Lists
Lists
The Lists feature in the Threat Intelligence application allows users to create, manage, and categorize collections of IOCs (Indicators of Compromise). These lists help in organizing threat data effectively and can be used in both offensive and defensive cybersecurity workflows.
What is a List?
A List is a user-defined collection of IOCs that may include:
- IP addresses
- Domains
- URLs
Each list serves a purpose, such as tracking blacklisted (malicious) or whitelisted (trusted) IOCs.
Key Features
- IOC Collection: Add multiple IOCs of different types (IP, domain, URL) to a list.
- Categorization: Assign each list a category such as:
- Malware
- Botnet
- Phishing
- Exploit
- Spam
- Whitelist
- Expiry Days: Lists have an expiry period from the creation or last modification. If the list is not updated or new IOCs are not added, it will be flagged for review upon expiry.
- Auto-Refresh: Adding or updating IOCs resets the expiry timer, keeping the list active.
- Tagging & Notes (optional): Add metadata to provide context for each IOC.
- Search & Filter: Quickly find lists and IOCs based on keywords, type, or category.
- Reusable Lists: Use the created lists across different modules like detection, enrichment, or alerting.
Use Cases
| Use Case | Description |
|---|---|
| Blacklisting | Create a list of known malicious IOCs (e.g., botnet IPs) to block or monitor. |
| Whitelisting | Maintain trusted IOCs to reduce false positives during detection. |
| Threat Research | Curate IOCs related to a specific campaign or malware family. |
| Threat Sharing | Share categorized lists with other tools or teams. |
| Time-based Validity | Ensure lists stay up-to-date by requiring periodic updates or automatic expiry. |
Creating a List
- Navigate to the Lists section.
- Click “Create New List”.
- Provide the following:
- List Name
- Description (optional)
- Category (e.g., Malware, Botnet, Whitelisted)
- Expiry Days (e.g., 30 days)
- Add one or more IOCs:
- Type: IP, Domain, or URL
- Value: e.g.,
192.168.0.1,malicious[.]com,http://bad.url/path - Tags/Notes (optional)
- Save the list.
Note: Adding or modifying IOCs automatically refreshes the expiry countdown.
List Visibility and Sharing
Lists in the Threat Intelligence platform can be created as either Public or Private.
Private Lists
- Only visible to the list creator.
- Ideal for internal threat intelligence or sensitive research.
Note: Private lists owned by an organization can able to share with individuals or other organizations.
Public Lists
- Visible to all users on the platform.
- Designed for community-driven intelligence sharing.
- Can be subscribed to, liked, or disliked by the community.
- Anyone can view and export the list for operational use (e.g., SIEMs, firewalls).
Community Features (Public Lists Only)
Public lists support community engagement through:
- 👍 Likes and 👎 Dislikes to gauge list quality and usefulness.
- 🔔 Subscribers who follow the list for updates and changes.
- 📢 Created by Organization: Public lists may be published under an organization name, allowing users to trust lists from known cybersecurity groups or vendors.
Organization-owned lists can be:
- Public: shared with everyone
- Private: shared only with select users or trusted organizations
Adding Indicators to a List
There are three ways to add IOCs to a list:
1. Manual Entry
- Use the “Add Indicators” interface to:
- Input one or multiple indicators
- Paste raw text that contains IOCs (e.g., logs, emails)
- The system will automatically extract valid indicators from the input.
Supported formats:
192.168.1.1malicious[.]comhttp://bad.url/path
2. Import via URL
- Enter a URL that hosts or contains indicators (e.g., open feeds, pastebins, threat blogs).
- The system will:
- Fetch the content
- Extract valid IOCs automatically (IP, domain, URL)
- Add them to the list
Only trusted URLs should be used to avoid ingestion of false or malicious data.
3. Upload File (CSV/XLSX)
- Upload an
.xlsxor.csvfile containing indicators. - The file must follow a predefined format for parsing:
Supported Format:
Indicator Tags Description tlp
| Indicator | Indicator_Type | Tags | Description | tlp |
|---|---|---|---|---|
| 8.8.8.8 | IPv4 | DNS,Google | Public DNS | 1 |
| phishing-site.com | Domain | FakeLogin | Suspicious | 2 |
- Columns should include:
Indicator Type: IPv4,IPv6, Domain, URLIndicator: actual IOCtlp(Traffic Light Protocol) : number range(1 - 6)- (Optional) :
Tags,Description
Invalid rows will be skipped with an error message shown after upload.
Best Practices
- Use Add Requests for collaboration while maintaining list integrity.
- Periodically review and audit submitted requests and indicator sources.
- Make use of automated scraping and file uploads for bulk ingestion and feed processing.
Exporting Lists
Lists can be exported as files and also through Link to integrate with external systems. Exporting enables:
- Firewall ingestion (e.g., blocking IPs/domains)
- SIEM or SOAR automation
- Threat hunting tools
- Custom scripts and enrichment pipelines
How It Works:
- Select IOC List from IOC's List.
- Select Export, Choose anyone among the dropdown "Export CSV/ XLSX/ Link"
False Positive Reporting
To ensure accuracy, users can report false positives on IOCs within public or shared lists.
How It Works:
-
Select Indicator(s) you believe are false positives.
-
Click “Report False Positive”.
-
Your report will appear in the False Positives tab under the list.
-
A discussion thread allows all collaborators (users/orgs) to:
- Review context
- Provide evidence
- Discuss the indicator’s legitimacy
-
A decision is then made to either:
- Retain the IOC
- Remove or modify the IOC
This collaborative approach helps reduce false detections and improves list quality.
Add Request System (For Shared Lists)
Shared lists (private lists shared with users or organizations) support a collaborative feature called Add Requests.
This allows external users or organizations with access to the list to suggest indicators to be added, without modifying the list directly.
How It Works:
-
Navigate to a shared list you have access to.
-
Click "Add Request".
-
Submit one or more indicators (IPs, domains, URLs).
-
Optionally, provide:
- Tags or categories
- Context or description
- Source of the IOC
-
The list owner/admin will receive a notification and can:
- ✅ Approve and add to the list
- ❌ Reject the request
Only shared users can submit Add Requests. Public lists do not support this feature currently.
Summary of List Capabilities
| Feature | Private Lists | Public Lists |
|---|---|---|
| Visibility | Creator / Org only | Everyone |
| Sharing | Specific users/orgs | Not required |
| Export as CSV | ✅ Yes | ✅ Yes |
| Likes/Dislikes | ❌ No | ✅ Yes |
| Subscribers | ❌ No | ✅ Yes |
| Organization Ownership | ✅ Yes | ✅ Yes |
| False Positive Reporting | ✅ If shared | ✅ Yes |