OPTIONAL: Create a Mock CSV Threat Intel Feed Source
Similar to enrichments, we need to set up a
data.csv
file, the
extractor config JSON, and the enrichment config JSON. For this example, we use a Zeus malware
tracker list located here: https://zeustracker.abuse.ch/blocklist.php?download=domainblocklist.Hortonworks Cybersecurity Platform (HCP) is designed to work with STIX/Taxii threat feeds, but can also be bulk loaded with threat data from a CSV file. In this example, we create a mock CSV enrichment source. If your production environment, you will want to use a genuine enrichment source.