Skip to content

Threat Intelligence Feed Collection

Overview

KYRA MDR integrates with leading threat intelligence feeds to automatically collect Indicators of Compromise (IOCs) — malicious IPs, domains, file hashes, URLs, and email addresses. These indicators are continuously correlated against your environment’s security events to detect known threats in real time.

The TI collection system operates on a scheduler-driven model: each feed is independently configured with its own sync interval, API credentials, and status tracking. The platform checks every 5 minutes for feeds that are due for synchronization and fetches new indicators automatically.


Supported Feed Types

Core Feeds (API key required)

FeedDescriptionIOC TypesFree Tier
AlienVault OTXOpen Threat Exchange — community-driven IOC sharingIP, domain, hash, URL, CVEFree
AbuseIPDBIP abuse reporting and blacklistIP addresses1,000 checks/day
VirusTotalMulti-engine malware analysisFile hashes, URLs, domains, IPs500 req/day
GreyNoiseIP noise classification (scanners vs targeted)IP addressesCommunity tier

abuse.ch Ecosystem (free, no API key required)

FeedDescriptionIOC Types
URLhausMalware distribution URL trackingURLs
ThreatFoxCommunity IOC sharing linked to malware familiesIPs, domains, URLs, hashes
Feodo TrackerBotnet C2 server tracking (Emotet, Dridex, QakBot)IP addresses, ports
MalwareBazaarMalware sample hash repositoryFile hashes (MD5, SHA-256)
SSL BlacklistMalicious SSL certificate fingerprintsSSL/JA3 fingerprints

IP / Domain Reputation (free, open data)

FeedDescriptionIOC Types
Emerging Threats OpenIDS rules and IP blocklistsIP addresses
Spamhaus DROPDon’t Route Or Peer — critical IP blocklistIP/CIDR ranges
DShield / SANS ISCTop attacking IPs from global sensor networkIP addresses

Phishing Feeds

FeedDescriptionIOC Types
PhishTankCommunity-verified phishing URLsURLs
OpenPhishML-detected phishing URLsURLs

Vulnerability Intelligence

FeedDescriptionIOC Types
CISA KEVKnown Exploited Vulnerabilities catalogCVE IDs

Community Platforms

FeedDescriptionIOC Types
MISPMalware Information Sharing Platform (self-hosted or community instances)All IOC types

Custom Feeds

FeedDescriptionFormat
Custom STIXAny STIX 2.1 JSON feed URLSTIX 2.1 bundles
Custom CSVAny CSV-formatted indicator feedCSV with headers

How It Works

flowchart LR
    FEEDS[External Feeds] -->|API calls| SCHEDULER[Feed Scheduler]
    SCHEDULER -->|Every 5 min check| SYNC[Sync Engine]
    SYNC -->|Parse & validate| UPSERT[IOC Database]
    UPSERT -->|Correlate| ALERTS[Alert Engine]
    ALERTS -->|Enriched alerts| CONSOLE[Management Console]

Collection Flow

  1. Configuration — Analysts configure feeds via the Management Console (Threat Intelligence → Feeds tab), providing feed type, API key, and sync interval.

  2. Scheduling — The feed scheduler runs every 5 minutes and checks each enabled feed’s last sync time + interval. Only feeds that are due are synced.

  3. Ingestion — For each due feed, the sync engine:

    • Calls the feed’s API with the configured credentials
    • Parses the response (JSON, STIX 2.1, or CSV format)
    • Validates each indicator (IPv4 format, domain format, hash length, etc.)
    • Upserts indicators into the tenant-scoped IOC database
  4. Enrichment — Collected IOCs are automatically used to:

    • Enrich alerts with threat context (severity, confidence, tags)
    • Correlate against incoming log events for IOC-based detection
    • Provide on-demand lookup results in the Management Console
  5. Lifecycle — Each indicator has a validity window (validFrom / validUntil). Expired indicators are automatically cleaned up daily at 3:00 AM.


