You are viewing an old version of this page. View the current version.
Compare with Current
View Page History
Version 1
Current »
Introduction
The tags beginning with threatintel.threatstream
identify events generated by Anomali ThreatStream Threat Intelligence Management belonging to Anomali.
The full tag must have at least 3 levels. The first two are fixed as threatintel.threatstream
. The third level identifies the type of events sent and the rest of them indicate the event subtypes.
These are the valid tags and corresponding data tables that will receive the parsers' data:
Product / Service | Tags | Data tables |
---|
Anomali ThreatStream Threat Intelligence Management | threatintel.threatstream.domain
| threatintel.threatstream
|
threatintel.threatstream.email
|
threatintel.threatstream.domain
| threatintel.threatstream.domain
|
threatintel.threatstream.email
| threatintel.threatstream.email
|
threatintel.threatstream.ioccountbyhour
| threatintel.threatstream.ioccountbyhour
|
threatintel.threatstream.ip
| threatintel.threatstream.ip
|
threatintel.threatstream.itypes
| threatintel.threatstream.itypes
|
threatintel.threatstream.md5
| threatintel.threatstream.md5
|
threatintel.threatstream.severities
| threatintel.threatstream.severities
|
threatintel.threatstream.string
| threatintel.threatstream.string
|
threatintel.threatstream.url
| threatintel.threatstream.url
|
For more information, read more About Devo tags.
Table structure
These are the fields displayed in these tables: