Skip to main content

Feed Reference

Reference details for analysts who want to know what they're looking at in MISP.

Common Wire Shape

Every event in every feed carries the same baseline:

FieldValue
Source organisation (Orgc)ELLIO
Distribution0 - Your organisation only
TLPtlp:amber+strict
Producer tagmisp-galaxy:producer="ELLIO"
Source tagellio:source="deception-network"
Decay tagellio:decay-model="ellio-deception-90d"
Classification tagellio:classification="..." - one of malicious, promiscuous, benign, unknown

Threat level mirrors the worst kill-chain phase observed for the IP:

Threat levelKill-chain phases
HighExploitation, Installation, C2, Actions on Objectives
MediumDelivery
LowReconnaissance, Weaponisation

Daily Sightings - /daily/

One MISP event per calendar day in the rolling window. Event titles follow the pattern ELLIO Intelligence Sightings YYYY-MM-DD. Each active IP appears as a flat ip-src attribute on that day's event, carrying its day-specific tags (kill-chain phase, MITRE ATT&CK techniques, ellio:tag="...", classification).

Daily-sightings event list in MISP, showing the per-day events with ELLIO baseline tags

  • Sort order. Attributes are sorted by classification severity descending (malicious → promiscuous → benign → unknown), then by IP, so the most actionable indicators appear first in the UI.
  • Analysis status. Today's event is Ongoing; past days show as Completed.
  • Aging. Every event carries the ellio:decay-model="ellio-deception-90d" tag pointing at ELLIO's recommended 90-day curve. Configure a matching MISP decay model on your side and aging indicators score down - see the decay model page for parameters and the associated_types caveat.

When to use it: SIEM queries that ask "which IPs were active on YYYY-MM-DD", daily reporting, retrospective hunting against historical days.

Detailed view of a single daily-sightings event in MISP, with ip-src attributes sorted by classification

Per-IP Rolling - /per-ip/

One event per source IP that has had at least one full TCP handshake in the rolling window. Spoofable IPs (no full handshake on any day in the window) are excluded. Event titles follow the pattern ELLIO Intelligence <IP>.

Per-IP event list in MISP, with each event tagged by classification, kill-chain phase, and ellio values

Each event carries a cross-day timeline of every observable signal attached to that IP. The time anchor varies by attribute type:

AttributeTime anchor
ip-srcEvent window (full 90 days observed for this IP)
AS, country-of-residence, hostname (rDNS)Last observed day - these can change inside the window via BGP, geo, or PTR updates
vulnerability (CVE)Every day the IP was actively observed
uri, user-agent, fingerprints (ja3, jarm, ja4 base)Per-attribute first_seen / last_seen
link (ELLIO platform backlink)Event window
ip-port Object (port + status)Per-port first_seen / last_seen
muonfp ObjectPer-fingerprint first_seen / last_seen. Lets MISP correlate IPs that share fingerprint components.
  • MITRE ATT&CK ships as misp-galaxy:mitre-attack-pattern="..." tags on the relevant attributes. MISP resolves those tags into Attack Pattern clusters in the UI when the misp-galaxy collection is installed (it is on every default MISP).
  • Aging. Every event carries the ellio:decay-model="ellio-deception-90d" tag pointing at ELLIO's recommended 90-day curve. Configure a matching MISP decay model on your side and aging indicators score down - see the decay model page for parameters and the associated_types caveat.
  • Includes basic JA4 (ja4) and the free non-JA4 fingerprints (ja3, jarm, muonfp). FoxIO-licensed JA4+ extensions ship in the JA4+ feed only.

When to use it: IOC correlation, pivoting from a single IP to its full behaviour, threat hunting, automated blocking decisions.

Detailed view of a per-IP event in MISP with the cross-day attribute timeline expanded

Per-IP Rolling with JA4+ - /per-ip-ja4plus/

Identical to the per-IP rolling feed plus the FoxIO-licensed JA4+ Object family - ja4s, ja4h, ja4l, ja4x, ja4ssh, ja4t, ja4ts, ja4tscan.

  • Same event shape and time-anchor semantics as /per-ip/.
  • Each JA4+ fingerprint ships as a typed MISP Object so MISP correlation works out of the box.
  • Subscribing requires a FoxIO JA4+ licence. Without one, subscribe to /per-ip/ instead - you can swap later without losing data.

When to use it: high-fidelity client/server fingerprint correlation, attacker-tooling attribution, JA4-driven hunt rules.