

Clone this wiki locally