Using MineMeld with MISP

Showing results for 
Show  only  | Search instead for 
Did you mean: 

Using MineMeld with MISP

L1 Bithead

How can I pull the IOCs from MISP to MinMeld Plattform ?

Exist any extension to get the IOCs from MISP ?


L1 Bithead



Hi there,



in SYSTEM > EXTENSIONS install the extension using git button (


more details in:

Excellent, Tks a Lot

@TiagoSantos84 wrote:



Hi there,



in SYSTEM > EXTENSIONS install the extension using git button (


more details in:




I'm trying to integrate Minemeld with MISP.

I followed


Which URL of MISP (public) do I need to provide on the Prototype parameter ?





Hi @slp-security ,


I don't know if I understand your question, but you need to use your MISP url.

Prototype parameters
# source name, to identify the origin of the indicators inside MineMeld
source_name: misp.test # URL of MISP url:

Please be more specific.


Kind regards,




First, thanks for your help.

OK I solved the issue.

The API key was not correct...







Have you ever had this issue ? 

- i clone this prototype as a new node : misp.anyEvent

- added the url and the API key from the GUI 


Do i missed something ? 










Hi @papham,


Try to confirm your auth key..


Certificates installed on misp? Do you have a self signed certificate?


But it should be straight forward.


Kind Regards.

L0 Member

My MISP miner seems to work OK, i'm using the IDS check box as the filter to block IoC's - How do I unblock an IoC, is it as simple as unchecking the IDS box in MISP, will that update the EDL?

Hi @Tony101 


It really depends on how the receiver deal with data. There is some platforms that will update the list of IoCs after some amount of time. On the other hand you can try to disable IDS flag on the MISP and delete the IoC on the destination that already receive the IoC as black list.

However, you just need to remove IDS flag if you don't have the enforcewarninglist flag active on the query and if you don't have any warninglist feed active.


Please take a look on this:

Hope that you can manage it. It's really hard to deal with false positives!



Hi thanks for the previous answer, it was really helpful.. I have another question re the output FEED BASE URL:

appending ?v=mwg&t=regex to the feed base url gives me the format i require e.g..


"hxxp://badsite[.]biz/malware.html" "comment"

But what i really want to achieve is an * wildcard at the end of the string e.g.

"hxxp://badsite[.]biz/malware.html*" "comment"


Any ideas if this is do-able?


we have recently installed MineMeld on our Linux server and after adding the MISP extension on MineMeld, I don't understand what it means by add your MISP URL. Is this URL found from MISP website or is it a URL we get after installing MISP. Between we haven't installed MISP as well. Is it required for the miner to work ? 

Another question I have is regarding the dynamic lists on MISP website. Do we add them with MISP miner or regular miners can pull them too?

I'm very new to MineMeld and I don't quite understand how to configure nodes. So I would appreciate if you could provide me a sample of a configuration for MISP feeds.



MISP url is the address of you MISP instance. So you need to install it, create a sync user and put the key of that user in the miner.


Please follow the links provided in previous posts.


Kind regards,


Hi guys, but

source name, to identify the origin of the indicators inside MineMeld

 Source name is generic? Can i choose every name?

  • 13 replies
  • 71 Subscriptions
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!