All Posts
Cyber Threat Intelligence
SIEM
Splunk
Threat Intelligence Platform
ThreatStream
Anomali
1
min read

Generating Your Own Threat Intelligence Feeds in ThreatStream

Recently we launched a feature that allows you to create your own threat intelligence feeds in CSV, JSON and STIX format. They're super simple to setup...
Published on
February 14, 2018
Table of Contents

Getting threat intelligence into your existing security products - SIEMs, endpoints, network tools -- can significantly enhance their effectiveness and longevity. Here at Anomali we understand the value of product integrations, so much so that my entire job is to manage the 30+ we currently offer.

Recently we launched a feature that allows you to create your own threat intelligence feeds in CSV, JSON and STIX format for consumption by other products. They're super simple to setup...

Step One: Create a Saved Search

Use ThreatStream's search functionality to define the type of indicators you want to include in your feed. I used the search:

(itype="mal_domain") and (status="active") and (confidence>=95)

Translated into English; only include malware domain indicators type that are currently reported as active with a very high confidence score of 95 assigned by ThreatStream.

Once the constraints meet the requirements for your feed, select "save as" to convert it into a saved search you can use across ThreatStream.

Step Two: Create a Custom Integration

In ThreatStream navigate to: Settings > Integrations > New Integration

The pop-up modal will allow you to configure the settings for your feed including:

  • The search filter (set in step one)
  • The feed format (JSON, CSV or STIX)
  • The fields to be included in the feed (35 available to select)

Once you hit save, ThreatStream will create a custom URL for your feed.

Step Three: Add Your Feed to Your Existing Products

You can now use the URL generated in step two as a feed source to any products that can ingest threat feeds in the configured format.

The feed is updated on a set schedule. If you're asked for a polling interval make sure to set it equal to this schedule so you're not making more requests than necessary.

My Product Does Not Support CSV, JSON or STIX Inputs

There are currently 30+ native integrations supported by ThreatStream -- Splunk, QRadar, Arcsight, Carbon Black, Palo Alto Networks.

Trying to do integrate with a product that's a little more niche? Get in touch with our partnership team to explore a potential integration.

FEATURED RESOURCES

February 2, 2026
Threat Intelligence Platform
Cyber Threat Intelligence

In an AI-Driven SOC, Trust Is the New Differentiator

Read More
January 29, 2026
Threat Intelligence Platform
Cyber Threat Intelligence

The Threat Intelligence Market Is Changing: Five Shifts Redefining How Intelligence Creates Value

Read More
January 27, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Evelyn Stealer Abuses, PDFSider Malware, Open-Source Tools Deploy RAT and more

Evelyn Stealer Abuses Developer Tooling to Harvest Credentials. Stealthy Backdoor Abuse: PDFSider Malware Evades Detection and Enables Persistent Access. Social Media Phishing Campaign Leverages Open-Source Tools to Deploy RAT. And More..
Read More
Explore All