Feed Management

Adding a Feed

Navigate to Threat Intelligence → Feeds tab and click Add Feed:

FieldDescription
Feed NameDisplay name for the feed (e.g., “AlienVault OTX”)
Feed TypeSelect from supported types (OTX, AbuseIPDB, VirusTotal, MISP, Custom STIX, Custom CSV)
Feed URLRequired for custom feeds; auto-configured for built-in types
API KeyAuthentication key for the feed provider
Sync IntervalHow often to fetch new data (15 min, 30 min, 1 hr, 6 hr, 12 hr, 24 hr)
EnabledToggle to activate/deactivate the feed

Feed Status

Each feed displays a real-time status:

StatusMeaning
Active (green)Feed is enabled and last sync was successful
Syncing (yellow)Sync is currently in progress
Error (red)Last sync failed — check error details on the feed card
Inactive (gray)Feed is disabled

API Key Security

  • API keys are never exposed in API responses or the UI
  • The console shows only a masked hint (e.g., ****abcd)
  • Keys are stored server-side and transmitted only during feed sync calls
  • Each feed’s credentials are scoped to the tenant

Indicator Types

The platform processes and stores the following indicator types:

TypeExampleValidation
IPv4185.220.101.34Standard dotted quad notation
Domainlogin-microsoftonline.tkRFC-compliant domain names
Hash (MD5)d41d8cd98f00b204e9800998ecf8427e32 hexadecimal characters
Hash (SHA-256)a1b2c3d4e5f6... (64 chars)64 hexadecimal characters
URLhttps://malware.example.com/payloadFull URL with scheme
Emailphishing@evil.example.comEmail address format
CVECVE-2024-3400CVE-YYYY-NNNN+ format

Sync Intervals & Recommendations

FeedRecommended IntervalRationale
OTX1 hourSubscribed pulses update frequently
AbuseIPDB6 hoursBlacklist updates moderately
VirusTotal6 hoursRate limits on free tier
URLhaus / ThreatFox1 hourHigh-frequency community submissions
Feodo Tracker6 hoursC2 infrastructure changes moderately
MalwareBazaar6 hoursNew samples submitted daily
SSL Blacklist12 hoursCertificate lists update less frequently
Emerging Threats12 hoursIP lists updated periodically
Spamhaus DROP24 hoursDROP list is fairly stable
DShield6 hoursTop attackers shift throughout the day
PhishTank / OpenPhish6 hoursPhishing URLs have short lifespan
CISA KEV24 hoursUpdated as new exploits are confirmed
GreyNoise6 hoursScanner classifications change daily
MISP1 hourEvent feeds can be high-volume
Custom STIX/CSVDepends on sourceMatch the source’s update frequency

Note: The scheduler checks every 5 minutes, so the actual sync time may be up to 5 minutes after the interval expires.


IOC Statistics

The Threat Intelligence page provides real-time statistics:

  • Total IOCs — Number of active (non-expired) indicators
  • Critical Indicators — Count of critical-severity IOCs
  • Active Feeds — Number of enabled and healthy feeds
  • Average Confidence — Mean confidence score across all indicators

Per-feed statistics are shown on each feed card:

  • IOC Count — Total indicators collected from this feed
  • Last Sync — When the feed was last synchronized
  • Interval — Configured sync frequency

Caching & Performance

  • In-memory lookup cache with configurable TTL (default: 60 minutes)
  • Cache holds up to 50,000 entries with automatic eviction
  • Cache is cleared after every feed sync to ensure freshness
  • Expired cache entries are evicted every 15 minutes

Permissions

ActionRequired Permission
View feeds and IOCsthreat_intel:read
Add/edit/delete feedsthreat_intel:write
Trigger manual syncthreat_intel:write
Add manual IOCsthreat_intel:write

All data is tenant-isolated — each tenant’s feeds and IOCs are completely separate.


Getting Started

  1. Navigate to Threat Intelligence in the sidebar
  2. Click the Feeds tab
  3. Select a feed (e.g., AlienVault OTX) and click Edit
  4. Enter your API key and set the desired sync interval
  5. Toggle Enabled and save
  6. Click Sync Now to trigger the first collection
  7. Switch to the Indicators tab to see collected IOCs