Discover and explore top open-source AI tools and projects—updated daily.
Warning lists for indicator false-positive reduction in MISP
Top 55.4% on SourcePulse
This repository provides a curated collection of warning lists designed to enhance threat intelligence analysis within the MISP (Malware Information Sharing Platform) ecosystem. It helps users identify potential false positives, common false positives, and other contextual information related to indicators of compromise (IOCs) by flagging known benign or frequently encountered entities. The lists are valuable for security analysts, incident responders, and researchers seeking to refine their threat detection and analysis workflows.
How It Works
The warning lists are structured JSON files, each containing a collection of indicators (IP addresses, domains, file hashes, etc.) categorized by their nature (e.g., known cloud provider IPs, common dynamic DNS domains, EICAR test file hashes). These lists are integrated into MISP, where they are matched against attributes within events and indicators. When a match occurs, MISP displays a warning, allowing analysts to quickly assess the context and potential validity of an IOC, thereby reducing noise and improving analysis efficiency.
Quick Start & Requirements
git clone https://github.com/MISP/misp-warninglists.git
PyMISPWarningLists
Python library is available.PyMISPWarningLists
. MISP instance for direct integration.Highlighted Details
Maintenance & Community
The project is maintained by the MISP community. Specific contributors are not highlighted in the README, but the project benefits from the broader MISP ecosystem.
Licensing & Compatibility
Limitations & Caveats
The effectiveness of the warning lists is dependent on their regular updating to reflect current IP ranges, domain registrations, and evolving threat landscapes. Some lists may require specific attribute matching configurations within MISP to function optimally.
2 days ago
1 day