Skip to content

Commit 7a2f49a

Browse files
author
Sebastian Wagner
committed
Merge branch 'maintenance' into develop
2 parents ee8d505 + 1fc77b9 commit 7a2f49a

File tree

5 files changed

+9
-4
lines changed

5 files changed

+9
-4
lines changed

CHANGELOG.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@ CHANGELOG
1212
### Configuration
1313

1414
### Core
15+
- `intelmq.lib.bot_debugger`: Fix accessing the bot's destination queues (PR#2027 by Mikk Margus Möll).
16+
- `intelmq.lib.pipeline`: Fix handling of `load_balance` paramter (PR#2027 by Mikk Margus Möll).
1517

1618
### Development
1719

@@ -24,6 +26,7 @@ CHANGELOG
2426
- `intelmq.bots.collectors.http.collector_http_stream`: Fix access to parameters, the bot wrongly used `self.parameters` (by Sebastian Wagner).
2527

2628
#### Parsers
29+
- `intelmq.bots.parsers.microsoft.parser_ctip`: Map `Payload.domain` to `destination.fqdn` instead of `extra.payload.domain` as it matches to `destination.ip` from `DestinationIp` (PR#2023 by Sebastian Wagner).
2730

2831
#### Experts
2932
- `intelmq.bots.experts.truncate_by_delimiter.expert`: Cut string if its length is higher than a maximum length (PR#1967 by Marius Karotkis).

docs/dev/feeds-wishlist.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@ This list evolved from the issue :issue:`Contribute: Feeds List (#384) <384>`.
2828
- List of potentially interesting data sources:
2929

3030
- `Abuse.ch SSL Blacklists <https://sslbl.abuse.ch/blacklist/>`_
31+
- `AbuseIPDB <https://www.abuseipdb.com/pricing>`_
3132
- `Adblock Plus <https://adblockplus.org/en/subscriptions>`_
3233
- `apivoid IP Reputation API <https://www.apivoid.com/api/ip-reputation/>`_
3334
- `Anomali Limo Free Intel Feed <https://www.anomali.com/resources/limo>`_
@@ -80,6 +81,7 @@ This list evolved from the issue :issue:`Contribute: Feeds List (#384) <384>`.
8081
- `Neo23x0 signature-base <https://github.com/Neo23x0/signature-base/tree/master/iocs>`_
8182
- `OpenBugBounty <https://www.openbugbounty.org/>`_
8283
- `Phishing Army <https://phishing.army/>`_
84+
- `Phishstats <https://phishstats.info/>`_, offers JSON ("API) and CSV download.
8385
- `Project Honeypot (#284) <http://www.projecthoneypot.org/list_of_ips.php?rss=1>`_
8486
- `RST Threat Feed <https://rstcloud.net/>`_ (offers a free and a commercial feed)
8587
- `SANS ISC <https://isc.sans.edu/api/>`_

docs/user/installation.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ These are the operating systems which are currently supported by packages:
121121
* **Fedora 33**
122122
* **Fedora 34**
123123
* **openSUSE Leap 15.2**
124-
* **openSUSE Leap 15.3**
124+
* **openSUSE Leap 15.3** (make sure the ``openSUSE:Backports:SLE-15-SP3`` repository is enabled)
125125
* **openSUSE Tumbleweed**
126126
* **Ubuntu 18.04** (enable the universe repositories by appending `universe` in `/etc/apt/sources.list` to `deb http://[...].archive.ubuntu.com/ubuntu/ bionic main` first)
127127
* **Ubuntu 20.04** (enable the universe repositories by appending `universe` in `/etc/apt/sources.list` to `deb http://[...].archive.ubuntu.com/ubuntu/ focal main` first)

intelmq/bots/parsers/microsoft/parser_ctip.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@
139139
"Payload.port": "extra.payload.port",
140140
"Payload.serverIp": "extra.payload.server.ip",
141141
"Payload.serverPort": "extra.payload.server.port",
142-
"Payload.domain": "extra.payload.domain",
142+
"Payload.domain": "destination.fqdn",
143143
"Payload.family": "extra.payload.family",
144144
"Payload.malware": "extra.payload.malware",
145145
"Payload.response": "extra.payload.response",

intelmq/tests/bots/parsers/microsoft/test_parser_ctip_azure.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@
5252
"extra.payload.port" :65116,
5353
"extra.payload.server.ip": "198.18.185.162",
5454
"extra.payload.server.port": 80,
55-
"extra.payload.domain": "example.com",
55+
"destination.fqdn": "example.com",
5656
"extra.payload.family":"tinba",
5757
"extra.payload.response":"Response",
5858
"extra.payload.handler":"tinba",
@@ -129,7 +129,7 @@
129129
'event_description.text': 'Microsoft.DCU.CTIP.Sinkhole',
130130
'extra.custom_field1': 'andromeda210',
131131
'extra.malware': 'Avalanche',
132-
'extra.payload.domain': 'example.com',
132+
'destination.fqdn': 'example.com',
133133
'extra.payload.family': 'andromeda',
134134
'extra.payload.handler': 'handler1',
135135
'extra.payload.ip': '224.0.5.8',

0 commit comments

Comments
 (0)