Skip to main content

Create a Custom Threat Intelligence Source

This topic has information about setting up a custom threat intelligence source in Cloud SIEM, which is a threat intelligence list that you can populate manually, as opposed to using an automatic feed. 

You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, domains, URLs, email addresses, and file hashes.

How Cloud SIEM uses indicators

When Cloud SIEM encounters an indicator from your threat source in an incoming record it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way.

Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see Threat Intelligence in the About Cloud SIEM Rules topic.

Create a threat intelligence source from Cloud SIEM UI

  1. Classic UI. In the top menu select Content > Threat Intelligence.
    New UI. In the main Sumo Logic menu, select Cloud SIEM > Threat Intelligence. You can also click the Go To... menu at the top of the screen and select Threat Intelligence.
  2. Click Add Source on the Threat Intelligence page.
  3. In the Custom box click Create.
  4. On the Add New Source popup, enter a name, and if desired, a description for the source.
  5. Click Add Custom Source.

Your new source should now appear on the Threat Intelligence page.

Add threat indicators

Enter indicators manually

  1. On the Threat Intelligence page, click the name of the source you want to update.
  2. The Details page lists any indicators that have previously been added and have not expired. Click Add Indicator.
  3. On the New Threat Intelligence Indicator popup.
    1. Value. Enter one of the following:
      • Domain (valid domain name without protocol or path)
      • Email (valid email address)
      • File hash (hexadecimal string of 32, 40, 64, or 128 characters)
      • IP (valid IPV4 or IPv6 address)  
      • URL (valid, complete URL)
      note

      For the fields the value will be compared to, see Target fields for threat indicators below.

    2. Description. (Optional)
    3. Expiration. (Optional) If desired, you can specify an expiration date and time for the indicator. When that time is reached, the indicator will be removed from the source. When you click in the field, you’ll be prompted to select a date and time.
    4. Click Add.

Upload a file of indicators 

If you have a large number of indicators to add to your source, you can save time by creating a .csv file and uploading it to Cloud SIEM.

Create a CSV file

The .csv file can contain up to four columns, which are described below. 

ColumnDescription
valueRequired. Must be one of the following:
- Domain (valid domain name without protocol or path)
- Email (valid email address)
- File hash (hexadecimal string of 32, 40, 64, or 128 characters)
- IP (valid IPV4 or IPv6 address)
- URL (valid, complete URL)
For the fields the value will be compared to, see Target fields for threat indicators below.
descriptionOptional.
expiresOptional. The data and time when you want the indicator to be removed, in any ISO date format.
activeRequired. Specifies whether the indicator actively looks for threat intelligence in records. Valid values are true or false.

Example .csv file

value,description,expires,active
22.333.22.252,Tante Intel,2022-06-01 01:00 PM,true

Upload the file

  1. On the Threat Intelligence page, click the name of the target custom source.
  2. Click Import Indicators.
  3. On the import popup:
    1. Drag your file onto the import popup, or click to navigate to the file, and then click Import.
    2. Optionally, you can enter an expiration for the indicators on the list. If you do, it will override any expirations that are defined in the file. Enter the expiration in any ISO date format. For example: 2022-12-31

Manage sources and indicators using APIs

You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see Cloud SIEM APIs.

Target fields for threat indicators

Following are the fields that threat indicators are compared to.

  • Domain:
    • bro_ntlm_domainname
    • bro_ssl_serverName_rootDomain
    • dns_queryDomain
    • dns_replyDomain
    • fromUser_authDomain
    • http_referrerDomain
    • http_url_rootDomain
    • http_url_fqdn
  • Email:
    • email_sender
    • fromUser_email
    • fromUser_email_raw
    • targetUser_email
    • targetUser_email_raw
    • user_email
    • user_email_raw
  • File hash:
    • file_hash_imphash
    • file_hash_md5
    • file_hash_pehash
    • file_hash_sha1
    • file_hash_sha256
    • file_hash_ssdeep
  • IP:
    • bro_dhcp_assignedIp
    • bro_radius_remoteIp
    • bro_smtp_headers.xOriginatingIp
    • bro_socks_boundIp
    • bro_socks_requestIp
    • device_ip
    • device_natIp
    • dns_replyIp
    • dstDevice_ip
    • dstDevice_natIp
    • srcDevice_ip
    • srcDevice_natIp
  • URL:
    • http_url

Search indicators

To search threat indicators, click the Search All Indicators button at the top of the Threat Intelligence page.

You can search using the same functionality available for other Cloud SIEM searches, including regular expressions. For more information, see Filter and Search Cloud SIEM List Pages.

Status
Legal
Privacy Statement
Terms of Use

Copyright © 2025 by Sumo Logic, Inc.