Skip to content
This repository has been archived by the owner on Mar 16, 2023. It is now read-only.
Luigi Mori edited this page Jul 14, 2016 · 27 revisions

logo

What is MineMeld?

An extensible Threat Intelligence processing framework.

What is MineMeld for?

MineMeld is a tool to manipulate list of indicators and transform/aggregate them for consumption by third party enforcement infrastructure. MineMeld has many use-cases and can easily be extended to fulfill many more. Here are a few examples:

  • Connect to the Spamhaus DROP feed and transform it for enforcement by Palo Alto Networks EDL (External Dynamic List) objects
  • Mine Office 365 IP addresses provided by Microsoft and dynamically create an EDL list out of them for usage in a Palo Alto Networks security policy to further restrict trafic
  • Aggregate CERTs and ISACs Threat Intelligence feeds, removing duplicates, expiring entries and consolidating attack directions and confidence levels then make this list available for enforcement by third party tools

MineMeld versions

XXX

Where from here?

Where is the code?

There are 2 main components of MineMeld. Each component has its own repo:

The library of node prototypes is maintained in minemeld-node-prototypes.

How can I contribute?

Credits

XXX

Clone this wiki locally