Giter Site home page Giter Site logo

microsoft / mstic Goto Github PK

View Code? Open in Web Editor NEW
124.0 11.0 22.0 29.79 MB

Microsoft Threat Intelligence

Home Page: https://www.microsoft.com/en-us/security/blog/microsoft-security-intelligence/

License: Creative Commons Attribution 4.0 International

Python 100.00%

mstic's Introduction

Contributing

This project welcomes contributions and suggestions. Most contributions require you to agree to a Contributor License Agreement (CLA) declaring that you have the right to, and actually do, grant us the rights to use your contribution. For details, visit https://cla.microsoft.com.

When you submit a pull request, a CLA-bot will automatically determine whether you need to provide a CLA and decorate the PR appropriately (e.g., label, comment). Simply follow the instructions provided by the bot. You will only need to do this once across all repos using our CLA.

This project has adopted the Microsoft Open Source Code of Conduct. For more information see the Code of Conduct FAQ or contact [email protected] with any additional questions or comments.

Legal Notices

Microsoft and any contributors grant you a license to the Microsoft documentation and other content in this repository under the Creative Commons Attribution 4.0 International Public License, see the LICENSE file, and grant you a license to any code in the repository under the MIT License, see the LICENSE-CODE file.

Microsoft, Windows, Microsoft Azure and/or other Microsoft products and services referenced in the documentation may be either trademarks or registered trademarks of Microsoft in the United States and/or other countries. The licenses for this project do not grant you rights to use any Microsoft names, logos, or trademarks. Microsoft's general trademark guidelines can be found at http://go.microsoft.com/fwlink/?LinkID=254653.

Privacy information can be found at https://privacy.microsoft.com/en-us/

Microsoft and any contributors reserve all other rights, whether under their respective copyrights, patents, or trademarks, whether by implication, estoppel or otherwise.

mstic's People

Contributors

aprakash13 avatar ashwin-patil avatar ep3p avatar github-actions[bot] avatar harelkatz avatar microsoft-github-policy-service[bot] avatar microsoftopensource avatar msftgits avatar petebryan avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

mstic's Issues

Are you no longer maintaining RapidReleaseTI ?

https://github.com/microsoft/mstic/tree/master/RapidReleaseTI

Last updated four months ago. Microsoft published multiple analytic rules in Sentinel that use this list as basis for detection and they are increasingly firing off false positives.
Maybe update the list or deprecate the analytic rules in Sentinel relating to RapidTI rules?

My suggestion would be to change all those analytic rules to just use the ThreatIntelligenceIndicator table, and then CTI personnel can spend time maintaining all IOCs within the ThreatIntelligenceTable, which would typically be from MISP, TAXII servers etc.

Namechange to Nobelium indicators causing errors

Spelling of Nobelium has changed in the file name - Note - Double "L"
NEW - Indicators/May21-NOBELLIUM/May21NOBELLIUMIoCs.csv
PREVIOUS - Indicators/May21-NOBELIUM/May21NOBELIUMIoCs.csv

This is causing issues in rules linking to the raw content

Similar list for other known C2 channels?

Hi, really appreciate you maintaining this list, we use it in Sentinel analytic rules for alerting on NordVPN activity. I was wondering if you plan on creating similar lists for Telegram and CactusVPN servers ?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.