OpenIoC
Source: github.com/mandiant/OpenIOC_1.1
Last updated
Source: github.com/mandiant/OpenIOC_1.1
Last updated
OpenIOC uses XML-formatted documents. Each entry comprises meta-information such as author, category information, confidence level, and usage license, plus a description and a definition. The definition is built from logical statements defining detection rules, such as DNS host name or a string pattern for a filename.
Malware Information Sharing Project (MISP) provides a server platform for CTI sharing as well as a file format. MISP servers can import and export STIX CDOs over TAXII.
It also supports OpenIOC definitions.
A number of sites maintain extensive lists of open-source threat information sources:
provides a list:
The Open Threat Exchange operated by AlienVault is part of a global community of security professionals and threat researchers:
The MISP Threat Sharing project provides standardized threat feeds from many sources: , with community-driven collections.
Threatfeeds.io hosts a list of open-source threat intelligence feeds with details of when they were added and modified, who maintains them, and other useful information: threatfeeds.io
Government sites:
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) site:
The U.S. Department of Defense Cyber Crime Center site:
The CISA's Automated Indicator Sharing (AIS) program,
Infomation Sharing and Analysis Organizations program,
Vendor websites:
Microsoft's threat intelligence blog:
Cisco's threat security site
Cisco Talos reputation lookup tool,
Public sources:
The SANS Internet Storm Center:
VirusShare contains details about malware uploaded to VirusTotal:
Spamhaus focuses on block lists, including spam via the Spamhaus Block List (SBL)