Threat Intelligence Feeds

Overview

Logpresso provides Cyber Threat Intelligence (CTI) services through Logpresso CTI to help organizations effectively respond to the latest and known threats. These services collect, analyze, and share various up-to-date threat information, enabling organizations to quickly identify and respond to cyber threats.

Logpresso CTI

Installing Logpresso Sonar provides a list of Logpresso CTI feeds.

NameSTR_FEED*TypeDescription
Logpresso CTI IPlogpresso_cti_ipIPMalicious IP addresses related to cyber attacks
Logpresso CTI Domainlogpresso_cti_domainDOMAINMalicious domains such as malware distribution sites and C&C servers
Logpresso CTI URLlogpresso_cti_urlURLIndicators of compromise (IoCs) for malicious URLs
Logpresso CTI MD5logpresso_cti_md5MD5MD5 hash-based indicators of compromise
Logpresso CTI SHA1logpresso_cti_sha1SHA1SHA1 hash-based indicators of compromise
Logpresso CTI SHA256logpresso_cti_sha256SHA256SHA256 hash-based indicators of compromise

* For STR_FEED, refer to the name=STR_FEED option in the matchfeed command.

To utilize Logpresso CTI::

  1. A subscription is required. Paid subscribers receive real-time feeds, while free subscribers have access to feeds with a 90-day delay.
  2. Configure network security policies to allow Logpresso Sonar to connect to the Logpresso CTI service. Apps that provide CTI services also require network access to their respective service providers.
  3. Configure a connection profile for the Logpresso CTI server within the Logpresso platform. See Connection Profile for details.
CTI Provided by Apps

Apps such as S2W Quaxar from the Logpresso Store provide threat intelligence. After installing the app, you can access its CTI feeds from the Threat Intelligence list. Check with the CTI service provider regarding subscription requirements.

Search Threat Intelligence Feed

Navigate to Policies > Threat Intelligence to view and search for the latest threat intelligence feeds.

Threat intelligence feeds

  • Enabled: Toggle to enable or disable a threat intelligence feed (Enabled: On, Disabled: Off)
  • Type: Type of threat intelligence provided
    • IP: Malicious IP addresses used for identifying attack sources or command-and-control servers.
    • DOMAIN: Malicious domains associated with phishing sites and malware distribution
    • MD5, SHA1, SHA256: Hash values for verifying file integrity and identifying malware
    • URL: Malicious web URLs used in malware distribution or phishing attempts
    • EMAIL: Compromised email addresses
  • Name: Name of the CTI feed
  • Description: Description of the CTI feed
  • Modified At: Last update date

Use the search tool in the toolbar to find specific threat intelligence feeds. The search function matches the entered keyword against the Name field and is case-insensitive.

Download Threat Intelligence Feed List

To download the list of threat intelligence feeds to your local PC, click Download in the toolbar and select the desired file format.

Refresh Threat Intelligence Feed List

To view the latest threat intelligence data, click Refresh in the toolbar.

Utilizing Threat Intelligence

Threat intelligence feeds can be used in the following ways:

Scenario Builder

When adding or modifying detection rules in Policies > Stream Rules, use the Scenario Builder to integrate threat intelligence.

Below is a summary of threat intelligence feed by input field type. See Rules and Parameters by Field Type for more details.

IP

RuleParameterRangeDescription
IP address is in reputation DBReputation DBSelect CTI feedFilters field values that match the specified reputation DB
IP address is in any reputation DB--Filters field values that appear in any threat intelligence feed

MD5/SHA1/SHA256

RuleParameterRangeDescription
Matches specific hash valueHashUp to 255 charactersFilters field values matching the specified hash
Included in any reputation DB--Filters field values that appear in any threat intelligence feed
Included in specific reputation DBReputation DBSelect CTI feedFilters field values that match the specified reputation DB

URL

RuleParameterRangeDescription
URL is in any reputation DB--Filters field values that appear in any reputation DB
URL is in specific reputation DBReputation DBSelect CTI feedFilters field values that match the specified reputation DB

DOMAIN

RuleParameterRangeDescription
Domain is in any reputation DB--Filters field values that appear in any reputation DB
Domain is in specific reputation DBReputation DBSelect CTI feedFilters field values that match the specified reputation DB
Query

When adding or modifying detection rules in Policies > Stream Rules or Policies > Batch Rules, you can use the matchfeed command or matchfeed() function to integrate threat intelligence. Threat intelligence feeds can also be utilized anywhere supports query input.