Loading

Cybersixgill Darkfeed TAXII Integration

<div class="condensed-table">
| | |
| --- | --- |
| Version | 1.32.0 (View all) |
| Compatible Kibana version(s) | 8.13.0 or higher |
| Supported Serverless project types
What’s this? | Security
Observability |
| Subscription level
What’s this? | Basic |
| Level of support
What’s this? | Elastic |

</div>
This integration connects with the commercial Cybersixgill Darkfeed TAXII server.

The Cybersixgill Darkfeed integration collects threat intelligence from the Darkfeed TAXII service available using the credentials provided from Cybersixgill.

The ingested IOCs are expired after the duration configured by IOC Expiration Duration integration setting. An Elastic Transform is created to faciliate only active IOCs be available to the end users. This transform creates destination indices named logs-ti_cybersixgill_latest.dest_threat-* which only contains active and unexpired IOCs. The latest destination index also has an alias named logs-ti_cybersixgill_latest.threat. When querying for active indicators or setting up indicator match rules, only use the latest destination indices or the alias to avoid false positives from expired IOCs. Dashboards are also pointing to the latest destination indices containing active IOC. Please read ILM Policy below which is added to avoid unbounded growth on source datastream .ds-logs-ti_cybersixgill.threat-* indices.

To facilitate IOC expiration, source datastream-backed indices .ds-logs-ti_cybersixgill.threat-* are allowed to contain duplicates from each polling interval. ILM policy logs-ti_cybersixgill.threat-default_policy is added to these source indices so it doesn’t lead to unbounded growth. This means data in these source indices will be deleted after 5 days from ingested date.