Overview
UTMStack’s Threat Intelligence integration provides real-time access to threat feeds that enrich security alerts with global threat context. By correlating your organization’s security events with known indicators of compromise (IOCs), threat actor tactics, and emerging threats, you can make faster and more informed security decisions.The Enterprise version includes frequent threat intelligence updates with additional premium feeds and automated enrichment capabilities.
Key Capabilities
IOC Matching
Automatically match IPs, domains, file hashes, and URLs against global threat intelligence feeds.
Threat Context
Enrich alerts with threat actor attribution, campaign information, and attack methodologies.
Real-Time Updates
Continuously updated threat feeds ensure you’re protected against the latest threats.
Historical Analysis
Query historical threat data to understand long-term trends and emerging threat patterns.
Threat Intelligence Module
Access the Threat Intelligence interface at/threat-intelligence to:
- View recent threat intelligence updates
- Search for specific IOCs across all feeds
- Investigate threat actor profiles and campaigns
- Analyze threat trends over time
- Export threat data for sharing with partners
Supported Indicators
UTMStack correlates multiple indicator types:- IP Addresses: Known malicious IPs, C2 servers, proxy networks
- Domain Names: Malicious domains, phishing sites, DGA domains
- File Hashes: MD5, SHA1, SHA256 hashes of known malware
- URLs: Malicious URLs, exploit kits, phishing links
- Email Addresses: Known spam senders, phishing campaigns
Alert Enrichment
When an alert matches threat intelligence, it’s automatically enriched with:- Threat Classification: Malware family, threat type, attack category
- Severity Adjustment: Confirmed threats may increase alert severity
- Attribution: Known threat actor groups or campaigns
- References: Links to detailed threat reports and analysis
- First/Last Seen: When the indicator was first and last observed globally
Threat Activity Dashboard
The platform includes specialized dashboards for threat intelligence:- View threat activity correlated with your alerts
- Track trending threats affecting your organization
- Analyze geographic distribution of threat sources
- Monitor threat feed coverage and match rates
Integration with Detection
Threat intelligence enhances threat detection by:- Automatic Alert Generation: Create alerts when IOCs are detected in logs
- Reputation Scoring: Assign risk scores to IPs, domains, and files
- Watchlists: Monitor specific indicators of interest
- Correlation Rules: Use threat intel as conditions in custom rules
Feed Management
Configure and manage threat intelligence feeds:- Built-in Feeds: Pre-configured feeds from trusted sources
- Custom Feeds: Add your own threat intelligence sources
- Feed Prioritization: Configure which feeds take precedence
- Update Frequency: Control how often feeds are refreshed
Enterprise users receive more frequent updates and access to premium threat intelligence feeds with deeper context and faster indicator delivery.
Threat Hunting
Use threat intelligence proactively for threat hunting:- Search historical logs for past occurrences of newly discovered IOCs
- Identify potential compromises that pre-date indicator publication
- Build custom queries combining threat intel with log data
- Export findings for incident response activities
Best Practices
API Integration
Threat intelligence can be accessed via API for:- Enriching external security tools
- Automated threat hunting scripts
- Integration with ticketing systems
- Sharing IOCs with partners and MISPs
Enterprise Features
The Enterprise version adds:- Faster Updates: More frequent feed refreshes for emerging threats
- Premium Feeds: Access to commercial threat intelligence providers
- AI Enhancement: Machine learning models trained on threat intelligence
- Advanced Correlation: Deeper integration with correlation engine
Related Features
- Threat Detection: Use threat intel to enhance real-time detection
- Alert Investigation: Investigate alerts enriched with threat context
- SOC AI: AI-powered analysis leveraging threat intelligence
Technical Implementation
References:- Threat Intelligence Module:
frontend/src/app/threatwind/ - Threat Intelligence Route:
frontend/src/app/app-routing.module.ts:144 - Threat Activity Templates:
backend/src/main/resources/templates/reports/customs/threatActivityForAlerts.html