Home

> Managing Resources > Malware IPs > Importing Malware IPs

Importing Malware IPs

You can import Malware IP information into FortiSIEM from external threat feed websites.

Prerequisites

Before proceeding gather the following information about a threat feed web site:

  • Website URL
  • Credentials required to access the website (optional)
  • If the website is not supported by FortiSIEM, you may need to understand the format of the data returned by the URL.
    • If the data is in the comma separated value format (the separator need not be a comma but could be any separator, then a simple integration is possible.
    • If the data is any other format, for example - XML, then some code needs to be written for integration using the FortiSIEM provided framework.

Websites with built in support

The following websites are supported:

For Threat Stream Malware IP, the following Malware types are imported:

  • Bot IP
  • Actor IP
  • APT Email
  • APT IP
  • Bruteforce IP
  • Compromised IP
  • Malware IP
  • DDoS IP
  • Phishing email IP
  • Phish URL IP
  • Scan IP
  • Spam IP

To import data from these websites, follow these steps:

  1. In the RESOURCES > Malware IPs, find the website you need to import data from.  
  2. Select the folder.
  3. Click More > Update.
  4. Select Update via API. The link will show in the edit box.
  5. Enter a Schedule by clicking the + icon.
  6. Enter the schedule parameters - when to start and how often to import. FortiSIEM recommends no more frequent than hourly.
  7. Select the type of template you want to create.

Custom threat feed websites - CSV data - one-time manual import

This requires that the data to be imported is already in a file in comma separated value format. The required format is:

Name, Low IP, High IP, Malware Type, Confidence, Severity, ASN, Org, Country ,Description,Data Found(MM/DD/YYYY),Last Seen(MM/DD/YYYY) 

Although many fields are possible, only Low IP is required. If High IP is not provided, then it is set to Low IP.

  1. Select RESOURCES>Malware IPs.
  2. Click on the "+" button on the left navigation tree to bring up the Create New Malware IP Group dialog.
  3. Enter Group and add Description. Click Save to create the folder under Malware IPs.
  4. Select the folder just created.
  5. Select Import from a CSV file.
  6. Click Choose File; enter the file name and click Upload.
    The imported data will show on the right pane.

Custom threat feed websites - CSV data - programmatic import

This requires that the web site data is:

  • file in comma separated value format (separator can be any special character such as space, tab, hash, dollar etc.)
  • one entry is in one line.

Although many fields are possible, only Low IP is required. If High IP is not provided, then it is set to Low IP.

Follow these steps:

  1. Select RESOURCES > Malware IPs.
  2. Click the + button on the left navigation tree to open the Create New Malware IP Group dialog.
  3. Enter Group and add Description. Click Save to create the folder under Malware IPs.
  4. Select the folder just created.
  5. Select More > Update > Update via API.
  6. Click the edit icon and:
    1. Enter the URL of the website.
    2. Enter User Name and Password (optional).
    3. For Plugin Class, the default class 'com.accelops.service.threatfeed.impl.ThreatFeedWithMappingPolicyService' is shown.
      Note:
      Do not modify this in any case.
    4. Enter the correct Field Separator (by default it is a comma).
    5. Select CSV as the Data Format.
    6. Enter the Data Mapping by choosing the mapped field and the corresponding position in the website data. For example, if the IP is in third position, then choose 3 in the Position column.
    7. Click Save.
  7. Select an import schedule by clicking + on the Schedule. Select when to start the import and how often to import to get new data from the website.
    The imported data will show on the right pane after some time.

Custom threat feed websites - non-CSV data - programmatic import

This is the most general case where the website data format does not satisfy the previous conditions. In this case, write a Java plug-in class by modifying the default system provided one.

After the class has been written and fully tested for correctness, follow these steps.

  1. Select RESOURCES > Malware IPs.
  2. Click on the "+" button on the left navigation tree to bring up the Create New Malware IP Group dialog.
  3. Enter Group and add Description.
  4. Click Save to create the folder under Malware IPs.
  5. Select the folder just created.
  6. Select More > Update > Update via API
  7. Click the edit icon and:
    1. Enter the URL of the website.
    2. Enter User Name and Password (optional).
    3. For Plugin Class, the custom Java class for this case.
    4. Select 'Custom' as the Data Format.
    5. Click Save.
  8. Select an import schedule by clicking + on the Schedule. Select when to start the import and how often to import to get new data from the website.
    The imported data will show on the right pane after some time.

Custom threat feed websites - STIX formatted data and TAXII import

In this case, the threat feed data is available formatted as STIX and follows the TAXII protocol.

  1. Select RESOURCES >Malware IPs.
  2. Click on the "+" button on the left navigation tree to bring up the Create New Malware IP Group dialog.
  3. Enter Group and add Description. Click Save to create the folder under Malware IPs.
  4. Select the folder just created.
  5. Select More > Update > Update via API
  6. Click the edit icon and:
    1. Enter the URL of the website.
    2. Enter User Name and Password (optional)
    3. Select 'STIX-TAXII' as the Data Format.
    4. For Plugin Class, choose 'com.accelops.service.threatfeed.impl.StixMalwareIPUpdateService' and 'Full'.
    5. Click Save.
  7. Select a import schedule by clicking + on the Schedule. Select when to start the import and how often to import to get new data from the website.
    The imported data will show on the right pane after some time.