Bootstrap Your Threat Intel Management Program With Free Feeds and IOC Enrichers

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Community Team Member

Title_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.jpg

 

Blog written by Dror Avrahami

 

Getting your threat intel management (TIM) program up and running might seem like a daunting task. Picking the right feeds and enrichers can be challenging as there are many different options and flavors to choose from, and these subscriptions sometimes come with a hefty price tag.

 

So, we have made it easier for our Cortex XSOAR customers to find and install integrations that do not require a subscription and in some cases might not even require registration upfront. We have known and used most of these feeds for a long time now and we have found them as a good stepping stone to get any TIM going.

 

To make it easier for you to discover and take advantage of these free feeds and enrichers, we’ve added four new tags to our out-of-the-box feed integrations in the Cortex Marketplace:

 

1. Plug & Fetch - This tag was created for feeds that are free and which do not require any credentials or registration. As using a Plug & Fetch integration does not require any registration or credentials all you need to do is set up an instance for it in Cortex XSOAR TIM and let the pack run. A good example of  such a feed is LOLBAS, which does not require any credentials whatsoever.

 

Fig 1_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

To find all of the Plug & Fetch feeds available for XSOAR you can simply use the “Plug & Fetch” tag in the Cortex Marketplace search filters:

 

Fig 2_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

2. Free Feeds - The Free Feed tag is used for feeds that do not require a subscription but do require the user to register in order to obtain the credentials needed to ingest the feed. A good example for such a feed would be the National Vulnerability Database (NVD).

 

Fig 3_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

As before, you can use the Free Feed” tag.

 

Fig 4_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

3. Generic Feeds - The Generic Feed integrations are used when XSOAR does not have a pre-built integration for a specific feed. As most feeds usually use common data formats such as TAXII, JSON, CSV, etc, the user can use these Generic Feed integrations to fetch the data without building a custom integration from scratch. These can also aid as a skeleton structure for building an integration for a feed using these common frameworks.

 

Fig 5_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

An easy setup for an RSS based feed:

 

Fig 6_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

4. Allow lists (previously known as whitelists) - Unlike other feeds that are meant to provide us with indicators for blocking and keeping our environment safe, these are meant to help us keep it organized and to prevent inadvertent lockouts to applications or services used by the organization. The Allow list” tag feeds include assets from well known companies such as AWS, Azure, Cisco, Google, Cloudflare, etc.

 

Fig 7_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

These feeds are almost always Plug & Fetch but as they are different in nature, we decided to give them a distinctive tag to enhance searchability.

 

To make life even easier for our users, we have also created a new XSOAR pack called “Free Feeds. This new pack has all the data presented above and lists all the available new feeds within XSOAR, and any optional dependencies, in one single location. We will update this pack with every new free feed that is added to XSOAR.

 

Fig 8_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

Fig 9_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

 

Just like with feeds we have also added two new tags to indicators of compromise (IOC) enrichers within XSOAR:

 

5. Plug & Enrich - like the Plug & Fetch tag this new tag lists any integration within XSOAR that allows the user to enrich IOCs without prior registration. These integrations can be set up in little time to provide rich context to your incident investigations at no additional cost.

 

Fig 10_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

A good example of a Plug & Enrich integration is Team Cymru which provides data about IP addresses:

 

Fig 11_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

6. Free Enricher - Like “Free Feed” this tag is there to inform you that the enricher is free to use (or have a free \ community tier) but it does require the user to register in order to acquire some sort of credentials to access the data. The “Free Enricher” tag also includes within it all of the Plug & Enrich integrations.

 

Fig 12_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

A nice example of such an enricher is AbuseIPDB which requires an API key in order to install an instance in XSOAR.

 

Fig 13_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

Just like with our Free Feeds we also created a new XSOAR pack called “Free Enrichers” which lists all of the free enrichers available in the Marketplace and provides details about the tags used to define them.

 

Fig 14_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

Fig 15_Bootstrap-Your-Threat-Intel-Management-Program_palo-alto-networks.png

 

 

These content packs, as well as hundreds of other packs covering a myriad of incident types and use cases can be discovered in the Cortex Marketplace. In order to run these packs, you will need an instance of Cortex XSOAR. You can obtain a free Community Edition here.

 

Read about how you can transform your Threat Intel Management with XSOAR.

  • 3045 Views
  • 0 comments
  • 0 Likes
Register or Sign-in
Labels