Document toolboxDocument toolbox

threatintel.threatstream

Introduction

The tags beginning with threatintel.threatstream identify events generated by Anomali ThreatStream Threat Intelligence Management belonging to Anomali.

Valid tags and data tables 

The full tag must have at least 3 levels. The first two are fixed as threatintel.threatstream. The third level identifies the type of events sent and the rest of them indicate the event subtypes.

These are the valid tags and corresponding data tables that will receive the parsers' data:

Product / Service

Tags

Data tables

Product / Service

Tags

Data tables

Anomali ThreatStream Threat Intelligence Management

threatintel.threatstream.domain

threatintel.threatstream

threatintel.threatstream.email

threatintel.threatstream.domain

threatintel.threatstream.domain

threatintel.threatstream.email

threatintel.threatstream.email

threatintel.threatstream.ioccountbyhour

threatintel.threatstream.ioccountbyhour

threatintel.threatstream.ip

threatintel.threatstream.ip

threatintel.threatstream.itypes

threatintel.threatstream.itypes

threatintel.threatstream.md5

threatintel.threatstream.md5

threatintel.threatstream.severities

threatintel.threatstream.severities

threatintel.threatstream.string

threatintel.threatstream.string

threatintel.threatstream.url

threatintel.threatstream.url

For more information, read more About Devo tags.

Table structure

These are the fields displayed in these tables: