Retroscan MISP warninglist #8
Labels
needs triage
This issue has been automatically labelled and needs further triage
playbook:activity=2
Playbooks for activity 2
playbook:state=proposal
A 'proposal' for a new playbook
The title of the playbook
Retroscan MISP warninglist
Purpose of the playbook
This playbook is similar to the playbook for creating a custom warninglist.
Similar to #7
In this case the playbook queries the MISP events and OSINT feeds with matches from a predefined warninglist. It can be seen as some form of "retroscan". The playbook also queries Shodan and VirusTotal for matches with entries in the warninglist. The result is summarised at the end of the playbook and sent to Mattermost or Slack or added as an alert in TheHive or DFIR-IRIS (to be discussed for implementation).
External resources used by this playbook
Shodan, VirusTotal, Mattermost (or Slack), TheHive (optional), DFIR-IRIS (optional)
Target audience
SOC, CSIRT, CTI
Breefly list the execution steps or workflow
No response
The text was updated successfully, but these errors were encountered: