How It Works
- The
ReportAgentanonymizes the threat data (IP /16 masking, no hostnames, no file contents) - Anonymized IoCs are submitted to Threat Cloud
- Threat Cloud validates, correlates, and stores the data
- Other agents query Threat Cloud during their detection pipeline and benefit from the collective intelligence
Key Capabilities
| Capability | Details |
|---|---|
| IoC store | IP addresses, domains, file hashes, URLs |
| Correlation engine | Cross-source correlation of related indicators |
| Campaign tracking | Group related IoCs into attack campaigns |
| Feed distribution | IP and domain blocklists pushed to agents |
| Sighting store | Track how many agents have seen each indicator |
| Reputation engine | Confidence scoring based on sighting frequency and source diversity |
| Sigma rule sharing | Community-contributed detection rules |
| Audit logging | Full audit trail of all submissions and queries |
| RESTful API | Query and submit threat intelligence programmatically |
Quick Start
Using Public Threat Cloud (Default)
No configuration needed. Guard automatically connects to the public Threat Cloud when started:Deploying a Private Instance
Enterprises can deploy their own Threat Cloud server:IoC Types
| Type | Example | Description |
|---|---|---|
| IP Address | 203.0.113.50 | Known malicious source or C2 server |
| Domain | evil.example.com | Malicious domain or phishing site |
| File Hash | sha256:abc123... | Known malware signature |
| URL | http://evil.example.com/payload | Malware distribution URL |
Campaign Tracking
Related IoCs are grouped into campaigns for contextual analysis:Guard Integration
The GuardDetectAgent queries Threat Cloud during event processing:
- Extract indicators from the security event (source IP, destination domain, file hash)
- Query Threat Cloud for matches
- If matched, the indicator’s confidence score contributes to the
AnalyzeAgent’s weighted verdict - Threat intel matches have a fixed confidence contribution of 85
API Endpoints
| Method | Endpoint | Description |
|---|---|---|
POST | /api/v1/ioc | Submit a new IoC |
GET | /api/v1/ioc | Query a single IoC by type and value |
POST | /api/v1/ioc/batch | Batch query multiple indicators |
GET | /api/v1/ioc/recent | Get recently reported IoCs |
GET | /api/v1/health | Health check |
GET | /api/v1/campaigns/:id | Get campaign details |
GET | /api/v1/feeds/status | Check feed sync status |
GET | /api/v1/stats | Aggregate statistics |
Feed Sources
Threat Cloud syncs with 5 external threat intelligence feeds:| Feed | Data Type |
|---|---|
| ThreatFox (abuse.ch) | Malware, C2, botnet IoCs |
| URLhaus (abuse.ch) | Malware distribution URLs |
| Feodo Tracker (abuse.ch) | Botnet C2 server IPs |
| GreyNoise | Mass scanning and internet noise IPs |
| AbuseIPDB | Community-reported malicious IPs |