Add threat intelligence with a custom lookup file in Splunk Enterprise Security
You can add threat intelligence to Splunk Enterprise Security as a custom lookup file. A lookup-based threat source can add data to any of the supported threat intelligence types, such as file or IP intelligence. See Supported types of threat intelligence in Splunk Enterprise Security.
Prerequisite
- Identify whether the custom threat source is certificate, domain, email, file, HTTP, IP, process, registry, service, or user intelligence.
- Identify the headers for the CSV file that correspond to the type of threat intelligence that you want to add by reviewing the Supported types of threat intelligence in Splunk Enterprise Security.
Steps
Based on the type of intelligence you add to Splunk Enterprise Security and the required headers, create a CSV file.
- Create a
.csv
file with a header row with the required fields. - Add the threat data to the
.csv
file.
After you create the lookup file, you must add it to Splunk Enterprise Security.
- On the Splunk platform menu bar, select Settings > Lookups
- Next to Lookup table files, click Add New.
- Select a Destination App of SA-ThreatIntelligence.
- Upload the
.csv
file you created. - Type a Destination filename for the file. For example,
threatindicatorszerodayattack.csv
. - Save.
After adding the threat intel lookup to Enterprise Security, set appropriate permissions so Enterprise Security can use the file.
- Open Lookup table files.
- Find the lookup file that you added and select Permissions.
- Select All apps for the Object should appear in field.
- Select Read access for Everyone.
- Select Write access for admin.
- Save.
Define the lookup so that Splunk ES can import it and understand what type of intelligence you are adding.
- On the Splunk platform menu bar, select Settings > Lookups.
- Next to Lookup definitions, click Add New.
- Select a Destination App of SA-ThreatIntelligence.
- Type a name for the threat source. The name you enter here is used to define the threatlist in the input stanza. For example,
zero_day_attack_threat_indicators_list
. - Select a Type: of File based.
- Select the Lookup File: that you added in step one. For example,
threatindicatorszerodayattack.csv
. - Save.
Set permissions on the lookup definition so that the lookup functions properly.
- Open Lookup definitions
- Find the definition you added in step four and select Permissions.
- Set Object should appear in to All apps.
- Set Read access for Everyone.
- Set Write access for admin.
- Save.
Add a threat source input stanza that corresponds to the lookup file so that ES knows where to find the new threat intelligence.
- Select Configure > Data Enrichment > Threat Intelligence Downloads.
- Choose a threat source input that matches your new content. For example,
local_file_intel
. - Click Clone in the Actions column.
- Type a Name. The name cannot include spaces. For example, zero_day_attack_threat_indicators.
- Type a Type. For example, zero_day_IOCs
- Type a Description. For example, File-based threat indicators from zero day malware.
- Type a URL that references the lookup definition you created in step three.
lookup://zero_day_attack_threat_indicators_list
. - (Optional) Change the default Weight for the threat data.
- (Optional) Change the default Retry interval for the lookup.
Next step
To add another custom threat source, see Add threat intelligence to Splunk Enterprise Security and follow the link that matches the source that you want to add.
If you are finished adding threat intelligence sources, see Verify that you have added threat intelligence successfully in Splunk Enterprise Security.
Add and maintain threat intelligence locally in Splunk Enterprise Security | Verify that you have added threat intelligence successfully to Splunk Enterprise Security |
This documentation applies to the following versions of Splunk® Enterprise Security: 4.7.0, 4.7.1, 4.7.2, 4.7.3, 4.7.4, 4.7.5, 4.7.6
Feedback submitted, thanks!